Feeds:
Posts
Comments

Posts Tagged ‘cyber attack’

internet

The SEC and Department of Homeland Security are saying we need a web backup plan in the event the H1N1 Swine Flu Pandemic forces people to stay in their homes to use computers even more than usual for work or play.

Homeland Security Department accused the GAO of having unrealistic expectations of how the Internet could be managed if millions began to telework from home at the same time as bored or sick schoolchildren were playing online, sucking up valuable bandwidth….Private Internet providers might need government authorization to block popular websites, it said, or to reduce residential transmission speeds to make way for commerce.  http://www.reuters.com/article/newsOne/idUSN2620750120091026?pageNumber=1&virtualBrandChannel=0

Are politician looking craft new ways to get more control on the last free media frontier we have? We believe it is essential that the Internet remain unrestricted with an open platform. 365 days a year, 24/7.  President Obama on the other hand has not been quiet about pushing for Internet legislation.

The government wants to make sure everyone has access to the Internet and have set aside $7.2 billion in stimulus dollars for construction.http://www.examiner.com/x-10317-San-Diego-County-Political-Buzz-Examiner~y2009m10d21-Net-Neutrality-enforcement-may-reach-into-your-computer Again with the stimulus dollars.  Private investment and the private sector is what has spurned it’s growth.  As we have been witness to banks and car companies who accept bailout funds, they also accept government control and regulations. 

Last week the FCC begin consideration of the rules that would protect and promote open broadband pipes to the Internet. Over the next several months, an official rule making proceeding will take place, along with public workshops and technical advisory discussions, allowing everyone to provide feedback before the Commission adopts a final set of rules.  The proposed rules can be found here as a pdf http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-09-93A1.pdf  We found it interesting that on p. 97  the document quotes Thomas Jefferson, “The course of history shows that as the government grows, liberty decreases.”

Google CEO Eric Schmidt and Verizon Wireless CEO Lowell McAdam showed in a joint blog post that stakeholders can work together with mutual respect to find common ground, even as we acknowledge and defend important policy differences.  http://googlepublicpolicy.blogspot.com/2009/10/finding-common-ground-on-open-internet.html

One significant issue, is that the government apparently uses the same Internet protocols and the same operating systems as the private sector, making cyber security a universal problem as opposed to a governmental problem.  Hackers may find a greater payload in targeting critical infrastructure such as power grids, financial or communication networks or air traffic control systems than in attacking the CIA or the Pentagon.  An attack by an adversary nation, much less a cyber extortionist or terrorist, is not so far-fetched. http://www.latimes.com/news/opinion/commentary/la-oe-zirin14-2009oct14,0,603775.story 

 internet2usamap2

The federally funded Next Generation Internet (NGI) project (http://www.ngi.gov/) exists parallel to and complementary with Internet2, http://www.internet2.edu/ We have trouble believing that America’s nuclear weapons arsenal operate on the standard net. Internet2 is not available to the general public, even though our taxpayer dollars support it.  More about that here https://ahrcanum.wordpress.com/2009/07/15/internet-censorship-shocking-treatment-of-taxpayer/ The speed of information-sharing network on Internet2 is now 100 Gbit!

Thomas has the draft of the Rockefeller Cybersecurity Act S 773 here,  http://thomas.loc.gov/cgi-bin/query/z?c111:S.773.  It  gives the president powers to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.”  More of our previous thoughts here https://ahrcanum.wordpress.com/2009/08/29/obama-internet-controcybersecurity/

The proposed rules claim that Cisco’s built Internet routers have over 28.1 million lines of code- does anyone realistically foresee the government being able to regulated something so large?  Are attacks of the Swine Flu more common than cyber security breaches?  We we do know that the nation has done a pretty miserable job coordinating it’s response to past emergencies as evidenced by Hurricane Katrina, the financial bailouts, and now the H1N1 Swine Flu Pandemic.  If big brother takes over the Internet, the last bastion of freedom of speech in what is left of our democracy, could be gone.

photo props to Bikes Over Baghdad http://bkachinsky.transworld.net/,

 flag tounge

Open wide, say ahhh and check out these posts on the A/H1N1 Swine Flu from Ahrcanum, where the conspiracy spreads as fast as the virus itself.  https://ahrcanum.wordpress.com/swine-flu-report/

Subscribe Now for free in the top right margin.

Read Full Post »

With more change you can believe in; President Obama and his administration has taken over banks, insurance companies, portions of the automobile industry and continues to set his eyes on controlling the private sector of the Internet. 

Back in April 09,”Senator John D. (Jay) Rockefeller IV, Chairman of the Senate Committee on Commerce, Science, and Transportation and Senator Olympia Snowe (R-ME) today announced the introduction of comprehensive cybersecurity legislation to address our nation’s vulnerability to cyber crime, global cyber espionage, and cyber attacks that could potentially cripple the United States’ critical infrastructure.http://commerce.senate.gov/public/index.cfm?FuseAction=PressReleases.Detail&PressRelease_id=bb7223ef-1d78-4de4-b1d5-4cf54fc38662

The first draft, pdf http://cdt.org/security/CYBERSEC4.pdf has apparently gone through some revisions, but continues to give the president powers to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.”  The new working draft of the Rockefeller/Cybersecurity Act / S.773  can be found here http://thomas.loc.gov/cgi-bin/bdquery/z?d111:s.00773:

I wonder what the definition of a critical information network or a cybersecurity emergency is?  Would Obama decide that too many blogs or news stories that are in disagreement with his policies requires a shut down?

The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president.

The bill also gives the Secretary of Commerce “access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access.”  Translated, this the government can monitor or access any data on private or public networks without regard to privacy laws.  How special that our Constitutional Harvard Law Graduate of a President continues to erode our Constitution and freedom of speech.  What about Constitutional protection against searches without cause?

Granted, cybersecurity threats are real and we need to protect the nation’s critical infrastructure.  A little law from the 1980’s- The Electronic Communications Privacy Act (ECPA)  requires law enforcement seek a warrant before tapping in to data transmissions between computers.  To whom does Obama answer? The Internet Security Czar?  ROLF. 

In conspiracy land, Obama could make use of Rep. Linda T. Sanchez bill http://thomas.loc.gov/cgi-bin/query/z?c111:H.R.1966 pending that says, “`Sec. 881. Cyberbullying. (a) Whoever transmits in interstate or foreign commerce any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, repeated, and hostile behavior, shall be fined under this title or imprisoned” ……. I am having emotional distress at the possibility of government restricting information!  Is the White House distressed because people disagree with the Health Insurance reform bill? 

With the coming of Internet 2, 3, 4, 5 etc we are already restricted. The federally funded Next Generation Internet (NGI) project (http://www.ngi.gov/) exists parallel to and complementary with Internet2 that is filled with bits of information that the common Internet user does not have access to even though our tax dollars fund it. I’m no expert, but wouldn’t it make sense to take critical networks to another level?

Melissa Hathaway, the White House’s last acting cybersecurity czar jumped ship after her recommendations were made. She, ” figured out that what the government can do to secure cyberspace is … nothing. Neither the computer networks nor human organizations cited in the official definition of cyberspace in Hathaway’s report were designed for top-down regulation. Federal oversight works for airports, but not for the Internet. In cyberspace, the best thing the government can do is what Hathaway just did: get out of the way.  http://venturebeat.com/2009/08/04/cybersecurity-czar-has-the-right-idea-give-up-on-centralized-security/

From the White House earlier this month,”we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/.  The Privacy Act of 1974 courtesy of  Nixon’s Watergate scandal prohibits any federal agency from maintaining records on individuals exercising their right to free speech but there is also a statute that requires the White House to retain all communications that it receives. More on this at https://ahrcanum.wordpress.com/2009/08/08/white-house-fishy-information-legal-in-cyberwar/

The conundrum boils down to one more thing the government seeks to control.  At least the premise of the Fairness Doctrine for the time being is on the shelf. 

 From the folks at CBS NEWS http://www.cbsnews.com/blogs/2009/08/28/taking_liberties/entry5270834.shtml who talked to Jena Longo, deputy communications director for the Senate Commerce committee, on the phone. She sent me e-mail with this statement:

The President of the United States has always had the Constitutional authority, and duty, to protect the American people and direct the national response to any emergency that threatens the security and safety of the United States. The Rockefeller-Snowe Cybersecurity bill makes it clear that the President’s authority includes securing our national cyber infrastructure from attack. The section of the bill that addresses this issue, applies specifically to the national response to a severe attack or natural disaster. This particular legislative language is based on longstanding statutory authorities for wartime use of communications networks. To be very clear, the Rockefeller-Snowe bill will not empower a “government shut down or takeover of the internet” and any suggestion otherwise is misleading and false. The purpose of this language is to clarify how the President directs the public-private response (emphasis mine) to a crisis, secure our economy and safeguard our financial networks, protect the American people, their privacy and civil liberties, and coordinate the government’s response.

“Free speech goes right to the very heart of what it is I talk about all the time – blogging. I believe that bloggers form an army of citizen reporters. Not all bloggers get it right. Some of them are downright nuts. But, in a country with free speech, that is par for the course.” says http://www.davidrisley.com/2009/08/28/free-speech-infringement/ and I agree wholeheartedly.

I said it before,” What’s a good defense, if you don’t have a good offense like Big Brother collecting personal data?” Now having the potential to just shut it all down as the President deems, dooms us to another step up the socialism ladder.   Pulling the plug on grandpa and the Internet in the same presidency redefines liberty and tyranny.

Read Full Post »

keyboard

Never mind protecting our electric grids, air traffic control systems, water supply systems from cyber attack.  Big Brother, President Obama and the White House blog  is concentrating on monitoring the right to free speech in the blogosphere…

There is a lot of disinformation about health insurance reform out there, spanning from control of personal finances to end of life care.  These rumors often travel just below the surface via chain emails or through casual conversation.  Since we can’t keep track of all of them here at the White House, we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/

So is it legal?  The Privacy Act of 1974 courtesy of  Nixon’s Watergate scandal prohibits any federal agency from maintaining records on individuals exercising their right to free speech.

“The White House is in bit of a conundrum because of this privacy statute that prohibits the White House from collecting data and storing it on people who disagree with it,” Judge Andrew Napolitano, a FOX News analyst, said Friday.  “There’s also a statute that requires the White House to retain all communications that it receives. It can’t try to rewrite history by pretending it didn’t receive anything,” he said.

Ah, lest we not forget that America is under a Public Health Emergency thanks to H1N1 Swine Flu, which opens another can of worms that could erode private citizens rights. 

The threat and potential for mandatory mass inoculations and martial law would certainly give the Administration latitude to collect whatever information it deems necessary in the interest of national security. 

The advent of Internet attacks — especially those suspected of being directed by nations, not hackers — has given rise to a new term inside the Pentagon and the National Security Agency: “hybrid warfare.” http://www.nytimes.com/2009/04/28/us/28cyber.html?pagewanted=2&_r=1&ref=technology

Is cyberwar and hybrid warfare covered by the War Powers Act? 

Believe you me it is not just the government who wants to know if you are in disagreement or have something of value stored on your computer, “The experts are sure of only one thing: whenever information is vulnerable and has significant monetary or intelligence value, it is only a matter of time until someone tries to steal it.” http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections

“In the 1960s American military scientists began studying the radio waves given off by computer monitors and launched a program, code-named “Tempest,” to develop shielding techniques that are used to this day in sensitive government and banking computer systems…..Similarly, commonplace radio surveillance equipment can pick up keystrokes as they are typed on a keyboard in a different room”

What’s a good defense, if you don’t have a good offense like Big Brother collecting personal data? 

When you die, and having duly paid your death tax, your personal data will live in infamy- whether you like it or not and whether it is legal or not. 

related post https://ahrcanum.wordpress.com/2009/08/05/white-house-informant-report-fishy-things-on-health-care/

Read Full Post »

The CDC is apparently more concerned with running a contest for a new public service ad ad than running the numbers on swine flu, having decided that it will no longer track the number of cases.  The World Health Organization is not keeping tabs either.

Dr. Anne Schuchat said the CDC would no longer report cases and was working on better ways to estimate how many people had been infected.  The projection from the CDC, “The H1N1 swine flu could end up affecting as many as 40 percent of Americans is based on the influenza pandemic in 1957, when almost 70,000 people in the United States died from the flu.” http://health.usnews.com/articles/health/healthday/2009/07/24/swine-flu-could-eventually-affect-4037-of.html.

Working on better ways to track swine flu?  Like maybe misleading the public further into the abysmal summation that the swine flu vaccine will be safe? That there will be absolutely no proof that there is a pandemic occurring at all? The mortality and morbidity report http://www.cdc.gov/mmwr/ ;Vaccine Safety Datalink  (VSD)http://www.cdc.gov/vaccinesafety/vsd/; Vaccine Adverse Event Reporting System (VAERS)http://www.cdc.gov/vaccinesafety/vaers/   exsist to track health data, but are apparently also being ignored as a source of keeping track of the flu.  Death associated with laboratory-confirmed influenza virus infection among children (defined as persons aged <18 years) is a nationally reportable condition according to the CDC- except, apparently now that H1N1 is threatening- the rules all get conveniently changed. 

The VAERS site makes note that  researchers have turned more recently to large-linked databases (LLDB) to study vaccine safety. LLDB provide scientists with access to the complete medical records of millions of individuals receiving vaccines (all identifying information is deleted to protect the confidentiality of the patient).  LOL, the Pentagon gets a cyber attack, blames South Korea and you think your identifying information is secured? 

“We have not figured out exactly who conducted that July 4th — that attack that began on July 4th,” Dennis Blair, director of National Intelligence, told a U.S. Chamber of Commerce National Security Task Force meeting.http://english.yonhapnews.co.kr/national/2009/07/23/91/0301000000AEN20090723000700315F.HTML

The  report , Prevention and Control of Seasonal Influenza with Vaccines, Recommendations of the Advisory Committee on Immunization Practices (ACIP), 2009 states,” available data indicate that both children and adults vaccinated with LAIV can shed vaccine viruses after vaccination, although in lower amounts than occur typically with shedding of wild-type influenza viruses. In rare instances, shed vaccine viruses can be transmitted from vaccine recipients to unvaccinated persons.” http://www.cdc.gov/mmwr/preview/mmwrhtml/rr58e0724a1.htm  Viral shedding eh?  Like the chicken pox sheds?

The ACIP report also says, Trivalent inactivated influenza vaccine (TIV) can be used for any person aged ≥6 months, including those with high-risk conditions. Live, attenuated influenza vaccine (LAIV) may be used for healthy, nonpregnant persons aged 2–49 years.  TIV formulations in multidose vials contain the vaccine preservative thimerosal- the ingredient possibly linked to the increase in autism rates. 

The National Biodefense Safety Board (NBSB), which answers to Health and Human Service Secretary Kathleen Sebelius, recommended fast-tracking the new swine flu vaccines to be ready in time for the start of school.  Already, the DHHS and the US Government are pledging $8.5 billion for swine flu innoculations that are unproven and are creating a public health campaign to ease America’s fear, just like they did when they vaccinated some 40 million people needlessly in the original Swine Flu scare.

Trying to appease the masses, the CDC wants you to help us protect our families and communities by creating  a video Public Service Announcement with the message of preventing or dealing with the flu, post it on YouTube, and you could be eligable for a $2,500 cash prize!http://www.pandemicflu.gov/  Note the key word -eligable, because we are running out of money. The CDC’s PSAs provide timely messages about what you can do to protect yourself and your family. http://www.cdc.gov/h1n1flu/psa/  The last one was produced June 10 and tells us what to do if we get symptoms of the flu in a hotel room.

Here’s one idea:

Take the doctor’s office approach. Think about it, when you go for a shot, what do they do first? Clean your arm with alcohol.. Why? Because alcohol kills germs. So…… I put on my mask, walk to the liquor store (exercise), I put lime in my Corona (fruit), celery in my Bloody Mary (veggies), drink on the bar patio (fresh air), get drunk, tell jokes, and laugh (eliminate stress) and then pass out (rest). The way I see it, if you keep your alcohol levels up flu germs can’t get you!! http://jokesfunny.wordpress.com/2009/04/27/swine-flu-jokes/

And you might want to order the Leviticus’ ‘I Told You So’ Aporkalypse Pie from http://apocalypsecakes.wordpress.com/2009/06/10/swine-flu-cake-naming-contest-winner-selected/

