Friday, September 15, 2006

North American Unions SuperCorrior Project - The VeriChip

Virtual Global Taskforce Logo and the "All Seeing Eyes"
North American Unions SuperCorrior Project - The VeriChip

The Road to Artificial Omniscience

Revelation 13:16-17
And he causes all, the small and the great, and the rich and the poor, and the free men and the slaves, to be given a mark on their right hand or on their forehead, and he provides that no one will be able to buy or to sell, except the one who has the mark, either the name of the beast or the number of his name...

Daniel 11:38a
"But instead he will honor a god of fortresses...


The states of the Union issue their own drivers licenses and that is their domain, not the federal government, but how many Americans know this? No National ID is fool proof from tampering, period. Because this is a fact that has been proven, the next logical step will be a forced bio chip under the skin as the only way to "fight the war on terrorism." Mark my words: the National ID is the gateway tool for a chip and I ask: "Where are the churches in this country?" Why are they not warning their flocks that the Mark of the Beast is just over the horizon? - Devvy Kidd, The National ID is not Mandatory, August 21, 2006

VIDEO ALERT: IBM, Verichip, and the Rise of the Fourth Reich

Ed. Note: This is a well produced video that claims a link between IBM, Hitler and the wholesale slaughter of Jews during WWII and what is transpiring now with the Verichip inplantable chip. See actual footage of those with the chip already implanted swiping their arm or hand to gain entry, show proof of ID etc...

See Corresponding Article Here:

The IBM Link to Auschwitz,black,39111,1.html

VeriChip Corporation's VeriMed Patient Identification System Now Has 140 Hospitals
and Approximately 300 Physicians as Part of Its Network

GENETIC ENGINERRING NEWS - September 6, 2006 - VeriChip Corporation: VeriChip Trains Nearly 400 FEMA Employees on Its VeriTrace Emergency Management/Disaster Recovery Application

VeriChip Corporation, a subsidiary of Applied Digital Solutions (NASDAQ: ADSX), announced today that its Implantable Division, consisting of the patient ID and personal health information system called "VeriMed", the security application called "VeriGuard", and the emergency management system called "VeriTrace" achieved important milestones. VeriMed, the first and only FDA-approved microchip for patient identification and access to medical information has advanced adoption in key areas of hospital and physician acceptance.

Since early August, 26 new healthcare facilities have agreed to adopt the VeriMed system. This brings the total to approximately 140 emergency departments, of which 36 - located in seven states and Washington, D.C. - have fully implemented the technology and will use the VeriMed reader as standard protocol to scan patients that present unconscious, delirious or confused. The Company continues to provide readers to hospitals at no charge as part of its efforts to "seed" the infrastructure for the VeriMed patient identification system.

The expansion of the VeriMed physician network has increased nearly six-fold in 2006, indicating increasing acceptance of VeriMed by primary care and specialty physicians.

"We are optimistic that we will see a significant increase in the number of physicians in our physician network as we enhance our efforts to educate physicians about the benefits of VeriMed through participation in several large medical conferences scheduled over the next few months," stated Kevin McLaughlin, CEO of VeriChip Corporation. "We are further encouraged that our clinical study program with Blue Cross Blue Shield of New Jersey, which commences in September, will lead to increased adoption by physicians and health insurers."

VeriChip's VeriTrace application is designed to assist state and federal agencies to plan for and manage emergency situations and disaster recovery using implantable RFID technology. VeriChip has now trained nearly 400 FEMA employees on this technology including the Disaster Mortuary Operational Response Teams (DMORT) involved in the recovery efforts during the aftermath of Hurricane Katrina and responsible for Weapons of Mass Destruction recovery efforts. VeriChip continues to work with federal and state agencies on full implementation of this technology.

About VeriChip Corporation

VeriChip Corporation, headquartered in Delray Beach, Florida, develops, markets and sells radio frequency identification, or RFID, systems used to identify, locate and protect people and assets. VeriChip's goal is to become the leading provider of RFID systems for people in the healthcare industry. VeriChip sells passive RFID systems for identification purposes and active RFID systems for local-area location and identification purposes. VeriChip recently began to market its VeriMed(TM) Patient Identification System which is used to rapidly and accurately identify people who arrive in an emergency room and are unable to communicate. This system uses the first human-implantable passive RFID microchip, the implantable VeriChip(TM), cleared for medical use in October 2004 by the United States Food and Drug Administration. For more information on VeriChip, please call 1-800-970-2447, or email Additional information can be found online at

About Applied Digital - "The Power of Identification Technology"

Applied Digital develops innovative identification and security products for consumer, commercial, and government sectors worldwide. The Company's unique and often proprietary products provide identification and security systems for people, animals, the food supply, government/military arena, and commercial assets. Included in this diversified product line are RFID applications, end-to-end food safety systems, GPS/Satellite communications, and telecomm and security infrastructure, positioning Applied Digital as the leader in identification technology. Applied Digital is the owner of a majority position in Digital Angel Corporation (AMEX:DOC - News). ...

Georgia: Fingers used as meal ticket

ROME-NEWS TRIBUNE - By Sonya Elkins, Staff Writers - September 2, 2006 - ROME, GEORGIA: If using a scan of your finger as a credit card sounds like something out of a sci-fi movie to you, it may be time to catch up with local 5-year-olds.

Rome City Schools is switching its elementary schools, Rome Middle School and Rome High School to a finger-scanning system that accesses students’ accounts and lets them pay for meals with — literally — a touch of the finger.

Second grade Anna K. Davie student Adrianna Harris liked the change in her lunchroom, she said, as she took a break from eating her pizza to consider the system.

“The finger’s better because all you’ve got to do is put your finger in, and you don’t have to do the number and get mixed up,” Adrianna said.

Before, students typed in or verbally gave pin numbers to lunchroom personnel to access their accounts and pay for meals. In the system prior to that, students scanned identification cards.

City administrators said the new system speeds lunch lines, particularly for younger students, and eliminates problems such as forgotten cards and numbers.

However, some parents are questioning the new system, which is already being used by some students at all schools.

The city hopes to have all students scanned in and the system in complete use within the next month.

A big part of Rome High parent Hal Storey’s issue is he was never notified or given information on the system before his 10th grade daughter’s finger was scanned. In an age of identity theft, he said, his questions should have been answered beforehand.

While he understands the biometric scan done by the machine of students’ fingers is not the equivalent of an actual fingerprint “it is some version of it,” he said.

“It may be perfectly secure, but my daughter is a minor and I understand that supposedly the kids have the option to not have their prints scanned but that’s not being articulated to my daughter,” Storey said. “If parents don’t know about it, they don’t know about the ‘opt out’ option.”

Rome City Schools Superintendent Gayland Cooper confirmed students don’t have to use the system.

The city has heard some questions about the finger-scanning system and in response plans to send a letter to parents, likely sometime next week, Cooper said.

“I have been assured biometrics and the use of a finger scan for meal passes is a secure method for charging student accounts for lunch and breakfast,” he said. “The process also allows the lunch line to move quicker, and it provides more security than verbally calling out pin numbers at lunch.”

The new technology hasn’t raised red flags with all parents.

Lori Tilton, mother of a fifth grade West End student, said she learned about it a couple of weeks ago while eating lunch with her daughter.

“I think it’s a good, efficient way to do it,” she said, “and I’m not really concerned with any violations of privacy.”

Getting all students scanned into the system is a gradual process, Cooper said. So why the added effort and investment to switch to a new system?

In the progression from scanning cards to entering numbers, this new option is the easiest and most efficient yet for students, said Barbara Carter, Rome City Schools nutrition director.

“We wanted our students to have more time to eat,” she said. “It’s going to get our students more quickly through the line.”

Things move along quicker at her school, said Anna K. Davie fourth grader Nikeria London. “It doesn’t take so long for us to sit down,” she said.

The system makes cashiers’ jobs easier and lines flow more smoothly, said Shawn Tucker, a technical support manager for Comalex, the company that supplied the new technology.

“From a sales point, it just streamlines the system,” he said. “You don’t have administrators worrying that children remember cards or numbers.”

If he had been notified and informed about the technology before it was put in place, Storey said, he might have been fine with the new system.

“At this moment my plan is to instruct them because they don’t have parental permission, to remove my daughter’s scan and have alternative means,” he said.

Swallowable Sensors

MIT TECHNOLOGY REVIEW - By Courtney Humphries - September 7, 2006 - After several years of development, swallowable wireless sensors are now ready to begin monitoring the human body. A tiny medical device sold by Buffalo, NY-based SmartPill has received approval by the Food and Drug Administration to be marketed in the United States. The electronic pill is meant to be ingested by a patient; it then gathers information about the digestive system as it travels through it, transmitting the information to a receiver worn by the patient.

The newly approved device, the size and shape of a large vitamin pill, is approved to help clinicians diagnose gastroparesis, a disorder that causes the stomach to empty very slowly. As it journeys through the GI tract, a radio transmitter sends information about the time its journey takes, as well as acidity and pressure levels. The level of acidity helps the physician to determine when the capsule enters and leaves the stomach. A receiver that's slightly larger than a cell phone collects the data from the device. And the disposable capsule gets excreted from the body after a day or two. The patient then returns the receiver to the doctor, for downloading and analysis. Each capsule will cost $500, and the entire system, including a docking station and software, costs $20,000.

David Barthel, president and CEO of SmartPill, says their device is the first among others they hope to design for addressing motility disorders, which arise when the muscle contractions moving food through the digestive system are abnormal. The most common such disorder is irritable bowel syndrome, which could affect up to 20 percent of Americans. ...

UK: Litter Hitlers
THE SUN - August 27, 2006 - THERE’S a nasty stench coming from wheelie bins across the country – and it’s nothing to do with rotting rubbish.

Microchips secretly installed are spying on families without their permission.
Where are we living — Britain or North Korea?
Of course the spies in our bins aren’t used to do anything useful like catch gangs of lawless youths roaming our streets.
Their main aim seems to catch us putting too much rubbish in our bins.
This is another disgraceful example of government, whether based at Whitehall or town hall, poking its nose into our business.
Councils say one aim of the “Bin Brother” scheme is to help them resolve disputes over wheelie bins’ ownership.
If so, why not provide owners with a tin of paint so they can put their house number on the side?
The Sun is all for recycling and a greener future.
But sneaking bugs into wheelie bins without telling owners just stinks.,,31-2006390720,00.html

Be Alert! Replay > From The August 30, 2005 Edition of BeAlert!

Techno-generation: Cash, card or microchip?

THE INDEPENDENT - August 29, 2005 - On a warm summer night in Barcelona, the dance floor of the Baja Beach Club is a writhing mass of locals and tourists. The normal punters here still have to go through the tiresome rituals of queuing for entry, waiting at the bar, fumbling for change, and fretting about the safety of their wallets. But for the lucky members of the Baja's VIP lounge, a magic chip implanted in their arm does it all for them. The cybernetic disco has arrived.

It's midnight, and time for the VIP lounge to open. Footballers Ronaldinho and Eto'o are sometimes here, though apparently not tonight. At the entrance, there's no lists of names, just a computer. Baja Beach Club director Conrad Chase is on hand to show how it works.

"Some of us who work at Baja already have the implant," he explains, rolling up his sleeve. "It's somewhere about here..." he murmurs, feeling his upper arm. He runs the scanner device over himself, and the computer instantly reads his 16-digit ID code. A photo pops up on the screen with his name, and the security man jokily waves the boss through...

VeriChip, as the technology is called, is manufactured by Applied Digital Solutions, a Florida-based company, and so far is the only chip on the market that can be embedded in humans. The chip is tiny, about the size of a pen point, and can be painlessly injected into the arm by any qualified nurse (Chase insists that at the Baja they only do this "early in the evening"). The scanning software, VeriPay, is operated by Windows.

Currently, there are more than 90 chipped VIP members of the Baja; staff won't be drawn on whether these include Ronaldinho (not all VIPs have opted for the device). Those that have, Chase explains, can run a tab on a central computer, which they can check up on with a wave of the arm. Chase is keen to point out the impossibility of credit-card details somehow leaking out. "It's a closed, pre-pay system we use here. Bills for drinks are simply debited off their Baja accounts."

He does admit that the chips seem to make his guests spend more money. "People like to play with it; they want to see the system working."

The technology is still very much a novelty. Chase, who says the Baja in Barcelona was the first disco in the world to use VeriChip, has now introduced it in its sister club in Rotterdam. He also knows of clubs in London and Miami which are considering buying it...

While the Baja Beach Club's innovative use of the VeriChip has caused much interest, Almaraz says that nobody can predict with any accuracy if credit cards, ID and keys will one day all be bundled into one tiny personal chip. Privacy and fraud concerns aside, chips with everything is a tantalising proposition. "My own personal opinion," Almaraz says, "is that this is where technology and evolution is now moving us."

The National ID Is Not Mandatory

NEWS WITH - By Devvy Kidd - August 21, 2006 - "Each State, in ratifying the Constitution, is considered as a sovereign body, independent of all others, and only to be bound by its own voluntary act. In this relation, then, the new Constitution will, if established, be a FEDERAL, and not a NATIONAL constitution." --James Madison, Federalist No. 39, January 1788

One of the top ten issues right now is the insidious National ID. Many believe this latest Nazi-style tool is to fight the endless, vague "war on terrorism." It is no such thing. It is yet another attempt by the Congress and Bush to control we the people against our will, this time by denying you certain privileges if you refuse to comply. The sponsor of this bill is one of the most dangerous individuals in Congress, Republican James Sensenbrenner. This trasher of the Bill of Rights sponsored this junk bill, passed along party lines (261-161) which was eventually, surprise! surprise! got attached to what is called a "must-pass" Senate bill glued to the unconstitutional plundering of the people's purse to continue the unconstitutional "national building" in Iraq as well as unconstitutional stealing from the people's treasury for tsunami relief.

Because these duplicitous lawyers who serve in Congress knew they could not force this mandate on the states, it is voluntary on the part of the states. I will again quote from a document obtained and reproduced from the National Archives titled: Memorandum for Walter Zellman from Sallyanne Payton, clearly marked: Preliminary Draft for Official Use Only. Do Not Quote or Release For Any Purpose, page 4, Health Care Task Reform under Hillary Clinton:. Please note these sections:

"(b) may the federal government use other actors in the governmental system and the private sector as its agents and give them orders as though they were parts of a prefectorial system? The short answer is "no." State governments are independent, although subordinated, sovereignties, not subdivisions of the federal government.

"Although the federal government may regulate many of their functions directly [as well, for example, it subjects state water districts to the Clean Water Act], it may not require them to exercise their own governmental powers in a manner dictated by federal law. The states may be encouraged, bribed or threatened into entering into joint federal state programs of various sorts, from unemployment insurance to Medicaid; but they may not be commanded directly to use their own governmental apparatus in the service of federal policy. There is a modest jurisprudence of the Tenth Amendment that seems to have settled on this proposition. See the DOJ [Dept. of Justice] memorandum for a fuller elaboration."

What does this mean from a constitutional position? It means that the government can bribe the states, they can threaten them, but in fact, the states cannot be forced to get down on their knees to the federal government. In other words, no state of the Union has to comply with the National ID. In order to squash any rebellion, Congress then mandated that any any citizen who refuses this National ID will be prohibited from flying on commercial flights, entering any government building or opening a bank account. In the case of the State of Oregon, that state recently updated their drivers licenses and began issuing them in the new format for eight years. This will all be chucked if the people of Oregon do not demand their state legislature stand up to the feds. Tons of money wasted; multiply it by 50 states and you have massive waste for no legitimate reason.

We know for a fact that members of Congress do not read legislation they vote on. This year the House of Representatives will be in session creating mayhem and shredding the U.S. Constitution for a total of 79 days. The rest is basically a paid vacation (just like the counterfeit U.S. Senate) for junkets and fund raising. How many of them even bothered to read Public Law 109-13?

This Machiavellian new law will further bankrupt the states, i.e., the estimated cost to the Union: Somewhere $9.1 billion and $12.8 billion. All of this is completely unnecessary and it is a direct result of the 9/11 "event." This National ID under the control of the dangerous and completely useless Department of Homeland Security, run by a very evil man, Michael Chertoff, has nothing to do with fighting terrorism. It is all about people control and amassing huge data banks to snoop on Americans.

Millions of Americans are opposed to this ID and will refuse it - even if their state representatives prove too cowardly to stand up to Washington, DC. New Hampshire came close last March 2006, but Republicans killed this magnificent show of standing against tyranny. Why was there no massive outrage by the good people of New Hampshire? Because most of them do not realize the importance of stopping this "voluntary mandate" against the states and you can blame the Ministry of Propaganda, aka the media, both mainstream and cable. The states of the Union issue their own drivers licenses and that is their domain, not the federal government, but how many Americans know this? No National ID is fool proof from tampering, period. Because this is a fact that has been proven, the next logical step will be a forced bio chip under the skin as the only way to "fight the war on terrorism." Mark my words: the National ID is the gateway tool for a chip and I ask: "Where are the churches in this country?" Why are they not warning their flocks that the Mark of the Beast is just over the horizon?

States must stand up to the feds and say no. If the estimated cost to the 50 states of the Union is between $9.1 BILLION and $12.8 BILLION, you can bet the end result will be triple that due to sheer numbers and incompetence. Every state legislature and governor must notify the federal government that they will not participate and assert their sovereignty; see Marbury v Madison and U.S. v Lopez. This will not happen unless millions of Americans get in the face of their state legislators, governors and banks NOW, not next February or a week before you're to be issued this ID. How do you do this?

1. You send a short letter to your state representative and state senator or send them a copy of this column with a note that you will NOT surrender your state drivers license. Yes, you understand that by not accepting this voluntary National ID you will be prohibited from flying on a commercial air liner, AMTRAK or enter a federal building (there goes jury duty). While this might present a hardship, you will NOT surrender any more of your rights to this federal machine and if that rep or state senator does not pledge to fight the National ID, you WILL vote against them if they're up for reelection or work hard to get them recalled and thrown out of office..

2. Attend any political function or town hall meeting before the November election and make your voice heard. Let the incumbent know that you will vote against him/her in November unless they give their word right then and there that they will fight the National ID on your behalf. It is voluntary for the states and you do not want your state tax dollars, whether a direct personal state income tax, sales tax, etc - spent on this worthless and totally unnecessary federal strong arming.

3. Notify your bank in writing (politely) that you will NOT be forced to accept this voluntary National ID and if it becomes a requirement to keep your bank account with their institution, you will with draw your money from their bank at the appropriate time. Banks - especially those local ones - need your business and if they suddenly begin getting hundreds or thousands of short, concise and non threatening letters that Americans are going to start pulling out their money, there will be giant rippling effect.

The National ID is opposed by organizations which represent MILLIONS of Americans. Every organization that opposes this National ID needs to put out a short letter of guidance to their memberships that they must act NOW and go after their state lawmakers. I live in the great State of Texas and have put together my letters to my state reps and will be getting them off in the mail by the time this column is posted. It is no sacrifice for me regarding the air lines because I refuse to fly; I refuse to surrender my rights to the TSA or any other government agency in their "war on terrorism," which I know is built on a mountain of lies. Just read Patrick Briley's intense and fully researched columns on how the FBI knowingly and willfully continues to protect known terrorist organizations operating inside the US; see here.

One very important thing occurred two months before 9/11 that most have either forgotten or didn't know and it has to do with airline security. Below are excerpts from one of the public hearings on 9/11; the full statement can be read by clicking on the link:

Statement on Aviation Security for the National Commission on Terrorist Attacks Upon the United States Seventh Public Hearing on Borders, Transportation, and Managing Risk

by Carol Ashley Member of the Family Steering Committee for the 9/11 Independent Commission Washington, D.C. January 26, 2004

"On September 11th, 2001, my beautiful 25 year old daughter, Janice, was killed in the terrorist attack on the World Trade Center. She worked on the 93rd floor of Tower One. Janice’s dad, her 18 year-old brother and I were devastated by her death."

"Meanwhile, the American civilian population was blissfully ignorant of the danger. But some government officials stopped flying commercial planes, and others canceled plans to fly on September 11th. According to a CBS news report, Attorney General John Ashcroft stopped flying commercial airlines in July, 2001, due to an FBI threat assessment. [8]. San Francisco Mayor Willie Brown, who was scheduled to fly into New York City on the 11th, was advised late on the night of September 10th to be cautious about air travel into New York City. [9]. On September 10th, Pentagon brass suddenly canceled flights scheduled for the 11th.[10] 4

"Did some officials have advanced warning of the danger? If so, who advised them? Why wasn't the American public warned?"

"There were two changes to aviation security regulations in the summer of 2001. Two months before the terrorist attacks, a 40 year old FAA rule allowing commercial airline pilots to carry handguns was rescinded. [16] Who was responsible for rescinding this rule? What prompted the decision to disallow a regulation which had been in existence for 40 years?"

How every convenient that a 40-year old FAA rule allowing pilots to carry hand guns was rescinded only two months before 9/11. A huge number of commercial pilots are former military and war vets. They know how to use guns and fight. Yet, only two months before that horrible day, they are suddenly disarmed. Think how different things would have turned out had all those pilots been armed to fight off some thugs with box cutters. The most complete and thoroughly researched time line of events on 9/11 is found here.

Time is an issue for Americans and most do not have the luxury of being able to spend the amount of time I do researching. I would like to recommend three videos which are free on the Internet regarding 9/11: 9/11 Revisited, A presentation by Stephen Jones, Professor of Physics, Brigham Young University and Terror Storm. These videos are not silly conspiracy theories. Dr. Jones, a decent and courageous man is now a target to get him fired because of his scientific and scholarly analysis (and recent testing) regarding the molten pools of steel in the "pit" of ground zero. Actions of a desperate police state. Watch these videos with an open mind and using common sense, ask yourself, "How could this have happened?" and "What really happened that day?" Millions of Americans know the government's official story is little better than a fairy tale at this point in time. It's a painful realization, but truth must be the goal. Not party loyalty, not fear and not moral cowardice in refusing to look at the hard cold facts. [Please note: These Internet videos take time to load, but well worth the wait. I have DSL and it still takes a while if you don't let them fully load and try to play while your system downloads.]

If you are serious about refusing to accept the National ID, then now is the time to get started in creating such a back lash, the thousands of lawmakers in the 50 state legislatures will feel the heat and stand up to the feds. This is a major, critical fight and an important tool for totalitarian government we must defeat. Sticking one's head in the boob tube watching some sporting event or going to the mall will not make the truth go away, it will only further the efforts of those out to destroy this republic. Freedom is every American's duty and responsibility. Those who birthed this republic and their families spilled thousands of gallons of blood on the battlefield so we could be free. Those freedoms are being torn from us at a rapid rate and it is your responsibility to join the growing millions of Americans who refuse to surrender our rights and our nation to a one world totalitarian government.

The Total Information Awareness Project Lives On

MIT TECHNOLOGY REVIEW - By Mark Williams - April 26, 2006 - Technology behind the Pentagon's controversial data-mining project has been acquired by NSA, and is probably in use.

In April, the Electronic Frontier Foundation (EFF), the advocacy organization for citizens' digital rights, filed evidence to support its class-action lawsuit alleging that telecom giant AT&T gave the National Security Agency (NSA), the ultra-secret U.S. agency that's the world's largest espionage organization, unfettered access to Americans' telephone and Internet communications. The lawsuit is one more episode in the public controversy that erupted in December 2005, when the New York Times revealed that, following September 11, President Bush authorized a far-reaching NSA surveillance program that included warrantless electronic eavesdropping on telephone calls and e-mails of individuals within the United States.

Critics charged that the Bush administration had violated both the Constitution's Fourth Amendment, which protects citizens against unwarranted search or seizure, and the Foreign Intelligence Surveillance Act (FISA) of 1978, which requires eavesdropping warrants to be obtained from a special court of judges empowered for that purpose.

In February 2006, the controversy intensified. Reports emerged that component technologies of the supposedly defunct Total Information Awareness (TIA) project -- established in 2002 by the Pentagon's Defense Advanced Research Projects Agency (DARPA) to develop advanced information technology to counter terrorists, then terminated by Congress in 2003 because of widespread criticism that it would create "Orwellian" mass surveillance -- had been acquired by the NSA.

Washington's lawmakers ostensibly killed the TIA project in Section 8131 of the Department of Defense Appropriations Act for fiscal 2004. But legislators wrote a classified annex to that document which preserved funding for TIA's component technologies, if they were transferred to other government agencies, say sources who have seen the document, according to reports first published in The National Journal. Congress did stipulate that those technologies should only be used for military or foreign intelligence purposes against non-U.S. citizens. Still, while those component projects' names were changed, their funding remained intact, sometimes under the same contracts.

Thus, two principal components of the overall TIA project have migrated to the Advanced Research and Development Activity (ARDA), which is housed somewhere among the 60-odd buildings of "Crypto City," as NSA headquarters in Fort Meade, MD, is nicknamed. One of the TIA components that ARDA acquired, the Information Awareness Prototype System, was the core architecture that would have integrated all the information extraction, analysis, and dissemination tools developed under TIA. According to The National Journal, it was renamed "Basketball." The other, Genoa II, used information technologies to help analysts and decision makers anticipate and pre-empt terrorist attacks. It was renamed "Topsail."

Has the NSA been employing those TIA technologies in its surveillance within the United States? And what exactly is the agency doing, anyway?

The hearings that the Senate Judiciary Committee convened in February to consider the NSA's surveillance gave some clues. Attorney General Alberto Gonzales, maintaining the administration's defense against charges that it violated the Fourth Amendment and FISA, told senators, firstly, that Article II of the U.S. Constitution granted a president authority to conduct such monitoring and, secondly, that the Authorization to Use Military Force (AUMF) passed after September 11 specified that the president could "use all necessary and appropriate force" to prevent future terrorist acts. Regarding FISA, Gonzalez claimed, the NSA had sidestepped its requirements to obtain warrants for electronic eavesdropping in particular cases. But, overall, the attorney general said, FISA worked well and the authorities had used it increasingly. The available facts support Gonzalez's contention: while the FISA court issued about 500 warrants per year from 1979 through 1995, in 2004 (the last year for which public records exist) 1,758 warrants were issued.

But when senators asked why, given the fact that FISA had provisions by which government agents could wiretap first and seek warrants later, the Bush administration had sidestepped its requirements at all, Gonzalez claimed he couldn't elaborate for reasons of national security.

Former NASA director General Michael Hayden, in charge when the NSA's surveillance program was initiated in 2002, was slightly more forthcoming. FISA wasn't applicable in certain cases, he told the senators, because the NSA's surveillance relied on what he called a "subtly softer trigger" before full-scale eavesdropping began. Hayden, who is nowadays the nation's second-highest ranking intelligence official, as deputy director of national intelligence, said he could answer further questions only in closed session.

Gonzalez's testimony that the government is making increased use of FISA, together with his refusal to explain why it's inapplicable in some cases -- even though retroactive warrants can be issued -- implies that the issue isn't simply that government agents may sometimes want to act quickly. FISA rules demand that old-fashioned "probable cause" be shown before the FISA court issues warrants for electronic surveillance of a specific individual. Probable cause would be inapplicable if NSA were engaged in the automated analysis and data mining of telephone and e-mail communications in order to target possible terrorism suspects.

As the Electronic Frontier Foundation's lawsuit against AT&T reveals, NSA has access to the switches and records of most or all of the nation's leading telecommunications companies. These companies' resources are extensive: AT&T's data center in Kansas, for instance, contains electronic records of 1.92 trillion telephone calls over several decades. Moreover, the majority of international telecommunications nowadays no longer travel by satellite, but by undersea fiber-optic cables, so many carriers route international calls through their domestic U.S. switches.

With the telecom companies' compliance, the NSA can today tap into those international communications far more easily than in the past, and in real time (or close to it). With access to much of the world's telecom traffic, the NSA's supercomputers can digitally vacuum up every call placed on a network and apply an arsenal of data-mining tools. Traffic analysis, together with social network theory, can reveal patterns indiscernible to human analysts, possibly suggesting terrorist activity. Content filtering, applying highly sophisticated search algorithms and powerful statistical methods like Bayesian analysis in tandem with machine learning, can search for particular words or language combinations that may indicate terrorist communications.

Whether the specific technologies developed under TIA and acquired by ARDA have actually been used in the NSA's domestic surveillance programs -- rather than only for intelligence gathering overseas -- has not been proved. Still, descriptions of the two former TIA programs that became Topsail and Basketball mirror descriptions of ARDA and NSA technologies for analyzing vast streams of telephone and e-mail communications. Furthermore, one project manager active in the TIA program before it was terminated has gone on record to the effect that, while TIA was still funded, its researchers communicated regularly and maintained "good coordination" with their ARDA counterparts.

It's this latter fact that is most to the point. Whether or not those specific TIA technologies were deployed for domestic U.S. surveillance, technologies very much like them were. In 2002, for instance, ARDA awarded $64 million in research contracts for a new program called Novel Intelligence from Massive Data. Furthermore, overall, a 2004 survey by the U.S. General Accounting Office, an investigative arm of Congress, found federal agencies operating or developing 199 data mining projects, with more than 120 programs designed to collect and analyze large amounts of personal data on individuals to predict their behavior. Since the accounting office excluded most of the classified projects, the actual numbers would likely have been far higher.

Beyond these programs, additionally, there exist all the data-mining applications currently employed in the private sector for purposes like detecting credit card fraud or predicting health risks for insurance. All the information thus generated goes into databases that, given sufficient government motivation or merely the normal momentum of future history, may sooner or later be accessible to the authorities.

How should data-mining technologies like TIA be regulated in a democracy? It makes little sense to insist on rigid interpretations of FISA. This isn't only because when the law was passed by Congress 30 years ago, terrorist threats on al Qaeda's scale did not yet exist and technological developments hadn't gone so far in potentially giving unprecedented destructive power to small groups and even individuals. Today's changed technological context, additionally, invalidates FISA's basic assumptions.

In an essay published next month in the New York University Review of Law and Security, titled "Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance," K. Taipale, executive director of the Center for Advanced Studies in Science and Technology Policy, points out that in 1978, when FISA was drafted, it made sense to speak exclusively about intercepting a targeted communication, where there were usually two known ends and a dedicated communication channel that could be wiretapped.

With today's networks, however, data and increasingly voice communications are broken into discrete packets. Intercepting such communications requires that filters be deployed at various communication nodes to scan all passing traffic with the hope of finding and extracting the packets of interest and reassembling them. Thus, even targeting a specific message from a known sender today generally requires scanning and filtering the entire communication flow in which it's embedded. Given that situation, FISA is clearly inadequate because, Taipale argues, were it to be "applied strictly according to its terms prior to any 'electronic surveillance' of foreign communication flows passing through the U.S. or where there is a substantial likelihood of intercepting U.S. persons, then no automated monitoring of any kind could occur."

Taipale proposes not that FISA should be discarded, but that it should be modified to allow for the electronic surveillance equivalent of a Terry stop -- under U.S. law, the brief "stop and frisk" of a person by a law enforcement officer based on the legal standard of reasonable suspicion. In the context of automated data mining, it would mean that if suspicion turned out to be unjustified, after further monitoring, it would be discontinued. If, on the other hand, continued suspicion was reasonable, then it would continue, and at a certain point be escalated so that human agents would be called in to decide whether a suspicious individual's identity should be determined and a FISA warrant issued.

To attempt to maintain FISA and the rest of our current laws about privacy without modifications to address today's changed technological context, Taipale insists, amounts to a kind of absolutism that is ultimately self-defeating. For example, one of the technologies in the original TIA project, the Genisys Privacy Protection program, was intended to enable greater access to data for security reasons while simultaneously protecting individuals' privacy by providing critical data to analysts via anonymized transaction data and by exposing identity only if evidence and appropriate authorization was obtained for further investigation. Ironically, Genisys was the one technology that definitely had its funding terminated and was not continued by another government agency after the public outcry over TIA.

Home page image is available under GNU Free Documentation License 1.2. Caption: Original logo of the now-defunct Total Information Awareness Office, which drew much criticism for its "spooky" images.

Canadians protest 'North American Union'

Party to fly national flag upside down in protest at convention

WORLDNETDAILY - By Jerome R. Corsi - September 8, 2006 - A Canadian political party intends to fly the national flag upside down during its convention this weekend as a signal of distress and resistance against the integration of Canada with the United States and Mexico into a North American Union regional government.

Connie Fogal, the leader of the Canadian Action Party told WND "we are opposed to the plan to develop the Security and Prosperity Partnership into a EU-style North American Union government" which "amounts to treason and is a total violation of the constitutional rights of Canadian citizens."

Fogel explained that the party has decided to fly the Canadian Flag upside down during its convention "as a signal of our distress and resistance against the integration of Canada with the United States and Mexico."

Fogal argues the plan to form a North American Union is designed to avoid public scrutiny and to maintain "deniability" even as the legal structure for a new regional government is being put into place by the executive branches of the three countries.

Cabinet-level executive branch participants of the SPP working groups in Canada are organized to work with counterparts in the U.S. and Mexico largely out of public view.

"The plan is to create the NAU incrementally," Fogal told WND, "because if any of the three governments were up front about their true intentions, the SPP plan would never fly."

The U.S. Department of Commerce SPP website contains a link to the SPP counterparts in Mexico and Canada.

Fogel used strong language in expressing to WND the focus of the Canadian Action Party to bring the SPP and NAU to the attention of Canadians.

"The rapid integration of North America into one entity ruled by an unaccountable, unrepresented and unelected group cabal of administrative executive branch officials is treason pure and simple," she said.

The Canadian Action Party is recognized by Canadian federal elections officials as an official Canadian political party. In the 2006 federal election, the party fielded some 36 candidates but received only some .04% of the vote.

A video currently archived on records Connie Fogel's charge that the Canadian involvement in SPP and the movement to create the NAU constitutes treason.

Mexican truckers to hit U.S. roadways next year

Transportation secretary vows to release 1-year, NAFTA pilot plan by December

WORLDNETDAILY - September 1, 2006 - WASHINGTON – Transportation Secretary Maria Cino promises to release plans within months for a one-year, NAFTA pilot program permitting Mexican truckers beyond the limited commercial zone to which they are currently restricted.

The program will likely involve about 100 Mexican trucking companies, the Department of Transportation says.

Under the North American Free Trade Agreement – NAFTA – the borders were to open partially to truckers from both countries in 1995. Full access was promised by 2000. Because of the restrictions on Mexican trucks, the Mexican government has imposed limits on U.S. truckers.

The U.S. restrictions were placed by the Clinton administration in response to demands from the Teamsters union, which said Mexican trucks posed safety and environmental risks. Currently, the U.S. permits Mexican truckers only in commercial zones close to the border that extend no further than 20 miles from Mexico.

While the American Trucking Association supports opening the border, other unions have joined in opposition with the Teamsters. The Owner-Operator Independent Drivers Association came out this month in opposition to any Mexican truck pilot program.

Todd Spencer, the association's executive vice president, said the program would jeopardize safety on U.S. roads and would lead to an influx of cheap Mexican labor.

"A move by the U.S. Department of Transportation to open U.S. roadways to Mexican trucks puts the interest of foreign trade and cheap labor ahead of everything else, including highway safety, homeland security and the well being of hardworking Americans," Spencer said.

In a letter to the Interstate Trade Commission, Spencer wrote: "The net effect of admission of Mexican trucks into the U.S. marketplace would undoubtedly be negative. The supposed benefits to consumers from speculative reductions in shipping rates would be offset by the societal costs that are difficult to measure, but are easy to identify."

Spencer told the commission that Mexican trucks are not up to U.S. safety standards, and if U.S. drivers earn less as a result of labor competition, they would have less money to invest in vehicle maintenance – leading to even more less safe trucks.

The Teamsters have led opposition to the plan, saying the so-called "NAFTA superhighway," a north-south interstate trade corridor linking Mexico, Canada and the U.S., would mean U.S. truckers replaced by Mexicans, more unsafe rigs on American roads and more drivers relying on drugs for their long hauls.

The August issue of Teamster magazine features a cover story on the plan for an enlarged I-35 that will reach north from the drug capital border town of Nuevo Laredo, Mexico, 1,600 miles to Canada through San Antonio, Austin, Dallas, Kansas City, Minneapolis and Duluth, while I-69 originating at the same crossing will shoot north to Michigan and across the Canadian border.

Public proposals for the superhighway call for each corridor to be 1,200 feet wide with six lanes devoted to cars, four to trucks, with a rail line and utilities in the middle. Most of the goods will come from new Mexican ports being built on the Pacific Coast – ports being run by Chinese state-controlled shipping companies.

US expands visitor fingerprinting to deter attacks

REUTERS - By Deborah Charles - September 8, 2006 - WASHINGTON -

The U.S. government will take prints of all 10 fingers of foreigners entering the United States and compare them with those found at sites with ties to terrorists, the country's security chief said on Friday.

The United States now collects the prints of only the two index fingers of foreign visitors. But it will gather prints of all their fingers and thumbs by the end of 2008, Michael Chertoff, the secretary of Homeland Security, said."We will be able to run everybody's fingerprints against latent fingerprints that we are collecting all over the world in terrorist safe houses, off of bomb fragments that terrorists build, or in battlefields where terrorists wage war," Chertoff said in a speech at Georgetown University.

The department will install new 10-fingerprint reading devices at borders and airports in two years time as it transfers from the two-print system criticized for being incompatible with the FBI's 10-print databases.

Fingerprints are collected as part of the US-VISIT program launched in January 2004 to tighten U.S. borders and prevent other attacks like those of September 11 when 19 foreigners -- who all had U.S. visas -- hijacked four airplanes and killed nearly 3,000 people.

Chertoff said getting more prints should deter those who want to enter the United States to carry out an attack.

"Every single terrorist who has ever been in a safe house or a training camp or built a bomb is going to have to ask ... 'Have I ever left a fingerprint anywhere in the world that's been captured?"'

Under US-VISIT, visitors from most countries must have a digital photo and fingerprints taken by an immigration officer as they enter the country. Until now, the data had been checked just against terrorist watch lists and criminal databases.

For those who have been sleeping through the last few years or just unaware of what's been happening to America an in a larger view, the entire world, select the US-VISIT link in the above article or read a few snippets here from our Homeland Security Department, or should it be the Insecurity Department?


Note: The Following Information Comes From The United States Department of Homeland Security

>subtitle> Transportation & Travel

>subtitle> US-VISIT

US-VISIT: How It Works

US-VISIT >> How It Works

In many cases, US-VISIT begins overseas, at the U.S. consular offices issuing visas, where visitors’ biometrics (digital fingerscans and photographs) are collected and checked against a database of known criminals and suspected terrorists. When the visitor arrives at the port of entry, we use the same biometrics – digital fingerscans – to verify the person at our port is the same person who received the visa.

What can I expect when I arrive in the U.S.?

Once at the port of entry you will find that many of the procedures remain unchanged and are familiar to you. For example, a U.S. Customs and Border Protection Officer still reviews your travel documents, such as a visa and passport. The officer still asks you questions about your stay in the U.S.

What’s new under US-VISIT is that the U.S. Customs and Border Protection Officer now uses the inkless, digital fingerscanner to capture two of your fingerscans. You first place your left index finger and then your right index finger on the scanner. The officer also takes your digital photograph. These procedures add only seconds to the overall processing time.
Download the US-VISIT Step-by-Step Entry Guide (PDF, 1 page, 609 KB)
View US-VISIT Entry and Exit Process Videos in English and other languages

What do I need to do before I exit the U.S.?

US VISIT Exit procedures are being tested at the following airports:
-Baltimore/Washington International
-Chicago O’Hare International
-Dallas/Fort Worth International
-Denver International
-Detroit Metropolitan Wayne County International
-Fort Lauderdale-Hollywood International
-Hartsfield-Jackson Atlanta International
-Luis Muñoz Marin International in San Juan, Puerto Rico
-Newark Liberty International
-Philadelphia International
-San Francisco International
-Seattle-Tacoma International

The US-VISIT Exit procedures are also being tested at the following seaports:
-Miami International Cruise Line Terminal,
-Long Beach and San Pedro seaports near Los Angeles

If you leave from one of these ports, you are required to confirm your departure using US VISIT exit procedures. Your check out will include the scanning of your visa or passport and repeating the simple inkless fingerscanning process for first your left index finger and then your right index finger. A workstation attendant will be available if you need assistance. The exit confirmation will be added to your travel records to demonstrate compliance with the terms of your admission. Ultimately, most foreign visitors will be required to check out before leaving the United States.
US-VISIT Step-by-Step Exit Guide (PDF, 1 page, 768 KB)
View US-VISIT Entry and Exit Process Videos in English and other languages

Why do we collect this information?

The biographic and biometric data are used to match your identity against the data captured by the State Department at the time the visa was issued to ensure that you are the same person who received the visa. In addition, your digital picture that was taken at the visa-issuing point is displayed to the U.S. Customs and Border Protection Officer for visual comparison and confirmation.

Using all these tools, the U.S. Customs and Border Protection Officer will then either admit you or conduct additional inquiries based on the verification results. These procedures reduce fraud, identity theft, and the risk that terrorists and criminals will enter the U.S. undetected or by using stolen or fraudulent documents.

- Biometrics Catalog (You’re leaving a federal government web site)

US-VISIT Main Link (Reprise)

US-VISIT Program
Privacy Policy
1. What is the purpose of the US-VISIT program?
The United States Visitor Immigrant Status Indicator Technology (US-VISIT) is a United States Department of Homeland Security (DHS) program that enhances the country’s entry and exit system. It enables the United States to record the entry into and exit out of the United States of foreign nationals requiring a visa to travel to the U.S., creates a secure travel record, and confirms their compliance with the terms of their admission.

The US-VISIT program’s goals are to:
a. Enhance the security of our citizens and visitors;
b. Facilitate legitimate travel and trade;
c. Ensure the integrity of the immigration system; and
d. Protect the privacy of our visitors.
The US-VISIT initiative involves collecting biographic and travel information and biometric identifiers (fingerscans and a digital photograph) from covered individuals to assist border officers in making admissibility decisions. The identity of covered individuals will be verified upon their arrival and departure.
2. Who is affected by the program?

Individuals subject to the requirements and processes of the US-VISIT program (“covered individuals”) are foreign nationals entering and exiting the U.S. through identified ports of entry. U.S citizens and Legal Permanent Residents (LPRs) are currently exempt from the requirements of US-VISIT. Foreign nationals who later become LPRs or U.S citizens will no longer be covered by US-VISIT, but the information about them collected by US-VISIT will be retained, as will information collected about LPRs and U.S. citizens who used foreign travel documents to enter or exit the U.S.
3. What information is collected?

The US-VISIT program collects biographic, travel, travel document, and biometric information
(photographs and fingerscans) pertaining to covered individuals. No personally identifiable
information is collected other than that which is necessary and relevant for the purposes of the
US-VISIT program.
4. How is the information used?
The information that US-VISIT collects is used to verify the identity of covered individuals when entering or leaving the U.S. This enables U.S. authorities to more effectively identify covered individuals that:
• Are known to pose a threat or are suspected of posing a threat to the security of the United States;
• Have violated the terms of their admission to the United States; or
• Are wanted for commission of a criminal act in the United States or elsewhere. Personal information collected by US-VISIT will be used only for the purposes for which it was collected, unless other uses are specifically authorized or mandated by law.
5. Who will have access to the information?
The personal information collected and maintained by US-VISIT is accessed by employees of DHS—Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), and United States Citizenship and Immigration Services (USCIS) – and Department of State who need the information to carry out mission-related responsibilities. In accordance with DHS’s policy published on January 4, 2004 on the DHS website and in the Federal Register on January 16, 2004, DHS also shares this information with federal, state, local, tribal, and foreign government law enforcement agencies.

6. How will the information be protected?
Personal information will be kept secure and confidential and will not be discussed with, nor disclosed to, any person within or outside the US-VISIT program other than as authorized by law and in the performance of official duties, and as described above. Careful safeguards, including appropriate security controls, compliance audits, and memoranda of understanding with non- DHS agencies will ensure that the data is not used or accessed improperly. In addition, the DHS
Chief Privacy Officer will review pertinent aspects of the program to ensure that proper safeguards are in place. Roles and responsibilities of DHS employees, system owners and managers, and third parties who manage or access information in the US-VISIT program include:
6.1 DHS Employees
6.2 US-VISIT System Owners/Managers
6.3 Third Parties ...

Fastest supercomputer to be built

BBC NEWS - September 7, 2006 - Computer giant IBM will build the world's most powerful supercomputer at a US government laboratory.

The machine, codenamed Roadrunner, could be four times more potent than the current fastest machine, BlueGene/L, also built by IBM.

The new computer is a "hybrid" design, using both conventional supercomputer processors and the new "cell" chip designed for Sony's PlayStation 3.

Roadrunner will be installed at the Los Alamos National Laboratory, New Mexico.

The laboratory is owned by the US Department of Energy (DOE). Eventually the machine could be used for a programme that ensures the US nuclear weapons stockpile remains safe and reliable, the DOE said in a statement.

Using supercomputers to simulate how nuclear materials age negates arguments for the resumption of underground nuclear testing.

Peak speeds

The new machine will be able to achieve "petaflop speeds," said IBM. One petaflop is the equivalent of 1,000 trillion calculations per second.

Running at peak speed, it will be able to crunch through 1.6 thousand trillion calculations per second.

By comparison, BlueGene/L is capable of mere "teraflop" (trillion calculations per second) speeds.

Installed at the DOE's Lawrence Livermore National Laboratory in California and also used for the DOE's Stockpile Stewardship Program, it has achieved 280.6 teraflops and is theoretically capable of 367 teraflops.

Roadrunner should be capable of much more. It will achieve its superfast performance using a hybrid design, built with off-the-shelf components.

The computer will contain 16,000 standard processors working alongside 16,000 "cell" processors, designed for the PlayStation 3 (PS3).

Each cell chip consists of eight processors controlled by a master unit that can assign tasks to each member of the processing team. Each cell is capable of 256 billion calculations per second.

The power of the cell chip means Roadrunner needs far fewer processors than its predecessors.

Spare power

This is not the first attempt by scientists to harness the power of the cell.

In August, scientists at Stanford University in California announced plans to distribute a program that could run on gamers' PS3s.

The folding@home program would tap the cell's spare processing power to examine how the shape of proteins, critical to most biological functions, affect diseases such as Alzheimer's.

This distributed computing method uses each individual machine to process a small amount of data, with results fed back over the internet to a central machine where they can be viewed together.

The Stanford researchers say that 10,000 consoles running the program would give a performance equivalent to one petaflop. The team hopes eventually to enlist 100,000 machines.

Although a network of this size would in theory out-perform Roadrunner, the two systems would be used to solve different types of problem.

Computer talk

Both involve huge sets of data that are split into smaller packets to make them more manageable.

On a distributed computing network these small packets can be processed independently, with results brought together at key stages of a project.

For example a PC running the SETI@home project, which examines thousands of hours of radio telescope signals for signs of extra-terrestrial intelligence, processes just a small chunk of data.

Finding a signal does not depend on the outcome of other PCs running the program.

However, on a supercomputer like Roadrunner, the different units must be able to "talk" with each other all of the time, which is vital for applications such as weather simulation which feature a huge number of constantly changing and interacting variables.

When Roadrunner is finished in 2008 it will cover 12,000 square feet (1,100 square metres) of floor space at Los Alamos National Laboratory

IBM says it will start shipping the new supercomputer later this year.

New government rule may allow medical experiments on humans without their consent

NEWS TARGET - September 7, 2006 - In 1996, a regulation (21CFR50.24) was approved that contained a loophole allowing experimental testing of a blood substitute product -- HemAssist -- on emergency trauma patients without their knowledge or consent, but the experiment was terminated when more HemAssist patients died than patients under standard care.

Ten years later, after the development of HemAssist has been abandoned, a similar experiment using blood substitute Polyheme was being conducted in 27 cities across the United States from July 7 to July 31, with a blue wrist band provided by manufacturer Northfield Laboratories Inc. being the only way to "opt out." Outrage at these trials has pushed the federal government to reconsider the loophole.

The FDA -- lambasted by the medical community for allowing the Polyheme trials to occur despite the reservations expressed by experts -- has stated it will take "a close look" at how the blood substitute is being used, and release a draft of guidelines on non-consent trials that will "broaden the discussion of community consultation and public disclosure" and "clarify terminology used in regulations that have been difficult to interpret."

The FDA has scheduled a public hearing on the matter at the University of Maryland Shady Grove Center on Oct. 11.

"It is appropriate that we review the regulation and get the perspectives of those who participated in such studies to make sure that emergency research is being carried out in a scientifically sound and ethical manner," said Dr. Janet Woodcock, FDA deputy commissioner for operations.

"Under no circumstances should human beings be turned into guinea pigs for medical experiments without their clear consent," countered Mike Adams, a health freedom advocate and critic of the medical industry's practice of using adults and children for medical experiments. "This practice harkens back to the days of Nazi Germany where, not coincidentally, companies like Bayer routinely engaged in mass medical experimentation on prisoners," he said. "This is a fundamental human rights issue, and both the FDA and Big Pharma have consistently shown little regard for human rights, especially when such rights get in the way of corporate profits."

"The false justification that 'this is for the patients' own good' is exactly the same twisted logic once fronted by the Nazis to justify their own inhumane medical experiments," Adams added.

China tightens controls on foreign news

ASSOCIATED PRESS - By ELAINE KURTENBACH, AP Business Writer - September 10, 2006 - SHANGHAI, China -- China tightened its control over the distribution of news by foreign agencies Sunday, further restricting international access to the already tightly regulated Chinese media market.

The new measures took effect immediately upon being issued by the state Xinhua News Agency. The regulations give Xinhua broad authority over foreign news agencies, requiring them to distribute stories, photos and other services solely through Xinhua or entities authorized by Xinhua.

The rules would affect The Associated Press, Reuters and other foreign news agencies seeking wider access to the rapidly expanding Chinese market. It was unclear how other news organizations would be affected.

Under a decade-old set of regulations, foreign news agencies were allowed limited distribution of financial data and other information — deals that the new rules appear to rule out.

The tighter restrictions underscore how the Communist Party's political agenda and Xinhua's business interests are coinciding.

Hu Jintao's leadership has sought to rein in state-controlled media that have strayed from party dictates in search of profits and market share. Journalists and editors have been fired and arrested.

At the same time, Xinhua has been trying to transform itself from an agent of stodgy government propaganda into a worldwide competitor. The agency, founded in 1931 as the Red China News Agency, is trying to build a financial news service and has been trying to leverage Beijing's hosting of the 2008 Olympics to boost its sports coverage and photo services.

"We must also learn, borrow and make use of anything that is advanced, and beneficial to us, the aim being our own growth and expansion," Xinhua's head, Tian Congming, said according to the text of a speech given at a closed-door meeting earlier this year. "Only thus, can we truly hope to find the entry point for leapfrogging growth."

As part of its new powers, Xinhua also will police the distribution of news in the mainland by agencies from Hong Kong, a former British colony now ruled by China but that operates under separate laws and with a free press. It also affects agencies in Taiwan, which Beijing claims but does not control.

Under the rules, any reports that disrupt "China's economic and social order or undermine China's social stability" will be banned as will news that undermines the country's "national unity, sovereignty and territorial integrity," Xinhua said.

The rules issued by Xinhua made no specific mention of foreign distribution of Internet or video news content, although such activities are restricted under other guidelines.

China has long sought to limit foreign distribution of news inside the country while exercising harsh limits on domestic media that are often arbitrarily enforced by vaguely worded state security rules that mandate harsh penalties, including long prison terms, for violations.

The new rules appeared designed to end any uncertainties over the government's determination to prevent foreign news businesses from operating in the Chinese mainland. ...

Duke scientists set sights on cloak of invisibility

CHICAGO TRIBUNE - BY JON VAN - September 10, 2006 - After years of work, David Schurig and David R. Smith at Duke University will finish their research and have absolutely nothing to show for it: They're making a cloak of invisibility.


So unusual is this undertaking for a serious academic electrical engineering team that Smith has created an elaborate Web site discussing the dream of invisibility as viewed in science fiction--Harry Potter and the Hogwarts School of Witchcraft are mentioned--and relating such ideas to scientific fact.

In theory, Smith said, it's possible to make light follow curved lines that skirt an object rather than illuminate it. Light "circulates around the void--like water flowing past a rock in a stream," Smith explained.

This would create a void in space--a place that is invisible.

It's an interesting theory cooked up by Smith and Sir John Pendry at the Imperial College in London. Even more interesting will be to see if the theory will produce invisibility.

Equations describing the properties of electromagnetic fields were derived in the 19th Century by James Clerk Maxwell, and they can be used to envision how substances would deflect light, said Schurig.

Natural materials would not do the trick, but Duke researchers are designing artificial substances, called metamaterials, that are engineered to be invisible. They use technology for making circuit boards and computer chips to create metamaterials.

"We're building stuff in the microwave range, using fairly standard lithography," said Schurig.

The metamaterials under construction should render an object invisible to radar, although people could still see it, said Schurig. The Duke team's goal is to have a working example sometime next year. It would demonstrate that invisibility cloaks can work.

The project has evoked interest from military people who like the idea of cloaking spy satellites so they are invisible to radar, among other things. The Defense Advanced Research Projects Agency is financing the research.

Making a cloak to render stuff invisible to the human eye will be more difficult, requiring nanotechnology fabrication and some very clever design work, Schurig said.

"It will probably take 10 years, and we're not certain it's possible," he said.

Visible light waves are shorter than the microwave spectrum in which the researchers are working, and human vision sees light at several wavelengths. It's not clear if metamaterials can be designed to deflect light at several wavelengths simultaneously.

But even if an invisibility cloak isn't perfect it could be useful, said Schurig.

"You might make a cloak against infrared light," he said, "so that someone using night vision goggles couldn't see you."

Deflecting green light might make someone moving in a jungle virtually invisible.

Smith cites the film Predator, in which an alien has a cloak that provides imperfect invisibility that still works pretty well.

"Along the lines of advanced camouflage, we should not overlook the solutions that nature has provided," Smith said on his Web site. "An object is invisible if it is indistinguishable--or at least hard to distinguish--from its surrounding environment. Many animals and insects have evolved in form to blend into their environment, making it harder for predators . . . to find them."

Metamaterials might be used to cloak structures that block radio signals, thereby improving cell phone communications, Schurig said.

"Many people have this fantasy of being invisible," he said. "It's not clear what the commercial benefits might be, but the idea has really sparked a lot of interest.",1,2492349.story?coll=chi-business-hed

World Reaches 2.5 Billion Cell Connections

ASSOCIATED PRESS - September 11, 2006 - The total number of worldwide cellular connections now stands at 2.5 billion -- just 12 months after passing the 2 billion mark.

Wireless Intelligence, which tracks the global mobile market said growth is currently running at more than 40 million new connections per month -- the highest volume ever.

A quarter of the growth is coming from China and India, with China's market expanding at more than 5 million new connections per month.

The rate of new connections in India has quadrupled over the last 18 months to reach a level very close to China's.

Other areas experiencing rapid growth include Russia, the U.S., Pakistan, Ukraine, Brazil, Indonesia, Nigeria and Bangladesh.

Wireless Intelligence predicted the next 500 million new connections will take 16 months, meaning that the market is on track to reach 3 billion connections around the end of next year.

AT&T Launches Live Broadband TV Service

ASSOCIATED PRESS - By BRUCE MEYERSON - September 12, 2006 - NEW YORK - AT&T Inc. (T) is launching an Internet TV service where subscribers can watch live cable channels such as Fox News on any computer with a broadband connection for $20 per month.

The AT&T Broadband TV service announced Tuesday features about 20 channels of live and made-for-broadband content. The channel lineup includes the History Channel, the Weather Channel, the Food Network, Bloomberg and Oxygen. Additional channels will be added soon, the company said without elaborating.

The content is being provided by MobiTV Inc., a company that has specialized in delivering live cable channels to cell phones through wireless carriers such as Sprint Nextel Corp. (S) and Cingular Wireless, which is majority owned by AT&T.

As compared with many Internet-based video services, where the viewing window is considerably smaller than most computer monitors, the new AT&T offering will allow users to expand the picture to full screen. The service requires Microsoft Corp. (MSFT)'s Windows Media Player for playback.

Viewers will see whatever commercials are being shown on the live broadcast, but no advertisements are planned for the browser window and control panel that frame the TV picture.

AT&T Broadband TV will be available to customers of rival Internet services such as cable broadband in addition to the company's DSL subscriber base of 7.8 millioon accounts. It will also be accessible over Wi-Fi wireless services offered at retail locations. ...

New Service From Amazon Offers Downloadable Films
NEW YORK TIMES - By SAUL HANSELL - September 8, 2006 -, the leading purveyor of goods online, has started selling digital products, offering movies and television programs that can be downloaded and watched on a computer or portable video player.
The move, which was expected, is the first major effort by Amazon, the Web’s largest retailer, to sell downloadable entertainment. Amazon has at times moved toward offering music downloads but never introduced a music service. It does, however, offer some free promotional music files.
Amazon’s new video service will compete with the iTunes Music Store of Apple and a growing array of other video retailers including Google, AOL, Movielink and CinemaNow.
Apple has been selling television programs and music videos and is expected to announce next week that it will also sell movies. ….

No comments: