Feeds:
Posts
Comments

Posts Tagged ‘cybersecurity’

internet guilty

The Anti-Counterfeiting Trade Agreement negotiations continue in a few hours as Seoul, Korea plays host to the latest round of talks.  The governments have posted the meeting agenda, which unsurprisingly focuses on the issue of Internet enforcement [UPDATE 11/4: Post on discussions for day two of ACTA talks, including the criminal enforcement provisions].  The United States has drafted the chapter under enormous secrecy, with selected groups granted access under strict non-disclosure agreements and other countries (including Canada) given physical, watermarked copies designed to guard against leaks.http://www.michaelgeist.ca/content/view/4510/125/

WTF?  Wake up, there is no transparency and we are about to be held to a standard that almost prohibits free speech.  As an author, we do our best to provide proper credits for anything we cite as a source.  We would hope that spammers and authentic writers do the same for us, and usually they do for fear of being held accountable in a lawsuit.  Click on the disclosure tab at the top to see how we have tried to cover our a$$.

“On the international front, it provides firm confirmation that the treaty is not a counterfeiting trade, but a copyright treaty.”  

“A U.S.-drafted chapter on Internet use would require ISPs to police user-generated content, to cut off Internet access for copyright violators,  and to remove content that is accused of copyright violation without any proof of actual violation. The chapter also completely prohibits DRM workarounds, even for archiving or retrieving one’s own work.” writes http://www.readwriteweb.com/archives/copyright_treaty_leaked_trouble_for_isps_and_in.php

In the U.S. you are innocent until proven guilty, but this may usurp everything you have ever learned about properly citing your sources and in the process limit your free speech.  Say nothing of fines and threats of imprisonment.

The leaks suggest that countries who sign up to the U.S promoted plan would have to force ISPs to proactively police copyright on user-generated content, cut off those accused (or face liability), and put “graduated response” clauses in customer contracts. An example of a graduated response is France’s “three strikes and you’re out” law. There, you get two warnings if caught sharing music or movies, then you’re banned for up to two years. http://gizmodo.com/5396757/secret-copyright-treaty-details-leak-isps-worldwide-to-become-copyright-cops 

Two years without the Internet?  Tsk, tsk- as if someone who broke copyright law couldn’t walk into an Internet cafe in Paris, Korea, Russia or the middle of butt fcuk Egypt to log on.  Good luck with that enforcement.  $hit, America can’t keep the illegal immigrants out and we are expected to believe in the Internet police?  We still believe in Santa, because if you don’t believe- you don’t receive.

Just how much control does President Obama seek?  Prohibiting free speech further erodes every citizen’s right and enhances government control over yet another aspect of our life. 

Best if all- ““The internet chapter of the Anti-Counterfeiting Trade Agreement, a secret copyright treaty whose text Obama’s administration refused to disclose due to ‘national security’ concerns, has leaked. It’s bad.” You can read the original leaked document or the summary. If passed, the internet will never be the same. Thank goodness it’s hidden from public scrutiny for National Security. via http://yro.slashdot.org/story/09/11/04/144240/Secret-Copyright-Treaty-Leaks-Its-Bad-Very-Bad

If and when this thing gets signed, duly note that we have properly credited the excerpted quotes.  Just in case the ping and link from the photo doesn’t work, it is from http://www.toothpastefordinner.com/archives/2006/Jun/ .  We’ll even take it a bit farther in the interest of disclosure- they sell T-shirts with slogans at  http://www.sharingmachine.com/ and would you look at their disclosure-“You may display TFD/MTTS/ND comics on your website, blog, Myspace, Livejournal, etc. as long as you link back to www.toothpastefordinner.com / www.marriedtothesea.com / www.nataliedee.com. The box marked “Cut/paste this HTML code” next to every comic does this for you. ”  We believe we are in full compliance of the laws of the U.S.A. and graciously meet the requests of the site owners.

We’re so broke over the U.S. economic stimulus package there isn’t anything left to sue us over.  Maybe a 5 year old monitor and a keyboard with Swine Flu germs.  We can’t even afford the cool t-shirts from www.toothpastefordinner.com!

The Federal Trade Commission today (10.5.09) announced that it has approved final revisions to the guidance it gives to advertisers on how to keep their endorsement and testimonial ads in line with the FTC Act. http://www.ftc.gov/opa/2009/10/endortest.shtm 

Blogs are a blessing and a curse in the world of advocacy. With so many different voices floating around, it’s easy to get caught up in a piece of support that may not be appropriately accurate. writes Who links to me at http://wholinkstome.com/blog/ftc-regulations-on-bloggers/

Blog while you can. BTW, every www.gov site you visit – your own ISP is logged as a permanent record.  This, while the White House can barely keep track of it’s in person visitor logs.

Advertisements

Read Full Post »

internet

The SEC and Department of Homeland Security are saying we need a web backup plan in the event the H1N1 Swine Flu Pandemic forces people to stay in their homes to use computers even more than usual for work or play.

Homeland Security Department accused the GAO of having unrealistic expectations of how the Internet could be managed if millions began to telework from home at the same time as bored or sick schoolchildren were playing online, sucking up valuable bandwidth….Private Internet providers might need government authorization to block popular websites, it said, or to reduce residential transmission speeds to make way for commerce.  http://www.reuters.com/article/newsOne/idUSN2620750120091026?pageNumber=1&virtualBrandChannel=0

Are politician looking craft new ways to get more control on the last free media frontier we have? We believe it is essential that the Internet remain unrestricted with an open platform. 365 days a year, 24/7.  President Obama on the other hand has not been quiet about pushing for Internet legislation.

The government wants to make sure everyone has access to the Internet and have set aside $7.2 billion in stimulus dollars for construction.http://www.examiner.com/x-10317-San-Diego-County-Political-Buzz-Examiner~y2009m10d21-Net-Neutrality-enforcement-may-reach-into-your-computer Again with the stimulus dollars.  Private investment and the private sector is what has spurned it’s growth.  As we have been witness to banks and car companies who accept bailout funds, they also accept government control and regulations. 

Last week the FCC begin consideration of the rules that would protect and promote open broadband pipes to the Internet. Over the next several months, an official rule making proceeding will take place, along with public workshops and technical advisory discussions, allowing everyone to provide feedback before the Commission adopts a final set of rules.  The proposed rules can be found here as a pdf http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-09-93A1.pdf  We found it interesting that on p. 97  the document quotes Thomas Jefferson, “The course of history shows that as the government grows, liberty decreases.”

Google CEO Eric Schmidt and Verizon Wireless CEO Lowell McAdam showed in a joint blog post that stakeholders can work together with mutual respect to find common ground, even as we acknowledge and defend important policy differences.  http://googlepublicpolicy.blogspot.com/2009/10/finding-common-ground-on-open-internet.html

One significant issue, is that the government apparently uses the same Internet protocols and the same operating systems as the private sector, making cyber security a universal problem as opposed to a governmental problem.  Hackers may find a greater payload in targeting critical infrastructure such as power grids, financial or communication networks or air traffic control systems than in attacking the CIA or the Pentagon.  An attack by an adversary nation, much less a cyber extortionist or terrorist, is not so far-fetched. http://www.latimes.com/news/opinion/commentary/la-oe-zirin14-2009oct14,0,603775.story 

 internet2usamap2

The federally funded Next Generation Internet (NGI) project (http://www.ngi.gov/) exists parallel to and complementary with Internet2, http://www.internet2.edu/ We have trouble believing that America’s nuclear weapons arsenal operate on the standard net. Internet2 is not available to the general public, even though our taxpayer dollars support it.  More about that here https://ahrcanum.wordpress.com/2009/07/15/internet-censorship-shocking-treatment-of-taxpayer/ The speed of information-sharing network on Internet2 is now 100 Gbit!

Thomas has the draft of the Rockefeller Cybersecurity Act S 773 here,  http://thomas.loc.gov/cgi-bin/query/z?c111:S.773.  It  gives the president powers to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.”  More of our previous thoughts here https://ahrcanum.wordpress.com/2009/08/29/obama-internet-controcybersecurity/

The proposed rules claim that Cisco’s built Internet routers have over 28.1 million lines of code- does anyone realistically foresee the government being able to regulated something so large?  Are attacks of the Swine Flu more common than cyber security breaches?  We we do know that the nation has done a pretty miserable job coordinating it’s response to past emergencies as evidenced by Hurricane Katrina, the financial bailouts, and now the H1N1 Swine Flu Pandemic.  If big brother takes over the Internet, the last bastion of freedom of speech in what is left of our democracy, could be gone.

photo props to Bikes Over Baghdad http://bkachinsky.transworld.net/,

 flag tounge

Open wide, say ahhh and check out these posts on the A/H1N1 Swine Flu from Ahrcanum, where the conspiracy spreads as fast as the virus itself.  https://ahrcanum.wordpress.com/swine-flu-report/

Subscribe Now for free in the top right margin.

Read Full Post »

With more change you can believe in; President Obama and his administration has taken over banks, insurance companies, portions of the automobile industry and continues to set his eyes on controlling the private sector of the Internet. 

Back in April 09,”Senator John D. (Jay) Rockefeller IV, Chairman of the Senate Committee on Commerce, Science, and Transportation and Senator Olympia Snowe (R-ME) today announced the introduction of comprehensive cybersecurity legislation to address our nation’s vulnerability to cyber crime, global cyber espionage, and cyber attacks that could potentially cripple the United States’ critical infrastructure.http://commerce.senate.gov/public/index.cfm?FuseAction=PressReleases.Detail&PressRelease_id=bb7223ef-1d78-4de4-b1d5-4cf54fc38662

The first draft, pdf http://cdt.org/security/CYBERSEC4.pdf has apparently gone through some revisions, but continues to give the president powers to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.”  The new working draft of the Rockefeller/Cybersecurity Act / S.773  can be found here http://thomas.loc.gov/cgi-bin/bdquery/z?d111:s.00773:

I wonder what the definition of a critical information network or a cybersecurity emergency is?  Would Obama decide that too many blogs or news stories that are in disagreement with his policies requires a shut down?

The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president.

The bill also gives the Secretary of Commerce “access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access.”  Translated, this the government can monitor or access any data on private or public networks without regard to privacy laws.  How special that our Constitutional Harvard Law Graduate of a President continues to erode our Constitution and freedom of speech.  What about Constitutional protection against searches without cause?

Granted, cybersecurity threats are real and we need to protect the nation’s critical infrastructure.  A little law from the 1980’s- The Electronic Communications Privacy Act (ECPA)  requires law enforcement seek a warrant before tapping in to data transmissions between computers.  To whom does Obama answer? The Internet Security Czar?  ROLF. 

In conspiracy land, Obama could make use of Rep. Linda T. Sanchez bill http://thomas.loc.gov/cgi-bin/query/z?c111:H.R.1966 pending that says, “`Sec. 881. Cyberbullying. (a) Whoever transmits in interstate or foreign commerce any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, repeated, and hostile behavior, shall be fined under this title or imprisoned” ……. I am having emotional distress at the possibility of government restricting information!  Is the White House distressed because people disagree with the Health Insurance reform bill? 

With the coming of Internet 2, 3, 4, 5 etc we are already restricted. The federally funded Next Generation Internet (NGI) project (http://www.ngi.gov/) exists parallel to and complementary with Internet2 that is filled with bits of information that the common Internet user does not have access to even though our tax dollars fund it. I’m no expert, but wouldn’t it make sense to take critical networks to another level?

Melissa Hathaway, the White House’s last acting cybersecurity czar jumped ship after her recommendations were made. She, ” figured out that what the government can do to secure cyberspace is … nothing. Neither the computer networks nor human organizations cited in the official definition of cyberspace in Hathaway’s report were designed for top-down regulation. Federal oversight works for airports, but not for the Internet. In cyberspace, the best thing the government can do is what Hathaway just did: get out of the way.  http://venturebeat.com/2009/08/04/cybersecurity-czar-has-the-right-idea-give-up-on-centralized-security/

From the White House earlier this month,”we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/.  The Privacy Act of 1974 courtesy of  Nixon’s Watergate scandal prohibits any federal agency from maintaining records on individuals exercising their right to free speech but there is also a statute that requires the White House to retain all communications that it receives. More on this at https://ahrcanum.wordpress.com/2009/08/08/white-house-fishy-information-legal-in-cyberwar/

The conundrum boils down to one more thing the government seeks to control.  At least the premise of the Fairness Doctrine for the time being is on the shelf. 

