Homeland Security: Operation Endgame

Read the Document Here: Endgame

Important background reading:
10-Year U.S. Strategic Plan For Detention Camps Revives Proposals From Oliver North

See also: U.S. immigration raids are about to get ugly

Important DVD: Endgame: Blueprint for Global Enslavement by Alex Jones
Alex Jones is a true patriot, a genuine hero. – Actor/Director Charlie Sheen

Important Book & DVD: Read The David Icke Guide to the Global Conspiracy and watch David Icke: Freedom or Fascism: The Time to Choose and you will know a lot about secret societies and you will understand that the emblem of Homeland Security contains fascist symbols and once you know this you will find them everywhere.
The book is heavy 2.1 pounds with 500 pages but easy to understand – maybe not easy to digest.

This was the Introduction to this article:

Feds say raid is nation’s largest

May 13, 2008


Cedar Rapids, Ia. – The number of illegal immigrants detained Monday in Postville has risen to 390 in what federal officials now describe as the largest single-site raid of its kind nationwide.

The detainees include 314 men and 76 women, according to figures released this morning by federal authorities. Fifty-six detainees – mostly women with young children – have been released under the supervision of U.S. Immigration and Customs Enforcement.

“We’re here to discuss not only the largest operation of its kind ever in Iowa, but in fact the largest single-site enforcement operation of its kind in the country,” U.S. Attorney Matt M. Dummermuth said.

The detainees included 290 who claimed to be Guatemalans, 93 Mexicans, three Israelis and four Ukrainians. Among the detained were 12 juveniles, six of whom have been released.

Customs and law enforcement agents worked through the night processing the detainees, said Claude Arnold, the ICE special agent in charge of the operation. Detainees were “administratively arrested” but have not yet been criminally charged, he said.

Detainees who are charged with aggravated identity theft, unlawful use of a Social Security number or other offenses will be given lawyers and sent to appearances in one of three makeshift courtrooms at the detainee center in Waterloo, Arnold said.

Read moreHomeland Security: Operation Endgame

Illegal Alien Raid Part Of FEMA Camp Drill

The federal government is getting ready to put large amounts of people in camps and they don’t care what the American people think about it.”
_________________________________________________________________________________________

As predicted last week, ICE has begun factory raids of illegal aliens in Iowa. This was not very difficult to predict. The federal government last week leased out the National Cattle Congress fairgrounds in Waterloo, Iowa until May 25th and began moving trailers and generators on location. Reports from the Des Moines Register and the Waterloo Cedar Falls Courier indicated that FEMA and ICE, two agencies within the Department of Homeland Security were involved in this secretive operation. Considering the large groups of illegal alien factory workers in the area of the fairgrounds, it wasn’t hard to figure out what was going to happen next. The Department of Homeland Security has now decided to go live with their test FEMA camp operation and are using illegal aliens as live subjects for processing purposes. This is a drill designed to setup a FEMA camp that will be used to process American citizens. Make no mistake about it, this has nothing to do with stopping illegal immigration. Rounding up a few hundred illegal aliens and asking them questions is going to do nothing to resolve the policies that have encouraged and facilitated the illegal alien problem. It does however serve as a fine test run for processing large groups of people through a FEMA camp.

Read moreIllegal Alien Raid Part Of FEMA Camp Drill

Blunt Federal Letters Tell Students They’re Security Threats

WASHINGTON — A German graduate student in oceanography at M.I.T. applied to the Transportation Security Administration for a new ID card allowing him to work around ships and docks.

What the student, Wilken-Jon von Appen, received in return was a letter that not only turned him down but added an ominous warning from John M. Busch, a security administration official: “I have determined that you pose a security threat.”

Similar letters have gone to 5,000 applicants across the country who have at least initially been turned down for a Transportation Worker Identification Credential, an ID card meant to guard against acts of terrorism, agency officials said Monday.

Read moreBlunt Federal Letters Tell Students They’re Security Threats

Report Pushes Passage Of Thought Crimes Bill

“First off, the threat of terrorist operated Internet sites is a complete fraud. IntelCenter a CIA front group which supposedly finds all of these Al-Qaeda terrorist video and audio tapes on the Internet never provides the source of where they obtain the terrorist propaganda.”

“If these materials were real terrorist propaganda and they didn’t want to reveal the source, why have we not seen warrants served, the web servers seized and people questioned? Why is it that the terrorist video and audio tapes that are released by this so called terrorist organization always seems to indirectly help the Bush administration?”

__________________________________________________________________________________________

The Internet is now becoming a new front in the phony terror war. Legislation like the Violent Radicalization and Homegrown Terrorism Prevention Act of 2007 that is in the forms of HR 1955 and S 1959 which seek to give the government powers to define thoughts and belief systems as homegrown terrorism, is on the brink of being pushed down our throats. HR 1955 was passed by the U.S. House of Representatives by a vote of 404-6 and now it appears as if the U.S. Senate is attempting to justify its future passage.

The U.S. Senate homeland security committee lead by war mongering fascist Joesph Lieberman, investigated the so called growing threat of terrorists using the Internet for recruiting and training purposes. In their report, they paint the Internet as a dangerous tool for terrorists and conclude that new laws need to be passed “to prevent the spread of the ideology.” It is incredibly convenient that S 1959 provides the legislation that is called for in their report. The true purpose of this report is to push for the passage of S 1959 which will give the government powers similar to what the government of Oceania used in George Orwell’s book 1984.

Read moreReport Pushes Passage Of Thought Crimes Bill

U.S. immigration raids are about to get ugly

Letters listing millions of Social Security “no-match” workers are ready to mail to employers.

The Immigration and Customs Enforcement agency personnel are trained and ready. Buses and vans are standing by for raids. Detention facilities have expanded.

All that is lacking is clearance from the courts.

Employers should be prepared in the coming months for immigration raids on scales never before staged by the federal government. The stakes for employers will be especially high if the courts give a green light to the mailing of Social Security no-match letters.

Read moreU.S. immigration raids are about to get ugly

NATIONAL DRILL: U.S. Tests Response To Set of Calamities

Executive Branch ‘Runs’ Government From Outside D.C. as Mock Crises Mount

Thousands of key federal employees are being whisked from the Washington area by helicopter and car for a three-day test of their ability to run the government from remote locations during a disaster.

The exodus, which began yesterday and will continue today, involves the White House and other parts of the executive branch. Congress and the judiciary are not part of the exercise, which is being overseen by the Department of Homeland Security.

Since the late 1990s, every federal agency has been required to have a plan to quickly resume operations after a catastrophe. But the response to the Sept. 11, 2001, terrorist attacks raised doubts about many agencies’ preparations.

This week’s “continuity of government” drill is one of the largest by the federal government since 9/11, officials said. It is part of a national eight-day exercise in which officials are responding to a cascade of nightmarish events. The drill started Thursday, with terrorists sabotaging a tanker carrying poisonous gas in Washington state.

Read moreNATIONAL DRILL: U.S. Tests Response To Set of Calamities

75 students arrested in San Diego State University drug bust

Dozens of San Diego State University students were arrested after a sweeping drug investigation found that some fraternity members openly dealt drugs and one even sent a mass text message advertising cocaine, authorities said Tuesday.

Two kilograms of cocaine were seized, along with 350 Ecstasy pills, marijuana, psychedelic mushrooms, hash oil, methamphetamine, illicit prescription drugs, several guns and at least $60,000 in cash, authorities said.

Of the 96 people arrested, 75 were students. Eighteen of the students were arrested Tuesday when nine search warrants were executed at various locations including fraternities, said Jesse Rodriguez, San Diego County assistant district attorney.

The undercover probe, dubbed Operation Sudden Fall, was sparked by the cocaine overdose death of a student in May 2007, authorities said. As the investigation continued, another student, from Mesa College, died Feb. 26 of a cocaine overdose at an SDSU fraternity house, the DEA said.

Those arrested included a student who was about to receive a criminal justice degree and another who was to receive a master’s degree in homeland security.

Read more75 students arrested in San Diego State University drug bust

Who should MDs let die in a pandemic? Report offers answers

Doctors know some patients needing lifesaving care won’t get it in a flu pandemic or other disaster. The gut-wrenching dilemma will be deciding who to let die.

Now, an influential group of physicians has drafted a grimly specific list of recommendations for which patients wouldn’t be treated. They include the very elderly, seriously hurt trauma victims, severely burned patients and those with severe dementia.

The suggested list was compiled by a task force whose members come from prestigious universities, medical groups, the military and government agencies. They include the Department of Homeland Security, the Centers for Disease Control and Prevention and the Department of Health and Human Services.

The proposed guidelines are designed to be a blueprint for hospitals “so that everybody will be thinking in the same way” when pandemic flu or another widespread health care disaster hits, said Dr. Asha Devereaux. She is a critical care specialist in San Diego and lead writer of the task force report.

The idea is to try to make sure that scarce resources – including ventilators, medicine and doctors and nurses – are used in a uniform, objective way, task force members said.

Their recommendations appear in a report appearing Monday in the May edition of Chest, the medical journal of the American College of Chest Physicians.

“If a mass casualty critical care event were to occur tomorrow, many people with clinical conditions that are survivable under usual health care system conditions may have to forgo life-sustaining interventions owing to deficiencies in supply or staffing,” the report states.

To prepare, hospitals should designate a triage team with the Godlike task of deciding who will and who won’t get lifesaving care, the task force wrote. Those out of luck are the people at high risk of death and a slim chance of long-term survival. But the recommendations get much more specific, and include:

– People older than 85.

– Those with severe trauma, which could include critical injuries from car crashes and shootings.

– Severely burned patients older than 60.

– Those with severe mental impairment, which could include advanced Alzheimer’s disease.

– Those with a severe chronic disease, such as advanced heart failure, lung disease or poorly controlled diabetes.

Dr. Kevin Yeskey, director of the preparedness and emergency operations office at the Department of Health and Human Services, was on the task force. He said the report would be among many the agency reviews as part of preparedness efforts.

Read moreWho should MDs let die in a pandemic? Report offers answers

What’s Up with the Secret Cybersecurity Plans, Senators Ask DHS

The government’s new cyber-security “Manhattan Project” is so secretive that a key Senate oversight panel has been reduced to writing a letter to beg for answers to the most basic questions, such as what’s going on, what’s the point and what about privacy laws.

The Senate Homeland Security committee wants to know, for example, what is the goal of Homeland Security’s new National Cyber Security Center. They also want to know why it is that in March, DHS announced that Silicon Valley evangelist and security novice Rod Beckstrom would direct the center, when up to that point DHS said the mere existence of the center was classified.

Those are just two sub-questions out of a list of 17 multi-part questions centrist Sens. Joe Lieberman (I-Connecticut) and Susan Collins (R-Maine) sent to DHS in a letter Friday.

In fact, although the two say they asked for a briefing five months ago on what the center does, DHS has yet to explain its latest acronym.

The panel, noted it was pleased with the new focus on cyber security, but questioned Homeland Security’s request to triple the center’s cyber-security budget to about $200 million.
They cited concerns about the secrecy around the project, its reliance on contractors for the operation of the center and lack of dialogue with private companies that specialize in internet security.

That center is just one small part of the government’s new found interest in computer security, a project dubbed the Comprehensive National Cybersecurity Initiative, which has been rumored to eventually get some $30 billion in funding.

Little is known about the initiative since it was created via a secret presidential order in January, though the Washington Post reports that portions of it may be made public soon.

Read moreWhat’s Up with the Secret Cybersecurity Plans, Senators Ask DHS

Homeland Security Update: Chertoff Says New Laws Needed

At a speech before the Heritage Foundation this week, Homeland Security Secretary Michael Chertoff said the U.S. needs to have a “nonpoliticized, serious discussion” while writing new laws to define the best way to combat terrorism.

Chertoff said that once laws are written, the public should not second-guess government actions and claim that federal officials are overstepping their authority. He decried critics who make such accusations, despite the widespread pubic calls after the September 11, 2001 attacks for the U.S. government to do more to protect the country. Chertoff further said U.S. society needs to come to a determination as to what are acceptable authorities for the U.S. government versus what violates people’s rights.

If the public limits what the government can do, it must accept that the risk of terrorist attacks may increase, he said. If the public gives the government greater authorities, it should not criticize the government for using those authorities at a later date.

Chertoff called U.S. laws “woefully inadequate” in the context of current technology. He said the most significant step American society needs to take is adapting laws to the 21st Century challenge of fighting terrorism. Changes in technology have created unique challenges for the government when it comes to intercepting communications, as well as collecting and analyzing information found in the public domain according to Chertoff.

Thursday, May 01, 2008

Source: Helicopter Association International

Anyone who trades liberty for security deserves neither liberty nor security. – Benjamin Franklin

Your personal data just got permanently cached at the US border

Now that US customs agents have unfettered access to laptops and other electronic devices at borders, a coalition of travel groups, civil liberties advocates and technologists is calling on Congress to rein in the Department of Homeland Security’s search and seizure practices. They’re also providing practical advice on how to prevent trade secrets and other sensitive data from being breached.

In a letter dated Thursday, the group, which includes the Electronic Frontier Foundation (EFF), the American Civil Liberties Union and the Business Travel Coalition, called on the House Committee on Homeland Security to ensure searches aren’t arbitrary or overly invasive. They also urged the passage of legislation outlawing abusive searches.

The letter comes 10 days after a US appeals court ruled Customs and Border Protection (CBP) agents have the right to rummage through electronic devices even if they have no reason to suspect the hardware holds illegal contents. Not only are they free to view the files during passage; they are also permitted to copy the entire contents of a device. There are no stated policies about what can and can’t be done with the data.

Over the past few months, several news reports have raised eyebrows after detailing border searches that involved electronic devices. The best known of them is this story from The Washington Post, which recounted the experiences of individuals who were forced to reveal data on cell phones and laptop devices when passing through US borders. One individual even reported some of the call history on her cell phone had been deleted.

“The Fourth Amendment protects us all against unreasonable government intrusions,” the letter, which was also signed by the Center for Democracy and Technology and security expert Bruce Schneier, states. “But this guarantee means nothing if CBP can arbitrarily search and seize our digital information at the border and indefinitely store and reuse it.”

Several of the groups are also providing advice to US-bound travelers carrying electronic devices. The Association of Corporate Travel Executives is encouraging members to remove photos, financial information and other personal data before leaving home. This is good advice even if you’re not traveling to the US. There is no reason to store five years worth of email on a portable machine.

In this posting, the EFF agrees that laptops, cell phones, digital cameras and other gizmos should be cleaned of any sensitive information. Then, after passing through customs, travelers can download the data they need, work on it, transmit it back and then digitally destroy the files before returning.

The post also urges the use of strong encryption to scramble sensitive data, although it warns this approach is by no means perfect. For one thing, CBP agents are free to deny entry to travelers who refuse to divulge their passwords. They may also be able to seize the laptop.

If it sounds like a lot of work, consider this: so far, the federal government has refused to reveal any information about border searches, including what it does with the electronic data it seizes. Under the circumstances, there’s no way of knowing what will happen to, say, source code or company memos that may get confiscated. Or the email sent to your lawyer.

By Dan Goodin in San Francisco
Published Thursday 1st May 2008 21:11 GMT

Source: The Register

FEMA To Help Run 8-Day Disaster & Terror Drill

FEMA announced recently that they will be conducting a national disaster exercise called National Level Exercise 2-08 (NLE 2-08) from May 1st through May 8th. The purpose of this exercise is to prepare and respond to multiple incidents including natural disasters and terrorist incidents. Specifically the exercise involves a Category 4 hurricane impacting the Mid Atlantic Coast and the National Capitol Region as well as multiple terrorist attacks in Washington State, an accidental chemical agent release in Oregon and assorted aerospace events in North American airspace. Considering that the U.S. government conducted drills and exercises like Operation Northern Vigilance, Tripod II, among others to serve as cover for the government sponsored false flag terror attacks of 9/11, we need to pay close attention to these government sponsored drills and exercises. A similar scenario also occurred during the 7/7 terror attacks in London. On that day, drills depicting events mirroring the actual terror attacks were run at the exact same time the bombings took place. The odds of these being two completely random events is so incredibly unlikely that it boggles the mind. NLE 2-08 is a wide ranging exercise that will include not only FEMA but the Department of Homeland Security, U.S. Transportation Command, the National Guard, USNORTHCOM, NORAD and Canada Command. Much like TOPOFF-4/Vigilant Shield 08 a martial law exercise that took place last year involving many of the same government institutions, we definitely need to keep track of NLE 2-08.

Below is taken from FEMA’s press release on this upcoming drill.

Read moreFEMA To Help Run 8-Day Disaster & Terror Drill

FLDS RAID: DANGEROUS LEGAL PRECEDENT

I waited a week to comment on the Texas case, separating 437 children from their FLDS parents, to see if any substantive evidence of abuse would emerge. It hasn’t. Even if it had, those could have been handled individually. But no, Texas plans instead to make every member of the group pay the supreme price: to strip away their beloved children. This case is about group punishment. In spite of a search warrant tainted by a false witness (the “Sarah” who doesn’t exist), no actual specific evidence of abuse, or any unwilling participants in this polygamous compound, a self-righteous Texas judge had decreed that all 400 + children will not be returned to the custody of their parents. Texas has gone too far to rid itself of this awkward religious sect that built the “Yearning for Zion” (YFZ) ranch in order to evade persecution in Utah and Arizona.

As this tyrannical order clearly meant separating even nursing children from their mothers, a wave of outrage began to sweep the nation. The media-savvy judge immediately changed her order (allowing children under 1 year if age to be nursed) in order to keep the tide of public relations on the side of the authorities. But this should not deter the nation from realizing the danger of the tenuous legal proposition that mere membership in a group (that may have isolated examples of marrying underage girls) makes all unworthy of possessing any children at all–ever. That is wrong, especially when legal remedies exist to prosecute specific wrongdoers.

The local sheriff admitted on television that he had an “informant” on the inside for over 4 years. That was probably a disgruntled member of the group who decided to stay on to build up a case against his fellow church members. If a case can’t be built after four years of informing, and authorities have to rely on a false abuse phone call to justify this invasion, what does that say about the State’s case?

Read moreFLDS RAID: DANGEROUS LEGAL PRECEDENT

Watching How We Are Watched

The Wrong Way To Carry Out Video Surveillance in D.C.

For more than five years, security experts and privacy advocates have praised the public video surveillance network operated by the D.C. police department as the model of a well-balanced system. The department has adopted a set of common-sense regulations for its 91 cameras that give police access to footage when they need it while protecting the privacy rights of the millions who live or work in Washington.

We were greatly disappointed, then, to hear Mayor Adrian M. Fenty and Darrell Darnell, director of the D.C. Homeland Security and Emergency Management Agency, announce plans this month [front page, April 10] to centralize monitoring of more than 5,000 cameras, including those in and around our schools, public housing and residential neighborhoods. Even worse, it appears that Darnell’s office has no plans to apply the D.C. police department’s best-in-the-nation safeguards.

In February, the D.C. police released a report evaluating the successes and failures of the video surveillance system. The report concluded that since the network was expanded into residential areas, some types of crime have declined in those neighborhoods. The department was applauded for undertaking an examination of its own system: A public account of how a video surveillance system affects the lives of a city’s residents promotes accountability. Sadly, the reporting requirement is one that may be scrapped as the D.C. police department loses control of the network.

Unchecked video surveillance invades individual privacy rights. People in public spaces routinely engage in activities that they expect and desire to keep private. For example, consider attending an Alcoholics Anonymous meeting or seeking treatment at a fertility clinic — legal and private activities — while faceless individuals track your movements. This is an area in which the law has not kept pace with rapidly changing technology. We need well-reasoned guidelines to protect the privacy rights of individuals in the face of emerging surveillance tools.

Read moreWatching How We Are Watched

The Police Disguises Cameras As Fire Hydrants

It’s like something dreamed up by East Germany’s Stasi.

In Florida, Sheriff Sgt. Ken Sonier “watches those who don’t want to be seen,” according to News-Press. Of course, in a healthy, non-brainwashed society most us would not take kindly to being watched, no matter the reason, but in the post-9/11 world far too many of us have bought into the idea we are somehow obliged to surrender our privacy in order to combat the terrorists, never mind we don’t have a good idea who the terrorists are. Fox News now tells us they have blond hair and blue eyes.

Sonier and the Lee County cops are busy installing “custom-made cameras” in fire hydrants, on exit signs in apartment buildings, and metal underneath cars. “Citizens don’t know what we do,” bragged Lee County Sheriff Lt. Gary Desrosiers of the Technical Investigations Unit. “And that’s a good thing.” It was presumably a good thing in East Germany, too, or so the fascist control freaks who once ran that country no doubt believed.

“The annual budget for the TIU is about $10 million, but that includes salaries and maintenance on all the department’s cell phones, laptops and equipment. Most of the equipment purchased is with federal grants.” More specifically, Department of Homeland Security grants.

“In Cape Coral, police accepted a $50,000 grant from the Department of Homeland Security to purchase a Video Detective. It is capable of recording audio, video and stills from blocks away and can clean up images and sound recordings turned in as evidence. Now grainy footage of a bank robbery suspect becomes as clear as a yearbook photo.”

Read moreThe Police Disguises Cameras As Fire Hydrants

Secret FEMA Plan To Use Pastors as Pacifiers in Preparation For Martial Law


Nationwide initiative trains volunteers to teach congregations to “obey the government” during seizure of guns, property, forced inoculations and forced relocation

A Pastor has come forward to blow the whistle on a nationwide FEMA program which is training Pastors and other religious representatives to become secret police enforcers who teach their congregations to “obey the government” in preparation for a declaration of martial law, property and firearm seizures, and forced relocation.

In March of this year the Pastor, who we shall refer to as Pastor Revere, was invited to attend a meeting of his local FEMA chapter which circulated around preparedness for a potential bio-terrorist attack, any natural disaster or a nationally declared emergency.

The FEMA directors told the Pastors that attended that it was their job to help implement FEMA and Homeland Security directives in anticipation of any of these eventualities. The first directive was for Pastors to preach to their congregations Romans 13, the often taken out of context bible passage that was used by Hitler to hoodwink Christians into supporting him, in order to teach them to “obey the government” when martial law is declared.

It was related to the Pastors that quarantines, martial law and forced relocation were a problem for state authorities when enforcing federal mandates due to the “cowboy mentality” of citizens standing up for their property and second amendment rights as well as farmers defending their crops and livestock from seizure. It was stressed that the Pastors needed to preach subservience to the authorities ahead of time in preparation for the round-ups and to make it clear to the congregation that “this is for their own good.”

Read moreSecret FEMA Plan To Use Pastors as Pacifiers in Preparation For Martial Law

Justice Dept. Details Program for Collecting DNA From People in Federal Custody

The Bush administration moved forward on Friday with a program to expand collecting DNA samples from people in federal custody.

But it was unclear how federal laboratories would be able to handle the added work.

The Justice Department formally proposed regulations for collecting the samples, a technique that essentially mirrors taking the fingerprints of people arrested for federal offenses, as well as illegal immigrants detained by federal authorities.

The government now collects DNA just from felons. DNA, the genetic marker found in hair and blood and other body fluids, can provide a more concrete link to a crime than fingerprints, which often are not left at a crime scene or are difficult to collect.

For the new effort to succeed, the samples, most collected by swabbing an inside cheek, have to be entered into the DNA database of the F.B.I.

A spokeswoman for the bureau’s laboratory, Ann Todd, said it already had a backlog of 225,000 samples to be processed, a more complex procedure than entering fingerprints.

If Justice Department estimates are accurate, work at the laboratory would increase twelvefold, Ms. Todd said.

Read moreJustice Dept. Details Program for Collecting DNA From People in Federal Custody

Chertoff Says Fingerprints Aren’t ‘Personal Data’

Our guest blogger, Peter Swire, is a senior fellow at the Center for American Progress and served as the Clinton Administration’s Chief Counselor for Privacy.

Homeland Security Secretary Michael Chertoff has badly stumbled in discussing the Bush administration’s push to create stricter identity systems. Chertoff was recently in Canada discussing, among other topics, the so-called “Server in the Sky” program to share fingerprint databases among the U.S., Canada, the U.K., and Australia.

In a recent briefing with Canadian press (which has yet to be picked up in the U.S.), Chertoff made the startling statement that fingerprints are “not particularly private”:

QUESTION: Some are raising that the privacy aspects of this thing, you know, sharing of that kind of data, very personal data, among four countries is quite a scary thing.

SECRETARY CHERTOFF: Well, first of all, a fingerprint is hardly personal data because you leave it on glasses and silverware and articles all over the world, they’re like footprints. They’re not particularly private.

Many of us should rightfully be surprised that our fingerprints aren’t considered “personal data” by the head of DHS. Even more importantly, DHS itself disagrees. In its definition of “personally identifiable information” — the information that triggers a Privacy Impact Assessment when used by government — the Department specifically lists: “biometric identifiers (e.g., fingerprints).”

Chertoff’s comments have drawn sharp criticism from Jennifer Stoddart, the Canadian official in charge of privacy issues. “Fingerprints constitute extremely personal information for which there is clearly a high expectation of privacy,” Stoddart said.

There are compelling reasons to treat fingerprints as “extremely personal information.” The strongest reason is that fingerprints, if not used carefully, will become the biggest source of identity theft. Fingerprints shared in databases all over the world won’t stay secret for long, and identity thieves will take advantage.

A quick web search on “fake fingerprints” turns up cheap and easy methods for do-it-at-home fake fingerprints. As discussed by noted security expert Bruce Schneier, one technique is available for under $10. It was tried “against eleven commercially available fingerprint biometric systems, and was able to reliably fool all of them.” Secretary Chertoff either doesn’t know about these clear results or chooses to ignore them. He said in Canada: “It’s very difficult to fake a fingerprint.”

Chertoff’s argument about leaving fingerprints lying around on “glasses and silverware” is also beside the point. Today, we leave our Social Security numbers lying around with every employer and numerous others. Yet the fact that SSNs (or fingerprints) are widely known exposes us to risk.

There have been numerous questions raised about how this Administration is treating our personal information. Secretary Chertoff’s comments show a new reason to worry — they don’t think it’s “personal” at all.

Peter Swire

Source: thinkprogress.org

Nuclear attack on D.C. a hypothetical disaster

A nuclear device detonated near the White House would kill roughly 100,000 people and flatten downtown federal buildings, while the radioactive plume from the explosion would likely spread toward the Capitol and into Southeast D.C., contaminating thousands more.

The blast from the 10-kiloton bomb – similar to the bomb dropped over Hiroshima during World War II – would kill up to one in 10 tourists visiting the Washington Monument and send shards of glass flying the length of the National Mall, in a scenario that has become increasingly likely to occur in a major U.S. city in recent years, panel members told a Senate committee yesterday.

“It’s inevitable,” said Cham E. Dallas, director of the Institute for Health Management and Mass Destruction Defense at the University of Georgia, who has charted the potential explosion’s effect in the District and testified before a hearing of the Senate Committee on Homeland Security and Governmental Affairs. “I think it’s wistful to think that it won’t happen by 20 years.”

(What is this article about? Preparing the people for what is coming. – The Infinite Unknown)

Read moreNuclear attack on D.C. a hypothetical disaster

Administration Set to Use New Spy Program in U.S.

The Bush administration said yesterday that it plans to start using the nation’s most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea’s legal authority.

Homeland Security Secretary Michael Chertoff said his department will activate his department’s new domestic satellite surveillance office in stages, starting as soon as possible with traditional scientific and homeland security activities — such as tracking hurricane damage, monitoring climate change and creating terrain maps.

Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. The department has previously said the program will not intercept communications.

Read moreAdministration Set to Use New Spy Program in U.S.

Homeland Security invokes nuclear bomb, as Bush quietly links cybersecurity program to NSA

Department of Homeland Security Michael Chertoff has dropped the bomb.

At a speech to hundreds of security professionals Wednesday, Chertoff declared that the federal government has created a cyber security “Manhattan Project,” referencing the 1941-1946 project led by the Army Corps of Engineers to develop American’s first atomic bomb.

According to Wired’s Ryan Singel, Chertoff gave few details of what the government actually plans to do.

He cites a little-noticed presidential order: “In January, President Bush signed a presidential order expanding the role of DHS and the NSA in government computer security,” Singel writes. “Its contents are classified, but the U.S. Director of National Intelligence has said he wants the NSA to monitor America’s internet traffic and Google searches for signs of cyber attack.”

The National Security Agency was the key player in President Bush’s warrantless wiretapping program, which was revealed by the New York Times in 2005.

Sound familiar? Yesterday, documents acquired by the Electronic Frontier Foundation under the Freedom of Information act showed the FBI has engaged in a massive cyber surveillance project that targets terror suspects emails, telephone calls and instant messagesand is able to get some information without a court order.

Last week, the ACLU revealed documents showing that the Pentagon was using the FBI to spy on Americans. The military is using the FBI to skirt legal restrictions on domestic surveillance to obtain private records of Americans’ Internet service providers, financial institutions and telephone companies, according to Pentagon documents.

Read moreHomeland Security invokes nuclear bomb, as Bush quietly links cybersecurity program to NSA

Controversy: Mercenaries Training US Local Police Officers

There are many police and law enforcement officials who are concerned with the growing trend of using military-trained mercenaries to train and work with local police officers in the United States, but there are many who believe the events of September 11, 2001 dictate the need for a new paradigm.

For example, Kentucky’s Lexington Police Department contracted Blackwater Security International to provide what’s described as homeland security training. Meanwhile that city’s Mayor Jim Newberry and its chief of police Anthony Beatty refused free training provided by the US Immigration and Customs Enforcement federal program that prepares police officers to enforce immigration and border security as part of their duties.

Lexington is on the nation’s list of so-called Sanctuary Cities in which police officers are prohibited from working with ICE or Border Patrol agents in the United States. Critics are angry over the use of local tax dollars to hire Blackwater personnel to train the police.

But Lexington isn’t the only city using hired guns to help local police officers. In New Orleans, heavily armed operatives from the Blackwater private security firm, infamous for their work in Iraq, are openly patrolling the streets of that beleaguered city.

Some of the mercenaries were reportedly “deputized” by the Louisiana governor and were issued gold Louisiana State law enforcement badges to wear on their chests and Blackwater photo identification cards to be worn on their arms.

While they are working in Louisiana, Blackwater officials say they are on contract with the Department of Homeland Security and have been given the authority to use lethal force if necessary. Some of the mercenaries assigned to patrol the streets of New Orleans recently returned from Iraq, where they provided personal security details for the former head of the US occupation, L. Paul Bremer, and the former US ambassador to Iraq, John Negroponte.

Read moreControversy: Mercenaries Training US Local Police Officers

Homeland Ministry Plans Raytheon “Ray Guns” at Airports

The DHS, affectionately called the “Ministry” here because it resembles something out of Orwell’s famous novel, wants to fit airports with ray guns. I kid you not. “The US Department of Homeland Security (DHS) will consider fitting high-power microwave electropulse rayguns at US airports, in order to defend against the threat of terrorists firing portable anti-aircraft missiles at airliners,” reports Lewis Page for The Register. “American defense heavyweight Raytheon would partner with Israel’s Rafael and Kongsberg of Norway to provide the technology, according to a report in Flight International. The proposed kit is known as ‘Vigilant Eagle’, and is competing for DHS securo-dollars with defensive systems that could be fitted to the airliners themselves – for instance BAE Systems’ JetEye.”

Okay, tell me this does not sound like another “defense industry” scam, yet another scheme to make billions of dollars. Sure, there is the possibility somebody with a rocket launcher may take out an airliner. But if al-Qaeda hates our freedom, why haven’t’ they done this already? Is al-Qaeda conducting a war against the Great Satan, one with battles strung over decades? At this rate, it will take a thousand years to install the Great Caliph/Khalifah.

Read moreHomeland Ministry Plans Raytheon “Ray Guns” at Airports

DHS reckons US cops’ access to sat-surveillance is go

US Homeland Security overlord Michael Chertoff has told reporters that he believes plans for increased use of satellite surveillance by American law-enforcement agencies are ready to move forward. However, Democratic politicians remain unconvinced that adequate privacy and civil liberties safeguards are in place.

“I think the way is now clear to stand NAO up and go warm,” said Chertoff, briefing journalists about the proposed National Applications Office.

NAO would allow US police, immigration, drug-enforcement and other officials to have access to data from various US satellites passing above America. It is understood that the information would be supplied mostly by spacecraft which at the moment are used for meteorological and geological surveying, or other scientific tasks. Satellites of this type can often deliver high-resolution images which would also be useful to law enforcement.

Read moreDHS reckons US cops’ access to sat-surveillance is go

U.S. spy agency seeks data on power grid

WASHINGTON, March 28 (UPI) — The agency that manages data from U.S. spy satellites is exploring ways to map the nation’s entire electric grid as part of efforts to protect infrastructure.

(It’s all about controlling the infrastructure in the coming events, nothing else. – The Infinite Unknown)

Read moreU.S. spy agency seeks data on power grid