Sovereignthink

Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘NSTIC

Headline Update the NSTIC of Things and the NSTICing of everyone

leave a comment »


NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.

 

National Strategy for Trusted Identities in Cyberspace (NSTIC)

January 7, 2011 ~ 11 AM – 12:30 PM
Stanford University

 

Secretary Gary Locke, U.S. Department of Commerce, and Howard A. Schmidt, Special Assistant to the President and Cybersecurity Coordinator at The White House,  spoke at an event about the National Strategy for Trusted Identities in Cyber Space (NSTIC). As part of the event a panel of CEO industry executives also discussed current and future real world applications of trusted identities.

 

The NDAA Kill Switch Police State and the i-9/11 economic event

 

Written by sovereignthink

2011/12/10 at 8:50 pm

The Kill Switch Terrortist Police State.

In the near future… now that Obama will sign the NDAA of 2011 into law?

There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.

Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.

NSTIC, Google & SEO

by Kristine Schachinger, December 29, 2011

In case you missed it, Google is now a credentialed provider of Trusted Identities for the federal government. This means that the NSTIC, or National Strategy for Trusted Identities in Cyberspace, framework now has federally recognized and certified identity providers.

But who are these providers exactly, what is the NSTIC and how does this affect the users in matters of privacy, anonymity or even SEO? Below is a video that helps easily explains what it means to be working with the #NSTIC and how these issues are addressed, or not addressed by the NSTIC Framework.

Obama Unleashes Cyber NSTIC

Written by sovereignthink

2011/01/11

Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans

On Jan 7th at the Stanford Institute for Economic Policy Research, Presidential Branch Officials; the U.S. Commerce Secretary Gary Locke and Cybersecurity Coordinator Howard Schmidt announced The National Strategy for Trusted Identities in Cyberspace or NSTIC. Where by creating two tears of online ID-entities Trusted and Untrusted. The project has already been under field testing since mid twenty-ten.

Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen

Written by sovereignthink

2011/01/11

Obama Unleashes N-STIC for Trusted e-Citizen Registry 

Individual Citizen Registration for Personal Trusted ID entity Card.

 National Strategy for Trusted Identities in Cyberspace (NSTIC)

The National Strategy for Trusted Identities in Cyberspace

My First Black President is Creating a Second Class UnTrusted (Non-Registered) Citizen vs ID Trusted Entity Citizenship

DHS HITS US with NSTIC! HIDE, HIDE!!

Written by sovereignthink

2011/02/12

D.H.S. (Department of Homeland Security)

H.I.T.S. (High Impact Technological Solution)

U.S. (United States)

N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)

H.I.D.E. (Homeland Identification & Detection Ethics)

H.I.D.E. (Hostile Intent Detection Enforcement)

Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship

Written by sovereignthink

2011/01/13 at 11:33 pm

Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry 

 

Will a standardized system for verifying Web identity ever catch on?

By Mark Milian, CNN

updated 7:36 AM EST, Wed February 15, 2012

(CNN) — My neighbor recently discovered a four-digit passcode that unlocks the front doors to our apartment building.

He shared the code with me, as well as with his girlfriend, buddies and a few other neighbors. I shared it with some people, and so did others. Within a few weeks, the building’s security system was buzzing constantly for people who didn’t actually have one of the dozen or so physical keys given to tenants.

On 1-year anniversary, organized NSTIC looking for fast track

By John Fontana for Identity Matters | <:time datetime=”2012-04-18″>April 18, 2012

With $16.5 million in funding and $10 million earmarked for pilot programs, the government-led plan to facilitate the build out of an identity layer for the Internet has a year of organization under its belt, an implementation challenge for its future and a few critics chirping in its ear.

Last April, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was an Obama Administration mandate, a press conference and one ambitious guy sitting in a Commerce Building office above the nation’s oldest aquarium.

NSTIC set to hand out $2.5 million to direct ID effort

By John Fontana for Identity Matters | July 3, 2012 ZDNET

The organization driving the government-led digital identity strategy known as NSTIC said Monday it will name in the next few weeks a private organization that will shepherd the overall plan toward completion.

The move represents a significant milestone in the effort to create an “identity ecosystem” that provides secure identities for online transactions while limiting the disclosure of personal information. The system calls for both public and private accredited identity providers and a choice of identity credentials.

First NSTIC steering group meeting set for Aug. 15-16?

By John Fontana for Identity Matters | July 19, 2012 ZDNET

Vail, Colo. – The private-sector group named last week to lead the effort to create a digital identity strategy known as NSTIC will hold its first meeting Aug. 15-16 in Chicago.

In addition, the National Strategy for Trusted Identities in Cyberspace (NSTIC) will name in early September the winners of its pilot program to participate in a pilot program.

