Bitcoins – Coins For the Cryptocracy

People all over the political spectrum are pushing bitcoins again.

I explained earlier why I felt you should avoid them. When I did, I withheld any reasoning except the most logical and self-evident.

Short version:

You can accomplish everything that bitcoins can achieve with good old cash. And you don’t need electricity, internet, computers, devices, and security software when you use cash.

Second, if governments hate cash for its secrecy, why are they ignoring or pushing cryptocurrencies, which are supposedly even more secretive?

Makes no sense, does it?

The problem with bitcoins is they provide a solution for what isn’t a problem.

Secrecy isn’t a problem.

Secrecy can be achieved as is, if you set your mind on it.

The real problem is that every increase in secrecy augments the power of the cryptocracy – the unholy alliance of the spy agencies, criminals, and criminal financial cartels.

These are the forces that actually control our lives.

The criminal ruling class loves bitcoin because they know they have the power to exploit it fully. The ordinary chump just thinks he does.

As for Satoshi Nakamto, there’s no such person. It’s a made-up name, even though it has a meaning. A sinister one that gives the game away.

Don’t let clever people fool you into thinking it’s a real person.

They are probably being compensated for saying so.

Remember, practically every political site of any size on the web is in bed with intelligence. When they are not, they get pruned regularly.

Just see what happened to me here.

Bitcoin comes out of Israeli cryptographic research. The details I don’t know, but that’s generally accurate.

It’s not about saving anyone. It’s about enacting the kabbalist’s vision on earth.

That vision demands that the Anglo-Judaic Western powers rule the world through decentralized systems.

Those who are pushing bitcoin are on board that agenda.

I am too busy recovering from the latest body-blow from the cryptocracy to spell it out better just now.

But I will get to it.

If you want to gamble, go ahead.

But if you adopt bitcoins because you think your life will become opaque to the powers-that-be, you might want to rethink that.

The only way to hide anything done on your computer is to turn it off, smash the hard drive into metal dust, and throw it into a nuclear waste site.

But even then, there are still the servers and the other fellows’ computers.

Not to mention advances in technology or mathematics that will turn bitcoins invulnerability into mush.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Alleged Trump Sex Video: From 9-11, Grosvenor Gardens

An interesting factoid:

The infamous alleged fetish video involving Donald Trump and a Russian hotel bed in which the Obamas slept (details delicately withheld on our chaste blog) turns out to have been given to US intelligence officials by none other than Senator John McCain, whose own record is so dodgy it muddies the story even more.

We think the much bigger question than Obama’s bed is Trump’s. Who’s in it? How much in hock is he to Russia?

McCain, an alleged war-hero but documented fink,  was once a POW in Vietnam and, since I just watched “The Manchurian Candidate,” that raises all sorts of questions for me about his own motivations and agenda.

Second, the file on Trump was compiled by a 20 year veteran of MI6 (the British foreign intelligence service), Christopher Steele, who from 1990 until 2009 was also a spy in Russia.

2009 was the year a lot of intel operations, including that of Wikileaks, began operating.

So what did Mr. Steele do in 2009? He opened Orbis Business Intelligence, which compiled the video. Apparently, he was funded by Republican anti-Trump operatives.

Where is Orbis located?

At the commercial site of 9-11 Grosvenor Gardens in London.

Is this another Rothschild/NWO wink or merely coincidence?

If the former,  into which realm of reality, falsity, or some mixture of both, do we consign the video?

And who is  behind it?

Insane McCain, Trump himself, his handlers, the Russians, the financial cabal, the CIA, Mossad, the FSB? Or some combination of these?

And if this is an X-rated rerun of the Manchurian Candidate, with McCain as the brain-washed trigger-man, is it Mike Pence or Hillary Clinton, who is the intended beneficiary?

My bet is the latter.

 

State Surveillance Enters The Bedroom

UPDATE(Picture: George Lawler/metro.co.uk)

I just saw this picture of George Lawlor in a “V for Vendetta” mask.

Something clicked. This is an intelligence created story to sell that “consent app” ( see below).

It’s intelligence, just like the fracas over Halloween costumes at Yale.That’s why I made those posts private.

ORIGINAL POST

Read this and weep.

At the University of Warwick in the UK, George Lawlor, a nineteen-year-old male student with the aggressive demeanor of a ba-lamb,  is in trouble with feminists.

For not wanting to attend a “consent” work-shop intended to deter coercive sexual encounters, he has been harassed to the point that he wants to drop out of university.

Contemporary feminists of a certain sort believe that all men are potential rapists in need of training on how to comport themselves with women, hence the fury.

There does need to be discussion about sex on campus, but lecturing the men alone misses the point. Women also need some advice on how they should carry themselves in public….on why uncontrolled drinking has different impacts on men and women…. and on where they can go alone… and with whom.

Just maybe, the whole idea of mixed dorms needs to be revisited too... and how about limiting access to drugs, alcohol, and porn on campus?

Just lecturing the men seems to be a rather bigoted way of tackling the issue.

But, if that wasn’t bad enough, the article about Lawlor also cites a new “app” (software application) for sexual consent.

It lets potential sex partners  video record their consent before getting together.

That students seem to think this is a good idea tells you everything you need to know about campus today.

Everyone else knows that phone and computer technology is almost completely under government control, unless you consistently encrypt at a very high level. Even so, the equipment and operating systems themselves have enough entry-points for the government.

A “consent app” that records two people agreeing to have sex is as good as sending the agreement in the mail to the police.

As a matter of fact, that is the intended purpose of such agreements in the event of post-coital problems.

All these years, the left has been blaming those near-mythical ” Christian fundies” for dragging the government into the bedroom.

Now,  feminists have sent the police and courts a gold-embossed invitation to participate in people’s sex lives..… and people are cheering.

 

 

UK, France, On Verge Of Kafkaesque Police State

The Guardian sounds a warning about the acceleration of surveillance in the UK and France:

Two British MPs, Tom Watson and David Davis, crossed the party divide and with campaigning organisation Liberty, won a legal challenge against the rushed, undemocratic Data Retention and Investigatory Powers Act (Dripa), passed in July 2014.

The High Court found that Dripa was unlawful because it did not adequately ensure that access to, and use of, communications data (though not its collection) was limited to what was necessary, appropriate and proportionate for preventing and detecting serious crime.

The decision has been welcomed for, finally, recognising in the UK what a number of other countries and a slew of independent examiners have demanded: proper judicial oversight of a “general retention regime on a potentially massive scale”. Where it falls down, as do many of those reports, is in accepting, implicitly or explicitly, the euphemistic re-characterisation of mass surveillance as “bulk interception” or “bulk collection”, thus endorsing an incursion into our private lives, papers, thoughts and communications that has no precedent in the law of the land.
Advertisement

Disappointingly, however, the Dripa victory is likely short-lived. Immediately, the Home Office declared its disagreement with the High Court’s decision, pledging to appeal. And of course, the Conservative government has already made abundantly clear its intention to enact a single, comprehensive law – the so-called “snooper’s charter” – which many fear would unleash a tidal wave of surveillance at political and executive discretion.

This is where the other side of the channel comes in. Late on Thursday 23 July, in France’s highest constitutional body, the last safeguard of the rule of law fell, approving what is, by all measures, an intrusive, comprehensive, virtually-unchecked surveillance law.

A pipe-dream for two years, the French law gathered momentum in March this year in the wake of the Charlie Hebdo attack, and was put together in the French parliament under emergency procedures, drastically reducing discussion time and preventing any meaningful debate. The law was overwhelmingly approved by parliament in June and immediately referred to the constitutional council by nearly everyone who could do so, including François Hollande – the first time the president has deferred a law voted by parliament in the Fifth Republic.
France approves ‘Big Brother’ surveillance powers despite UN concern

The case also attracted an unheard of number of amicus briefs, many of which were made public, and most of which involved an impassioned cry about the unprecedented incursion on civil liberties that the law mandates.

And yet, despite this, the French council approved, with very few exceptions, a law that allows intelligence agencies to monitor phone calls and emails without prior judicial authorisation; to require internet service providers to install “black boxes” that filter all internet traffic, combing everyone’s metadata in order to identify deviant behaviours based on unknown parameters and provide access to the agencies; and to bug cars, homes and keyboards for images, sound and data.

All of this, of course, is discussed as being targeted at “suspected terrorists”. But all of it, equally and more significantly, touches us all; anyone and everyone who traverses the internet. The law’s goal is to improve the agencies’ tools for a large variety of vaguely stated purposes: terrorism, but also political surveillance, competitive intelligence for France’s major economic, industrial and scientific interests, the fight against organised crime, and goodness knows what else to come.”

Privacy Expert Questions Europe’s Migrant Crisis

Privacy Surgeon.com:

I’m starting to believe the so-called “migration crisis” facing Europe is little more than a tragic confidence trick. Worryingly, however, it involves dangerous consequences for the rights of every EU resident.

I’m not being heartless. Yes, thousands of refugees have lost their lives in the struggle to reach EU borders. Many more are living in a desperate plight, often at the mercy of human traffickers. That’s not my point.

Relatively few of us have genuinely got to grips with the realities of this situation. It’s a massively complex issue that goes to the heart of geopolitics and national dynamics, but intelligent people should not be sucked into the orchestrated rhetoric that is being peddled. This isn’t the first time we’ve faced such circumstances – and it certainly won’t be the last.

The migration issue is trending across the political landscape of nearly all EU countries. Emerging from the hysteria over rising numbers of asylum seekers is a mix of innovative and humane solutions. Sadly, the “crisis” is also spotlighting the very worst of Europe, spewing out a raft of reactions that defy the very basis of the values that Europe is supposed to uphold.

Instead of making an effort to find a rational way through the difficult issues, some governments have cheered on a contagion mentality which has genuinely terrified entire populations that the barbarians are at the gate. It feels like Donald Trump’s shadow has fallen across Europe.

At one level (though certainly not for the migrants themselves) the situation is nowhere near as dramatic as some media outlets are portraying. At another level, the crisis is far worse for Europe than anyone could imagine. This situation could trigger a backlash for civil liberties across the EU.

Let’s deal first with the raw figures.

At the risk of simplification, here is the top level statistic. The EU’s external border force, Frontex, which monitors the flow of people arriving at Europe’s borders, says some 340,000 migrants have been detected at EU borders since the beginning of 2015. That compares with 123,500 in the same period last year.

My response is “what’s the big deal?

[Lila: Exactly my reaction. Anyone who has actually been in populous, poor, or war-torn countries, would find the numbers nothing so extraordinary.]

…….

During World War II, refugees flooded from Germany to Switzerland, as any Sound of Music fan will remember. Between 1933 and 1939, about 200,000 Jews fleeing Nazism were able to find refuge in France. At around that time several hundred thousand Spanish Republicans fled to France after their loss to the Nationalists in the Spanish Civil War. Unlike the EU of today, nations coped with such circumstances.

It’s true that the current headline figures can look dramatic. More than 300,000 migrants have risked their lives trying to cross the Mediterranean to Europe so far this year, according to the UN. This compares with 219,000 for the whole of 2014.

Nearly 200,000 people have landed in Greece since January this year, while another 110,000 made it to Italy.

To put the current situation into a statistical perspective, imagine a town of 10,000 people calling emergency meetings and getting into a froth of paranoia because ten migrants show up at the town hall office. 

Having said that, the total population of the EU member states is just over half a billion. Is anyone seriously arguing on any basis of rationality that a region of five hundred million people can’t find a way to absorb a peak of an extra half million migrants? In the view of many observers, this isn’t so much a migrant crisis as it is a crisis of political fragility over Europe’s teetering economy and employment.

To put the current situation into a statistical perspective, imagine a town of 10,000 people calling emergency meetings and getting into a froth of paranoia because ten migrants show up at the town hall office. Most of us would condemn such a response.

In line with this reasoning, let’s try to put the situation is a historical context.

Some people might like to forget that the decade leading up to 2001 saw the one of the bloodiest conflicts of modern times – and right on Europe’s doorstep. The Bosnian and Yugoslav wars saw genocide that murdered between 100,000 and 200,000 people (depending on whose figures you accept). States that are now happily part of the European family of nations were obliterating entire communities at the time your fifteen year old child was born. Now, all is forgiven – and almost forgotten.

But at the time, there was misery and human displacement at a scale that people these days can barely understand. Vast waves of refugees poured out of the carnage and tried for a new life in Europe and elsewhere.

Europe whines about a “crisis” of having to deal with an overflow that’s equivalent to less than one tenth of one percent of its population. Compare this to what Croatia agreed to burden at the time of the conflict.

The U.S. Ambassador to Croatia, Peter Galbraith, tried to put the number of refugees in Croatia into perspective during an interview in 1993. He said the situation would be the equivalent of the United States taking in 30,000,000 refugees. The number of Bosnian refugees in Croatia stood at 588,000. Serbia took in 252,130 refugees from Bosnia, while other former Yugoslav republics received a total of 148,657 people.”

Dangers Of Ancestral DNA Data Banks

From GeneticsAndSociety.org:

The New Orleans Advocate recently published a shocking story that details the very real threats to privacy and civil liberties posed by law enforcement access to private genetic databases and familial DNA searching.

In 1996, a young woman named Angie Dodge was murdered in her apartment in a small town in Idaho. Although the police collected DNA from semen left at the crime scene, they haven’t been able to match the DNA to existing profiles in any criminal database, and the murder has never been solved.

Fast forward to 2014. The Idaho police sent the semen sample to a private lab to extract a DNA profile that included YSTR and mtDNA—the two genetic markers used to determine patrilineal and matrilineal relationships (it’s unclear why they reopened the case after nearly 20 years). These markers would allow investigators to search some existing databases to try to find a match between the sample and genetic relatives.

The cops chose to use a lab linked to a private collection of genetic genealogical data called the Sorenson Database (now owned by Ancestry.com), which claims it’s “the foremost collection of genetic genealogy data in the world.” The reason the Sorenson Database can make such an audacious claim is because it has obtained its more than 100,000 DNA samples and documented multi-generational family histories from “volunteers in more than 100 countries around the world.” Some of these volunteers were encouraged by the Mormon Churchwell-known for its interest in genealogy—to provide their genetic material to the database. Sorenson promised volunteers their genetic data would only be used for “genealogical services, including the determination of family migration patterns and geographic origins” and would not be shared outside Sorenson. Its consent form states:

The only individuals who will have access to the codes and genealogy information will be the principal investigator and the others specifically authorized by the Principal Investigator, including the SMGF research staff.

Despite this promise, Sorenson shared its vast collection of data with the Idaho police. Without a warrant or court order, investigators asked the lab to run the crime scene DNA against Sorenson’s private genealogical DNA database. Sorenson found 41 potential familial matches, one of which matched on 34 out of 35 alleles—a very close match that would generally indicate a close familial relationship. The cops then asked, not only for the “protected” name associated with that profile, but also for all “all information including full names, date of births, date and other information pertaining to the original donor to the Sorenson Molecular Genealogy project.”

This is when the case starts to sound like something out of the TV show “CSI.” Sorenson linked the crime scene DNA to DNA from a man born in 1952. That man didn’t fit the age profile of the murderer, so the cops used Sorenson’s genealogical information to trace his male descendant line and find his son, Michael Usry Jr., born in 1979. Then the cops searched Usry’s Facebook page and found he had some Facebook friends who lived somewhat near Idaho Falls. And then through Google searches, the cops learned Usry was a filmmaker who had been involved in making a few short films that had homicide or killings in the story line. (The cop noted in a warrant affidavit “these short films have won awards in several film festivals.”) Based on this completely circumstantial evidence, the Idaho investigators got a warrant to collect a swab of Usry’s DNA.

They called up Usry, told him they were investigating a hit-and-run, and asked him to meet with them. Usry thought he “had nothing to hide” and agreed to the meeting. They took him to an interrogation room, questioned him without a lawyer present, and eventually collected a DNA sample. Then Usry sat on pins & needles for a month waiting for the results.

When the results came in, it turned out Usry’s DNA didn’t match the crime scene sample—despite the close familial markers and other circumstantial evidence, he wasn’t the murderer.

Usry was lucky. The forensic crime scene DNA sample came from semen and likely was single source (meaning it contained DNA from only one person). This means that it was relatively easy for the cops to compare Usry’s DNA against the forensic sample and determine conclusively the two didn’t match. In many cases today, however, forensic samples come instead from “touch” DNA—miniscule samples of DNA deposited on physical surfaces that people have touched. Touch DNA is less reliable and harder to match both because it may not include enough DNA for meaningful interpretation and because it often contains DNA from multiple persons—some of whom may have had no connection to the crime at all. With touch DNA, lab analysts may see a match where none exists. Just this year in San Francisco, the San Francisco Chronicle revealed a crime lab analyst had been making assumptions about poor-quality, incomplete genetic evidence and testified at trial that one of the profiles she generated matched the defendant, which was false. This analyst’s misconduct could affect as many as 1,400 cases. When touch DNA analysis expands to include familial markers, the risk of misidentification only increases.

This risk will increase further as state and local law enforcement agencies begin to use Rapid DNA analyzers—portable machines that can process DNA in less than an hour. These machines will make it much easier for police to collect and analyze DNA on their own outside a lab. Currently, because forensic DNA analysis in a lab takes so long, we generally see its use limited to high-level felonies like rape and murder. However, Rapid DNA manufacturers are now encouraging local police agencies to analyze DNA found at the scene of low-level property crimes. This means much more DNA will be collected and stored, often in under-regulated local DNA databases. And, because most of the forensic DNA found at property crime scenes is likely to be touch DNA—this only increases the risk that people will be implicated in crimes they didn’t commit.

 

Citizen Statement Against Indian DNA Profiling

An excerpt from a Petition against Biometric profiling through Aadhar and Human DNA Profiling:

Notably, Human DNA Profiling Bill has been prepared and which when enacted could require the citizen to give one’s DNA to the state. What ambitions does this reveal? This would complete the journey of subjugation which started with fingerprints and is possibly ending in DNA profiling.
The profiling, and the intrusion of privacy, that is a central aspect of these projects are, among other things, contrary to the Supreme Court’s judgment dated 4th July, 2011 [Writ Petition (Civil) NO. 176 of 2009] where it reiterated that the Right to Privacy is a part of the constitutional Right to Life. The central government has shown disdain towards this judgment by launching aadhaar related projects on the basis of biometrics which is untested and untried, and which have surveillance, tracking, profiling, tagging and convergence at its core.

UIDAI had set up a Biometrics Standards Committee which revealed that ’the biometrics will be captured for authentication by government departments and commercial organisations at the time of service delivery.’ The commercial organisation mentioned herein is not defined. The working paper of the UIDAI revealed that the ’UID number will only guarantee identity, not rights, benefits or entitlements’. It is also said that it would not even guarantee identity, it would only provide ’aid’ in identification. In fact it makes right to having rights conditional on having biometric aadhaar.
Notably, Biometrics Standards Committee had categorically stated that UID/aadhaar’s is meant only for “civilian application” but the order on aadhaar enabled biometric attendance system has been extended to defence employees as well. The fact remains UID was first adopted by USA’s Department of Defence, later by NATO. It has subsequently been pushed through World Bank’s eTransform Initiative in partnership with France, South Korea, Gemalto, IBM, L1, Microsoft, Intel and Pfizer.

Some of them have signed agreements with UIDAI. This constitutes breach of national security.


Across the globe very stringent data privacy law has been framed wherein one’s personal data cannot be used by anyone including the government without your specific consent. But in India there is no data protection law. Aadhaar is akin to a piece of collar which the transnational powers want to tie on the neck of Indian citizens. Government has allowed itself to be misled and it has failed to protect personal sensitive information which has already gone to foreign companies.

It must be recalled that Dr. Manmohan Singh as Prime Minister had distributed Unique Identification (UID)/ Aadhaar numbers among the villagers of Tembhali village in Nandurbar District of Maharashtra on 29th September 2010. “The Aadhaar number will ease these difficulties in identification, by providing a nationally valid and verifiable single source of identity proof. The UIDAI will ensure the uniqueness of the Aadhaar numbers through the use of biometric attributes (Finger Prints and Iris) which will be linked to the number”.

It has now come to light as per a RTI reply of April 2015 that out of 83.5 crore aadhaar numbers issued so far, only 2.19 lakh i.e. 0.03 % comprised of them who did not have a pre-existing ID proof.

It shows how Indians were taken for a ride.

It must also be noticed that even the Identification of Prisoners Act, 1920, of colonial vintage, reads: “The object of this bill is to provide legal authority for taking measurements, finger impressions, footprints and photographs of persons convicted of, or arrested in connection with, certain offences.” According to the Identification of Prisoners Act, 1920, at the time of the acquittal of the prisoner, his biometric data is required to be destroyed. Since 1857, fingerprint identification methods have been used by police agencies in India and around the world to identify suspected rebels, political dissidents and criminals. The method is unfolding to indiscriminately profile citizens in general to identify them. The UID/aadhaar project, however, stores the biometric data forever.

It should be noted that in its report to Parliament, the Parliamentary Standing Committee on Finance has taken on board studies done in the UK on the identity scheme that was begun and later withdrawn in May 2010, where the problems were identified to include”(a) huge cost involved and possible cost overruns; (b) too complex; (c)untested, unreliable and unsafe technology; (d) possibility of risk to the safety and security of citizens; and (e) requirement of high standard security measures, which would result in escalating the estimated operational costs.” Countries like China, Australia, UK and France have also rejected it.

This open declaration of war against citizens’ sensitive personal information like biometric data by transnational entities and governments captured by them paves way for the enslavement of present and future generations through aadhaar database that lies on cloud beyond Indian jurisdiction. Such initiatives must be stopped and boycotted else it will spread its tentacles in every sphere of life and mobility in the country.

Notably, central government itself has filed several written affidavits in the Hon’ble Court contending that right to privacy is a fundamental right. It is remarkable that one former Union Law Minister has complained to the Prime Minister informing him about the blunders being committed by the law officer in question.

There is a compelling logic for rejection of those parties which implicitly or explicitly support tracking, profiling, databasing and mortgaging of citizens’ rights and their sovereignty under the dictates of their donors and non-state actors. The biometric idea is aimed at making citizens transparent before the all mighty Governments so that Government, their servant can remain opaque to safeguard the interests of undemocratic and ungovernable social control technology companies.

In a case of breach of trust central government has proposed to make aadhaar mandatory although the very first promise which legally questionable UIDAI made in its aadhaar enrolment form is/was that it is “voluntary”.

This Public Statement is a follow up of the Statement of Concern against UID/aadhaar issued by 17 eminent citizens at a Press Conference at Press Club of India in New Delhi on 28th September 2010. These citizens included Justice VR Krishna Iyer, Retired Judge, Supreme Court of India, Prof Romila Thapar, Historian, K.G.Kannabiran, Senior Civil Liberties Lawyer, Kavita Srivastava, PUCL and Right to Food Campaign, Aruna Roy, MKKS, Rajasthan, Nikhil Dey, MKKS, Rajasthan, S.R.Sankaran, Retired Secretary, Government of India, Upendra Baxi, Jurist and ex-Vice Chancellor of Universities of Surat and Delhi, Uma Chakravarthi, Historian, Shohini Ghosh, Teacher and Film Maker, Amar Kanwar, Film Maker, Bezwada Wilson, Safai Karamchari Andolan, Trilochan Sastry, IIMB, and Association for Democratic Reforms, Prof. Jagdish Chhokar, ex- IIMA, and Association for Democratic Rights, Shabnam Hashmi, ANHAD, Justice A.P.Shah, Retired Chief Justice of High Court of Delhi and Deep Joshi, Independent Consultant.

A Dalit activist who was one of these eminent citizens said, “This project wants to fix our identities through time. Even after that we are dead. The information held about us will be fixed to us by the UID number. Changing an identity will become impossible. We are working for the eradication of the practice of manual scavenging, for rehabilitation of those who have been engaged in manual scavenging, and then leaving behind that tag of manual scavenger. How can we accept a system that does not allow us to shed that identity and move on? How can a number that links up databases be good for us?”

We reiterate our demand that Bills like Human DNA Profiling Bill 2015 and projects like biometric aadhaar “should be halted before it goes any further”.

Signatories

1. Prof. Anil Sadgopal, Scientist, All India Forum for Right to Education (AIFRTE), Bhopal, Email: anilsadgopal@yahoo.com
2. Prof. Kalpana Kannabiran, Director, Council for Social Development, Hyderabad, Email: kalpana.kannabiran@gmail.com
3. Prof (Dr) Mohan Rao, Centre of Social Medicine and Community Health (CSMCH), Jawaharal Nehru University (JNU), New Delhi, Email: mohanrao2008@gmail.com
4. Dr Meher Engineer, Scientist, former President, Indian Academy of Social Science, Kolkata Email: mengineer2003@gmail.com
5. Ram Bahadur Rai, noted senior journalist, Email: rbrai118@gmail.com
6. Dr Babu Rao Kalapala, Scientist, formerly with National Institute of Chemical Technology, Hyderabad, Email: baburaokalapala@gmail.com
7. Kavita Krishnan, Secretary, All India Progressive Women Association (AIPWA), Email: kavitakrish73@gmail.com
8. Prof D M Diwakar, Professor of Economics, A N Sinha Institute of Social Studies, Patna, , Email: dmdiwakar@yahoo.co.in
9. Arun Kumar, former Member, Press Council of India, Indian Journalists Union, General Secretary, Bihar Working Journalists Union & President, The Times of India Newspaper Employees Union, Patna, Email: karunpatna@gmail.com
10. Sankar Ray, veteran journalist, Email: sankar.ray@gmail.com
11. N D Jayaprakash, Disarmament Researcher & veteran activist seeking justice for victims of Bhopal disaster, Email: jaypdsf@gmail.com
12. Qaneez Sukhrani, urban affairs analyst, Pune, Email: qaneez.sukhrani@gmail.com
13. Kshetrimayum Onil, Lead Coordinator, REACHOUT, Manipur Email:onilrights@gmail.com
14. Shabnam Hashmi, social activist, Anhad, Email: shabnamhashmi@gmail.com
15. Irfan Ahmed, General Secretary, All India Tanjin-e-Insaf, Bihar, Email: irfan.tree@gmail.com
16. Guman Singh, Himalaya Niti Abhiyan, Himachal Pradesh, Email:guman107@yahoo.co.in
17. Dr Umakant, Human rights advocate & independent scholar, New Delhi, Email: uk4in@yahoo.co.in
18. PT George, Intercultural Resources, Delhi, Email: ihpindia@gmail.com
19. Wilfred D’ Costa, Indian Social Action Forum, Delhi, Email: willyindia@gmail.com
20. Prakash K Ray, Editor, bargad.org, Email: pkray11@gmail.com
21. Gopal Krishna, Member, Citizens Forum for Civil Liberties (CFCL), Email: 1715krishna@gmail.com

Hong-Kong Introduces “DNA Shaming”

To get an inkling of the abuse possible with DNA profiling of the kind being considered in India, take a look at a public health initiative called “Hong-Kong Clean Up.”

The South China Morning Post has this:

The Face of Litter campaign was launched on Global Earth Day last month for the Hong Kong Cleanup Initiative, organised by online magazine Ecozine and the Nature Conservancy. It was aimed at raising awareness of the extent of littering in the city by pinpointing those responsible and encouraging people to change their behaviour.”

That should ring a bell just there.

“Earth Day” is a holiday central to the ecological movement and, not coincidentally, it is celebrated on April 22, which is the  birthday of Vladimir Lenin, the blood-drenched architect of the communist revolution in Russia in 1917.

A number of people have spotted this coincidence as further proof of the underlying communistic agenda of environmentalism.

Population control,if not depopulation, is its real goal.

Virginia-based Nature Conservancy is a corporate “do-gooder” that I’ve dealt with before.

You can read about its shenanigans in this excellent series published in the Washington Post.

Nature Conservancy has a long history with Goldman Sachs, which just supplied this “non-profit” with a CEO for a mere $700,000.

Nature Conservancy is in the business of monetizing (i.e. putting a financial figure on) environmental efforts, through such mechanisms as “cap and trade” and the “carbon exchange,” both regarded as useless rackets by grass-roots activists.

So what did “Hong-Kong Clean Up” do with the litter it picked up?

It used DNA from the litter to reconstruct the faces of the litterbugs and then posted the faces publicly to shame them.

The firm behind this DNA scheme is PR giant Ogilvy & Mather and the lab tests were done in the US by Parabon Labs.

Ogilvy & Mather has a history of complicity in the US Government’s propaganda efforts, including the War on Terror, the Drug War, and so-called “Greenwashing” – repackaging companies with bad environmental practices as good guys.

Why people resident in Hong-Kong should have their DNA fingered by Americans is anybody’s guess.

Reed Collins, the Ogilvy chief creative officer who led the campaign, says 27 facial composites were created from a combination of 24 DNA samples taken from litter and three controlled samples donated by volunteers.

The faces were used to create “wanted posters” and digital banners, which were displayed in high-traffic areas, including 10 MTR stations and at “the scene of the crime”.

“Because age is impossible to determine through DNA alone, but still integral in creating an accurate portrait, DNA data has been combined with other factors, such as demographics based on the type of litter and where it was collected to determine the approximate age of the litterer,” Collins says.”

Christensen says that although DNA alone can only produce a high probability of what someone looks like, the purpose of the campaign was not to point fingers at specific individuals.”

Despite Ogilvy & Mather’s disingenuous disclaimers, this is on so many levels outrageous.

It breaches privacy in the grossest fashion.

It has endless potential for abuse –

Identity theft

Falsification of evidence

Framing innocents

Blackmail

Refusal of insurance, housing, or other services

Racial and genetic profiling

Targeting for abortion/contraception advertising

Targeting for drug-testing

Targeting for drugs and porn advertising

Targeting for bio-weapons and depopulation programs.

If you think that’s over-reaction, consider the centrality of population control and eugenics in the thinking of every major thinker in the modern leftist pantheon.

Margaret Sanger, Bertrand Russell, Havelock Ellis, and dozens of other influential leftist thinkers, were all enamored of eugenics, population control, and the elimination of undesirables.

The question is not IF DNA profiling will be abused. The question is only WHEN.

 

Indian DNA Profile Usable For “Any Purpose”

In the Hindustan Times, Menaka Guruswamy, a Supreme Court lawyer, points out the dystopian nightmare hidden in India’s 2015 DNA profiling bill:

Most troubling is that the bill provides that the DNA profiles will be made available for identification in criminal cases during judicial proceedings to enable decisions in criminal prosecution for the defence of the accused and, rather strangely, ‘for the creation and maintenance of a population statistics Data Bank that is to be used … in identification research, protocol development or quality control…’.

As if this were not enough, the DNA information can also be used for ‘any other purposes’ as may be prescribed.

The idea that the State can assemble a population data base, not simply a census but a blood history of its citizens, so as to enable identification research or even quality control, is anathema to a constitutional, democratic India.

This bill, when worked in tandem with the Aadhar regime, has the potential to profile, rather intimately, every Indian.

In fact, this bill reads like very bad science fiction, one in which the State runs amok and bad science leads to little truth, many lies and an abuse of our DNA.”

Draconian Kuwaiti DNA Law Sets Ominous Precedent

From July 2015 onward, all Kuwait residents (citizens and foreigners) must submit their DNA or risk up to seven years of jail. This draconian law casts a fearful shadow on the DNA bill now being considered by the Indian government.

From DailyO.in:

Earlier this month, Kuwait enacted a law that makes DNA profiling of its citizens and foreign nationals living in the country mandatory. Anybody refusing to furnish their DNA for this database is liable to be jailed for up to seven years. This means all residents of Kuwait, including Indian workers living there, will have to give samples so that their DNA can be extracted and kept in government custody. To say the least, it is draconian.

Even before the news of Kuwait’s DNA profiling law sank, news has emerged about such a law in India. No, the Indian government is not emulating the Kuwaiti model, but only wants to make DNA profiles of criminals and suspects. The Human DNA Profiling Bill 2015 is slated for introduction in the Indian Parliament during the current session. The full draft of the Bill is not currently in the public domain, but going by the details trickling from various sources (and information based on its earlier versions), it appears that the bill has clauses that violate privacy and leave room for potential misuse.”

Modi Seeks Direct Govt. Interception Of Phones, Net

Saikat Datta at Scroll.in:

Milind Deora, a former minister in the United Progressive Alliance government, has cautioned against the possible misuse of  a new and more sophisticated system of surveillance conceptualised by his government and now reportedly put on the fast track by the Narendra Modi government. Called the Central Monitoring System, it allows government agencies to bypass phone and internet service providers to directly intercept communications. In an interview to Scroll.in, Deora said that he realised the system could lead to “technically lawful but malicious” interception in the absence of a privacy law.

Currently, in India, the sanction of the union home secretary is required before an agency can tap phones or intercept communications. According to an official reply under a query under the Right to Information Act, the home secretary clears nearly 300 phone tap applications every day. This information led to a seminal study by the New Delhi-based Software Freedom Law Centre which found there was very little transparency about what the government is doing with so much of data that it collects through these 100,000 phone taps every year.

Ideally, any phone tap can lead to only one of two results. It can ether lead to conclusively establish that the person whose communications are being intercepted is guilty, as was suspected. Or, it can reveal that the suspicions were not founded and the person is not indulging in any criminal activity.

If the interception shows that the person is indeed guilty as suspected, then the person should be charged under the relevant laws and prosecuted in the courts. If the person is proved to be innocent after the lawful interception has been conducted, there is no guarantee that the material collected during the period when their phones were being tapped has been destroyed. None of the 10 authorised agencies under law has published a transparency report and even when asked for metadata about whether the law is being followed, they have withheld information.”

USG Monitors Poop, Feeds Citizens Cocaine

Here’s the scoop on the fate of  poop in the Electronic Gulag from the American Chemical Society:

The war on drugs could get a boost with a new method that analyzes sewage to track levels of illicit drug use in local communities in real time. The new study, a first-of-its-kind in the U.S., was published in the ACS journal Environmental Science & Technology and could help law enforcement identify new drug hot spots and monitor whether anti-drug measures are working.

Kurunthachalam Kannan and Bikram Subedi note that to date, most methods to estimate drug use in the U.S. are based on surveys, crime statistics and drug seizures by law enforcement. But much illegal drug use happens off the radar. To better approximate usage, scientists have been turning to wastewater. Like a lot of other compounds from pharmaceuticals and personal care products to pesticides, illegal drugs and their metabolic byproducts also persist in sewage. In Europe, a number of studies have been done to see how well wastewater treatment plants are removing illicit drugs from sludge before treated water is released into the environment. But until now, no study in the U.S. had looked at this, likely leading to underestimates of abuse. Kannan and Subedi wanted to form a more complete picture of drug use, so they studied levels of illicit drugs at two wastewater treatment plants in Albany, New York.”

Notice that the scientists in this program are of Indian origin.  I wonder why these two didn’t put their expertise in sewage to better use by figuring out inexpensive ways to treat sewage which is a major need in India, as it is in the US.

As Mike Adams points out, it will only be a matter of time before toilets are microchipped to analyze your excreta in real time.

As he notes, if cocaine is finding its way into sewage and via the treatment procedure back into our drinking water, traces of it must be in the blood of all citizens, making the government guilty of forcing a class-A felony on its citizens.

Anyone drinking tap water is, therefore, consuming class-A felony controlled substances which can then be detected in their bodies in parts per billion concentrations. This is how the police state can arrest and imprison absolutely anyone by claiming they’re a drug user since there’s cocaine in their blood and it’s all over their twenty dollar bills, too!

There probably isn’t a single person living in America today who doesn’t have traces of cocaine on their person or in their blood. Notably, federal laws on cocaine possession make no exceptions for “inadvertent possession” or possession of trace amounts. Even one molecule of cocaine qualifies you to be charged with felony possession.

 

Secret Corporate Espionage, Harassment Of Citizens

From Alternet.org:

Hiring cops, spooks and vets to do corporate dirty work leads to one more trend enabling corporate espionage to flourish. That is a lack of accountability or legal consequence for espionage that clearly breaks domestic law, such as stealing documents, wiretapping, etc. In France or England, where some of these same activities have come to the attention of authorities, those responsible have been prosecuted and some perpetrators have even gone to jail. Not so in the U.S.

“Hiring former intelligence, military and law enforcement officials has its advantages,” the report notes. “First, these officials may be able to use their status as a shield. For example, current law enforcement officials may be disinclined to investigate or prosecute former intelligence or law enforcement agents… In effect, the revolving door for intelligence, military and law enforcement officials is yet another aspect of the corporate capture of federal agencies, and another government subsidy for corporations.”

What Americans Don’t Know

As detailed as the Center for Corporate Policy report is, author Gary Ruskin says most of the information was obtained “by accident.” It wasn’t freely given. It was the result of lawsuits, a handful of whisteblowers, mistakes by those hired to do the corporate espionage, boasts in trade press and other somewhat random sources.

But even so, there is a dark playbook that comes into view. Nonprofits are scrutinzed for vulnerabilities. Computers are hacked. Documents are copied or stolen. Phone calls and voice mail are secretly recorded. Personal dossiers are compiled. Disinformation is created and spread. Websites are targeted and taken down. Blackmail is attempted. Just as bad, Ruskin says, the Justice Department and Congress look the other way.

“The entire subject is veiled in secrecy,” his report says. “In recent years, there have been few serious journalistic efforts—and no serious government efforts—to come to terms with the reality of corporate spying against nonprofits.”

Steven Rosenfeld covers national political issues for AlterNet.

My Comment:

This excellent article describes the rampant misuse of surveillance technology to invade the privacy of thousands of ordinary citizens, to blackmail, harass, and threaten them.

It perfectly sums up my experience since 2007:

1.  Phone-tapping, landline and cell phones.

2. Appearance of private conversations in websites, in a disguised form, recognizable only to myself or very close friends.

3.  Innuendo and slander republished by internet trolls and sometimes blogs. No facts or evidence, just reiteration of the slander, personal abuse. Cyber-stalking.

4.  Infiltrators or spies posing as clients, customers, or visitors, attempting to enter into business with me.

5. Emails deleted or blocked.  Computer trojans, spyware inserted.  VOIP conversations recorded. Blog hacking. Manipulation of Google hits. Threats to readers of the blog.  Manipulation of search results for specific posts. Monitoring via “fake” readers/commenters (they know who they are).

6. Work projects sabotaged.

7. Professional relations sabotaged.

8. At least one accident that seems to have been intentionally staged.

9. Theft of IP.

10. Using proxies to threaten, attack, or discredit through staged provocations. Street theater (paying random individuals to engage in behavior calculated to threaten/cause anxiety).

 

The United States Of Spying

Andrew Napolitano via Lew Rockwell:

“When Gen. Michael Hayden, the director of both the CIA and the NSA in the George W. Bush administration and the architect of the government’s massive suspicionless spying program, was recently publicly challenged to deny that the feds have the ability to turn on your computer, cellphone or mobile device in your home and elsewhere, and use your own devices to spy on you, why did he remain silent? The audience at the venue where he was challenged rationally concluded that his silence was his consent.”

When I read this, I’m convinced that my experience in the past few years of having my private conversations surface in a wide-range of web-sites was not imagination or paranoia at all.

I am more than ever certain that the right explanation is spying by someone with access to government technology who was either a lawless private contractor or the witless employee of one of those urban DHS (Dept of Homeland Security) fusion centers that have become notorious for spying on anti-government dissidents.

Witless, because even the most brain-dead flunky of the government should know that venting your political opinion on a blog, sans any act of armed insurrection, espionage, or other illegal activity, is constitutionally-protected, indeed highly valuable, speech and that the government is not permitted in any way, shape, or form, to go on fishing expeditions in people’s private lives (remember those things?) to either back into charges, in the case of people who are engaged in wrong-doing, or to twist arms, in the case of people who are not  doing anything wrong and can only be coerced by the government’s own illegal actions or threats thereo.

 

Former Canadian Dep. Minister Convicted Of Child Pornography

CORRECTION:

Since I posted this piece, I’ve had time to look at the way in which Levin was charged and find that it’s really not clear what happened.

Beyond the possession of child pornography on his computer – and that’s quite easily downloaded by someone else –  is there hard evidence that he committed any of the crimes about which he, admittedly, fantasized.

Did he actually counsel a real mother with a real daughter to rape her child…. or did he respond to an FBI officer engaged in entrapment, which response, devoid of actual criminal action, is something of a manufactured thought-crime, however repugnant those thoughts might be?

ORIGINAL ARTICLE

From Lifesite News comes a report that the high-level Canadian bureaucrat behind a controversial child sex-ed program, has been convicted in court of being a child pornographer.  (For the American equivalent of the program, see here).

Ben Levin claims to have molested his own daughters and was recorded counseling mothers to molest their own children and prepare them for him to molest them.

For those who think that theories about a  global network  of pedophilic criminals in government are mere conspiracy theory, this will be an eye-opener about how and to what end our rulers are subverting instincts and cultural practices that have protected civilization for millenia:

Ontario Premier Kathleen Wynne’s former deputy minister of education, Benjamin Levin, was convicted March 3 in a Toronto courtroom to three charges involving child pornography: making written child pornography, counseling a person to commit a sexual assault, and possession of child pornography.

After Justice Heather Adair McArthur of the Ontario Court of Justice accepted Levin’s guilty plea to the three charges, crown counsel Allison Dellandrea said neither the crown nor Levin’s lawyer, Clayton Ruby, disputed the “agreed statement of fact.”

Among the more lurid details contained in the statement are the admission that Levin, in internet chats, claimed he had sexually abused his own daughters, hoped his daughters would make his grandchildren available to him for sex, and counseled an undercover officer on how to groom a child for sexual abuse. The statement acknowledges that there is no evidence Levin actually abused his children and he has not been charged for that offense.

Levin, in a light grey suit, sat slightly slumped in a chair to the left of lawyer Gerald Chan, often resting his head on his right hand and only once glancing behind at the 40 or so spectators filling the 1000 Finch Avenue courtroom.

These were news media, parents, grandparents, and the odd blogger, some of whom palpably recoiled as Dellandrea read out the statement of facts describing the events leading to the 63-year-old’s arrest on July 8, 2013.

At that time, Toronto police seized three laptops, 11 thumb drives, an XD Olympus memory card, a Samsung cell phone, and an external hard drive from Levin’s home.

They discovered 79 files of child pornography on two of the laptops and the external hard drive, but only 15 images and two videos were accessible to Levin. The rest of the child pornography was found in “computer system-generated folders” created without Levin’s knowledge while he used the Yahoo! Messenger program.

Levin had also created a Word document titled “aaa3” which compiled details of the approximately 1,750 people he had chatted with online “on the subject of subversive sexually interests, primarily those related to sexual contact between parents and children.”

Levin frequented a website, designated as “M” (as it is under ongoing police investigation) that described itself as an “alternative sexual lifestyle social networking site” with chat rooms on “incest” and “teens.”  Levin created his profile on M in 2010, describing his gender as “couple,” and his sexuality as “nothing is taboo.”  His profile, under the username BandB, had been visited 5,103 times, had 29 subscribers and was marked as a favorite by 44 users, according to the statement.

On August 7, 2012, Levin started an online chat with Toronto undercover police officer Janelle Blackadar, who posed as a “sexually submissive, young, single mother with a subversive interest in the sexualization of her children,” the statement reads.

Levin told Blackadar that “he sexually abused his own daughters and other children when they were as young as 12 years old, and encouraged D.C. Blackadar to do the same.” There is no evidence that Levin actually did so, nor has he been charged with this offence, the statement points out.”

Aadhaar run by “private shop” accountable to no-one

The New Indian Express points out that the Indian biometric ID is essentially being collated and bared for snooping by foreign governments and private corporations, with no accountability to Indian citizens.

The material collected can be used to track, monitor, and control citizens.

It can subject them to unlawful governmental surveillance, as well as to criminal attacks.

The material can also be used to silence dissidents, frame patsies and scape-goats, and terrorize the population at large:

In 2012, the IB warned the state about loopholes in Aadhaar, but the government continued with the enrolment process, sidestepping security concerns.

The NSA top secret documents leaked last week point to the covert operation. “Identity Intelligence is exploiting pieces of information that are unique to an individual to track, exploit and identify targets… ,” the papers stated.

Three types of data is being mined by the NSA which includes “biometric, biographic and contextual.” Biometric data shows an individual’s physical or behavioural traits like face, iris, fingerprints, voice etc. Biographic data gives details of life history, including address, school, and profession while contextual data is about individual’s travel history and financial bank details.

Although, the US government had earlier scrapped Aadhaar-like project for its residents, it surprisingly mounted covert ops to infiltrate biometric database in other countries. The decision of the US to not allow biometric profiling of residents was followed by China, Australia and UK and similar proposals were shot down by the respective governments.

The intelligence agencies raised the contentious provision in the contract agreement that allows foreign vendors to keep the biometric data for next 7 years making it easy prey for NSA. “The contract agreement signed by UIDAI with foreign vendors is absurd. Private companies can easily share it with US spy agency. We have seen how they arm twist private players to gain foothold in their server,” a top intelligence official said, adding the UIDAI also had arrangements with certain private software firms for technology assistance. “

Greenwald: Torture porn promoter

An insightful piece at reclusive leftist on one of the most prominent  activists against torture….when it’s done by the government   – “libertarian” Glenn Greenwald.

Greenwald has been unmasked as a corporate/intelligence shill and Iraq war-promoter by his own leftist ex-fans.

 

Update: I have been asked to preface this post with a warning that readers may find it disturbing.)

When I posted a link to Glenn Greenwald’s column the other day, I was unaware of his history as an advocate for torturers. Greenwald has vigorously championed torturers’ rights, has explicitly privileged their version of events over that of their victims, and has asserted — in agreement with the torturers — that “no real pain was inflicted” on the victims.

Of course these aren’t the torturers at Gitmo or Abu Ghraib. It’s the film company of “Max Hardcore,” an extreme pornographer who grossly abused women while filming the proceedings for the entertainment of other men. Hardcore claims his victims were thrilled to be tortured, and Greenwald accepts this point of view unquestioningly.

Amazing what a difference gender makes, huh?

And if you’re thinking that it’s not a question of gender, that the real difference is between prisoners of war and allegedly volunteer performers, think again. I’ll help you:

Imagine that instead of Max Hardcore, we have a U.S. Army dude stationed in Iraq with a sideline in homemade porn. Imagine that this homemade porn is of a very special kind, involving Iraqi boys and young men off the streets, the ones who are scavenging in garbage dumps and living hand-to-mouth. Our imaginary Army pornographer offers these guys $20 each to be in a porn video. Many of them say yes — after all, $20 is a fortune for a street kid.

Each porn video consists of heavy-duty homosexual sadism and racism. The young Iraqi victim in each film is violently penetrated, choked, beaten, urinated on, masturbated on, fed his own feces, and forced to crawl on the floor while saying things like, “I’m a filthy sand n*****” and “Mohammed is a pig-f*****.” The Army pornographer screams racist epithets at the young victim throughout — that is, when he’s not too busy raping and kicking and pissing and force-feeding shit down the Iraqi’s throat. By the end of each video, the Iraqi victim is shrieking in pain and sobbing uncontrollably. When the camera finally shuts off, he collects his $20 and gets the hell out — shocked, shattered, humiliated to his core.

So think about that. Think about this imaginary series of homemade porn from Iraq, and imagine that it’s widely popular — on Army bases, stateside, anywhere white men enjoy fantasizing about torturing exploited Iraqis. How do you think people like Glenn Greenwald would react? Do you think Glenn would be talking loftily about the Army pornographer’s First Amendment rights? Do you think he would say that the videos are simply entertainment? That no harm is being done, to anyone? Would he insist that the central fact of the matter is that the Iraqis are exercising perfect free will? And that by honoring their desire to be humiliated and tortured for $20, he’s respecting them as people?

Of course not. If porn like that existed, there would be an uproar. C*****! People would throw up after 10 seconds of one video. What kind of sick shit is this? The racism! The hatred! The sheer breathtaking cruelty! And the whole surrounding exploitation — god! Paying these garbage dump kids all of $20 to be tortured! It’s too sick to believe. And what kind of insane people get off on this shit anyway? What’s wrong with them? Is our society really that vicious? Liberals all over the blogosphere would be writing long posts about the black heart of American fascism. And people like Glenn Greenwald would be saying that if this shit isn’t illegal somehow, then by god, we need to find a way to make it so.

That’s if the victims were men.

In the real world, of course, there is porn just like that: it’s what Max Hardcore specialized in. But his victims were female, you see. And that makes it okay. You can do anything to a woman — anything at all — and as long as some dude gets an orgasm out of it, it’s okay.

(And I cannot resist noting the extent to which the orgasm, in our current bizarro era of human-rights-as-defined-by-Larry-Flynt, has assumed preternatural importance as a kind of all-purpose salvific justification.

If you’re a guy who likes seeing women get beaten up and raped and mauled, but you don’t get any kind of sexual charge out of it, you’re a creep who hates women. But if it gives you an orgasm, then by god, it’s a healthy and beautiful thing. And anybody who says otherwise is a prude.)”

More here on the so-called “left-libertarian” alliance and what it really fronts for.

OSINT, espionage, & sedition

A university researcher wrote to me a week or two ago. He asked if I would be interested in a project studying Operation Mockingbird and the CIA’s past and continuing use of the news media (and of social media).

A little research into the researcher showed that he was involved in a website promoting the use of  OSINT.

OSINT is the graceless acronym the government bestows on something called open-source intelligence.

OSINT is public information similar to what this blog uses.

Not just media reports, but links on forums,  government data,  court documents, commentary at blogs and in discussion groups, social media postings.

As long as it’s not confidential (a lawyer’s privileged conversation) or obviously private (a home phone number or medical information), it’s all fair game.

Until “national security” gets involved.

Of course, “national security” is an elastic term that seems to include everything.

The empire’s desire for full-spectrum dominance makes anything in outer – or inner – space part of “national security.”

Now, until I encountered the term OSINT in the past few days, I‘d no idea that what I was doing by chance bears a resemblance to what a whole wing of the CIA specializes in.

I do it because I’ve generally found the major media unreliable (and uninteresting) and the alternative media, while far more interesting,  ideologically biased.

But there’s a catch.

OSINT can get an un-credentialed journalist or blogger into serious trouble.

How serious?

Wikipedia on the dangers of OSINT:

“Accredited journalists have some protection in asking questions, and researching for recognized media outlets. Even so they can be imprisoned, even executed, for seeking out OSINT.

Private individuals illegally collecting data for a foreign military or intelligence agency is considered espionage in most countries. Of course, espionage that is not treason (i.e. betraying one’s country of citizenship) has been a tool of statecraft since ancient times, is widely engaged in by nearly all countries, and is considered an honorable trade.”

So, well-paid mercenaries and meddlesome bureaucrats who provoke international conflicts and break domestic and foreign laws while  spying on foreign countries are patriots, while unpaid citizen-bloggers/journalists trying to deconstruct the dense fog  of corporate-state propaganda to help ordinary people should be shot.

Very rational.

That leads me back to the curious invitation in my mail-box.

If gathering open-source intelligence can in some circumstances be seen as  treasonous, then why the invitation?

Blogging from public sources is one thing. But blogging that is intended to inform an enemy might be another.

The OSINT web-site I saw gave me a hint by referring to an open-source “revolution.

Long-time readers of my blog will probably know  how I feel about “revolutions,” especially those led by what I call techno-utopians.

And sure enough, in the last two weeks it seems that the 45-year-old meme of “open source revolution” has been revived.

Yes, 45 years. That’s how old this “cutting-edge” meme is.

Only now it’s migrated from the soft-ware community, where it began, to the intelligence community.

Going back, the term “open-source” was a spin-off from a community of “hackers” creating what was later called free software at an MIT artificial intelligence lab in 1971.

The word hacker here doesn’t mean anything criminal. It’s a positive word for people who take apart and improve on computer programs for the sheer fun of it and for the good of the public.

At least, that’s the self-portrait.

The developer of free software, Richard Stallings, later worked at Lawrence Livermore lab and won a MacArthur “genius” award.

Lawrence Livermore is a government lab devoted to science and research in the interests of national security.

The cypherpunk group, devoted to developing strong cryptography ,  was the group from which Julian Assange and Wikileaks emerged.

It  included one researcher from the Lawrence Livermore lab, as well as many senior people from Bell, MIT, and Sun Microsystems (among others).

Stallings himself is a strong supporter of free software.

He developed the “copyleft” approach to IP, which allows changes to be made to code by innovators, so long as each innovator in turn allows other users the same freedom.

Copyleft also allows people the freedom to commercialize their innovations.

Stallings is a strong supporter of the hacker collective Anonymous, seeing it as a kind of legitimate “street protest.”

You can search this blog to find my ruminations about Anonymous….

(To be continued)

Unknown devices…..

Unknown devices keep showing up under network adapters in my device manager. I keep disabling them and they keep showing up.

They have no signature, no device ID or function, no location or vendor information. They just have the word root and then a number.

Then there’s the comment link on which I accidentally clicked that took me to an empty website. Was someone tying to download something or find my IP address?

My computer got very buggy and slow yesterday. Then my security software keeps turning off.

Worse, there are the unknown devices of my fellow man.

Someone sent me an email at which to contact them. The handle was something like city-slicker@usa.com (not the actual handle, of course).

Now do high-profile people usually have emails with such handles,  and, even if they do, do they give it out to strangers on the web?  Do they insist on contacting you and then insist that you respond only on personal email and private cell numbers?

And then do they comment on this blog using a fake handle?

One with a link on which I accidentally click that takes me to an empty website set up a long while ago?

Methinks I smell a set-up.  Especially when the high-profile one claims to have intelligence contacts/experience.

I could be wrong, of course. In which case, my profound apologies.

But that is why I do not respond except in ways I choose.

And that is why I like to keep it strictly about politics, except for people who have actually intersected with me.

Even then, I tend to be wary.

Anything a stranger needs to tell me can be posted at this blog.

If it’s confidential and has some public importance, disguise the information and post pseudonymously.

If it’s private information, please find a personal friend in whom to confide.

It does you, the reader, and me, the blogger,  no good to confuse web-reality with real-reality.

Google: Cyberbullying for profit

An anonymous Australian web-site reveals how Google has a financial incentive to cyber-bully people by elevating smear-and-extort sites like The Ripoff Report.

(I will not link to it, but here is Wikipedia’s entry on the Ripoff Report):

[Side-note: One of my attackers on the web seems to have been affiliated with this site,  which essentially runs an extortion racket by smearing people via hired proxies and then asking for money from the victims to remove the smears.]

UPDATE September 20th 2013: Victory

A large number of major companies have removed their advertisements from Ripoff Report.

This webpage contains an overview of the project.

The updated full report can be downloaded from this url:

https://www.adrive.com/public/9u3aau/Cyberbullying for Profit September 2013.zip

A list of examples URLs from Ripoff Report containing offensive material about children, public figures and individuals is contained in an attachment to the report but an also be found here:

This video explains how Google priorities links from Ripoff Report in its search results.

This video shows that Google considers Ripoff Report has unacceptable  business practices. So why does it advertise on its webpages? The answer is…..advertising revenue for  Google (see above).

Overview

The website Ripoff Report and other websites that emulate the business model of ‘cyberbullying for profit’  publish false and offensive information about minors, teenager, adults and businesses and these are often accompanied by photographs and identifying details.   Ripoff Report also publishes extremely racist and homophobic material, offensive material about religious groups, public figures and ‘celebrities’. While the material about public figures appears to be given a low Google page rank, the names of children, teenagers, ordinary people and small business owners ‘reported’ on these websites is contained in snippets displayed at or near the top of the Google search results (SERPs). These snippets contain names and location details couched in terms such as ‘ripoff’, ‘fraud, ‘pedophile’, ‘scam’, ‘whore’, ‘slut, ‘prostitute’, ‘skank’, ‘murderer’, ‘bitch’ ‘faggot’ ‘liar’ ‘drug abuser’, ‘cunt’, ‘stalker’, ‘HIV’ and/or ‘AIDS’ and other accusatory and derogatory terms.  

Ripoff Report earns revenue from two sources – advertising and payments from victims to the website to ‘rehabilitate’ their reputation in the Google search results or remove the false material. Despite the fact that the claims are false, if a person cannot pay their life is ruined because, as stated by Google, their search engine is often ‘the first place people look for information that’s published’ about a person.

Even if the allegations can be proven to be false Ripoff Report will not remove the material unless they are paid a substantial corporate advocacy’, or ‘arbitration’ feeIn response to removal requests, Google provides a number of excuses and victims must find an ‘ex-gratia’ payment in order to ensure the material is removed from the Google index and ameliorate the danger towards their children and/0r save their livelihoods and businesses. Furthermore, Ripoff Report publishes registered trade names and copyrighted photographs without permission. It claims a copyright over the webpages. This business model is enabled by both a high Google page rank  and advertising revenue. The companies and business that advertise on Ripoff Report supply this revenue and support the endangerment and cyberbullying of children, teenagers and adults and the destruction of careers and livelihoods. This project arose out of my own experience with the publication of false and defamatory material on these websites.

Despite the fact that it takes only a couple of minutes to remove links from the Google index, after four years of notifications, pleading with the website and Google, and litigation against Google it has not been removed. ……I sued Google for defamation in February 2011 with the hope that it would simply remove the links and I could then move on with my life. My hope was misplaced. …….

…Despite the fact that Google refuse most removal requests, they have quietly removed links for other victims of Ripoff Report.

[Lila: I have seen Google actively suppress information that exposes the financial mafia,which is to the left, politically.]

“For obvious reasons I cannot and will not publish the names of these people because they likely paid a substantial amount to either the websites or Google to save their families and livelihoods.

However, Google can and does remove websites and links without much effort.

For example, since December 2011 Google has removed almost 90,000 links from its index at the request of Ripoff Report. Many of those links contained registered trademarks and copyrighted photographs but it appears that Ripoff Report is  not questioned about these DMCA issues by Google. My blog, was also removed from the Google index soon after it went online.  If this appears difficult to believe consider that the removal occurred  after I drew attention to the blog by applying for AdSense advertising as an experiment.

In fact, I clearly stated on my blog that I was suing Google. Apparently’ freedom of speech’ only applies unless one says something negative about Google.

My blog was magically re-indexed in the Google index within hours of my public complaint in a blog conversation in which Matt Cutts was participating. The documents showing the removal and reinstatement of my blog in the Google SERPs can be downloaded from this link.

[Lila : Here is a previous blog post of mine, from 2009, where I reference Ripoff  Report and its owner, in the context of describing the nexus of organized crime and short-sellers.]

Worst cyber-crime is in US, Russia

As I blogged yesterday, the IP addresses attacking me trace back to a Netherland hosting company called Ecatel Network.

ECATEL NETWORK

Ecatel has become notorious for hosting bad actors, from the Russian spammers to pedophile networks.  It also has a reputation for brushing off requests for help from the victims.

Trying to figure out what was going on, I did a bit of research into the world of cyber-crime.

AKAMAI REPORT – CHINA LEADS CYBER-CRIME?

The mainstream media likes to portray cyber-crime as essentially a foreign threat. China, especially, is fingered as the bad guy.

For instance, in January,  US-based Akamai Technologies issued a report  placing China at the head of global hacking, responsible for 35% of cyber-attacks world-wide.

More recently,  the US government pressed cyber-warfare charges against five of China’s army officers.

Nigerians scamsters are rumored to run a close second.

There are two things wrong with this picture. The first is the source of the information.

Akamai Technologies is a “content-delivery network” head-quartered in Cambridge, Massachussetts.

It was founded by an MIT applied math professor, Tom Leighton, and a graduate student at MIT, Daniel Lewin, later killed on AA flight 11, which crashed during the September 11, 2001 attack.

According to his MIT bio, Leighton is a specialist in cryptography,  digital rights, and algorithms for network applications. He also chaired a Presidential committee on Cyber-Security.

Akamai’s co-founder,  COO, and President was the founder of the Road-Runner cable service. Its CEO was a senior VP from IBM.

Akamai’s privacy policy states that it collects IP addresses and effectively tracks clients.

Its partners include Microsoft and Apple and its clients include the BBC, the White House,  Facebook, Twitter, Adobe Systems, Netflix, Yahoo, ESPN Star (India),  China Central Television and Al Jazeera, among many others.

How likely is it that reports from Akamai on cyber-crime are untouched by political pressure?

WORLD HOSTS REPORT –  US, RUSSIA LEAD CYBER-CRIME

Point two. The statistics don’t support Akamai’s pious propaganda.

The Chinese do indeed have a very high number of IP addresses attached to their malicious activity. If sheer volume were the only criterion, China would dominate.

However,  as far as the number of malicious sites and the level of threat involved, the world’s leading cyber-criminals aren’t Chinese.  Not even close.

They are in the US and in Russia, closely followed by smaller countries like the Netherlands, the Ukraine, and Romania.

In Host Exploit’s authoritative World Hosts Report of March 2013, five of the top twenty  malware hosts were based in the US; four were in Russia, two each in the Netherlands, Germany, and the Ukraine.

Chinanet Backbone was the only host from China that made the top twenty.

What was especially interesting to me was to find the originator of the attacks on my computer, Ecatel network, at the top of the list of the world’s leading hosts for malware.

Host Exploit also breaks down cyber-crime by country, with Russia leading the pack.

This is its list of the world’ top ten cyber-crime havens in 2013:

1. The Russian Federation (RU)

2. Belarus (BY)

3. Ukraine (UA)

4. The British Virgin Islands (VG)

5. The United States (US)

6. Romania (RO)

7. Netherlands (NL)

8. Poland (PL)

9. Turkey (TR)

10. Bulgaria  (BG)

 

Electronic Police States – Top Twenty Five

Cryptohippie, which seems to support Wikileaks and Assange, came out with its third and last global ranking for “electronic police-states” a few years ago.

I find Cryptohippie itself a bit “interesting.” Why did it issue only three rankings and why did the rankings stop in 2010?

There might be some innocuous reason for it, but these days it pays to subject everything to close scrutiny.

If the powers-that-be wanted to “warn” the population via a respected NGO, it would not be a “threat” but a public service, right?

In any case, Cryptohippie divides the world into black, red, orange, yellow, and green zones, in descending order of control.

Black indicates total control and only North Korea fell into that territory in 2010 .

The red zone (advanced police states) included the US, UK, Russia, China, and Europe.

India, Australia, and Canada fell into the orange zone (fast developing police states).

The yellow zone (laggards) included parts of Europe and Mexico. The green zone (relatively free but some control) included Brazil and parts of Europe and Asia.

India came in at 26 in 2010.

1. North Korea

2. China

3. Belarus

4. Russia

5. USA

6. UK

7. France

8. Israel

9. Singapore

10. Germany

11. Ireland

12. Malaysia

13. Netherlands

14. Italy

15. S. Korea

16. Australia

17. Belgium

18. Spain

19. Austria

20. Ukraine

21.Greece

22. Switzerland

23. Japan

24. Norway

25. Canada

 

Margaret Newsham: Echelon Whistle-blower, Hero

I’ve blogged before about Margaret Newsham, who was dismissed in 1984 (30 years ago) from Lockheed Martin, where she was working on the Echelon global espionage system, a project kept secret even from the US government, since it was completely unconstitutional.  In other words, it was a project of the corporate overlords of the government and the intelligence services, a product of the “shadow state” as it were, not of the day-light government.

While Mr. Greenwald and Mr. Snowden and Mr. Napolitano hold forth with no mention of thirty years of whistle-blowers,  I would like to salute Margaret Newsham, for her enormous personal sacrifices for the sake of the truth and the common good. Here is an excerpt from a 1999 interview she gave to a Danish newspaper:

From “I sold my life to Big Brother”:

” The government didn’t really know what was happening or what the many billions were actually being used for. And I felt very loyal both to the government and to the American Constitution, which was constantly being infringed. The world of espionage was also called ‘The Black World’ because most of the operations were carried out in secrecy, beyond any control.”

Since her dismissal, Margaret Newsham has been under heavy pressure, because her case against Lockheed Martin could mean that an open court case would shed light on the NSA’s ‘black projects’. Among other things, the case deals with swindling for more than 10 billion DKK (ca. 1.4 billion USD), and for the time being, her lawyer has provided her with legal assistance that is the equivalent of 140 million DKK (ca. 20 million USD).

PREMATURE DEATHS The case has had a fatal effect on her health. Since ’84 she has had seizure that left her  totally paralyzed, survived a cardiac arrest, and on top of everything else is suffering from cancer. Today, she lives on borrowed time and suffers from high blood pressure.

“It didn’t help any when my husband asked for a divorce after I had survived my cardiac arrest. He is chief of security at Lockheed Martin and has also been under a lot of pressure. He was grossly harassed because of his affiliation with me,” Newsham says.

She lives alone now and has struggled to maintain contact with her three children and six grandchildren. Today, she lives in a quiet Las Vegas suburb. Not even her neighbors know about her past.

“NSA’s activities have not only affected me, but also my former espionage colleagues at Lockheed. Nearly half of the people I worked with on clandestine projects are either dead or mortally ill today. For example, my former boss on the Echelon project, Robert Looper, died prematurely of heart failure, and Kay Nickerson, who worked on developing the Stealth bomber, died of brain damage.”

Surveillance Psychosis Theater

 

Yet another act in the ongoing theater of the International Surveillance State:  “Wikileaks names US cell-phone spy target as Afghanistan, claims Google”(h/t Wenzel@EPJ)

The protagonists are well-known by now:

Wikileaks, Laura Poitras, Glenn Greenwald, Edward Snowden,  and Paul Watson (from Infowars, Alex Jones’ site).

They’ve already established their “street cred” (credibility at the grass-roots) with their activism, so their words are taken at face-value:

Earlier this week, Pierre Omidyar’s national security blog, The Intercept, reported that the US is recording all telephone calls made in and out of the Bahamas and one other unnamed country.

The story, co-bylined by Ryan Devereaux, Glenn Greenwald and Laura Poitras, explained that the Intercept had decided not to name that second “country X” due to the risk of increased violence in response.

As I wrote at the time, this decision prompted a furious response from former allies Wikileaks, which “condemn[ed] Firstlook for following the Washington Post into censoring the mass interception of an entire nation.”

Upping the stakes, Wikileaks also promised to name the redacted country within 72 hours.

Late last night the organization made good on its promise, issuing a statement claiming that “country x” is Afghanistan…

“Country X”! I’m surprised Greenwald didn’t put on a V for Vendetta mask and hiss “Psssst” from the bowels of a seedy bar.

As I’ve written here and here and here and here, and even back in 2005  in “Language of Empire,”  the government has been spying on all our calls and emails, without a warrant for a while now.

Even the mainstream press has reported this a long time ago.

That fearless dissident voice, The New York Times, published the following only a decade ago:

“Bush lets US Spy on Callers Without Courts,” James Risen and Eric Lichtblau, NY Times, December 16, 2005.

Let me call your attention to this line:

While many details about the program remain secret, officials familiar with it say the N.S.A. eavesdrops without warrants on up to 500 people in the United States at any given time. The list changes as some names are added and others dropped, so the number monitored in this country may have reached into the thousands since the program began, several officials said.

Except for the suspiciously low number of people the government admits to targeting,  what did this piece really hide?

Here is a leading establishment organ substantiating what activists and immigrants have known since 9-11:

Every call overseas, every email, is subject to government monitoring.

Now, I don’t know what other people take to be monitoring. But, by 2004 many immigrants like me were generally aware that the government was listening to all our calls and emails abroad.  We even joked about it.

It was in 2010, when I was browsing Cryptome’s archives, that I realized that calls and emails directed abroad were also being taped and archived.

That part, I admit, was a shock.

 

 

Blogger arrested for invasion of privacy

A blogger was arrested for invading the privacy of a relative of a political candidate:

http://www.cnn.com/2014/05/17/politics/mississippi-gop-primary-arrest/

“The arrest of a man who allegedly obtained an image of a senator’s bedridden wife has shaken up an already intense Republican primary battle in Mississippi.

Political blogger Clayton Kelly was arrested Thursday, accused of exploiting a vulnerable adult and illegally and improperly obtaining a photo of her without her consent for his own benefit, according to the Madison Police Department.

Donald Clark, an attorney for Sen. Thad Cochran, R-Mississippi, and his wife, Rose, told The Clarion-Ledger newspaper that the woman in question is Rose, saying the Cochrans’ “privacy and dignity have been violated.” Rose Cochran suffers from dementia and has lived at St. Catherine’s Village, the nursing home where Thursday’s incident took place, for 14 years, according to the newspaper.”

The usual suspects will cry foul.  Journalists – even bloggers –  should always be free to say anything they want to about the political class.

On its face, of course, the arrest is a prior restraint, since no one has established the blogger’s guilt in a court of law.

However, this is not the first case of this type. Last year, the Legal Schnauzer blog,  which admittedly published defamatory material, was shut down before a court could adjudicate:

It’s clear that Southern courts are taking an aggressive position on the issue.

Frankly, constitution or not, I can sympathize with the victims. If political bloggers cannot tell the difference between a public issue and a private, they might need a severe shaking-up to find out.

On the other hand, the whole business worries me a lot.

While the first use of the law to pre-emptively discard public speech might be exerted on an obviously unsympathetic figure, it doesn’t follow that every other use will be.

For instance, there was another recent case of an outspoken blogger with powerful enemies being arrested, without a search warrant, for having child-porn on his computer.

Here,  the charges do in fact look trumped up and motivated by resentment of the blogger’s political speech:

These days, with the government privy to every move you make on the Internet, how hard would it be for someone to get a friend in government or a former government employee or contractor to download something onto your computer?

Not very hard, said a counter-terrorism expert I spoke to, although an FBI agent told me the FBI could always determine how any material was downloaded.

Still, if you’re a political blogger, the chances are you don’t want to be relying on the good offices of the FBI to avert a long stay in jail.

Godfather of Abortion Inc. Converted to Pro-Life

At Catholic Education.org, the godfather of American abortion, Dr. Bernard Nathanson, confesses he’s had a change of heart:

“I am personally responsible for 75,000 abortions. This legitimizes my credentials to speak to you with some authority on the issue. I was one of the founders of the National Association for the Repeal of the Abortion Laws in the U.S. in 1968.

A truthful poll of opinion then would have found that most Americans were against permissive abortion. Yet within five years we had convinced the Supreme Court to issue the decision which legalized abortion throughout America in 1973 and produced virtual abortion on demand up to birth.

How did we do this? It is important to understand the tactics involved because these tactics have been used throughout the western world with one permutation or another, in order to change abortion law

The First Key Tactic was to capture the media

We persuaded the media that the cause of permissive abortion was a liberal enlightened, sophisticated one. Knowing that if a true poll were taken, we would be soundly defeated, we simply fabricated the results of fictional polls. We announced to the media that we had taken polls and that 60% of Americans were in favour of permissive abortion. This is the tactic of the self-fulfilling lie. Few people care to be in the minority.

We aroused enough sympathy to sell our program of permissive abortion by fabricating the number of illegal abortions done annually in the U.S. The actual figure was approaching 100,000 but the figure we gave to the media repeatedly was 1,000,000. Repeating the big lie often enough convinces the public.

The number of women dying from illegal abortions was around 200-250 annually. The figure constantly fed to the media was 10,000. These false figures took root in the consciousness of Americans convincing many that we needed to crack the abortion law.

Another myth we fed to the public through the media was that legalizing abortion would only mean that the abortions taking place illegally would then be done legally. In fact, of course, abortion is now being used as a primary method of birth control in the U.S. and the annual number of abortions has increased by 1500% since legalization.

[Lila: Again, concealed from the public is the fact that the US has an abortion policy far more radical than many socialist countries, like India, where late-term abortions would be considered murder. Here, they are perfectly legal, and, as the Kermit Gosnell story shows, they are far more prevalent than the media admits.

Moreover, the Emily Letts  abortion snuff video shows that abortion is used instead of contraception or responsible prevention.

Indeed, the video was most likely disseminated to normalize and promote the practice of abortion as contraception. There is no doubt in my mind that the intention is not to sever and destroy the “stigma of abortion,” as the media claimed, but to sear and cauterize the mother’s conscience, to cut the umbilical cord of maternal affection, to pervert the energetic bond between mother and child.

In that sense, and in many others, the video was filled with “occult” religious clues, but it was the religion of black witchcraft, not Christianity or Judaism.]

The Second Key Tactic was to Play the Catholic Card

We systematically vilified the Catholic Church and its “socially backward ideas” and picked on the Catholic hierarchy as the villain in opposing abortion. This theme was played endlessly. We fed the media such lies as “we all know that opposition to abortion comes from the hierarchy and not from most Catholics” and “Polls prove time and again that most Catholics want abortion law reform.”

And the media drum-fired all this into the American people, persuading them that anyone opposing permissive abortion must be under the influence of the Catholic hierarchy and that Catholics in favour of abortion are enlightened and forward-looking. An inference of this tactic was that there were no non-Catholic groups opposing abortion. The fact that other Christian as well as non-Christian religions were (and still are) monolithically opposed to abortion was constantly suppressed, along with pro-life atheists’ opinions.

[Lila: A key element in this strategy was to infiltrate and subvert the Catholic church from within. Thus, the church was first demonized for excluding gays; then when the gays in the church contributed to the pedophilic abuse, the blame was shifted onto celibacy and Catholic teaching on celibacy, rather than onto the proclivities of the priests.

Celibacy was thus associated with a so-called pedophilic hierarchy of conservative males, thus discrediting it.]

The Third Key Tactic was the Denigration and Suppression of all Scientific Evidence that Life Begins at Conception

I am often asked what made me change my mind. How did I change from prominent abortionist to pro-life advocate? In 1973, I became director of obstetrics of a large hospital in New York City and had to set up a perinatal research unit, just at the start of a great new technology which we now use every day to study the fetus in the womb. A favorite pro-abortion tactic is to insist that the definition of when life begins is impossible; that the question is a theological or moral or philosophical one, anything but a scientific one. Fetology makes it undeniably evident that life begins at conception and requires all the protection and safeguards that any of us enjoy.

Why, you may well ask, do some American doctors who are privy to the findings of fetology, discredit themselves by carrying out abortions?

Simple arithmetic: at $300.00 a time 1.55 million abortions means an industry generating $500,000,000 annually, of which most goes into the pocket of the physician doing the abortion.

[Lila: Actually, because of the trade in organs and fetal tissue, abortion is probably far more lucrative than that.  Kermit Gosnell apparently made something like $1500, not $300, from each abortion performed. That means roughly five times the figure above, or over $2 billion. This is just an extrapolation from media figures, of course.

The largest advocate of family planning services and the biggest provider of them, Planned Parenthood, relies largely on providing abortion to the public, not “other family services”:

“According to Planned Parenthood’s own apologist, Media Matters, its “total revenue from abortion services was approximately $164,154,000,” a year. Accordingly, over 51 percent of Planned Parenthood’s clinic income comes from abortion.

In addition to its $320.1 million in clinic income and $223.8 million in private donations, Planned Parenthood receives $487.4 million dollars a year from taxpayers.

Lila (continued): The liberal-left darling, Planned Parenthood, dispenses abortion pills in addition to abortion procedures, making the outfit the killer of over 300,000 children every year.

It is not coincidental that those children are mostly black, brown, and from the underclass, given that the mother of family-planning, Margaret Sanger, was a devoted eugenicist who wanted to control the birth-rate of the population and weed out “undesirables.”

Bernard Nathanson (cont):

It is clear that permissive abortion is purposeful destruction of what is undeniably human life. It is an impermissible act of deadly violence. One must concede that unplanned pregnancy is a wrenchingly difficult dilemma. But to look for its solution in a deliberate act of destruction is to trash the vast resourcefulness of human ingenuity, and to surrender the public weal to the classic utilitarian answer to social problems.”

As a scientist I know, not believe,  that human life begins at conception. Although I am not a formal religionist, I believe with all my heart that there is a divinity of existence which commands us to declare a final and irreversible halt to this infinitely sad and shameful crime against humanity.”

The insanity of public debate in America

Consider the following,:

1. A woman has the absolute right to kill her baby until the moment it exits her uterus. She can also dismember it and torture it by burning it with saline fluid, plucking off its limbs, crushing its bones, or sucking its brains out.

These actions are guarded ferociously as her “right to privacy” by the entire intellectual establishment that silently blacks out or distorts descriptions of these killings. Some 50 million babies have been killed in the past few decades but this holocaust is left to private conscience only. Women or their doctors are not punished for it at all. In fact, they’re applauded and public funding is used to pay for it, even while that part of the public that doesn’t go along with abortion is demonized.

2. An eighty-year-old man makes a few untoward remarks to a girlfriend in the privacy of their bedroom. The tapes are recorded. and published. He is denounced as a disgusting racist with no right to his opinions and he is deprived of his property rights.

Leading “libertarian” activists  say nothing or defend the media’s position. They tell people they ought not to say anything in private they can’t say in public.  This is a thought-control much greater than that under Sharia law, which all these activists would denounce, correctly. None of them sees the contradiction.

No one thinks of simply ignoring and not linking the Sterling material. Instead, they all follow the media’s cue automatically, as though pulled by invisible strings. Then they call themselves “fiercely independent” and talk about “freedom,:” “free speech,” “free choice,” “self-ownership” and other flattering mythologies with a straight face.

Meanwhile, so-called “evil statists” are the only ones arguing that the the recordings are on their face illegal and should not be distributed in the public realm.

The parameters of debate in the much-vaunted “free press” are set by media barons who profit from cheap gossip and extortion (which lowers the cost of running a paper, since the public does the reporting for free or for small sums), pornographers, and paid operatives of the government posing as private actors.

No one considers this a gross conflict of interest. The media barons are presumed not to have political agendas and presumed not to manipulate in collusion.

Nor is this manipulation termed what it is – an extension of the state into the private sphere. It is all deemed “free market” unproblematically.

3. The same people attack anyone who criticizes a paid porn performer for her consciously public acts. They argue that she has a right to privacy even though she sold her porn pictures to a public company voluntarily.

I actually agree with that argument, but those who deny a Donald Sterling his privacy can surely have no justification for giving a Belle Knox hers.

With equal confusion, recording the private sexual behavior of Tyler Clementi (the gay Rutgers freshman who committed suicide)  is a vicious assault on his privacy and dignity (it is), but recording the speech of a Donald Sterling is a righteous act of public policing (it is not).

4. The same people who attack Donald Sterling’s private speech and hold it to an arbitrarily decided public standard also denounce theocracy (with its logically entailed blasphemy laws) as an insupportable and “medieval” intrusion into free speech and thought. And they declare themselves the embodiment of “reason” against the “irrationality” of the religious.

5. The same critics of Sterling who believe it is legitimate for him to lose his livelihood over private speech within his bedroom have a fit over the most minor constraint placed on their right to use speech in public to degrade, inflame, incite, defraud, mislead, or titillate. They even object to any constraint placed on their right to disseminate for commercial profit the vilest images, even where they would be accessible by minors.

They defend their right to view violent child pornography, even though that right supplies the demand that drives a global market of child abuse and murder and though the act of viewing itself has been deemed criminal.

But while the act of viewing child-porn is criminal, the act of dismembering a child is deemed “private” and protected.

The left also defends without any nuance or moderation the right to publish “art”  that inflames the public, even where major violence could result  as in the Danish cartoons of Mohammed, which, as it turns out, were a deliberate provocation from a neo-con flack.

Mommy dearest makes snuff-movie, calls critics “haters”

UPDATE:

Please note that this piece is not intended to bash or mock women who have undergone abortions. That is a matter between a woman and her conscience, at least under current law.

The post is intended to deride an abortion-activist who turns a  matter that at all other times she claims is private into a public spectacle, even while branding critics as pure evil, for simply telling her what they think about it.

ORIGINAL POST

Yet another gloriously “humanitarian” feminist, not content with aborting her child,  goes viral with the deed so she can blot out her guilt.….

The malign mommy didn’t really film her first trimester abortion in gory detail, because that would put a crimp in her “you-go-girl” story.

She just filmed herself – the heroine of the episode.

A genuine aborti-flick would have shown the unpleasant reality behind the flattering fiction.

And, of course, this brand of feminism is all about spinning flattering fiction…. and erasing unflattering reality.

Mommy dearest writes:

“A first trimester abortion takes three to five minutes. It is safer than giving birth. There is no cutting, and risk of infertility is less than 1 percent. Yet women come into the clinic all the time terrified that they are going to be cut open, convinced that they won’t be able to have kids after the abortion. The misinformation is amazing, but think about it: They are still willing to sacrifice these things because they know that they can’t carry the child at this moment.

[Lila: To an objective observer, this “sacrifice” is nothing of the sort. It is sheer recklessness.]

“There are three options for a first-trimester abortion: medical abortion, which is the pill; a surgical abortion with IV sedation, where you’re asleep through the whole thing; and a surgical abortion with local anesthesia during which you’re awake. Women are most terrified of being awake.

[Lila: Indeed.]

“I could have taken the pill, but I wanted to do the one that women were most afraid of. I wanted to show it wasn’t scary — and that there is such a thing as a positive abortion story. It’s my story.

Everyone at the clinic was really supportive of filming it.”

[Lila:  Mass man is at his core a voyeur, a bored busy-body.  He seems never happier than when playing peeping- tom at your expense, or sharing more than you want to know, at his own.]

“At first they wanted to sit down and talk about the real consequences of this. There are a lot of politics involved. We knew we could have hundreds of protesters at our door; we could have bomb threats. Working at an abortion clinic, every once in awhile it feels like you’re working in a war zone.

[Lila:  Her self -dramatization takes away the focus from the real victims, her unborn baby.]

“But I said, “Bring it,” and they were on board.

I knew the cameras were in the room during the procedure, but I forgot about them almost immediately. I was focused on staying positive and feeling the love from everyone in the room. I am so lucky that I knew everyone involved, and I was so supported. I remember breathing and humming through it like I was giving birth. I know that sounds weird, but to me, this was as birth-like as it could be. It will always be a special memory for me. I still have my sonogram, and if my apartment were to catch fire, it would be the first thing I’d grab.

[Lila: If this were metaphysics, it would be excellent. As abortion documentary, it’s nothing more than delusion.]

“The first night I posted the video to my Facebook page, I couldn’t sleep. I went out with friends, and I was so paranoid people were looking at me a certain way because they saw my video. The intimacy of it made me nervous, even though I really wanted people to see it.

[Lila: Can anyone any more wonder why the population doesn’t object to its medical records being pawed through by the government? People simply have no sense of privacy. If the love of private life is the mark of the civilized man, then we must confront the truth that we are no longer civilized.]

“Then I looked at my Facebook wall. I was expecting this tsunami of hateful, scary things, but everyone was so breathtakingly supportive. People who I have never talked to started writing their own abortion stories.

[Lila: Bad taste, thy name is “sisterhood.”]

“I had one woman who messaged me saying she’d had an abortion that week and she was plagued with guilt. Her boyfriend called her a killer, but she said she was recovering well and appreciated the video. Another woman told me she’d had a miscarriage and that because of my video she felt like she could talk to me about it. Just all of these things started pouring out of women.

There were hateful responses, of course, which was the hardest part of this whole thing. When I put it up on YouTube, pro-lifers put it on their newscasts. And so I got, “You’re a Nazi,” “You deserve to die,” “You killed your baby.” Just so much blind hatred without knowing who I am or what I’m about.

[Lila: This so-called  “hatred” is far from blind. It’s the wide-awake anger of the sentient and the just, appalled by her self-absorption and indifference to what is, finally, a killing.

It is both natural and good to hate something hate-worthy, like  irresponsible killing.]

“Still, every time I watch the video, I love it. I love how positive it is. I think that there are just no positive abortion stories on video for everyone to see. But mine is.

I know there are women who feel great remorse. I have seen the tears. Grieving is an important part of a woman’s process, but what I really wanted to address in my video is guilt.

[Lila: Yes, guilt. That little voice from one’s conscience that says that abortion is not all fine-and-dandy.]

“Our society breeds this guilt. We inhale it from all directions. Even women who come to the clinic completely solid in their decision to have an abortion say they feel guilty for not feeling guilty. Even though they know 110 percent that this is the best decision for them, they pressure themselves to feel bad about it.

I didn’t feel bad. I do feel a little irresponsible and embarrassed about not using birth control. I mean, Emily, wake up! What are you doing? I was going against the advice I give to patients all the time. So I had them put an IUD in after the abortion. I was able to learn and move forward. And I am grateful that I can share my story and inspire other women to stop the guilt.”

Lila: Translation:

As long as you can make yourself feel good about it, go ahead and do what you want. Ignore anyone who suggests that, if not garden-variety murder, this is something less and more at the same time.

Above all, feel good, because feeling good is all that matters.

For that, keep tight control of the language and the images.

Don’t let either get out of your control.

As long as you can make yourself look good, through subversion of the language  you can feel good.

As long as you feel good, you are good.

And anyone who fails to go along with that self-portrait, why, they’re nothing more than haters.

UK’s Cinderella Law: Jail for “Emotionally Abusive” Parents

The United Kingdom, already one of the most heavily surveilled states on earth, has decided that spying on its citizens with street cameras, shop cameras, cell-phone software, GPS tracking, email snooping, financial audits, welfare agency monitoring, and neighborhood snitches is simply not enough.

It wants to poke its nose into family life.

As usual, the pretext is a humanitarian one – the protection of children from abuse at home.

But child protection laws already punish physical/sexual violence and neglect of any kind severely.

So what’s left?

Now, parents face jail-time for convictions for emotional abuse, which can be anything from fighting in front of their children, blaming their children, being cold to them, or not paying enough attention to them.

Emotional abuse is real. And it is damaging.

But it’s also dynamic, complex and definitely not something a government official should meddle in.

Imagine the thousands of decent, loving families that are going to be ripped apart and destroyed by this malign law, as The Independent rightly points out:

“These days, parents who smoke or drink alcohol in front of children risk being characterised as child-abusers. Opponents of the tradition of male circumcision condemn Jewish and Muslim parents as abusers of children. Health activists denounce parents of overweight children for the same offence. Mothers and fathers who educate their children to embrace the family’s religion have been characterised as child abusers by anti-faith campaigners.”

Educating people about family interaction is one thing.

But there’s  already plenty of that going on.

What this law does is empower yet another empire-building department to pile up parental scalps in its quest for budgets, clout, and public profile.

Meanwhile, kids who tattle on their parents are losers too. They face the trauma of losing their parents to jail; losing their family life to endless days in court; and losing their own selves to a web of foster homes and government offices.

This isn’t a Cinderella law.

It’s a Cruel Step-mother (government) Law.

Telegraph.co:

“Changes to the child neglect laws will make “emotional cruelty” a crime for the first time, alongside physical or sexual abuse.

The Government will introduce the change in the Queen’s Speech in early June to enforce the protection of children’s emotional, social and behavioural well-being.

Parents found guilty under the law change could face up to 10 years in prison, the maximum term in child neglect cases.

The change will update existing laws in England and Wales which only allow an adult responsible for a child to be prosecuted if they have deliberately assaulted, abandoned or exposed a child to suffering or injury to their health.”

Once again, this is not about protecting children.

It is about giving the government the tools to intervene on behalf of  the “politically correct” agenda, which is the mask under which censorship of potentially disruptive political speech takes place.

It’s not about protecting a child who has sexual identity (or other) problems from harassment and cruelty.

Laws against physical abuse already do that.

It’s about using the accusation of “bigot,” “homophobe,” or “sexist” to jail human beings who are otherwise law-abiding citizens.

It takes no great imagination to see how universal surveillance plays into this.

Surveillance allows the government to surreptitiously target the people it wants to harass through analysis of their online activity, cell phone conversations, purchases, and social networks.

The guidelines for what constitutes a public threat have already been drawn up.

Provocateurs, agents, and civilian snitches, embedded in schools and welfare agencies, will then monitor the child of the  targeted person for investigation, coercive interviews, and direct threats.  Few children can stand up to such tactics.

Whatever they admit under pressure  then becomes the platform for a full-scale intervention into the targeted family.  Then follows jail-time, shrink sessions, and re-education camp  for the unlucky parent/s, whose entire private life now becomes public criminal record.

Criminalizing ordinary behavior and intimidating law-abiding citizens with an amorphous and expansive law is as good a way as any of politically gelding a large chunk of the population, hitherto beyond the reach of the criminal justice system.

Google’s “Hummingbird”: IP Theft & Mind-Control

Google’s new search algorithm Hummingbird adds to the company’s sinister reputation among privacy advocates.

Google’s creepy Google Glass didn’t help it either.

Now comes Hummingbird, the biggest algorithm change in the search engine in twelve years.

“Hummingbird should better focus on the meaning behind the words,” Sullivan reports. “It may better understand the actual location of your home, if you’ve shared that with Google. It might understand that ‘place’ means you want a brick-and-mortar store. It might get that ‘iPhone 5s’ is a particular type of electronic device carried by certain stores. Knowing all these meanings may help Google go beyond just finding pages with matching words.”

(Hummingbird is Google’s biggest algorithm change in 12 years,” WebProNews,  Sept. 28, 2013)

Simply put, Hummingbird is about Google trying to find the holistic meaning behind the individual words of a search-string (the query or series of words you input into the search function),  or, in the case of websites, the overall intent behind the key-words most used.

Bottom-line: Google is trying to figure out what’s going on in your mind when you type out certain words.

That is terribly similar to an area of research dear to the defense and spy agencies – predictive software and technology.

For instance,  DARPA (Defense Advanced Research Projects Agency) is very interested in developing the cognitive footprints of users for identification purposes.

The goal is to bypass the need for passwords, which tend to be cumbersome for users and vulnerable to password-cracking, phishing, social-engineering, memory failures, and hardware theft.

Software biometric modalities” are to be used to develop what it terms Active Authentication.

Anyone can see how useful the new Hummingbird algorithm would be to DARPA.

Indeed, given Google’s prior collaboration with the CIA in the monitoring of social media, it wouldn’t be surprising if Hummingbird has also come out of a joint project with the government.

The defense agencies come up with the technology to figure out what random “bad guys” are up to. Google monetizes it and returns the favor by data-sharing with the government.

The consumer might have his every need…indeed wish…met, but web-users are now going to find that Google’s “free lunch:” is not only not free, it’s not remotely cheap.

And web users are the ones footing the bill.

Here’s how.

“Google Hummingbird: Where no search has gone before,” Jeremy Hull, iProspect, Wired, October 15, 2013

Google has updated its search algorithm many times over the past few years, but previous updates were focused on making Google better at gathering information — for example, indexing websites more often and identifying spammy content. Hummingbird is focused on the user. It’s about Google getting better at understanding what searchers really want and providing them with better answers.”

That’s Google’s stated objective, of course. But how about websites?

When you search Google for answers to questions, what website owners want is for you to go to their site to get the information.

This is not only because they might hope to sell you something and thereby earn a living.

It’s also because they hope that by giving you good information not available in the mainstream media,  they might attract you to their site and persuade you on other issues.

By offering free information, web writers hope you will find them reliable, credible, or interesting and become committed readers. That’s why millions of writers and websites, spend inordinate amounts of energy and time finding answers and giving them away to others for free.

Of course, ethics and decency demand that readers who benefit from that information cite the place they found it and give the author credit.

Not Hummingbird.

It harvests information from the net and puts it on Information cards that pop up in answer to searches.

Now, if the information is immediately given to the reader by Google, why will they visit the websites from which Google might have culled the answer?

They won’t.  That means that Google is not only stealing the private data of its users through Gmail, Google Earth, and a bunch of other programs, it’s also stealing from the websites it’s supposed to be helping.

But “Hummingbird” is not just unfriendly to websites offering information to the public, it acts to control what information is presented to you and how.

Hummingbird’s graphic is an easy way for Google to give you what Google (and very likely, the government) want you to know, rather than what you might learn if you delved into your search results yourself.

The new graphic could even give you downright misleading or inaccurate information. Just think about Snopes, the ostensibly myth-busting site that somehow manages to bust myths only in left-liberal ways.

So, Hummingbird is not only using your personal information for Google’s own commercial (and the government’s surveillance) purposes, it’s using information from blogs/websites, without their permission, for its own operations.

That’s two counts of IP theft.

Then, the whole business of trying to determine exactly what you’re thinking when you type certain things into the search function sounds awfully like mind-reading to me. In order to do that kind of mind-reading, all sorts of personal information from your web usage (even more than Google has been collecting so far) has to be collated and compared. Mapped, if you will.

That’s two counts of privacy invasion.

Finally, by manipulating access to the knowledge available on the Internet, under the guise of consumer satisfaction, by giving you pre-packaged answers before it gives you your search results, Google is actually  trying to control your thinking.

That’s one count of mind-control.

Is it any surprise that the new algorithm shares its name with DARPA’s nano flying robot/drone Hummingbird, which beats its wings like a bird?.

DARPA’s Hummingbird is a spy drone:

“The drone, built by AeroVironment with funding from DARPA, is able to fly forwards, backwards, and sideways, as well as rotate clockwise and counterclockwise. Not only does the ‘bot resemble its avian inspiration in size (it’s only slightly larger than a hummingbird, with a 6.5-inch wingspan and a weight of 19 grams), it also looks impressively like a hummingbird in flight.

But that’s not vanity — it’s key to the drone’s use as a spy device, as it can perch near its subject without alerting it.”

Google’s Hummingbird seems no less innocuous and no less insidious.

It’s more evil-doing from the Franken-SearchEngine that routinely spies for the NSA and CIA and systematically  commits Intellectual Property theft.

Read more at Entrepreneur .com

Anti-Spy Wear: Modest Swim-Suits Fight the Pornocracy

In an age of universal surveillance and blackmail, involuntary porn, state-mandated voyeurism, mass rape and sodomy of prisonersGoogle-Glass, and citizen-spying, modest swim-wear might be the most astute political statement a woman can make.

It protects her privacy and dignity from snoopers and pornographers, looking for cheap shots, as well as from state operatives and contractors, fattening their files for blackmailing purposes.

I’ve made the connection between surveillance and blackmail many times on this blog and even back in 2004, in essays on virtual crime (used later in Language of Empire).

Alfred McCoy’s recent piece on the subject (cited above) substantiates the accuracy of my analysis.

The making and circulation of pornographic images are powerful tools of the state-corporate complex.

The key role of such images in blackmailing operations that universalize the power of the state is precisely the reason I am less than admiring of theorists who praise the public virtues of blackmail unthinkingly, people like Murray Rothbard and Walter Block.

Check out the Christian blog,  Big-is-Beautiful, for attractive, modern swimwear that is modest….

..that lets a woman be a lady and leaves her physical dignity and privacy intact.

(Here is a list of modest swim-wear made for Jewish ladies; this one is for Muslims).

US “Strip-Search”: Same As Soviet Gulag’s

https://i1.wp.com/gulaghistory.org/nps/onlineexhibit/stalin/women-src/images/nightsearch.jpg

Gulag history: online exhibit

This is a drawing by Evfrosiniia Kersnovskaia, a former prisoner of the Soviet Union, of prisoners stripped of their clothes by prison guards in the Soviet gulag.

[Courtesy of Evfrosiniia Kersnovskaia Foundation, Moscow.]

Note: These are political prisoners in a concentration camp in the Soviet Russia.

Note: “Strip-searches” that humiliate the subject in exactly the same way as in Soviet Russia, and to the same extent (and worse), are conducted routinely as “standard procedure” in the United States, without any kind of sustained questioning from the media and academic institutions.

QUOTE (Preet Bharara about Khobragade’s strip-search)

“He said she was “fully searched” by a female deputy marshal in private and called it standard procedure for “every defendant, rich or poor, American or not.”

[The red herring is the emphasis by Bharara on the notion of equality.

Of course, the treatment of a diplomat as though she were a random citizen is in itself an issue.

A gross violation of international protocol/law is clearly a hostile act by the Dept. of State and the NY attorney.

But the outrage among Indians over the matter was perfectly appropriate, even beside the question of the immunity of foreign diplomats in a host country.

Strip-searches, regardless of the status of the victim, are barbaric and violate human rights.]

In the US, such searches are being used for mere suspects, people not yet found guilty of anything at all, people arrested for any charge whatsoever.  In practice, people have been strip-searched for trivial offenses like unpaid traffic-tickets.

Please note that visual inspection of cavities which is a part of all standard strip-searches requires the subject to bend over and part the buttocks for inspection of the anus, often with a flash-light. It also requires the subject to move the testicles or bare the labia for visibility.

Often, the subject is asked to squat on his haunches and cough while baring his genitals. These are, by any standard, deeply humiliating and self-demeaning acts for any one, innocent or guilty, to perform in public, especially in front of a uniformed stranger, subject to few or no restraints. and especially when the procedure is also video-taped, ostensibly for security, thus harnessing the subjects not only into acts of voyeurism but into their pornographic representation and subsequent replication ad infinitum in contexts and for audiences over which he/she has no control, practical or legal.

Strip-searches – whether they include visual inspection of the body-cavities or digital probes of body-cavities  – constitute a type of custodial rape or sexual molestation, and have been deemed so by the laws of some countries.

But they have been defined as constitutionally sanctioned behavior permissible to the state, even in the case of minor offenses, by decree of the US Supreme Court:

QUOTE:

Every detainee who will be admitted to the general population may be required to undergo a close visual inspection while undressed,” Justice Kennedy wrote, adding that about 13 million people are admitted each year to the nation’s jails.

The procedures endorsed by the majority are forbidden by statute in at least 10 states and are at odds with the policies of federal authorities. According to a supporting brief filed by the American Bar Association, international human rights treaties also ban the procedures.”

Gulag: Soviet Forced Labor Camps and the Struggle for Freedom:

“The arrival at the corrective labor camp turned out to be the culmination of the humiliation. First we were made to strip naked and were shoved into some roofless enclosures made out of planks. Above our heads the stars twinkled; below our bare feet lay frozen excrement. An enclosure measured 3 square feet. Each held three to four naked, shivering, and frightened men and women. Then these ’kennel cages’ were opened one after the other and the naked people were led across a courtyard‘the camp version of a foyer‘into a special building where our documents were ’formulated’ and our things were ’searched.’

The goal of the search was to leave us with rags, and to take the good things ’sweaters, mittens, socks, scarves, vests, and good shoes’for themselves. Ten thieves shamelessly fleeced these destitute and barely alive people.

‘Corrective‘ is something that should make you better, and ‘labor‘ ennobles you. But ‘camp‘? A camp wasn‘t a jail. So then what on earth was going on? ”

“The night search, the most degrading procedure, was frequently repeated. “Get up! Get undressed! Hands up! Out into the hall! Line up against the wall.” Naked we were especially frightened. “Among the blind, the one-eyed is king,” and next to them I was still a hero—for the time being. Our hair was undone. What were they looking for? What more could they take away from us? There was something, however: they pulled out all the ties that had been holding up the nuns’ skirts and our underwear.”

Courtesy of Evfrosiniia Kersnovskaia Foundation, Moscow. Translation by Deborah Hoffman.

Ambani, Manmohan: CIA Spying On India Helps Poor

Aadhar (biometric ID) will help the Indian poor, say Nandan Nilekani (CEO of Infosys), Eric Schmidt (CEO of Google), Mukesh Ambani (CEO of Reliance), Manmohan Singh (PM of India); and George Tenet (CIA spymaster), although social science research and the experience of the US and UK with national identification schemes have overall been negative toward it.

Ambani and Co. all support the introduction of the ID via a company called MongoDB which is connected to the CIA-related firm, In-Q-Tel (the CIA’s venture capital arm):

From MoneyLife.in (March 12, 2013)

“Meanwhile, according to a report from Economic Timesand Navbharat Times, Max Schireson, CEO of MongoDB (formerly called 10gen), a technology company from US which is co-funded by Central Intelligence Agency (CIA), was in New Delhi two weeks back to enter into a contract with UIDAI.

This company is a Palo Alto and Manhattan-based database software provider in the $30 billion relational database market. Relational databases commenced in the 1970s when computers were moving away from punch cards (that facilitated holocaust in Germany using census data) to terminals. It is taking away customers from Oracle and IBM. This contract has not been disclosed so far. MongoDB will take data from UIDAI to undertake its analysis. UIDAI is tight-lipped about CIA’s role in it.”

10gen is the company behind MongoDB, a popular open-source, document-oriented database. It forms a part of a new generation of NoSQL — Not Only SQL — database products developed as an alternative to conventional relational databases from Oracle, IBM and Microsoft……

According to the report, one of the investors of MongoDB is In-Q-Tel (IQT), a not-for-profit organisation based in Virginia, USA created to bridge the gap between the technology needs of the US Intelligence Community and emerging commercial innovation. It identifies and invests in venture-backed startups developing technologies that provide “ready-soon innovation” (within 36 months) which is vital for the mission of the intelligence community. IQT was launched in 1999. Its core purpose is to keep CIA and other intelligence agencies equipped with the latest in information technology to support intelligence capability. Edward Snowden had revealed that US intelligence agencies are targeting communications in Asian countries. It was founded by Norman Ralph Augustine.

In his book ‘At The Center Of The Storm: My Years at the CIA”, former CIA director George Tenet says, “We (the CIA) decided to use our limited dollars to leverage technology developed elsewhere. In 1999 we chartered … In-Q-Tel. … While we pay the bills, In-Q-Tel is independent of CIA. CIA identifies pressing problems, and In-Q-Tel provides the technology to address them. The In-Q-Tel alliance has put the Agency back at the leading edge of technology … This … collaboration … enabled CIA to take advantage of the technology that Las Vegas uses to identify corrupt card players and apply it to link analysis for terrorists [cf. the parallel data-mining effort by the SOCOM-DIA operation Able Danger], and to adapt the technology that online booksellers use and convert it to scour millions of pages of documents looking for unexpected results.”

In-Q-Tel sold 5,636 shares of Google, worth over $2.2 million, on 15 November 2005. The stocks were a result of Google’s acquisition of Keyhole, the CIA funded satellite mapping software now known as Google Earth. On 15 August 2005, Washington Post reported that In-Q-Tel was funded with about $37 million a year from the CIA. “In my view the organisation has been far more successful than I dreamed it would be,” said Norman R Augustine, who was recruited in 1998 by Krongard and George J Tenet, who then was director of central intelligence (DCI) to CIA, to help set up In-Q-Tel. Augustine, former chief executive of defense giant Lockheed Martin, is an In-Q-Tel trustee.

Notably, former CIA chief, Tenet, was on the board of L-1 Identity Solutions, a major supplier of biometric identification software, which was a US company when UIDAI signed a contract agreement with it. A truncated copy of the contract agreement accessed through RTI is available with the author. This company has now been bought over by Safran group, a French defence company. The subsidiary of this French company in which French government has 30.5% shares, Sagem Morpho has also signed a contract agreement with UIDAI. In August 2011, Safran acquired L-1 Identity Solutions.

In the backdrop of these disclosures, how credible are the poor-centric claims of Mukesh Ambani, Nilekeni and Eric Schmidt who are taking Indian legislators, officials, citizens and the Indian intelligence community for a royal ride. Clearly, aadhaar creates a platform for social control and surveillance technologies to have a field day and undermines nations’ sovereignty, security and citizens’ democratic rights. Nilekeni wrote ‘Imagining India’, McKinsey & Company edited ‘Reimagining India,’ it is evident that their idea of India is contrary to idea of India that emerged from the freedom struggle since 1857 and the constitution of India.”

US And Its Keystone Kops Gestapo?

Ilana Mercer at BarelyaBlog.com

“Note that TOP SECRET is defined as information which could cause “exceptionally grave damage” to America. Stolen and released here were 3 million documents. HOW SPECIFICALLY did America suffer from this “exceptionally grave damage”??? Did Godzilla stomp over Maine? Was Iowa sucked up by a sinkhole? Did bubonic plague kill everyone in California? Was Duck Dynasty cancelled? Did employment in the US drop from 65% of adults to 58% ? – (yes – but this was related more to wasting trillions on idiotic wars than Snowden’s leaks)?

According to the news, the Pentagon has come out with an assessment of the 3 million “beyond exceptionally grave damage” incidents that have ruined life in America. Of course, it turns out that the “beyond exceptionally grave damage” is also TOP SECRET – yes, America has been destroyed but don’t tell a soul.

Or is the real scandal that trillions of $$$$ have been spent generating classified documents that are mostly worthless toilet paper, while this country remains utterly ignorant of anything that occurs overseas?

[Lila: Slight correction. The “country remains utterly ignorant” is the POINT of the whole thing. That’s not “inept.” That’s super-efficient.]

That’s the way the whole system is supposed to operate, with complete “freedom of expression” guaranteed to produce cacophony, over which no one can distinguish true from false without considerable effort and time that most people cannot afford to expend.

“Trillions are “wasted” only if you care about the serfs who are generating the trillions of real “wealth,” which include people here and all over the world.

By the miracle of unlimited carpet-bombing-sustained-dollar-generation, global casino capitalism, rigged market indices, rigged media, and rigged language  (“free trade,” “human rights” and “democracy”), the cartel which runs the system manages to paper over what is actually a brutal global plantation of managed trade, liberventionism, and fascism, run through a malign network of spy/surveillance mechanisms, proxy wars, police-actions, NGO campaigns, and propaganda, operating globally, but headquartered in Israel, the US, and the UK, with satrapies all over.

“That the US winds up funding and building up both sides in wars and pseudo-wars in third-world countries by people who generally hate our guts?

Lila: They generally “hate our guts” because of things done by the US Govt, which are concealed or distorted by its propaganda arm – academia, think-tanks, and the media (left and right, print, online, major, and alternative, including conspiracy sites). All are infiltrated, controlled, and distorted, not only by propaganda but also by commercial imperatives.

That we have politicians who cannot find Niger on a map bloviating about the “evil of Snowden”? That the archived trillion-trillion bytes of searchable database on Americans is far more likely to be abused by paranoid politicians like Nixon, Clinton, Obama, and Christie against domestic political opponents than to sort out minutia between illiterate Taliban goat-herders in Afghanistan?

At best, after Abdul blows up his backpack, we may find that he had earlier been “talking Jihad” with Ishmael and we subsequently kill Ishmael and 50 others at a wedding party proudly announcing that we have killed “Ishmael the potential terrorist,” while forgetting the relatives of the other 50 who are new terrorist recruits.

What America has made is an NSA “Keystone-Kops-Gestapo” that is as inept as it is insidious – sucking up a whirlwind of mostly useless data and the 4th Amendment in the process. While the NSA archives our tweeting and our twerking, let us not forget Benjamin Franklin’s advice: “those who would sacrifice liberty for security deserve neither”. The “exceptionally grave damage” is to our freedoms!

For syndication rights to http://BarelyABlog.com or http://IlanaMercer.com, contact ilana@ilanamercer.com. Read more @ http://barelyablog.com/#ixzz2qlmEsmhg
Comment:
I am in general agreement with this, except for the reference to Keystone Kops.
The Keystone Kops routine is only at the level of what the politicians and public figures do.

Behind the scenes, the spy agencies, the puppet-masters behind them (not always in control but certainly in charge) pursue, quite ruthlessly and well, an agenda whose visible outlines are by now apparent even to ordinary people.

Draupadi Disrobed: India Strip-Searched By US…..

Draupadi disrobed in the Mahabharat

Credit for image of Draupadi vastraharan to Naari.com

“When the US tows away a Russian diplomat’ car in Washington for a parking violation, six US diplomatic cars disappear in Moscow. The Russian car then magically appears with apology.

That is the type of diplomacy we need.”

This was a comment I saw posted at the Indian news site, Firstpost.com, below an article on the unequal “relationship” between the US and  India, as evidenced in the Devyani Khobragade case.

India is claiming “victory” …….even though a senior female diplomat still faces indictment and a possible 10 year sentence and was strip-searched and cavity-inspected, for an allegation over what amounts to a routine visa issue.

Meanwhile, not even a criminal case was registered against Wayne May (the State Dept Security chief in New Delhi who is behind the whole affair.

May was guilty of subversion of the Indian judiciary, actual trafficking, and tax and visa fraud.

Further clarification of  a canard being circulated that Khobragade was lying.

Devyani Khobragade says she was strip-searched, DNA swabbed, and cavity-searched, multiple times.

The US Marshals deny that she was cavity-searched but admit she underwent a standard procedure strip-search.

So who is telling the truth? Devyani or the Marshals?

BOTH. There is just a confusion of terms.

Under US law today (ratified by Supreme Court in a 2012 case), arrests are accompanied by strip-searches.

1 The standard procedure of a strip-search

This is what the US Marshals admitted happened.

It involves the removal of all clothes and examination of all bodily cavities, including mouth, nose, ears, eyes, genitals and rectum.

It involves “baring of the labia.” That can be done multiple times.

It includes DNA swabbing and recording (for security purposes).

As we now know, the US has a vast espionage and surveillance network and nearly all sensitive nodes of telecom and electronic communication are monitored centrally.

Thus, images of such a search WOULD HAVE BEEN RECORDED AND SHARED WITH SPY AGENCIES. THAT IS GUARANTEED.

These images can then be transferred to private corporations, working with the United States Government (and Israel.

Israel has complete access via backdoors in the electronic equipment as well as more directly).

Corporation working with the spy agencies and with the USG include Facebook, Microsoft,  Google, Digg, Verizon, Brighthouse and many many more.

There is immense  potential here for black-mail against a political figure like Khobragade, from a political family tied to the Dalit vote-bank (voting power of the lower caste/untouchable community), a prize for both Congress and the BJP.

Indeed, we don’t know that black-mail has not ALREADY occurred behind closed doors.

Extortion of the Khobragade family would mean extortion of the Ministry of External Affairs (foreign office of New Delhi), in which Uttam Khobragade, Devyani’s father, has power.

The MEA and the US Embassy in New Delhi were at logger-heads for some time before this episode

“Jail Strip Searches: The light at the end of the tunnel was not a train,” Gary W. De Land, Directors of Jail Operations, Utah’s Sheriff’s Association gives a detailed history of the litigation over strip-searches as well as the often confused terminology, from the perspective of someone in favor of more wide-spread use of strip-searches.  His description of the standard strip-search, including visual inspection of cavities (which he terms relatively useless since the cavities cannot actually be seen)

“The early strip search cases created a bit of confusion over what a strip search is. Part of that confusion was use of the term “body cavity search” or “visual body cavity search.”

The terms seem to imply searches actually probe or look inside of the rectum or vagina which was not the case.

The body-cavity searches were those where the male was required to lift his genitals for visual inspection to see if contraband was being hidden and bending or squatting to allow visual inspection of the anus (an external inspection). For females, prisoners were required to bend and spread their buttocks and/or squat to permit an visual inspection of the external genitalia and anus.

The Supreme Court commented on the different and confusing meanings that have been applied in various cases to “strip searches.”

The term is imprecise. It may refer simply to the instruction to remove clothing while an officer observes from a distance of, say, five feet or more; it may mean a visual inspection from a closer, more uncomfortable distance; it may include directing detainees to shake their heads or to run their hands through their hair to dislodge what might be hidden there; or it may involve instructions to raise arms, to display foot insteps, to expose the back of the ears, to move or spread the buttocks or genital areas, or to cough in a squatting position.

The impact of the Florence ruling is that the term “strip search” now covers each of the different levels of intrusion listed above. Since the so-called visual body-cavity searches are permitted without reasonable suspicion, then certainly the less intrusive strip searches are also authorized. It is now appropriate for jail officials to simply refer to levels levels of unclothed searches as strip searches.”

B. The procedure called a “cavity search”

Devyani mistakenly used this term, when she should have used the term “cavity inspection.”

That is understandable since in India, BOTH procedures would be considered custodial rape.

Cavity search (probe)  involves digital probing of the cavities (insertion of fingers or fists into rectums or vaginas).

This is literally sodomizing of an innocent person, on mere charges or suspicion.

“Probing” did NOT happen, which is why the US Marshals are denying the story.

Devyani used the wrong term, but she is not lying, just using the wrong terminology.

The standard inspection of the cavities would in fact be brutal and demeaning enough on its own.

The US apparently misjudged how people would react and then tried to muddy the affair by flooding the media with allegations and statements from the US prosecutor and the alleged victim.

In effect, this is a way to try the case in the media and cover up their own outrageous position.

The hoax video that was released on the net, showing the gang-rape of  Devyani, was apparently intended to muddy the story.

Perhaps that was so as to make it appear that the reaction was a misplaced reaction to exaggerated reports.

My first book “Language of Empire” dealt with such “hoaxes” and the problems they create.

Notice, as well, that almost immediately after the Facebook statements of the May surfaced, how another “gang-rape” allegation has surfaced from Delhi, this time by a Danish woman.

Yet, the police did not find any injuries consistent with a gang-rape and she refused to undergo a medical examination in Delhi.

She is using medical evidence from Denmark to press her case.

This is an extraordinary case from the point of view of setting precedents, because it means that the Delhi police might from now on be sued based on evidence cooked up abroad and concocted for political purposes.

Now, we see the political motivation behind the drum-beat about a “rape crisis” in Delhi

even while the rate of rape in the UK, for example, is ten time that in India, and although India is not to be found in the top ten countries for high rape rates, while the US, the UK, New Zealand, Sweden, and Belgium all are.

Read about the 25 signs of the Nazification of the US police-state.

WashPo Scolds India Over Police RAPE (Cavity-Search) of Diplomat

UPDATE

I have to correct a few things in this post.

While Devyani K. said she was cavity-searched, the US Marshals deny it. They say she was only strip-searched.

A cavity search, according to the Marshals, involves probing of the vagina and rectum.

Bharara used this discrepancy to claim that DK was lying.

But it turns out that a strip-search too involves “baring” the rectum and vagina.

It just doesn’t involve probing them.

To a woman like DK, who has no previous criminal record and is foreign to US procedure,  the strip-search probably felt exactly like “cavity search.”

Both procedures are outrageous, regardless of  the status of the person being stripped and search, Jane Citizen or a high-flying diplomat.

Point Two.  DK was paid around $4000 a month by the Indian govt, but she did also receive free housing and other perks, as did her maid.

I wasn’t aware of that, when I wrote the piece.

DK is also married to an American professor who has an income allegedly of about $100,000. She has further modest income from her properties in India.

Because she didn’t include that property income on her government form, I suspect the USG considered the entire application a type of fraud.

Point Three.

Much is being made of the fact that DK is a dollar millionaire and that she profited from some finagling on her behalf by  her father, a well-connected bureaucrat.

First point.

None of that is relevant to the way DK was treated by the police and the issue of diplomatic protocol, which was grossly violated, regardless of finer points about partial or full immunity and consular status.

All those issues are red herrings. The manner of proceeding was outrageous and provocative in the extreme.

Second.

Anyone who bought land in India in the early part of the last decade, especially in a major city, would have become a millionaire.

Land prices went up about 30 times in some areas. So if you put even very modest savings (and Indians save over 50% of their income), into land, you’d have made a fortune.

The Rothschild media is playing this up to stoke anger against her among Americans who would be ashamed to feel that way at poorer Indians, but can now vent essentially envious and racist feelings against an affluent one, and do so self-righteously, because they’ve dubbed her a “slaver.”

Third.

Khobradage’s father headed the Ministry of External Affiars (MEA) in Delhi, as did DK herself, and the MEA had a running battle with the US embassy.

The current Asst Secy of State for South Asia, an Indian woman, only came on board in October.

The DK affair began in June. At the time the Asst Secy for South Asia was a committed Zionist, known for meddling in domestic politics in Sri Lanka and India, where he earned a reputation as such.

The maid, recall, worked for a senior US diplomat and had relatives who worked in the US embassy, so she is by no means some oppressed Dalit villager.

Instead, she comes from the relatively prosperous state of Kerala, belongs to the  Christian community, which if often closely affiliated with the Indian Jewish community (Arundhathi Roy is a Syrian Christian).

Kerala is heavily unionized and Marxist. It’s also a center of the drug trade, centering around Kochi, with the international drug cartels having close ties with and backing from the CIA ….(it goes on, but that’s enough for now).

ORIGINAL POST

One Swati Sharma at the establishment’s favorite mouthpiece, The Washington Post, tells us seriously that India’s reaction to the rape, er, cavity-search of Devyani Khobragade, an Indian  consular officer, is all wrong.

Devyani was arrested and cavity-searched on allegations (I repeat allegations) that she underpaid her Indian maid and lied about it to the visa office of the US Government.

The Indian government quite correctly regards the cavity search as not only an outrageous violation of diplomatic protocol but barbaric treatment of a mother with two children.

There’s nothing, absolutely NOTHING,  wrong with that assessment.

It is the reaction of NORMAL people everywhere.

Ms. Sharma and her sort are not normal.

Enlightened by the communist belief in complete gender-equality as well as the sanctity of all government action against unenlightened citizens, Sharma believes that a blow has been struck by India against the empowerment of women.

Truly empowered women allow their vaginas to be fingered by strangers in uniforms with equanimity, nay, delight, and if their name is also Naomi Klein Wolf and the fingerer is a a former military officer-turned Tantric sex therapist, with effusions of literary joy.

Sharma is upset not by the cavity search, but by the special Indian outrage she sees directed at the cavity-search of a woman.

This is a sign of India being all wrong, she wails.

Here’s something for this nitwit, who apparently takes her standards uncritically from some combination of Lady Gaga,  Annie Sprinkle, and Karl Marx (my comments in between):

SWATI SHARMA

“Last week, the United States apprehended an Indian diplomat, Devyani Khobragade, and charged her with providing false information in a visa application for her nanny, whom she paid $3.31 an hour, well below minimum wage. Many are wondering why India is outraged.”

LILA RAJIVA: Misleading statement. Devyani did not pay her maid just $3.30 an hour. She also provided living quarters in New York City (worth $3000-4000 a month), food, medicine, and other perks, the total of which probably exceeds anything required of her by US law, even assuming foreign maids employed by foreign consular officers are properly a subject of US law.

Also, “many” are not wondering why India is outraged. You and some twitterati – like Sandeep Roy – might be wondering.  Everyone else IS outraged.

The twitterati are known to be used – and in some cases employed – by the US intelligence services to mold public opinion.

One can be forgiven for wondering if Ms. Sharma belongs to that group.

SHARMA:

In a letter to her colleagues, Khobragade, India’s deputy consul general, told her family that she faced “indignities of repeated handcuffing, stripping and cavity searches, swabbing, hold up with common criminals and drug addicts were all being imposed upon me despite my incessant assertions of immunity.” U.S. officials maintain that she was treated along standard guidelines. Indian Prime Minister Manmohan Singh even weighed in on the matter, calling Khobragade’s treatment “deplorable.”

Although Khobragade’s “indignities” seem pretty standard, in India, the perception that a woman’s honor is the community, society and country’s honor still holds.”

RAJIVA: The utterly immoral position taken here is that there is nothing wrong (“seem pretty standard”) with someone being strip-searched by the police for an alleged violation that doesn’t involve concealing anything on one’s person.

Even in the case of suspected drug-mules, there are precautions taken and procedures followed and a cavity search occurs only after the suspect has REFUSED to cooperate in other ways. There is nothing “standard” about a cavity search. It has become standard because we have journalists of the caliber of this vacuous female who apparently thinks anything the government does or says is to be accepted at face value as “the public good.”

God help us all.

And yes, the concept of a woman’s honor  still holds in some form or other all over the world.  That you do not agree with it or believe you have more enlightened standards does not mean, of course, that you actually do.

SHARMA:

It’s not the first time an Indian diplomat has gotten in trouble over this issue — last February, Neena Malhotra was ordered to pay $1.5 million to her former maid for “barbaric” conditions. But there was no strip-search, no jail time and, therefore, no mass protests.

RAJIVA: It is not clear what happened in the Malhotra case. I for one find it very odd and believe that the diplomat was being entrapped, which perhaps is what happened here, but it would be foolish to pass judgment without knowing all the facts.

And yes. The issue is whether someone’s bodily integrity and modesty should be violated in an extreme manner that would be  considered rape, if a citizen were the perpetrator.

SHARMA

She was treated as a common criminal.

It’s also not every day that a high-ranking official is put behind bars, especially for a charge many Indians feel is minor. Khobragade was impounded with people who faced drug-related charges — which are minor in the U.S. penal system. But in India, a female diplomat in jail over a salary issue for her nanny is almost unimaginable, and not a picture Indians are used to seeing.

RAJIVA: Yes. It is unimaginable.  Again, what’s the point?

SHARMA

It’s not just the privileged in India who have help. According to this report, “The going monthly rate for a live-in maid or cook, who often works for more than 12 hours a day, six days a week, is still low: only 4,000-10,000 rupees ($73-184) in the cities.”

RAJIVA:

This whole section is baffling and seems to be an open stoking of class-anger and racial resentment among Americans, directing it against relatively affluent/prominent Indians, rather than against the Anglo-Jewish cartel- that, via central banking, is really behind the economic crisis.

In addition, Sharma’s facts are mistaken.

Most maids  get free living quarters, free medicine and free food.

4000-10000 rupees is a lot of money in India. Why give the dollar figures without also giving the dollar figures for food and rent in India, which are much lower than in the US?

This is the kind of bogus documentation that makes contemporary American journalism cringe-worthy.

SHARMA

While having servants or chauffeurs in the United States is a luxury attained by a select few, even lower-middle-class families in India have some sort of hired help.

RAJIVA:

More class and race war.

In the US, women have appliances and restaurant and food options FAR out of the reach of the middle-class and even the rich in India. Indian roads are so congested and polluted and the shops so overcrowded and hard to access that paying someone else to queue for you at stores is mandatory if you have a professional job.

Most Americans have two or more cars in the family. Even poor people have cars. In India, many in the upper middle-class do not. A car is a luxury.

So lifestyles are adapted to different economic realities.

Labor is plentiful in India so it is cheap. Labor is not plentiful here because of immigration restrictions, so it is dear.   Americans also make twenty times or more than most Indians and ready made food is far cheaper here than there. So having servants who can cook elaborate Indian meals is more prevalent.

Gas is cheap in the US and expensive in India. Thus, by Sharma’s logic, the Indian government should be allowed to set the gas prices in the US so that things are evened out.

This is the madness of die-hard communist ideology, masquerading as liberalism.

SHARMA

In this case, the treatment of the women in question wasn’t about any form of abuse — it was about a payment discrepancy. In India, that would rarely amount to jail time, especially for someone with means.

RAJIVA

It’s not clear that Devyani’s means were all that much. As a consular office, she received some $4000 a month, which is barely adequate in New York.

SHARMA

This isn’t the first time diplomats received what Indians thought was “unfair” treatment.

In 2010, India’s U.N. envoy, Hardeep Puri,who wore a turban for religious reasons, was reportedly asked to remove it during an airport security check. Also that year, reports suggested that Indian ambassador Meera Shankar was taken to another room and searched because she was wearing a sari. Those events stung in India, and no doubt came to mind when this latest event dominated the headlines.

RAJIVA:

Had Bill Clinton been frisked, or Ms Clinton or Mrs. Obama taken into custody and had their vaginas penetrated and swabbed by Indian policemen, I rather think the US would have nuked Delhi by now. Had  a Mullah been asked to remove his turban, there would have been global jihad.

Are some indignities less than others?

SHARMA

Little attention has been given to the housekeeper. India is siding with a woman who was in the wrong — who lied, paid her help poorly and now is brazen enough to claim that she should not be treated like a criminal.

RAJIVA:

You claim to be a journalist, yet you have already decided what looks like a complicated case. How do you know?

Are you one of the many hirelings of the CIA who are paid to influence stories by planting opinions, twitters, blog comments, or posts intended to push public opinion in the direction it’s supposed to go.

We saw evidence of that in the Tahrir square “color” revolution led  by the twitter brigades of the intelligence services.

Devyani claims, with evidence, that this is an extortion case.   How do you know she isn’t right?

SHARMA

What’s “deplorable,” to use the prime minister’s words, is not Khobragade’s treatment, which was standard, but the fact that many in India aren’t speaking out against the treatment of the nanny.

RAJIVA

They’re not speaking out is another way of saying this intelligence psyop intended to “educate” India and the world is failing. This is a nearly transparent attempt to set classes and races at war in order to destroy opposition to the globalists, but it is not going well.

The “ill-treatment” of the maid is so far only alleged. There is also a history of maids extorting their employers. This maid’s family worked for the US embassy. There are extortion rackets that use false abuse charges to gain visas to the US.

That’s why intelligent people who are aware of all the facts are outraged by the treatment of the consular officer before the facts, let alone the case, have been decided.

SHARMA

India’s reaction is disappointing.

RAJIVA

Not to me. I am immensely heartened that India is showing a spine and not fawning on the US.

However, this article is immensely disappointing…and disgusting. It shows that the author has a  thoroughly colonized mind, unable to reach conclusions not already fed to her by the dominant culture.

SHARMA

The anti-corruption party in India is gaining incredible momentum — the party even unseated the ruling Congress party in the country’s capital, which was a huge victory.

RAJIVA:

Most Indians are well-aware of corruption in their country. They are also well aware that the Rothschild banking cartel (globalists) have used their mouthpieces, Julian Assange and Wikileaks, to co-opt the original anti-corruption movement (like the movement of Baba Ramdev) and replace it with Trojan horses like the Anna Hazare movement, intended to subjugate Indian sovereignty to secret foreign rule through NGO’s.

What happened to the Ramdev movement is what happened to the Tea Party. It got co-opted.

SHARMA

So why are Indians rallying for a privileged treatment of a diplomat?

RAJIVA

They are rallying AGAINST the barbaric treatment of a woman who has not been judged guilty of anything, certainly of nothing serious enough to warrant cavity searches.

They are rallying against the privileged treatment of US law, which has shown itself to be as corrupt or more corrupt than Indian law in many respects and, in any case, should not prevail in a case involving two Indian citizens both employed by the Indian govt.

Because you are a US citizen, Mr. Sharma, it doesn’t mean your opinion is worth more than that of an Indian on Indian matters.

Indians are rallying against the privileged treatment of your opinion and the opinion of thousands of “elite” opinion-makers who force-feed them cultural standards they do not believe in and do not want.

SHARMA

Why shouldn’t she be treated as a common criminal?

RAJIVA:

Because she is not either. She is not a common person but a diplomatic officer representing a country which is an ally, a status which grants her certain privileges and immunities.

And she has not been convicted of any crime, let alone one warranting multiple searches of her private parts.

The offense for which she was arrested is relatively petty and is one of which thousands of professionals, Americans included, are guilty. CEO’s. university professors and many, many other people pay their employees less than the minimum wage

Are you strip-searching all of them? If not, why not?

SHARMA

In India, someone with power would rarely be apprehended for paying a servant a low wage.

RAJIVA

Good for India.

Since when is paying someone according to a voluntary contract a crime?

SHARMA

Actually, it’s laughable to think such a charge would even take place. But there was hope that a movement against corruption would change things.

RAJIVA

This passage is completely addled, even for Ms Sharma. What has a movement against corruption got to do with the wage-rate in India? And what makes you an expert on either?

SHARMA

After the global outrage and mass protests in India due to the Delhi gang rape that happened a little over a year ago, there was hope that unfair treatment toward women and opposition to immunity would skyrocket.

RAJIVA

It is a myth propagated by US intelligence that Indian women are treated with exceptional barbarity or that they are in need of Western-style liberation. Actually,  rape cases have exploded precisely since the liberalization of the Indian economy and the advent of Western mores, including pornography in the media, extreme crowding in the cities and massive displacement of hundreds of thousands of people.

That is the RESULT of interaction with the West on its terms, rather than on Indian terms.

The solution is not more Westernization, but less. The Indian constitution is very socialistic in orientation and its emphasis on human rights exceeds that of the US, so it certainly doesn’t need any more “feminist” empowerment. It needs less. It needs, as the US needs too, a return to less emphasis on “rights” and more on obligations and duties.

India guarantees women positions in university and jobs and has done so even before the US (even if you think such quotas are a good thing, which I don’t).  India has had a woman prime minister and several very powerful female politicians. In contrast, the US has had no female president and no woman politician of commensurate power.

Harassment and rape in India have increased only with economic liberalization and with the recent saturation of Indian media with crass sexualized advertising on the Western model.

That seems intended to destroy the social fabric in India.

Having abetted that destruction, the West and its mouthpieces, like Ms Sharma, are now bewildered at the rise in violence against women, although that too, I suspect is played up by the US and the NGOs it employs as its soft-power arm.

I wonder if some of these cases and the media attention to them are not staged. It would be no surprise, since almost all of the major media in the English language in India is owned by the big Western media groups, by communists, and by Zionist Christians.

SHARMA

Instead, many Indians are siding with the wrong woman in this battle.

RAJIVA

No. They..and any reasonably informed person..are siding with the victim. In this case, that was the woman who, before she was even tried by a jury of her peers, was subjected to gross public humiliation and physical distress to feed the self-righteousness of uninformed ignoramuses like Sharma, who are upset by rape committed by citizens but not rape committed by officers with badges.

SHARMA

Like we saw with India’s anti-gay ruling last week, the country is in the wrong once again.

RAJIVA

Actually, I think the Indian Supreme Court is to be applauded for the ruling, which should reflect Indian thinking about the subject, not the thinking of Ms. Sharma or her coterie of international busy-bodies.

Note (added Dec 20): I do not support laws criminalizing sodomy or homo-sexuality, but neither am I particularly interested in codifying homosexual relations in the way heterosexual relations are. I recognize a distinction between the two both in history and in law, which allows for different treatment.

However, I am not an Indian citizen and I support the rights of every judiciary to come to its own conclusions about its own laws without foreign interference.

Further note: Reading more, I begin to see the SC’s thinking on this matter. Homo and heterosexuality are two different things and merit different treatments. The law has never given rise to even one prosecution and therefore cannot be said to have discriminated in reality. It was more a signaling device and, as the court decided, such a signaling might be thoroughly needed today. There is nothing in human history and moral teaching that suggests that homosexuality can be the NORM for a society. It can only be tolerated when it doesn’t seek to change the norm. I think that’s a defensible position and were it not for the hype, I think it would get a respectful hearing.

So the question must be asked. Are gays really only interested in being left alone (they already are) or is it that they are unwilling to leave any one else alone?

Ten Ways To Fight The Police State

Image: technologyjones.com

There are ways to fight the police-state, on your own, without joining any group or party and giving up your independence.  Protecting your privacy on the Internet is one of them.

Just don’t forget that a lot of privacy sites are really government projects. The idea is to steer you to privacy software put out by the government’s buddies. It’s the oldest trick in the book.

But given that, there are a few things you can do to protect yourself. Here are ten of them.

1. Get your name and address off of mailing lists, subscriber lists, forms, directories, and data centers. You may need to keep doing that every year, as long as you have a credit card with your home address on it.

2.  Use Google only if you need to. Otherwise, use private/anonymous search engines. There are a few. I won’t name them, because when people start selecting one or other engine, then the powers-that-be start paying more attention and screw things up for them.

3. Use a virtual private network, but use it with caution. There’s a Catch-22 here. The free ones probably make money by selling your information… or worse. The ones that aren’t free need you to sign up on the net with an account and a credit card. Which means another vulnerability.  Passwords can be hacked and licenses can be stolen. Plus, VPN’s with servers and HQ’s in America, Britain, Europe and many other places, cannot protect your privacy if you get caught up with the police or lawyers, even tangentially.  Your ISP and VPN provider will be forced to comply with subpoenas and laws that demand data-sharing.

Completely anonymous off-shore VPN’s on the other hand can arouse government suspicion, even if you’re as innocent as a baa lamb.

Also, what if someone hijacks your VPN to commit crimes? How would you prove it wasn’t you, if someone wanted  to incriminate you?

I  asked the  FBI this recently, and they tell me that they can figure it out. But do you really want to be in a position where only the FBI can clear your name? And what if it’s the FBI that wants to get you in trouble? I mean, it’s not unheard of.

4. Limit what you do on the Internet. If you can’t stop using the net altogether (which is really the best option), try to curtail what you do. Limit what you buy on the net. Stop sending sensitive emails, even encrypted ones, over the net.  If you have to sell on the Internet to make a living, stay on top of computer crime by following a good security forum. Wilders is one.

5. Share computers or use public computers.  Lots of times, the easiest way to be private is to use a  computer used by other people you can trust, so long as you don’t input sensitive information. That way what you do is mixed up with what lots of other people are doing and it’s harder to track.

6. Don’t tell anyone your privacy tricks. I used to suggest things on this blog before, like using Scroogle or Ixquick. I don’t any more. The more people start using one trick, the more the government…or the criminals on the net…starts focusing on that trick. I’m not about to research things so people can track and harass me using my own research against me.

Who would do such a scummy thing?  Short answer – scum.

On the net, the scum rises to the top.

7. Don’t put your ideas out on the net, unless you’re prepared for everyone to take them without credit. While many people try to be ethical, a substantial number think that the ease of digital crime is a justification for it.

Keep your thoughts to yourself for other reasons, as well.  Any opinion you voice publicly is going to be held against you.

Write what your conscience demands. Just be sure you can live with how people will use it, misuse it, and abuse it.

8.  Avoid social media, unless you have to connect with someone for a reason. I deleted my Facebook account, my Digg account, Technorati, and a bunch of other things I don’t want to mention. I keep my blog up for several reasons, but from the viewpoint of privacy, it’s a terrible thing. I sometimes wish I had never begun it.

9. Keep a low profile. Even if you do have to write/blog, try to keep it under the radar. Blogging about politics is always going to get attention. You can’t avoid that. But you can always avoid  confrontations. You can always make an effort to give both sides their due,  You can filter comments, avoid posting on forums/sites you don’t know personally, and side-step flame-wars with all the cretins and sociopaths out there.

The net is a highway.  You’re driving next to strangers. Honking your horn or waving a hand at them is OK. Getting into their cars and driving off to dinner with them is another.

10. Watch your IP (Internet Protocol). Your IP address is being harvested by someone all the time. Cookies collect it, forums and boards record it, email providers and search engines track it.  You can disguise it or change it, but determined people can always get hold of  an IP.

That means they can figure out where you are, physically. Which is pretty unnerving. I’ve had a few nasty experiences when enemies got hold of my IP.

So change your IP as much as you need to; change your computer and  ISP provider every year, or even every six months. It’s not so hard to change a computer if you buy it refurbished or second-hand. A good Dell laptop can be had for about $120.  You can always sell the old one and get back some of your money.

On the other hand, you might want to arrange for a few traps for any would-be spies. In that case, your approach might be a bit different…..Be creative.

As for ISP’s, there are always deals, if you look for them.  Quote a price and ask your ISP if they will match it.  In this economy, companies are willing to lower their rates to attract customers.

The Traitorware Among Us

Eva Galperin at EFF:

“Your digital camera may embed metadata into photographs with the camera’s serial number or your location. Your printer may be incorporating a secret code on every page it prints which could be used to identify the printer and potentially the person who used it. If Apple puts a particularly creepy patent it has recently applied for into use, you can look forward to a day when your iPhone may record your voice, take a picture of your location, record your heartbeat, and send that information back to the mothership.

This is traitorware: devices that act behind your back to betray your privacy.

Perhaps the most notable example of traitorware was the Sony rootkit. In 2005 Sony BMG produced CD’s which clandestinely installed a rootkit onto PC’s that provided administrative-level access to the users’ computer. The copy-protected music CD’s would surreptitiously install its DRM technology onto PC’s. Ostensibly, Sony was trying prevent consumers from making multiple copies of their CD’s, but the software also rendered the CD incompatible with many CD-ROM players in PC’s, CD players in cars, and DVD players. Additionally, the software left a back door open on all infected PC’s which would give Sony, or any hacker familiar with the rootkit, control over the PC. And if a consumer should have the temerity to find the rootkit and try to remove the offending drivers, the software would execute code designed to disable the CD drive and trash the PC.

Traitorware is sometimes included in products with less obviously malicious intent. Printer dots were added to certain color laser printers as a forensics tool for law enforcement, where it could help authenticate documents or identify forgeries. Apple’s scary-sounding patent for the iPhone is meant to help locate and disable the phone if it is lost of stolen. Don’t let these good intentions fool you—software that hides itself from you while it gives your personal data away to a third party is dangerous and dishonest. As the Sony BMG rootkit demonstrates, it may even leave your device wide open to attacks from third parties.

Traitorware is not some science-fiction vision of the future. It is the present. Indeed, the Sony rootkit dates back to 2005. Apple’s patent application indicates that we are likely to see more traitorware on the horizon. When that happens, EFF will be there to fight it. We believe that your software and devices should not be a tool for gathering your personal data without your explicit consent.”

South Asia Increasingly Under Biometric Surveillance

Wired.com has a piece on the collection of biometric data on hundreds of thousands of people in Afghanistan.

According to NATO Training Mission-Afghanistan commander Lt. Gen. William Caldwell (as reported to Wired’s Danger Room) the idea is to screen applicants for Army positions to keep out people with ties to the Taliban or criminal histories. But with biometric files are being compiled on Afghans at the rate of 20-25 per week, the process is likely to include a large number of ordinary citizens, especially as there’s now a  plan in the works that aims to have biometric ID’s for some 1.65 million Afghans by May 2011 through the “population registration division” of the Afghan Ministry of the Interior. Apparently, Caldwell is taking a leaf out of the book of General Petraeus, who used biometric monitoring to keep on top of the Iraqi resistance. It’s also modeled on monitoring during the siege of Fallujah, when the only way to get in and out of the place was with an ID card that needed an iris scan.

Right now, there are apparently two biometric projects in the country, one run by the Afghans accounting for about a quarter of a million files and the other by the Americans, which has nearly half a million, but  so far, there’s not been much integration between the two. The Afghan involvement is a change from the past, when Hamid Karzai, the Afghan president, has shut down  biometric monitoring at checkpoints by NATO as a violation of Afghan sovereignty.

Meanwhile,  neighboring India has already launched the first biometrically verified universal ID on a national scale. While not compulsory, it will be needed to access certain social and financial services, and is intended for the entire population of 1.2 billion. Biometric IDs were first used in India in 2002 to check corruption involved in accessing services and rations meant for the poor.

Earlier this year (July 2010), Afghanistan and Pakistan concluded a trade agreement that included the exchange of biometric data as part of the deal.

UK Mind-Reading Surveillance System Monitors Anti-Social Behavior

Along the lines of Google Suggest, which replaces your own thoughts with intrusive suggestions, the cheery little police state in Britain is exploring some anticipatory thought control of its own:

“The technology, called Sigard, monitors movements and speech to detect signs of threatening behaviour.

Its designers claim the system can anticipate anti-social behaviour and violence by analysing the information picked up its sensors. Continue reading

Echelon: The Global Spy System

An article by Nicky Hager at Cryptome.org from Covert Action Quarterly (1998) about Echelon. Hager’s book on the subject, “Secret Power: New Zealand’s Role In the International Spy Network,” is dated 1996, so I’m a little confused by the dating of the article. Echelon is/was a global espionage and interception system coordinated by the US/UK with the aid of Canada, Australia, and New Zealand. In NZ, writes Hager, it was implemented without the assent of the public and most public officials.

Here’s a timeline for the development of the system. Per Cryptome, the earliest public report on Echelon is in 1972.

The first reporter to write on it is British intelligence reporter, Duncan Campbell: “They’ve Got It Taped,” New Statesman, August 12, 1988 (republished at Cryptome.org). Campbell testified before Congress on the subject in 1999 and prepared a report for the Electronic Privacy Information Center (EPIC) that was refused by EPIC’s director Marc Rotenberg, on the grounds that much of the information hadn’t been substantiated (see this correspondence between Rotenberg and Young). After that, there was debate between Campbell and Bamford over what the main focus of the espionage was. I will expand on that and link it later…

“IN THE LATE 1980’S, IN A DECISION IT PROBABLY REGRETS, THE U.S. PROMPTED NEW ZEALAND TO JOIN A NEW AND HIGHLY SECRET GLOBAL INTELLIGENCE SYSTEM. HAGER’S INVESTIGATION INTO IT AND HIS DISCOVERY OF THE ECHELON DICTIONARY HAS REVEALED ONE OF THE WORLD’S BIGGEST, MOST CLOSELY HELD INTELLIGENCE PROJECTS. THE SYSTEM ALLOWS SPY AGENCIES TO MONITOR MOST OF THE WORLD’S TELEPHONE, E-MAIL, AND TELEX COMMUNICATIONS. Continue reading

Google: The CIA’s Spy-Buddy

From Eric Sommer at Pravda.ru via Market Oracle, January 14, 2010:

“The western media is currently full of articles on Google’s ‘threat to quit China’ over internet censorship issues, and the company’s ‘suspicion’ that the Chinese government was behind attempts to ‘break-in’ to several Google email accounts used by ‘Chinese dissidents’.

However, the media has almost completely failed to report that Google’s surface concern over ‘human rights’ in China is belied by its their deep involvement with some of the worst human rights abuses on the planet: Continue reading

Wikileaks’ Julian Assange “In Danger” From Pentagon?

More on the ubiquitous founder of WikiLeaks, Julian Assange. I maintain a neutral to positive rating on Assange, despite criticism of him. The whistleblower emails on anthropogenic global warming that were published on Wikileaks (climategate) hugely damaged the climate cabal, but there are some credible writers who maintain that he’s passing off disinfo as well. I honestly can’t tell one way or other. Lately it’s occurred to me that that the controversy might relate to infighting between factions of the intelligence community, but how is the question. Anyway, that’s pure speculation on my part. Continue reading

Obama Decrees Codex Alimentarius In US Through Executive Order?

Update:(June 25):

A commenter states that Section G (the controversial passage said to be a stealth introduction of the Codex) refers only to FEDERAL programs outside the Department of Health and Human Services. But the language elsewhere specifies the DHS when it’s meant, so why is the language in this section ambiguous? Still, I went back to check and noticed that the original mail alert was sent out by Dr. Rima Laibow whose credibility has been questioned. So I’ve attached a question mark to this piece. Codex is on the agenda, but there’s no need  to be inaccurate about when or how it will be introduced.

NOTE (JUNE 20):

IN THE ORIGINAL HEAD TO THIS POST I REFERRED TO THE NEW BODY CONSTITUTED BY OBAMA,
‘THE NATIONAL PREVENTION, HEALTH PROMOTION, AND PUBLIC HEALTH COUNCIL,’ AS THE ‘NATIONAL HEALTH COUNCIL,’ SIMPLY TO HAVE A SHORT ENOUGH CONTRACTION. I’VE SINCE CHANGED THE HEADER,

SO, IF YOU SEE THE ORIGINAL IN ANY LINK, PLEASE NOTE THAT IT SHOULD BE ‘NATIONAL PREVENTION, HEALTH PROMOTION AND PUBLIC HEALTH COUNCIL,’ NOT ‘NATIONAL HEALTH COUNCIL.’ APOLOGIES FOR THE CARELESS ERROR.

ORIGINAL POST

On June 10, 2010, while public attention was diverted toward the Gulf oil spill, Barack Obama passed an executive order mandating that all preventive health measure, even those outside government purview, be brought into alignment with science-based guidelines developed by the Centers for Drug Control and Prevention (CDC). This is in effect a way to bring in Codex Alimentarius, the globalist project to outlaw all alternative therapies, except those proposed by the government.

Per this order, you will no longer be able to take whatever herbs or pills you want.

Here is the full text of the order, at the White House website (the specific paragraph is Section G).

The White House, Office of the Press Secretary For Immediate Release, June 10, 2010

EXECUTIVE ORDER -ESTABLISHING THE NATIONAL PREVENTION, HEALTH PROMOTION, AND PUBLIC HEALTH COUNCIL

By the authority vested in me as President by the Constitution and the laws of the United States of America, including section 4001 of the Patient Protection and Affordable Care Act (Public Law 111-148), it is hereby ordered as follows:

Section 1. Establishment. There is established within the Department of Health and Human Services, the National Prevention, Health Promotion, and Public Health Council (Council).

Sec. 2. Membership.

(a) The Surgeon General shall serve as the Chair of the Council, which shall be composed of:

(1) the Secretary of Agriculture;

(2) the Secretary of Labor;

(3) the Secretary of Health and Human Services;

(4) the Secretary of Transportation;

(5) the Secretary of Education;

(6) the Secretary of Homeland Security;

(7) the Administrator of the Environmental Protection Agency;

(8) the Chair of the Federal Trade Commission;

(9) the Director of National Drug Control Policy;

(10) the Assistant to the President and Director of the Domestic Policy Council;

(11) the Assistant Secretary of the Interior for Indian Affairs;

(12) the Chairman of the Corporation for National and Community Service; and

(13) the head of any other executive department or agency that the Chair may, from time to time, determine is appropriate.

(b) The Council shall meet at the call of the Chair.

Sec. 3. Purposes and Duties. The Council shall:

(a) provide coordination and leadership at the Federal level, and among all executive departments and agencies, with respect to prevention, wellness, and health promotion practices, the public health system, and integrative health care in the United States;

(b) develop, after obtaining input from relevant stakeholders, a national prevention, health promotion, public health, and integrative health-care strategy that incorporates the most effective and achievable means of improving the health status of Americans and reducing the incidence of preventable illness and disability in the United States, as further described in section 5 of this order;

(c) provide recommendations to the President and the Congress concerning the most pressing health issues confronting the United States and changes in Federal policy to achieve national wellness, health promotion, and public health goals, including the reduction of tobacco use, sedentary behavior, and poor nutrition;

(d) consider and propose evidence-based models, policies, and innovative approaches for the promotion of transformative models of prevention, integrative health, and public health on individual and community levels across the United States;

(e) establish processes for continual public input, including input from State, regional, and local leadership communities and other relevant stakeholders, including Indian tribes and tribal organizations;

(f) submit the reports required by section 6 of this order; and

(g) carry out such other activities as are determined appropriate by the President.

Sec. 4. Advisory Group.

(a) There is established within the Department of Health and Human Services an Advisory Group on Prevention, Health Promotion, and Integrative and Public Health (Advisory Group), which shall report to the Chair of the Council.

(b) The Advisory Group shall be composed of not more than 25 members or representatives from outside the Federal Government appointed by the President and shall include a diverse group of licensed health professionals, including integrative health practitioners who are representative of or have expertise in:

(1) worksite health promotion;

(2) community services, including community health centers;

(3) preventive medicine;

(4) health coaching;

(5) public health education;

(6) geriatrics; and

(7) rehabilitation medicine.

(c) The Advisory Group shall develop policy and program recommendations and advise the Council on lifestyle-based chronic disease prevention and management, integrative health care practices, and health promotion.

Sec. 5. National Prevention and Health Promotion Strategy. Not later than March 23, 2011, the Chair, in consultation with the Council, shall develop and make public a national prevention, health promotion, and public health strategy (national strategy), and shall review and revise it periodically. The national strategy shall:

(a) set specific goals and objectives for improving the health of the United States through federally supported prevention, health promotion, and public health programs, consistent with ongoing goal setting efforts conducted by specific agencies;

(b) establish specific and measurable actions and timelines to carry out the strategy, and determine accountability for meeting those timelines, within and across Federal departments and agencies; and

(c) make recommendations to improve Federal efforts relating to prevention, health promotion, public health, and integrative health-care practices to ensure that Federal efforts are consistent with available standards and evidence.

Sec. 6. Reports. Not later than July 1, 2010, and annually thereafter until January 1, 2015, the Council shall submit to the President and the relevant committees of the Congress, a report that:

(a) describes the activities and efforts on prevention, health promotion, and public health and activities to develop the national strategy conducted by the Council during the period for which the report is prepared;

(b) describes the national progress in meeting specific prevention, health promotion, and public health goals defined in the national strategy and further describes corrective actions recommended by the Council and actions taken by relevant agencies and organizations to meet these goals;

(c) contains a list of national priorities on health promotion and disease prevention to address lifestyle behavior modification (including smoking cessation, proper nutrition, appropriate exercise, mental health, behavioral health, substance-use disorder, and domestic violence screenings) and the prevention measures for the five leading disease killers in the United States;

(d) contains specific science-based initiatives to achieve the measurable goals of the Healthy People 2020 program of the Department of Health and Human Services regarding nutrition, exercise, and smoking cessation, and targeting the five leading disease killers in the United States;

(e) contains specific plans for consolidating Federal health programs and centers that exist to promote healthy behavior and reduce disease risk (including eliminating programs and offices determined to be ineffective in meeting the priority goals of the Healthy People 2020 program of the Department of Health and Human Services);

(f) contains specific plans to ensure that all Federal health-care programs are fully coordinated with science-based prevention recommendations by the Director of the Centers for Disease Control and Prevention; and

(g) contains specific plans to ensure that all prevention programs outside the Department of Health and Human Services are based on the science-based guidelines developed by the Centers for Disease Control and Prevention under subsection (d) of this section.

Sec. 7. Administration.

(a) The Department of Health and Human Services shall provide funding and administrative support for the Council and the Advisory Group to the extent permitted by law and within existing appropriations.

(b) All executive departments and agencies shall provide information and assistance to the Council as the Chair may request for purposes of carrying out the Council’s functions, to the extent permitted by law.

(c) Members of the Advisory Group shall serve without compensation, but shall be allowed travel expenses, including per diem in lieu of subsistence, as authorized by law for persons serving intermittently in Government service (5 U.S.C. 5701-5707), consistent with the availability of funds.

Sec. 8. General Provisions.

(a) Insofar as the Federal Advisory Committee Act, as amended (5 U.S.C App.) may apply to the Advisory Group, any functions of the President under that Act, except that of reporting to the Congress, shall be performed by the Secretary of Health and Human Services in accordance with the guidelines that have been issued by the Administrator of General Services.

(b) Nothing in this order shall be construed to impair or otherwise affect:

(1) authority granted by law to an executive department, agency, or the head thereof; or

(2) functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

BARACK OBAMA

THE WHITE HOUSE,

June 10, 2010

Aussies Want Internet Providers To Retain All Browsing, Email Records

After all the (deserved) outcry against Google, Ben Grub at ZDNet.com, June 11, 2010, tells us why trusting the government to keep an eye on privacy offenders only makes things worse:

Companies who provide customers with a connection to the internet may soon have to retain subscriber’s private web browsing history for law enforcement to examine when requested, a move which has been widely criticised by industry insiders. Continue reading

Expat News: New Uruguay Tax Laws

Relocation expert and Uruguay specialist, David Hammond has the scoop on recent changes to tax law in Uruguay, “Uruguay Tax Proposal Rocks the Boat?”:

Uruguay made headlines all over the world this last week, with news of a proposed tax bill that could result in a weakening of Uruguay’s banking privacy and tax the offshore assets of Uruguayan citizens and foreign residents. Continue reading

Wikileaks’ Role In Julius Baer Case Linked to Soros, Sachs, & Spooks?

From The Wayne Madsen Report (a subscription-based service) comes this analysis (April, 2010) of the attack on the financial privacy of Swiss money manager, Julius Baer Group, exposed by whistle-blower Rudolf Elmer:

“WMR’s financial intelligence sources report that the unauthorized disclosure of a compact disk to Wikileaks that contained financial details of the clients of the secretive and usually highly-secure Zurich-based independent money management Julius Baer Group was designed to destroy the firm’s standing with its customers and make it ripe for a hostile takeover by interests associated with multi-billionaire vulture capitalist George Soros, including Goldman Sachs. Julius Baer was founded in the 19th century. Continue reading

CEO Admits Google Street-View Cars Recorded “Millions” of Homeowners’ Wifi Data

The Telegraph (June 4, 2010) reports that Google, which had been caught earlier recording private wifi messages has just ‘fessed up to the seriousness of what it did:

“In an interview with the Financial Times, the search engine’s boss admitted the company could have gained access to the personal details of millions of unsuspecting internet users.

Google is currently at the centre of a global privacy storm after it admitted that its Street View cars had mistakenly collected information Continue reading