 From the folks at CBS NEWS http://www.cbsnews.com/blogs/2009/08/28/taking_liberties/entry5270834.shtml who talked to Jena Longo, deputy communications director for the Senate Commerce committee, on the phone. She sent me e-mail with this statement:

The President of the United States has always had the Constitutional authority, and duty, to protect the American people and direct the national response to any emergency that threatens the security and safety of the United States. The Rockefeller-Snowe Cybersecurity bill makes it clear that the President’s authority includes securing our national cyber infrastructure from attack. The section of the bill that addresses this issue, applies specifically to the national response to a severe attack or natural disaster. This particular legislative language is based on longstanding statutory authorities for wartime use of communications networks. To be very clear, the Rockefeller-Snowe bill will not empower a “government shut down or takeover of the internet” and any suggestion otherwise is misleading and false. The purpose of this language is to clarify how the President directs the public-private response (emphasis mine) to a crisis, secure our economy and safeguard our financial networks, protect the American people, their privacy and civil liberties, and coordinate the government’s response.

“Free speech goes right to the very heart of what it is I talk about all the time – blogging. I believe that bloggers form an army of citizen reporters. Not all bloggers get it right. Some of them are downright nuts. But, in a country with free speech, that is par for the course.” says http://www.davidrisley.com/2009/08/28/free-speech-infringement/ and I agree wholeheartedly.

I said it before,” What’s a good defense, if you don’t have a good offense like Big Brother collecting personal data?” Now having the potential to just shut it all down as the President deems, dooms us to another step up the socialism ladder.   Pulling the plug on grandpa and the Internet in the same presidency redefines liberty and tyranny.

Read Full Post »

keyboard

Never mind protecting our electric grids, air traffic control systems, water supply systems from cyber attack.  Big Brother, President Obama and the White House blog  is concentrating on monitoring the right to free speech in the blogosphere…

There is a lot of disinformation about health insurance reform out there, spanning from control of personal finances to end of life care.  These rumors often travel just below the surface via chain emails or through casual conversation.  Since we can’t keep track of all of them here at the White House, we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/

So is it legal?  The Privacy Act of 1974 courtesy of  Nixon’s Watergate scandal prohibits any federal agency from maintaining records on individuals exercising their right to free speech.

“The White House is in bit of a conundrum because of this privacy statute that prohibits the White House from collecting data and storing it on people who disagree with it,” Judge Andrew Napolitano, a FOX News analyst, said Friday.  “There’s also a statute that requires the White House to retain all communications that it receives. It can’t try to rewrite history by pretending it didn’t receive anything,” he said.

Ah, lest we not forget that America is under a Public Health Emergency thanks to H1N1 Swine Flu, which opens another can of worms that could erode private citizens rights. 

The threat and potential for mandatory mass inoculations and martial law would certainly give the Administration latitude to collect whatever information it deems necessary in the interest of national security. 

The advent of Internet attacks — especially those suspected of being directed by nations, not hackers — has given rise to a new term inside the Pentagon and the National Security Agency: “hybrid warfare.” http://www.nytimes.com/2009/04/28/us/28cyber.html?pagewanted=2&_r=1&ref=technology

Is cyberwar and hybrid warfare covered by the War Powers Act? 

Believe you me it is not just the government who wants to know if you are in disagreement or have something of value stored on your computer, “The experts are sure of only one thing: whenever information is vulnerable and has significant monetary or intelligence value, it is only a matter of time until someone tries to steal it.” http://www.scientificamerican.com/article.cfm?id=hackers-can-steal-from-reflections

“In the 1960s American military scientists began studying the radio waves given off by computer monitors and launched a program, code-named “Tempest,” to develop shielding techniques that are used to this day in sensitive government and banking computer systems…..Similarly, commonplace radio surveillance equipment can pick up keystrokes as they are typed on a keyboard in a different room”

What’s a good defense, if you don’t have a good offense like Big Brother collecting personal data? 

When you die, and having duly paid your death tax, your personal data will live in infamy- whether you like it or not and whether it is legal or not. 

related post https://ahrcanum.wordpress.com/2009/08/05/white-house-informant-report-fishy-things-on-health-care/

Read Full Post »

America, and President Obama’s New World Order is arising faster than anyone thought possible.  In an incredible blink of German Nazi past, the Administration is asking you to report blog and web sites that disagree with Obama’s health care reform.  Taking names, logging IP’s, creating a data base of people’s opinions that are against the elected? Reporting insolence?  What was it that Napolitano said?