“Last year the CDC “encouraged” all children to be vaccinated. Now it “recommends” this — advice that does not have the force of law but that can affect what states and insurers do. On Thursday U.S. Food and Drug Administration officials said they would work with companies and the National Institutes of Health to quickly test experimental H1N1 vaccines, with the aim of getting a vaccination plan underway as soon as possible,” http://www.reuters.com/article/GCA-SwineFlu/idUSTRE56N3PQ20090724

Remember when states voted to keep the drinking age at 18, but if they didn’t change the law to 21 they would loose federal funding?  Maybe if you don’t get vaccinated your insurance company is going to drop you or your state is going to isolate you in a nice little camp located somewhere in the midst of the fedeal land management grab act.

 The CDC also reported as of  Friday that there have been 43,771 confirmed cases of H1N1 infection and 302 deaths in the United States, although officials believe more than 1 million Americans have been stricken with swine flu.  That would be one million less people to vaccinate, eh? I guess if you don’t keep track of the data of reported cases and deaths there will be no records to which our government or anyone else can be held accountable. 

No records, no problem.  Pigs are flying.

flag tounge

Open wide, say ahhh and check out these posts on the A/H1N1 Swine Flu from Ahrcanum, where the conspiracy spreads as fast as the virus itself .  Our disclaimer-Swine Flu Conspiracy theory can sometimes be triggered by real world events.  https://ahrcanum.wordpress.com/swine-flu-report/

Read Full Post »

chicago attack
In practicing for terror exercises over Chicago, is Falcon Virgo 09-Windy City-One, a red flag warning that there could be an immanent attack?  Could Sears Tower, now called Willis Tower as of last week, be the next catastrophic terrorist attack on U.S. Soil?  Willis Group Holdings, a London-based insurance broker is the new owner http://www.willistower.com/– will they be the  next 9/11 or the 9/11-2b?   The zip code of the Sears- er, Willis Tower is 60606- 666!  I still hear Joe Biden’s warning that in the next 6 months America and President Obama will be tested. 

 
“TYNDALL AIR FORCE BASE, Fla. – The North American Aerospace Defense Command and its geographical component, the Continental United States NORAD Region (CONR), will conduct a one-day exercise, Falcon Virgo 09-Windy City-One, July 21 in Chicago. “The exercise comprises a series of training flights held in coordination with the Federal Aviation Administration, Chicago Air Route Traffic Control Center, Chicago Terminal Radar Approach Control, the Continental U.S. NORAD Region, Customs and Border Protection and CORN’s Eastern Air Defense.” Sector” http://www.norad.mil/News/2009/072009.html
 
Since Sept. 11, 2001, NORAD fighters have responded to more than 2,100 possible air threats in the United States and have flown more than 51,000 sorties.  51,000 sorties  in 8 years?   Ummm that works out …….8 years times 52 weeks in a year equals a total of 416 weeks-  times 7 days in a week, equals 2,912 days.  Take those 51,000 sorties divided by the 2912 days and you get an average of 17.5 sorties flown every single day since 9-11.  Holy shit, batman.  Yet, we need more practice?
 
Tuning in my antennae, military exercises were operational leading up to the events of September 11, 2001.  One 9/11 Report, NORAD Exercises Hijack Summary http://www.scribd.com/doc/16411947/NORAD-Exercises-Hijack-Summary  simulated aircraft hijackings by terrorists over NYC.  HistoryCommons.org also hosts Timelines of entities and events, based on mainstream sources- the National Archives’ 9/11 Commission records are uploaded here for the Complete 9/11 Timeline http://www.scribd.com/HistoryCommons
 
The military unit most involved in the exercises leading to 9/11, Vigilant Guardian was NORAD’s Northeast Air Defense Sector (NEADS).  The imaginary scenario and exercises played out in reality days later. Labeling it a failed emergency response on the day of the attacks, is to put it mildly. 
 
“For the NEADS crew, 9/11 was not a story of four hijacked airplanes, but one of a heated chase after more than a dozen potential hijackings—some real, some phantom—that emerged from the turbulence of misinformation that spiked in the first 100 minutes of the attack and continued well into the afternoon and evening,” wrote Vanity Fair Magazine.  Asking, “How did the U.S. Air Force respond on 9/11? Could it have shot down United 93, as conspiracy theorists claim? Obtaining 30 hours of never-before-released tapes from the control room of NORAD’s Northeast head-quarters, the author reconstructs the chaotic military history of that day—and the Pentagon’s apparent attempt to cover it up.
 
