Posts Tagged ‘google’
NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.
January 7, 2011 ~ 11 AM – 12:30 PM
Secretary Gary Locke, U.S. Department of Commerce, and Howard A. Schmidt, Special Assistant to the President and Cybersecurity Coordinator at The White House, spoke at an event about the National Strategy for Trusted Identities in Cyber Space (NSTIC). As part of the event a panel of CEO industry executives also discussed current and future real world applications of trusted identities.
Written by sovereignthink
2011/12/10 at 8:50 pm
The Kill Switch Terrortist Police State.
In the near future… now that Obama will sign the NDAA of 2011 into law?
There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.
Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.
by Kristine Schachinger, December 29, 2011
In case you missed it, Google is now a credentialed provider of Trusted Identities for the federal government. This means that the NSTIC, or National Strategy for Trusted Identities in Cyberspace, framework now has federally recognized and certified identity providers.
But who are these providers exactly, what is the NSTIC and how does this affect the users in matters of privacy, anonymity or even SEO? Below is a video that helps easily explains what it means to be working with the #NSTIC and how these issues are addressed, or not addressed by the NSTIC Framework.
Written by sovereignthink
Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans
On Jan 7th at the Stanford Institute for Economic Policy Research, Presidential Branch Officials; the U.S. Commerce Secretary Gary Locke and Cybersecurity Coordinator Howard Schmidt announced The National Strategy for Trusted Identities in Cyberspace or NSTIC. Where by creating two tears of online ID-entities Trusted and Untrusted. The project has already been under field testing since mid twenty-ten.
Written by sovereignthink
Obama Unleashes N-STIC for Trusted e-Citizen Registry
National Strategy for Trusted Identities in Cyberspace (NSTIC)
The National Strategy for Trusted Identities in Cyberspace
My First Black President is Creating a Second Class UnTrusted (Non-Registered) Citizen vs ID Trusted Entity Citizenship
Written by sovereignthink
D.H.S. (Department of Homeland Security)
H.I.T.S. (High Impact Technological Solution)
U.S. (United States)
N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)
H.I.D.E. (Homeland Identification & Detection Ethics)
H.I.D.E. (Hostile Intent Detection Enforcement)
Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship
Written by sovereignthink
2011/01/13 at 11:33 pm
Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry
By Mark Milian, CNN
updated 7:36 AM EST, Wed February 15, 2012
(CNN) – My neighbor recently discovered a four-digit passcode that unlocks the front doors to our apartment building.
He shared the code with me, as well as with his girlfriend, buddies and a few other neighbors. I shared it with some people, and so did others. Within a few weeks, the building’s security system was buzzing constantly for people who didn’t actually have one of the dozen or so physical keys given to tenants.
With $16.5 million in funding and $10 million earmarked for pilot programs, the government-led plan to facilitate the build out of an identity layer for the Internet has a year of organization under its belt, an implementation challenge for its future and a few critics chirping in its ear.
Last April, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was an Obama Administration mandate, a press conference and one ambitious guy sitting in a Commerce Building office above the nation’s oldest aquarium.
The organization driving the government-led digital identity strategy known as NSTIC said Monday it will name in the next few weeks a private organization that will shepherd the overall plan toward completion.
The move represents a significant milestone in the effort to create an “identity ecosystem” that provides secure identities for online transactions while limiting the disclosure of personal information. The system calls for both public and private accredited identity providers and a choice of identity credentials.
Vail, Colo. – The private-sector group named last week to lead the effort to create a digital identity strategy known as NSTIC will hold its first meeting Aug. 15-16 in Chicago.
In addition, the National Strategy for Trusted Identities in Cyberspace (NSTIC) will name in early September the winners of its pilot program to participate in a pilot program.
as of 7/22/2012
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure online identities for Americans in cyber space. The aim of the proposal, according to Howard Schmidt, the White House Cybersecurity Coordinator, is to create an ‘identity ecosystem’ where individuals and organizations can complete online transactions with confidence that the individual who they are conducting business with is not impersonating someone else.
Schmidt also outlined that the NSTIC would also reduce the need to remember potentially insecure list of usernames and passwords. Schmidt highlighted that enrollment in the ‘identity ecosystem’ of individuals would be entirely voluntary and individuals can choose whether or not to obtain a credential. The measure also gives individuals control over what private information they use to authenticate themselves over time.
The impetus for the policy move by the Obama Administration is part of the Cyberspace Policy Review published in June 2009. The NSTIC proposal was released in draft form in June 2010 along with a website set up by the Department of Homeland Security to elicit feedback and ideas from people. On April 15, 2011, the final draft of NSTIC was released by the White House. In this version of the draft the role of the federal government was toned down and highlighted its role as merely a facilitator in establishing the ecosystem. The effort has to be led by the private-sector.
The proposal has generated a lot of criticism since it was released in draft form by the White House. A lot of criticism been centered around privacy implications of the proposal.
Shortly after the draft’s release, the Electronic Privacy Information Center, in conjunction with a number of other consumer-rights and civil liberties organizations,sent the Committee a statement in response to the draft NSTIC policy, requesting that the White House provide a clearer and more complete plan to create and safeguard Internet users’ rights and privacy.
The Obama White House released its final NSTIC guidelines in April 2011. While EPIC head, Marc Rotenberg, called NSTIC “historic,” he also cautioned that “…online identity is complex problem and the risk of ‘cyber-identity theft’ with consolidated identity systems is very real. The US will need to do more to protect online privacy.”
Google’s CEO Eric Schmidt supports Overthrow of government and total transparency? Yes, I think so…but who can trust a RAND, CIA and NSA Created Corporation’s CEO? A Google Run Rebellion and Uprising? Not the Google rebellion Murdoch had in mind?
Google’s cyberactivist Wael Ghonim, an executive at the company emerged as a leading voice of the Egyptian revolution and spearheaded the uprising.
Mr Ghonim is head of marketing for Google Middle East and Google North Africa.
How did he help facilitate and become one of the leaders of the Egyptian Re-publicing? For the last half year he created brush fires in the hearts of Egyptians Everywhere with the page ‘We are all Khaled Said’. Named in honor of a 28-year-old Egyptian protester who was tortured by Egyptian police.
The ‘We are all Khaled Said’ Facebook page, Twitter Account, Google technology and excellent search tools that Ghonim used, helped spark the uprising that toppled President Hosni Mubarak’s regime.
And Just like Khaled Said, in a DHS Police Styled Secret Arrest, Ghonim was illegally captured by the Egyptian Government’s Military Police.
“We are All Wael Ghonim.” Became the Battle Cry of the People, the “I am Spartacus” of Egyptians in Google’s Revolution Factory, Alliance of Youth Movements and the Color Revolution 2.0
As the revolution seemed to be losing steam, seemingly against all odds, Mubarak fled, had a stroke and 30-year-old Ghonim was released from police custody after 12 days.
Credited with re-energising the movement, Ghonim’s release has placed him and Google as the warriors of the people and victory.
“We are very, very proud of what Wael Ghonim was able to do in Egypt, they were able to use a set of technologies that included Facebook, Twitter and number of others to really express the voice of the people. And that is a good example of transparency. And we wish them very much the best. I have talked to him. We are very, very proud of what he has done.” said Google’s CEO and Leader Mr Schmidt in Barcelona.
Would the reaction of Mr Schmidt be the same if any of the United States Execs; Nikesh Arora, Shona L. Brown, David C. Drummond, Alan Eustace, Patrick Pichette or Jonathan Rosenberg, created the website ;
What if this same executive at Google US Sparked a revolution in America, Demanded a new government here, and called for transparency into the Federal Reserve and Federal Agencies as a good example of a Free and Just People?
I for one do not want a Google Executive run and controlled Revolution in America.
However, Silence No One and Speak the Truth.
An Informed Public Will Resist Tyranny
We are the Resistance.
Resistance is Victory.
|what causes fear in the public||2010/03/07/what-causes-fear-in-the-public/|
|iceland the new land of the free and home of the brave||2010/03/10/iceland-the-new-land-of-the-free-and-home-of-the-brave/|
|federal judge finds n s a wiretapping program illegal||2010/04/04/federal-judge-finds-n-s-a-wiretapping-program-illegal/|
|what acts are we enabling our government with||2010/05/16/what-acts-are-we-enabling-our-government-with/|
|the great shell game of america||2010/06/21/the-great-shell-game-of-america/|
|what protects us from tyranny||2010/06/22/what-protects-us-from-tyranny/|
|usawc mexico strategy research project civil edition||2010/07/02/usawc-mexico-strategy-research-project-civil-edition/|
|antonovich mexico and los angeles county||2010/07/14/antonovich-mexico-and-los-angeles-county/|
|global elite fear internets power||2010/07/20/global-elite-fear-internets-power/|
|obama holds usa border security hostage||2010/07/22/obama-holds-usa-border-security-hostage/|
|oz vs toontown genius all around||2010/07/23/oz-vs-toontown-genius-all-around/|
|antonovich and la county bos ban successful industry for fear of robbery and to keep crime down||2010/08/07/antonovich-and-la-county-bos-ban-successful-industry-for-fear-of-robbery-and-to-keep-crime-down/|
|what is national security||2010/08/23/what-is-national-security/|
|machete race wars – creating the new jews||2010/09/05/machete-race-wars-%e2%80%93-creating-the-new-jews/|
|exslaves shared 14th amendment with the devil||2010/09/12/exslaves-shared-14th-amendment-with-the-devil/|
|read my lips the federal reserve will not monetize the debt||2010/11/08/read-my-lips-the-federal-reserve-will-not-monetize-the-debt/|
|obama slammed china launches missile off la||2010/11/13/obama-slammed-china-launches-missile-off-la/|
|the secret of nist||2010/11/15/the-secret-of-nist/|
|owen jj stone and john tyner||2010/11/16/owen-jj-stone-and-john-tyner/|
|DA Investigating Felony Groping in TSA Revolt –
Federal Fondling Destroys Left Right Party Prison System
|‘Enough is Enough’
Ron Paul Calls for End of Federal Government Criminal Activity
Global Elite – Creating a Global Governance Prison System
Department of Homeland Security MindReading Division Future Attribute Screening Technology F.A.S.T.
Global Climate Elite Cancun - Global Population Relocation
Threat from PETN or PENTAGON?
|The Bankers or US – It’s Openly Admitted, It’s Fraud, It’s a Scam and It Can Never Be Repaid||2010/12/02/the-bankers-fraud-or-us/|
|COICA Gives Federal Police Editing Power of the Internet – Goodbye Guttenberg||2010/12/04/coica-federal-police-internet-editing/|
|United States Mainstream Media Has Been Nationalized||2010/12/06/nationalization-of-mainstream-media-mysteriously-missing-from-media/|
|End the Fed – Ron Paul Heading Central Bank Panel – What’s After the Fed? Bring the GreenBack Back, Demand State Owned Commodity Banks!||2010/12/09/end-the-fed-demand-state-owned-banks/|
|Failed Cancun Conference Produces $600 Billion UN Planned New World Economy: Controlled Population Relocation, Re-Wilding Industrial ‘Zones’, Social Reformation, Carbon Austerity Equitization||2010/12/10/failed-cancun-conference-produces-600-billion-dollar-plannednew-world-economy/|
|Internet Theatre of War WWW Lock Down Due to False Flag WikiLeak CypherPunks and Hacker Provocateur Terror Hype and Propaganda on Info BombShells||2010/12/10/internet-theatre-of-war-censorship-over-flase-flag-wikileak-cypherpunk-threa/|
|With the Dollar Dead What’s After the Fed? We Go Global or We Go Local||2010/12/12/with-the-dollar-dead-what%e2%80%99s-after-the-fed-we-go-global-or-we-go-local/|
|Conspiracy Theory Private Investigators or Domestic Risk, Enemy Belligerent and Policey Impediment||2010/12/14/private-citizen-investigator-conspiracy-theorist-or-domestic-risk-enemy-belligerent-policey-impediment/|
Strip Mining Bryce Canyon for “Federal” Coal Exports to China
|Don’t Take Their Shot of the Living Dead, Don’t Drink Their Black Water, Don’t Buy Their Zombie Injections||2011/01/06/shot-of-the-living-dead-and-their-black-water-treatmen/|
|The Legacy of Arnold Schwarzenegger and The Fine Prison System||2011/01/09/legacy-of-arnold-schwarzenegger-the-fine-prison-system/|
|Clowns to the Left, Jokers to the Right, Blamed and Accused in the Middle with You||2011/01/11/clowns-left-jokers-right-ignored-middle-you/|
Intercepted Cable – Total Population Control
|Food Safety Modernization Act Unconstitutional – Caps Agriculture, Destroys Local Farms|
Stop Think Connect – The Police State DHS Dots
|National CyberSecurity Operation Perfect Citizen – Trustmark Citizenship||2011/01/18/national-cybersecurity-operation-perfect-citizen/|
|China Buys-Up America’s Local Bond Markets, Launching Financial Takeover at Last Local Vestige of US Value – China Now Owns America||2011/01/20/china-buys-up-americas-local-bond-market/|