Archive

Posts Tagged ‘Cybersecurity’

US not ready for WMD attack, report says

June 24, 2011 Comments off

thehill.com

The United States is unprepared for an attack involving weapons of mass destruction, according to a report by the Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism.

The report, and the commission’s prediction that it is “more likely than not” that a WMD will be used by terrorists by the end of 2013, were the principal topics at Thursday’s joint subcommittee hearing of the House Homeland Security Committee on the Weapons of Mass Destruction Prevention and Preparedness Act of 2011.   Lawmakers discussed the commission’s statement, made in a prior report, that “Unless the world community acts decisively and with great urgency, it is more likely than not that a weapon of mass destruction will be used in a terrorist attack somewhere in the world by the end of 2013.”

Rep. Dan Lungren (R-Calif.), chairman of the subcommittee Read more…

How Our Government is Tracking and Databasing Your Every Move

April 17, 2011 Comments off

conspiracywatch

Big Brother is Watching

The war on terror and cybersecurity are excuses that have spurred huge investments into the surveillance industry, which has become a war on “liberty and privacy.”

The Obama administration has moved forward with a Bush regime program to screen state computer traffic on private-sector networks, including those connecting people to the Internet, The Washington Post revealed July 3.

That project, code-name “Einstein,” is related to the much-larger, Read more…

How Close Are We to a Nano-based Surveillance State?

February 22, 2011 Comments off

Michael Edwards
Activist Post

In the span of just three years, we have seen drone surveillance become openly operational on American soil.

In 2007, Texas reporters first filmed a predator drone test being conducted by the local police department in tandem with Homeland Security.  And in 2009, it was revealed that an operation was underway to use predator drones inland over major cities, far from “border control” functions.  This year it has been announced that not only will drone operations fly over the Mexican border, but the United States and Canada are partnering to cover 900 miles of the northern border as well.

Now that the precedent has been set to employ drones over non-combat areas, the military is further revealing the technology of miniaturization that they currently have at their disposal.  As drone expert, P.W. Singer said, “At this point, it doesn’t really matter if you are against the technology, because it’s coming.”  According to Singer, “The miniaturization of drones is where it really gets interesting.  You can use these things anywhere, put them anyplace, and the target will never even know they’re Read more…

Kill Switch Beta: Government Blocks 84,000 Websites

February 17, 2011 1 comment

Kurt Nimmo
Infowars.com
February 16, 2011

Under the banner of fighting child pornography, the Department of Homeland Security and the Department of Justice knocked out 84,000 websites last week. The websites did not host or link to child pornography as the government claims.

“As part of ‘Operation Save Our Children‘ ICE’s Cyber Crimes Center has again seized several domain names, but not without making a huge error. Last Friday, thousands of site owners were surprised by a rather worrying banner that was placed on their domain,” reports TorrentFreak, a tech site.

Senator Joe Lieberman peddles his kill switch legislation under the rubric of the phony war on terror.

“Advertisement, distribution, transportation, receipt, and possession of child pornography constitute federal crimes that carry penalties for first time offenders of up to 30 years in federal prison, a $250,000 fine, forfeiture and restitution,” was the message visitors to the sites were Read more…

Obama signature creates ‘continental perimeter’

February 12, 2011 Comments off

Move described as key step in advance of North American Union

By Jerome R. Corsi
© 2011 WorldNetDaily

Barack Obama and Canadian Prime Minister Stephen Harper quietly have taken a major step toward erasing the border between the two nations with a new “Beyond the Border” bilateral declaration.

In a ceremony designed to remain below the radar of national public opinion, Obama and Harper bypassed Congress to sign on the basis of their executive authority a declaration that put in place a new national security vision defined not by U.S. national borders, but by a continental view of a “North American perimeter.”

It happened Friday, the day the Obama administration usually pushes through issues that it prefers the media ignore.

By signing the declaration, the Obama administration has implemented without congressional approval a key initiative President Bush began under the Security and Prosperity Partnership of North America, moving the United States and Canada beyond the North American Free Trade Agreement, commonly known as NAFTA, toward a developing North American Union regional government.

The declaration signed by the two heads of state and titled “Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness,” was described as “For Immediate Release” on the websites of the White House and the Canadian chief executive.



Harper followed Obama’s lead in signing the declaration as a form of executive order, deciding to bypass the Read more…

Obama may get power to shut down Internet without court

January 25, 2011 Comments off

A bill giving the president an Internet “kill switch” during times of emergency that failed to pass Congress last year will return this year, but with a revision that has many civil liberties advocates concerned: It will give the president the ability to shut down parts of the Internet without any court oversight.

The Protecting Cyberspace as a National Asset Act was introduced last year by Sens. Joe Lieberman (I-CT) and Susan Collins (R-ME) in an effort to combat cyber-crime and the threat of online warfare and terrorism.

Critics said the bill would allow the president to disconnect Internet networks and force private websites to comply with broad cybersecurity measures. Future US presidents would have those powers renewed indefinitely.

According to a report Monday at CNET News, the bill will be back on the Senate agenda in the new year. But a revision introduced into the bill in December would exempt the law from judicial oversight. According to critics, this change would open the law to politically-motivated abuse by any administration, no matter Read more…

Obama Eyeing Internet ID for Americans

January 10, 2011 Comments off

STANFORD, Calif. – President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today.

It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet, White House Cybersecurity Coordinator Howard Schmidt said.

That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil liberties groups that have raised concerns in the past over the dual roles of police and intelligence agencies.

The announcement came at an event today at the Stanford Institute for Economic Policy Research, where U.S. Commerce Secretary Gary Locke and Schmidt spoke.

The Obama administration is currently drafting what it’s calling the National Strategy for Trusted Identities in Cyberspace, which Locke said will be released by the president in the next few months. (An early version was publicly released last summer.)

“We are not talking about a national ID card,” Locke said at the Stanford event. “We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.” Read more…