By Michael Hampton, Homeland Stupidity March 27, 2010
“People don’t know what fusion centers are,” says Catherine Bleish, who was the opening speaker at the 2010 New Hampshire Liberty Forum on March 19.
Fusion centers were created after the September 11, 2001, terrorist attacks as a way for local and state law enforcement agencies to share terrorism related information with the federal government, and vice versa. The idea quickly ran into problems, first among them the fact that there simply isn’t enough terrorist activity to justify the concept. Instead of shutting down as pointless, fusion centers gradually began expanding into sharing information about all crimes.Fusion center activity over the years has also raised concerns about government surveillance of legally protected political activity.
Bleish, who was led into becoming an activist by the 2008 Ron Paul presidential campaign, said she was informed of a report published by the Missouri Information Analysis Center, leaked in March 2009, which stated among other things that people with Gadsden flag and Ron Paul bumper stickers could be militia members or potential terrorists. Bleish, who is the executive director of the Liberty Restoration Project, spearheaded further investigation and activism, eventually leading to MIAC retracting the report.
“MIAC is a Department of Homeland Security fusion center,” she said during her speech. “These institutions are doing a lot of damage to the relationship between the general public and the law enforcement community.”
Bleish also runs Operation Defuse, a project to inform the public about the nature and activities of fusion centers and how those activities contribute to the federalization and militarization of law enforcement.
The New Hampshire Liberty Forum is an annual conference held by the Free State Project, a movement to bring 20,000 activists to New Hampshire to work toward reducing the size, scope and power of government and increasing individual liberty and responsibility.The project has signed over 10,000 participants, and over 800 have already moved. The Liberty Forum, and the project’s summer camping event, PorcFest, allow people undecided about the project to see the state firsthand and observe and participate in local activism.
A new institution is emerging in American life: Fusion Centers. These state, local and regional institutions were originally created to improve the sharing of anti-terrorism intelligence among different state, local and federal law enforcement agencies. Though they developed independently and remain quite different from one another, for many the scope of their mission has quickly expanded — with the support and encouragement of the federal government — to cover "all crimes and all hazards."
The types of information they seek for analysis has also broadened over time to include not just criminal intelligence, but public and private sector data; and participation in these centers has grown to include not just law enforcement, but other government entities, the military and even select members of the private sector.
These new fusion centers, over 40 of which have been established around the country, raise very serious privacy issues at a time when new technology, government powers and zeal in the "war on terrorism" are combining to threaten Americans' privacy at an unprecedented level.
Moreover, there are serious questions about whether data fusion is an effective means of preventing terrorism in the first place, and whether funding the development of these centers is a wise investment of finite public safety resources.Yet federal, state and local governments are increasing their investment in fusion centers without properly assessing whether they serve a necessary purpose.
There's nothing wrong with the government seeking to do a better job of properly sharing legitimately acquired information about law enforcement investigations — indeed, that is one of the things that 9/11 tragically showed is very much needed.
But in a democracy, the collection and sharing of intelligence information — especially information about American citizens and other residents — need to be carried out with the utmost care. That is because more and more, the amount of information available on each one of us is enough to assemble a very detailed portrait of our lives. And because security agencies are moving toward using such portraits to profile how "suspicious" we look.
New institutions like fusion centers must be planned in a public, open manner, and their implications for privacy and other key values carefully thought out and debated. And like any powerful institution in a democracy, they must be constructed in a carefully bounded and limited manner with sufficient checks and balances to prevent abuse.
Unfortunately, the new fusion centers have not conformed to these vital requirements.
Since no two fusion centers are alike, it is difficult to make generalized statements about them. Clearly not all fusion centers are engaging in improper intelligence activities and not all fusion center operations raise civil liberties or privacy concerns. But some do, and the lack of a proper legal framework to regulate their activities is troublesome.
This report is intended to serve as a primer that explains what fusion centers are, and how and why they were created. It details potential problems fusion centers present to the privacy and civil liberties of ordinary Americans, including:
Ambiguous Lines of Authority. The participation of agencies from multiple jurisdictions in fusion centers allows the authorities to manipulate differences in federal, state and local laws to maximize information collection while evading accountability and oversight through the practice of "policy shopping."
Private Sector Participation. Fusion centers are incorporating private-sector corporations into the intelligence process, breaking down the arm's length relationship that protects the privacy of innocent Americans who are employees or customers of these companies, and increasing the risk of a data breach.
Military Participation. Fusion centers are involving military personnel in law enforcement activities in troubling ways.
Data Fusion = Data Mining. Federal fusion center guidelines encourage whole sale data collection and manipulation processes that threaten privacy.
Excessive Secrecy. Fusion centers are hobbled by excessive secrecy, which limits public oversight, impairs their ability to acquire essential information and impedes their ability to fulfill their stated mission, bringing their ultimate value into doubt.
The lack of proper legal limits on the new fusion centers not only threatens to undermine fundamental American values, but also threatens to turn them into wasteful and misdirected bureaucracies that, like our federal security agencies before 9/11, won't succeed in their ultimate mission of stopping terrorism and other crime.
The information in this report provides a starting point from which individuals can begin to ask informed questions about the nature and scope of intelligence programs being conducted in their communities. The report concludes with a list of recommendations for Congress and state legislatures.
Agencies across the state are working together to fight crime. The Texas Department of Public Safety (DPS) held a dedication Thursday morning for what is known as a Fusion Center.
The center sits inside a building at the DPS headquarters complex in North Austin.
DPS allowed media inside for a rare look at how the agencies work together to solve crimes. Large screens and rows of computers fill one room after another at the center. Each room is dedicated to a type of intelligence gathering including border security and gang activity.
The purpose of a fusion center is to create a central location where local, state, and federal agencies can work together to share the information they have gathered about different crimes or threats, in particular terror threats or trends in organized crime.
“This is a great day for the State of Texas. It's going to make us safer," said Congressman Michael McCaul, R-Texas. "Fusion centers, sharing information, sharing intelligence is what is going to detect, deter and prevent a future terrorist attack.”
McCaul is one of the heads of the Homeland Security Committee. He visited the Fusion Center on Thursday for its dedication. It is one of about 70 in the nation.
The center has actually been under development for about a year now. The dedication marks the official launch joining multiple state and local agencies.
A majority of the group was working during the recent shooting on the University of Texas campus, as well as during the suicide plane crash into the Echelon building earlier this year.
The Austin Police Department is part of the group working at the center. APD secured city approval in May to create a center within the complex to coincide with the fusion facility.
Money to fund the center comes from Homeland Security Grants.
Several rights groups have expressed concerns regarding a possible over-sharing of information. APD officials say they will allow watch groups certain access to oversee any potential concerns.
Secretary Janet Napolitano and other officials from the Department of Homeland Security testified today on the growing threat of homegrown terrorists and small-scale attacks.
There’s a growing chorus from the homeland security community on this trend, and Napolitano testified that although for many years Al Qaeda and its allies seemed to be waiting for the opportunity to stage an attack on the dramatic scale of 9/11, these days, a looser network of groups is more willing to resort to tactics like planting IEDs:
It is clear that the threat of al Qaeda-style terrorism is not limited to the al-Qaeda core group, or organizations that have close operational links to al Qaeda. While al Qaeda continues to threaten America directly, it also inspires its affiliates and other groups and individuals who share its violent ideology and seek to attack the United States claiming it is in the name of Islam – a claim that is widely rejected.
One of the ways DHS is approaching this threat is by beefing up the country’s network of fusion centers — groups that fuse local law enforcement work with national-level intelligence.Napolitano has made the centers a major focus of the department’s FY11 grant cycle. The idea is, as Napolitano said today, is that
“In an environment where operatives may not have close links to international terrorist organizations – and where they may, in fact, be based within this country – these levels of law enforcement may be the first to notice something suspicious.”
Fusion centers don’t have the strongest records of keeping their focus on international terrorist organizations, though. As G.W. Schulz reports for the Center for Investigative Reporting:
One of the nation’s oldest fusion centers, known as the El Paso Intelligence Center, accidentally caused a California couple that owns a flight training school to be falsely held at gunpoint by police for the second time. Twice now EPIC has failed to clean up incorrect data that led authorities to believe a plane owned by the pair was stolen.
The FBI is assembling a massive database on thousands of Americans, many of whom have not been accused of any crime, the Washington Post'sDana Priest and William Arkin report. The reporters' latest look at the country's ballooning national security system focuses on the role that local agencies -- often staffed by people with little to no counter-terrorism training -- have played in combating terrorism since 2001.
Here are five striking revelations in their piece:
The FBI's Nationwide Suspicious Activity Reporting Initiative currently contains 161,948 suspicious activity files, into which authorities can put information they've gathered about the people at the center of the files: employment history, financial documents, phone numbers, photos. In many cases, the people in the files have not been accused of any crime but have attracted the suspicions of a local cop, FBI agent or even fellow citizen. The files have led to five arrests but no convictions, the FBI says. Some of the files are unclassified so that local police agencies and even businesses can submit reports on anyone they deem suspicious.
The Department of Homeland Security does not know how much it spends in funding state fusion centers, which synthesize security information from all state agencies and feeds information to the FBI's "Nationwide Suspicious Activity Reporting Initiative." But since 2001, DHS has doled out $31 billion to states and localities for homeland-security initiatives.
Conspiracy Theory with Jesse Ventura: Police State (Season 2, Episode 4):
Local officials at these fusion centers are tasked with understanding terrorism with little or no training. To fill the void, self-styled experts with fairly extreme views on the scope of the Muslim terrorist threat are asked to come in and train local authorities, the Post reports.
Expert Walid Shoebat told a group at the first annual South Dakota Fusion Center Conference in Sioux Falls this year that they should monitor local Muslim student groups and mosques and try to tap their phones. "You can find out a lot of information that way," he said.
National intelligence officials told the Post they preferred that people with "evidence-based" approaches to Islam were lecturing instead, but that no guidelines are in place to determine the qualifications of a given speaker.
The localities are often left without guidance from DHS, which can lead to confusion about the counter-terror activity they're supposed to be carrying out. Virginia's fusion center named historically black colleges as a "potential" terrorism hub, Maryland State Police infiltrated local groups that lobbied for bike lanes and human rights, and a contractor in Pennsylvania writing an intelligence bulletin flagged meetings of the Tea Party Patriots Coalition and environmental activists.
Many states and towns are taking the unprecedented amounts of money handed out to fight terrorists and are using it instead to fight crime.
"We have our own terrorists, and they are taking lives every day," Memphis Police Director Larry Godwin, said.
(Screenshot: The Post's interactive map of state and local counterterrorism agencies.)
The U.S. Army Corps of Engineers and National Security Agency host a joint groundbreaking ceremony for the first Intelligence Community Comprehensive National Cyber-security Initiative (CNCI) Data Center Thursday, Jan. 6, 2011, at Camp Williams. Construction of the $1.2 billion Data Center is scheduled to be completed in October 2013.
Deseret News January 6, 2011
Thursday's groundbreaking for a $1.5 billion National Security Agency data center is being billed as important in the short term for construction jobs and important in the long term for Utah's reputation as a technology center.
"This will bring 5,000 to 10,000 new jobs during its construction and development phase," Sen. Orrin Hatch, R-Utah, said on Wednesday. "Once completed, it will support 100 to 200 permanent high-paid employees."
Officially named the Utah Data Center, the facility's role in aggregating and verifying dizzying volumes of data for the intelligence community has already earned it the nickname "Spy Center." Its really long moniker is the Community Comprehensive National Cyber-security Initiative Data Center — the first in the nation's intelligence community.
A White House document identifies the Comprehensive National Cyber-security Initiative as addressing "one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter." The document details a number of technology-related countermeasures to the security threat.
Hatch said Utah was chosen for the project over 37 other locations. He characterized the cyber-security center as the "largest military construction project in recent memory."
Hatch said he promoted Utah's favorable energy costs, Internet infrastructure, thriving software industry and proximity to the Salt Lake City International Airport in the bid process that ended up with Camp Williams earning the data center.
The Army Corps of Engineers is overseeing the project that is under contract to a joint venture between Big-D Construction in Salt Lake City, U.K.-based Balfour Beatty Construction and DPR Construction out of California.
"This project is going to give an opportunity for an awful lot of Utahns" who have seen construction jobs in Utah drop from 100,000 in 2008 to about 66,000 today, said Rob Moore, president and COO of Big-D and chairman of the Associated General Contractors in Utah. "My subcontractors, suppliers and vendors are very appreciative of the work that will be available on this project."
Grading work is already under way for the complex, which is scheduled to include 100,000 square feet for the data center and 900,000 square feet for technical support and administrative space. The center is designed to be capable of generating all of its own power through backup electrical generators and will have both fuel and water storage. Construction is designed to achieve environmentally significant LEED Silver certification.
"It is so unique and so intensive," Hatch said. "This will establish our state as one of the leading states for technology."
The majority of state and local counterterrorism centers across the country do not have federally approved plans to ensure they are protecting the privacy rights and civil liberties of U.S. citizens, raising concerns among privacy advocates that they lack proper oversight.
The issue reveals the tension between government efforts to collect and analyze intelligence inside the United States in order to prevent terrorist attacks and fears that innocent Americans and law-abiding groups are being improperly spied upon.
After the Sept. 11, 2001, terrorist attacks, the U.S. government encouraged and funded a proliferation of domestic counterterrorism centers, commonly referred to as state and local homeland security fusion centers.
Although 72 centers now exist, only 28 have privacy and civil liberties plans approved by the Homeland Security Department, National Journal has learned. DHS serves as the lead federal agency coordinating and funding the centers.
To address the issue, DHS this year began restricting the ability of centers to use state homeland security grants until they have an approved privacy and civil liberties plan.
"We've been complaining about the lack of a governance structure over fusion centers for a few years now," Michael German, policy counsel for the ACLU and former FBI special agent, said in an interview.
"That the process is taking too long is worrisome, and we'll be watching to see how effective DHS is in enforcing this requirement, particularly because having a written privacy policy is only a first step toward accountability," he added.
Tom Monahan, president of the National Fusion Center Association, said candidly that he shares the concerns of privacy groups like the ACLU. The association is a nonprofit organization based in Alexandria, Va., that represents the 72 fusion centers.
"We understand that concern. We absolutely agree with that concern," Monahan said. He said all fusion centers are required to have approved plans by March 31.
Even though DHS has not approved privacy and civil liberties plans for most fusion centers, they still must comply with federal, state and local laws protecting people's rights, Monahan said.
"Much of the content of the privacy policy will simply be restating existing statutes, laws and regulations," he said. "However, it's imperative that it be codified and trained for everybody who works in the fusion centers because well-intentioned employees of the fusion centers could run afoul of the laws despite their well intentions."
But a major challenge for centers to get approval from DHS has been that state and local laws can vary widely, Monahan added.
"There is no standardized language to construct this," said Monahan, who also directs the Southern Nevada Counter-Terrorism Center.
He added: "I'm not aware of any fusion center that hasn't even started. Everybody understands the importance of this; everybody understands the magnitude of not getting this done."
He also said he does not believe it would be unrealistic for DHS to define a standard policy for fusion center privacy and civil liberties plans.
DHS spokesman Bobby Whithorne said DHS is working with fusion centers to meet the privacy requirements as quickly as possible.
"Over the past several years, federal, state, and local officials have worked tirelessly to ensure that robust privacy, civil rights, and civil liberties protections are integrated into fusion center policies," he said.
The ACLU views the funding restriction by DHS as a good start, but believes more needs to be done.
"There is still no formal mechanism to oversee the fusion centers to ensure they are complying with these privacy policies, much less with other laws and regulations governing how law enforcement intelligence operations collect and handle personally-identifiable information," German said.
One homeland response force unit will be based in each of the 10 Federal Emergency Management Agency regions. Eight more units will be established in fiscal year 2012, Defense Department and National Guard Bureau officials said here today. The units are regional forces that will cross state lines when needed. The forces are part of a larger reorganization of the Defense Department's domestic consequence management enterprise recommended in the 2010 Quadrennial Defense Review. This reorganization will ensure DoD has a robust ability to respond rapidly to domestic CBRNE incidents while recognizing the primary role that the governors play in controlling the response to incidents that occur in their states, Guard officials said. [Source]
The 10 Federal Regions:
Region 1 - Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island and Vermont
Region 2 - New Jersey, New York, the territory of Puerto Rico, and the U.S. Virgin Islands
Region 3 - Delaware, Maryland, Pennsylvania, Virginia, West Virginia and the District of Columbia
Region 4 - Alabama, Florida, Georgia, Kentucky, Mississippi, N. Carolina, S. Carolina and Tennessee Region 5 - Illinois, Indiana, Michigan, Minnesota, Ohio and Wisconsin
Region 6 - Arkansas, Louisiana, New Mexico, Oklahoma and Texas
Region 7 - Iowa, Kansas, Missouri and Nebraska
Region 8 - Colorado, Montana, North Dakota, South Dakota, Utah and Wyoming
Region 9 - Arizona, California, Hawaii, Nevada, and the territories of Guam and American Samoa
Homeland Response Forces are descending upon Missouri and nine other states,where National Guard units will be the face of Federal power in the regions in the event of a terrorist attack or disaster.
The Sedalia Democrat reports that, along with Missouri, the state where the report was written, Massachusetts, New York, Pennsylvania, Georgia, Texas, Utah and California will also host the National Guard Homeland Response Forces in the name of fighting terrorism.A unit will be placed within each of the regions established by FEMA, effectively implementing Federal powers at the state level premptively.
The U.S. Department of Defense announced Monday that Missouri will be one of 10 states to host National Guard Homeland Response Force units to help coordinate federal response to a terrorist attack.
According to the DoD announcement, the move came about following the 2010 Quadrennial Defense Review — a congressionally mandated report put together every four years that highlights changes and challenges in national defense strategy. The 2010 report calls for improved coordination with civilian officials and providing resources for large-scale emergency response.
Other states that have announced participation in the program include Ohio.
This roll-out of National Guard is not new, but is being phased in at an accelerated pace. The publicly-presented mandate for these National Guard troops continues to revolve around the “disasters” and “terrorism” theme. However, the RAND Corp., an authoritative think tank that has proven close to the political agendas actually being implemented, has prepared the nation for riots within the United States and control of widespread domestic unrest. Their 2009 report “A Stability Police Force for the United States” [PDF] proposes a “hybrid” military/law enforcement unit that would respond to disasters, but effectively act as a Federally-controlled policing force implemented within the bounds of States under the guise of controlling domestic riots, preparing for terrorism and even training for overseas deployment.
“The USMS [U.S. Marshalls Service] hybrid option … provides an important nondeployed mission for the force: augmenting state and local agencies, many of which currently suffer from severe personnel shortages.”
“Furthermore, the USMS has the broadest law enforcement mandate of any U.S. law enforcement agency…. [This model] provides significant domestic policing and homeland security benefits by providing thousands of additional police officers across the United States.”
It is clear that while these events seemingly take place independently, and trickle out of the news without alarm, it is part of a larger plan to implement National Guard in duties never meant for them to undertake across the country, functioning, in essence, as another layer of “authority” over the states and inviduals, and taking power under the pretense of national disaster, terror attack, biological or chemical warfare, the drug war or general domestic unrest.
The U.S. Department of Defense announced Monday that Missouri will be one of 10 states to host National Guard Homeland Response Force units to help coordinate federal response to a terrorist attack.
The Defense Department will place one unit in each of the 10 Federal Emergency Management Agency regions. Missouri is located in Region VII, which administers FEMA programs and coordinates federal disaster response in Missouri, Iowa, Kansas and Nebraska.
The units will include about 570 personnel composed of chemical, biological, radiological, nuclear and high-yield explosive response specialists, as well as command and control and security forces.
According to a news release from Rep Ike Skelton’s (D-Mo.) office, the Missouri Homeland Response Force will be established in Fiscal Year 2012. The units will be ready to respond within six to 12 hours of an event, bringing medical, search and extraction, decontamination, security, and command and control capabilities to bear in a regional response.
“I am very pleased Missouri will host a National Guard Homeland Response Force. Keeping Americans safe is our number one priority, and this new Homeland Response Force is part of DoD’s efforts to improve emergency response,” Skelton said.
According to the DoD announcement, the move came about following the 2010 Quadrennial Defense Review — a congressionally mandated report put together every four years that highlights changes and challenges in national defense strategy.The 2010 report calls for improved coordination with civilian officials and providing resources for large-scale emergency response.
Gov. Jay Nixon applauded the move in a statement released on Monday afternoon.
Nixon said the move “will create as many as 90 new full-time National Guard positions under the leadership of Adjutant General Stephen L. Danner, and reaffirms our state’s commitment to supporting and encouraging the United States military here at home.”
Scott Holste, a Nixon spokesman, said officials were still reviewing the best community to base the new unit in. The new units should be established between September 2011 and October 2012.
The NYPD has begun to implement iris scanners to create a bio-metric database of criminal suspects as they are processed through central booking. NYPD says this new identification program is a fail-safe measure to prevent escapes as suspects move through the court system and that this technology is in response to two suspects escaping police custody by impersonating lesser offenders.
Jeff Carter, CDO of Global Rainmakers Inc. a leader in the biometrics field says,
“In the future, whether it’s entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris. Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years.”
Global Rainmakers Inc. has partnered with the city of Leon, Mexico to build “the most secure city in the world” by installing iris scanners. The eye scanners will be implemented in law enforcement facilities, security check-points, police stations, detention areas, jails and prisons, and will eventually make their way into mass transit, medical centers, banks and other public and private locations will also join the program.
Fast Company reports that the city is creating a database of irises. Criminals will automatically be enrolled, their irises scanned once convicted. Law-abiding citizens will have the option to opt-in. When these residents catch a train or bus, or take out money from an ATM, they will scan their irises, rather than swiping a metro or bank card. Police officers will monitor these scans and track the movements of watch-listed individuals.
Back in the U.S. at a Border Patrol station in McAllen, Texas the Department of Homeland Security beta tested iris scanners and in one Missouri county, the sheriff’s office is using an Iris scanner purchased with U.S. Department of Justice funds. Unknown by most, the technology is reportedly already being used by law enforcement in 40 states throughout the country.
There is even an app for that. B12 Technologies has equipped police with iPhones armed with facial recognition software linked to fusion center databases.
Amusement parks like Disney World and Sesame place have implemented biometric ticketing as well.How long before under the auspice of anti-terror legislation the federal government requires these corporations to turn over their customers biometric data? Even the controversial “naked body scanners” store biometric data as has been revealed by Freedom of Information (FOIA) Act Requests, contrary to what the TSA has been telling the main stream media.
The iris scanners have also been used in airports. The TSA will allow you to skip to the head of the line if you submit to being included in a biometric database. It all comes in the name of convenience. Trade your privacy to save a few minutes on line at the airport amusement park.
The NYPD program is being paid for by a grant from the Department of Homeland Security. The NYPD already shares its database information with DHS through its NYPD Intelligence Division, which is actually a known “fusion center.” These fusion centers act as hubs of information, merging databases from the NYPD, DHS, Motor Vehicle and many other sources to create a searchable catalog of the entire population.
There are over 70 fusion centers in the United States according to Catherine Bleish founder of Operation Defuse whose goal is to create a rapport between civil liberty groups and the fusion centers that will “defuse” the conflict of security and rights violations.
“That’s not our intention here, but it has potential,” Police Commissioner Ray Kelly said in reference to using the iris scanners for counter terrorism purposes.
“The NYPD can now photograph the irises of suspects arrested for any reason and they implemented this without any legislative oversight or public discourse. There are also no reports on how authorities plan to protect this collected biometric data from misuse.” said David Perecman a civil liberties attorney in New York.
That is probably because the NYPD Intelligence division has no plans to protect this information from being disseminated through the NY fusion centers allowing access to any law enforcement agency in the network.
“This type of data collecting is not authorized by any New York statute. Collecting fingerprints is specifically allowed. DNA evidence has had more legislative debate and its usage is only limited to certain types of cases.” said Perecman.
This information dovetails with another recent controversy over “stop and frisk” databases. Ray Kelly and Mayor Bloomberg pushed to keep the recently banned NYPD policy to keep a database of New Yorkers who were stopped and frisked but not found guilty of any violation. You read that correctly. Mayor Bloomberg wanted to keep a list of innocent people who the NYPD stopped and frisked with no probable cause in a direct violation of their Constitutional rights. Incidentally only 6 percent of those random stop and frisks lead to an arrest, the conviction rates were not readily available. That means that more than 94% of people in that database are innocent.
The “250” List as it is referred to because of the UF-250 form that officers use to file stop-and-frisk reports has over 3 million names on it. Eighty seven percent of those stopped were black or Latino.
Governor Paterson signed into law a ban on this policy, although that only stops the NYPD from keeping their names in an electronic database. The NYPD is still keeping a paper record of these stops even if no evidence of a crime has been found and no arrest made. The NYPD continues to violate the constitutional rights of New Yorkers randomly stopping people for reasons as innocuous as spitting on the ground or dropping a cigarette butt. It should also be noted that the Mayor Bloomberg has been lobbying for British style video surveillance in NYC. Britain has one CCTV camera for every 14 citizens.
So where do we see all of this going? If Mayor Bloomberg and Commissioner Ray Kelley get there way Police officers will be stopping, frisking and taking retinal scans of millions of innocent New Yorkers then data sharing with the Federal government, Homeland Security and other law enforcement agencies in violation of the U.S. Constitution and Bill of Rights.
On November 1, boarding an aircraft in the United States will become more intrusive. That’s when the Department of Homeland Security’s Transportation Security Administration will begin enforcing something called “Secure Flight.”
“100 percent of passengers traveling within the United States and its territories are now being checked against terrorist watchlists through the Transportation Security Administration’s (TSA) Secure Flight program,” as recommended by the 9/11 white wash commission.
Under the program, destined to be a bureaucratic nightmare, TSA goons wearing blue latex gloves will prescreen a passenger’s name, date of birth, and gender against government watchlists for domestic and international flights, according to a TSA press release.
“Individuals found to match watchlist parameters will be subjected to secondary screening, a law enforcement interview or prohibition from boarding an aircraft, depending on the specific case.”
If you think only Muslims and shady characters from Yemen or Pakistan will be double checked, think again. Recall the nightmare experienced by Jan Adams and Rebecca Gordon, two peace activists who were detained in San Francisco in September, 2002, a couple weeks after the first anniversary of the day we were told cave-dwelling Muslims made NORAD stand down. The pair were searched and interrogated after the TSA claimed their names resembled “those of suspected criminals or terrorists,” the San Francisco Chronicle reported son September 27, 2010.
“One detainment forced a group of 20 Wisconsin anti-war activists to miss their flight, delaying their trip to meet with congressional representatives by a day. That case and others are raising questions about the criteria federal authorities use to place people on the list — and whether people who exercise their constitutional right to dissent are being lumped together with terrorists,” the newspaper also reported.
Meanwhile, supposed terrorists are allowed to board planes, for instance Umar Farouk Abdulmutallab, the fizzle pants non-bomber. It was no secret Abdulmutallab had “multiple communications” with Islamic extremists in Londonistan, the home base of MI6 groomed patsies, dupes, and mental deficeints.
Abdulmutallab was also allowed to get a visa, just like Sheikh Omar Abdul-Rahman, the blind Egyptian cleric who was on a terrorist watch list at the time and would later as a star patsy be convicted in the first WTC bombing case. In 2006, investigative reporters discovered that the CIA and the Defense Intelligence Agency specialized in deliberately keeping some suspected terrorists off the US international no-fly list. In order to make sure its dupes and patsies are allowed to travel unrestricted, the CIA has operatives inside the Federal Air Marshal Service.
It is not a coincidence the absurdly over-hyped fizzle pants non-bombing was staged on Christmas day over Detroit as Congress was talking about reforming the Constitution nullifying Patriot Act. Moreover, in the months following the orchestrated event, the government’s no-fly list doubled, from about 3,400 people to about 6,000 people, a senior intelligence official told USA Today in March.
The TSA also used the Times Square non-bombing to tweak its no-fly list procedures.
“The Transportation Security Administration has implemented a new rule requiring airlines to check the no-fly list within two hours after being notified of a special update,” Fox News reported after Faisal Shahzad’s cobbled together barbeque canister bomb failed to explode.
The Secure Flight program was not designed to prevent terrorists from boarding planes. It will be implemented next month as part of an effort to expand the government control grid and get commuters acclimated to submitting to absurd mandates that are obviously unconstitutional.
As Paul Joseph Watson noted earlier today, the government is moving forward in its efforts to impose its police state control and submission grid on the American people. It has now moved its naked body scanner technology from airports to the streets and highways of America.
“Body and vehicle scanners are just one tool authorities plan to implement on a widespread basis as part of our deepening decline into a hi-tech militarized police state,” writes Watson. “The implementation of ‘Checkpoint USA’, where citizens are routinely stopped, searched and radiated by federal VIPER teams is further evidence of how America is crumbling into a Soviet-style police state where the presumption of innocent until proven guilty is abolished and the 4th amendment eviscerated.”
Secure Flight is yet another step in that direction.It may appear innocuous, but is in fact designed to get citizens accustomed to government officials micromanaging every aspect of their daily lives, be it at the airport or at the local mall.
The government is using heightened security concerns arising from the manufactured 'war on terror' and illegal immigration to increase interest and research into biometric technology, with the end goal being mandatory electronic biometric national IDs [the 'war on terror' has destroyed America more in the last ten years than any attack on home soil]. "The events of September 11, 2001, were the trigger for a flurry of developments in the biometrics field. The USA Patriot Act, passed in October 2001, introduced measures requiring all foreign visitors to provide machine-readable, biometric travel documents, and put into place an entry-exit system to monitor movements to and from the country. This legislation prompted a number of other countries to adapt their travel documents accordingly and to set up biometric identity checks to ensure border security" [Rebekah Thomas, Biometrics, Migrants, and Human Rights, Global Commission on International Migration, Migration Policy Institute, March 2005].
There are two basic types of biometric categories which can be used to uniquely identify individuals in an almost foolproof manner. Those two ways are physiological and behavioral. Some physiological methods of biometric identification are familiar and have been in use already for many years. Fingerprints are the best and perhaps oldest example, but today with computer programs biometric analysis has come to include face recognition, DNA, palm print, iris recognition and hand geometry. In voice recognition, it is the way the person speaks and not strictly his voice, so voice recognition is placed in the behavioral biometric category rather than the physiological (behavioral biometric parameters include typing rhythm and the way a person walks [their gait]). - ACSysBiometrics.com, June 6, 2011
The NYPD has begun to implement iris scanners to create a bio-metric database of criminal suspects as they are processed through central booking. NYPD says this new identification program is a fail-safe measure to prevent escapes as suspects move through the court system and that this technology is in response to two suspects escaping police custody by impersonating lesser offenders.
Jeff Carter, CDO of Global Rainmakers Inc. a leader in the biometrics field says,
“In the future, whether it’s entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris. Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years.”
Global Rainmakers Inc. has partnered with the city of Leon, Mexico to build “the most secure city in the world” by installing iris scanners. The eye scanners will be implemented in law enforcement facilities, security check-points, police stations, detention areas, jails and prisons, and will eventually make their way into mass transit, medical centers, banks and other public and private locations will also join the program.
Fast Company reports that the city is creating a database of irises. Criminals will automatically be enrolled, their irises scanned once convicted. Law-abiding citizens will have the option to opt-in. When these residents catch a train or bus, or take out money from an ATM, they will scan their irises, rather than swiping a metro or bank card. Police officers will monitor these scans and track the movements of watch-listed individuals.
Back in the U.S. at a Border Patrol station in McAllen, Texas the Department of Homeland Security beta tested iris scanners and in one Missouri county, the sheriff’s office is using an Iris scanner purchased with U.S. Department of Justice funds. Unknown by most, the technology is reportedly already being used by law enforcement in 40 states throughout the country.
There is even an app for that. B12 Technologies has equipped police with iPhones armed with facial recognition software linked to fusion center databases.
Amusement parks like Disney World and Sesame place have implemented biometric ticketing as well.How long before under the auspice of anti-terror legislation the federal government requires these corporations to turn over their customers biometric data? Even the controversial “naked body scanners” store biometric data as has been revealed by Freedom of Information (FOIA) Act Requests, contrary to what the TSA has been telling the main stream media.
The iris scanners have also been used in airports. The TSA will allow you to skip to the head of the line if you submit to being included in a biometric database. It all comes in the name of convenience. Trade your privacy to save a few minutes on line at the airport amusement park.
The NYPD program is being paid for by a grant from the Department of Homeland Security. The NYPD already shares its database information with DHS through its NYPD Intelligence Division, which is actually a known “fusion center.” These fusion centers act as hubs of information, merging databases from the NYPD, DHS, Motor Vehicle and many other sources to create a searchable catalog of the entire population.
There are over 70 fusion centers in the United States according to Catherine Bleish founder of Operation Defuse whose goal is to create a rapport between civil liberty groups and the fusion centers that will “defuse” the conflict of security and rights violations.
“That’s not our intention here, but it has potential,” Police Commissioner Ray Kelly said in reference to using the iris scanners for counter terrorism purposes.
“The NYPD can now photograph the irises of suspects arrested for any reason and they implemented this without any legislative oversight or public discourse. There are also no reports on how authorities plan to protect this collected biometric data from misuse.” said David Perecman a civil liberties attorney in New York.
That is probably because the NYPD Intelligence division has no plans to protect this information from being disseminated through the NY fusion centers allowing access to any law enforcement agency in the network.
“This type of data collecting is not authorized by any New York statute. Collecting fingerprints is specifically allowed. DNA evidence has had more legislative debate and its usage is only limited to certain types of cases.” said Perecman.
This information dovetails with another recent controversy over “stop and frisk” databases. Ray Kelly and Mayor Bloomberg pushed to keep the recently banned NYPD policy to keep a database of New Yorkers who were stopped and frisked but not found guilty of any violation. You read that correctly. Mayor Bloomberg wanted to keep a list of innocent people who the NYPD stopped and frisked with no probable cause in a direct violation of their Constitutional rights. Incidentally only 6 percent of those random stop and frisks lead to an arrest, the conviction rates were not readily available. That means that more than 94% of people in that database are innocent.
The “250” List as it is referred to because of the UF-250 form that officers use to file stop-and-frisk reports has over 3 million names on it. Eighty seven percent of those stopped were black or Latino.
Governor Paterson signed into law a ban on this policy, although that only stops the NYPD from keeping their names in an electronic database. The NYPD is still keeping a paper record of these stops even if no evidence of a crime has been found and no arrest made. The NYPD continues to violate the constitutional rights of New Yorkers randomly stopping people for reasons as innocuous as spitting on the ground or dropping a cigarette butt. It should also be noted that the Mayor Bloomberg has been lobbying for British style video surveillance in NYC. Britain has one CCTV camera for every 14 citizens.
So where do we see all of this going? If Mayor Bloomberg and Commissioner Ray Kelley get there way Police officers will be stopping, frisking and taking retinal scans of millions of innocent New Yorkers then data sharing with the Federal government, Homeland Security and other law enforcement agencies in violation of the U.S. Constitution and Bill of Rights.
Obama gives thumbs-up to immigration bill outline, says legislation is next step
The Associated Press March 18, 2010
President Barack Obama, facing criticism from advocates of immigration reform, pledged Thursday "to do everything in my power" to get immigration legislation moving in Congress this year. Obama said work on an immigration bill should move forward based on an outline released Thursday by Sens. Chuck Schumer, D-N.Y., and Lindsey Graham, R-S.C.
"A critical next step will be to translate their framework into a legislative proposal, and for Congress to act at the earliest possible opportunity," Obama said.
The outline calls for illegal immigrants to admit they broke the law, pay a fine and back taxes, and perform community service if they want to get on a pathway to legal status. They would also be required to pass background checks and be proficient in English ...
Obama met Thursday at the White House with Reps. Luis Gutierrez, D-Ill., and Solomon Ortiz, D-Texas, the sponsors of a House immigration bill. Gutierrez said later he agreed to vote for Obama's signature domestic bill, health care reform, only if an immigration bill advanced quickly and with a presidential imprimatur.The Congressional Hispanic Caucus also endorsed the health care bill.
"I'm committed to voting for this health care bill on that basis," Gutierrez said. "I want the president to be in lockstep with us, which I believe he was during the campaign."
White House spokesman Reid Cherlin said there was no quid pro quo involved in the White House's dealings with Gutierrez.
Other parts of the Schumer-Graham outline include:
· Giving legal permanent residence to people who graduate with doctoral or master's degrees from U.S. universities.
· Adopting zero tolerance for illegal immigrants who commit crimes and expanding enforcement of immigration laws.
· Creating a flexible legal immigration system that brings in more low-skilled workers when jobs are available and fewer in a recession.
· Requiring all U.S. workers — citizens and legal immigrants — to get fraud-proof Social Security cards with a biometric identifier.
Under a potentially controversial plan still taking shape in the Senate, all legal U.S. workers, including citizens and immigrants, would be issued an ID card with embedded information.
The Wall Street Journal March 9, 2010
Lawmakers working to craft a new comprehensive immigration bill have settled on a way to prevent employers from hiring illegal immigrants: a national biometric identification card (see next story) which all American workers would eventually be required to obtain.
Under the potentially controversial plan still taking shape in the Senate, all legal U.S. workers, including citizens and immigrants, would be issued an ID card with embedded information, such as fingerprints, to tie the card to the worker.
The ID card plan is one of several steps advocates of an immigration overhaul are taking to address concerns that have defeated similar bills in the past.
The uphill effort to pass a bill is being led by Sens. Chuck Schumer (D., N.Y.) and Lindsey Graham (R., S.C.), who plan to meet with President Barack Obama as soon as this week to update him on their work. An administration official said the White House had no position on the biometric card.
"It's the nub of solving the immigration dilemma politically speaking," Mr. Schumer said in an interview.
The card, he said, would directly answer concerns that after legislation is signed, another wave of illegal immigrants would arrive.
"If you say they can't get a job when they come here, you'll stop it."
The biggest objections to the biometric cards may come from privacy advocates, who fear they would become de facto national ID cards that enable the government to track citizens.
"It is fundamentally a massive invasion of people's privacy," said Chris Calabrese, legislative counsel for the American Civil Liberties Union. "We're not only talking about fingerprinting every American, treating ordinary Americans like criminals in order to work. We're also talking about a card that would quickly spread from work to voting to travel to pretty much every aspect of American life that requires identification."
Mr. Graham says he respects those concerns but disagrees.
"We've all got Social Security cards," he said. "They're just easily tampered with. Make them tamper-proof. That's all I'm saying."
U.S. employers now have the option of using an online system called E-Verify to check whether potential employees are in the U.S. legally. Many Republicans have pressed to make the system mandatory. But others, including Mr. Schumer, complain that the existing system is ineffective.
Last year, White House aides said they expected to push immigration legislation in 2010. But with health care and unemployment dominating his attention, the president has given little indication the issue is a priority.
Rather, Mr. Obama has said he wanted to see bipartisan support in Congress first. So far, Mr. Graham is the only Republican to voice interest publicly, and he wants at least one other GOP co-sponsor to launch the effort.
An immigration overhaul has long proven a complicated political task. The Latino community is pressing for action and will be angry if it is put off again. But many Americans oppose any measure that resembles amnesty for people who came here illegally.
Most European countries require citizens and foreigners to carry ID cards.The U.K. had been a holdout, but in the early 2000s it considered national cards as a way to stop identify fraud, protect against terrorism and help stop illegal foreign workers. Amid worries about the cost and complaints that the cards infringe on personal privacy, the government said it would make them voluntary for British citizens. They are required for foreign workers and students, and so far about 130,000 cards have been issued.
Mr. Schumer first suggested a biometric-based employer-verification system last summer. Since then, the idea has gained currency and is now a centerpiece of the legislation being developed, aides said.
A person familiar with the legislative planning said the biometric data would likely be either fingerprints or a scan of the veins in the top of the hand. It would be required of all workers, including teenagers, but would be phased in, with current workers needing to obtain the card only when they next changed jobs, the person said.
The card requirement also would be phased in among employers, beginning with industries that typically rely on illegal-immigrant labor.
The U.S. Chamber of Commerce doesn't have a position on the proposal, but it is concerned that employers would find it expensive and complicated to properly check the biometrics.
Mr. Schumer said employers would be able to buy a scanner to check the IDs for as much as $800.Small employers, he said, could take their applicants to a government office to like the Department of Motor Vehicles and have their hands scanned there.
Report Format: PDF Date Published: 25-Sep-08 Product Type: Premium Report Product Code: dmtc2201 Table of Contents: View Table of Contents (see below)
Overview
Introduction
Biometrics has become widely used by governments across the globe, most prominently in passports but also in various other situations. This has created numerous opportunities for vendors of all kinds. However, while there are myriad opportunities available, it is important for vendors to maintain an element of caution as there are a number of potential hurdles.
Scope
· Biometrics have multiple ways in which they can be used in government · Public buy-in is crucial to the success of any biometric's implementation · Choosing the right biometric is a minefield · Operational processes need to be right for biometrics to be a success
Report Highlights
Biometrics are becoming increasingly prominent within governments across the world. This report assesses the trends that are occurring and how vendors can make a success of the opportunities available.
Reasons to Purchase
· Understand the challenges facing governments and how biometrics can be used effectively · Learn what will make vendors competitive within the market
Overview Catalyst Summary Key Messages · Biometrics have multiple ways in which they can be used in government · Public buy-in is crucial to the success of any biometric's implementation · Choosing the right biometric is a minefield · Operational processes need to be right for biometrics to be a success
Table of Contents
MARKET OPPORTUNITY · Biometrics can be used in multiple ways in government · Governments are increasingly installing biometrics in passports and ID cards · Biometrics are seen as a way to manage the identity of government employees · The intelligence community is finding an increasing number of uses for biometrics · Using biometrics, especially in developing countries, enables effective registration · Governments now view biometrics as an intricate part of security and identity management · The enthusiasm of the US government for biometrics has helped to drive its growth globally · HSPD-12 has kick-started the domestic US biometrics industry in government · Biometrics in ePassports are now seen as essential by nearly all governments globally · Outside government there are a number of inhibitors to the adoption of biometrics · A significant proportion of the public are exerting pressure on government to refrain from using biometrics · Governments to date have a poor record of holding onto data · The number of false positives and false negatives is falling but is still of concern · How easily biometrics codes can be cracked is still a significant worry Most governments across the globe are looking at biometrics, but there are differences · North America · Europe · Rest of the world Technology Evolution The different types of biometrics have advantages and disadvantages - Fingerprints - Iris - Voice - Face · A strategic approach is needed to overcome any technological difficulties of biometrics · The use of multiple biometrics are likely to shore up any flaws · Biometrics are likely to be most successful used in conjunction with other technologies · The development of standards in all types of biometrics is vital · Customer Impact: Having Realistic expectations of BIOMetrics · Governments must not forget that biometrics are not going to prevent security failures · Biometrics are not the 'holy grail' solution to preventing identity fraud and security breaches · Governments must not raise expectations of biometrics · Governments must focus on their sales strategy of ID cards to the public · The public must see a real benefit in order for them to come round to the idea of biometrics · Vendors have a self-interest in ensuring governments have smooth operational processes · Often the problems that can occur with biometric projects are not linked to the technology Competitive Landscape · HP · LG · Merkatum · Unisys Go to Market · Vendors need to show conservatism towards some large scale investments · Imagination is required by vendors to help governments make the most of biometrics · Governments need help selling biometrics to the public · There is a need for government and vendors to work together on operational processes APPENDIX List of Figures Figure 1: Assessment of negatives and positives of different types of biometrics Figure 2: SWOT analysis of Bio-key Figure 3: SWOT analysis of Hewlett-Packard Company Figure 4: SWOT analysis of LG Group Figure 2: SWOT analysis of Merkatum Figure 6: SWOT analysis of Unisys
AxXiom for Liberty - There is good news and bad news on the REAL ID front . . .
The good news: 46 states were not in compliance with REAL ID by December 31, forcing DHS Secretary Napolitano to extend the deadline to May, 2011 – and there’s no sign the states have any intention of complying with it by then.
The bad news: the Senate could pass REAL ID’s equally-bad replacement, the PASS Act, this month.
Please tell Congress to oppose the PASS Act and instead repeal the REAL ID Act with NO replacement.
You may copy or borrow from the following letter . . .
The refusal of states to comply with REAL ID has led to its virtual nullification. This rebellion was one of the few bright spots of the past decade. Indeed, I hope the states get into the habit of opposing federal intrusion.
However, I realize the states opposed REAL ID primarily because of costs and technological problems. While these are valid concerns, the main reason I oppose REAL ID is because I value my privacy and freedom.
I therefore ask that you ignore the requests of governors and other state politicians to replace REAL ID with the S. 1261, the PASS Act. While the PASS Act does give the states more flexibility and financial aid, it still fails to guard my privacy or keep me safe. Here are just some of PASS ID’s problems (from http://www.realnightmare.org/about/114/):
It requires innocent Americans to provide a broad array of identity documents, snarling them in long lines and bureaucratic red tape.
By requiring storage of identity documents like birth certificates in a central location for even longer periods than Real ID, PASS ID will cause identity theft.
PASS ID permits “enhanced drivers’ licenses,” which contain long-range radio frequency identification (RFID) chips, which can be used for tracking by anyone with a reader.
If passed, the PASS ID will likely be expanded to serve other purposes, like riding a bus, purchasing a gun, or registering to vote.
The PASS Act will impose new burdens on the American people and actually make us less safe.
I therefore insist that you oppose the PASS Act. I also demand that you repeal REAL ID and replace it with nothing.
By Ethan Jacobs, J.D., Old-Thinker News November 16, 2010
Introduction
Governments and large corporations are encouraging individuals to identify themselves using biometric data as opposed to traditional card forms of identification, such as drivers’ licenses and membership cards. The federal and local governments also have plans to collect DNA samples from people arrested for but not convicted of crimes. The public must take immediate action to stop this assault on privacy rights and prevent the unprecedented implementation of global technocratic tyranny.
Cardless Check-in at Health Clubs
24 Hour Fitness, the world’s largest privately owned and operated fitness center chain (by membership) is in the process of implementing its Orwellian “cardless check-in” program:
24 Hour Fitness is excited to introduce Cardless Check-In! Cardless Check-In allows members to access our health clubs without a membership card. No more fumbling through you gym bag or purse… just scan your finger, enter your 10-digit check-in code and you’re on your way.[1] …We’ve partnered with MorphoTrak, a leader in the biometric industry, to develop this convenient new way to check in to our clubs. By scanning your finger, we chart the distance between a few distinct points that are unique to you and come up with an identifying number based on those distances.[2]
24 Hour Fitness has approximately 3 million members, 425 clubs, and 20,000 employees.[3] That equals approximately one percent of the U.S. population (300 million people) that are now being encouraged to produce biometric identification by one health club company alone. It should be noted that for now, members may choose not to enroll, but will need to bring their driver’s license or another government or school issued ID each time they check–in.
Importantly, the cardless check-in program has obvious flaws. First, typing in the ten digit code and performing the finger scan takes about twelve times longer than simply scanning the barcode on a membership card. Second, the program weakens human bonding, as now it is no longer necessary to speak to the employee that previously scanned membership cards, assuming their employment has not yet been terminated. Third, a conflict of interest arises if law enforcement requests the biometric data of a member from the health club. Should the health club provide the data or protect the privacy of its member?
It remains to be seen how many 24 Hour Fitness members will voluntarily forfeit their biometric data by leaving their mark on the unblinking scanner. Hopefully the majority will understand that “your fingerprint is a very sensitive piece of your identity. It’s not something you can replace if it’s compromised.”[4]
Global Biometric Plan
Whether intended or not, the 24 Hour Fitness biometric check-in program and others like it assist the Department of Homeland Security in incrementally conditioning the public to accept its Global Biometric Plan.[5] Said Plan will further erode personal privacy rights while reducing individuals to a new status of dehumanized biological chattels.
Government Gathering More Biometric and Biological Data
Providing Biometric date, including a fingerprint scan, is an act of submission that is being required by government and private venues more and more. To obtain a driver’s license, you must submit to a thumb scan. If you refuse, you will not be issued a license, your right to travel will be severely limited, and you will lack a common form of personal identification.[6] In California, a thumb scan is required to obtain a real estate/mortgage broker’s license.[7] Beginning February 1, 2011, the Golden State will also require fingerprints to purchase ammunition, a substantial infringement on privacy and the right to bear arms.[8] International travelers that want to skip lines at customs are encouraged to enroll in the Global Entry Program. After landing, find the Global Entry kiosk, “scan your passport and fingerprints,” and be on your way.[9]
Amusement parks are also requiring biometric identification. To utilize an annual pass at SeaWorld, one must participate in the Touch-n-Go finger scan ID verification system.[10] Walt Disney World has also employed a biometric finger scanner at their theme parks.[11]
Blood Sample Gathering
Beyond gathering biometric data on citizens, governments have also been stealing infants’ blood samples without parental consent.[12] Of course, this is done under the guise of protecting babies from diseases:
Newborn babies in the United States are routinely screened for a panel of genetic diseases. Since the testing is mandated by the government, it’s often done without the parents’ consent… Now, states mandate that newborns be tested for anywhere between 28 and 54 different conditions, and the DNA samples are stored in state labs for anywhere from three months to indefinitely, depending on the state.[13]
During March of this year, the U.S. House of representatives approved the Katie Sepich Enhanced DNA Collection Act of 2010 (H.R. 4614) by a vote of 357 to 32.[14] If approved by the Senate, “millions of Americans arrested for but not convicted of crimes will likely have their DNA forcibly extracted and added to a national database.”[15] Obama has also endorsed forcing people arrested to submit DNA to a national database.”[16]
In Orange County, California, the District Attorney’s office has a policy of dropping charges against low-level offenders who agree to submit DNA samples.[17] During 2009, the office nearly quadrupled its DNA database in nine months, with about half of the 15,000 samples being obtained from cases pertaining to minor offences. The Orange County DNA database is separate from the Department of Justice database and those that consent to providing samples commonly do so without legal counsel.[18]
Why Are Governments Obtaining DNA Samples?
Why are governments so interested in obtaining DNA samples from their citizens and what is the long-term agenda? Will the DNA collected be used in experiments or research? This is a vital issue given the fact that “scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases.”[19] We should also recall that globalists sponsored the eugenics polices (eliminating the gene pools of those deemed unfit by the state) in the United States that inspired Hitler’s Nazis:
Hitler and his henchmen victimized an entire continent and exterminated millions in his quest for a so-called Master Race. But the concept of a white, blond-haired, blue-eyed master Nordic race didn’t originate with Hitler. The idea was created in the United States, and cultivated in California, decades before Hitler came to power…California eugenicists played an important, although little-known, role in the American eugenics movement’s campaign for ethnic cleansing. Eugenics would have been so much bizarre parlor talk had it not been for extensive financing by corporate philanthropies, specifically the Carnegie Institution, the Rockefeller Foundation and the Harriman railroad fortune… the main solution for eugenicists was the rapid expansion of forced segregation and sterilization, as well as more marriage restrictions. California led the nation, performing nearly all sterilization procedures with little or no due process. In its first 25 years of eugenics legislation, California sterilized 9,782 individuals, mostly women.[20]
In short, history clearly demonstrates that the global elite and governments they control cannot be trusted with the DNA of individuals.
Big Brother and Iris Scanners
In addition to taking our fingerprints and DNA, governments are partnering with private industry (fascism) so that iris scanners can make Leon, Mexico, the “most secure city in the world.” Jeff Carder, CDO of Global Rainmakers states:
“In the future, whether it’s entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris… Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years… If you’ve been convicted of a crime, in essence, this will act as a digital scarlet letter. If you’re a known shoplifter, for example, you won’t be able to go into a store without being flagged. For others, boarding a plane will be impossible….When you get masses of people opting-in, opting out does not help. Opting out actually puts more of a flag on you than just being part of the system. We believe everyone will opt-in.” [21]
In a follow-up interview, Carder explained:
So we’ve even worked with three-letter agencies on technology that can capture 30-plus feet away. In certain spaces, eventually, you’ll be able to have maybe one sensor the size of a dime, in the ceiling, and it would acquire all of our irises in motion, at a distance, hundreds—probably thousands, as computer power continues to increase—at a time.[22]
There is no intention of limiting the use of such technology to small towns in Mexico.
“The Homeland Security Department plans to test futuristic iris scan technology that stores digital images of people’s eyes in a database and is considered a quicker alternative to fingerprints.”[23] As Paul Joseph Watson notes, eventually “iris records will be held in a database and associated with credit cards and other routine aspects of every day life. The agenda is to replace pin numbers and presentation of photo ID, forcing Americans to submit to high-tech enslavement merely to conduct their day to day activities.”[24]
Airport Naked Body Scanners
The fraudulent War on Terror is being used to obliterate Fourth Amendment protections against unreasonable search and seizures. To pass through airport security, without probable cause or even reasonable suspicion of criminal activity, travelers now are required to submit to naked airport body scanners which virtually strip-search and radiate them.[25] Those that opt out of the scanners are groped, and fondled (assault and battery—offensive touching) by TSA thugs.[26] Now that travelers and travel industry unions are objecting to naked body scanners on grounds of perversion and radiation, Homeland Security is considering replacing them with body scanners that scan and store biometric data, which in the future could allow citizens to be constantly racked in real time.[27]
Take Action Now
Whether the assault on our privacy rights comes from government or the private sector, we must stand strong against it. Individuals must once again respect themselves enough to defend their privacy and constitutional rights.
Fortunately, much like the Allied Pilots Union[28] refusing to submit to radioactive naked body scanners, individuals now have an opportunity to opt-out and speak-out against biometric/DNA registries at health clubs, amusement parks, airports and other venues. Respectfully contact companies and government agencies that test these programs; let them know that you disapprove and that your biometric data will never become their property. People arrested for minor offenses must refuse to provide DNA samples.
We must resist and exercise peaceful non-compliance against this despotism, as other health clubs and establishments will likely adopt similar biometric identity programs if they think we will accept it.[29] Future generations are counting on us to defend their privacy rights, which can be summarized as the right to be left alone. Remember that courage is contagious; when a brave man or woman takes a stand, the spines of others are often stiffened.[30]
The US-VISIT program is the centerpiece of the U.S. government's efforts to establish identity management capability that supports border management and immigration systems to meet the demands of the 21st century. US-VISIT's innovative use of biometric technology has improved our nation's border security to a level that did not exist before.
These services help prevent identity fraud and deprive criminals and immigration violators of the ability to cross our borders. Based on biometrics alone, US-VISIT has helped stop thousands of people who were ineligible to enter the United States.
Strengthening Security Through Biometric Identification
Five years ago, the U.S. immigration and border management system had disparate information systems that lacked coordination. Today, US-VISIT provides a single source for biometrics based information on criminals, immigration violators and known or suspected terrorists. No longer can someone give one name to U.S. Customs and Border Protection and a different name to U.S. Citizenship and Immigration Services without getting caught. Thanks to biometrics, we know who a person is and the facts of his or her immigration history.
Five years ago, the Department did not have timely and accurate information about people who violated our laws by staying in the country longer than they were supposed to. Today, US-VISIT provides hundreds of credible leads weekly to U.S. Immigration and Customs Enforcement, enabling them to better enforce our immigration laws.
For example, a person applied to enter the United States at the Otay Mesa Port of Entry in California. During the biometric check, the person's fingerprints matched those of someone on the US-VISIT watch list. Biometrics revealed that the person had multiple warrants, including a warrant for murder and obstruction of justice. Using biometrics authorities were able to stop this murderer, who had previously used 22 aliases and nine different dates of birth to avoid detection.
The use of biometrics is also deterring people who want to violate our laws from trying to enter the United States. Here is just one example: In 2006, the Coast Guard began using biometrics to identify illegal migrants interdicted at sea. Prosecutions of repeat offenders have increased dramatically, and illegal migration has dropped by 75 percent in the waters where the program is operating.
The Australian Government has announced it will invest $69 million over the next four years to introduce biometric date checks for Australian Visa applications. Biometric checks will be made to Australian visa applications being processed in 10 countries as part of a major strengthening of Australia’s border security.
Under the new biometric system, all people applying to Australian Immigration for a visa in any of the 10 designated countries will be required to lodge their application and submit fingerprints and facial images at a visa application centre.
Biometric information, which uses measurable biological characteristics to establish a unique identity for a person, will be recorded and cross-checked to confirm the true identity of visa applicants.
The biometric information will be able to be matched by the Australian Government with databases by Australia or any other participating international country, in a system that will be able to better identify terrorists, criminals and other people of concern.
Currently, Australia has biometric data-sharing agreements with the United Kingdom and Canada, and the United States and New Zealand will join the data-sharing arrangement this year. The Australian program is being undertaken in collaboration with the UK Border Agency, which has a similar scheme already operating.
Animetrics Inc., a face recognition biometric solution provider, has been granted patents from the United States Patent and Trademark Office (USPTO). The patents entitled, “Facial Recognition System and Method”, “Generation of Image Database for Multifeatured Objects”, and “Viewpoint-Invariant Image Matching and Generation of 3D Models from 2D Imagery” are breakthrough technologies which are already revolutionizing the face biometric for use in security, surveillance, and computer vision.
“For the face biometric use in border control, in-the-field identification, and military operations our patents are ‘game changers’ and we have several more on the way”, said Paul Schuepp, President and CEO of Animetrics.
“US government tests by DARPA and NIST have shown that the face biometric for matching in non studio conditions where the face is not controlled and its appearance is compromised by pose and illumination show unacceptable performance. These patents cover Animetrics 2D-3D Facengine™ which enable biometric matching of the face in more difficult conditions than ever before. This opens up a wealth of opportunities and applications for us and for the market,” described Dr. Michael Miller, Chairman and Founder.
The technology covered by the patents specifically provide methods for (i) generation of 3D models from arbitrary numbers of uncalibrated photographs at any orientation and scale, and (ii) generating databases from 3D models for use in biometric systems for training or for recognition, and (iii) face recognition systems based on normalization using 3D models.
Animetrics has been a leader in facial biometric technologies since 2003. It is known for its 2D-3D face creation and Animetrics90™ face recognition products. The company is in the process of implementing a facial surveillance system for US Army. The 2D-3D facial creation technology is also available in Animetrics Forensica™ product line which is now being used by US government intelligence community and forensics in law enforcement.
Animetrics, Inc, developer of next generation 3D imaging technologies for facial biometric systems, today announced that they have launched FaceR™ Celebrity in the Apple App Store, the first of its planned FaceR™ applications for the consumer marketplace connecting mobile devices to Cloud based photographic stores. FaceR™ Celebrity Edition provides a simple and entertaining new way to use your iPhone among friends matching the iPhone user to their most similar celebrity. The elegant simplicity of the iPhone makes this application both easy to use and fun sharing the power of the iPhone amongst friends and family and is certain to be popular among social networkers.
“The launch of FaceR™ Celebrity is a great milestone for Animetrics, Inc,” said Paul Schuepp, CEO of Animetrics. “We are very pleased that our customers will be able to experience the power and value of the Animetrics 2D-3D facial biometrics technologies in such an entertaining and unique application. The FaceR™ series of products demonstrates Animetrics’ commitment to bringing next generation facial search technologies to the consumer marketplace.”
“FaceR Celebrity is an addictively entertaining application, that is also wonderful showcase for the Animetrics technology and platform” said Nate Tennant CEO of Kirk Communications, a Marketing and Social Media Agency based in Portsmouth, NH. “I am excited to see what Animetrics has in store for the future!”
Animetrics, Inc has been a leader in facial recognition biometric technologies since 2003 It is known for its 2D-3D patented face creation and face recognition technologies. The company is in the process of testing and delivering two additional consumer facing products in the next quarter, including its MobileID line of products for government and law enforcement use and its credentialing services for mediation of privilege and use based on the facial biometric. Currently the Animetrics facial recognition architecture supports both iPhone and Windows Mobile platforms.
FaceR™ Series:FaceR™ is a family of facial identification applications running on mobile devices that leverage the iPhone's unique capabilities and innovative user interface. FaceR™ on the iPhone is a native iPhone application using standard internet protocols to send facial imagery to the Animetrics Face Identity Management Web-Sevice (FIMS) for face biometric processing. FaceR™ has two primary functions: 1) as an interface to a biometrics identification systems for use by security, including law enforcement, military and private security; and 2) as an entertaining "biometric game" assessing a person's similarity to popular celebrities and famous people.
The Dubai affair has had its eyebrow-raising moments, like the Twitter accident (since un-tweeted) and the latest trends in spy wear. But it’s also re-raising concerns about the possible next phase in smart identification: biometrics.
Intelligence agencies in false mustaches could soon be outsmarted by systems using biometric information to provide categorically positive IDs.
Phony IDs are used by the underage crowd to acquire beer as well as in the perpetration of scams, espionage and terrorism. Israel says it has about 350,000 fakes floating around, costing the country the equivalent of hundreds of millions of dollars. Financial scams are expensive; terrorism costs lives. A few years ago, Israeli authorities started pushing for smart, un-fake-able IDs with foolproof information — and also a national biometric database.
A group called NO2BIO campaigned against the biometric-database bill; among other actions, they mooned cameras outside the house of then-Interior Minister Meir Sheetrit in the wee hours, showing privacy goes both ways.
Israel’s low-tech population database is already on the Web. But leaked biometrics such as facial features could allow anyone with a grudge and software (and maybe a gun) to pick out Israelis — average Joes and high-ranking officials — from a crowd in an airport or downtown rush hour anywhere in the world. It’s universal jurisdiction on speed.
Cogent will provide an Automated Fingerprint Identification System (AFIS) of the UK National Fingerprint Collection along with all services to provide a nationwide mobile biometric identification system available to all police forces in the UK. Cogent will provide a Framework Catalogue and an online ordering system for police forces to purchase a variety of biometric capture devices to suit a broad range of policing needs. The contract proposals were evaluated on the basis of 10,000 mobile devices being deployed throughout the period of the contract, but the actual number may be more or less.
In addition to the Mobile Identification AFIS and catalogue of Cogent and third party mobile devices, Cogent will provide services for device accreditation, device and user authentication, integration with existing mobile communications gateways, a Cogent national gateway and a full suite of service management provisions. The contract also includes options to expand the service for additional agencies and other capabilities.
In an effort to renovate a subsidized child-care program overwrought with fraud called Wisconsin Shares, Mark Honadel, a Republican from South Milwaukee, has announced plans to circulate a bill that would require child daycare providers in the state to utilize a biometric system to check children in and out, according to a Security Info Watch article.
The Bulgarian government has, as expected, approved on Wednesday a rise in the cost of new personal identity documents containing biometric data.
As of March 29, it is confirmed that new identity cards will cost BGN 18, a driving license fee will become BGN 25, and an international passport will be issued for BGN 40.
Biometric Signature ID (“BSI” – www.biosig-id.com) announces that its CEO, Jeff Maynard, will be a featured speaker at the 2010 eLearning conference in Ft. Worth Texas. Mr. Maynard is scheduled to speak on Monday February 22, 2010 at 11:30 a.m. on “Biometric Signatures for Student ID Identity Authentication and Results of pilot with University of Maryland University College.”
Law enforcement agencies in San Joaquin and Stanislaus counties this week became the latest in California to benefit from an initiative developed by the Departments of Justice (DOJ) and Homeland Security (DHS) that modernizes the process used to accurately identify and remove dangerous criminal aliens from the community.
The initiative, Secure Communities, is administered by U.S. Immigration and Customs Enforcement (ICE). Secure Communities enables ICE to determine whether an individual arrested by a participating state or local law enforcement agency is a dangerous criminal alien and take the appropriate action to remove the individual from the community.
The Secure Communities biometric identification technology is now accessible to the local law enforcement agencies in San Joaquin and Stanislaus counties that use electronic booking machines. Formerly as part of the booking process, local arrestees’ fingerprints were taken and checked for criminal history information against the DOJ biometric system maintained by the FBI. With the implementation of Secure Communities, that fingerprint information will now be simultaneously checked against both the FBI criminal history records and the biometrics-based immigration records maintained by the DHS.
If any fingerprints match those of someone in DHS’s biometric system, the new automated process notifies ICE, enabling the agency to take appropriate action to ensure dangerous criminal aliens are not released back into communities. Top priority is given to individuals who pose the greatest threat to public safety, such as those with prior convictions for major drug offenses, murder, rape, robbery, and kidnapping.
Biometric technology has been a mainstay of spy thriller for decades, but until recently, it has been a pretty alien technology in the real world. In the past few years, however, this technology has become popular in police stations, high-security buildings, financial institutions and even homes/offices.
In Uganda, according to Mr Andrew Mukiri, a sales and marketing manager Security Group, many security companies have realised the value of biometric technology and are readily replacing proximity technology with it.
“Unlike proximity technology, biometric technology is full proof. The person has to be there physically for it to operate,” he says.
Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible because biometrics measure a person’s unique physical or behavioural characteristics to recognise or authenticate their identity including; fingerprints, hand or palm geometry, retina, iris, and facial characteristics, signature, voice, keystroke pattern and gait.
Though there are many types of biometrics technology, Mr Mukiri says it is only the fingerprint reader that is available in Uganda and the region at large.
“We are going step by step because people need to understand the available technology before you introduce any other,” he says.
The New World Order Plan is spiritually based: it is a conflict between God and His forces, on the one hand, and Satan and his demonic forces on the other side. Anyone who does not know Biblical doctrine about God and Satan, and who does not know Scriptural prophecy, cannot comprehend the nature of the struggle facing the world today. - David Bay, Cutting Edge Ministries
For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places. - Ephesians 6:12
For we are opposed around the world by a monolithic and ruthless conspiracy that relies on covert means for expanding its sphere of influence... Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed. - President John F. Kennedy, April 27, 1961
The book in which they are embodied was first published in the year 1897 by Philip Stepanov for private circulation among his intimate friends. The first time Nilus published them was in 1901 in a book called The Great Within the Small and reprinted in 1905. A copy of this is in the British Museum bearing the date of its reception, August 10, 1906. All copies that were known to exist in Russia were destroyed in the Kerensky regime, and under his successors the possession of a copy by anyone in Soviet land was a crime sufficient to ensure the owner's of being shot on sight. The fact is in itself sufficient proof of the genuineness of the Protocols. The Jewish journals, of course, say that they are a forgery, leaving it to be understood that Professor Nilus, who embodied them in a work of his own, had concocted them for his own purposes.
Fair Use Notice
This site contains copyrighted material, the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more detailed information go to: http://www.law.cornell.edu/uscode/17/107.shtml.