Exclusive: If we don’t fight, TSA-like security coming to ‘sidewalks,’ ‘football games,’ Texas Rep. warns
The lawmaker behind a bill Texas that would levy felony charges against overly-touchy security personnel may be staunchly Republican, but he truly believes his cause isn’t one tied to the political left or right.
“We’re talking about what would be a criminal act in any other place,” Rep. David Simpson (R) told Raw Story on Monday. “If you viewed someone naked without their permission or consent, or as a condition of travel, it would be sexual harassment or vouyerism. If you touched people’s privates, that would be sexual assault.
“This is not a left or right issue,” he added. “They are treating American citizens with great indignity, and we’ve got to make this right.”
Though unlikely to pass — even with a GOP supermajority in the Texas legislature — Simpson’s proposal has become a cause célèbre for civil libertarians, many of whom adamantly oppose the TSA’s screening procedures.
The bill would amend a Texas statute pertaining to “the offensive touching of persons,” extending it to security personnel who conduct a search “without probable cause.”
That’s actually the exact wording used in the Constitution in the section outlining prohibitions on unreasonable search and seizure. The legal standard for a lawful search is probable cause: a requirement that law enforcement must meet before most judges will issue search warrants.
The bill specifies that “offensive” touching which takes place as “part of a search performed to grant access to a publicly accessible building or form of transportation” would be treated as a state jail felony.
“I have broad bipartisan support for the bill — at least seven Democrats, and one’s a joint author,” Simpson said. “There’s about 22 other people already signed on too.”
‘Traveling is not a criminal act’
“What we’re saying here is, these bureaucrats have gone too far,” he continued. “We’re not against national defense; we’re not against security. We just don’t want to do it at the expense of our liberties. The terrorists want to take away our liberties and here we have our very own government terrorizing innocent travelers. Traveling is not a criminal act. You need probable cause [to conduct a search].
“Unless there’s reason to believe someone has an explosive or intends to commit a criminal act, you shouldn’t be treating them as a criminal and that’s what we’re doing. It’s un-American and it needs to stop. C.S. Lewis once wrote … that tyranny exercised for the good of its victims may be the most oppressive, and I agree with him. They’re trying to make us think we’re safer, but we’re not.”
Simpson added that children and amputees are especially vulnerable, and frequently singled out by TSA agents.
“Having a child unzip their pants in public, or even in private, should never happen,” he said. “It should not happen, period.”
“Sexual assault should always be a criminal act. How are we protecting our businesses outside the industry? They have cameras, they have locks and in some cases they have guns. I’m for letting the airlines determine the best method. I think you’ll have some that want to compete.”
“It needs to stop somewhere,” he insisted. “If we don’t nip this thing in the bud it’s gonna come to our sidewalks, to our football games. The DHS was considering as recent as five years ago doing covert scanning of the public, but they’ve denied pursuing that any further. That they would consider it shows they have no regard for the Fourth Amendment.”
A spokesperson with the Department of Homeland security refused to comment on the pending legislation, but noted that in many cases still, state laws do not trump the federal government.
The bill’s text was available online.
A similar bill by the same author, which would restrict the TSA’s use of backscatter x-ray machines, was also available online.
Published on 10-21-2010
Source: New York Times
WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil.
The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.
Under the new rules, the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.
Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should the military take over such domestic operations.
The perverse coupling of surveillance and exhibitionism forms a cornerstone of American technocracy. Most Americans, be they liberals or libertarians, are unnerved by government agents, corporate data-miners, or high-tech Peeping Toms probing their personal details. And yet invasive, weirdly intimate technologies multiply like digital cockroaches, all but devouring the expectation of privacy taken for granted only a generation ago. Progress is simply too en vogue to resist.
Reality television brings a glamorous air to perpetual surveillance. The genre has enjoyed immense popularity over the last decade—comprising nearly a fifth of new broadcast programs this season—with cameramen poking into American life’s every facet. From moneyed luxury’s heights to the working-class struggle’s dregs, everyone’s in line for their 15 minutes of fame.
Consequently, the art of living on film is continually refined. But the recent success of TLC’s Sister Wives sounds an ominous warning as to who may be watching behind the camera’s prying eye. Immediately after the show’s premiere—which revealed a renegade Mormon polygamist’s fecund lifestyle—Utah authorities launched an investigation on Kody Brown and his four wives, with bigamy charges pending.
The risk of one’s private life going public is all-too-familiar to celebrities and politicians, but these days everyone gets their chance to shine in the searchlight. Social networks, YouTube, Twitter, and the blogosphere have captured and amplified a narcissistic culture of exhibition. Driven by Mark Zuckerberg’s philosophy that “a world that’s more open and connected is a better world,” Facebook now claims over 500 million users—making it the world’s third most-populous “nation.” In less than two decades, it became normal to display one’s personal details online—from romantic relationships and family photos to political affiliation and business activities. Even if you choose not to have your personality digitized, chances are that someone you know will do it for you. AVG Security estimates that 92% of American babies have their picture on the Internet. Anonymity is practically dead, with a Facebook memorial in the online graveyard.
Aside from being a smorgasbord for typical stalkers—and be honest, who hasn’t gone profile-trolling?—social networking also has market analysts and government agents licking their chops. It has become a common practice for law-enforcement agencies—from the Boston PD to the Department of Homeland Security—to “friend” suspect individuals and monitor their posts. If investigators want to dig deeper, our electronic communications’ trusted stewards—AT&T, Google, Yahoo!, Verizon, etc.—regularly provide access to private communications under the Patriot Act. On the corporate end, The Wall Street Journal recently examined the unethical activities of Web-based “listening services” that scrape forums for biographical information—including sensitive medical issues such as HIV, depression, and impotence—to craft more effective marketing techniques apparently geared toward human frailties. Illicit scraping aside, the practice of selling a client’s “anonymized” personal information is now routine. Inquiring minds want to know, and they know whom to ask.
“Just as the religious man learns to accept the fact that God watches his every move, so may the child of technocracy consider the Electric Eye to be a normal aspect of modern life.”
And who could blame them? For entities that depend on psychological profiling to investigate and manipulate an otherwise inscrutable population—authority figures whose sympathies rarely lie with nonconformity or dissent—the human soul’s digitization is a dream come true. Whether we pour our deepest selves into public profiles or private emails, our personal lives have become fodder for cybersharks.
Wired magazine covers a vast array of disturbing digital-surveillance projects. For instance, In-Q-Tel—the CIA’s investment arm—recently teamed up with Google to fund Recorded Futures. Like Visible Technologies before it, Recorded Futures crawls “open source” Web information—sites, blogs, news outlets, Twitter accounts, etc.—for patterns of interest. Along with monitoring current activities, Recorded Futures has the ambitious goal of predicting future behaviors based on “invisible links” between individuals and organizations. Though presumably directed toward noble goals such as combating terrorism and organized crime, the overarching scale of the analysis allows for more questionable directions. For an agency that has historically sought to infiltrate disruptive political movements and initiate disinformation campaigns, the possibilities are phenomenal. But why would Google, whose support of Obama’s tech-savvy campaign is a matter of public record, be involved? Their candid CEO, Eric Schmidt, says of his search users: “They want Google to tell them what they should be doing next.”
While it is hardly surprising that intelligence agencies would want to gather intelligence, a conscientious citizen can only be as comfortable with corporate surveillance and government’s growing powers as his or her good faith will allow. Not that anyone is asking permission.
The Google “WiSpy” scandal that came to light last May hardly inspires confidence. Apparently, their Street View vehicles gathered more than uninvited photographs as they patrolled the Western world’s every inch. Since 2007, they’ve been scooping up “payload data,” including web-surfing activity and private emails, from open Wi-Fi networks. When the German government pressed them for an explanation, Google claimed it was all a big “mistake” and insisted they will delete the data—unlike their Gmail account holders’ detailed profiles.
When Eric “Don’t Be Evil” Schmidt says, “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about,” you can be sure that he means it. Given the ambiguous (at best) motives of history’s most powerful individuals, I find these developments quite chilling.
Add to this surveillance cameras’ proliferation in public areas—tens of thousands in New York City, half a million in London’s “ring of steel,” cameras on traffic lights nationwide, in shopping malls, in nightclubs, in schools, in nurseries—and you get the funny feeling that you’re being watched.
Of course, it is practically impossible for all of these cameras to be monitored effectively. Unless you could somehow entice private citizens to assist in the process…
On October 4, Internet Eyes went live in the UK. The program’s participants—13,000 so far—are given access to CCTV feeds of retail outlets nationwide. Their mission is to spot shoplifters and antisocial behavior. A £1,000 prize is offered for the snoop with the most busts. If the program is successful, perhaps average citizens could be enlisted for other mass-surveillance projects. Of course, high-tech surveillance equipment has been marketed to the general public for years. Aside from office security cameras, popular Internet monitoring software—with clever names such as SpyAgent, SpecterPro, and IamBigBrother—enables any corporate manager to sift through his employees’ emails and Web searches.
For the average Joe, companies such as BrickHouse Security offer a wide range of equipment for DIY spook operations. Anyone can order high-resolution cameras disguised as common electrical outlets, air filters, smoke detectors, or sunglasses—all for $200. You can watch your kids, your spouse, or the guy next door. Every week a new perv gets caught installing recording devices in a women’s bathroom. So what are the chances that some weirdo has filmed your bodily functions in action—picking your nose, having sex, or vigorously masturbating in a hotel room? Think of it this way: How many people have a burning curiosity and 200 bucks to blow?
Even if you don’t mind Big Brother watching you, the swarms of Little Brothers in His shadow ought to ring your alarm bells. Or maybe you don’t care. Maybe you’ve been told to smile for the camera since you were knee-high to a tripod. Group photos mean friendship, and sex tapes make you famous. Just as the religious man learns to accept the fact that God watches his every move, so may the child of technocracy consider the Electric Eye to be a normal aspect of modern life.
I would never be so paranoid as to insist that every watcher behind the camera is purely evil. To the extent that technology is neutral, a surveillance state’s rise is only as insidious as the uses to which it is put. After all, who would argue against identifying criminals, improving products, or securing personal property?
And yet, as I contemplate undesirable citizens’ fate during the 20th century’s herd-culling upheavals—Hitler’s Germany, Stalin’s Russia, Mao’s China, or Pol Pot’s Cambodia—the unprecedented ability to cultivate public opinion in real time, while tracking otherwise anonymous individuals, lifts my neck hairs. Big Brother is a silent observer in an era of tolerance and open discourse. But if the national mood is consumed by distrust and volatility, the All-Seeing Eye may burn right through you.
Most people in the independent research communities are well aware of P.N.A.C, the neo-con think tank Project for a New American Century. Headed once by Dick Cheney and fueled by Fox News, no “disbanded” think tank was able to predict the future like P.N.A.C. In September of 2000 they released a manifesto for “Transformation of America”, and after the cold ended with the biggest arms race in human history, they thought it was the perfect time to radically “Transform” the military and start a new arms race. Technology.
Most people who are familiar with this subject all remember the same thing, the founding principle:
The history of the 20th century should have taught us that it is important to shape circumstances before crises emerge, and to meet threats before they become dire. The history of the past century should have taught us to embrace the cause of American leadership.”
– From the Project’s founding Statement of Principles Project for a New American Century
On page 51 of the document states the true of “Transformation” and how it need to be thrust upon the country in its darkest hour:
Further, the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event – like a new Pearl Harbor. Domestic politics and industrial policy will shape the pace and content of transformation as much as the requirements of “current missions”.
One year to the month P.N.A.C got their “Christmas Wish List” on the night of 9.11.10. Maybe we should look and see what they didn’t get but intend to, as it is the most “top secret” mission. On the same page as the “new Pearl Harbor”, page 51, it reads:
• Control of space and cyberspace. Much as control of the high seas – and the protection of international commerce – defined global powers in the past, so will control of the new “international commons” be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the “infosphere” will find it difficult to exert global political
• Pursuing a two-stage strategy for of transforming conventional forces. In exploiting the “revolution in military affairs,” the Pentagon must be driven by the enduring missions for U.S. forces. This process will have two stages: transition, featuring a mix of current and new systems; and true transformation, featuring new systems, organizations and operational concepts. This process must take a competitive approach, with services and joint-service operations competing for new roles and missions. Any successful process of transformation must be linked to the services, which are the institutions within the Defense Department with the ability and the responsibility for linking budgets and resources to specific missions.
The “revolution in military affairs” was 9.11.01, all the people who shut up were rewarded…. while the real hero’s like Lt. Col. Anthony Shaffer were humiliated and nearly had their lives destroyed by hurting his family with “disgrace”. Thankfully for the Shaffer family, the D.O.D.’s “disgrace” is God’s “Grace” and they were restored as the American Hero’s, this time the entire family.
The problem we are facing now is the Left/Right paradigm, and the illusion of control. There is a vital reason many people don’t read the entire “Rebuilding America’s Defenses” document, its long and boring, like Government… which by is supposed to be a “capitol” letter like the G in “God” or in “god we trust”, a “trust” is money… why do you think Jesus turned over the “money changer’s” table? Money is the root of all evil, that why it is green the color of “envy” of what? Nature… something “globalists” are now trying to control. Computers are starting to fail in this control. There is one thing that P.N.A.C. was clear about it was their own “fear”. The Enter Net or The Enter Web… to “them” it was getting out of control.
The most important section of the manifesto are entitled “Cyberpace, or ‘Net-War’”, where they decide to classify ‘outer space” and ‘cyber space’ as to be governed by the same laws and tactics of control.
If outer space represents an emerging
medium of warfare, then “cyberspace,” and
in particular the Internet hold similar
promise and threat. And as with space,
access to and use of cyberspace and the
Internet are emerging elements in global
commerce, politics and power. Any nation
wishing to assert itself globally must take
account of this other new “global
The Global Commons is now under attack from binary code. All of this is happening as the SPACECOM is testing the take over viruses to see if they can survive it. What was P.N.A.C. so afraid of? The Enter Net.
‘U.S. armed forces to remain
preeminent and avoid an Achilles Heel in
the exercise of its power’
The Internet is also playing an increasingly important role in warfare and human political conflict. From the early use of the Internet by Zapatista insurgents in Mexico to the war in Kosovo, communication by computer has added a new dimension to warfare. Moreover, the use of the Internet to spread computer viruses reveals how easy it can be to disrupt the normal functioning of commercial and even military computer networks. Any nation which cannot assure the free and secure access of its citizens to these systems will sacrifice an element of its sovereignty and its power. Although many concepts of “cyber-war” have elements of science fiction about them, and the role of the Defense Department in establishing “control,” or even what “security” on the Internet means, requires a consideration of a host of legal, moral and political issues, there nonetheless will remain an imperative to be able to deny America and its allies’ enemies the ability to disrupt or paralyze either the military’s or the commercial sector’s computer networks. Conversely, an offensive capability could offer America’s military and political leaders an invaluable tool in disabling an adversary in a decisive manner.
Taken together, the prospects for space
war or “cyberspace war” represent the truly
revolutionary potential inherent in the notion
of military transformation. Page 57 Rebuilding America’s Defenses September 2000
Now we are beginning to see why the binary code makers are banding together to resist the machine, because they know how many numbers there are 10. The 10 Commands. The numbers are a warning system. Now the computer viruses are the being launched not by some 13 year old kid in China… but by “intel” agents around the world. Israeli Mossad taking the blame for the “Stuxnet” virus… Stuck Net…. come on who come up with this stuff?
More importantly for the U.S. the “Cyber-Storm” drill is completed on 10.01.10. Cheat codes for the internet?Start Slide Show with PicLens Lite
2010 Cyber Storm III global cybersecurity exercise concludes on 10.01.10: All of at this coinsides with Mossad release of ‘Stuxnet Virus’
In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the “network of networks,” but the ingenuity of the people charged with protecting it.
Welcome to Cyber Storm III.
This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.
Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.
Brett Lambo, the director of the Cybersecurity Exercise Program with DHS’s National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.
“The overarching philosophy,” he told reporters in a recent briefing at the NCCIC, “is that we want to come up with something that’s a core scenario, something that’s foundational to the operation of the Internet.”
Cyber Storm III includes many players in places across the U.S. and around the world:
* Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
* Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
* Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).
DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.
Lambo said to preserve the exercise’s value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.
“In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit,” he said. “But we wanted to take that up a level to say, ‘All of those things can still happen, and based on what you do, if you’re concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.’”
Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.
“In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we’re using the Internet to attack itself,” he said.
Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?
“What we’re trying to do is compromise that chain of trust,” he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.
Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.
“We have the ability to do what we call dynamic play,” he said. “If we get a player action coming back into the exercise that is either different from what we expected it to be, if it’s something we’d like to chase down further, or if it’s something we’d like to pursue, we have the ability to write injects on the fly.”
He said those injects could include new attacks.
The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.
For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS’ National Cyber Incident Response Plan.
“We want to focus on information sharing issues,:” he said. “We want to know how all of the different organizations are compiling, acting on, aggregating information that they’re sharing, especially when you’re thinking about classified lines coming into the unclassified domain. There’s a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it.”
The Cyber Storm III exercise is expected to conclude by 10.01.10
Was Stuxnet Built to Attack Iran’s Nuclear Program?
By Robert McMillan, IDG News
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran’s Bushehr nuclear reactor.
People who read this also read:
That’s the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they’ve broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker — possibly a nation state — and it was designed to destroy something big.
Though it was first developed more than a year ago, Stuxnet was discovered in July 2010, when a Belarus-based security company discovered the worm on computers belonging to an Iranian client. Since then it has been the subject of ongoing study by security researchers who say they’ve never seen anything like it before. Now, after months of private speculation, some of the researchers who know Stuxnet best say that it may have been built to sabotage Iran’s nukes.
Last week Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran’s Bushehr nuclear reactor. A Siemens expert, Langner simulated a Siemens industrial network and then analyzed the worm’s attack.
Experts had first thought that Stuxnet was written to steal industrial secrets — factory formulas that could be used to build counterfeit products. But Langner found something quite different. The worm actually looks for very specific Siemens settings — a kind of fingerprint that tells it that it has been installed on a very specific Programmable Logic Controller (PLC) device — and then it injects its own code into that system.
Because of the complexity of the attack, the target “must be of extremely high value to the attacker,” Langner wrote in his analysis.
Langner is set to present his findings at a closed-door security conference in Maryland this week, which will also feature a technical discussion from Siemens engineers. Langner said he wasn’t yet ready to speak to a reporter at length (“the fact of the matter is this stuff is so bizarre that I have to make up my mind how to explain this to the public,” he said via e-mail) but others who have examined his data say that it shows that whoever wrote Stuxnet clearly had a specific target in mind. “It’s looking for specific things in specific places in these PLC devices. And that would really mean that it’s designed to look for a specific plant,” said Dale Peterson, CEO of Digital Bond.
This specific target may well have been Iran’s Bushehr reactor, now under construction, Langner said in a blog posting. Bushehr reportedly experienced delays last year, several months after Stuxnet is thought to have been created, and according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet.
Peterson believes that Bushehr was possibly the target. “If I had to guess what it was, yes that’s a logical target,” he said. “But that’s just speculation.”
Langner thinks that it’s possible that Bushehr may have been infected through the Russian contractor that is now building the facility, JSC AtomStroyExport. Recently AtomStroyExport had its Web site hacked, and some of its Web pages are still blocked by security vendors because they are known to host malware. This is not an auspicious sign for a company contracted with handling nuclear secrets.
Tofino Security Chief Technology Officer Eric Byres is an industrial systems security expert who has tracked Stuxnet since it was discovered. Initially he thought it was designed for espionage, but after reading Langner’s analysis, he’s changed his mind. “I guessed wrong, I really did,” he said. “After looking at the code that Ralph hauled out of this thing, he’s right on.”
One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organizational Block 35. This Siemens component monitors critical factory operations — things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery’s centrifuge to malfunction, but it could be used to hit other targets too, Byres said. “The only thing I can say is that it is something designed to go bang,” he said.
Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.
Bushehr is a plausible target, but there could easily be other facilities — refineries, chemical plants or factories that could also make valuable targets, said Scott Borg, CEO of the U.S. Cyber Consequences Unit, a security advisory group. “It’s not obvious that it has to be the nuclear program,” he said. “Iran has other control systems that could be targeted.”
Iranian government representatives did not return messages seeking comment for this story, but sources within the country say that Iran has been hit hard by the worm. When it was first discovered, 60 percent of the infected Stuxnet computers were located in Iran, according to Symantec.
Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about
“The problem is not Stuxnet. Stuxnet is history,” said Langner in an e-mail message. “The problem is the next generation of malware that will follow.”
For the record I don’t think anything is going to happen with UFO’s on October 7-13, I think that they are conditioning us for an event in the future. Only the shadow knows.
A Tsunami of truth is beginning to trickle out of binary code across the net. It is not anything new, it was designed by DARPA to follow all patterns of “intelligence”. In result of that monolithic effort to create giant web that catches and stores all information, thousands of jobs created and billions of dollars spent to “transform” our nation and military in an effort to “connect the dots”. Did it work? At the same time the technology was coming online, our elected officials were dismantling the bill rights and beginning to pen a new “Declaration of the United Nations”.
Now we are being told by every one from Larry King to the Vatican that the Aliens are getting ready to make CONTACT. The internet is a buzz about the Vatican appointing ambassador to greet the “Aliens” if they arrived.
‘The Vatican and United Nations ready for Alien contact?
Lets first look at the United Nations new appointed position to the “United Nations Office for Outer Space Affairs” and the naming of Mazlan Othman to be Alien – UFO ambassador in case contact is made.
This United Nations office is responsible for promoting international cooperation in peaceful uses of outer space. UNOOSA is also going to be responsible for the implementation of the Secretary-General’s responsibilities under all international space laws. It also will be responsible for the United Nations Registry of Objects sent into Space as well.
Mazlan Othman is a Malaysian astrophysicist that will be the official “Greeter” to any contacted species from space. Some people would argue that this type of appointment should be the responsibility of a high ranking official such as a president of some other world leader, but this is a unanimous decision on the part of the united nations for this job to be carried out by Othman. She does have a background in science and other space related credentials like overseeing the Malaysian national space program, and she saw over the training and flight of Malaysia’s first astronaut. Mazlan Othmans job as within UNOOSA includes possible issues that may involve space technology, and the preparedness and protocols if an asteroid or comet was on a direct collision course with Earth. One U.N. peer out of the UK, a Professor Richard Crowther, said
“Ms. Othman is absolutely the nearest thing we have to a ‘take me to your leader’ person”.
Next I think I will touch on the Vatican and some of the things coming out of it.
This story is even strange for me to read. It seems the Vatican’s astronomer says he’d love to ‘baptize an alien’. Yes… You read that correctly. He wants to baptize an alien if we make contact. Dr Consolmagno, is the curator of the little known Pope’s meteorite collection, and he is a trained astronomer as well as a planetary scientist at none other than the Vatican’s own private observatory.’
Now with the return of V for public consumption and a new series that features a ringer for Obama and family. NBC’s EvEnt is a conspiracy based drama dealing with a secret “Alien Agenda” that the Obama character wants to tell the world and the CIA decides to attempt an assassination. The assassination attempt is NOT the EvEnt.
Now a ‘newly-published book by a retired NORAD officer predicts October 13, 2010 as the tentative date for a fleet of extraterrestrial vehicles to hover for hours over the earth’s principal cities. Author says the event to be the first in a series intended to avert a planetary catastrophe resulting from increasing levels of carbon-dioxide in the earth’s atmosphere dangerously approaching a “critical mass.”
Winnipeg, MB (PRWEB) September 13, 2010 — A newly-published 352-page book by a retired Air Force officer, Stanley A. Fulham, tentatively predicts October 13, 2010 as the date for a massive UFO display over the world’s principal cities. According to the author, the aliens will neither land nor communicate on that date; they are aware from eons of experience with other planets in similar conditions their sudden intervention would cause fear and panic.
The book, Challenges of Change (3rd ed.), reports this event will be the initial interaction in a process leading to mankind’s acceptance of the alien reality and technologies for the removal of poisonous gases from the earth’s atmosphere in 2015, if not sooner.’ New World Order Report
“Just before he [Wernher von Braun] died, he gave an interview to Carol Rosin, in which he basically said that in order to sustain the military-industrial complex that first a false threat of terrorists would be created and used on the public and then asteroids and finally a false alien threat.”
Wernher von Braun was a German-American rocket scientist, engineer and space architect, becoming one of the leading figures in the creation of rocket technology in Germany and the United States. He was a member of the Nazi party and a commissioned SS officer. Wernher von Braun was said to be the preeminent rocket engineer of the 20th century. After the war, he and some of his rocket team were taken to the United States as part of the then-secret Operation Paperclip. In 1955, ten years after entering the country, von Braun became a naturalized U.S. citizen. Von Braun worked on the US Army intermediate range ballistic missile (IRBM) program before his group was assimilated by NASA, under which he served as director of the newly formed Marshall Space Flight Center and as the chief architect of the Saturn V launch vehicle, the superbooster that propelled the Apollo spacecraft to the Moon. According to one NASA source, he is “without doubt, the greatest rocket scientist in history. His crowning achievement … was to lead the development of the Saturn V booster rocket that helped land the first men on the Moon in July 1969.” He received the 1975 National Medal of Science
U.S. Nuclear Weapons Have Been Compromised by Unidentified Aerial Objects
* Twitter Tweet This
* LinkedInShare on LinkedIn
* Facebook Share on Facebook
Wed Sep 15, 2010 11:44am EDT
U.S. Nuclear Weapons Have Been Compromised by Unidentified Aerial Objects
WASHINGTON, Sept. 15
Ex-military men say unknown intruders have monitored and even tampered with American nuclear missiles
Group to call on U.S. Government to reveal the facts
WASHINGTON, Sept. 15 /PRNewswire-USNewswire/ — Witness testimony from more than 120 former or retired military personnel points to an ongoing and alarming intervention by unidentified aerial objects at nuclear weapons sites, as recently as 2003. In some cases, several nuclear missiles simultaneously and inexplicably malfunctioned while a disc-shaped object silently hovered nearby. Six former U.S. Air Force officers and one former enlisted man will break their silence about these events at the National Press Club and urge the government to publicly confirm their reality.
One of them, ICBM launch officer Captain Robert Salas, was on duty during one missile disruption incident at Malmstrom Air Force Base and was ordered to never discuss it. Another participant, retired Col. Charles Halt, observed a disc-shaped object directing beams of light down into the RAF Bentwaters airbase in England and heard on the radio that they landed in the nuclear weapons storage area. Both men will provide stunning details about these events, and reveal how the U.S. military responded.
Captain Salas notes, “The U.S. Air Force is lying about the national security implications of unidentified aerial objects at nuclear bases and we can prove it.” Col. Halt adds, “I believe that the security services of both the United States and the United Kingdom have attempted—both then and now—to subvert the significance of what occurred at RAF Bentwaters by the use of well-practiced methods of disinformation.”
The group of witnesses and a leading researcher, who has brought them together for the first time, will discuss the national security implications of these and other alarmingly similar incidents and will urge the government to reveal all information about them. This is a public-awareness issue.
Declassified U.S. government documents, to be distributed at the event, now substantiate the reality of UFO activity at nuclear weapons sites extending back to 1948. The press conference will also address present-day concerns about the abuse of government secrecy as well as the ongoing threat of nuclear weapons.
WHO: Dwynne Arneson, USAF Lt. Col. Ret., communications center officer-in-charge
Bruce Fenstermacher, former USAF nuclear missile launch officer
Charles Halt, USAF Col. Ret., former deputy base commander
Robert Hastings, researcher and author
Robert Jamison, former USAF nuclear missile targeting officer
Patrick McDonough, former USAF nuclear missile site geodetic surveyor
Jerome Nelson, former USAF nuclear missile launch officer
Robert Salas, former USAF nuclear missile launch officerStart Slide Show with PicLens Lite
10.10.10 – Humanity’s Date with Destiny: “The Inauguration of a New Civilization” The Power of One invites all 4YG allies to the inaugural event marking the beginning of Humanity’s new, unfolding story. On October 10th 2010, you can become part of the founding family of a new civilization
n Washington DC and worldwide, we will start changing the course of history by collectively declaring our commitment to build the future our hearts know is possible. And, that’s just the beginning.
As 4YG allied organizations, we have already answered the call to change the course of history in the next four years. Now that we have answered the call, it is time to harness our energy to initiate the collective will of the world to do the same. Indeed, the collective will is all that is missing—we have the reason, the vision, the power, and the technology to create the new world.
Let us show the world that a small group of people can change the course of human history, that the energy of such a small group can expand exponentially to jumpstart a global movement, and that this movement can inspire a necessary global declaration that we are:
* Committed to the survival and evolution of the human species and all life on earth…
* Willing to mark the passing of a civilization that threatens our survival…
* Ready to create the new world together.
On this day, we will bring together the collective power of people via aligned events taking place on the same day throughout the world which announce the beginning of humanity’s new unfolding story of a saner world that truly works for the good of all. Will you join us?
Read The Declaration
“Through the power of our intention, 10.10.10 will be a momentous date in history… read more on the website.
Be present on 10.10.10. from wherever you are and in the lead up to 10-10-10 add your voice and increase your own Power of One by amplifying it to the Power of 10 so that this collective declaration is heard around the world!
* Sign up for the Avatar Lights Campaign and record your energy and intentions for co-creating a brighter future via 10.10.10 on the world map.
* Take the “Power of 10? Pledge and begin to co-create a New Civilization using your Power of 10 exponentially to energetically connect all of humanity as one. Simply invite ten people to join in on 10-10-10, and then encourage them to do the same with ten people they know, and so on.
* Make a voluntary contribution of $10 to co-create 10.10.10 as a truly global declaration and a new beginning.
* Link your world map presence to your Facebook, Twitter, or LinkedIn page.
This will be a globally connected and co-created event, linking many self-organizing activities across continents. Let’s make it happen together! Become a 10.10.10. event organizer.
* Tell us about the event you are organizing on 10.10.10.
* Send us a news release of your event, plus logo and links so we can post to our website and promote your cause that will occur on 10.10.10.
* And of course remember to join the Avatar Lights Campaign
Your organization, or group can be a part of a critical mass that will jumpstart an era of transformative change!
* Become a Patron, Ambassador, Change Agent, Catalyst, Energizer or Light Point.
* Link your world map presence to your Facebook, Twitter, or LinkedIn page.
* And yes, once again, please do make sure you join the Avatar Lights Campaign
See immediately how you are creating the tipping point. Your avatar will appear on an interactive online world map together with those of other global citizens, and your energetic intention and contribution will co-create 10.10.10 as a literal show of our collective energy, which will also be displayed on the evening of 10-10-10 via the Avatar Lights display at the National Mall. Be one of the ones adding your energy and light!
10.10.10 is not just a single “feel good” event. It is a concrete demonstration that our global community can come together to co-create projects of significance to humanity. It is just the beginning of the emergence of a unique global initiative that will catalyze a Quantum Action Network of evolutionary entrepreneurship in service to the whole.
10.10.10 is an event that will be stimulating, inspiring, and lots of fun too! Sharing, Songs, Solutions, Silence, Science, Spirit, Speeches and revealing some of the world’s best kept Secrets – all in service of reclaiming the Sanity needed to create the new world. Enjoy this shining event and say you were part of the inauguration of a new civilization.
In service to the whole,
Power of One Team
Power of One is a 501(c)3 charitable organization, read Our Mission Statement
Start Slide Show with PicLens Lite
10.10.10. Global Inititive: Cutting Carbon 10% at a time (even the globalists are trying to CASH IN 10:10)
As of Friday 3rd September, the lovely 10:10 Tag is available in O2 shops nationwide, at a special price of £3. You can find your nearest O2 shop here but you can still buy one online at the 10:10 store if you prefer, by clicking here.
In the coming weeks you’ll see our Tag, made from the recycled shell of of a Boeing 747 jumbo jet, on the pages of magazines including Esquire, Company, Cosmopolitan, Country Living, Good Housekeeping and Harper’s Bazaar, all as part of 10:10′s media partnership with the National Magazine Company. That’s one of the adverts we’re running below. Nice, eh?
The tale of the tag
The 10:10 Tag is formed from the body of G-BDXH, one of the most famous airliners ever to fly. In June 1982, when she still went by the name ‘City of Edinburgh’, G-BDXH was flying over West Java en route to Auckland when she flew into the plume of volcanic ash produced by the eruption of Mount Galunggung (no, really). All four engines failed almost simultaneously, and the crew were forced to make an emergency landing in Jakarta.
After decades spent hurtling around the lower stratosphere and making all kinds of climate mischief in the process, G-BDXH is spending her retirement making it up to us. She’s been melted down and turned into 150,000 10:10 Tags – the best (and most stylish) way to show the world you’re cutting your 10% in 2010.
Thanks to 10:10 and a small independent forge in greenest Lincolnshire, pieces of G-BDXH are now proudly displayed on wrists and necks all over the world, including those of Sienna Miller, Hugh Jackman and Daisy Lowe. Why not join them? You can buy your Tag here or, to see how it was made, check out the video below.
check out the video below.
If you go to this link and listen to it 3 times in a row…. you tell me why the church banned this ghost band?
Please leave your comments on the original page… and wait to see what happens….guess what the church was scared off???
lets see who posts the right answer before October 31 2010
Banned by the Catholic Church
Categories: Sound Oddities
Sound Clip: Shepard Tone by Roger Shepard
This is a classic sound oddity and illusion. Or is it? There are some corrections to this post with much discussion, see below and follow the trail of comments to clarify the inaccuracies.
“It is rumored to be called the “devil’s tone” by the Catholic church. The Shepard tone is a sound consisting of a superposition of sine waves separated by octaves. When played with the base pitch of the tone moving upwards or downwards, it is referred to as the
Shepard Scale. This creates an auditory illusion that continually ascends or descends in pitch, yet which ultimately seems to get no higher or lower.”
Corrections here and below in comments from Brent Williams:
“Baned by the Catholic Church“, about a Shepard-Risset Glissando. This post contained links to certain webpages, but when the post went up (even before it was moderated) the links were missing. Just in case you want to put them up for your readers, here they are:
The original source page for this sound file is here . It is in French.
You can find the Wiki source page here . This contains a little more info on the sound. This is where I confirmed that the sound is a minor chord of synchronised Shepard-Risset glissandi.
Read about Diana Deutsch here . She is currently a Professor at UCSD.
All the best, and please continue with your excellent website.
Categories: Sound Oddities -