Sovereignthink

Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘darpa

Headline Update the NSTIC of Things and the NSTICing of everyone

leave a comment »


NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.

 

National Strategy for Trusted Identities in Cyberspace (NSTIC)

January 7, 2011 ~ 11 AM – 12:30 PM
Stanford University

 

Secretary Gary Locke, U.S. Department of Commerce, and Howard A. Schmidt, Special Assistant to the President and Cybersecurity Coordinator at The White House,  spoke at an event about the National Strategy for Trusted Identities in Cyber Space (NSTIC). As part of the event a panel of CEO industry executives also discussed current and future real world applications of trusted identities.

 

The NDAA Kill Switch Police State and the i-9/11 economic event

 

Written by sovereignthink

2011/12/10 at 8:50 pm

The Kill Switch Terrortist Police State.

In the near future… now that Obama will sign the NDAA of 2011 into law?

There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.

Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.

NSTIC, Google & SEO

by Kristine Schachinger, December 29, 2011

In case you missed it, Google is now a credentialed provider of Trusted Identities for the federal government. This means that the NSTIC, or National Strategy for Trusted Identities in Cyberspace, framework now has federally recognized and certified identity providers.

But who are these providers exactly, what is the NSTIC and how does this affect the users in matters of privacy, anonymity or even SEO? Below is a video that helps easily explains what it means to be working with the #NSTIC and how these issues are addressed, or not addressed by the NSTIC Framework.

Obama Unleashes Cyber NSTIC

Written by sovereignthink

2011/01/11

Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans

On Jan 7th at the Stanford Institute for Economic Policy Research, Presidential Branch Officials; the U.S. Commerce Secretary Gary Locke and Cybersecurity Coordinator Howard Schmidt announced The National Strategy for Trusted Identities in Cyberspace or NSTIC. Where by creating two tears of online ID-entities Trusted and Untrusted. The project has already been under field testing since mid twenty-ten.

Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen

Written by sovereignthink

2011/01/11

Obama Unleashes N-STIC for Trusted e-Citizen Registry 

Individual Citizen Registration for Personal Trusted ID entity Card.

 National Strategy for Trusted Identities in Cyberspace (NSTIC)

The National Strategy for Trusted Identities in Cyberspace

My First Black President is Creating a Second Class UnTrusted (Non-Registered) Citizen vs ID Trusted Entity Citizenship

DHS HITS US with NSTIC! HIDE, HIDE!!

Written by sovereignthink

2011/02/12

D.H.S. (Department of Homeland Security)

H.I.T.S. (High Impact Technological Solution)

U.S. (United States)

N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)

H.I.D.E. (Homeland Identification & Detection Ethics)

H.I.D.E. (Hostile Intent Detection Enforcement)

Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship

Written by sovereignthink

2011/01/13 at 11:33 pm

Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry 

 

Will a standardized system for verifying Web identity ever catch on?

By Mark Milian, CNN

updated 7:36 AM EST, Wed February 15, 2012

(CNN) — My neighbor recently discovered a four-digit passcode that unlocks the front doors to our apartment building.

He shared the code with me, as well as with his girlfriend, buddies and a few other neighbors. I shared it with some people, and so did others. Within a few weeks, the building’s security system was buzzing constantly for people who didn’t actually have one of the dozen or so physical keys given to tenants.

On 1-year anniversary, organized NSTIC looking for fast track

By John Fontana for Identity Matters | <:time datetime=”2012-04-18″>April 18, 2012

With $16.5 million in funding and $10 million earmarked for pilot programs, the government-led plan to facilitate the build out of an identity layer for the Internet has a year of organization under its belt, an implementation challenge for its future and a few critics chirping in its ear.

Last April, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was an Obama Administration mandate, a press conference and one ambitious guy sitting in a Commerce Building office above the nation’s oldest aquarium.

NSTIC set to hand out $2.5 million to direct ID effort

By John Fontana for Identity Matters | July 3, 2012 ZDNET

The organization driving the government-led digital identity strategy known as NSTIC said Monday it will name in the next few weeks a private organization that will shepherd the overall plan toward completion.

The move represents a significant milestone in the effort to create an “identity ecosystem” that provides secure identities for online transactions while limiting the disclosure of personal information. The system calls for both public and private accredited identity providers and a choice of identity credentials.

First NSTIC steering group meeting set for Aug. 15-16?

By John Fontana for Identity Matters | July 19, 2012 ZDNET

Vail, Colo. – The private-sector group named last week to lead the effort to create a digital identity strategy known as NSTIC will hold its first meeting Aug. 15-16 in Chicago.

In addition, the National Strategy for Trusted Identities in Cyberspace (NSTIC) will name in early September the winners of its pilot program to participate in a pilot program.

