So not only is Patrick Leahy working on a bill that gives government the authority (without warrant) the ability to read your private e-mails, but he’s doing so behind closed doors. This reminds me of the ObamaCARE bill when Democrats put things into the bill behind closed doors. Leahy is a typical Marxist Democrat, from a state Vermont that has also elected a socialist for a Senator.
Iowa Republican Sen. Chuck Grassley’s office leveled charges of working behind closed doors at Senate Judiciary Committee Chairman Patrick Leahy and his office following allegations and denials that he is aiming to allow law enforcement’s push for warrantless surveillance.
Marxist Democrat Patrick Leahy reworking ‘privacy’ bill that gives government authority to read your e-mails with no warrant behind closed doorsNovember 24, 2012
(YNet)(For centuries Da Vinci’s Mona Lisa has lived in France. Napoleon had her in his bedroom, Louis XIV brought her to Versailles, and eventually she graced the walls of the Louvre. An Italian Louvre employee was resentful of the fact that this painting wasn’t in its homeland. To restore the Mona Lisa to Italy, Vincenzo Peruggia hid her under his coat when the museum closed for the day and took her to Florence. Two years later, Peruggia was caught and the Mona Lisa was returned to Paris. Peruggia, unlike most robbers, was hailed as a patriotic hero and given a mere 7 months in jail.)
An Israeli project, which is set to boost the museum’s security, will further entail the installation of Synel’s time and attendance management hardware, as well as the use of fingerprint verification, keypad entry, magnetic card, barcode card, proximity card, contactless smart card and facial recognition. According to Erez Buganim, Synel’s Vice President of marketing, the Louvre is continuously exposed to burglary attempts, even by employees. “Therefore, the security system is needed. It will prevent unauthorized personnel from entering areas in the museum where priceless art is held in,” he said. “There are art pieces that aren’t always on display for the public and even the museum’s employees can’t reach certain exhibition spaces at all times,” he said. “Synel offers a technological solution which will monitor unauthorized entries into the museum and within the museum’s exhibition spaces,” Buganim added. The Israeli technology will allow for the museum’s security team to track the Louvre’s 700 employees. Synel France and England CEO Danny Farber expects that by the end of 2012, over 200 French organizations will be using the new technology. “The project at the Louvre is one of several new projects, Synel has recently started in France and England.”
I’m skeptical that the French public won’t freak out when they realize that the system used in a museum could also be used by street cameras and could track terrorists. They of course will point out that it is an Israeli technology that is obviously using art as a sidetrack. No doubt this would create the ultimate Panopticon. Already most cities have cameras installed all over the place. With facial recognition technology it’d be impossible to hide from the government. It is an interesting technology however. The same article had a link to another Israeli facial recognition company that facebook just bought. That is quite frightening to think in the future you will have to go in front of a camera and have Artificial Intel judge to see if you are you.
FBI quietly forms secretive Net-surveillance unit.(CNET News).The FBI has recently formed a secretive surveillance unit with an ambitious goal: to invent technology that will let police more readily eavesdrop on Internet and wireless communications.The establishment of the Quantico, Va.-based unit, which is also staffed by agents from the U.S. Marshals Service and the Drug Enforcement Agency, is a response to technological developments that FBI officials believe outpace law enforcement’s ability to listen in on private communications.
While the FBI has been tight-lipped about the creation of its Domestic Communications Assistance Center, or DCAC — it declined to respond to requests made two days ago about who’s running it, for instance — CNET has pieced together information about its operations through interviews and a review of internal government documents.
DCAC’s mandate is broad, covering everything from trying to intercept and decode Skype conversations to building custom wiretap hardware or analyzing the gigabytes of data that a wireless provider or social network might turn over in response to a court order. It’s also designed to serve as a kind of surveillance help desk for state, local, and other federal police.Here’s the full text of the FBI’s statement in a Google+ post.
One person familiar with the FBI’s procedures told CNET that the DCAC is in the process of being launched but is not yet operational. A public Justice Department document, however, refers to the DCAC as “recently established.”
The FBI has disclosed little information about the DCAC, and what has been previously made public about the center was primarily through budget requests sent to congressional committees. The DCAC doesn’t even have a Web page.
“The big question for me is why there isn’t more transparency about what’s going on?” asks Jennifer Lynch, a staff attorney at the Electronic Frontier Foundation, a civil liberties group in San Francisco. “We should know more about the program and what the FBI is doing. Which carriers they’re working with — which carriers they’re having problems with. They’re doing the best they can to avoid being transparent.”Hmmmm…….”The most transparant Admin EVAH”.Read the full story here.
EFF is a front for Palestine. That is what is lacking transparency here. They might be right about some issues and they are worth paying attention to, but it is important to know their primary purpose is to create a shield for terrorist activity (of course they call that freedom fighters). The @JIDF for example is very familiar with many of their crowd. Good rule of thumb… if it is related to Harvard and rubs shoulders with Jillian C York, you know (a) that person is probably informed and worth paying attention to (b) you can’t trust them. Complex ain’t it?
Beetle prepared with sensors and energy-harvesting devices (DARPA)
(wnd) The U.S. government is eyeing the idea of turning bugs – genuine live creepy-crawlies – into spies, thanks to the work of micro researchers at the University of Michigan.
According to results published in the Journal of Micromechanics and Microengineering, Professor Khalil Najafi, chairman of electrical and computer engineering at the University of Michigan, and doctoral student Erkan Aktakka are finding ways to from insects.
The stated intention is to use insects as first responders for disasters, but the technology also is likely to usher in a new era for intelligence gathering.
Researchers have found insects get their energy from the food they eat and then use that energy to fly. In the process, some of the energy is wasted. The Michigan research team has exploited the wasted energy by attaching tiny electrical generators to the wings of the insect. The energy harvested could be further increased by using tiny on the tops of the wings.
“Through energy scavenging, we could potentially power cameras, microphones and other sensors and communications equipment that an insect could carry aboard a tiny backpack,” Najafi said. “We could then send these ‘bugged’ bugs into dangerous or enclosed environments where we would not want humans to go.”
While the university’s goal is for insects to be used in hazardous situations where it would not be safe for humans, the military is interested in the technology to further the dream of designing and fabricating micro-air-vehicles, or MAVs.
Creating tiny, lightweight flying vehicles capable of carrying a payload and being powered by a long-life onboard power source has proven to be extremely difficult, and Department of Defense researchers had almost abandoned work on real-life micro-scouts. This latest breakthrough, however, has breathed new life into the program.
Using tiny probes near the base of an insect’s antennae or electrodes implanted in the central nervous systems had already allowed government researchers to control an insect’s brain. Government researchers found it was easier to use living insects than build robotic insects from scratch. The problem they could not overcome was building a power source small enough for an insect to carry but powerful enough to power the surveillance equipment.
Now, working out of the university’s Lurie Nanofabrication Facility, Najafi and Aktakka harvest electro-mechanical energy from the insects wing movements. Two micro-generator prototypes convert the mechanical vibrations from the wings of a beetle into an electrical output. Placing the two generators on the wings can result in more than 45 micro-watts of power per insect. A direct connection between the generator and the flight muscles of the insect is expected to increase the final power output by a factor of 10 to at least 500 microwatts.
What brought the technology to the attention to the intelligence community was the fact that the energy generated by the bug could now power micro-surveillance equipment, such as a camera or microphone, for an extended period of time. (The research for turning insects into miniature electrical generators was funded by the Hybrid Insect Micro Electromechanical Systems program of the Defense Advanced Research Projects Agency, or DARPA, under grant number N66001-07-1-2006.)
While the university is pursuing patent protection for the intellectual property and is seeking commercialization partners to help bring the technology to market, DARPA seems to have other plans for the technology.
Robotic fliers have been used by the military since World War II, but in the past decade their numbers and level of sophistication have dramatically increased. The Defense Department has used nearly 100 different styles of drones, some the size of birds and some the size of small planes. As early as the 1970s the CIA secretly developed a mechanical “dragonfly” for spying. It has only been recently that miniature surveillance devices have been carried by living insects.
In 2007, insects seem to have been used for surveillance operations of short duration. “Dragonflies” and “little helicopters” were reported at anti-government rallies both in New York and Washington, D.C. Many suspect that the devices were deployed by the Department of Homeland Security.
In another project funded by DARPA, researchers are inserting computer chips into moth pupae – the intermediate stage between a caterpillar and a flying adult – and hatching them into healthy “cyborg moths.”
The Hybrid Insect Micro-Electro-Mechanical Systems (HISMEMS) project aims to create literal flying cameras – insects whose nerves have grown into the implanted microprocessor so that operators can control them in flight. This would eliminate implanting probes into the insect, making for a more stable connection.
The research being done by Najafi and Aktakka has advanced the goal of an insect-silicone chip hybrid much faster than many in the military ever imagined. As recently as four years ago, Vice Admiral Joe Dyer, former commander of the Naval Air Systems Command, said of the nearly completed program, “I’ll be seriously dead before that program deploys.”
While development of fully mechanical micro-fliers is advancing quickly, they would never be mistaken for insects. This is what gives the biologic drones an edge.
However, for all their advantages, there is a downside for using real insects as spies.
“They can get eaten by a bird, they can get caught in a spider web,” said Electrical Engineering Professor Ron Fearing of Berkeley University. “No matter how smart they are – you can put a Pentium [chip] in there – if a bird comes at them at 30 miles per hour there’s nothing they can do about it.”
none of your bizzzzzzzzzness
Obama Justice Department Insists It Should Be Able To Secretly Stick GPS Devices On Cars Without WarrantsNovember 8, 2011
A United Nations force in southern Lebanon says it is investigating a blast reportedly caused by the detonation of an Israeli device spying on Hezbollah’s private telecommunications network.
The militant Hezbollah group said Friday it discovered what it said was an Israeli device in the southern village of Majdel Silim. Both the group and the Lebanese army said the device was apparently detonated remotely by the Israelis.
they say it as if spying on people that are breaking international law and are trying to kill you is a bad thing
The U.S. 9/11 commission noted that for al-Qaida terrorists in 2001, “Dubai, a modern city with easy access to a major airport, travel agencies, hotels and Western commercial establishments, was an ideal transit point.” More than half the September 11 hijackers passed through Dubai en route to attack the U.S., two of those hijackers came from the U.A.E., and the 9/11 Commission reported that roughly half the $250,000 the hijackers spent preparing for the attacks was wired to them via Dubai banks. Following the 2003 overthrow of Saddam Hussein in Iraq, documentation emerged–in U.S. federal courts,, as well as in both Congressional and United Nations investigations– suggesting that Saddam’s regime had used Dubai as a hub for sanctions-busting front companies, kickback collection and, according to the U.S. Treasury, efforts to buy surface-to-air missiles.
And that’s just for starters:
So what else lies in the surveillance archives of the Dubai security services? If Dubai’s authorities can piece together within 24 hours the trail of the alleged killers of one top terrorist, might we reasonably suppose they could also exhume quite a collection of clips providing more context? Could they perhaps give the global public a much better window on the deadly nature of the business pursued in airports, malls and hotel rooms by such killers as the Iranian Revolutionary Guard Corps, or by Iran’s pet terrorist organizations, Hezbollah and al-Mabhouh’s outfit–Hamas?
Hey, Dubai! While you’re at it–can you tell us more about the terrorist Mabhouh himself?