YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands

Author Topic: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands  (Read 1787 times)

0 Members and 1 Guest are viewing this topic.

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Travelers Alarmed as Federal Agents Check IDs After Domestic Flight Lands
Feb. 23, 2017 7:39 p.m. ET

Passengers arriving on a Delta flight from San Francisco to John F. Kennedy International Airport on Wednesday night were asked by U.S. Customs and Border Protection officials to produce identification as they exited the plane.

The request—in the context of sweeping changes to U.S. immigration policies under the administration of President Donald Trump—was met with confusion, alarm and speculation by some passengers.

There was, however, a solid reason for the ID check.

According to a statement from Customs and Border Protection, an immigration judge had ordered a person—who had been convicted of domestic assault, driving while impaired and a violation of an order of protection—to be removed from the plane and taken into custody.

Border protection officers are sometimes asked by U.S. Immigration and Customs Enforcement to help in investigations.

In this case, it turned out the person wasn’t on the plane.

None of the passengers on Delta flight 1583, however, knew what prompted the ID check.

Matt O’Rourke, a passenger, said that as the plane taxied to the gate, a member of the flight crew announced that everyone on board should have their papers ready to be checked by agents.

After a passenger asked the flight attendant to clarify what they wanted to see, the crew member explained that they were looking to inspect a government-issued ID, Mr. O’Rourke said.

As passengers exited the plane, two Customs and Border Protection agents checked IDs one by one.

Mr. O’Rourke, who lives in New York and works in advertising, said it didn’t make sense why the customs agents would be checking these documents on a domestic flight.

“It’s alarming to not know the reasons they would be checking,” he said.





ANSWER: Because it wasn't about the non-existent passenger... it's about GET READY FOLKS:
So, as an American Citizen, you may be asked for 'your papers please' while flying domestically. Except it won't be papers... it will be biometric IDs coming soon. (Then they can check to make sure you've had your vaccine before you're allowed on a flight, or on a train, or on a bus...)

Anything to "keep Americans safe", right?
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline pac522

  • Moderator
  • Member
  • *****
  • Posts: 3,821
  • Peace sells, but who's buying?
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #1 on: February 24, 2017, 10:45:51 AM »
Physiological Operations 101. Make something inconvenient and then offer a solution, the final nail in the 4th amendment. BIOMETRIC ID
This country did not achieve greatness with the mindset of "safety first" but rather "live free or die".

Truth is the currency of love. R[̲̅ə̲̅٨̲̅٥̲̅٦̲̅]ution!

We are all running on Gods laptop.
The problem is the virus called the Illuminati.  ~EvadingGrid

The answer to 1984 is 1776.

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #2 on: February 24, 2017, 10:54:14 AM »
Physiological Operations 101. Make something inconvenient and then offer a solution, the final nail in the 4th amendment. BIOMETRIC ID

Yes. Problem - Reaction - Solution.
We keep seeing it; and they keep using it.
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #3 on: February 24, 2017, 11:03:18 AM »
Um, this isn't limited to "aliens" (that's just a convenient excuse for them as it has been from day one, and one of the reasons nothing was ever done about the issue.)

DHS to expand US-VISIT biometric collection

By Ben Bain
Dec 19, 2008

The Homeland Security Department will soon begin collecting digital fingerprints and photographs from lawful permanent residents of the United States and people seeking to enter the country on an immigration visa or as refugees.

The biometric data will be collected from additional groups of those persons when they enter the U.S. starting Jan. 18 as part of DHS’ U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT), officials said Dec. 18. In a statement, DHS officials called the expansion a “positive step forward in a process designed to further improve public safety and national security while ensuring the integrity of the immigration system.”

The biometric data collected through US-VISIT program is used to conduct security checks on the visitors and verify their identities. The US-VISIT program already collects data from visitors entering on a non-immigrant visa and through a program known as the Visa Waiver Program.

The final rule published today in the Federal Register will expand US-VISIT to collect biometrics from:

• The U.S. lawful permanent residents or “green card” holders.

• People seeking admission on immigrant visas.

• People seeking admission as refugees and or seeking asylum.

Some Canadian citizens.

• Those who apply for admission through the Guam Visa Waiver Program.

In many cases, Canadians will still not be required to give their biometrics when entering the U.S, nor will non-U.S. citizens under the age of 14 and over the age of 79.

The final rule also makes permanent an interim final rule that required the collection of biometrics from foreign nationals who seek admission under the U.S.’ Visa Waiver Program and travelers arriving at some land entry points, DHS said.

The policy change was criticized from the American Immigration Lawyers Association. Charles Kuck, president of the group, said the expansion of the program was premature and would harm the economy.

"The idea that lawful permanent residents, immigrants who have been living in the United States for years, will be subject to finger scans and other biometric data collection procedures when traveling to and from the U.S. is simply wrong and borders on the absurd," he said.

However, DHS said in a statement, “Collection and verification of biometric identifiers upon entry protects travelers by making it virtually impossible for anyone else to attempt to use their biometrically linked travel documents (such as a permanent resident card), such as if their documents were stolen or duplicated.”


DHS noted that US-VISIT is now operational for entry at 115 airports, 15 seaports, and 154 land border ports of entry.

Come try to get my biometric data.  Anyone who doesn't say no to this will also not say no to FEMA camps.  You either have balls up front, now--or you don't have them.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #4 on: February 24, 2017, 11:25:58 AM »
New Hampshire introduced a bill to restrict the collection of biometric data... I wonder what ever happened to that bill?
It was a great idea... LIVE FREE OR DIE.


AN ACT restricting the collection of biometric data by state agencies and private entities.

SPONSORS: Rep. Kurk, Hills 7; Rep. L. Jones, Straf 1
COMMITTEE: Commerce and Consumer Affairs


This bill restricts the collection of biometric data by state agencies and private entities and provides a private right of action for the misuse or unlawful collection of biometric data.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Explanation: Matter added to current law appears in bold italics.

Matter removed from current law appears [in brackets and struckthrough.]

Matter which is either (a) all new or (b) repealed and reenacted appears in regular type.




In the Year of Our Lord Two Thousand Eleven
AN ACT restricting the collection of biometric data by state agencies and private entities.
Be it Enacted by the Senate and House of Representatives in General Court convened:

1 New Chapter; Regulation of Biometric Information. Amend RSA by inserting after chapter 359-J the following new chapter:



359-K:1 Definition of Biometric Data. In this chapter, “biometric data’’ means any of the following:

I. Fingerprints, palm prints, and other methods for measuring or recording ridge pattern or fingertip characteristics.

II. Facial feature pattern characteristics.

III. Behavior characteristics of a handwritten signature, such as shape, speed, pressure, pen angle, or sequence.

IV. Voice data used for comparing live speech with a previously-created speech model of a person’s voice.

V. Iris recognition data containing color or texture patterns or codes.

VI. Keystroke dynamics, measuring pressure applied to key pads.

VII. Hand geometry, measuring hand characteristics, including the shape and length of fingers, in 3 dimensions.

VIII. Retinal scans, reading through the pupil to measure blood vessels lining the retina.


359-K:2 Collection of Biometric Information Prohibited.

I. No government agency or private entity shall:

(a) Issue an identification card, other than an employee identification card, or use an identification device or system, that requires the collection or retention of an individual’s biometric data.

(b) Require an individual to disclose or provide biometric data as a condition of doing business with, engaging in any business activity or relationship with, or obtaining services from, that agency or entity.

II. The prohibition in paragraph I shall not apply to the biometric data collection practices of law enforcement agencies in effect on January 1, 2011 or to biometric data collected by the division of motor vehicles under RSA 260:10-b, II.

III. Any biometric data collected for an employee identification card shall be destroyed when the individual terminates employment with the agency or entity. No biometric data collected under this section shall be subject to a subpoena.

359-K:3 Violation; Civil Action. Any individual aggrieved by a violation of this chapter, including the loss or misuse of biometric data lawfully collected under RSA 359-K:2, may bring a civil action under this section to obtain the following:

I. An injunction of the agency or entity’s practice.
II. Actual damages or $2,500 for each violation, whichever is greater.
III. Reasonable attorney’s fees and court costs.

2 Effective Date. This act shall take effect January 1, 2012.
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #5 on: February 24, 2017, 11:41:22 AM »
US Lawmakers Eyeing National ID Card
America, meet Holland circa 2005 - when they implemented the national ID card there. First they push this healthcare bull down your throat - now they're going for the jugular.

They now think they have fully conquered America and can go in for the kill

US Lawmakers Eyeing National ID Card

According to Wired (and no big surprise, considering the practicalities of implementing massive changes in medical finance), US lawmakers "are proposing a national identification card, a 'fraud-proof' Social Security card required for lawful employment in the United States. The proposal comes as the Department of Homeland Security is moving toward nationalizing driver licenses."

Wired: Lawmakers Eyeing National ID Card
Lawmakers are proposing a national identification card — what they’re calling “high-tech, fraud-proof Social Security cards” — that would be required for all employees in the United States.

The proposal by Sen. Charles Schumer (D-New York) and Sen. Lindsay Graham (R-South Carolina) comes as the states are grappling to produce another national identification card at the behest of the Department of Homeland Security. Virtually none of the states are in compliance with this Real ID program — adopted in 2005 — requiring state motor vehicle bureaus to obtain and internally scan and store personal information like Social Security cards and birth certificates for a national database.

Graham, left, and Schumer, are calling for national ID cards to combat illegal immigration.

Now comes a bid for a second card.

Homeland Security officials pointed to the Sept. 11 hijackers’ ability to get driver’s licenses in Virginia using false information as justification for the proposed $24 billion Real ID program. Schumer and Graham point to illegal immigration as cause for their plan.

We would require all U.S. citizens and legal immigrants who want jobs to obtain a high-tech, fraud-proof Social Security card. Each card’s unique biometric identifier would be stored only on the card; no government database would house everyone’s information,” they said. “The cards would not contain any private information, medical information or tracking devices. The card would be a high-tech version of the Social Security card that citizens already have (My note: Oh no, it contains 'no private information' - other than your biometric fingerprint - other than your iris scan - and all the other bull. Shut the f**k up already - living in a socialist country myself and having this POS card forced down my throat, I know what is required of me: my fingerprints, iris scan, RFID chip on the card, and so on..”

Jim Harper, director of information policy studies at the Cato Institute, suggests the plan would undoubtedly lead to a national database. He added that “there is no practical way of making a national identity document fraud-proof.”

What’s more, Richard Esguerra, the Electronic Frontier Foundation’s in-house activist, notes that a national ID card likely would expand from its stated purpose.

“Because of the ID card’s proposed universality, it will likely be requested and required by airlines, insurance agencies, health care providers, mortgage lenders, credit card companies, and so forth,” he said.

And this so-called mission creep is no fantasy.

A recent and clear example of this is the Adam Walsh Child Protection and Safety Act. The 2007 law requires states to have statutes demanding sex-offender registration for those convicted of the non-sex-related offenses.

Graham and Schumer said they have discussed the immigration plan with President Barack Obama, but that apparently is as far it has gone. Regarding Real ID, beginning Jan. 1 the law was supposed to have blocked anybody from boarding a plane using their driver’s license as ID if their resident state did not comport with the Real ID program.

But the Department of Homeland Security extended the deadline for another year.

This is just taking the piss man. I've long been maintaining, as a fellow Dutchman, that The Netherlands really is Brave New World 2.0. In no other country has the elite been so successful in implementing their biometric control grid without any restraint whatsoever from the people. Since Monday, your passport will now require biometric identification. They rolled out the ID card without much fuss in 2005.

Euthanasia is practically championed as being 'good' in The Netherlands - and they take this position because there was a bloody eugenic campaign being waged here in the 1850s where the poor were allowed to die off. You can read about this in Margaret Sanger's 'The Case For Birth Control'.

Needless to say this whole myth of The Netherlands as this ultra-liberal democratic country is not only a myth, it is a well-constructed farce.

There are basically two recurring themes in The Netherlands:

1 - Adolf Hitler/Nazi's - they talk about it every bloody year - they keep it alive through the Zionist media (which is also very prevalent here) It's a lot of fakery and mock solemn faces every year - oh the horror - oh the pain - oh the poor Jews - and most of them (98.9% of them) never even experienced the bloody era it was set in - they just recall it from the movies they saw about it.

And of course, conveniently left out is the fact that it was a bank in Amsterdam that financed Hitler, that Dutch Royal Shell was running slave labor in Nazi-Germany and was mining resources, that the boss of Dutch Royal Shell was an ardent Nazi, that Bernard was a Nazi, that there was even a homegrown political movement in The Netherlands that was pro-Nazi, and so on. And even Hitler seemed to think highly of the Dutch because they were mostly composed of Nordic/Aryan people - so they received special privileges other peoples didn't get.

2 - America - they love to talk about America every single day. I see people wearing T-shirts saying 'I love New York'. And while there's nothing wrong with that - I've got to ask these people - what do you love about it? The crime rate? The gun disarmament? The fluoride in the water? Go on, tell me - because honestly I don't think these people get AT ALL that they are lucky there's no fluoride in their tapwater, yet they're willing to go over to New York and drink water that destroys their tiny little braincells.[/size]
Just a few years ago, they had to create the perception that the government could not POSSIBLY push through smart meters for all homes in The Netherlands 'because of privacy concerns' (no shit, Sherlock).

We had nice reassuring PR handouts from the Anglo-Dutch's contemporary version of the Washington Post (ie. an establishment rag) -


Smart energy meter will not be compulsory
Published: 8 April 2009 11:36 | Changed: 8 April 2009 17:16
By Wilmer Heck

The 'smart energy meter' will not be compulsory in the Netherlands. Minister of economic affairs Maria van der Hoeven backed down after consumer groups raised privacy concerns.

The 'smart energy meter' has a dual purpose. It provides the consumers with detailed information about their electricity bills that they can then use in billing disputes with energy providers. Perhaps more importantly in the long run, it also gives the consumer a picture of his or her energy use. For instance: the smart meter can tell you exactly what that 15-minutes shower in the morning cost you (and the environment).

So the public basically thought - great, we still have control over our government and when we don't want something, they obey. (yeah right). And then all the little sheep in this country went to sleep.

That's when they gangraped everyone.

Because the current laws could not permit them to push this through, guess what? They changed the laws so it could be pushed through anyway.

See, Holland is THE number 1 police state after England -

they were the first with fingerprint registration for your biometric ID card. They were one of the first to instigate a rule that everybody above 12 needs to wear on his person a national ID card - the police have the right to request this from you at any time - if you don't, massive fines ensue.

Then we have this little nice thing here with public transportation having moved towards a total track-and-trace system in something called a 'Public Transportation Card' - this is a nice little card with an RFID chip embedded in it that registers exactly where you enter and exit a public transportation vehicle. This is all provided for by a company called Veolia which has sole dibbing rights now on public transportation (one of these lucrative public-private partnership deals they negotiated with the government). Another rich thing about this is that despite the government having 'privatized' public transportation, they still consider these guys 'public officials' - they are a real vicious, low-life, undereducated scum type that think they have the right to basically call you whatever they deem fit - and if you so much as mouth back at them, guess what buddy? 'Insults' are a statutory CRIME in The Netherlands - you face a 500 Euro fine for INSULTING a public official and you get a criminal record to boot - because hey, this shit is JUST as important as shoplifting, vandalizing, or car theft, now is it? (BTW, all of those cars and trains now have CAMERAS in them - and they dont' even make any bones about the fact that they watch you - but hey, there are already dozens of cameras in every street corner, so hey, it all adds up to the fun - you can imagine you're auditioning for Pop Stars or some other lame show while walking in front of a camera - or feel really giddy about somebody watching you)

Anyways, here comes the big kicker:

Smart meters are back with a vengeance. Oh, they implemented some new laws that makes it possible. OH, and guess what - if you refuse to let the energy company (upon replacement of your OLD meter) place the device in your house, YOU WILL BE ARRESTED AND THROWN IN PRISON. THAT's RIGHT - LET'S REPEAT THAT AGAIN - YOU WILL BE ARRESTED AND THROWN IN PRISON. There's your nice freedom right there. You know, cry all you want about 'people wanting liberty' in Libya, Egypt or some other bullshit place you otherwise would not give two shits about - how the f**k about getting freedom in your own country, huh????

But hey, you've got a slave population here - I totally understand.

Here are some excerpts BTW -

Fears that data on energy consumption could be misused by criminals, police or insurance companies have curtailed the compulsory introduction of the meters in the Netherlands, according to a report by Datamonitor, the market analyst.

Dutch consumer and privacy organisations were concerned that information relayed as frequently as every 15 minutes could allow employees of utility companies to see when properties were empty or when householders had bought expensive new gadgets.

This report was dated 14/01/2010. The author pre-emptively declared victory:

The u-turn by the Dutch government represents a tremendous victory for privacy campaigners in the Netherlands and demonstrates that if enough noise is made about a civil liberties issue, eventually politicians will fold rather than face an electoral backlash.

This report is now outdated, by the way. Smart meters are coming in alright - to hell with 'privacy concerns' - you're feudal slaves, and you're going to LIKE IT.

On February 23, 2011, The First Chamber (just f**king pathetic marionette slaves of the big queen overlord, Ms. Beatrix and the clique that calls itself the House of Orange/Nassau) - they decided in their infinite crony wisdom - that hey, we're going to push this shit through, anyway.

The company Oxxio introduced the first smart meter for both electricity and gas in the Netherlands in 2005. In 2007, the Dutch government proposed that all seven million households of the country should have a smart meter by 2013, as part of a national energy reduction plan. In August 2008 the roll out of these seven million meters was delayed for several reasons. Main reasons for the delay were that there was limited possibility foreseen to register small scale local energy production (e.g. by solar panels), and that there was uncertainty in the parliament on future developments in smart meters. On April 7, 2009 the Dutch government had to back down after consumer groups raised privacy concerns. Instead of a mandatory roll-out smart meters will be voluntary.[41]

Note that bolded line - this is what cybernetics is, people. This is what the cybernetic control grid is - A NEW DIGITIZED, HIGH-TECH MEDIEVAL AGE - WHERE YOUR LIFE POTENTIAL AND YOUR ABILITY TO ENACT CHANGE AND MEANING IN THE WORLD WILL BE CAPPED. Your energy will be CAPPED - your ability to communicate freely will be CAPPED - you will be under constant surveillance (hell, we already are).

This news report is in Dutch - but I will translate a part of it:

First Chamber approves new laws regarding smart meters
February 22, 2011

The First Chamber has agreed to two new laws proposed by minister Verhagen which were modified to allow consumers with smart meters in their homes more freedom of choice and a better guarantee of privacy

Minister Verhagen  expects that the rollout of smart meters can begin in 2012 (MY NOTE: Next year).

Smart meters make it possible for consumers to better track their energy consumption. This will hopefully lead to increased energy savings (My note: More like enforced austerity energy chances because you can NO LONGER COUGH UP THE DOUGH TO PAY FOR ELECTRICITY).

The smart meter will be implemented incrementally at first. In the first two consecutive years a consumer will receive a smart meter upon:
- replacement
- renovation
- new homes
- by their own request

Yeah, it will be 'voluntary' - yeah, more like, they're going to make it IMPOSSIBLE for you to stay on your old meter and create all sorts of propaganda to FORCE YOU onto the smart grid. Hey, when you've got slaves to be played, that's what you do as a pimp. BTW, the above directly contradicts that it will be 'voluntary' - like shit it will be voluntary - look at that - they're going to PUSH THIS THROUGH just like they pushed through track-and-trace RFID cards in public transportation - just like they pushed through back in 2005 that you're REQUIRED to have an ID card on you at all times so the cops can IDENTIFY YOU.

And of course the public is going to lap this up - it's amazing really this country is the most blatantly oppressed police state out of all - but the weird and mind-numbing thing is, the people REALLY DON'T CARE. Some do, but overall, what you're seeing here is grown adults acting like little kids - 10 years of age. It's total la-la land here - they're so dumbed down that they're just more or less consenting to a state of affairs that wouldn't seem out of place back in the Middle Ages.

Americans, pay careful attention - The Dutch may be a pathetic ensemble of politically correct, effeminate, dumbed down slaves, but I still have some hope for some of you guys - I know you don't want this, and I know that there's a sizeable segment over there that DISLIKES any form of cybernetic totalism. RESIST THIS AT ALL COSTS - AND DON'T LET YOURSELF GET PUT TO SLEEP BY REASSURING PR BULLSHIT LIKE THEY DID IN HOLLAND THAT - HEY - WE LISTENED TO YOU - NO SMART METER IS GOING TO BE INSTALLED - WE CARE ABOUT YOUR PRIVACY.

You know - Dutch are beyond  hope or salvation - the things they like and the traditions they look forward to each year all stem from Medieval Times- even the very term they use to refer to themselves - 'burgers' ('burghers') - dates back to Medieval Times. Let me give you a little quote that describes what a 'burgher' means -

He [Fichte] blamed all but God for the German defeat against Napoleon Bonaparte: corrupt royals, the nobility, the decadent influence of reason, and a succession of weak governments that undermined religion as a moral force. He wanted the German losers to emulate the burghers of the Middle Ages, who made the Holy Roman Empire great because they weren't individuals, but sacrificed to the common good.

That more or less sounds like a slave, right? Well, quelle surprise why they still use that term.

BTW - this Fichte guy - he is the charming chap that wrote stuff like this - Bertrand Russell alludes to him in his pro-eugenics book, The Impact of Science on Society:

"Education should aim at destroying free will so that after pupils are thus schooled they will be incapable throughout the rest of their lives of thinking or acting otherwise than as their school masters would have wished."

And they still have this basic attitude - most of them - that they're nothing but a bunch of slaves that should just work their entire lives for supposed 'betters' above them - and they still lie to themselves that the Queen is ceremonial and that their trias politica-government runs everything (LMAO) - and they're so intellectually mindbombed that they don't even remember that these past 10/11 years, they've been LIED TO, all sorts of shit has been pushed through without your consent (you VOTED NO FOR THE EU CONSTITUTION, YET IT WAS PASSED), and now it's so bloody insane that they have CONSENTED to being tracked and traced 24/7 inside public transportation buses/trains.

They have already ANNOUNCED that the next step is going to be MANDATORY GPS TRACKER BOXES in ALL CARS starting as early as 2012. They have already ANNOUNCED that smart meters will become more or less compulsory as of 2012. Hello, when the f**k are you guys going to wake up? This is not a 'cashless society' - this is Cybernetic Deadlock right here - if you accept all of this, I can guarantee you this - most of you within five to ten years will never again have a vacation to look forward to or a career opportunity. That's how bad this is going to become. Your cities and towns will degenerate into the 'scum pits' as termed by the oh-so-feared Mr. Wilders who doesn't run anything or have a chance in hell anyway - and which BTW, to give credit to injury, WAS THE ONLY ONE WHO ACTUALLY DARED TO CALL INTO QUESTION THE RIGHT OF THE QUEEN TO PARTAKE IN GOVERNMENTAL MATTERS. Why the hell has nobody else brought this up or dared to question it? This is outrageous - this woman has shown you last year that it is SHE that composes the government - she decides who is going to partner up with each other to form a coalition - and when a guy as much as throws a small piece of wrap paper at her, he gets thrown into prison, treated as a mental invalid and given several years in prison???! That doesn't exactly sound like a 'ceremonial' prestigial badge of honor to be quite frank with you.

Hey, Dutch - I know there are some of you on this forum and I know that most of you abhor as much as I do the average lack of interest and concern amongst your fellow citizens about their country going headfirst into Orwell and Brave New World - they're more concerned about the latest stupid news on television or some idle talk about 'concentration camps' or endlessly talking about some guy that dislikes Muslims.

It doesn't have to be like this - and you don't have to feel downcast and insignificant just because you've got dozens of slaves in your country that were reared and born to be as such.

There's nothing 'rational' (or 'nuchter', to use the Dutch preferred term) about letting all of this come into being. You know the handwriting is on the wall - why the hell are you not even as active as the average American? That wouldn't even be a bloody great accomplishment to be brutally honest - yet they still seem to be more clued-in. Why the hell is 'conspiracy theories' laughed at in this country? What the hell is wrong with people? Why do most want to become slaves so much?

These are questions we will have to deal with, and figure out a solution to it. Because time IS RUNNING OUT. Be less AFRAID of what they will think of you by bursting their feel-happy thought bubbles and be MORE AFRAID of what this is going to mean for YOUR FUTURE - you don't even have to worry about your children's future because I know there are a lot of people nowadays that are totally self-centered - no buddy, YOUR FUTURE is going to be flushed down the toilet by all of this - YOU DON'T HAVE TO WAIT 50 YEARS FOR IT - MAKE IT MORE LIKE 5-4 YEARS.[/size]

Offline Effie Trinket

  • member
  • Member
  • *
  • Posts: 2,293
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #6 on: February 24, 2017, 11:48:12 AM »
[NOTE: Original Title: Protecting critical infrastructure in urban areas from YOU, the terrorist
Previously, we covered such subjects as 'social networks' - where the intelligence agencies, the Navy postgraduate school, Harvard, MIT and others were using it as a way to 'profile' you and all your social contacts/daily behavior.

Now, today we are going to go one step further into the bleak heart of the New World Order - you've just gotta ask yourself one question:

* Are these guys crazy/paranoid enough that they want to 'profile' my daily walking routine/behavior?

And the answer is: You betcha. And it's scary as hell - and while they don't talk about Twitter, or Google Wave, or RFID public transport cards, DO CONSIDER that they have all CONSIDERED this beforehand and have integrated into their system.

So the guy who had reservations about Twitter -

Twitter - double edged sword?;boardseen#new

Was absolutely right. These guys are 'analyzing' traffic - they are investigating all the different 'routes' that binds groups of people together. Say, you have this shopping centre with a multitude of stores. The New World Order goons want to know - which kinds of people walk into this or that store, which kinds of people don't go to the store at all - which kinds of people stop to look at an advertisement in the shop window?

Computational Science and Its applications - ICCSA 2008 - Part I

Now be forewarned - this book is 1283 (!!!) pages long. It covers everything from iris recognition systems to geospatial data mining to 'profiling' the way you walk. Remember Alex talking about how the face-scanning cameras will use the biometric footprint of your body (that is what they have of you when you walk through the body scanner at the airport) to recognize you by the way you walk? Something similar to that is being discussed right here.

But before we discuss that - let's first talk about these guys using geospatial data to 'secure infrastructure' from the pesky public. Remember Dr Ruth A. David saying in that Homeland Security podcast that 'protecting key infrastructure' was one of Homeland Security's most important tasks - both domestic and abroad? That nexuses in with this.

Geospatial Modelling of Urban Security: A Novel Approach with Virtual 3D City Models

Markus Wolff and Hartmut Asche

University of Potsdam, Department of Geography, Karl-Liebknecht-Strasse 24/25,
14476 Potsdam, Germany

Complex urban structures are exposed to a variety of security risks.Especially concerning man-made hazards, cities can be considered as particularly vulnerable. Due to their high concentration of population, technical and social infrastructure, as well as their importance in politics, culture, economy and finance, metropolitan areas, in particular, can be considered as vulnerable environments. Since not every part of an urban area is exposed to the same level of potential security threats, it can be assumed that this level differs regionally within a metropolis.

Based on methods of geoinformation science, this paper presents an innovative approach to identify particularly vulnerable urban regions. Using the 3D city model of the German capital Berlin as an example, the potential of such models for mapping, analysis and assessment of different threat levels in urban environments is demonstrated. This geovisual and analytical potential of 3D city models can be instrumental for decision makers working in security agencies for both threat assessment and intuitive cartographic communication of spatial phenomena related to urban security issues.

GIS, 3D city models, geovisualisation, civil security.

1 Introduction
This paper presents an approach which couples GIS-based analysis with the visualisation potential of virtual three-dimensional city models. Taking the virtual 3D city model of the German capital Berlin as an example [4], we discuss selected geoanalysis methods targeted at data integration and vulnerability mapping of metropolitan regions. This geoanalytical method is then applied to investigate selected issues in the field of civil security. This approach requires the integration of application-specific thematic information into the databases of existing city models.

This is accomplished by using a Geoinformation System (GIS) to manage large, heterogenous spatial data. Virtual representations of complex three-dimensional urban environments are constantly gaining popularity among both the scientific community and the wider public. To cater for these requirements we develop a workflow for extending, analysing, visualising and combining existing 3D city models with related thematic data of special interest within the domain of civil security.

Translation: they're tracking you - and they are determining and gauging whether you are a 'threat' to businesses or key infrastructure. As per Dr Ruth David's own admission, protecting key infrastructure is one of Homeland Security's most important assignments.

This workflow as well as the extension of the database with frequency and sociodemographic data is presented in section 2. Based on these database enhancements an innovative method to map and analyse regions with different degrees of exposure is presented in section 3. It is shown, that investigating urban environments for increased security risks reveals an uneven distribution of threat levels over metropolitan space. Thus different urban regions can be characterised by different levels of exposure, resistance and resilience compared to possible security threats. The end result is different levels and spatial distributions of vulnerability. In this context a GIS-based tool is presented which allows for an automated processing the input data and thus facilitates an easy repeatability of the analyses. Section 4 finally contains a short summary and introduces some perspectives.

2 Augmenting Existing Geodatabases for Geovisual Analysis
Three-dimensional city models are more and more available, with various cities possessing their own digital 3D representations. Compared to the traditional medium for communication of geographical data – the two-dimensional map – virtual three-dimensional city models facilitate in-depth analysis and presentation of spatial data. Furthermore, from a cartographic point of view, three-dimensional geovisualisation can reveal “patterns that are not necessarily visible when traditional map display methods” [9] are used. Applying methods and functions of visual analytics facilitates to “detect the expected and discover the unexpected” [11] as by means of visual data mining [5]. Thus, complex spatial situations like planning scenarios, noise and pollutant dispersal patterns are increasingly analysed and visualised by the use of 3D city models [3].

Typical datasets included in such databases contain, e.g., cadastral and topographic information as well as information relating to buildings, such as use or function, dimensions, height, etc. What is, however, widely lacking with these databases is application-specific thematic content linked to the different topographic and 3D data layers. To augment existing city model databases with thematic information required to conduct special-purpose geoanalysis in the field of civil security a workflow is developed to perform such operations in a systematic way (cf. figure 1).

Within this workflow we use different methods of GIS-based analysis to extend the database. As an example, passenger-frequency information (cf. section 2.1) is added by linking this data to road segments. The GI-system database then provides the basis for further analysis and allows to generate different types of visualisations. Conceptually speaking, GIS serves as the centre for non-graphic data analysis. The 3D geovisualisation system serves as the visualisation front end, facilitating graphical analyses by interpreting spatial relationships in a three-dimensional environment. Applicationwise we use a commercial GIS package, namely Esri ArcGIS, and the LandXplorer 3D visualisation software system [6].

To investigate the geoanalytical potential of this combined GIS/VIS system, it has been applied to model urban risks in the centre of the German capital Berlin. The study area covers a 13 km by 6 km strip of the city centre inside the inner metropolitan train ring between Westkreuz and Ostkreuz S-Bahn stations. This transect contains the “Western Centre” (Kurfuerstendamm boulevard) of the city as well as its “Eastern Centre” (Alexanderplatz Square).

As a database we have used the official Berlin city model which includes the following data sets:

• Built-up area of 57,096 buildings, with height data and building function
• Street network, compiled primary for car navigation issues (from Teleatlas)
• Public transport network: Metropolitan train (S-Bahn), underground, tram and bus routes
• Geotopographic data, namely topographic map K5 (scale 1:5,000), digital terrain model (resolution 25m), high resolution aerial photography (HRSC, resolution 20cm)

2.1 Modelling Outdoor Bustle: Enhancing the Building Dataset with Frequency Information

An important factor in analysis of security related issues is detailed information on the activity flows within a city. With this information, areas, streets and single buildings in a city model can be identified which are daily frequented by many or few people. This kind of information is to date not included in the Berlin city model database. That is why data from the FAW Frequency Atlas of the German Association for Outdoor Advertising (FAW) are integrated into the 3D city model database. This atlas, originally developed for the advertising industry, has been compiled also for the city of Berlin and is based on Teleatlas road segments.

The atlas data allow for an in-depth evaluation of pedestrian, car, and public transport frequencies. Frequencies are calculated as average values per hour on a working day basis for the years 1999 to 2005 [7]. Technically speaking, for each road segment one FAW point exists with the corresponding frequency values. Based on its geocoded coordinates this dataset is imported into the existing Berlin city model. This point-based FAW information is then referred to the corresponding road segments via its unique segment-ID. By this each segment of the street network dataset is supplemented by new attributes: The number of pedestrians, cars and public transport carrier that frequent any given street segment per hour of an average working day (cf. figure 2).

Note what they are doing here - they admit they are treating the entire CITY as a 'network' with 'activity flows' - which means they're treating you as a data packet inside a network. Yes, that's kind of a lame analogy, but it holds true when you see the picture below and you see the streams with the alternate colours - they show you the frequency of people walking on a daily basis in this or that street. Juxtapose all that with the cameras that also determine how many people are frequenting this or that road or area (and I have an official RFID book by the way that confirms that - I'll pull it up later to confirm this to you lot) - and this is surveillance on a far greater scale than anything ever imagined in George Orwell's 1984. This is why they need all those sensors inside the cities - predictive modeling of the pedestrians' behavior so that they can 'protect' key infrastructure - which is the police/law enforcement's chief focus today. THEY ARE NO LONGER ABOUT PROTECTING CITIZENS - I HAVE HAD THIS VALIDATED BY SEVERAL COPS WHO TOLD THIS SHIT RIGHT IN FRONT OF MY FACE.

In addition to frequency data referred to street segments similar information for buildings along streets can be relevant for civil security issues which are often relating to single potentially vulnerable buildings (My note: See? Protecting critical infrastructure - this is what the militarized/joint combat police are for in conjunction with Homeland Security. Remember Dr Ruth David in that Homeland Security broadcast saying Homeland Security's prime directive was protecting key infrastructure and the 'away game' (as in: operating overseas) was most important? That's what this is).

For that purpose frequency values have been assigned to adjacent buildings by analysing distances from buildings to street segments (cf. figure 3). First, centroids of each building are calculated. Second, new points are created along the road segments for every 30 meters. Third, the four nearest segment points, based on each centroid, are identified. Finally, an average value is calculated from their frequency values which is assigned to the whole building. As a result, such “smart” buildings can be queried for their frequency data.

See? They're not just tracking the traffic flows of the cars and other automobiles using GIS - no, they're also recording and profiling the traffic flows of PEDESTRIANS - meaning, when you walk on the goddamn street for no particular reason other than to go shopping, get drunk or visit your significant other.

2.2 Modelling Building-Related Population Parameters: Augmenting the Building Dataset with Socio-demographic Data

To identify and analyse potentially vulnerable city regions additional socio-demographic data on a building block basis is required. Such data are, e.g., population density, family income or purchasing power. Knowledge of these patterns enables one to draw conclusions from exposure, resistance and resilience concerning a possible hazardous event. To map vulnerability patterns within an urban region, additional population data of the German Society for consumer research (GfK) are also integrated into the existing city model database. Here such data are only available for the central Berlin postal code zones 10115 and 10117, respectively. This is an area of 6 km² stretching from Brandenburg Gate in the west to Hackescher Market in the east, Bundesrat building in the south and Schwarzkopfstrasse underground station in the north.

This area is both suitable and interesting for security related analysis since numerous embassies, consulates and government buildings, as well as highly frequented touristic sites, such as Friedrichstrasse street, Unter den Linden boulevard, Gendarmenmarkt square, are located here. In addition, this area will house from 2011 the new headquarters of the German intelligence service (Bundesnachrichtendienst, BND) which will be located on the former World Youth Stadium (Stadion der Weltjugend) site.

As with processing of FAW frequency data, GfK data are imported using GIS functions. The available source dataset of 2006 includes numerous socio-demographic features such as population data, household size, household net income, building structure, building use, purchasing power. For data privacy reasons data are, however, not available for single buildings but for all buildings along a given street segment (My note: Oh, gee, thank goodness - they just 'profile' whether or not I fit inside some kind of poor or lower social class that is likely to pose a 'problem' for them - and hey, they can always extrapolate from that my household size and net income even though they basically deny here they have that capability.).

Spatial reference of these point based data is by coordinates. Reference of those points to the appropriate buildings is verified by the matching of street names of GfK data points and belonging buildings, respectively. Therefore an algorithm is applied which searches for each building (its centroid) the nearest GfK point with the same street name. Attributes of this point are transferred to the building. Figure 4 is a 3D visualisation showing purchasing power related to each building block.

BTW - just as a side note - I thought that liberals were so fond of saying there are no longer any social classes or differences in social class? Well, this does seem to fly in the face of that - since they're giving certain residential zones 'certain colors' on the basis of their income status/purchasing power, and household size - and they 'infer' from that how likely you are a threat to 'key infrastructure'.

3 Geospatial Modelling of Urban Risks

The augmented 3D city model database is a prerequisite for further and in-depth geoanalysis of urban risks. The broad range of thematic data integrated into the database allows, e.g., for further spatial analysis in the context of an urban impact assessment. Such analysis will, however, not produce any precise indication which building (the element-at-risk, EAR), e.g., is exposed to an increased threat of what nature. For such evaluation of factual threat levels, a substantial amount of additional data would be required, many of which are not available publicly. In this context Koonce et al. [8] state that this knowledge is "best left to the security and intelligence agencies". In this study it is therefore assumed that only buildings with specific occupancies, such as government offices, or embassies, are particularly vulnerable to security threats.

OK, and what conclusion are we to draw from that? That the 'intelligence agencies' are monitoring and building maps of my entire residential area looking for threats to THEIR 'key infrastructures'? I thought the terrorists were over there, so we didn't have to fight them over here - why am I the threat? Oh why even entertain cognitive dissonance, we know how this game is being played.

Dealing with the nature and location of potentially hazardous events in urban environments [2, 10], an evaluation of the surroundings of a particular building exposed to a given risk is of special importance. Thus, for protection as well as for counteractive measures it is decisive to differentiate whether the structure is surrounded by open space or by dense urban housing. To perform such distance based analysis on the city model built-up area layers, a first step requires the creation of circular impact zones, with the element at risk in its centre. In our case the radii are defined at 150m, 300m, 500m, 1,000m and 2000m intervals. In a second step the intersections of impact zones and buildings allow for statistical analysis based on the built-up-area database.

This analysis shows that buildings within zones one to three (up to 500 m from the EAR) are passed by an average of 200 pedestrians. This value is decreasing with increasing distance. Because of the EAR location in a business district of central Berlin, the greater the distance from the EAR the more buildings have residential instead of business and administrative occupancies. As a consequence the number of potentially affected pedestrians is decreasing while the number of residents is increasing (cf. figure 5).

3.1 Modelling the Distribution of Exposure Levels in Urban Environments

In the following an approach is presented to identify urban regions characterised by different degrees of exposure of a potential impact. The underlying assumption of this investigation is that not every area of an urban environment is equally exposed to the same level of potential threat. Rather a regional variation of threat levels can be found, as buildings potentially exposed to an increased security risk are not evenly distributed in city space. In this study the term "highly increased" threat is assumed for buildings housing embassies, consulates and government offices. An "increased" threat is assumed for the following buildings: Shopping centres, petrol stations (danger of explosion), police posts, power or transformer stations (critical infrastructure) etc. The following analysis is based on the buildings dataset of these categories (=exposed buildings). It can, however, be expanded to any user-defined set of buildings within a city model.

To map regionally different exposure levels the city model is first overlaid with a user-defined grid. Second, the distance of each grid cell to the closest exposed building is calculated. The resulting grid pattern is composed of cells each of which contains one distance value of the respectively closest exposed building. The grid can be further differentiated by building occupancy. The embassy grid, e.g., contains distance cell values of the closest buildings used as embassies or consulate offices. This set of exposure grids generated by proximity analysis forms the basis to identify different levels of threat exposure. For that purpose, each function-specific grid is reclassified in relation to proximity: Thus, grid cells closer to an exposed building are assigned a higher exposure level than cells with greater distance (cf. tab.1).

GIS-based grid analysis, as used here, allows for convenient overlays and combinations of areal data by using map algebra functions. Hence all function-specific exposure grids generated are combined into one single “exposure grid” by summation of their respective pixel values. It has been mentioned that different building uses can be assigned different levels of threat exposure. Thus summation is performed by weighting the respective grids according to their threat exposure: The embassy offices grid (embassies, consulates) and the government offices grid are weighted with a factor of 4, the shopping centre grid with a factor of 2 and the service and utilities grid (police posts, petrol stations, power stations) with a factor of 1 (figure 6).

The workflow described here has been automated by developing a GIS tool using ESRIs ArcObjects based software development framework. Our tool facilitates an automated and fast processing of the single grids (figure 7).

To employ this tool a buildings dataset containing information on building use and functions, respectively, is mandatory. The current version requires the user has to create an ASCII remap table according to table 1.

The combined weighted exposure grid can be visualised in different user-centered ways for further geoanalytical processing. Presented here is a 3D visualisation of a virtual threat surface based on the Berlin city digital terrain model (cf. figure 8). For easy comprehension exposure grid values are exaggerated by a height factor of 10 and added to the original height values of the digital terrain model. The resulting 3D map is a graphic, easy-to-read visualisation of the spatial distribution of threats in urban environments.

Intersection of the summation exposure grid with the buildings layer results in additional threat information in the built-up area dataset. As this dataset has also been augmented by socio-demographic data, a variety of geographical correlations of building occupancy, socio-demographic situation, infrastructure etc. with regional threat exposure can be mapped, visualised and analysed. For instance, all buildings located within grid cells with values of combined exposure levels greater than a given value can be selected. Also statistical analyses can be performed to distinguish between spatially varied socio-demographic feature states. As a result, it is feasible to map those regions characterised by a number of inhabitants above average, significant purchasing power and high financial status (derived from net income per household)

So, what conclusion am I supposed to draw from this? That the Census Bureau is out of a job? (or not, depending on who you think is going to be running this system) Can we let machines run this thing - possibly employing a neural network or a 'world brain' for a particular city segment? Do machines start analyzing sociodemographic data and basing their agenda on it?

4 Summary
This paper presents an approach to combine GIS-based spatial analysis with innovative 3D visualisations using virtual three-dimensional city models for applications in civil security. Based on augmenting the existing spatial database of the virtual 3D city model of the German capital Berlin by a variety of parameters including building occupancy, frequency values and socio-demographic parameters, areas and objects exposed to specific levels of threat can be identified By combining function-specific grids with threat exposure levels the spatial distribution of threat levels can be mapped.

The resulting geographic distribution can subsequently be combined with additional socio-demographic or infrastructure data for further geovisual analysis. (My note: So, what they have here is a realtime virtual environment MODELLED on the actual environment that basically includes you, your entire residential block, the income and purchasing power of your residential block, and all of this with the specific intent and purpose to profile whether or not you will EVENTUALLY pose a threat to 'key infrastructure' and the government. What this is, is SimCity for psychopaths - SimCity for control freaks - they are running here a color-coded version of SimCity that is modelled on the real-world. This is the kind of depersonalization that enabled the Nazi death camps - reducing men with real lives, with real emotions, with real feelings to mere statistics and engraved dots inside some Hollerith supercomputer which is continuously fed punch cards)

Perspectively some of the presented methods and functions will be modified: The ArcObjects tool presented in section 3.2 will be extended to a larger ArcMap plug-in which also allows for an automated processing of the GIS features for the 3DLandXplorer System. Furthermore the presented approach of modelling and analysing
urban security by using GIS and 3D city models will be broadened by introducing some standards of thematic 3D cartography. Thus, an efficient communication of spatial phenomena shall be ensured.

Funding of this study by the German Federal Ministry of Education and Research (BMBF) within the framework of the InnoProfile research group ‘3D Geoinformation’ ( is gratefully acknowledged. The authors also like to thank the German Association for Outdoor Advertising (FAW) for providing frequency atlas data and Berlin Partner GmbH for use of the official Berlin 3D city model.


1. Borst, D., Jung, D., Murshed, S.M., Werner, U.: Development of a methodology to assess man-made risks in Germany. Natural Hazards and Earth Sciences 6, 779–802 (2006)
2. Coaffee, J.: Terrorism, Risk and the City: The Making of a Contemporary Urban Landscape, Gateshead, Ashgate Publishing, Ltd. (2003)
3. Czerwinski, A., Kolbe, T.H., Plümer, L., Stöcker-Meier, E.: Spatial data infrastructure techniques for flexible noise mapping strategies. In: Tochtermann, K., Scharl, A. (eds.)
20th International Conference on Environmental Informatics - Managing Environmental Knowledge, Graz, pp. 99–106 (2006)
4. Döllner, J., Kolbe, T.H., Liecke, F., Sgouros, T., Teichmann, K.: The Virtual 3D City Model of Berlin - Managing, Integrating and Communicating Complex Urban Information.
In: 25th Urban Data Management Symposium, Aalborg, Denmark, 9.73–79.86 (2006)
5. Döllner, J., Baumann, K., Buchholz, H.: Virtual 3D City Models as Foundation of Complex Urban Information Spaces. In: Schrenk, M. (ed.) CORP, Vienna (2006)
6. Döllner, J., Baumann, K., Kersting, O.: LandExplorer – Ein System für interaktive 3DKarten.
Kartographische Schriften 7, 67–76 (2003)
7. Fachverband für Außenwerbewirtschaft, FAW-Frequency-Atlas, Data description (2006)
8. Koonce, A.M., Apostolakis, G.E., Cook, B.K.: Bulk Power Grid Risk Analysis: Ranking Infrastructure Elements According to their Risk Significance, In: Working Paper Series, Massachusetts Institute of Technology, 39 pgs (2006)
9. Kraak, M.J.: Geovisualization illustrated. ISPRS Journal of Photogrammetry and Remote Sensing 57, 390–399 (2003)
10. Mitchell, J.K.: Urban Vulnerability to Terrorsim as a Hazard. In: Cutter, S.L., Richardson, D.B., Wilbanks, T.J. (eds.) The Geographical Dimensions of Terrorism, pp. 17–25.
Routledge, London (2003)
11. Thomas, J.J., Cook, K.A.: Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE Computer Society, Los Alametos (2005)

BTW - know what they did here? They've just applied the DHS original color-coded threat assessment system onto the entire world map - they've 'color coded' entire residential zones according to the threat they pose to DHS' to-be-protected key infrastructure, and on top of that they can also pull in all of the sociodemographic data that is also going into this system - they can see if you're living inside a residential area with relatively low household income, they can probably infer from that the racial or ethnic makeup, and so on.

This is the kind of stuff that enabled the Nazi concentration camps - because what they do is, they de-personify you and entire classes of people - and turn it into a number, a statistic, a binary floating inside some computer system. How 'convenient' that the concentration camps were all enabled by IBM Hollerith supercomputers with punch card index systems used to compile much of the sociodemographic and racial makeup that the Nazis desired. It could 'never happen again', eh? Combine this system with the Global Information Grid, with Interpol's DNA databank and it absolutely DWARFS anything the Nazis ever came up with - it's full spectrum dominance of everything inside the public and private sector.

Friday, July 10, 2009
Privacy to PreCrime

When the NSA assumed control of the Cyber Command, it stirred up many privacy concerns. As most know they have been intercepting domestic communications for some time.  While some people are worried about their phone and email conversations being recorded by the government, the other g-men at Google are doing the exact same thing. Of course deleting your g-mail account only prevents you from accessing the information, deleting your account at the NSA will get you a free vacation to Cuba for waterboarding lessons.
Throughout your life, little pieces of information are gathered and accumulated. Your profile is constantly amended as data volunteered by yourself is automatically correlated.  Every time someone forfeits some morsel of information, that data is forever public.  This material goes into a database, the security of which will be compromised at some point. We could blame the corporations when they experience a security breach, but honestly who's at fault for supplying them with the information to begin with?

If we are to address privacy concerns, then it is hypocritical to start the finger pointing with the NSA.

Thanks to popular social networking sites,  people are willing to give away the most important details of their lives.  It is this very ignorance of the overall value of information that creates risk on a number of levels.

Police officers only require a name and date of birth to positively identify most people. The same details can be used by criminals.  Think about that the next time someone mentions their birthday. If that person has their real name associated with the statement, then all of the facts required to build an extensive profile have been provided.  Such a profile, for example, could be used by a criminal to assume an identity, manipulate a person into revealing more information, or even pose a physical threat.  This same method could be used to launch attacks from within an organization through the user. Imagine a sort of phishing attack that affects the user at home. They enter into correspondence via email with a criminal posing as an old friend.  The employee continues this correspondence at work on the company computer. Since the employee feels safe, they are willing to click links, or even download files.

There is a whole industry based on gathering data about consumers, and using their personal details for marketing. The obvious signs of this are places like Amazon that recommend items based on site history.  What does your Amazon account say about you?  I don't buy into that line about "if you're not doing anything wrong, you don't have anything to hide". Would you invite someone into your house to create a behavioral profile based on your possessions?    Just about everything you do reveals some detail about your life.  For example, when you go to sleep your inactivity is noted.

Just by looking at your social network updates anyone can know what your sleeping habits are, and possibly where you sleep.  Everything you do is recorded, cataloged, correlated, psychologically analyzed, and put up for sale. The biggest customer for this information is the Federal Government, and because these databases are private, the Freedom of Information Act does not apply.

In the past it was common for people to keep a their private names and public names separate.   In Homer's Odyssey, Ulysses used a clever name to avoid unwanted attention from the other Cyclopes after blinding Polyphemus.  In Christian mythology, God gives Adam the power to name the animals, and so he had some power over them.  What of the clever goblin Rumpelstiltskin who allowed the millers daughter to renege on a deal by giving her a chance to guess his name?  When I first started in networked computing, one of the first things we learned was to contrive a 'handle', a pseudonym under which we would carry out our online activities. 

Today, it seems, people view this an act of cowardice, or become suspicious to the motivations behind concealing one's identity.  It wasn't a hacker thing, it was standing operational procedure. There is no such thing as anonymous internet usage. The best people can do is become aware of how much privacy that has already been lost, and do what they can to hold on to its shredded remains. It's not about assuming a new identity, it's about protecting privacy.  Today people  on-line are trading their identity for an illusion of friendship.

With the amount of information already in the databases, it is possible for them to know what we want before we do.  Using predictive modeling, marketing companies can already forecast the likelihood of future purchases. This also means with government access to these details, they can perform similar analysis.

Psychographic profiles reveal your personal interests, activities, and opinions, when combined with demographics and other variables, it is possible to triangulate personality in the same manner as physical location. It is trivial to track the physical direction of an individual, the same is also true about their mental direction.

Today we have the increased use of biometric identification. It comes with the promise of security, but can pose a new privacy risk.  Clear, the airport security screening service, may be taking the data trade to a new level. The TSA approved company, which required biometric finger and eye scans, has suddenly shut down.  It is likely their database will be transferred to some other private firm which specializes in collecting biometric data.  Since they are working with Lockheed Martin, I'd suggest the database and technology will resurface as part of the new biometric authorization requirement for access to public and private infrastructure.  Unlike passwords, there is no easy way to reset your fingerprints once the database has been compromised.

Within a few years there will be a global DNA database which will be used for a number of purposes. Utilization of the genome is so important that Francis Collins, who was responsible for the Human Genome Project, has been made director of the National Institute of Health.  If you take a look back at that psychographic profile link, you'll notice the article was in strategy+business, which is published by Booz and Company the global parent of Booz Allen Hamilton. A representative of Booz Allen was the one who brought to my attention the Global DNA database while giving a talk titled  "Hacking the Genome" at a computer security conference. 

Booz Allen is interested in developing psychological and genetic databases, they are also one of the main contractors for organizations such as the NSA . This sort of database, combined with genetic screening, could lead to the ability to determine much of the future of an unborn child.

While this has its merits, like any other system it can be abused. If not kept in check, it could lead to the reincarnation of the eugenics movement of the last century which was forced to re-brand after WWII because of it's popularity within the leadership of the German National Socialist party as part of their platform for world domination.

Welcome to the Brave New World!

The more you research this stuff, the more you come to the inevitable conclusion:

There's no choice BUT to fight this. Any act of submission or capitulation will result in abject slavery for all, from which there will be no return from - ever. It isn't as if you're going to turn the clock back on 'nanofactories' after it's become the accepted norm. It isn't as if you're going to remove those cameras on every goddamn street corner. It isn't as if you're going to turn the clock back on GPS tracker boxes inside every car once it's become the norm.

I mean, here in Europe, politicians are OPENLY above the law. They ride around in cars with special EE-branded licence plates which gives them 'God powers' - they can't be arrested by the cops, they're allowed to break the speeding limits and they generally can park anywhere they like without ever having to face the consequences of parking somewhere illegally. It's already Animal Farm in here, and the complacent Europeans (who are on average far more docile than the average American - which is saying much right now) just seem to 'accept' this and go about their daily lives. That is SICK. That, right there, is unconscionable and mentally deranged behavior.

Popping depression pills and working nine to five at the few remaining service-oriented jobs that are still left available for the average Western slave - and doing this song-and-dance ritual every weekend where you go to the local bar, get high and drunk and partake in that other ritual - where you do the 'procreative' act without actually 'procreating' - this is not what life should be.

The monotonousness of it all - combined with the fact that you know those cameras are not there for your protection and you're being lied to - is worse than any concentration camp ever devised by the Nazis. That's why you have all these people happily taking these psychotropics and anti-depressants - it's pure escapism but it's also an inadmission to gut up and acknowledge there is a problem. Instead, they retreat back into this childish state of mind where they want to 'return' to the womb so to speak - they want to feel happy again and oblivious - the 'blue pill'.

By that same token, anybody still worried about giving their identity away and hence shying away from becoming a 'public' figure on the Internet, doing vlogs or something else - look, the way things are going, you can pretty much kiss your privacy goodbye and you're already screwed. The 2014/2020 trajectory path of tyranny is irreversible at this point - only by becoming active have we ANY hope of turning the clock back.

This is serious business - even half of the people who are ushering in this tyranny haven't an inkling as to what they're subjecting future generations to.

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #7 on: February 27, 2017, 01:16:06 PM »
Welcome Aboard... But First US Marshals Will Scan Your Retina
by Tyler Durden
Feb 26, 2017 9:05 PM

For some 15 years, airport security has become steadily more invasive. There are ever more checkpoints, ever more requests for documents as you make your way from the airport entrance to the airplane. Passengers adapt to the new changes as they come. But my latest flight to Mexico, originating in Atlanta, presented all passengers with something I had never seen before.

We had already been through boarding pass checks, passport checks, scanners, and pat downs. At the gate, each passenger had already had their tickets scanned and we were all walking on the jet bridge to board. It’s at this point that most people assume that it is all done: finally we can enjoy some sense of normalcy.

This time was different. Halfway down the jetbridge, there was a new layer of security. Two US Marshals, heavily armed and dressed in dystopian-style black regalia, stood next to an upright machine with a glowing green eye. Every passenger, one by one, was told to step on a mat and look into the green scanner. It was scanning our eyes and matching that scan with the passport, which was also scanned (yet again).

Like everyone else, I complied. What was my choice? I guess I could have turned back at the point, decline to take the flight I had paid for, but it would be unclear what would then happen. After standing there for perhaps 8 seconds, the machine gave the go signal and I boarded.

I talked to a few passengers about this and others were just as shaken by the experience. They were reticent even to talk about it, as people tend to be when confronted with something like this.

I couldn’t find anyone who had ever seen something like this before. I wrote friends who travel internationally and none said they had ever seen anything like this.

I will tell you how it made me feel: like a prisoner in my own country. It’s one thing to control who comes into a country. But surveilling and permissioning American citizens as they leave their own country, even as they are about to board, is something else.

Where is the toggle switch that would have told the machine not to let me board, and who controls it? How prone is it to bureaucratic error? What happens to my scan now and who has access to it?

The scene reminded me of movies I’ve seen, like Hunger Games or 1984. It’s chilling and strange, even deeply alarming to anyone who has ever dreamed of what freedom might be like. It doesn’t look like this.

Why Now?
I’ve searched the web for some evidence that this new practice has been going on for a while and I just didn’t notice. I find nothing about it. I’ve looked to find some new order, maybe leftover from the Obama administration, that is just now being implemented. But I find nothing.

Update: a reader has pointed me to this page at Homeland Security:

As part of U.S. Customs and Border Protection’s (CBP) border security mission, the agency is deploying new technologies to verify travelers’ identities – both when they arrive and when they leave the United States – by matching a traveler to the document they are presenting. CBP’s goal is to enhance national security and protect a traveler’s identity against theft through the use of biometrics.
Biometric information (such as finger, face, or iris) measures a person’s unique physical characteristics. CBP incorporated fingerprints for biometric identification and verification in 2004, and is now testing facial and iris imaging capabilities to help improve travelers’ identity protection, the integrity of our immigration system, and our national security.

I happened to be on the "one daily flight" that gets exit scanned.

Another change has to do with new rules for Homeland Security just imposed by the Trump administration. They make deportation vastly easier for the government. I have no idea if these rules are the culprit for intensified emigration checks.

What people don’t often consider is that every rule that pertains to immigration ultimately applies to emigration as well. Every rule that government has to treat immigrants a certain way also necessarily applies to citizens as well.

Chandran Kukathas is right when he says that “controlling immigration means controlling everyone.”

Regulating immigration is not just about how people arrive, but about what they do once they have entered a country. It is about controlling how long people stay, where they travel, and what they do. Most of all, it means controlling whether or not and for whom they work (paid or unpaid), what they accept in financial remuneration, and what they must do to remain in employment, for as long as that is permitted. Yet this is not possible without controlling citizens and existing residents, who must be regulated, monitored and policed to make sure that they comply with immigration laws.

To be sure, there might have been some tip off that security officials received that triggered these special measures for this flight only. Maybe they were looking for something, someone, in particular. Maybe this was a one-time thing and will not become routine.

The point is that it happened without any change in the laws or regulations. Whatever the reason, it was some decision made by security. It can happen on any flight for any reason. And who is in charge of making that decision?

On the plane, finally, my mind raced through the deeper history here. Passports as we know them are only a little over a century old. In the late 19th century, the apotheosis of the liberal age, there were no passports. You could travel anywhere in the world through whatever means you could find. Nationalism unleashed by World War I ended that.

And here we are today, with ever more controls, seeming to follow Orwell’s blueprint for how to end whatever practical freedoms we have left. And we are going this way despite the absence of any real crisis, any imminent threat? The driving force seems to be this: our own government’s desire to control every aspect of our lives.

Think of it: there might be no getting out of the country without subjecting yourself to this process. It's a digital Berlin Wall. This is what it means to put “security” ahead of freedom: you get neither.
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #8 on: February 27, 2017, 04:12:31 PM »
Papers, Please
Passengers on a domestic flight deplaning in New York were asked to present ID by Customs and Border Protection agents—a likely unenforceable demand that nevertheless diminishes freedom.
Mike Blake / Reuters


After days of research, I can find no legal authority for ICE or CBP to require passengers to show identification  on an entirely domestic fight. The ICE authorizing statute, 8 U.S.C. § 1357, provides that agents can conduct warrantless searches of “any person seeking admission to the United States”—if, that is, the officer has “reasonable cause to suspect” that the individual searched may be deportable. CBP’s statute, 19 U.S.C. § 1467, grants search authority “whenever a vessel from a foreign port or place or from a port or place in any Territory or possession of the United States arrives at a port or place in the United States.” CBP regulations, set out at 19 C.F.R. § 162.6, allow agents to search “persons, baggage, and merchandise arriving in the Customs territory of the United States from places outside thereof.”

I asked two experts whether I had missed some general exception to the Fourth Amendment for passengers on a domestic flight. After all, passengers on flights entering the U.S. from other countries can expect to be asked for ID, and even searched. Barry Friedman, the Jacob D. Fuchsberg professor of law and affiliated professor of politics at New York University, is the author of Unwarranted: Policing Without Permission, a new book-length study of intrusive police investigation and search practices. “Is this remotely constitutional?” he asked. “I think it isn’t. We all know generally the government can’t come up and demand to see identification.” Officers need to have statutory authority to search and reasonable suspicion that the person to be searched has violated the law, he said. Andre Segura, senior staff attorney at the American Civil Liberties Union’s Immigrants’ Rights Project, told me that “I’m not aware of any aviation exception” for domestic passengers.

An ID check is a “search” under the law. Passengers on the JFK flight were not “seeking admission”—the flight originated in the U.S. CBP officials told the public after the fact that they were looking for a specific individual believed to be on board. A search for a specific individual cannot include every person on a plane, regardless of sex, race, and age. That is a general paper check of the kind familiar to anyone who has traveled in an authoritarian country. As Segura told me, “We do not live in a ‘show me your papers’ society.”

I asked a CBP spokesperson what legal authority the agency could show for the search. In response, the spokesperson said:

In this situation, CBP was assisting ICE in locating an individual possibly aboard the flight that was ordered removed from the United States pursuant to the Immigration and Nationality Act. To assist ICE, CBP requested consensual assistance from passengers aboard the flight to determine whether the removable individual in question was in fact aboard the flight. In the course of seeking this assistance, CBP did not compel any of these domestic passengers to show identification. With much-appreciated cooperation from these passengers, CBP was able to resolve the issue with minimal delay to the traveling public.

It's quite legal for law enforcement to ask for “voluntary” cooperation. Anyone who follows criminal-procedure cases, however, knows that “voluntary” in legalese does not mean what ordinary people think it means. Supreme Court caselaw makes clear that officers may block an exit and ask for ID or permission to search. They aren’t required to tell the individual stopped that he or she may refuse, and they have every incentive to act as if refusal may result in arrest. The Supreme Court held in 1984 that “while most citizens will respond to a police request, the fact that people do so, and do so without being told they are free not to respond, hardly eliminates the consensual nature of the response.” Passengers deplaning after a long flight might reasonably fear they will be “detained” if they anger the law enforcement figure blocking their exit.

That officer is under no obligation to tell them they can refuse.

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #9 on: February 28, 2017, 12:04:38 AM »
Bumping for reality check.
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline freedom_commonsense

  • Member
  • *****
  • Posts: 2,034
Re: YOUR PAPERS PLEASE: Federal Agents Check IDs After Domestic Flight Lands
« Reply #10 on: February 28, 2017, 12:05:49 AM »
"But..but it's only to find terrorists!!111oneone".

***ing idiots.