Finally On Wikipedia

 as of 7/22/2012

The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure online identities for Americans in cyber space. The aim of the proposal, according to Howard Schmidt, the White House Cybersecurity Coordinator, is to create an ‘identity ecosystem’ where individuals and organizations can complete online transactions with confidence that the individual who they are conducting business with is not impersonating someone else.

Schmidt also outlined that the NSTIC would also reduce the need to remember potentially insecure list of usernames and passwords. Schmidt highlighted that enrollment in the ‘identity ecosystem’ of individuals would be entirely voluntary and individuals can choose whether or not to obtain a credential. The measure also gives individuals control over what private information they use to authenticate themselves over time.

Background

The impetus for the policy move by the Obama Administration is part of the Cyberspace Policy Review published in June 2009. The NSTIC proposal was released in draft form in June 2010 along with a website set up by the Department of Homeland Security to elicit feedback and ideas from people. On April 15, 2011, the final draft of NSTIC was released by the White House. In this version of the draft the role of the federal government was toned down and highlighted its role as merely a facilitator in establishing the ecosystem. The effort has to be led by the private-sector.

Criticism

The proposal has generated a lot of criticism since it was released in draft form by the White House. A lot of criticism been centered around privacy implications of the proposal.

Shortly after the draft’s release, the Electronic Privacy Information Center, in conjunction with a number of other consumer-rights and civil liberties organizations,sent the Committee a statement in response to the draft NSTIC policy, requesting that the White House provide a clearer and more complete plan to create and safeguard Internet users’ rights and privacy.

The Obama White House released its final NSTIC guidelines in April 2011. While EPIC head, Marc Rotenberg, called NSTIC “historic,” he also cautioned that “…online identity is complex problem and the risk of ‘cyber-identity theft’ with consolidated identity systems is very real. The US will need to do more to protect online privacy.”

Additional Reading

The Complete Biometric Citizen Registry of Corp/Gov ID  for access to e-systems

The National Strategy for Trusted Identities in Cyberspace

http://epic.org/privacy/nstic.html

http://epic.org/privacy/cybersecurity/default.html

http://privacy.org/privacy_coalition_comments_trusted_ids.pdf

http://www.nist.gov/public_affairs/releases/whitehouse_nstic.cfm

Felony Groping of Human Civil Rights

with 3 comments


Felony Groping of Human Civil Rights

The United States is Seen throughout the World as a Police State of Mass Criminal Internment of the Public for Policy Violations and Suspicion of Belligerence against State Activity. While the State Activity is often Fraudulent and Criminal in many parts of the World.

Human Civil Liberties and Individual Fundamental Natural Rights are Not Granted By Government; Rather they are the Sovereign Domain and Born of the Original Holders of Autonomy in the Nature of Each Individual Child of Man.

They Can Not Be Infringed, Violated, Liened, Regulated, Policed, Certified, Licensed, Censored, Denied, Molested, Searched, Groped, Fondled, Restrained, Detoured, Abused, Forced, Granted, Limited or Encroached under any manner of Action Prevented from One Individual over Any Other.

Congress Shall Make No Law

“If every person has the right to defend – even by force – his person, his liberty, and his property, then it follows that a group of men have the right to organize and support a common force to protect these rights constantly. Thus the principle of collective right -–its reason for existing, its lawfulness — is based on individual right.”

Lame Duck Officials voted out of office are vying for corporate jobs by pushing such legislation as the Food Safety Modernization Act and the Combating Online Infringement and Counterfeits Act which are now on the fast track to becoming law.

Food Safety Modernization Act

  • Preclude the public’s right to grow, own, trade, transport, share, feed and eat each and every food that nature makes.
  • It will more than likely make Michael Taylor (former Monsanto executive) the Food Czar.
  • End U.S. sovereignty over its own food supply by forcing compliance with WTO guidelines.
  • Even direct sales of food between individuals could be defined as smuggling under the language of the bill.
  • Codex Alimentarius, a global system of control over food and food supplements, would control all U.S. food and supplements. Access to natural food supplements would be removed under Codex rules.
  • Control of all seeds would transfer to Monsanto and other global multinationals.
  • The National Animal Identification System ( NAIS ) would be enacted, forcing bio-chipping and other identification and tracking methods for all animals, whether food or pets.
  • What is left of the American food system would be transferred into total control of Multinational Corporations under the guise of global governance.

Combating Online Infringement and Counterfeits Act

Federal/Private National Intelligence Operation “In Our Sites IOS

Allows Total Black Box Black Listing of Websites from the Federal Bureau of Inter-Intra Electronic Virtual World Censorship. Total Control Switch Power with Impunity and Immunity, U.S. Shuts Down Web Sites in Piracy Crackdown.

From Wired: The content companies have tried suing college students. They’ve tried suing internet startups. Now they want the federal government to act as their private security agents, policing the internet for suspected pirates

From ITWorld: office workers sharing songs on iTunes could get you in trouble if the files are exposed outside the firewall, or if some of your PowerPoint Rangers are a little too free with the quotes or movie clips they use to liven up the presentations, especially if the .PPTs are distributed across the WAN or Internet to branch offices and other divisions.

–         Sovereignthink

Global Elite – Religion of Control
Foundation X – Joel Skousen
TSA Grope Stapo – Genitles Must be Groped for National Security
The Borders and Our Pants – Two things Wide Open by the Federal Government
Pants Wide Shut – TSA Grope Stapo to Strip Search Anyone
Military Engagements at Mexico Border and in the US
Global Elite Graph – Global Governance Timeline
Enough is Enough – Ron Paul Authors Bill to End Federal Government’s Crimes
$500 Dollar Silver – Idaho Silver State Bank ACT
DA Investigating Felony Groping in TSA Revolt – Federal Fondling Destroys Left Right Party Prison System
owen jj stone and john tyner
federal government police state oppression brings civilians together despite decline in travel
dollar dead world reserve bankrupt greenspan admits it was all a scam fraud
the secret of nist
big sis caught lying
text of h r 645 national emergency centers establishment act
obama slammed china launches missile off la
fema camps confirmed open federal dhls police state
read my lips the federal reserve will not monetize the debt
fullbody scan or enhanced pat down
Involuntary Cognitive ‘Enhancement’ Implementation
darpa the cia fbi nsa hls cps atf ice private corporate spies and your email what could go wrong
the idaho silverhood statehood and perpetual infrastructure act
The New World War: Who Gets the Power to Measure Everything?
target youth – engineering a generation for the new world policey state

Written by sovereignthink

2010/11/27 at 10:09 pm

Posted in Federal America Police State

Tagged with , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Global Elite – Creating a Global Governance Prison System

with 3 comments


Global Elite – Creating a Global Governance Prison System

A group of individuals gathered in a common land to form collective order and protection is a government of people.

What is a Just Government?

First;

A government that Upholds Individual Sovereignty Under Fundamental Natural Rights.

Second;

A government that Upholds the Community Trust and Public Domain Under Equity and Justice

Either of these aspects can barely be found in the western civilisation. The Spheres of influence and Government Controls have continued to encroach and blurred the lines of  Sovereign Spheres of Authority and Justice established since the Magna Charta.

These are Separate and Inviolate Spheres of Authority, Unalienable Spheres of Sovereign Domain. All Derived From the Voluntary Consent and Authority of the Sovereign Individuals. They are the Original Agents of Authority and the Only Just Holders of Autonomy.

There is a sphere of stewardship, a sphere of self determination, a sphere of sovereignty that every individual Human Being possesses.

This sphere of self is an inviolate and unalienable domain of personal private sovereignty.

There is a sphere of stewardship, a sphere of group determination, a sphere of sovereignty that every voluntary group of Human Beings posses.

This sphere of the voluntary group is a Just and Equitable domain of public community sovereignty.

There is another sphere, a sphere of Rulership, a sphere of other’s determination over others, a sphere of A sovereign over another that every Individual Human Being Opposes. 

This sphere of Rulership is an involuntarily distributed and centrally controlled domain of authority under Force and Tyranny.

Any government or act that violates the Sovereign Individual’s Fundamental Natural Rights is Unlawful, Immoral and Evil.

Any government or act that violates the voluntary Public Domain and Community Trust’s Justice, Truth or Equity is Unlawful, Immoral, Evil and outside the Authority of Natural Law the Authority of Our Fundamental Natural Rights.

Fundamental Natural Rights are any rights that every individual can claim simultaneously without forcing someone else to serve their needs.

We give the government Its Authority to act. We can only give the government permission to do those things that we ourselves can lawfully do. Security in Our privacy, papers, effects, anonymity, body, travel and activities is sacred and Sovereign. I can not demand these things of anyone at anytime, only unless there is sworn proof beyond a reasonable doubt that a crime has been committed or is being committed.

We have seen this progression and evolution from the blatant openly admitted Bush Doctrine “It is not illegal when the President Does it or Orders it” and onto the continued Centralizing Control Doctrine of today.

Judge Napolitano; “It is a Religion of Control Freaks that think the Government can do what ever it wants.

53% of Americans believe that the government is operating outside the constitution and aren’t doing anything about it!

“If the Government is operating outside the constitution, it’s time to change the government. I mean, that is about as reckless a thing as you could be. The Constitution equals the Rule of Law. If the Government is not obeying the Rule of Law, how can they impose Laws upon Us?

“But one person isn’t listening and he could stop this with a phone call, and that is the President. Who wants to induce us to conform to his way of behaving and thinking, just… like… his… predecessor.”

That is Barack Obama and George Bush in the seamless B&O Railroading of America.

In less than nine years Over 42,000 factories have closed in the United States

Our World Reserve Currency Status is Lost

Our Economy is Bleeding to Death

The Government is Hiring Police to Prepare for the Problem

The Federal Government and Federal Reserve are unilaterally ‘Spending’ More Than Everything ever spent before every Few Years.

Under the Federal Governments Economic Policy, the Foreign Policy, the War Policy, the Domestic Terror Policy, the War on Drug Policy, the Disclosure Policy, the National Security Policy, the Currency Policy, the Immigration Policy, the Domestic Spying Policy, the Travel Policy, the Family Court Policy, the Suspension of Law Policies.

The People of the United States have come to Learn that the Policey State Under which they live is in many ways Orwell-ian and Wells-ian in Principle and Practice.

It is a total affront to Liberty, Freedom, Rights, Law, Justice, Truth, Integrity or Honor.

This Government of Federal Policy Bureaus are the Alarm Bell of Liberty that is awakening the Sleeping Giant. That Giant is One Force of Unified Protection and Defense For the Individual’s Indivisible Sovereignty of Fundamental Natural Rights Under Freedom, Liberty and Justice for the All.

“I think this is starting to sink in across the board. It knows no ideological, no ethic, no gender line. I think the American Public are saying Enough is Enough.” We are waking up and we see who the Criminals are.

Global Elite – Integrated Global ‘Climate’ Agenda

Even after Climate Change Fraud has been utterly exposed as a farce created by multinational corporations and the Global Elite directed Think tank Universities and after most of the Third world in, light of this and disband the corrupt agenda in Copenhagen, the UN Agenda is still moving full speed ahead in Cancun Mexico.

Top of the list is still population control reductions, relocation into green cities and off the land and the reallocation of industry into green production and ‘living’.

Three Stage Agenda

  •     The first stage of vulnerability assessment and economic valuation of priority measures corresponds to the enactment of this Special Program in the 2009–2012 period, the main result of which will be the design of an integrated program of adaptation, executed progressively.
  •      The second stage, strengthening strategic, large-scale adaptation capacities, from 2013 to 2030, includes as priorities: attaining equilibrium between degradation/deforestation and restoration/reforestation; the adoption and implementation of sustainable agriculture and livestock production systems; the eradication of measures that encourage environmental degradation and cause GHG emissions; the implementation of relocation programs for human settlements and infrastructure in high risk areas, and the implementation of policies aimed at climate stability and sustainable development.
  •      The third stage, the consolidation stage, between 2030 and 2050, will result in attaining a positive balance between reforestation and deforestation, development options that ensure environmental sustainability, and a strengthened national planning system based on criteria to decarbonize the economy and minimize vulnerability to climate change.

This is the Agenda Funded by, muti-nationals, RanD, IMF, World Bank, Rockefeller/Ford Foundations and Endowments and Rothchild/Saxe-Coburg-Gotha Trusts and Groups.

Joel Skousen on Foundation X

This is just weird. Massive scam or money laundering on the part of the Vatican Bank? Who knows…

This what comes from debt based privately own fiction fiat currency and measurements of human life.

Bailey Savings and Loan were have you gone?

We Must Restore and Reclaim the Local Public Domain to Defend Liberty and the Integrity of our Lives.

Lord James of Blackheath, Speech on Foundation X (House of Lords, 01/11/2010)

–         Sovereignthink

Global Elite – Religion of Control
Foundation X – Joel Skousen
TSA Grope Stapo – Genitles Must be Groped for National Security
The Borders and Our Pants – Two things Wide Open by the Federal Government
Pants Wide Shut – TSA Grope Stapo to Strip Search Anyone
Military Engagements at Mexico Border and in the US
Global Elite Graph – Global Governance Timeline
Enough is Enough – Ron Paul Authors Bill to End Federal Government’s Crimes
$500 Dollar Silver – Idaho Silver State Bank ACT
DA Investigating Felony Groping in TSA Revolt – Federal Fondling Destroys Left Right Party Prison System
owen jj stone and john tyner
federal government police state oppression brings civilians together despite decline in travel
dollar dead world reserve bankrupt greenspan admits it was all a scam fraud
the secret of nist
big sis caught lying
text of h r 645 national emergency centers establishment act
obama slammed china launches missile off la
fema camps confirmed open federal dhls police state
read my lips the federal reserve will not monetize the debt
fullbody scan or enhanced pat down
Involuntary Cognitive ‘Enhancement’ Implementation
darpa the cia fbi nsa hls cps atf ice private corporate spies and your email what could go wrong
the idaho silverhood statehood and perpetual infrastructure act
The New World War: Who Gets the Power to Measure Everything?
target youth – engineering a generation for the new world policey state

Written by sovereignthink

2010/11/25 at 9:18 pm

Posted in Global governance - One World Order

Tagged with , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

%d bloggers like this: