Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘internet control

Private Spy Corporation works for Pentagon to Avoid Constitution Stumbling Block of Liberty and Freedom

with 7 comments

Private Corporation, Project Vigilant, Spying on Citizens for Federal Secret Police

Private Spy for Pentagon to Avoid Constitution Stumbling Block – Elite Fear Exposure and Awakening

Project Vigilant is a Private organization that tracks 250 million IP addresses a day, and there are only around 300 million people in the USA. If you remove most of the Governments Employees and those that don’t have internet access every private citizen could be tracked.

Project Vigilant is a private corporation and is not held to the limits of the CIA and Government Secret Police, such as, judicial search warrants, probable cause, due process, expected privacy, etc.

Project Vigilant has been developing portfolios on Internet users since 1996 and handing the “Internet villains” information to U.S. Secret Police agencies as part of a massive intelligence gathering program.

As the latest incarnation of the Total Information Awareness spy program was revealed at yesterday’s Defcon security conference, in an effort to add more recruits to its 600 member strong cyber spy force Project Vigilant went public.

Project Vigilant’s manifold methods for gathering intelligence includes collecting information from a dozen regional U.S. Internet service providers, because the companies included a provision allowing them to share users’ Internet activities with third parties in their end user license agreements (EULAs), Vigilant was able to legally able to gather data from the Internet carriers, can develop portfolios on any name, screen name or IP address and use it to craft reports for federal agencies.
Project Vigilant director Chet Uber also founded InfraGard, the ominous FBI-affiliated public-private partnership that is a key component of the unfolding implementation of martial law in the United States. InfraGard made its intentions to act as a political police force clear in March 2009 when the group announced that questions surrounding Barack Obama’s presidential eligibility were “potentially harmful to civil order and national security”.

Uber’s organization poses as a volunteer orientated crime-fighting private outfit, and yet it is nothing more than a tentacle of the military-industrial complex’s sprawling unconstitutional internal spy apparatus.

Project Vigilant is an offshoot of the Pentagon’s Defense Advanced Research Project Agency’s Total Information Awareness, a program designed to catalogue, “Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend,” as the New York Times’ William Safire wrote in November 2002.

TIA, symbolized by its logo of an all-seeing eye atop a pyramid shining upon the globe, was supposedly nixed by Congress shortly after it became public, but the program merely went underground and continued as a part of the Pentagon’s “black budget” and in conjunction with a 1000s of private contractors in the same mould as Project Vigilant.

As Capitol Hill Blue reported back in 2004, “Despite Congressional action cutting funding, and the resignation of the program’s controversial director, retired admiral John Poindexter, DARPA’s TIA program is alive and well and prying into the personal business of Americans 24 hours a day, seven days a week.”

DARPA has hired private contractors to perform the exact same duties set out in Total Information Awareness, and Project Vigilant is undoubtedly one of them. By hiring private companies to do the dirty work of spying on the American people, Congressional audits can be avoided and legal barriers can be sidestepped.

Project Vigilant is clearly nothing less than a government controlled attack dog fulfilling its role to implement the cybersecurity agenda, which as we have exhaustively documented has nothing to do with security and everything to do with political oppression, Chinese style Internet censorship, and the total evisceration of free speech on the world wide web and police action against dissent or exposure.

For Example, the target of one such investigation did not fall into the category of cyber criminals – “terrorists, drug cartels, mobsters” – that the group claims to be fighting.

Project Vigilant “encouraged one of its “officers”, researcher Adrian Lamo, to inform the federal government about the alleged source of a controversial video of civilian deaths in Iraq leaked to whistle-blower site Wikileaks in April,” reports Forbes.

Project Vigilant director Chet Uber used Lamo’s friendship with Bradley Manning, the former U.S. Army intelligence analyst who allegedly released the classified video, to out Manning, who now faces criminal charges. Uber told Lamo that it was his “patriotic duty” to inform on the man who was instrumental in bringing to light the war atrocities witnessed in the infamous “Collateral Murder” video, which shows U.S. troops slaughtering over a dozen innocent people and injuring others, including two children, Sajad Salah and his little sister Duaa Salah.

This ‘Belligerent’ Whistleblower, Whistleblowing only came to light because of the widespread alternative media coverage. Who knows how many ‘enemy belligerents’, ‘unprivileged enemy’, ‘political dissidents’ and those that expose government crimes or Sovereign Individual Violations?


Cyber ‘Security’ Bills

Senate Bill 773 and 778 ‘‘Cybersecurity Act of 2009’’`Cybersecurity Enhancement Act of 2010′ TXT

Full Text; HR 4061 EH “Orwellian Control of Non-Monopolized Media”

Global Elite Fear Internet’s Power

with 13 comments

Elite’s Social Scientists Provide Most Limited Options within Margin of Exposure in Almost 50 years.

‘Not since 1963 have we been so close to total exposure’, says global elite leader at critical Conference!

The 2010 President Secretary of Speakers of Oceania gave a chilling speech this week at the Yearly Oceania Unified Conference (Y.O.U.C.) in a talk entitled “The Information War 2010-2012”

He served as the Operation BLACKOUTBLACKOUTBLACKOUT Chairman from 1989-1999 and is recognized as one of the three Senior Contributing Scribes for Agenda 21.

The follow is a Transcript of the speech;

‘Thank you, hello Gentlemen and Ladies. Thank you for that introduction, short is always better and it leads well into my topic here tonight. We are losing the Information War.

‘If the Infowars question is not resolved, in the next few years we will have total breach of focus containment in key nations due to our shortened timeline of operations, as well as the weak reactions and regulation enforcement provided by crucial agencies within the last decade.

‘The Digital Universe Monitoring and Electronic Regulation system, (D.U.M.E.R.) and general W.W.W. containment services have been less and less successful, while having, more and more, to modify display trends and required constant manual algorithm adjustments to maintain the Web. Some subjects have to run continuously at massively limited fractal query figures with additional constant placement reductions or total banning. Total censoring of well known nodes however now only increases the fractal controls required by magnitudes, sometimes within minutes or seconds. Slow Fractal Filtering (S.F.F.) and focused measures for key and unknown or smaller fringe Individually Developed Internet Operational Targets, I.D.I.O.T.s are still most effective means of maintaining trends. However recently the number of Unpredictable Uncontrolled Unified Mass Movement, (U.U.U.M.M.) events, have increased in trending faster than S.F.F.s and I.D.I.O.T. targeting have been able to manage within any standard target level control quotas.

‘We are permanently in the red, permanently in the red.

‘Examples for U.U.U.M.M. vary but can be as common place as a 3 minute posting edited from a video call or individual computer cameras can cause unprecedented exposure of BLACKOUTBLACKOUTBLACKOUT if not caught quickly and countered.

‘The most pressing data is not the individual mainstream U.U.U.M.M events but rather the I.D.I.O.T.s. These can range from private blogs, to news postings sites, to independent unregistered reporting (I.D.I.O.T. qualify at 1 million visits/wk and can range up to 35 million visits/day). I.D.I.O.T.s are the breach point and dictate mainstream exposure of N.I.C.E. operations. They are primarily investigative, whistleblower and news websites that produce continual exposure of objectives and operations critical to the success of BLACKOUTBLACKOUTBLACKOUT.

‘They also strongly promote Loyal Local Enclave Participation and Recruitment L.L.E.P.A.R.s. SFF is easily exposed exponentially in reverse fractal. This is understood and utilized by I.D.I.O.T.s.

‘While standard processes can be used for U.U.U.M.M. event’s, I.D.I.O.T.s are targeted conscious efforts that are too monitored and deliberate to effect with S.F.F. standard processes without exposure.

‘This has caused an increase in franchise generated events and headline debasement, in order to ensure majority demographic attainment and contain focus. This however leads to restlessness, instability and overall product decline and thus a condensed timeline.

‘Not Since the moment to minute days of, when Cuba’s Castro; in defiance of our Empowered Imperial U.S.S.R., and JFK; in defiance of our BLACKOUTBLACKOUTBLACKOUT in the U.S.A., were about to forge the first truly open disarmament treaties by exposure and introduce the People’s Independent Currency P.I.C. in the joined pricing and printing of Cuban-United States interest free silver certificates and the aftermath of that near exposure, has the N.I.C.E.’s objectives been more obfuscated and it’s posterior caretakers in imminent danger.

‘The N.I.C.E. is prone to levels of exposure however our efforts in the implementation of the recommendations of the Social Scientists have been offset in their timeline and must be accelerated. This offset in the timeline can be traced directly to the introduction of the initially unfettered WWW that was to be a 33 year introduction and follow the same flightplan as the transistor, microchip and processor. The introduction of new markets has always been and will always be the most unstable time in economic creation waves and often lead to setbacks or accelerations.

Let me play you this audio clip to give some perspective.

            (Recording begins)

Agent At Post: I think something’s hitting in the seaches.

Agent In Charge: What do see?

AAP: Yeah, Something just hit online. What the hell?

AIC: What is it?

AAP: Well we didn’t have anything nearly this big planned or this targeted scheduled today and this is weird, it’s inter national.

(Phone Rings)

AIC: Hold on a second. You got the notice? We see it…


AAP: Jesus, this is a global mind meld. What the hell is topical calcium fluoride v ingested sodium fluoride?

AIC: Hold on, hold on. What did you say?

AAP: calcium fluoride v ingested sodium fluoride, they are hopscotching, 3 million in what, 45 seconds?

AIC: What was the hit?

AAP: 3 mil…no 5 million searches, AP is gonna pick this up, it’s still…

AIC: No the, Let me see…Oh Crap, we’ve got a…Pull it down!

AAP: What?
AIC:  6 million Pull the fist three pages.

AAP: What?

AIC: We have a **cken info bomb here…It’s dead on, it’s, it’s yes, defiantly prept, may be a worm but this looks… we have 6 million here, do you want me to…?


AAP: I am pulling the threads…Done, 4 different search variation, there blocked from the trend history.

AIC: Got it. No it’s done. I got it, yes, I know.

AAP: What was that?

AIC: Someone clearly broke into the system and we had a breach. (Intercom) Security, can I get a debrief unit and escort in surveillance Control Room 12?

AAP: They must own the system, I mean what program can do that, it was amazing!

AIC: I have someone coming from HR and security to debrief you and me so that we can get as clear an idea of what happened, it’s gonna be a big change in the algorithm and regulation requires the debriefing report for the exchange commission so it’s kind of a big deal. You know, make sure that anomalies aren’t insider, market manipulation. Ha ha…

Internal Security Agent: You needed a debriefing and filing?

AIC: Yes we had a breach and changed protocol for containment.

AAP: Holy **it! Look at this, there has to be at least what 4 more!

AIC: Take him to the debriefing and I’ll what for my escort. The auto systems have this now so you can go.

AAP: That’s incredible!

ISA: Let’s go.

AIC: Okay, Let’s Go.

AAP: Look at this Fluoride Censored, sodium fluoride Censored? They knew we would kill it…I mean all those ISP’s. That has to be organic, noone can get that much access.

AIC: Come on, Let’s go.

(AAP leaves with ISA and PCD -end recording)

‘This was in 2005 and it has gotten much harder. If we had pulled the reigns in then we would have easily been able to have another wave cycle but those figures are looking very bleak.

‘But now this hop-scotching runs in figures of 20 to 60 million focused queries such as the google global street view sweep exposure last month. We isolated the main concerns but the google nsa – google spies – google censors – google launches, thread that followed each with over 200 million in minutes has undone almost 60% of the isolation and containment.

‘We must reset our breach point back a decade and stop fighting days, that is the state of where we are at.

‘We must either agree to a new beach head or set deliberate talks to accelerate the full agenda 21 protocol. If that is the course, we must move forward with the power of a tsunami to set the tide and have a pandemic will to succeed in fixing these instabilities with true global regulation and the complete implementation of the N.I.C.E. agenda.

‘The writing is on the, wall we must find our enemies and fast or retreat to re-enforce another day. What was supposed to be a genii in a bottle has become Pandora’s box. And while many may point to virtues of the new derivatives markets and exchanges that would not exist with the W.W.W. one must only look at the risks and know the folly, because we did not need the derivatives and additional markets, only more time. Time is one thing that we no longer have.

‘We have already set over 40% of our efforts on recovery if the Global Carbon Credit System (G.C.C.S.) fails to be implemented and some think this figure is too low. This is entirely due to exposure on the Internet, U.U.U.M.M events and the I.D.I.O.T.s. We are at less than 10% expenditure on the Special Drawing Rights (S.R.D.). This is the reallocation point and must be achieved. We may not be able to establish the complete economic system of controls in the G.C.C.S. but if we loose the ten scale or even the hundred scale to the trillion with S.D.R.s then we fall into the ratio and exposure of the event horizon and we face the dawning effect. We must not be defeated in the Information War.

2010 President Secretary of the Speakers

Yearly Oceania Unified Conference Y.O.U.C. 7/25/2010

For a full transcript of this Y.U.O.C. please contact your global concierge.

(this presentation was in confidence and fiction, all relation of real persons, corporations and agencies is strictly fictional and in just jest)

An Intelligent Prison, is this Smart Grid

with 15 comments

Black Box Big Brother Will See All!

Barrack Obama has Launched Sister National Cyber-Transformation Actions In the United States with the Announcement of the Commerce Department’s New Division of The National Strategy for Trusted Identities in Cyberspace NSTIC Announced at Stanford University Jan 2011

The United States Executive Using STUXNET, WIKILEAKS, CYBERATTACK, Identity Theft as well as Venezuela’s National Security Rationale of Denouncing Out rage toward public authorities, inciting hatred, engender Resistance among the general public or endanger public order.


United States Cyber Challenge

National Strategy for Trusted Identities in CyberspaceNSTIC

State and Corporate TrustMark Registration Service Providers

Identity Ecosystem Governance Directorate

Domestic SMART GRID Integration

Network Surveillance Sensors/Dark Fiber Junctions

Corporate CyberSecurity Infra-Guard Perfect Citizen Employee Integration

Integrated Metro, Transit and First Responder Surveillance Network

National Security

CYBER Security Military Command

CyberSecurity Infra Guard Threat Fusion Centers

Future Attribute Screening Technology – FAST

Department of Homeland Security DHS MALINTENT

Anomaly Detection At Multiple Scales ADAMS

PERFECT CITIZEN Human Factors Behavioral Sciences Projects

Office of Science and Technology Policy OSTP Executive Office of the President

Human Factors Division, National Institute of Science and Technology Directorate NIST and DHS

Engineering a Generation of Domestic CyberSecurity State Policey Enforcement

Political Witch Hunt Begins Are You a TrustMarked NSTIC Registed Citizen or an Enemy Belligerent

National CyberSecurity Operation Perfect Citizen – Trustmark Citizenship 

“A Swiss professor working with a Massachusetts Institute of Technology scientist who heads the Mind Machine Project there outlined how this program operates through computerized scanning of phone calls and electronic messages sent through e-mail and social networking mechanisms,” reports the Buffalo News.

The system works by detecting “resentment in conversations through measurements in decibels and other voice biometrics,” more specifically the emotional spikes that characterize “hatred and deep resentment toward government.”

“As for written transmissions scrutinized by the computer program, it can detect the same patterns of fixation on specified subjects,” states the report.

Once an individual has been identified as harboring “resentment toward government,” the information can be “passed along to authorities so surveillance can begin.”!+City+lamppost+microphones+can+pick+up…-a0230520565

How many times do you flush, too much hot water, which of the 250 devices in my house am I using? National Security needs gets to know.

Now we need a Big Brother ‘Black Box’ to keep us safe at Home and a Smart Grid to keep us safe in the World?

And Mainstream Corporate Statism Industry is to Take Over by these Physical Controls?

The New Freedom we are being asked to give is Uniform Spying Equipment Installed in each Home to Monitor Everyone Equally and Totally.

We are being told that in order to enjoy the level of freedom that we currently have, we must be safe, we must do the democratic thing and Install Big Brothers Home Monitors. We must create a smart grid that will allow Corporate Statism to monitor and control every aspect of your life.

One of the Corportate Statism’s pushers, Democratic Sen. Jay Rockefeller said this was not for just military or intelligence concerns. “It is a lot more than that. It suddenly gets into the realm of traffic lights and rail networks and water and electricity,”

Nancy Pelosi slipped the fact that “Every aspect of our lives must be subject to inventory” in order to fight global warming in reference to her China visit

Mark Klein reported the multinational corporation he worked for was doing this at the government’s request.

The “vacuum-cleaner surveillance” approach grabs everything. “Despite what we are hearing, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA [the Foreign Intelligence Surveillance Act],” Klein said in 2006.

Interstate 15 all through Utah is License Plate Camera Tracked, Virtually Every Mile, Every Traffic Light in Every One Traffic Light Town! Everywhere we go, they know. Taxed by the Mile and Toll Roads or Freedom to Travel?

Orwell’s eyes would be spinning at this Unnatural in name of Saving Nature, this terrifying war on terror, this Intellegent Prison, this Smart Grid.

What is Smart Grid?

%d bloggers like this: