Sovereignthink

Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘Identity Ecosystem

Google Gate – An Intelligent Prison is this Smart Grid

with 6 comments


Cyber-Transformation Actions–US Program to Detect “Resentment” and Other Terrible Human Emotions

featured on – Alan Watt ‘Cutting Through The Matrix’ – January 18th, 2012

http://dprogram.net/2012/01/19/alan-watt-cutting-through-the-matrix-january-18th-2012/

Global Governance – Individual Austerity Control – A Recent Timeline to Total Enslavement

Barrack Obama has launched National Cyber-Transformation actions in the United States with the announcement of the Commerce Department’s new division of The National Strategy for Trusted Identities in Cyberspace NSTIC, announced at Stanford University Jan 2011.

The United States Executive Using STUXNET, WIKILEAKS, CYBERATTACK, Identity Theft as well as Venezuela/China styled National Security rationale of denouncing out rage toward public authorities, inciting hatred, engender resistance among the general public or endanger public order as crimes against the state.

 “A Swiss professor working with a Massachusetts Institute of Technology scientist who heads the Mind Machine Project there outlined how this program operates through computerized scanning of phone calls and electronic messages sent through e-mail and social networking mechanisms,” reports the Buffalo News.

The system works by detecting “resentment in conversations through measurements in decibels and other voice biometrics,” more specifically the emotional spikes that characterize “hatred and deep resentment toward government.”

“As for written transmissions scrutinized by the computer program, it can detect the same patterns of fixation on specified subjects,” states the report.

Once an individual has been identified as harboring “resentment toward government,” the information can be “passed along to authorities so surveillance can begin.”

Google Spies World Wide (‘We know all’)

**News Corp ‘News of the World’ Spying Operations Small Time Compared with Giant Google**

Google is integrated in management of major police forces email and communication systems through out America, they provide intelligence to federal threat fusion centers, DHS, FBI, ICE, Local law enforcement, CPS, etc. This might be why their activities do not get called in for hearings. (These activities would provide ‘dirt’ on everyone).

Department of Homeland Security Mind Reading Division

– Malintentions Future Attribute Screening Technology (FAST)

The Big Brother Orwellian; Google Gates Jobs gate; The RanD Giants Police State

2012 – Is the Government Watching and Warring with the Public?

NDAA: citizen detainment – SOPA: civilian targeting

 

How many times do you flush, too much hot water, which of the 250 devices in my house am I using? National Security needs gets to know.

Now we need a Big Brother ‘Black Box’ to keep us safe at Home and a Smart Grid to keep us safe in the World?

And Mainstream Corporate Statism Industry is to Take Over by these Physical Controls?

The New Freedom is; we are being asked to give into Uniform Spying Equipment Installed in each Home to Monitor Everyone Equally and Totally.

We are being told that in order to enjoy the level of freedom that we currently have, we must be safe, we must do the democratic thing and Install Big Brothers Home Monitors. We must create a smart grid that will allow Corporate Statism to monitor and control every aspect of your life.

One of the Corportate Statism’s pushers, Democratic Sen. Jay Rockefeller said this was not for just military or intelligence concerns. “It is a lot more than that. It suddenly gets into the realm of traffic lights and rail networks and water and electricity,”

Nancy Pelosi slipped the fact that “Every aspect of our lives must be subject to inventory” in order to fight global warming in reference to her China visit

Mark Klein reported the multinational corporation he worked for was doing this at the government’s request.

The “vacuum-cleaner surveillance” approach grabs everything. “Despite what we are hearing, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA [the Foreign Intelligence Surveillance Act],” Klein said in 2006.

Interstate 15 all through Utah is License Plate Camera Tracked, Virtually Every Mile, Every Traffic Light in Every One Traffic Light Town! Everywhere we go, they know. Taxed by the Mile and Toll Roads or Freedom to Travel?

Orwell’s eyes would be spinning at this Unnatural in name of Saving Nature, this terrifying war on terror, this Intellegent Prison, this Smart Grid.

 

 ‘Publicly Available Social Media Monitoring and Situational Awareness Initiative of 2010’or Media Monitoring Initiative (MMI) under which;

The Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), will launch and lead the Publicly Available Social Media Monitoring and Situational Awareness (Initiative). The NOC and participating components1 may also share this de-identified information with international partners and the private sector where necessary and appropriate for coordination (of SPYING on the Public).

And in the latest Privacy Compliance Review of the Social Media Monitoring and Situational Awareness Initiative in 2011

IV. BROADENING OF SCOPE

Based on OPS/NOC’s demonstrated compliance with the June 22, 2010 PIA and consistent with the statutory mission of OPS/NOC, PRIV and OPS/NOC decided to further broaden the program’s capability to collect additional information in a limited number of situations in order to respond to the evolving operational needs of DHS and OPS/NOC. PII on the following categories of individuals may be collected when it lends credibility to the report or facilitates coordination with federal, state, local, tribal, territorial, foreign, or international government partners:

i. U.S.and foreign individuals in extremis situations involving potential life or death circumstances;

ii. Senior U.S. and foreign government officials who make public statements or provide public updates;

iii.U.S.and foreign government spokespersons who make public statements or provide public updates;

iv. U.S.and foreign private sector officials and spokespersons who make public statements or provide public updates; and

v. Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and /or social media in real time to keep their audience situationally aware and informed.

vi. Current or former public officials who are victims of incidents or activities related to Homeland Security

vii. Known terrorists, drug cartel leaders, or other persons known to have been involved in major crimes or terror of Homeland Security interest who are killed or found dead.

Google Gates Jobs gate has seen the 20 year Implementation of a Globally Centralized Big Brother system, under an electronic Smart Grid, an Intelligent Prison Planet and the birth of the Electronic Citizen Rating Eco-system in Determining Individual Trustmark (e-C.R.E.D.I.T.)A Price Tag and Tracking Tag for Every Person in the World, the Human Resource, the marked beasts of burden. Personal Austerity.

This has been reached with total government and private market integration since 1900. The Modern incarnation is that of complete mobile phone movement recording and storage, auto filtering and filing all electronic communications, all purchases and transactions, monitored in home activity and energy usages, Centralized Circuit (C.C.) Fusion Center integrated Cameras and monitoring systems with bio, plate, behavioral monitoring systems, expanded enhancements into private/municipal surveillance grids, as well as network accessible IP cameras in the Hands of Every, Thought Crime, Suspicious Activity and MALINTENT Reporting, Child in America.

This in addition to centrally regulated integration and data basing requirements of the public and private; financial, transportation, communications industrial, and commerce sectors, have allowed government enforcement near TIA (total information awareness) and intelligence factoring of individual predictive capacity up to 80% of actuaries.

Under the Banner of Central Planning, of Lowering Costs, Integration, Limiting Waste, preventing APGCH, Identify Theft, Patient and Consumer Protection, Patent and Copy Right Protection, Child Protection, Drugs, Terrorism, Domestic Extremism, Inciteful Radicalism and for Security in Home Land Investments, we have been enslaved in a valueless Credit system of speculation and fear.

There can be no Speculation on Personal, Private, Individual; Freedom, Liberty and Justice. We the people either have it or we don’t.

The most rare, the most unique, the most singular creation on earth is the individual human being.

For any Individual to be rated, determined, planned, controlled, ordered, regulated or limited by force, fraud or coercion is the gravest of all Crime.

It is the Crime in Violation of the Law and the Principle.

It is Tyranny and Oppression over the heart, mind, will, spirit, soul, value and potential of an infinite singularity of untold capacity for creation. 

It is slavery of every action and a lien on every increase that any individual ever dares to dream to do.

Standup, Speak the Truth, Go Local and Re-Public

-sovereignthink

Commerce/Corporate

National Security

Advertisements

The United States and Venezuela Launch Chinese Style Hostile Internet Takeover

with 11 comments


The United States and Venezuela Launch Chinese Style Hostile Internet Takeover Speech

Venezuela curbs Internet time for dissent

by CYBER WAR Staff Writers – YOUR WORLD AT WAR
Caracas, Venezuela (UPI) Dec 22, 2010

In December 2010 Hugo Chavez Launched Dictatorial Executive Powers that equate the Internet media with the broadcast media in order to introduce Broadcast Media regulations and New CyberSecurity Regulations for Internet Users, ‘Journalists’ and ‘Publishers’.

The announced measures introduce fines as well as other punitive and National Investigatory measures of Web site owners or publishers who Pose Domestic Cyber Threats and Violate the Government’s CyberSecurity Regulations.

Interpretation of what constitutes fair comment or is damaging dissent and Belligerent CyberCrime is Determined by Federal Officials and Extra Judiciary Councils.  A Venezuelan Social Responsibility Law, approved by the National Assembly, Forces Citizens Internet Use Under National Broadcast Regulation.

Chavez defended Massive Regulation Increase “We aren’t eliminating the Internet here … nor censoring the Internet, What we’re doing is protecting ourselves against crimes, cyber crimes,” – MercoPress

The Venezuelan law prohibits Internet and Electronic transmission or dissemination of messages and images that could be disrespectful toward public authorities, incite hatred or even engender “anxiety” among the general public or endanger public order.

Barrack Obama has Launched Sister National Cyber-Transformation Actions In the United States with the Announcement of the Commerce Department’s New Division of The National Strategy for Trusted Identities in Cyberspace NSTIC Announced at Stanford University Jan 2011

The United States Executive Using STUXNET, WIKILEAKS, CYBERATTACK, Identity Theft as well as Venezuela’s National Security Rationale of Denouncing Out rage toward public authorities, inciting hatred, engender Resistance among the general public or endanger public order.

Commerce/Corporate

United States Cyber Challenge

National Strategy for Trusted Identities in CyberspaceNSTIC

State and Corporate TrustMark Registration Service Providers

Identity Ecosystem Governance Directorate

Domestic SMART GRID Integration

Network Surveillance Sensors/Dark Fiber Junctions

Corporate CyberSecurity Infra-Guard Perfect Citizen Employee Integration

Integrated Metro, Transit and First Responder Surveillance Network

National Security

CYBER Security Military Command

CyberSecurity Infra Guard Threat Fusion Centers

Future Attribute Screening Technology – FAST

Department of Homeland Security DHS MALINTENT

Anomaly Detection At Multiple Scales ADAMS

PERFECT CITIZEN Human Factors Behavioral Sciences Projects

Office of Science and Technology Policy OSTP Executive Office of the President

Human Factors Division, National Institute of Science and Technology Directorate NIST and DHS

-sovereignthink

Stop, Think, Connect the Dots; The Patriot Act, FEMA, DHS, Infra-Guard, TSA, NSTIC and TrustMark Citizenship

with 29 comments


Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship

Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry 

Individual Citizen to Register for State or Privately Provided Personal Trusted IDentity Card under The National Strategy for Trusted Identities in Cyberspace (NSTIC) and the ID-entity Ecosystem Obama Granted the U.S. Commerce Department Authority over CyberSecurity efforts to create an Internet ID for Americans and the NSITC TrustMark has Field Tested Well.

A Trustmark is a badge, seal, image or logo that indicates a product or service provider has met the requirements of the Identity Ecosystem, as determined by an accreditation authority. To maintain trustmark integrity, the trustmark itself must be resistant to tampering and forgery; participants should be able to both visually and electronically validate its authenticity. The trustmark provides a visible symbol to serve as an aid for citizens and organizations to make informed choices about the providers and identity media they use.

The NSTIC Governance Authority oversees and maintains the Identity Ecosystem Framework and defines the rules by which a product or service providers in the Identity Ecosystem attain TrustMarks. In addition, the NSTIC Governance Authority Oversees certifying organizations that wish to become Accreditated Authorities.

Imagine it…If you don’t Signup to be a TrustMarked Citizen?

Imagine it…If you don’t Register in the NSTIC IDentity Ecosystem?

Imagine it…and All the things that you can do now but will not be allowed to if you don’t become Part of the Trusted Mark.

Stop, Think, Connect and Try to Imagine this is voluntary

For Economic Security and Internet Integrity Trustmark Citizens and Trustmark Companies Will Eventually Have Exclusive Access to the Following

1. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

A New TrustMark Citizen voluntarily requests a Free NSTIC Smart Identity Card from her home state. The TrustMark Citizen chooses to use the card to authenticate herself for a variety of online services now available to her including:

  • Credit card purchases
  • Online banking
  • Accessing electronic health care records
  • Securely accessing her personal laptop computer
  • Anonymously posting blog entries
  • Logging onto Internet email services using a pseudonym

2. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

A New TrustMarked Citizen gets NSTIC access to online services using a TrustMark service provider.

He learns that his cell phone carrier, bank, and local governments will all be offering credentials that will work with his biometric security enabled personal computer.

Upon further research, he also discovers that his email provider, social networking site, health care provider, and local utility companies mostly accept his chosen TrustMark NSTIC service provider.

The Free Trusted ID-entity TrustMark Provider is Alright and meets most of his needs. He doesn’t need to pay for a Super Trusted ID TrustMark Service Provider, Extra Hardware, Bio-Chip or Smart IDentity Card from the State. (maybe if he had a blog or ran a website)

He reflects upon his choices available and selects the credential provider that provides him with the most personal convenience at the best price.

3. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

An online auction website Adopts the NSTIC TrustMark policy that it will now Only accept TrustMark-approved credentials.

The auction incentivizes private sector organizations and citizens to participate by offering a one-time discount on the service charge associated with an auction purchase and by accommodating a large variety of NSTIC credentials and TrustMark identity media.

4. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

A Trusted Citizen authenticates himself to an online NSTIC pharmacy using a TrustMark credential bound to his personal computer. The Trusted Citizen makes an online request for the pharmacy to fill his prescription.

Through privacy-enhancing technology, the citizen’s attribute provider provides authoritative proof that he is over 18 and that his prescription is valid. The technology ensures that no unnecessary information is exchanged in this transaction (e.g., his birth date, reason for the prescription). The technology also filters information so that the attribute providers –the authoritative sources of the age and prescription information – do not know which pharmacy the citizen is using.

5. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

Allowed Accesses to the energy company’s website to view the status of your TrustMark home’s energy consumption. The website allows Trustmark citizens to view the energy intake of high-consuming devices such as refrigerators, microwaves, and stoves. The TrustMark citizen notices that the power attributed to a particular device is higher than normal, indicating that the device may need to be fixed or replaced.

6. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

A power utility remotely Monitors All Power Activity with Up to 180 devices per Trustmark Home via Smart Grid software deployed on TrustMark Trusted Electricity Meter. Trusted hardware modules and secure authentication between the power company and the meter ensure that the hardware and software configurations are correct; and restrict meter software to only run on authorized meters. Likewise, the meter trusts that instructions and periodic TrustWare Software upgrades come from the NSTIC enabled power company. These TrustMark interactions reduce the threat of fraudulent activity and deployment of malware within the Smart Grid TIA System.

7. New Exclusively Only for NSTIC IDentity Registry TrustMark Citizen’s

A Trusted Citizen uses a Super Trusted ID TrustMark Service Provider credential issued by a Third Party Bio Chip and bound to his existing cell phone to access government tax services online. He views tax history, changes demographic information, monitors refund/injection status, and has his taxes filed taxes electronically for a TrustMark Citizen e-IDentity Filing Discount because Both the online IRS service provider and the citizen are able to leverage existing infrastructure (e.g. Trustmark, Bio Chip, Cell Phone and Online NSTIC Services) in support of the transaction.

-sovereignthink

 

‘Stop. Think. Connect’ DHS Announces New Fear Agenda

If you see something say something…Well I see Federal Government Terrorizing Propaganda. The Government is Asking Neighbors and WAL-MART Shoppers to Report “SOMETHING” on Each Other

The White House Blog

The National Strategy for Trusted Identities in Cyberspace

%d bloggers like this: