Saturday, October 27, 2012

Reconsidering evil - what guiding principles are directing Corporate and Governmental words , actions , belief systems and conduct ? How many psychopaths does it take to save the world ?

http://www.brotherjohnf.com/archives/86698

Corporations Are Sociopaths


http://occupycorporatism.com/obamas-best-laid-plans-for-internet-control-and-the-distraction-of-cybersecurity/

( These aren't Obama's plans - he is merely the stage prop for those who prefer to act off stage ... and we are we grooming the next generation of hackers if cyber terror is a real concern anyway.... ) 

Obama’s Best Laid Plans for Internet Control and the Distraction of Cybersecurity

Susanne Posel
Occupy Corporatism
October 26, 2012


Since the Congress voted down the Cybersecurity Act of 2012, Leon Panetta, US Secretary of Defense, has referred to the climate on the web as leading to an almost certain “cyber 9/11” “cyber Pearl-Harbor” , and even “cyber Armageddon”.
Panetta warns that cyber extremists or an aggressive nation could “use these kinds of cyber tools to gain control of critical switches. They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.”
In a recent solicitation, the Department of Homeland Security (DHS) has offered a more comprehensive monitoring service under their Continuous Diagnostic and Mitigation program. DHS is on a mission to “safeguard and secure cyberspace” with the acquisition of “specialized information technology (IT) service and tools to implement DHS’ Continuous Diagnostics and Mitigation (CDM) program.”
Congress has allocated $183 million for the 2013 fiscal year for cyber protection programs, critical security controls, and for the federal government and other public-private partnerships.
The leaked version of Obama’s cybersecurity executive order is a compromise by the administration offered to those concerned about Big Brother controls invading US citizen’s privacy on the Web. One concession outlined is the sharing of internet traffic information by the US government and private sector corporations involving critical infrastructure and electrical grid. Social media companies would not be held under the same mandate.
The DHS, specifically Secretary Janet Napolitano, will be given the sole power of oversight, rather than Keith Alexander, director of the National Security Agency (NSA). Napolitano will be empowered to reference top-secret intelligence reports only known to her to bases identification of cyberthreats and individual targets.
While the Congress, the mainstream propaganda and general public are concerned about cybersecurity legislation that would restrict freedoms on the Web, Obama has been preparing for government-sponsored and controlled internet.
In June of this year, President Obama signed the executive order entitled Accelerating Broadband Infrastructure Deployment which supposed to “facilitate broadband deployment on Federal lands, buildings, and rights of way, federally assisted highways, and tribal and individual Indian trust lands (tribal lands), particularly in underserved communities.” And with the EO came the creation of US Ignite, which is a 6 year plan to create private-public partnerships (PPP) with the areas a “national security”; as defined:
• Education
• Workforce development
• Advanced manufacturing
• Health
• Transportation
• Public safety
• Clean energy
With previous EOs, Obama has laid the foundation for new rules and regulations that would federalize tracking the US public with the extension of extension of broadband under the Federal Infrastructure Projects Dashboard.
US Ignite lists partners ready to assist the US government in creating a government-controlled internet system that connects to all aspects of our lives as we become more and more dependent on technological advancements. Some of their partners include Cisco, Comcast, Hewlett Packard, Mozilla, Verizon, AT&T, City of San Francisco, Juniper, Big Switch, Cienna, Delta Regional Authority, City of Philadelphia, City of Santa Monica, and Lafayette Utilities Systems.
The purpose is to create through use of current “test beds” the next generation of internet where the US government controls the flow of information under all avenues of access. The pairing with theGlobal Environment for Network Innovation (GENI) integrates social networking sites with the real world application as influencing society and commerce.
This project is funded by the National Science Foundation (NSF) who will supply the academia and research necessary to improve on US Ignite through GENI and a $40 million investment. The beta-testing in certain cities right now are gathering information for the government-sponsored internet of the future.
The NSF will lead US Ignite for the White House which will eventually integrate all aspects of economy and commerce onto the digital highway to be controlled and manipulated by the US government as the “next-generation network”. Universities, cities, healthcare offices, transportation, and all other aspects of daily life in America will be connected by this “so-called future internet”. Current experiments demonstrate that all these systems can be connected and controlled by one central grid. The NSF is now empowering GENI to create a prototype within experimental parameters that will satisfy the US government’s desire to “transform cybersecurity, network performance, and cloud computing research, and will jumpstart applications, which have the potential for profound societal and economic impacts.”
Different uses of US Ignite are:
• Radars to high-speed networks for weather prediction and disaster mitigation
• All-encompassing monitoring of all computers connected to the network
• Filing of patient information if doctors are connected to the network
• Retention of could-conferencing
The US Ignite network will connect retailer to shipper, distribution center and customer; educator to student, university and academia; web-developers to university researchers, entrepreneurs within all areas of national priority – which include all necessities controlled by the government for the continued functionality of our society.
US Ignite is downplayed in the mainstream because of its promises to be 100 times faster by using a one-gigabit network which is not believed, however, the implications of this venture is missed (or omitted).
The gravity of a network funded by and controlled by the US government through PPPs, city-state agreements and local governments to participate in a new version of the internet that is fully connected is lost in the MSM. Their focus is point out flaws in the Obama administration’s allocation of broadband as “slow and expensive in American cities.”


http://occupycorporatism.com/un-offers-to-assist-internet-counter-terrorism-surveillance-in-lieu-of-global-directives/


UN Offers to Assist Internet Counter-Terrorism Surveillance In Lieu of Global Directives

Susanne Posel
Occupy Corporatism
October 25, 2012


The United Nations (UN) is offering to assist sovereign countries in internet surveillance for anti-terrorism purposes. In a recently published reportentitled “The Use of the Internet for Terrorist Purposes” (UITP), the UN claims that social media sites are used for terroristic schemes in terms of organization and recruitment; specifically Skype, Facebook, YouTube and Twitter.
The National Security Agency (NSA) has begun scouting colleges and universities for the next generation of American grown hackers. The NSA wants an elite team of “computer geniuses” that are trained in hacking before they obtain their college degree. The students selected to train under this program will not be privy to the impact their work will have on cyber intelligence, military capabilities and law enforcement’s expansion of spying on Americans.
Neal Zing, technical director for the Information Assurance Directorate within the NSA, said: “We’re trying to create more of these, and yes they have to know some of the things that hackers know, they have to know a lot of other things too, which is why you really want a good university to create these people for you.”
Omission by the UN Office on Drugs and Crime (UNODC) explains that “terrorists use advanced communications technology” like the internet to remain anonymous while building a loyal audience.
In July of 2012, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) claimed in a published document that cyber-attacks are on the rise. The Department of Homeland Security (DHS) concurs with this summation because of 198 cases recorded since 2011.
According to the DHS, the most common “attacks” are referred to as spear-phishing where the hacker simply infiltrates the computer system in order to gather sensitive intelligence. The DHS has used cybersecurity to justify alliances “with public and private sector partners to develop trusted relationships and help asset owners and operators establish policies and controls that prevent incidents.”
In an attempt by the Obama administration to use fear-mongering to coerce the Congress into supporting a Big Brother cybersecurity legislation, members of the Senate met behind closed doors to attend a briefing by the Department of Homeland Security (DHS), where a staged cyber-attack was performed with the intent “to provide all senators with an appreciation for new legislative authorities that would help the US government prevent and more quickly respond to cyber-attacks.”
The focus of the attacks were US banks, power grids and telecommunications systems. However these systems are not connected to the internet and therefore that argument is moot. In fact, the power grid and public water systems “are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words.”
Even the subsequent compromised version of the Cybersecurity Act of 2012 was voted down on Capitol Hill in August. The Obama administration responded by threatening to issue an executive order. Jay Carney, White House Press Secretary, said: “In the wake of Congressional inaction and Republican stall tactics, unfortunately, we will continue to be hamstrung by outdated and inadequate statutory authorities that the legislation would have fixed. Moving forward, the President is determined to do absolutely everything we can to better protects our nation against today’s cyber threats and we will do that.”
The UN UITP report explains that WiFi networks manipulated at “cybercafes could provide an important data source for criminal investigations… There is some doubt about the utility of targeting such measures at Internet cafes only when other forms of public Internet access (e.g. airports, libraries and public Wi-Fi hotspots) offer criminals (including terrorists) the same access opportunities and are unregulated.”
Another point of weakness is the use of violence in role-playing video games where acts of terrorism are glorified. The UN cites that this conditioning to accept the role of a “virtual terrorist” downplays the seriousness of the matter. The collaboration of the United Nations Counter-Terrorism Implementation Task Force, which counts the World Bank, Interpol, the World Health Organization, and the International Monetary Fund demonstrations a decisive path of the globalist-controlled international community.
The International Telecommunications Union (ITU), an extension of the UN, became the UN’s official move toward totalitarian control over the internet. And in December of this year, Dubai, India will be hosting their conference which will decide the globalist stance on the free flow of information on the Web.
Hamadoun Toure, the ITU secretary-general, statedthat: “When an invention becomes used by billions across the world, it no longer remains the sole property of one nation, however powerful that nation might be.”
The UN’s ITU proclaims that because the internet is a “global entity” that the UN should have jurisdiction over it, manage its abilities according to global UN standards and engage restrictions that could be installed at the fundamental level of the internet to prevent any infractions of international mandates. The UN wants to include the domain-name system along with the Internet Corporation for Assigned Names and Numbers (ICANN), which is currently a privately owned US non-profit organization.
It is expected that the ITU would begin a sort of taxation that international telecommunications corporations would be expected to pay for the ITU’s handling of web traffic as it flows across the world. ITU members would be privy to the new found cash flow that would be in the hands of international governance; which could begin to line the pockets of the UN in record time.
In late 2011, representative from China, Russia, Tajikistan and Uzbekistan submitted a proposalcalled the International Code of Conduct for Information Security (ICCIS) to the UN Secretary General Ban Ki-moon that called for international consensus of a global set of rules and regulations that standardize information flow on the internet.
The ICCIS sets forth specific “principles of maintaining information and network security which cover the political, military, economic, social, cultural, technical and other aspects.”
This document will also mandate that countries not be allowed to use information and telecommunications technologies “to conduct hostile behaviors and acts of aggression or to threaten international peace and security and stress that countries have the rights and obligations to protect their information and cyberspace as well as key information and network infrastructure from threats, interference and sabotage attacks.”
The Obama administration created the International Strategy for Cyberspace (ISC) which makes an international governance policy priority. Obama’s desire to facilitate the US government’s push toward global engagement, the ISC encompasses a new vision for cyberspace. By using economic prosperity dependent on revamping cyberspace, Obama places the need for over-reaching cybersecurity over the internet.
By militarizing the control over the web, Obama claims the internet as a “strategic national asset” malleable by the US government. Obama contended that protecting the internet will be a national security priority and that: “We will ensure that these networks are secure, trustworthy and resilient.”
HR 628 claimed to support “preserve, enhance, and increase access to an open, global Internet.” The legislation laid out that there be a “proposed international code of conduct for information security or a resolution inconsistent with the principles above comes up for a vote in the United Nations General Assembly or other international organization, the Permanent Representative of the United States to the United Nations or the United States representative to such other international organization should oppose such a resolution.”
The UTI and HR 628 are evidences of the end of free flowing information that is protected by and for the people. As governments place more stringent controls on the web, and the soon-to-be ratification of the UTI in December of this year, we can be assured that we will very quickly only have access to information that is approved by the UN.

2 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. Typo on prior reply - I try to find interesting items for folks to ponder Sandy... Glad you found my post interesting !

    ReplyDelete