Finally On Wikipedia

 as of 7/22/2012

The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure online identities for Americans in cyber space. The aim of the proposal, according to Howard Schmidt, the White House Cybersecurity Coordinator, is to create an ‘identity ecosystem’ where individuals and organizations can complete online transactions with confidence that the individual who they are conducting business with is not impersonating someone else.

Schmidt also outlined that the NSTIC would also reduce the need to remember potentially insecure list of usernames and passwords. Schmidt highlighted that enrollment in the ‘identity ecosystem’ of individuals would be entirely voluntary and individuals can choose whether or not to obtain a credential. The measure also gives individuals control over what private information they use to authenticate themselves over time.

Background

The impetus for the policy move by the Obama Administration is part of the Cyberspace Policy Review published in June 2009. The NSTIC proposal was released in draft form in June 2010 along with a website set up by the Department of Homeland Security to elicit feedback and ideas from people. On April 15, 2011, the final draft of NSTIC was released by the White House. In this version of the draft the role of the federal government was toned down and highlighted its role as merely a facilitator in establishing the ecosystem. The effort has to be led by the private-sector.

Criticism

The proposal has generated a lot of criticism since it was released in draft form by the White House. A lot of criticism been centered around privacy implications of the proposal.

Shortly after the draft’s release, the Electronic Privacy Information Center, in conjunction with a number of other consumer-rights and civil liberties organizations,sent the Committee a statement in response to the draft NSTIC policy, requesting that the White House provide a clearer and more complete plan to create and safeguard Internet users’ rights and privacy.

The Obama White House released its final NSTIC guidelines in April 2011. While EPIC head, Marc Rotenberg, called NSTIC “historic,” he also cautioned that “…online identity is complex problem and the risk of ‘cyber-identity theft’ with consolidated identity systems is very real. The US will need to do more to protect online privacy.”

Additional Reading

The Complete Biometric Citizen Registry of Corp/Gov ID  for access to e-systems

The National Strategy for Trusted Identities in Cyberspace

http://epic.org/privacy/nstic.html

http://epic.org/privacy/cybersecurity/default.html

http://privacy.org/privacy_coalition_comments_trusted_ids.pdf

http://www.nist.gov/public_affairs/releases/whitehouse_nstic.cfm

Advertisements

The NDAA Kill Switch Police State and the i-9/11 economic event

with 27 comments


The Kill Switch Terrortist Police State.

In the near future… now that Obama will sign the NDAA of 2011 into law?

There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.

Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.

There could simply be 227 hours or 9 days and 11 hours, during this false flag operation, were the systems are ‘down’.

This blackout event would wipe out millions of small businesses, creates riots and havoc in supply lines or the distribution of goods.

A national ‘state of emergency’ is declared in the face of this disaster.

In major cities, martial law is declared, FEMA establishes relief camps for those in over populated/dangerous areas.

Rioters, looters and protestors (or domestic terrorists) use cell phones, streaming video and social networks to communicate and coordinate their opposition; as well as attack police and government officers.

Filming or taking pictures of police and government operations become a crime.

In the first week of the blackout event, the ‘e-Patriot’ act is passed into law, changing the internet forever.

With The Cyber Security Grid act of 2012 (CSG or ePatriot act) and the National Strategy for Trusted Identities in Cyberspace (or NSTIC) establishes the e-Citizen Registry. This is mandatory Individual Citizen Registration within  NSTIC for Trusted e-Citizen Registry.

Citizens are required to be e-verified with a biometric trustmark NSTIC registry company in order to ‘access’ the web. If you will ‘Your Online Drivers License is NSTIC

Call It Your Online Driver’s License

By NATASHA SINGER
Published: September 17, 2011
New York Times

WHO’S afraid of Internet fraud?

http://www.nytimes.com/2011/09/18/business/online-id-verification-plan-carries-risks.html

Who is hyping ID theft terror? Who is hyping cashless cyber society?

This removes all anonymity, freedom from censorship and places individuals legally liable for all web activity.

Further more, inciting, belligerent or inflammatory language and expression during this time of crisis, which could threaten public safety, the general welfare or cause disruption in distribution and communication, is banned.

100,000’s of websites and blogs are taken offline.

The Virtual Department of Transportation (or VDOT) is created. Cell phones and personal computing devices (PCDs) are tracked on the open Radio Frequency Identification (or RFID) Direct Short Range Communications Grid (or DSRC) (RFID -DSRC Grid). Using the dedicated 5.9-gigahertz smart grid, to track and triangulate subversives during unrest. This is integrated with Blue Force Situational Awareness (BFSA) and martial law forces.

In violation of the Posse Comitatus act and the Constitution, the DHS, TSA, FEMA and federal civilian national security forces; which have become just as powerful as the military, just as strong and just as well funded, act as an already standing internal army and under Continuity of Government (COG) processes take control of the Governance of the Nation.

Once the government’s secret police army takes over, DHS cyber security units emanate out of the threat fusion centers.

Under the National Defense authorization act of 2011 and CSG, citizens are arrested and detained as domestic terrorists.

Texas, Arizona, Utah, Idaho, Montana, Oregon and North Dakota enter into joint state nullification and interposition of Federal Enforcement Officers jurisdiction within the states, unless local officers are presented with search warrants, as per the constitution.

Even then the states retains the power of enforcement or arrest and the individual will not be surrendered to federal custody until after conviction in civil grand jury, as per the constitution.

Individual Counties throughout the Nation follow suit.

With over 1 million dead Americans, 25 million displaced and the suspension of the 2012 elections President Obama calls in NATO Troops to quell the insurrection of the states.

At this order the commanders of the US military arrest the commander and chief for treason.

The charge is violation of the oath of office and treason; founded on his order to militarily attack US citizens with foreign troops, in order to quell the practice of exercising the fundamental natural rights of the citizenry, as protected under the constitution.

93 senators are charged as well for voting for the NDAA of 2011 and supporting violations of the constitution.

203 financial magnets from the heads of the; IMF, World Bank, major financial institutions, 42 chairmen of ‘national’ central banks, including the heads of the US Federal Reserve, to the queen of England and Denmark, are charged with war crimes.

This is after investigations of mass medication, as well as, infrastructure or public domain corporate/government ownership and federal militarization of civil functions.

US Citizen Service Lecture; Issues on the Edge: Virtual worlds, Privacy & The Panopticon

‘Modern technologies are making it possible to observe everyone, everywhere, all the time. Panelists will discuss the legal theory of the self-censorship response to total surveillance, the operational view of a virtual world, and the history of a real panopticon prison.’

We are the resistance to tyranny and oppression

-sovereignthink

Google Gate – An Intelligent Prison is this Smart Grid

with 6 comments


Cyber-Transformation Actions–US Program to Detect “Resentment” and Other Terrible Human Emotions

featured on – Alan Watt ‘Cutting Through The Matrix’ – January 18th, 2012

http://dprogram.net/2012/01/19/alan-watt-cutting-through-the-matrix-january-18th-2012/

Global Governance – Individual Austerity Control – A Recent Timeline to Total Enslavement

Barrack Obama has launched National Cyber-Transformation actions in the United States with the announcement of the Commerce Department’s new division of The National Strategy for Trusted Identities in Cyberspace NSTIC, announced at Stanford University Jan 2011.

The United States Executive Using STUXNET, WIKILEAKS, CYBERATTACK, Identity Theft as well as Venezuela/China styled National Security rationale of denouncing out rage toward public authorities, inciting hatred, engender resistance among the general public or endanger public order as crimes against the state.

 “A Swiss professor working with a Massachusetts Institute of Technology scientist who heads the Mind Machine Project there outlined how this program operates through computerized scanning of phone calls and electronic messages sent through e-mail and social networking mechanisms,” reports the Buffalo News.

The system works by detecting “resentment in conversations through measurements in decibels and other voice biometrics,” more specifically the emotional spikes that characterize “hatred and deep resentment toward government.”

“As for written transmissions scrutinized by the computer program, it can detect the same patterns of fixation on specified subjects,” states the report.

Once an individual has been identified as harboring “resentment toward government,” the information can be “passed along to authorities so surveillance can begin.”

Google Spies World Wide (‘We know all’)

**News Corp ‘News of the World’ Spying Operations Small Time Compared with Giant Google**

Google is integrated in management of major police forces email and communication systems through out America, they provide intelligence to federal threat fusion centers, DHS, FBI, ICE, Local law enforcement, CPS, etc. This might be why their activities do not get called in for hearings. (These activities would provide ‘dirt’ on everyone).

Department of Homeland Security Mind Reading Division

– Malintentions Future Attribute Screening Technology (FAST)

The Big Brother Orwellian; Google Gates Jobs gate; The RanD Giants Police State

2012 – Is the Government Watching and Warring with the Public?

NDAA: citizen detainment – SOPA: civilian targeting

 

How many times do you flush, too much hot water, which of the 250 devices in my house am I using? National Security needs gets to know.

Now we need a Big Brother ‘Black Box’ to keep us safe at Home and a Smart Grid to keep us safe in the World?

And Mainstream Corporate Statism Industry is to Take Over by these Physical Controls?

The New Freedom is; we are being asked to give into Uniform Spying Equipment Installed in each Home to Monitor Everyone Equally and Totally.

We are being told that in order to enjoy the level of freedom that we currently have, we must be safe, we must do the democratic thing and Install Big Brothers Home Monitors. We must create a smart grid that will allow Corporate Statism to monitor and control every aspect of your life.

One of the Corportate Statism’s pushers, Democratic Sen. Jay Rockefeller said this was not for just military or intelligence concerns. “It is a lot more than that. It suddenly gets into the realm of traffic lights and rail networks and water and electricity,”

Nancy Pelosi slipped the fact that “Every aspect of our lives must be subject to inventory” in order to fight global warming in reference to her China visit

Mark Klein reported the multinational corporation he worked for was doing this at the government’s request.

The “vacuum-cleaner surveillance” approach grabs everything. “Despite what we are hearing, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA [the Foreign Intelligence Surveillance Act],” Klein said in 2006.

Interstate 15 all through Utah is License Plate Camera Tracked, Virtually Every Mile, Every Traffic Light in Every One Traffic Light Town! Everywhere we go, they know. Taxed by the Mile and Toll Roads or Freedom to Travel?

Orwell’s eyes would be spinning at this Unnatural in name of Saving Nature, this terrifying war on terror, this Intellegent Prison, this Smart Grid.

 

 ‘Publicly Available Social Media Monitoring and Situational Awareness Initiative of 2010’or Media Monitoring Initiative (MMI) under which;

The Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), will launch and lead the Publicly Available Social Media Monitoring and Situational Awareness (Initiative). The NOC and participating components1 may also share this de-identified information with international partners and the private sector where necessary and appropriate for coordination (of SPYING on the Public).

And in the latest Privacy Compliance Review of the Social Media Monitoring and Situational Awareness Initiative in 2011

IV. BROADENING OF SCOPE

Based on OPS/NOC’s demonstrated compliance with the June 22, 2010 PIA and consistent with the statutory mission of OPS/NOC, PRIV and OPS/NOC decided to further broaden the program’s capability to collect additional information in a limited number of situations in order to respond to the evolving operational needs of DHS and OPS/NOC. PII on the following categories of individuals may be collected when it lends credibility to the report or facilitates coordination with federal, state, local, tribal, territorial, foreign, or international government partners:

i. U.S.and foreign individuals in extremis situations involving potential life or death circumstances;

ii. Senior U.S. and foreign government officials who make public statements or provide public updates;

iii.U.S.and foreign government spokespersons who make public statements or provide public updates;

iv. U.S.and foreign private sector officials and spokespersons who make public statements or provide public updates; and

v. Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and /or social media in real time to keep their audience situationally aware and informed.

vi. Current or former public officials who are victims of incidents or activities related to Homeland Security

vii. Known terrorists, drug cartel leaders, or other persons known to have been involved in major crimes or terror of Homeland Security interest who are killed or found dead.

Google Gates Jobs gate has seen the 20 year Implementation of a Globally Centralized Big Brother system, under an electronic Smart Grid, an Intelligent Prison Planet and the birth of the Electronic Citizen Rating Eco-system in Determining Individual Trustmark (e-C.R.E.D.I.T.)A Price Tag and Tracking Tag for Every Person in the World, the Human Resource, the marked beasts of burden. Personal Austerity.

This has been reached with total government and private market integration since 1900. The Modern incarnation is that of complete mobile phone movement recording and storage, auto filtering and filing all electronic communications, all purchases and transactions, monitored in home activity and energy usages, Centralized Circuit (C.C.) Fusion Center integrated Cameras and monitoring systems with bio, plate, behavioral monitoring systems, expanded enhancements into private/municipal surveillance grids, as well as network accessible IP cameras in the Hands of Every, Thought Crime, Suspicious Activity and MALINTENT Reporting, Child in America.

This in addition to centrally regulated integration and data basing requirements of the public and private; financial, transportation, communications industrial, and commerce sectors, have allowed government enforcement near TIA (total information awareness) and intelligence factoring of individual predictive capacity up to 80% of actuaries.

Under the Banner of Central Planning, of Lowering Costs, Integration, Limiting Waste, preventing APGCH, Identify Theft, Patient and Consumer Protection, Patent and Copy Right Protection, Child Protection, Drugs, Terrorism, Domestic Extremism, Inciteful Radicalism and for Security in Home Land Investments, we have been enslaved in a valueless Credit system of speculation and fear.

There can be no Speculation on Personal, Private, Individual; Freedom, Liberty and Justice. We the people either have it or we don’t.

The most rare, the most unique, the most singular creation on earth is the individual human being.

For any Individual to be rated, determined, planned, controlled, ordered, regulated or limited by force, fraud or coercion is the gravest of all Crime.

It is the Crime in Violation of the Law and the Principle.

It is Tyranny and Oppression over the heart, mind, will, spirit, soul, value and potential of an infinite singularity of untold capacity for creation. 

It is slavery of every action and a lien on every increase that any individual ever dares to dream to do.

Standup, Speak the Truth, Go Local and Re-Public

-sovereignthink

Commerce/Corporate

National Security

%d bloggers like this: