E-Verify’s Slippery Biometric Slope….

Federal programs are notorious for mission creep. Small programs intended to address specific concerns typically grow far beyond their original bounds. Social Security numbers are a prime example: They initially were intended to track personal income in order to calculate Social Security benefits, but now they are indispensable for access to credit, purchasing a firearm and much more.

The House Judiciary Committee is considering another program destined to creep into the rest of our lives. The Legal Workforce Act (LWA), introduced by Rep. Lamar Smith (R-Texas), would mandate E-Verify for all new hires in the United States. E-Verify is a government program intended to discourage the hiring of illegal immigrants by enabling employers to verify the legal work status of all new employees.

Mandating E-Verify would force every American to ask the government for permission to work. That is bad enough, but it gets even worse: The system is defective. The database it relies on often fails to identify illegal immigrants and sometimes rejects people who are legally eligible to work.

These inaccuracies portend dangerous mission creep. According to a recent government audit, E-Verify approves roughly half of illegal immigrant workers, partly because it only checks the documents that the worker gives the employer, creating a huge loophole. LWA attempts to resolve that by notifying all Americans when their Social Security numbers are used for employment verification. But that won’t close the loopholes, and so eager politicians in Washington will keep piling on new regulations, mandates and controls.

The next step will be a national biometric identity card for all citizens and legal residents to aid workplace verification of immigration status. LWA creates “pilot authentication programs” based on “new technologies,” which will combine E-Verify with our biometric information to create a more foolproof system. Such a system was proposed in 2010. Organizations like the Federation for American Immigration Reform already support it.

But mandatory E-Verify could soon morph into far more….

By Alex Nowrasteh – The Hill –

Self-Driving Cars Will Be in 30 U.S. Cities Next Year

Automated vehicle pilot projects will roll out in the U.K. and in six to 10 U.S. cities this year, with the first unveiling projected to be in Tampa, Florida as soon as late spring. The following year, trial programs will launch in 12 to 20 more U.S. locations, which means driverless cars will be on roads in up to 30 U.S. cities by the end of 2016. The trials will be run by Comet LLC, a consulting firm focused on automated vehicle commercialization.

“We’re looking at college campuses, theme parks, airports, downtown areas—places like that,” Corey Clothier, a strategist for automated transportation systems who runs the firm told, The Observer.

He explained that they’re focusing on semi-controlled areas and that the driverless vehicles will serve a number of different purposes—both public and private. The vehicles themselves—which are all developed by Veeo Systems—will even vary from two-seaters to full-size buses that can transport 70 people. At some locations, the vehicles will drive on their own paths, occasionally crossing vehicle and pedestrian traffic, while at others, the vehicles will be completely integrated with existing cars….

By Sage Lazzaro – Observer.com –

Has Russia Made US High-Tech Weapons Systems Useless?

Via a tip from an ANP trusted source, we see a few pieces of a puzzle that when added to the big picture offers us insight to what could be one of the biggest game changers in history, putting the Russian military in a position of total dominance over the US military in any upcoming war, which as was explained in an earlier article, is rapidly approaching.

Back in early November 2014, the Intenet was abuzz with talk of a story titled “What frightened the USS Donald Cook so much in the Black Sea?,” where it was claimed that an incident in April 2014 “demoralized” the crew of the USS Donald Cook, when a Russian Sukhoi-24 (SU-24) fighter jet buzzed the the USS Donald Cook, not carrying bombs or missiles, but rendering them completely inoperable with the use of an “electronic warfare device.”

As the Russian jet approached the US vessel, the electronic device disabled all radars, control circuits, systems, information transmission, etc. on board the US destroyer. In other words, the all-powerful Aegis system, now hooked up – or about to be – with the defense systems installed on NATO’s most modern ships was shut down, as turning off the TV set with the remote control.

The Russian Su-24 then simulated a missile attack against the USS Donald Cook, which was left literally deaf and blind. As if carrying out a training exercise, the Russian aircraft – unarmed – repeated the same maneuver 12 times before flying away.

Without any reports at all from any MSM source or confirmation from Russia, people waved this away as rumor, speculation or an outright hoax, but in March 2015, Russian News agency Sputnik, which is owned an operated by the Russian government, announced that Russia had unveiled a new “revolutionary electronic warfare system.”

Russia’s new Richag-AV radar and sonar jamming system can be mounted on helicopters, ships and other military equipment to jam potential adversaries’ weapons systems from distances of several hundred kilometers away; it has been hailed by developers as having no analogue anywhere in the world.

Sounds a lot like the type of advanced technology that was described in the November report about Russia’s ability to completely render one of America’s most advanced missile destroyers completely inoperable, doesn’t it?

Our source tells us this is “actually the biggest story in the world,” because if Russia is capable of disabling the USS Donald Cook and the entire US Navy with their “revolutionary electronic warfaresystems,” then Russia has already won any type of traditional war.

This would leave the US one option, the nuclear option….

By Susan Duclos – All News PipeLine

Google gives new meaning to “Orwellian” : Ministry of Truth

“…if all records told the same tale — then the lie passed into history and became truth.” (1984, George Orwell) –

The New Scientist has the stunning story (2/28/15, “Google wants to rank websites based on facts not links,” by Hal Hodson):

“The internet is stuffed with garbage. Anti-vaccination websites make the front page of Google, and fact-free ‘news’ stories spread like wildfire. Google has devised a fix – rank websites according to their truthfulness.”

Great idea, right?

Sure it is.

The author of the article lets the cat out of the bag right away with his comment about “anti-vaccination” websites.

These sites will obviously be shoved into obscurity by Google because they’re “garbage”…whereas “truthful” pro-vaccine sites will dominate top ranked pages on the search engine.

This is wonderful if you believe what the CDC tells you about vaccine safety and efficacy. The CDC: an agency that opens its doors every day with lies and closes them with more lies.

The New Scientist article continues: “A Google research team is adapting [a] model to measure the trustworthiness of a [website] page, rather than its reputation across the web. Instead of counting incoming links, the [ranking] system – which is not yet live – counts the number of incorrect facts within a page. ‘A source that has few false facts is considered to be trustworthy,’ says the team…The score they compute for each page is its Knowledge-Based Trust score.”

Right. Google, researchers of truth. Assessors of trustworthiness. Who in the world could have a problem with that?

Answer: anyone with three live brain cells.

Here’s the New Scientist’s capper. It’s a beaut:

“The [truth-finding] software works by tapping into the Knowledge Vault, the vast store of facts that Google has pulled off the internet. Facts the web unanimously agrees on are considered a reasonable proxy for truth. Web pages that contain contradictory information are bumped down the rankings.”

By Jon Rappoport – Jon Rappoport’s Blog –

Can Revolution Produce Freedom in the Technological Age of Surveillance and Control?

The topic of the Unabomber came up again. The favorite passage of transhumanist Ray Kurzweil and Bill Joy, founder of the now acquired Sun Microsystems in which Ted Kaczynski explains the “New Luddite Challenge” – essentially the question of what happens if computers take over, and if not, what happens at the hands of an elite who don’t need the masses for labor, or anything else. Will people be simply exterminated?

Will the population be gradually but sharply reduced through population control, eugenics, family planning and propaganda (as is actually happening now), or will the masses instead be treated as “pets” with cute hobbies and trivial pursuits, but no real meaning in society? The question remains, or could be a combination of all of the above.

In the face of mass unemployment and depopulation, is violent revolution justified? For reasons I explain, likely not. It is not clear who could be stopped with force that would result in stopping the tyranny; the tyranny exists, but it is systematic and compartmentalized in the hands of thousands, and probably millions of people. Moreover, violence has become a trivial event for media sensationalism and in justifying greater police state powers, etc. Thus, violence is the wrong approach on many levels, including moral.

Meanwhile, there is the question of liberty, and the kind of freedom that America’s Founding Fathers pursued circa 1776. Though other methods were attempting – the Tea Party protest, for instance – the revolution was ultimately fought through violent, guerrilla warfare. One of Thomas Jefferson’s most famous quotes – as author of the Declaration of Independence and third president of the United States of America – is: “The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants.”

Years later, in his letters to John Adams, the second president and a former political enemy of Jefferson’s, Jefferson posed the idea that freedom could not so easily restored through violence, particularly if the public were unenlightened and uneducated in the ways of liberty and good self government.

Jefferson discusses the case of ancient Rome, where the usurped powers of Julius Caesar transformed the republic into a thoroughly corrupt dictatorship. Caesar was killed in a conspiracy by the Senate, led by Brutus. Ultimately, the Caesar family remained in control of the empire anyway.

But Jefferson argues that even if Brutus had prevailed, or other Roman freedom lovers such as Cicero or Cato in power, it would have been nearly impossible to create good government in the climate of corruption, and the era of debased, demoralized masses who were uneducated in the virtues of self-government….

By Aaron Dykes – Activist Post –

Bitcoin Revolution The Next Internet, Says Bank Of England

The arrival of electronic currencies could revolutionise the way Britons pay for goods and services, in much the same way as the internet shook up how we access information, the Bank of England has said.

Cashless forms of payment like the cryptocurrency Bitcoin “potentially combined with mobile technology, may reshape the mechanisms for making secure payments”, the central bank said.

While traditional currencies, including the pound, are backed by central banks, new alternatives have allowed individuals to exchange directly without any such third party.

The Bank could itself create digital currencies, making the new system available as it does with banknotes today. Research would be necessary to develop the technology “without compromising a central bank’s ability to control its currency and secure the system against systemic attack”, the Bank said.

The idea of countries launching their own electronic currencies has gained pace in recent weeks, as Yanis Varoufakis became Greece’s newest finance minister. The Greek-born economist has previously suggested that “the technology of Bitcoin, if suitably adapted, can be employed profitably in the eurozone as a weapon against deflation”….

By Peter Spence – The Telegraph –

[ONLY WAY Editor: Check out our “WAMPUM” cryptocurrency page]

NSA’s “secret weapon” spies on every personal computer

The National Security Agency has figured out how to hide spying software deep within hard drives, allowing them to monitor and eavesdrop on the majority of the world’s computers – even when they are not connected to the internet.

The Moscow-based security software maker Kaspersky Lab said it has found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria….

The NSA began infecting computers in 2001 claims Kaspersky….

What’s more, even the makers of these hard drives are unaware that these spying programs have been installed, with the NSA obtaining their source codes by going so far as to pose as software developers according to former intelligence operatives, or telling the companies the government must do a security audit to make sure their source code is safe.

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on…

The disclosure could hurt the NSA’s surveillance abilities, already damaged by massive leaks by former contractor Edward Snowden. Snowden’s revelations have upset some U.S. allies and slowed the sales of U.S. technology products abroad.

The exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China, which is already drafting regulations that would require most bank technology suppliers to proffer copies of their software code for inspection.

Peter Swire, one of five members of U.S. President Barack Obama’s Review Group on Intelligence and Communications Technology, said the Kaspersky report showed that it is essential for the country to consider the possible impact on trade and diplomatic relations before deciding to use its knowledge of software flaws for intelligence gathering.

‘There can be serious negative effects on other U.S. interests,’ Swire said.

Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.

Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment….

By Chris Spargo – Dailymail.com –

Where virtual reality is going

Right now, companies are selling improved tech that allows a helmet-wearer to see landscape and people in a wider perspective, and hear layers of sounds to the left and right, and above and below him. He can also walk inside the virtual set up.

He can’t touch everything he sees yet, but that’s coming. And perhaps one day, he’ll be able to sit down at a lavish meal and smell and taste the food.

Sight, sound, touch, smell, taste. A five-sense envelope.

He’ll leap off a cliff, fly through the clouds, and attack a monster coming his way, and he’ll win. He’ll do this over and over, and begin to control his own attendant fear. (You can see the obvious military use.)

But…the money men behind virtual reality will want more. They’ll want to program the user’s reactions AHEAD OF TIME; his feelings, sensations, nervous-system responses, endocrine outputs, brain signals.

The full package.

“Press Button A on your remote and receive the complete experience as we give it to you.”

Eventually, there won’t be a button A. Buyers will want what they’re given.

That’s the threshold, the crossover:

Why try to imagine and create your own reactions? Why try to minimize your Pavlovian responses? The VR techs already have the answers for you.

And their answers are very much like a medical protocol.

Entrainment on multiple levels. This is where virtual reality is heading.

In the process, the basic principle of elite reality-building will be expanded: cut off the individual’s imagination; bury it; exclude it; make it unnecessary.

Why?

Because that imagination, and its ability to invent new unpredictable realities, is ultimately what stands between a locked-down planet and a planet that has a chance of freedom….

By Jon Rappoport – No More Fake News –

Examples of Police State Technology Making Our Rights Obsolete as we Head into 2015

Things are not looking pretty for the land of the free.

The year 2014 has made it very clear that privacy is under threat, and the situation is not likely to improve. Mass surveillance – which became a national issue via theEdward Snowden leaks – is not subsiding or under reform; instead, it is becoming more bold and complex with each passing day.

It would take several books to catalog the myriad ways in which the rights of The People have been casually infringed upon by various levels of government just in years since 9/11 and the introduction of the PATRIOT Act.

And it’s not only federal agencies like the NSA, Homeland Security and the FBI that are taking liberties with our … umm … liberties; it is local police, too. The rise of technology is rapidly fueling these agencies with data and “intelligence” with very little oversight and even less pause for reflection to use these powerful abilities wisely and, yes, judiciously.

Here are just a few major areas where privacy has lost badly to surveillance technology in 2014. Not that anyone is paying attention, but they are worth reflecting upon soon – hopefully before it is too late to turn things back around:

1. Militarized Police and Weapons of War on American Streets:

True, this technology has been in use for several years now and has been demonstrated at protests such as the those held outside of the G20 in Pittsburgh, Toronto and other locales.

But the events in Ferguson really allowed this brand of crowd control to come of age. This and other key protests have seemingly justified a massive police response for just about anything now …but… you know, the first amendment is still respected and all.

The Daily Sheeple reported:

Ferguson police have stocked up on less-lethal ammunition in the last few months including “hornets nest” CS sting grenades, which shoot out dozens of rubber bullets and a powdered chemical agent upon detonation, tear gas, riot gear, plastic handcuffs and the like in the lead up to the decision which is expected to come any time now. St Louis County police have spent $172,669 on this stuff just since August.

The Pentagon’s 1033 surplus program, which hands out everything from MRAP armored vehicles, to bulletproof vests, assault rifles, and other military weapons to domestic law enforcement agencies, is one of the major reasons that ordinary police departments, including those in small towns, are gearing up as for battle … and that includes Ferguson:

The Department of Defense Excess Property Program (1033 Program) is authorized under federal law and managed through the Defense Logistics Agency’s Law Enforcement Support Office (LESO) in Ft. Belvoir, Va. The 1033 Program provides surplus DoD military equipment to state and local civilian law enforcement agencies for use in counter-narcotics and counter-terrorism operations, and to enhance officer safety. The Missouri Department of Public Safety is the sponsoring state agency responsible for administration of the 1033 Program in Missouri.

2. Biometrics Comes of Age:
Fingerprints and iris scans are becoming normalized as identifiers on mobile phones, including the iPhone 5, computers and other platforms.

Increasingly, technology – including devices used by police – areutilizing other bodily features (in addition to fingerprints and eyes) to identify you, including ears, noses, heart rate (via electrocardiogram), blood vein matching, your scent or smell and even “butt biometrics” – no joke – which will allow smart car seats to identify the sitter based on their unique posture.

While these are surely being integrated into law enforcement devices, they are also becoming the mainstays of “wearables,” the new trendy technology that is collecting data on all of those using it to track health progress, etc.

Surveillance cameras have already been used to identify you by your walk for several years now, but advances have allowed technology to even identify the person wearing a camera, such as a police officer with a mounted body cam, by just 4 seconds of footage, revealing a ‘biometric fingerprint’of the individual.

Of course, roadside blood draws have already entered the picture in law enforcement work, including numerous locales that have implemented mandatory policies during stops. This is sure to pick up. In Seattle, the National Highway Traffic Safety Administration (NHTSA) recently conducted a paid, voluntary survey of drivers who received up to $60 to give blood and breath samples at a roadside stopin an effort to study how many people drive impaired.

3. Smart Phone Apps Know Everything About You:

Vocative published a long and unsettling list of apps for smart phones and other similar devices that all collect untold amounts of information about you every day.

Whether you realize it or not, permissions for apps routinely allow the collection and sharing of such information as your contact and address book, your text message, audio recorded from your device’s microphone, your call log and much more.

Yes, this is really happening, so beware if you are using mobile apps including:

By Mac Slavo – Activist Post –

Are ‘We the People’ Useful Idiots in the Digital Age?

Back in the heyday of the old Soviet Union, a phrase evolved to describe gullible western intellectuals who came to visit Russia and failed to notice the human and other costs of building a communist utopia. The phrase was “useful idiots” and it applied to a good many people who should have known better. “That’s you and me, folks, and it’s how the masters of the digital universe see us. They hear us whining about privacy, security, surveillance, etc., but notice that despite our complaints and suspicions, we appear to do nothing about it.”–John Naughton, The Guardian

“Who needs direct repression,” asked philosopher Slavoj Zizek, “when one can convince the chicken to walk freely into the slaughterhouse?”

In an Orwellian age where war equals peace, surveillance equals safety, and tolerance equals intolerance of uncomfortable truths and politically incorrect ideas, “we the people” have gotten very good at walking freely into the slaughterhouse, all the while convincing ourselves that the prison walls enclosing us within the American police state are there for our protection.

Call it doublespeak, call it hypocrisy, call it delusion, call it whatever you like, but the fact remains that while we claim to value freedom, privacy, individuality, equality, diversity, accountability, and government transparency, our actions and those of our government overseers contradict these much-vaunted principles at every turn.

For instance, we disdain the jaded mindset of the Washington elite, and yet we continue to re-elect politicians who lie, cheat and steal. We chafe at taxpayer-funded pork barrel legislation, and yet we pay our taxes meekly and without raising a fuss of any kind. We object to the militarization of our local police forces and their increasingly battlefield mindset, and yet we do little more than shrug our shoulders over SWAT team raids and police shootings of unarmed citizens.

And then there’s our love-hate affair with technology, which sees us bristling at the government’s efforts to monitor our internet activities, listen in on our phone calls, read our emails, track our every movement, and punish us for what we say on social media, and yet we keep using these very same technologies all the while doing nothing about the government’s encroachments on our rights. So the government continues to betray our trust, invade our privacy, and abuse our rights, and we keep going back for more?

Sure we do. After all, the alternative–taking a stand, raising a ruckus, demanding change, refusing to cooperate, engaging in civil disobedience–is a lot of work. What we fail to realize, however, is that by tacitly allowing these violations to continue, we not only empower the tyrant but we feed the monster. In this way, as I point out in my book A Government of Wolves: The Emerging American Police State, what starts off as small, occasional encroachments on our rights, justified in the name of greater safety, becomes routine, wide-ranging abuses so entrenched as to make reform all but impossible….

By John Whitehead – OpEdNews.com –