Archive for the ‘Egypt’ Category

Senate Intel Chair: Torture Did Not Lead To Bin Laden In Any Way @TPM

More and more evidence suggests a key piece of intelligence — the first link in the chain of information that led U.S. intelligence officials to Osama bin Laden — wasn’t tortured out of its source. And, indeed, that torture actually failed to produce it. 

:::MORE HERE:::



Here is second life for news that matters: 

The 10 tools of Online Oppressors

WIRED: Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010

Commentary c/o Julian “squeaky clean” Sanchez: 

 Record Number of Americans Targeted by National Security Letters

NYTimes Op-Ed: Personal Data: Safer in America or in Europe

Children of Guanajuato, Mexico in Biometric Database

U.S. Attorney Escalates Attacks on Civil Liberties of Anti-War, Palestinian Human Rights Activists

Homeland Security Suspends Ineffective, Discriminatory Immigration Program

SEC’s Schapiro says surveillance tools ‘inadequate’

Canada, U.S. in talks to share surveillance data

Advertisements

Essay anthology gives context on the use, history of national identity conventions

BTC – The public is the constant witness of electronic data streaming 24/7 on the Internet. The next line of temptation for governments is to initiate power plays with cyber information and attempt to organize it into a convenient remote controlled system of rulership over the inidividual.

It may be that our base, human ethical ecology doesn’t have the bandwidth to assume such responsibility without successive, spontaneous revolutions happening. Social networking technology and the Internet are speeding up the natural process of a nation’s people dumping bad government and taking their power back. If we were to pen a verse text respecting sacred Internet cows and their boundaries, it might read like,

And ye shall know your despots by the manner they handle Internet users and their personal information.

A Wikileaks cable uncovered the role of Egyptian dictator Mosni Mubarak’s role in allowing harbor for illegal torture of US rendered prisoners.  The last straw snapped for Egyptians when Mubarak interrupted mobile communications and the Internet. Mubarak opting for an aggressive Internet kill switch is more than simply grounding Egyptians without electronic amenity. His actions now define despotism to the generations.  The net was the last bastion for Egyptian freedom of speech. Civil unrest simply errupted from the cold space of the web directly onto the hot streets of Cairo. After that, the revolution was live in real time and the web caught up later.

Egyptians have endured 30 years of dictatorship rule and a normalized “state of emergency” status to control the people. Egyptian youth lately were seen flippantly displaying their national IDs and passports to televised media, demonstrating dissent, and bonafide evidence of an oppressive totalitarian government.

National Identification Systems: Essays in Oppositon, a heavily sourced 2004 essay anthology, has been astonishingly precognitive of the times we now live in. The text gives first gives historical context of what national identity articles have been used for and then delves into its current applications and the projected effects in public affairs. It would be a profoundly effective text for professors and adjuncts to use in curriculum about why and how national identity is used to capture and restrict power of the individual.

Here’s an example of how the book illuminates current events. The National Strategy for Trusted Identities in Cyberspace (NSTIC), a national digital authentication initiative, is moving ahead with hires for a national program office.  One essayist, Sunni Maravillosa, explores national identity authentication in society in the chapter titled, “National ID without Big Brother”.  After reading this, one might gather the purpose of the national program office is to provide government oversight or regulation to an existing organic national identity system designed for business.

Other important topics include the prospective use of nanotechnologies, microchips, biometric devices, computers and efforts to centralize digital data; which leads back to the identified person.

The anthology’s expository tour of government methods, history and social context is a comprehensive critical view of national identity systems in government. It is recommended reading for any identified person seeking the long view.

National Identification Systems: Essays in Opposition is available through McFarland publishing. [800-253-2187]

Remind anyone of the Real ID Act?

ALSO AVAILABLE from  McFarland
American Zombie Gothic, The Rise and Fall (and Rise) of the Walking Dead in Popular Culture

FROM EGYPT

“In a sign of their new-found confidence, many protesters held up their national ID cards or passports to news cameras, a show of bravery just days after police were detaining and raiding the homes of activists.” 

:::MORE FROM THE FINANCIAL TIMES HERE:::


Here is second life for news that matters. 
NORTH AMERICA

EUROPE

ASIA
On Japan’s national ID number system proposal  —The government was to announce, possibly on Friday, a set of basic principles for the proposed introduction of a national identification number system as a means of tracking individual citizens’ social security, income and asset information for welfare and taxation purposes.