Paragraph #1680, page 346
“The North American Aerospace Defense Command imagined the possible use of aircraft as weapons, too, and developed exercises to counter such a threat—from planes coming to the United States from overseas, perhaps carrying a weapon of mass destruction. None of this speculation was based on actual intelligence of such a threat. One idea, intended to test command and control plans and NORAD’s readiness, postulated a hijacked airliner coming from overseas and crashing into the Pentagon. The idea was put aside in the early planning of the exercise as too much of a distraction from the main focus (war in Korea), and as too unrealistic.As we pointed out in chapter 1, the military planners assumed that since such aircraft would be coming from overseas; they would have time to identify the target and scramble interceptors.”
http://demos.vivisimo.com/search?input-form=simple&v%3Asources=911&v%3Ap…
 
“Northeast Air Defense Sector—DAT Audio Files—11 Sep 2001.”This is not an exercise.”
 
A National Level Exercise, 2009 (NLE ’09) is scheduled July 27-31, 2009. “NLE 09 will allow terrorism prevention efforts to proceed to a logical end (successful or not), with no requirement for response or recovery activities.” http://www.fema.gov/media/fact_sheets/nle09.shtm No requirement for response ? In the event of a real attack during the NLE, we we again have menial response like on 9/11 or no response at all?  Our U.S. military and federal agencies, in cooperation with foreign troops from Australia, Canada, Mexico and the United Kingdom (Yes- foreign troops on U.S. Soil !) will be practicing for more imaginary catastrophic events concentrated around Washington, DC and FEMA Region VI, which includes the states of Arkansas, Louisiana, New Mexico, Oklahoma and Texas.
 
Rather ironic FEMA issued this press release regarding  Texas, today July 21, 2009, ” has awarded more than $20 million in hazard mitigation grants to the city of Galveston to acquire 64 homes that suffered extensive damage as a result of Hurricane Ike. One $15.3 million grant was obligated to Galveston for authorities to acquire 46 residential properties located in the 100-year floodplain. Another grant provides $5.4 million to be used for the acquisition of 18 properties in the 100-year floodplain. http://www.fema.gov/news/newsrelease.fema?id=49128  By math math, that 40 million dollars to acquire 128 houses or property–that an average of $312,000 each. Estimated median house or condo value in 2007: $119,658 http://www.city-data.com/housing/houses-Galveston-Texas.html
 
Terrorist attacks don’t just come from plane, trains, automobiles, bombs or in physicality, as The Corbett Report http://www.corbettreport.com/articles/20090717_cyber_911.htm asks, did the real cyber 9/11 attack occur on 9/11?   
 
President Bush signed the plans to invade Afghanistan on Sept. 10th, the day before 9/11 and just yesterday it was announced that another 25,000 soldiers were heading to Afghanistan- pronto.  And as Ron Paul reminded us eight years ago, “We should recognize that American tax dollars helped to create the very Taliban government that now wants to destroy us. In the late 1970s and early 80s, the CIA was very involved in the training and funding of various fundamentalist Islamic groups in Afghanistan, some of which later became today’s brutal Taliban government. In fact, the U.S. government admits to giving the groups at least 6 billion dollars in military aid and weaponry, a staggering sum that would be even larger in today’s dollars.” 
A unique timeline of more events of 9/11 and the Al Qaeda and the Taliban is here http://s3.amazonaws.com/911timeline/main/AAafghanwar.html 
 
Neil Barofsky, special inspector general for the Treasury’s Troubled Asset Relief Program say the U.S. rescue may reach $23.7 Trillion dollars admitting offered criticism in a separate quarterly report of Treasury’s implementation of TARP, saying the department has “repeatedly failed to adopt recommendations” needed to provide transparency and fulfill the administration’s goal to implement TARP “with the highest degree of accountability.”
As a result, taxpayers don’t know how TARP recipients are using the money or the value of the investments, he said in the report. sourced at http://globaleconomicanalysis.blogspot.com/2009/07/tarp-special-investigator-says-bailout.html.  The other aberration of America’s economic woes is paying $15 million dollars for toilets on the international space station http://www.hightechscience.org/zero_gravity_toilet.htm   
 
In this era of supposed transparency, is is painfully obvious that  the 9/11 Commission omitted so many things and deceived the public.  Our government will continue to do so in the name of national security.  Printing, spending and loosing trillions and loosing more lives in terrorist attacks here or abroad is beyond absurd.  The Stenster blog claims, “The failure of the FBI to investigate our professional and proven analysis indicates that the pending 9/11-2B attack is an official conspiracy. The propagandizing by CNN and other Jewish-controlled media against U.S. militias like Ghost Troop indicates that they are a part of that conspiracy.” http://stienster.blogspot.com/
 
Pray -practice makes perfect as the NORAD Press Release says – Falcon Virgo Windy City-Two and Windy City -Three are future exercises that have yet to be scheduled. 
  
 
” In a time of deceit telling the truth is a revolutionary act.” – George Orwell

Read Full Post »

echelon

Mathew 24- 6- And ye shall hear of wars and rumors of wars; see that ye be not troubled: for these things must needs come to pass; but the end is not yet.7- For nation shall rise against nation, and kingdom against kingdom; and there shall be famines and earthquakes…

The end of the world is not yet, but for those people around the world effected by disasters like tsunami’s, volcanoes, war, famine, etc., and the recent rash of earthquakes in Central Italy, we have to look toward the arguments of predictability and governments role in squelching information and limiting free speech. 

“”It is part of the American myth that our major media are objective and unbiased, a mainstay of democracy. We believe, however, that the overwhelmingly dominant corporate media have become merely the voice of an increasingly unilateral and controlled empire, devoted to the indoctrination of the public in the interests of corporate, industrial, military, and ruling powers. ” http://mediafilter.org/caq/ 

Giampaolo Guiliani is a well respected scientist at The San Grasso Physics lab, in L’Aquila, central Italy.  He did not stand on a street corner wearing a sandwich board, proclaiming the end of the world, dressed like Jesus Christ.  He made a prediction based on his years of seismographic study and an interpretation of radon science that an earthquake was forecast for the Central Italy. The Italian government officials censored him and shut him down for “spreading alarm.”  

Rather than relying in his expertise and plausibility, he was admonished by his own government for fear mongering pure and simple.  Fear mongering is just another form of control by governments who believe generally that the populations is stupid, that riots will ensue, and civil unrest will be imminent.   Can a citizen no longer allow people to decide for themselves what is believable?  Many people in the L’Aquila region never heard the warning to make a decision. 

In the US, among others- radio personality Alex Jones at http://www.infowars.com/  offers a conspiracy-tinted view containing strong opposition to socialism, communism, and the New World Order with insight and predictability of governments covert intentions and other conspiracy theories.  Art Bell on Coast to Coast Radio offered an outlet for  a mature outlet of discussion.  At its initial peak in popularity, Coast To Coast AM was syndicated on more than 500 radio stations and claimed 15 million listeners nightly.  Current show host George Norry still discusses off-beat topics like the paranormal, occult, UFOs, pseudo scients and conspiracy theories.

In the U.S. we enjoy a pretty open dialog thanks to the Freedom of Speech clause but for how long?  The Fairness Doctrine moving through the Senate will give the government the power to decide what is on terrestrial radio, satellite radio and may go so far as regulating TV programming.  Is it in the name of fairness or fear? 

Bilderberg icon, Senator Jay Rockefeller has labeled cyber security as the number one national hazard of attack on the homeland of WV, America or anywhere else.  He said, ” it was it better if we never invented the Internet because it is on the Internet that the DOD gets millions of attacks everyday..they can shut down, electricity, banking and anything we have to offer.”  Way to dis Al Gore!

Apparently, In The New World Order, what better means to eliminate the free exchange of information that to eliminate the Internet in the name of national security? 

Daily, we stay connected with our high technology gadgets like ipods, wireless computers, cell phones, hand held blackberry’s, and iphones.  In the bigger picture we a have computerized military with high tech jet fighters, a space program, nuclear subs, missile silos, nuclear bombs, etc.,  Rockefeller expects us to believe that government can’t protect itself on the Internet? 

Keeping the computers off line that control vital systems and classified data disconnected from the Internet so no one could hack into it would be a good place to start.  What reason would critical infrastructures like nuclear bombs, power grids or transpiration networks for example need to be on the public Internet in the first place?

Under the guise of  Acta the Anti-Counterfeiting Trade Agreement, the government would have access to your ipod and laptop computers. Actively being pursued among the G8 nations, the purpose of the Acta agreement is to prevent illegal downloading and ripped copyrighted movies. http://www.bluegrasspundit.com/

Best of all, one person could pull the plug on all Internet communications. “El Presidente can order the disconnection of those networks during a “cybersecurity emergency” or national security emergency if needed,   ” writes http://www.engadget.com/2009/04/06/proposed-bill-would-create-national-cybersecurity-advisor/

Office of the National Cybersecurity Adviser within the White House—is established in a separate short-but-sweet bill running a mere three pages.   The details fall in place in the language of The Cybersecurity Act of 2009  ‘‘our nation’s security and economic prosperity depend on the security, stability, and integrity of communications and information infrastructure that are largely privately-owned.and globally-operated.’’ http://static.arstechnica.com/tech-policy/CYBERSEC5.pdf 

Under Obama if the government operates things and controls information we will all be safer!  Whew, I was worried about having health records on line under certified EHR technology-  qualified electronic health record and that is certified pursuant to section 3001. http://www.abovetopsecret.com/forum/thread437069/pg1

There is also a new industry-run mailing list to foster discussion of security issues on SCADA systems — the aging and insecure computerized control networks behind the electric grid and other critical infrastructures, but you have watch what you say.

“Due to heightened security and awareness levels worldwide, ALL MESSAGES ARE WATCHED CAREFULLY.  Violators who report methods that are going to disable, damage, dismember, destroy, or disarm any control system, SCADA device, or infrastructure will be reported to DHS (and/or their respective national or federal authority).”  http://blog.wired.com/27bstroke6/2008/02/scada-security.html#previouspost

One can no longer discuss security issues without the risk of arrest?  Does the security of industrial networks and industrial control systems (seguridad scada) offer a deterrent to crime or a threat to restrict freedom of speech, or is it just plain old fear mongering?

The WSJ says “Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.”  “There are intrusions, and they are growing.” http://online.wsj.com/article/SB123914805204099085.html

Are the theatrics of Hollywood movie’s and books providing a warning that disasters imagined, may turn out to be real?  In the new movie Echelon, dangerous security operatives chase the engineer across the globe, while a powerful government official pursues a mysterious agenda that threatens the stability of the entire world. The http://lighthousepatriotjournal.wordpress.com/2009/04/01/hollyweird-fantasy-versus-the-real-world/#more-5184 has an interesting post on the relationships on fantasy movies and government censorship.  Rumors have abounded for several years of a massive system designed to intercept virtually all email and fax traffic in the world and subject it to automated analysis, despite laws in many nations (including this one) barring such activity. The system is called ECHELON!  From a 1997 article in the London Telegraph- “There are times in history when technology helps democratise, and times when it helps centralise. This is a time of centralisation.” http://whatreallyhappened.com/RANCHO/POLITICS/ECHELON/echelon.html  Centralizing or a New World Order?

Today Venezuelan President Hugo Chavez said, “We are creating a new world, a balanced world. A new world order, a multi polar world,..The unipolar world has collapsed. The power of the U.S. empire has collapsed,” he said. “Everyday, the new poles of world power are becoming stronger.”  

In times of prayer for the people affected by the Central Italian Earthquake, and in celebration of Passover and Easter, look toward the Bible in 2 Peter 3, 13 – “But in keeping with his promise we are looking forward to a new heaven and a new earth, the home of righteousness.   Peter testified that God will create a new world.  

Man or God, someone is bringing The New World Order to reality, and that is no prediction.

Us and Them or Us vs Them?

You might also enjoy reading- https://ahrcanum.wordpress.com/2009/04/08/italy-earthquake-warnings-by-giampaolo-guiliani-dismissed/

Read Full Post »

%d bloggers like this: