Archive
New Surveillance Cameras Will Use Computer Eyes to Find ‘Pre crimes’ by Detecting Suspicious Behaviour and Calling for Guards
Thursday, 07 June 2012

‘A new generation of computerised ‘Big Brother’ cameras are able to spot if you are a terrorist or a criminal – before you even commit a crime.
The devices are installed in places like train stations or public buildings where they scan passers by to see if they are acting suspiciously. Using a range of in-built parameters of what is ‘normal’ the cameras then send a text message to a human guard to issue an alert – or call them.’
Who owns your stuff in the cloud?
By Michelle Maltais, Los Angeles Times, April 26, 2012
Google’s recently unveiled Google Drive is among the cloud-based data storage services available. Google says you retain ownership of any intellectual property rights that you hold in that content. But where the Google policy may read a bit murky is what you entitle Google to do with your stuff. Above, at the company’s headquarters in Mountain View, Calif. (Paul Sakuma, Associated Press / April 12, 2012)
As more people look to the cloud for digital storage, such as the recently unveiled Google Drive, the era of being able to mindlessly click “OK” or “Agree” may be over.
When your stuff is stored on your computer at home, you alone are responsible for keeping it safe, secure and backed up. Your roof, your rules. But when you shift from local storage to remote, you live by terms set by someone else — and it’s best to read them.
Read more: http://www.latimes.com/business/la-fi-tech-savvy-cloud-services-20120426,0,3241271.story
SOPA Mutates Into Much Worse CISPA, the Latest Threat to Internet Free Speech

‘Just because SOPA and PIPA, the infamous internet “kill switch” bills, are largely dead does not mean the threat to internet free speech has become any less serious. The Cyber Intelligence Sharing and Protection Act (CISPA), also known as H.R. 3523, is the latest mutation of these internet censorship and spying bills to hit the U.S. Congress — and unless the American people speak up now to stop it, CISPA could lead to far worse repercussions for online free speech than SOPA or PIPA ever would have.’
Read more: SOPA Mutates Into Much Worse CISPA, the Latest Threat to Internet Free Speech
Iran To Shut Down Internet Permanently; ‘Clean’ National Intranet In Pipeline
Millions of Internet users in Iran will be permanently denied access to the World Wide Web and cut off from popular social networking sites and email services, as the government has announced its plans to establish a national Intranet within five months.
In a statement released Thursday, Reza Taghipour, the Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran’s plan for a “clean Internet.”
The government is set to roll out the first phase of the project in May, following which Google, Hotmail and Yahoo services will be blocked and replaced with government Intranet services like Iran Mail and Iran Search Engine. At this stage, however, the World Wide Web, apart from the aforementioned sites, will still be accessible.
The government has already started the registration procedure to apply for procuring Iran Mail ID, which mandates authentic information pertaining to a person’s identity, including national ID, address and full name. Registration will be approved only after verifying it against the government data on the particular applicant.
The second and final stage of the national Intranet will be launched in August, which will permanently deny Iranians access to the Internet.
“All Internet Service Providers (ISP) should only present National Internet by August,” Taghipour said in the statement.
For a country like Iran that exercises high levels of government control across sectors, establishing an insulated Internet shouldn’t be too much of a technical hassle. The new system would be more or less similar to the corporate intranet, where one can only access pages approved by the system administrators.
Iranian ISPs already face heavy penalties if they fail to comply with the government filter list. By establishing the Intranet, the government control is set to become stricter.
Foreign sites can still be accessed over the Intranet provided they are mentioned in a “white list” set up by the government. The government is also believed to be planning for better control on proxy servers which allow users to access banned sites.
Unveiling a six-point plan to implement the Iranian Intranet, Taghipour said last March that the Internet “promotes crime, disunity, unhealthy moral content, and atheism,” and that government’s goal is to eliminate the online “scourges.” In October last year, an Iranian official – who called Facebook users a threat to Islamic values – expressed concern that expansion of social media networks was harming the nation and society.
Describing the blogosphere as one of the “most effective elements of soft war” against Iran, Mehdi Jafari, head of the technology and intelligence section of the Pupil’s Basij militia, said arrogant and imperial powers (like the US) were using social-media sites to push their agenda.
Internet censorship has been in place for quite a long time in Iran as the authorities fear an anti-government revolution like the Arab Spring that rocked countries like Egypt, Libya, Syria, Tunisia, Yemen, Iraq, Bahrain and Jordan. The Islamic regime of Iran has a bad track record with regard to Internet freedom as it has made several attempts in the past to temporarily deny access to the Internet.
Taghipour was added to the European Union sanctions list on Mar. 23, due to his involvement in the human rights violations during the 2009-2010 Iranian election protests. According to the EU, the Iranian Communications minister was one of the top officials in charge of censorship of the Internet and Internet-based activism.
By creating a complete blockade on free Internet, Tehran could be setting a dangerous precedent for authoritative nations that may harbor similar plans in the future. In fact, the Iranian government has already announced its plans to “export” the winning formula for an isolated Intranet to the rest of the world.
The Next Phase of Internet Censorship Has Begun: Man the Battle Stations!
Sunday, 25 September 2011 08:17

‘Reports pertaining to the censorship and takedown of personal websites continue to flood in.
First, YouTube meddled with the view counts of folks like Alex Jones over at Info Wars and Prison Planet. Then Flickr, MySpace and Facebook began censoring comments and material. Now an increasing number of independent online media is beginning to feel the sharp edge of the blade.’
Read more: The Next Phase of Internet Censorship Has Begun: Man the Battle Stations!
Youtube terminates HAARP investigator account
HAARP Investigator Dutchsinse has had his Youtube account terminated in a clear act of censorship. There is no issue of copyright. All Youtube will say is he was flagged as inappropriate. Dutchsinse was obviously on the right track and somebody ordered Youtube to get rid of him. Youtube should change its name to YouChina. How obvious do they want to be? He is seeking legal action and hopefully the alternative media can apply enough pressure to get his account reinstated.
Here is what happened according to Dutchsinse himself:
Regarding your account: dutchsinse
The YouTube Community has flagged one or more of your videos as inappropriate. Once a video is flagged, it is reviewed by the YouTube Team against our Community Guidelines. Upon review, we have determined that the following video(s) contain content in violation of these guidelines, and have been disabled:
8/5/2011 — Weather manipulation via frequency = Explanation on Scalar Squares and HAARP rings – (dutchsinse)
here is the video in question: download and watch.. sorry for the large file size.. but this is the video exactly as I uploaded it to youtube… Watch for yourself and decide if this video is “objectionable” or “violates youtube community guidelines”.
video here: 8/5/2011 — Weather manipulation via frequency =
I have obtained legal representation and will, hopefully in the end, get my account restored. Anyone who watches my videos knows that I used my own content along with public agencies RADAR, earthquake analysis and volcano eruptions.
I had NO OTHER PEOPLES work up or videos up without direct permission from the video maker.. only a few examples on that really .. like the Fukushima theory Finnish scientist video (mirrored with permission) and the Sakurajima volcano videos (also mirrored with permission).
The rest of the videos are mine, therefore no one can claim a copyright against.. and nothing was objectionable or in violation of community guidelines.. but some how this went through WITHOUT ANY KIND OF NOTICE BEING SENT TO ME AS WHY…
The description says … multiple violations of community guidelines AND/OR copyright violations.
I do not know which I am accused of.. I lost 712 videos today with no explanation from youtube.
This is outrageous, and comes on the heels of weeks (and months) of persecution on youtube with NO HELP FROM THEM AT ALL —-
This past month, has been the worst month in my life… hands down.. no holds barred.
Youtube allowed patrioticspace to upload (and keep up) videos with clearly illegal taped phone calls.. youtube still allows videos organizing CLASS ACTION SUITS AGAINST ME.. for stopping trolls from uploading and ruining videos they illegally stole from me. Youtube allows threatening videos , harassing videos against me (dutchsinse).. and then they terminate my account for WHAT? I still do not know.
http://ozhouse.org/2011/09/06/youtube-terminates-haarp-investigator-account/#.TmUCeCrmWxY.reddit
Congress Using Child Porn Bill As Trojan Horse To Spy On Everyone’s Internet
Saturday, 30 July 2011 09:11

‘Goodbye, civil liberties! The government is using a bill disguised as anti-child pornography legislation to allow them to start monitoring Web-usage of everyone.
The Protecting Children from Internet Pornographers Act of 2011 (H.R. 1981) is aiming to keep the Web safe for children, but in the process it will treat any user logging on to the Internet as a potential criminal.
Bill sponsor Lamar Smith, House judiciary committee chairman and Representative from Texas, says that pedophiles have been able to avoid prosecution in the past because vital records linking them to web usage were never required to be retained. Under H.R. 1981, Internet Service Providers would have to hold onto those records for 12 months. Those records, however, won’t apply to just suspected child pornographers and pedophiles. Instead, ISPs will be doing data retention on all of their customers.’
Read more: Congress Using Child Porn Bill As Trojan Horse To Spy On Everyone’s Internet
Pentagon declares the Internet a war domain
The Pentagon released a long-promised cybersecurity plan Thursday that declares the Internet a domain of war but does not spell out how the U.S. military would use the Web for offensive strikes.
The Defense Department’s first-ever plan for cyberspace states that DOD will expand its ability to thwart attacks from other nations and groups, beef up its cybersecurity workforce and expand collaboration with the private sector.
Like major corporations and the rest of the federal government, the military “depends on cyberspace to function,” the DOD strategy states. The U.S. military uses cyberspace for everything from carrying out military operations to sharing intelligence data internally to managing personnel assignments.
“The department and the nation have vulnerabilities in cyberspace,” the document states. “Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity.”
Other nations “are working to exploit DOD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DOD’s information infrastructure,” the plan states. “Moreover, non-state actors increasingly threaten to penetrate and disrupt DOD networks and systems.”
Groups are capable of this largely because “small-scale technologies” that have “an impact disproportionate to their size” are relatively inexpensive and readily available.
The Pentagon plans to focus heavily on three areas under the new strategy: The theft or exploitation of data, attempts to deny or disrupt access to U.S. military networks, and any attempts to “destroy or degrade networks or connected systems.”
Another problem highlighted in the strategy is a baked-in threat: “The majority of information technology products used in the United States are manufactured and assembled overseas.”
To address those issues, DOD revealed a multi-pronged approach.
As expected and foreshadowed by Pentagon officials’ comments in recent years, the plan etches in stone that cyberspace is now an “operational domain” just as land, air, sea and space have been for decades for the military.
“This allows DOD to organize, train and equip for cyberspace” as in those other areas, the plan states. It also notes the 2010 establishment of U.S. Cyber Command to oversee all DOD work in the cyberspace.
By crafting a this strategy, “the Department of Defense is acknowledging what all observers of the IT revolution have known for years: cyberwar is already a reality,” Lexington Institute analyst Daniel Goure, a former Army official, wrote recently.
“The publication of the cyberwar strategy may also help jumpstart a long-postponed public debate over the nature of such a war and how it should be deterred, if possible, or fought if necessary,” Goure wrote. “The last technology to revolutionize warfare to the same extent as IT is doing was that which led to the creation of nuclear weapons.”
The second leg of the plan is to employ new defensive ways of operating in cyberspace, first by enhancing the DOD’s “cyber hygiene.” That term covers ensuring that data on military networks remains secure, using the Internet wisely and designing systems and networks to guard against cyberstrikes.
The military will continue its “active cyber defense” approach of “using sensors, software and intelligence to detect and stop malicious activity before it can affect DOD networks and systems.” It also will look for new “approaches and paradigms” that will include “development and integration … of mobile media and secure cloud computing.”
The plan devotes more than a page to mostly underscore efforts long under way to work with other government agencies and the private sector.
Notably, it calls the Department of Homeland Security the lead for “interagency efforts to identify and mitigate cyber vulnerabilities in the nation’s critical infrastructure.” Some experts have warned against DOD overstepping on domestic cybersecurity.
The Pentagon also announced a new pilot program with industry designed to encourage companies to “voluntarily [opt] into increased sharing of information about malicious or unauthorized cyber activity.”
The strategy calls for a larger DOD cybersecurity workforce.
One challenge, Pentagon experts say, will be attracting top IT talent because the private sector can pay much larger salaries — especially in times of shrinking defense budgets. To that end, “DOD will focus on the establishment of dynamic programs to attract talent early,” the plan states.
On IT acquisition, the plan lays out several changes, including: faster delivery of systems; moving to incremental development and upgrading instead of waiting to buy “large, complex systems”; and improved security measures.
Finally, the strategy states an intention to work more closely with “small- and medium-sized business” and “entrepreneurs in Silicon Valley and other U.S. technology innovation hubs.”
The reaction from Capitol Hill in the immediate wake of the plan’s unveiling was mostly muted. Cybersecurity is not a polarizing political issue in the way some defense issues are, like missile defense.
Claude Chafin, a spokesman for House Armed Services Committee Chairman Buck McKeon (R-Calif.), called the strategy “the next step in an important national conversation on securing critical systems and information, one that the Armed Services Committee has been having for some time.”
That panel already has set up its own cybersecurity task force, which Chafin said would “consider this [DOD] plan in its sweeping review of America’s ability to defend against cyber attacks.”
As the Pentagon tweaks its approaches to cybersecurity, Senate Armed Services Committee ranking member John McCain (R-Ariz.) on Wednesday wrote Senate leaders saying that chamber must as well. McCain asked Majority Leader Harry Reid (D-Nev.) and Minority Leader Mitch McConnell (R-Ky.) to establish a temporary Select Committee on Cyber Security and Electronic Intelligence Leaks.
“Cybersecurity proposals have been put forth by numerous Senate committees, the White House and various government agencies; however, the Senate has yet to coalesce around one comprehensive proposal that adequately addresses the government-wide threats we face,” McCain’s office said in a statement. “A select committee would be capable of drafting comprehensive cybersecurity legislation quickly without needing to work through numerous and in some cases competing committees of jurisdiction.”
