Sovereignthink

Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘google

Headline Update the NSTIC of Things and the NSTICing of everyone

leave a comment »


NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.

 

National Strategy for Trusted Identities in Cyberspace (NSTIC)

January 7, 2011 ~ 11 AM – 12:30 PM
Stanford University

 

Secretary Gary Locke, U.S. Department of Commerce, and Howard A. Schmidt, Special Assistant to the President and Cybersecurity Coordinator at The White House,  spoke at an event about the National Strategy for Trusted Identities in Cyber Space (NSTIC). As part of the event a panel of CEO industry executives also discussed current and future real world applications of trusted identities.

 

The NDAA Kill Switch Police State and the i-9/11 economic event

 

Written by sovereignthink

2011/12/10 at 8:50 pm

The Kill Switch Terrortist Police State.

In the near future… now that Obama will sign the NDAA of 2011 into law?

There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.

Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.

NSTIC, Google & SEO

by Kristine Schachinger, December 29, 2011

In case you missed it, Google is now a credentialed provider of Trusted Identities for the federal government. This means that the NSTIC, or National Strategy for Trusted Identities in Cyberspace, framework now has federally recognized and certified identity providers.

But who are these providers exactly, what is the NSTIC and how does this affect the users in matters of privacy, anonymity or even SEO? Below is a video that helps easily explains what it means to be working with the #NSTIC and how these issues are addressed, or not addressed by the NSTIC Framework.

Obama Unleashes Cyber NSTIC

Written by sovereignthink

2011/01/11

Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans

On Jan 7th at the Stanford Institute for Economic Policy Research, Presidential Branch Officials; the U.S. Commerce Secretary Gary Locke and Cybersecurity Coordinator Howard Schmidt announced The National Strategy for Trusted Identities in Cyberspace or NSTIC. Where by creating two tears of online ID-entities Trusted and Untrusted. The project has already been under field testing since mid twenty-ten.

Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen

Written by sovereignthink

2011/01/11

Obama Unleashes N-STIC for Trusted e-Citizen Registry 

Individual Citizen Registration for Personal Trusted ID entity Card.

 National Strategy for Trusted Identities in Cyberspace (NSTIC)

The National Strategy for Trusted Identities in Cyberspace

My First Black President is Creating a Second Class UnTrusted (Non-Registered) Citizen vs ID Trusted Entity Citizenship

DHS HITS US with NSTIC! HIDE, HIDE!!

Written by sovereignthink

2011/02/12

D.H.S. (Department of Homeland Security)

H.I.T.S. (High Impact Technological Solution)

U.S. (United States)

N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)

H.I.D.E. (Homeland Identification & Detection Ethics)

H.I.D.E. (Hostile Intent Detection Enforcement)

Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship

Written by sovereignthink

2011/01/13 at 11:33 pm

Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry 

 

Will a standardized system for verifying Web identity ever catch on?

By Mark Milian, CNN

updated 7:36 AM EST, Wed February 15, 2012

(CNN) — My neighbor recently discovered a four-digit passcode that unlocks the front doors to our apartment building.

He shared the code with me, as well as with his girlfriend, buddies and a few other neighbors. I shared it with some people, and so did others. Within a few weeks, the building’s security system was buzzing constantly for people who didn’t actually have one of the dozen or so physical keys given to tenants.

On 1-year anniversary, organized NSTIC looking for fast track

By John Fontana for Identity Matters | <:time datetime=”2012-04-18″>April 18, 2012

With $16.5 million in funding and $10 million earmarked for pilot programs, the government-led plan to facilitate the build out of an identity layer for the Internet has a year of organization under its belt, an implementation challenge for its future and a few critics chirping in its ear.

Last April, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was an Obama Administration mandate, a press conference and one ambitious guy sitting in a Commerce Building office above the nation’s oldest aquarium.

NSTIC set to hand out $2.5 million to direct ID effort

By John Fontana for Identity Matters | July 3, 2012 ZDNET

The organization driving the government-led digital identity strategy known as NSTIC said Monday it will name in the next few weeks a private organization that will shepherd the overall plan toward completion.

The move represents a significant milestone in the effort to create an “identity ecosystem” that provides secure identities for online transactions while limiting the disclosure of personal information. The system calls for both public and private accredited identity providers and a choice of identity credentials.

First NSTIC steering group meeting set for Aug. 15-16?

By John Fontana for Identity Matters | July 19, 2012 ZDNET

Vail, Colo. – The private-sector group named last week to lead the effort to create a digital identity strategy known as NSTIC will hold its first meeting Aug. 15-16 in Chicago.

In addition, the National Strategy for Trusted Identities in Cyberspace (NSTIC) will name in early September the winners of its pilot program to participate in a pilot program.

Finally On Wikipedia

 as of 7/22/2012

The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure online identities for Americans in cyber space. The aim of the proposal, according to Howard Schmidt, the White House Cybersecurity Coordinator, is to create an ‘identity ecosystem’ where individuals and organizations can complete online transactions with confidence that the individual who they are conducting business with is not impersonating someone else.

Schmidt also outlined that the NSTIC would also reduce the need to remember potentially insecure list of usernames and passwords. Schmidt highlighted that enrollment in the ‘identity ecosystem’ of individuals would be entirely voluntary and individuals can choose whether or not to obtain a credential. The measure also gives individuals control over what private information they use to authenticate themselves over time.

Background

The impetus for the policy move by the Obama Administration is part of the Cyberspace Policy Review published in June 2009. The NSTIC proposal was released in draft form in June 2010 along with a website set up by the Department of Homeland Security to elicit feedback and ideas from people. On April 15, 2011, the final draft of NSTIC was released by the White House. In this version of the draft the role of the federal government was toned down and highlighted its role as merely a facilitator in establishing the ecosystem. The effort has to be led by the private-sector.

Criticism

The proposal has generated a lot of criticism since it was released in draft form by the White House. A lot of criticism been centered around privacy implications of the proposal.

Shortly after the draft’s release, the Electronic Privacy Information Center, in conjunction with a number of other consumer-rights and civil liberties organizations,sent the Committee a statement in response to the draft NSTIC policy, requesting that the White House provide a clearer and more complete plan to create and safeguard Internet users’ rights and privacy.

The Obama White House released its final NSTIC guidelines in April 2011. While EPIC head, Marc Rotenberg, called NSTIC “historic,” he also cautioned that “…online identity is complex problem and the risk of ‘cyber-identity theft’ with consolidated identity systems is very real. The US will need to do more to protect online privacy.”

Additional Reading

The Complete Biometric Citizen Registry of Corp/Gov ID  for access to e-systems

The National Strategy for Trusted Identities in Cyberspace

http://epic.org/privacy/nstic.html

http://epic.org/privacy/cybersecurity/default.html

http://privacy.org/privacy_coalition_comments_trusted_ids.pdf

http://www.nist.gov/public_affairs/releases/whitehouse_nstic.cfm

Google CEO very, very proud of overthrowing government

with 11 comments


Google’s CEO Eric Schmidt supports Overthrow of government and total transparency? Yes, I think so…but who can trust a RAND, CIA and NSA Created Corporation’s CEO? A Google Run Rebellion and Uprising? Not the Google rebellion Murdoch had in mind?

 

Google’s cyberactivist Wael Ghonim, an executive at the company emerged as a leading voice of the Egyptian revolution and spearheaded the uprising.

Mr Ghonim is head of marketing for Google Middle East and Google North Africa.

How did he help facilitate and become one of the leaders of the Egyptian Re-publicing? For the last half year he created brush fires in the hearts of Egyptians Everywhere with the page ‘We are all Khaled Said’. Named in honor of a 28-year-old Egyptian protester who was tortured by Egyptian police.

The ‘We are all Khaled Said’ Facebook page, Twitter Account, Google technology and excellent search tools that Ghonim used, helped spark the uprising that toppled President Hosni Mubarak’s regime.

And Just like Khaled Said, in a DHS Police Styled Secret Arrest, Ghonim was illegally captured by the Egyptian Government’s Military Police.

“We are All Wael Ghonim.” Became the Battle Cry of the People, the “I am Spartacus” of Egyptians in Google’s Revolution Factory, Alliance of Youth Movements and the Color Revolution 2.0

As the revolution seemed to be losing steam, seemingly against all odds, Mubarak fled, had a stroke and 30-year-old Ghonim was released from police custody after 12 days.

Credited with re-energising the movement, Ghonim’s release has placed him and Google as the warriors of the people and victory.

“We are very, very proud of what Wael Ghonim was able to do in Egypt, they were able to use a set of technologies that included Facebook, Twitter and number of others to really express the voice of the people. And that is a good example of transparency. And we wish them very much the best. I have talked to him. We are very, very proud of what he has done.” said Google’s CEO and Leader Mr Schmidt in Barcelona.

Would the reaction of Mr Schmidt be the same if any of the United States Execs; Nikesh Arora, Shona L. Brown, David C. Drummond, Alan Eustace, Patrick Pichette or Jonathan Rosenberg, created the website ;

‘We are All Kenneth Michael Trentadue’, ‘Bernard von NotHaus‘ or ‘Richard Fine‘  

What if this same executive at Google US Sparked a revolution in America, Demanded a new government here, and called for transparency into the Federal Reserve and Federal Agencies as a good example of a Free and Just People?

I for one do not want a Google Executive run and controlled Revolution in America.

However, Silence No One and Speak the Truth.

An Informed Public Will Resist Tyranny
We are the Resistance.
Resistance is Victory.

Don’t Be Evil? 10 Ways In Which Google Runs The World

 

 

-sovereignthink

American Internet Kill Switch 2.0 or Switched Killer Internet – Target Kill Switch Mislabels Over 80,000 Innocent Americans

Google Gates Jobs gate; The RanD Giants Conspiracy

Video Exposing Google Chief Schmidt Censored by You Tube

Information Warfare

with one comment


Information Warfare

Title Post links
what causes fear in the public 2010/03/07/what-causes-fear-in-the-public/
iceland the new land of the free and home of the brave 2010/03/10/iceland-the-new-land-of-the-free-and-home-of-the-brave/
enemy belligerent 2010/03/13/enemy-belligerent/
federal judge finds n s a wiretapping program illegal 2010/04/04/federal-judge-finds-n-s-a-wiretapping-program-illegal/
what acts are we enabling our government with 2010/05/16/what-acts-are-we-enabling-our-government-with/
the great shell game of america 2010/06/21/the-great-shell-game-of-america/
what protects us from tyranny 2010/06/22/what-protects-us-from-tyranny/
usawc mexico strategy research project civil edition 2010/07/02/usawc-mexico-strategy-research-project-civil-edition/
antonovich mexico and los angeles county 2010/07/14/antonovich-mexico-and-los-angeles-county/
global elite fear internets power 2010/07/20/global-elite-fear-internets-power/
obama holds usa border security hostage 2010/07/22/obama-holds-usa-border-security-hostage/
oz vs toontown genius all around 2010/07/23/oz-vs-toontown-genius-all-around/
antonovich and la county bos ban successful industry for fear of robbery and to keep crime down 2010/08/07/antonovich-and-la-county-bos-ban-successful-industry-for-fear-of-robbery-and-to-keep-crime-down/
what is national security 2010/08/23/what-is-national-security/
machete race wars – creating the new jews 2010/09/05/machete-race-wars-%e2%80%93-creating-the-new-jews/
exslaves shared 14th amendment with the devil 2010/09/12/exslaves-shared-14th-amendment-with-the-devil/
schrodinger’s vote 2010/11/05/schrodinger%e2%80%99s-vote/
read my lips the federal reserve will not monetize the debt 2010/11/08/read-my-lips-the-federal-reserve-will-not-monetize-the-debt/
obama slammed china launches missile off la 2010/11/13/obama-slammed-china-launches-missile-off-la/
the secret of nist 2010/11/15/the-secret-of-nist/
owen jj stone and john tyner 2010/11/16/owen-jj-stone-and-john-tyner/
DA Investigating Felony Groping in TSA Revolt –

Federal Fondling Destroys Left Right Party Prison System

2010/11/17/investigate-felony-tsa-groping/
‘Enough is Enough’

Ron Paul Calls for End of Federal Government Criminal Activity

2010/11/19/enough-is-enough-ron-paul-tsa-bill/

Global Elite Graph – A Global Governance Timeline

The Rhodes to a New World Order

 

2010/11/20/elite_graph_global_governance_timeline/

Global Elite – Creating a Global Governance Prison System

2010/11/25/global-elite-creating-global-prison-system/

Activist Post: Endgame Legislation: Lame Duck Session Ushers in Tyranny.

2010/11/27/activist-post-endgame-legislation-lame-duck-session-ushers-in-tyranny/

A Generation Lost in Space – 1970-2010

2010/11/27/a-generation-lost-in-space/

Department of Homeland Security MindReading Division Future Attribute Screening Technology F.A.S.T.

2010/11/29/department-of-homeland-security-mind-reading-division-future-attribute-screening-technology-fast

Global Climate Elite Cancun  – Global Population Relocation

2010/11/30/global-climate-elite-cancun-global-population-relocation

Threat from PETN or PENTAGON?

2010/11/30/petn-or-pentago/
The Bankers or US – It’s Openly Admitted, It’s Fraud, It’s a Scam and It Can Never Be Repaid 2010/12/02/the-bankers-fraud-or-us/
COICA Gives Federal Police Editing Power of the Internet – Goodbye Guttenberg 2010/12/04/coica-federal-police-internet-editing/
United States Mainstream Media Has Been Nationalized 2010/12/06/nationalization-of-mainstream-media-mysteriously-missing-from-media/
End the Fed – Ron Paul Heading Central Bank Panel – What’s After the Fed? Bring the GreenBack Back, Demand State Owned Commodity Banks!  2010/12/09/end-the-fed-demand-state-owned-banks/
Failed Cancun Conference Produces $600 Billion UN Planned New World Economy: Controlled Population Relocation, Re-Wilding Industrial ‘Zones’, Social Reformation, Carbon Austerity Equitization  2010/12/10/failed-cancun-conference-produces-600-billion-dollar-plannednew-world-economy/
Internet Theatre of War WWW Lock Down Due to False Flag WikiLeak CypherPunks and Hacker Provocateur Terror Hype and Propaganda on Info BombShells 2010/12/10/internet-theatre-of-war-censorship-over-flase-flag-wikileak-cypherpunk-threa/
With the Dollar Dead What’s After the Fed? We Go Global or We Go Local 2010/12/12/with-the-dollar-dead-what%e2%80%99s-after-the-fed-we-go-global-or-we-go-local/
Conspiracy Theory Private Investigators or Domestic Risk, Enemy Belligerent and Policey Impediment 2010/12/14/private-citizen-investigator-conspiracy-theorist-or-domestic-risk-enemy-belligerent-policey-impediment/

Strip Mining Bryce Canyon for “Federal” Coal Exports to China

2011/01/04/strip-mining-bryce-canyon-for-china-debt-exports/
Don’t Take Their Shot of the Living Dead, Don’t Drink Their Black Water, Don’t Buy Their Zombie Injections 2011/01/06/shot-of-the-living-dead-and-their-black-water-treatmen/
The Legacy of Arnold Schwarzenegger and The Fine Prison System 2011/01/09/legacy-of-arnold-schwarzenegger-the-fine-prison-system/
Clowns to the Left, Jokers to the Right, Blamed and Accused in the Middle with You 2011/01/11/clowns-left-jokers-right-ignored-middle-you/

Obama NSTIC

2011/01/11/obama-nstic/

Intercepted Cable – Total Population Control

2011/01/12/cable-intercept-total-population-control/
Food Safety Modernization Act Unconstitutional – Caps Agriculture, Destroys Local Farms

2011/01/13/food-safety-act-unconstitutional-caps-small-farms/

Stop Think Connect – The Police State DHS Dots

2011/01/13/stop-think-connect-the-dhs-dots/
National CyberSecurity Operation Perfect Citizen – Trustmark Citizenship 2011/01/18/national-cybersecurity-operation-perfect-citizen/
China Buys-Up America’s Local Bond Markets, Launching Financial Takeover at Last Local Vestige of US Value – China Now Owns America 2011/01/20/china-buys-up-americas-local-bond-market/

 

 

-sovereignthink

%d bloggers like this: