Archive for the ‘WikiLeaks’ Category

http://www.youtube-nocookie.com/v/o-P3OXML00s?version=3&hl=en_US

BTC –  Take a photo and show the rest of the world it’s always right to tell the truth; especially when the media and the government won’t.

http://www.youtube-nocookie.com/v/SGIRNEGDllQ?version=3&hl=en_US

EU considers Trusted Identity proposal of their own, grapples with citizen and global privacy

NETWORKWORLD: Trust, respect and personal datastores

“On the final day of last week’s European Identity Conference (EIC) I sat in on a workshop/presentation of the new Respect Trust Framework, which is being billed as a new approach to giving individuals control over their personal data shared over the Internet and mobile phone networks.”

:::MORE HERE:::

Here is second life for news that matters: 

UN Proponent, Bill Clinton, wants “independent” news, Internet monitoring service.

U.S. Calls for Global Cybersecurity Strategy

New US International Cybersecurity Strategy Aims to Institute ‘Rule of Law’ on the Internet

Eleven Privacy and Civil Liberties Groups Urge U.S. to Uphold Privacy Values in E.U. Negotiations

Google chairman Schmidt promises privacy controls to UK over location privacy

Blackbird-DoD invents another clandestine, surveillance technology to “TTL” – tag, track and locate.

An Oxford study, policy of OSHA, yellow tag public health, medical surveillance [2000].

c/o Russia Today @ 2:00

REAL ID UPDATE: Border states Texas, New Mexico and other southwestern states are actively increasing public discourse on terms of immigration policy and whether or not federal legislation will perform or deliver terms of relief promised to put limits on undocumented migrants seeking work.  North Carolina seems to be reinforcing terms to reduce federal spending on Real ID; while a Youngstown, NC legislator seeks to move legislation prohibitive of federalizing local drivers licenses.  A Real ID compliant discourse is stirring Nevada two years after the state passed a local resolution requesting that the federal law be repealed.   States are expected to be federally compliant with the law by May 11th, 2011.  More opinion here and here.

D.I.Y. Accountability: Send a message to Google and Facebook: Protect Our Privacy!

Here’s second life for news that matters:

US Bill Would Prohibit Internet ‘kill Switch’

Decentralizing the Internet So Big Brother Can’t Find You

FBI pushes for surveillance backdoors in Web 2.0 tools

Patriot Act Extension Lands on Obama’s Desk

SENDING OUT AN S.O.S….Clinton delivers speech to support nonviolent dissent on the web, as Ray McGovern arrested, brutalized. Analysis of the content of Clinton’s speech here.

DISCUSSION: The Internet and Social Media: Tools of Freedom or Tools of Oppression?

TSA agents admit to stealing $160,000 from bags at JFK Airport

HBGary -Anonymous- WIKILEAKS : @arstechnica @ggreenwald

WHAT DO YOU THINK?  Do-Not-Track bill facing criticism 
Add comments! RE: DoNotTrack

Essay anthology gives context on the use, history of national identity conventions

BTC – The public is the constant witness of electronic data streaming 24/7 on the Internet. The next line of temptation for governments is to initiate power plays with cyber information and attempt to organize it into a convenient remote controlled system of rulership over the inidividual.

It may be that our base, human ethical ecology doesn’t have the bandwidth to assume such responsibility without successive, spontaneous revolutions happening. Social networking technology and the Internet are speeding up the natural process of a nation’s people dumping bad government and taking their power back. If we were to pen a verse text respecting sacred Internet cows and their boundaries, it might read like,

And ye shall know your despots by the manner they handle Internet users and their personal information.

A Wikileaks cable uncovered the role of Egyptian dictator Mosni Mubarak’s role in allowing harbor for illegal torture of US rendered prisoners.  The last straw snapped for Egyptians when Mubarak interrupted mobile communications and the Internet. Mubarak opting for an aggressive Internet kill switch is more than simply grounding Egyptians without electronic amenity. His actions now define despotism to the generations.  The net was the last bastion for Egyptian freedom of speech. Civil unrest simply errupted from the cold space of the web directly onto the hot streets of Cairo. After that, the revolution was live in real time and the web caught up later.

Egyptians have endured 30 years of dictatorship rule and a normalized “state of emergency” status to control the people. Egyptian youth lately were seen flippantly displaying their national IDs and passports to televised media, demonstrating dissent, and bonafide evidence of an oppressive totalitarian government.

National Identification Systems: Essays in Oppositon, a heavily sourced 2004 essay anthology, has been astonishingly precognitive of the times we now live in. The text gives first gives historical context of what national identity articles have been used for and then delves into its current applications and the projected effects in public affairs. It would be a profoundly effective text for professors and adjuncts to use in curriculum about why and how national identity is used to capture and restrict power of the individual.

Here’s an example of how the book illuminates current events. The National Strategy for Trusted Identities in Cyberspace (NSTIC), a national digital authentication initiative, is moving ahead with hires for a national program office.  One essayist, Sunni Maravillosa, explores national identity authentication in society in the chapter titled, “National ID without Big Brother”.  After reading this, one might gather the purpose of the national program office is to provide government oversight or regulation to an existing organic national identity system designed for business.

Other important topics include the prospective use of nanotechnologies, microchips, biometric devices, computers and efforts to centralize digital data; which leads back to the identified person.

The anthology’s expository tour of government methods, history and social context is a comprehensive critical view of national identity systems in government. It is recommended reading for any identified person seeking the long view.

National Identification Systems: Essays in Opposition is available through McFarland publishing. [800-253-2187]

Remind anyone of the Real ID Act?

ALSO AVAILABLE from  McFarland
American Zombie Gothic, The Rise and Fall (and Rise) of the Walking Dead in Popular Culture

BTC – We deserve better.  The armed service members in this country deserve better.  However- the sad truth is that Pvt. Bradley Manning is experiencing the US institution of torture and rendition consistent with being classified as a “terrorist”.

This is what the United States military has been reduced to: extorting us towards crushing debt to pay for torture and incarceration of our own citizens when THEY TELL THE TRUTH.

Be reminded, we may demand a different standard than, “shut up, lay down and take it without making any noise”.

Daniel Ellsberg, a pioneer in the art of the leak led a revolution in public awareness.  This was before news organizations were infiltrated by cold war era military plants.

It’s all we can do to to just stay dedicated to blowing the whistle; until The People come down like rain on the worst form of  governance in our name in US history.

Without further ado, Mr. Daniel Ellsberg, says it again.

http://wakinguporwell.podomatic.com/swf/joeplayer_v11.swf

Try to stay sane.  DO SOMETHING!

RELATED NEWS:

Assange out on bail, stayed in London with limited freedoms

CSPAN Coverage of Wikileaks, The Espionage Act & The Constitution