April 2009- A Statement by U.S. Department of Homeland Security Secretary Janet Napolitano on the Threat of Right-Wing Extremism, said,”Let me be very clear: we monitor the risks of violent extremism taking root here in the United States. We don’t have the luxury of focusing our efforts on one group; we must protect the country from terrorism whether foreign or homegrown, and regardless of the ideology that motivates its violence.”http://www.dhs.gov/ynews/releases/pr_1239817562001.shtm

Does expressing your opinion on health care motivate extremism? Stupid duck say WTF? 

Melissa Hathaway, the White House cybersecurity policy advisor resigned yesterday the same day the government asked people to be tattle tales on each other. Was this a coincidence or some one actually having a concious to see that reporting web sites that disagree with Administration policy borders on reducing the Constitution, let alone the Internet to rubble? http://www.hstoday.us/content/view/9670/149/ “Homeland Security Secretary Janet Napolitano reminded attendees at a cybersecurity conference Tuesday that President Barack Obama’s 60-day cybersecurity review endorsed leaving the Department of Homeland Security (DHS) in control of civilian cybersecurity domains.”

Turn to yesterday’s White House blog– “Scary chain emails and videos are starting to percolate on the Internet, breathlessly claiming, for example, to “uncover” the truth about the President’s health insurance reform positions.

There is a lot of disinformation about health insurance reform out there, spanning from control of personal finances to end of life care.  These rumors often travel just below the surface via chain emails or through casual conversation.  Since we can’t keep track of all of them here at the White House, we’re asking for your help. If you get an email or see something on the web about health insurance reform that seems fishy, send it to flag@whitehouse.gov. sourced at http://www.whitehouse.gov/blog/Facts-Are-Stubborn-Things/

The site features video that slams Matt Drudge’s website
-“Hi. I’m Linda Douglass. I’m the communications director for the White House Office of Health Reform, and one of my jobs is to keep track of all the disinformation that’s out there about health-insurance reform. And there are a lot of very deceiving headlines out there right now, such as this one — take a look at this one. This one says, ‘Uncovered Video: Obama Explains How His Will Eliminate PRIVATE Insurance.’ Read more: http://www.politico.com/news/stories/0809/25779.html#ixzz0NJlBIbpy

The clip can also be viewed at http://www.breitbart.tv/uncovered-video-obama-explains-how-his-health-care-plan-will-eliminate-private-insurance/ shows Obama saying: “I don’t think we’re going to be able to eliminate employer coverage immediately. There’s going to be, potentially, some transition process: I can envision a decade out, or 15 years out, or 20 years out. ”  That is fishy indeed, when President Obama keeps promising us that employer coverage will not be eliminated. 

Report something fishy to the White House?  Prior to this socialised tendency where the government owns the banks and the auto industry, freedom to express one’s opinion was one of those guaranteed pursuit of happiness things along with free speech and the threat of your opinion being policed by Big Brother.

Is it not every Americans duty to express how our government is run and what laws are enacted?    Checks and balances between the executive branch and the legislative branch are not enough.  Speaking on the origins of Swine Flu- that is does not exist in nature but the subject of genetic manipulation,  but equally as compelling, ” You should not fear any reprisal for having done your duty as a citizen. Refraining to do so is quite the opposite and criminally reprehensible. http://www.lepouvoirmondial.com/n> in asking people to send letters to governement officials to investigate the flu’s origins and pending vaccination campaigns.

“But of the information that these American snitchers send off to the White House, who in the White House is going to get this information? What are they going to do with it? Will they create a data base of people that stand against Obama? What is to be done with such a database? Who will get visited by the FBI in the dead of night because they sent an email critical of Obama’s socialist styled health care policies?

Citing a letter to the President Obama “Please be advised, Mr. President, I will not be monitored: I oppose what some refer to as ‘Obamacare’ on the basis of my conviction that the Federal Power has no business sticking its nose in such things, a point of view that I sincerely believe is consistent with the original intent of our Founders. I respect that you feel differently and read that differently, but to dismiss our point of view with juvenile and petty name-calling that is clearly beneath contempt and that is simply not professional is a reflection on the content of your character that will not turn Americans against those who oppose state-run or regulated and managed health care by ANY name. http://www.stoptheaclu.com/2009/08/04/white-house-website-asking-for-informants-on-anti-healthcare-advocates/

I too, respectfully request that you stop asking people to become informants, please spend a few minutes and re-read your constitution which you swore to uphold, and which is a condition of your tenure which must be adhered to. 

Showing us your birth certificate, also a condition of your tenure wouldn’t hurt either.

read health care bill H.R. 3200, “America’s Affordable Health Choices Act of 2009’’.http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=111_cong_bills&docid=f:h3200ih.txt.pdf 

related post https://ahrcanum.wordpress.com/2009/08/08/white-house-fishy-information-legal-in-cyberwar/

Read Full Post »

chicago attack
In practicing for terror exercises over Chicago, is Falcon Virgo 09-Windy City-One, a red flag warning that there could be an immanent attack?  Could Sears Tower, now called Willis Tower as of last week, be the next catastrophic terrorist attack on U.S. Soil?  Willis Group Holdings, a London-based insurance broker is the new owner http://www.willistower.com/– will they be the  next 9/11 or the 9/11-2b?   The zip code of the Sears- er, Willis Tower is 60606- 666!  I still hear Joe Biden’s warning that in the next 6 months America and President Obama will be tested. 

 
“TYNDALL AIR FORCE BASE, Fla. – The North American Aerospace Defense Command and its geographical component, the Continental United States NORAD Region (CONR), will conduct a one-day exercise, Falcon Virgo 09-Windy City-One, July 21 in Chicago. “The exercise comprises a series of training flights held in coordination with the Federal Aviation Administration, Chicago Air Route Traffic Control Center, Chicago Terminal Radar Approach Control, the Continental U.S. NORAD Region, Customs and Border Protection and CORN’s Eastern Air Defense.” Sector” http://www.norad.mil/News/2009/072009.html
 
Since Sept. 11, 2001, NORAD fighters have responded to more than 2,100 possible air threats in the United States and have flown more than 51,000 sorties.  51,000 sorties  in 8 years?   Ummm that works out …….8 years times 52 weeks in a year equals a total of 416 weeks-  times 7 days in a week, equals 2,912 days.  Take those 51,000 sorties divided by the 2912 days and you get an average of 17.5 sorties flown every single day since 9-11.  Holy shit, batman.  Yet, we need more practice?
 
Tuning in my antennae, military exercises were operational leading up to the events of September 11, 2001.  One 9/11 Report, NORAD Exercises Hijack Summary http://www.scribd.com/doc/16411947/NORAD-Exercises-Hijack-Summary  simulated aircraft hijackings by terrorists over NYC.  HistoryCommons.org also hosts Timelines of entities and events, based on mainstream sources- the National Archives’ 9/11 Commission records are uploaded here for the Complete 9/11 Timeline http://www.scribd.com/HistoryCommons
 
The military unit most involved in the exercises leading to 9/11, Vigilant Guardian was NORAD’s Northeast Air Defense Sector (NEADS).  The imaginary scenario and exercises played out in reality days later. Labeling it a failed emergency response on the day of the attacks, is to put it mildly. 
 
“For the NEADS crew, 9/11 was not a story of four hijacked airplanes, but one of a heated chase after more than a dozen potential hijackings—some real, some phantom—that emerged from the turbulence of misinformation that spiked in the first 100 minutes of the attack and continued well into the afternoon and evening,” wrote Vanity Fair Magazine.  Asking, “How did the U.S. Air Force respond on 9/11? Could it have shot down United 93, as conspiracy theorists claim? Obtaining 30 hours of never-before-released tapes from the control room of NORAD’s Northeast head-quarters, the author reconstructs the chaotic military history of that day—and the Pentagon’s apparent attempt to cover it up.
 
Paragraph #1680, page 346
“The North American Aerospace Defense Command imagined the possible use of aircraft as weapons, too, and developed exercises to counter such a threat—from planes coming to the United States from overseas, perhaps carrying a weapon of mass destruction. None of this speculation was based on actual intelligence of such a threat. One idea, intended to test command and control plans and NORAD’s readiness, postulated a hijacked airliner coming from overseas and crashing into the Pentagon. The idea was put aside in the early planning of the exercise as too much of a distraction from the main focus (war in Korea), and as too unrealistic.As we pointed out in chapter 1, the military planners assumed that since such aircraft would be coming from overseas; they would have time to identify the target and scramble interceptors.”
http://demos.vivisimo.com/search?input-form=simple&v%3Asources=911&v%3Ap…
 
“Northeast Air Defense Sector—DAT Audio Files—11 Sep 2001.”This is not an exercise.”
 
A National Level Exercise, 2009 (NLE ’09) is scheduled July 27-31, 2009. “NLE 09 will allow terrorism prevention efforts to proceed to a logical end (successful or not), with no requirement for response or recovery activities.” http://www.fema.gov/media/fact_sheets/nle09.shtm No requirement for response ? In the event of a real attack during the NLE, we we again have menial response like on 9/11 or no response at all?  Our U.S. military and federal agencies, in cooperation with foreign troops from Australia, Canada, Mexico and the United Kingdom (Yes- foreign troops on U.S. Soil !) will be practicing for more imaginary catastrophic events concentrated around Washington, DC and FEMA Region VI, which includes the states of Arkansas, Louisiana, New Mexico, Oklahoma and Texas.
 
Rather ironic FEMA issued this press release regarding  Texas, today July 21, 2009, ” has awarded more than $20 million in hazard mitigation grants to the city of Galveston to acquire 64 homes that suffered extensive damage as a result of Hurricane Ike. One $15.3 million grant was obligated to Galveston for authorities to acquire 46 residential properties located in the 100-year floodplain. Another grant provides $5.4 million to be used for the acquisition of 18 properties in the 100-year floodplain. http://www.fema.gov/news/newsrelease.fema?id=49128  By math math, that 40 million dollars to acquire 128 houses or property–that an average of $312,000 each. Estimated median house or condo value in 2007: $119,658 http://www.city-data.com/housing/houses-Galveston-Texas.html
 
Terrorist attacks don’t just come from plane, trains, automobiles, bombs or in physicality, as The Corbett Report http://www.corbettreport.com/articles/20090717_cyber_911.htm asks, did the real cyber 9/11 attack occur on 9/11?   
 
President Bush signed the plans to invade Afghanistan on Sept. 10th, the day before 9/11 and just yesterday it was announced that another 25,000 soldiers were heading to Afghanistan- pronto.  And as Ron Paul reminded us eight years ago, “We should recognize that American tax dollars helped to create the very Taliban government that now wants to destroy us. In the late 1970s and early 80s, the CIA was very involved in the training and funding of various fundamentalist Islamic groups in Afghanistan, some of which later became today’s brutal Taliban government. In fact, the U.S. government admits to giving the groups at least 6 billion dollars in military aid and weaponry, a staggering sum that would be even larger in today’s dollars.” 
A unique timeline of more events of 9/11 and the Al Qaeda and the Taliban is here http://s3.amazonaws.com/911timeline/main/AAafghanwar.html 
 
Neil Barofsky, special inspector general for the Treasury’s Troubled Asset Relief Program say the U.S. rescue may reach $23.7 Trillion dollars admitting offered criticism in a separate quarterly report of Treasury’s implementation of TARP, saying the department has “repeatedly failed to adopt recommendations” needed to provide transparency and fulfill the administration’s goal to implement TARP “with the highest degree of accountability.”
As a result, taxpayers don’t know how TARP recipients are using the money or the value of the investments, he said in the report. sourced at http://globaleconomicanalysis.blogspot.com/2009/07/tarp-special-investigator-says-bailout.html.  The other aberration of America’s economic woes is paying $15 million dollars for toilets on the international space station http://www.hightechscience.org/zero_gravity_toilet.htm   
 
In this era of supposed transparency, is is painfully obvious that  the 9/11 Commission omitted so many things and deceived the public.  Our government will continue to do so in the name of national security.  Printing, spending and loosing trillions and loosing more lives in terrorist attacks here or abroad is beyond absurd.  The Stenster blog claims, “The failure of the FBI to investigate our professional and proven analysis indicates that the pending 9/11-2B attack is an official conspiracy. The propagandizing by CNN and other Jewish-controlled media against U.S. militias like Ghost Troop indicates that they are a part of that conspiracy.” http://stienster.blogspot.com/
 
Pray -practice makes perfect as the NORAD Press Release says – Falcon Virgo Windy City-Two and Windy City -Three are future exercises that have yet to be scheduled. 
  
 
” In a time of deceit telling the truth is a revolutionary act.” – George Orwell

Read Full Post »