June 25, 2009

Cybersecurity Act of 2009

Cybersecurity Is Framework for Total Government Regulation & Control of Our Lives

Paul Joseph Watson & Kurt Nimmo, PrisonPlanet
June 1, 2009

The Obama administration’s new Cybersecurity system will only make the Internet more vulnerable to attack, while creating the framework for a massively upgraded government surveillance grid that will control and regulate every aspect of our daily lives through the implementation of “smart” technology.

Obama’s announcement of the new cybersecurity grid dovetails with a recently introduced Senate bill, the Cybersecurity Act of 2009, that would hand the president the power to shut down the entire Internet in the event of a “cybersecurity” crisis.

“The bill’s draft states that “the president may order a cybersecurity emergency and order the limitation or shutdown of Internet traffic” and would give the government ongoing access to “all relevant data concerning (critical infrastructure) networks without regard to any provision of law, regulation, rule, or policy restricting such access,” reports Raw Story.

The legislation would allow the government to tap into any digital aspect of every citizen’s information without a warrant. Banking, business and medical records would be wide open to inspection, as well as personal instant message and e-mail communications.

This is President Bush’s warrantless wiretapping program on steroids, yet the reaction from the liberal left has been muted to say the least. Furthermore, the reasoning behind the proposal is a farce, since cybersecurity will make the Internet even more vulnerable to attack. According to Jennifer Granick, director of civil liberties at the Electronic Frontier Foundation, the program would “basically establish a path for the bad guys to skip down.”

One of the bill’s authors, Democratic Sen. Jay Rockefeller of West Virginia, admitted that the bill was about more than just military or intelligence concerns. “It is a lot more than that. It suddenly gets into the realm of traffic lights and rail networks and water and electricity,” said Rockefeller.

Essentially, this is the framework within which every aspect of our lives will be managed and regulated by a gargantuan government bureaucracy designed to control and shape every aspect of our behavior through our dependence on technology.

This is what Nancy Pelosi was referring to when she visited China last week and let slip the fact that “Every aspect of our lives must be subject to inventory” in order to fight global warming

Under the cybersecurity grid, our electricity consumption, our water consumption, and every other basic utility that we rely upon will be subject to state regulation.

This is already being introduced through “smart” technology, manifesting in such things as fridges that are controlled by power companies and not the individual. If you are deemed to have bypassed government-approved levels of consumption, your fridge will be automatically turned off remotely.
“A domestic refrigerator that can be turned on and off by the electricity supplier without the homeowner being aware is to go on trial,” reported the Daily Mail in January. “Npower will distribute 300 ‘smart fridges’ free to homeowners throughout Britain within the next five weeks as part of the energy companies’ efforts to tackle climate change.”

“At times of high demand, the National Grid will activate the switches in the fridges to achieve a balance in the power supply. The development means that, for the first time, consumers will lose control over the use of electricity in their own homes,” stated the report.
All British homes are also set to have “smart” electricity and gas meters installed by law by 2020. The meters would “record energy use” according to a Reuters report. Likewise, water companies are preparing to force homeowners to install water meters so that water consumption can be accurately recorded and restricted in times of drought.

This is just the beginning of the imposition of a suffocating prison planet whereby our every action will not only be recorded by Big Brother but also subject to government approval and control.

The Cybersecurity grid will also be an upgrade of the pervasive snoop network that has already been operating under NSA auspices for decades.

During a speech last week on “cybersecurity,” Obama told a whopper. He said the government’s effort to protect us from cyber bad guys “will not include monitoring private sector networks or Internet traffic. We will preserve and protect the personal privacy and civil liberties that we cherish as Americans.”




Is it possible Obama has never heard of Mark Klein, the retired AT&T communications technician who said years ago that the company shunted all Internet traffic — including traffic from peering links connecting to other Internet backbone providers — to semantic traffic analyzers, installed in a secret room inside the AT&T central office on Folsom Street in San Francisco? There are similar rooms in Seattle, San Jose, Los Angeles and San Diego, all sucking up internet data.
Klein explained that the multinational corporation is doing this at the behest of the NSA. It is “vacuum-cleaner surveillance” approach that grabs everything. “Despite what we are hearing, and considering the public track record of [the Bush] administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA [the Foreign Intelligence Surveillance Act],” said Klein in 2006.

After the NSA showed up in 2002 at AT&T’s Folsom Street facility, Klein began connecting the dots. “You might recall there was a big blowup in the news about the Total Information Awareness [TIA] program, led by Adm. [John] Poindexter, which caused the big upsetness in Congress, because what Poindexter was proposing to do was draw in databases from everywhere — and this was in the New York Timesdraw in Internet data, bank records, travel records, everything into one big conglomeration which could be searchable by the government so they could find out everything about what anybody’s doing at any time of day,” Klein told PBS. “And all this would be done without any warrants. This is how it was presented by Poindexter himself in the New York Times, and that caused a great upset, brouhaha, in Congress.”
On January 16, 2003, Senator Russ Feingold introduced legislation to suspend the activity of the Total Information Awareness program pending a Congressional review of privacy issues involved. In February 2003, Congress passed legislation suspending activities of the IAO (Information Awareness Office) pending a Congressional report of the office’s activities.

Congress acted after William Safire published an article in the New York Times claiming “[TIA] has been given a $200 million budget to create computer dossiers on 300 million Americans” (see You Are a Suspect, November 14, 2002).

Of course, the program didn’t go away. Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA’s component technologies, if they were transferred to other government agencies. TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills.

Total Information Awareness — the all-seeing terrorist spotting algorithm-meets-the-mother-of-all-databases that was ostensibly de-funded by Congress in 2003, never actually died, and was largely rebuilt in secret by the NSA, according to the Wall Street Journal’s Siobhan Gorman,” Ryan Singel wrote for Wired on March 10, 2008. “There’s been no real debate in Congress or in the press about whether the government should be allowed to track every Americans phone calls, emails and web browsing.”

Jon Stokes, writing for Ars Technica, notes that TIA technology is nothing new. “TIA-like efforts are still going on” Stokes wrote in 2005, and “the government has been trying to use new technology, like database tech and voice recognition, for domestic surveillance for a long time. And when I say a long time, I mean well before the current administration came into office.” It really got a boost under Clinton in 1995 when the Communications Assistance for Law Enforcement Act (CALEA) was passed. “CALEA mandated that the telcos aid wiretapping by installing remote wiretap ports onto their digital switches so that the switch traffic would be available for snooping by law enforcement.”

In other words, Mark Klein had but scratched the surface.

Truman created the NSA in 1952, supposedly to serve as “America’s ears” abroad, but the agency has long served as a secret Stasi-like organization dedicated to snooping on Americans. The NSA, writes Siobhan Gorman for the Wall Street Journal, “and other intelligence agencies were found to be using their spy tools to monitor Americans for political purposes.”

The NSA’s predecessor, the Armed Forces Security Agency, launched Project SHAMROCK in 1945. It obtained copies of all telegraphic information exiting or entering the United States with the full cooperation of RCA, ITT and Western Union. A sister project known as Project MINARET involved the creation of “watch lists,” by each of the intelligence agencies and the FBI, of those accused of “subversive” domestic activities. The watch lists included such notables as Martin Luther King, Malcolm X, Jane Fonda, Joan Baez and Dr. Benjamin Spock, according to Patrick S. Poole, writing for Nexus Magazine in 1999. The FBI, the NSA, and other intelligence agencies were actively involved in creating the watch lists.

NSA has attempted to keep up on technology as the secretive agency continues to snoop on “subversives” and others the government considers miscreants. In February, trade publications reported the agency is offering “billions” to any firm able to offer reliable eavesdropping on Skype IM and voice traffic. Skype is particularity troublesome because it utilizes P2P networks, that is to say peer-top-peer (no central server owned and operated by a telecom required). The government and the corporate media may tell you they want to crack down on P2P — for instance, the vastly popular BitTorrent — because of copyright infringement, but a more practical reason is because the government has yet to figure out how to crack the file sharing protocol. Skype and BitTorrent account for a large amount of traffic on the internet.

If you think Obama will roll back the government’s massive and unconstitutional snoop program, think again. On April 3, the Obama Department of Justice filed a motion to dismiss one of the Electronic Frontier Foundation’s landmark lawsuits against illegal spying by the NSA. The DOJ demanded that the entire lawsuit be dismissed based on both the Bush administration’s claim that a “state secrets” privilege bars any lawsuits against the executive branch for illegal spying, as well as a novel “sovereign immunity” claim that the Patriot Act bars lawsuits of any kind for illegal government surveillance (see the EFF press release, Obama Administration Embraces Bush Position on Warrantless Wiretapping and Secrecy).

In March, Obama’s coordinator for cybersecurity programs, Rod Beckstrom, a former Silicon Valley entrepreneur, quit because he opposed the role of the NSA in the so-called cybersecurity initiative. Beckstrom said “the threats to our democratic processes are significant if all top level government network security and monitoring are handled by” the NSA.
“Obama’s moves drew praise from key lawmakers on Capitol Hill, who vowed to work with the president to implement new security measures as needed,” CQPolitics reported shortly after his “cybersecurity” speech. “Obama said his cybersecurity adviser — who will be a member of both the National Security Staff and the National Economic Council staff — will head a new office within the White House.”

“We applaud President Obama for highlighting the extraordinarily serious issue of cybersecurity,” Sens. Johns D. Rockefeller IV, D-W.V., and Olympia J. Snowe , R-Maine, said in a joint statement. “No other president in American history has elevated this issue to that level and we think him for his leadership.”
No other president so far has had the power to shut down the internet. The Rockefeller-Snowe bill, S 778, would grant Obama dictatorial power declare a so-called “cyber emergency” and pull the plug, or at least cripple networks deemed a threat. The U.S. government is not seriously worried about Chinese hackers or mischievous kids in Latvia (as Rockefeller cited as a danger) but rather fear free and unfettered speech and activism on the part of its own citizens.

Obama’s promise is merely an effort to string you along with a big fat lie. He has absolutely no respect for you or the Bill of Rights.

Census Bureau needs to be told to flush their intrusive Big Brother American Community Survey
Pentagon Working on Cyberwarfare Tools for GIs
Pelosi: "Every aspect of our lives must be subjected to an inventory"
US cybersecurity plan poses new war threats, attacks on democratic rights
Germany Prepares to Censor Internet
Cyberwarfare Begins in Iran: Election Has Knocked Key Websites Offline
Widespread Email Surveillance by NSA Concerns Congress
Blitz of “Cyber Attacks” as Rockefeller Bill Approaches
Big Brother is Watching You: Pervasive Surveillance Under Obama
Copyright laws threaten our online freedom
In order to uphold copyright laws, governments are beginning to restrict our right to communicate with each other in private without being monitored... The internet and new information technologies are so powerful that no matter what we do, society will change...The technology could be used to create a Big Brother society beyond our nightmares, where governments and corporations monitor every detail of our lives.
Is this cyber war? Possible U.S responses limited
More propaganda to get the people to give up their civil liberties...
Internet Attack Propaganda Increases as Cyber Bill Approaches
The new alleged threat and accompanying propaganda comes as Senate Commerce Chairman John Rockefeller prepares for a July committee vote on cybersecurity legislation he introduced in April.
Facts? Don’t bother us with facts when it comes to North Korea (or any “enemy”)
All over the news are claims of web attacks in which North Korea is “suspected.”
NSA’s cyber overkill
Snooping through the power socket
Cass Sunstein's despicable ideas on regulating the internet
New browser red-flags disputed facts on the web
Bill would give president emergency control of Internet
Internet hate speech law unconstitutional
Internet filtering a farce: Minchin
Obama Plans Internet Grab: FCC to Embrace ‘Net Neutrality’
FCC commissioners support open Internet rule
Ceding the Internet to "Global Governance"
UK House of Lords Follow China and Australia, Propose Internet Censorship Bill
Death Of The Internet: Censorship Bills In UK, Australia, U.S. Aim To Block "Undesirable" Websites
Enemies Of Free Speech Call For Internet Licensing
U.N.’s World Health Organization Wants Tax on Internet
Alex Jones exposes agenda to ‘blacklist’ dissenting sites and license users
Controlling the Ability of People and Organizations to Access the Internet
Cybercrime Needs to be Top Priority, Says Obama Aide
The End of the Internet as We Know It in Britain
ACTA treaty aims to deputize ISPs on copyrights
Internet service providers could become copyright cops encouraged to block access to suspected pirate Web sites, according to a previously secret draft treaty made public on Wednesday.
Preliminary Analysis of the Officially Released ACTA Text
US appoints first cyber warfare general
The Digital Economy Bill, A System Like China's Censorship
Cybersecurity chief amplifies call for public-private teamwork
Bloggers Beware — They’re Coming After You!
Liberal Coalition Demands FCC Move to Shut Down Talk Radio
FCC Moves to Regulate Internet--Even Though the Law Calls for Internet to be 'Unfettered by Federal or State Regulation'
Internet disconnection ‘like being imprisoned’, says Sir Tim Berners-Lee

Updated 9/30/10 (Newest Additions at End of List)

No comments:

Post a Comment

Go to The Lamb Slain Home Page