jump to navigation

“Ihre Papiere, Bitte” (“Papers, Please”) = The New Cash October 28, 2010

Posted by scmla in Original Article.
trackback

“Ihre Papiere, Bitte” (“Papers, Please”) = The New Cash
SoCal Martial Law Alerts
October 25, 2010


A University of North Carolina student pays fellow student Folabomi Oladosu for a snack and an energy drink with his UNC One Card.

“The U.S. dollar is dead. There … I’ve said it.” — Christopher Barker

 

“To put it bluntly, the dollar’s days are numbered and its demise is inevitable.” — Vasko Kohlmayer

 

“This summer a major point happened in the history of money. The first concrete sign was seen, that the end is coming to actual coins and cash.” — Tomi Ahonen

With economists, political pundits, free thinkers and, oh heck, anyone with half a brain not tied behind their back declaring and decrying the certain death of the dollar …

And with some even saying that money itself is dead …

What, oh what, are we to do?

False-Flag Cyber Attack = Cyber Patriot Act

“There’s going to be an i-9/11 event. Which … means an event where the instability, or the insecurity, of the Internet becomes manifest during a malicious event, which then inspires the government into a response ….

“So I was having dinner with Richard Clarke and I asked him if there is an equivalent [to the Patriot Act]; is there an i-Patriot Act just sitting waiting for some substantial event as an excuse to radically change the way the Internet works. He said ‘Of course there is.'” — Lawrence Lessig, Law Professor, Stanford [emphasis added]

According to the Telegraph, this same Richard Clarke, former counter-terrorism czar under Presidents Clinton and Bush Sr., also said:

“The US must prepare itself for a full-scale cyber attack which could cause death and destruction across the country in less than 15 minutes … “

To illustrate this dire “electronic Pearl Harbor” scenario, the Telegraph further paraphrases Clarke’s latest book, “Cyber War: The Next National Security Threat”:

” … the problems start with the collapse of one of Pentagon’s computer networks.

“Soon Internet service providers are in meltdown. Reports come in of large refinery fires and explosions in Philadelphia and Houston. Chemical plants malfunction, releasing lethal clouds of chlorine.

“Air traffic controllers report several mid-air collisions, while subway trains crash in New York, Washington and Los Angeles. More than 150 cities are suddenly blacked out. Tens of thousands of Americans die in an attack comparable to a nuclear bomb in its devastation.

“Yet it would take no more than 15 minutes and involve not a single terrorist or soldier setting foot in the United States.”

Clarke’s “Cyber War” co-author and Council on Foreign Relations (CFR) senior member, Robert Knake, further explained:

“We must have the ability to turn off our connection to the Internet and still be able to continue to operate. Relying on a system as precarious as the Internet is a big mistake.”

In his 2009 analysis of the ubiquitous cyber-terror hype, Boston Review writer, Evgeny Morozov, said:

” … because the back-end infrastructure underlying our economy (national and global) is now digitized, it is subject to new risks. Fifty years ago it would have been hard — perhaps impossible, short of nuclear attack — to destroy a significant chunk of the U.S. economy in a matter of seconds; today all it takes is figuring out a way to briefly disable the computer systems that run VISA, MasterCard and American Express. Fortunately, such massive disruption is unlikely to happen anytime soon … “

Well, not anytime soon unless they make it happen. Remember, there’s still that small detail of the crashing U.S. economy and the death of the U.S. dollar that needs to be dealt with, covered up, used and / or exploited …

Because as former White House Chief of Staff, Rahm Emanuel, so famously said:

“You never want a serious crisis to go to waste. And what I mean by that is: An opportunity to do things that you didn’t think you could do before.”

So here you have it: 1) Problem; 2) Reaction, and; 3) Solution. The Hegelian Dialectic. The “problem” is the alleged “instability” and / or the “insecurity” of the Internet coupled with the sad fact of our unstable economy, both of which will most likely come apart at the seams if and / or when the Internet is subject to cyber attack. The “reaction” from the people to such a cyber attack, as always, will be for the government to fix the problem(s) stat. The government will then leap up and unveil a pre-packaged “solution” to the cyber / monetary crisis, which will undoubtedly involve oppressive, dictatorial-like control over the Internet, cash-card payment systems and implementation of an online national ID coupled with RFID (i.e. radio-frequency identification).

Even more disturbing, the last two items (cash card and national ID) will most likely be one and the same — if not at first, then soon, soon and very soon.

Cyber ID = Cyber Tracking

Now enter the federal government’s obsession with standardized identification.

Consider for a moment Homeland Security Presidential Directive 12 (HSPD-12): An order signed by President Bush Jr. in 2004, which “mandates a federal standard for secure and reliable forms of identification,” — a policy which ostensibly applies to “federal employees and contractors” only.

Next consider this month’s “demonstration” called “Autumn Blend,” where DHS, FEMA, the Pentagon, the Air Force, other federal, state, local and private emergency personnel (from multiple states) and private high-tech identity and security companies all gathered together at Northrop Grumman’s shipbuilding facility in McLean, Virginia to show the federal government just how well they’ve complied with HSPD-12:

“As participants’ identities were cleared and individuals permitted access to the demonstration venue, Virginia’s Interoperability Picture for Emergency Response (VIPER) geospatial application tracked and displayed their actions in near real-time at fusion centers and emergency operations centers throughout the United States.” [emphasis added]

Isn’t that special?

While Rome is burning (i.e. while the dollar is dying, the economy is tanking and people everywhere are losing everything) the federal government is fiddling around fine-tuning their ability to identify all their worker bees during an “emergency” … And now, icing on cake, they’re crowing about their ability to track everyone who wears one of these nifty, “standardized” IDs.

Think this only applies to “federal employees and contractors”?

Well, think again. Employees at all levels of government and even private-sector vendors were forced tocomply with HSPD-12 during “Autumn Blend.” This is how it works in the real world: The feds / military / big business set the standard and then everyone / everywhere must comply, or face the specter of being forced out of the economic system entirely.

“Wal-Mart played a key role in the implementation of the Universal Product Code (UPC) … when it required suppliers to track inventory using those barcodes. Now, Wal-Mart and the [DoD] have mandated their vendors to utilize RFID … With the help of the [DoD], RFID becomes the de facto standard for product identification world-wide. The exact same logic applies to the identification of human beings. If Wal-Mart begins to require any particular personal ID format, the rest of the world is soon to follow.” — Ken Raggio, Editor, Endtime Magazine [emphasis added]

Raggio is also quick to point out that Wal-Mart’s “corporate policies … eventually become de facto international law.”

In spite of (or maybe because of?) the fact that the states have been dragging their feet with regard to implementing REAL ID, the White House has been pushing very hard to create a high-tech “identity ecosystem.” This system, though “voluntary” at first, will eventually force anyone and everyone who does business online to accept a national online identity number, which will then be linked to a centralized database where all of one’s sensitive identity information will be kept.

News flash: Without this federally-mandated identity number, you will not be able to buy, nor sell, nor surf, nor search, nor do anything that you would normally do on the Internet.

Avisian editor, Zack Martin, sums up the “draft strategy” for the National Strategy for Trusted Identities in Cyberspace (NSTIC) this way:

“Create a system that individuals can use to login to a bank account, check email or keep track of research topics of interest. Give it a catchy name like ‘identity ecosystem’ and expect it to secure all transactions while at the same time providing anonymity … Find an efficient way to protect individuals online whether they are engaged in the most secure task or the most benign.”

Yes, you read that right:

All your identifying information (passwords and everything!) and all your transactions (including research!) will be kept in one conveniently hackable and trackable place by the federal government (for your own protection, of course!)

Feel safer now?

According to Martin, the new Presidential directive implementing NSTIC “will be similar, possibly even an amendment to … HSPD-12.”

He also stated that “subsequent credentialing efforts and this extension to the citizen are all logical outgrowth from this early program” and that “some government insiders say extending a [Personal Identity Verification]-type infrastructure to the public only makes sense.” [emphasis added]

In plain English, here’s what they’re really talking about:

A national ID.

Online.

You know, in that extremely “unstable,” “insecure” and “precarious” virtual environment that is forever and always under cyber-threat and cyber-attack (according to the self-same government that wants to implement NSTIC!)

To sum: Putting all your identity “eggs” in one online “basket” is frighteningly akin to putting your newborn baby in the middle of a battlefield. Who in their right mind would do such a thing?

Cyber ID + Cyber Everything = The New Cash

“A race is on, not unlike the race to the moon and we will see if the United States can catch up with the rest of the planet when it comes to identity credentials.” — Salvatore D’Agostino, IDMachines

 

“Almost ALL the nations of the world now have a single, comprehensive national identification system … almost without exception, countries are moving at break-neck speeds to implement ID systems that are far more sophisticated than they have been historically. The United States is one of the last countries to get a compulsory national ID, mostly because it has been the land of the free and the home of the brave. But that has changed.” — Ken Raggio, Editor, Endtime Magazine

Precise Biometrics announced in an October 5, 2010 press release:

“The Cross River State is the first Nigerian state to implement biometric technology and combine authentication and payment in a state-wide ‘Smartcity’ card. The state ID card program is the first of its kind in the world and a breakthrough for Precise Biometrics on the African continent. In the coming years, all citizens in Cross River State, close to 3 million people, will be issued a card. More Nigerian and African States are expected to follow the market development with biometric ID and payment cards.” [emphasis added]

Apparently this lucrative “race to the moon” also causes identity companies such as Precise Biometrics to overstate their claims, since both Malaysia and Brunei have had multi-purpose national ID cards for at least five years now. Their “smart cards” function as: National ID, passport, driver’s license, ATM card, travel card, medical records, online ID, biometrics (i.e. iris and fingerprints) and birth certificate.

Get the picture? We’ve got third-world countries leading the world in high-tech national IDs that do everything except wash the family dog. Facetiously speaking, these cards do: “Cyber everything.”

Think it’ll be tough to force the privacy-loving U.S. of A. to go cashless? Think again, because we’ve got a nation full of kids who’ve been learning firsthand how to navigate the cashless society by virtue of attending cashless schools.

“You’ve got kids coming to campus who’ve been using cards and accounts since junior high.” — Chris Corum, Editor, CR80News.com

 

“In the beginning, a ‘cashless’ campus meant student IDs doubled as a meal ticket and maybe a debit card at the college bookstore. Today, those student ID cards open doors to dorms and labs, earn discounts with local merchants, sub-in for loose change at vending and copy machines, and even help with the laundry. Welcome to the cashless campus.” — Dana Dratch, CreditCards.com

The college ID of today is used to pay for cafeteria meals, snacks, laundry, photocopies, off-campus purchases and some cards are even tied to local bank accounts and carry a VISA, or MasterCard logo.

Even more alarming, some primary schools have dispensed with ID cards altogether and use finger-scanning technology instead.

You might balk, but, given the chance to obtain a national ID card that can do “cyber everything,” America’s pre-conditioned kids and young adults will jump feet first.

Gives a whole new meaning to: “Ihre Papiere, bitte,” doesn’t it?

Because when someone in this brave new cyber world asks to see your multi-purpose cyber ID — a card which you absolutely must have in order to “buy or sell” (a la Revelation 13:17) and which holds the keys to your entire life in cyberspace — it should at least give you pause, if not chills of horror.

LINKS:

DEATH KNELL FOR THE DOLLAR
http://www.fool.com/i…

THE DOLLAR’S INEVITABLE DEMISE
http://www.americanth…

DEATH OF THE DOLLAR
http://mises.org/free…

CENSORED LECTURE: THE DEATH OF MONEY IS INEVITABLE
http://www.brightside…

LAW PROFESSOR: COUNTER TERRORISM CZAR TOLD ME THERE IS GOING TO BE AN I-911 AND AN I-PATRIOT ACT
http://www.infowars.n…

CYBER ATTACK ‘COULD FELL US WITHIN 15 MINUTES’
http://www.telegraph….

CIA DIRECTOR SAYS CYBER ATTACK COULD BE NEXT “PEARL HARBOR”
http://www.infowars.c…

FALSE FLAG CYBER ATTACK COULD TAKE DOWN THE INTERNET
http://www.prisonplan…

COULD A MASSIVE “FALSE-FLAG” CYBERATTACK BE ON THE HORIZON?
http://www.prisonplan…

CYBER-SCARE: THE EXAGGERATED FEARS OVER DIGITAL WARFARE
http://bostonreview.n…

INSIDERS, NEOCONS PLAN SIMULATED CYBER ATTACK
http://www.infowars.c…

CNN BROADCASTS MAJOR CYBER WAR GAME PROPAGANDA
http://www.infowars.c…

US TESTING ITS CYBER-DEFENSES
http://www.infowars.c…

US READIES CYBERWAR, VIRTUAL FLAG TERRORISM
http://tarpley.net/20…

WILL STUXNET MALWARE BE USED IN FALSE FLAG ATTACK?
http://www.infowars.c…

DOES STUXNET HERALD THE AGE OF CYBER WARFARE?
THE STUXNET WORM, A FORM OF MALWARE, WAS LIKELY CREATED BY A GOVERNMENT
http://www.globalpost…

WHITE HOUSE PLANS PROACTIVE CYBER-SECURITY ROLE FOR SPY AGENCIES
http://www.washington…

US DRAFTING PLAN TO ALLOW GOVERNMENT ACCESS TO ANY EMAIL OR WEB SEARCH
http://www.prisonplan…

HOUSE OVERWHELMINGLY PASSES CYBER SECURITY BILL
http://www.infowars.c…

US APPOINTS FIRST CYBER WARFARE GENERAL
http://www.infowars.c…

PENTAGON WILL HELP HOMELAND SECURITY DEPARTMENT FIGHT DOMESTIC CYBERATTACKS
http://www.infowars.c…

ALEX JONES ON RT: GOVERNMENT CYBER INVASION
http://www.infowars.c…

DEMOCRATS BEHIND TEA PARTY CYBER ATTACKS?
http://www.infowars.c…

NEW BILL GIVES OBAMA ‘KILL SWITCH’ TO SHUT DOWN THE INTERNET
http://www.infowars.c…

LIEBERMAN: CHINA CAN SHUT DOWN THE INTERNET, WHY CAN’T WE?
http://www.infowars.c…

OBAMA CAN SHUT DOWN INTERNET FOR 4 MONTHS UNDER NEW EMERGENCY POWERS
http://www.infowars.c…

UNDER THREAT: A FREE AND OPEN INTERNET
http://www.infowars.c…

SENATE TO SNEAK THROUGH INTERNET KILL SWITCH BILL
http://www.infowars.c…

NEW CYBERSECURITY BILL GIVES OBAMA ‘POWER TO SHUT DOWN COMPANIES’
http://www.infowars.c…

JOINT STATEMENT BY SECRETARY OF DEFENSE ROBERT GATES AND SECRETARY OF HOMELAND SECURITY JANET NAPOLITANO ON ENHANCING COORDINATION TO SECURE AMERICA’S CYBER NETWORKS
http://www.dhs.gov/yn…

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12: POLICY FOR A COMMON IDENTIFICATION STANDARD FOR FEDERAL EMPLOYEES AND CONTRACTORS
http://www.dhs.gov/xa…

DHS CONDUCTS NATIONWIDE ID AUTHENTICATION TEST FOR EMERGENCY PREPAREDNESS
http://www.terradaily…

EMERGENCY ACCESS GRANTED IN TEST OF INTEROPERABLE ID SYSTEM
http://gcn.com/articl…

NORTHROP GRUMMAN AND THE U.S. DEPARTMENT OF HOMELAND SECURITY CONDUCT SUCCESSFUL NATIONWIDE IDENTITY AUTHENTICATION DEMONSTRATION FOR EMERGENCY PREPAREDNESS
http://www.irconnect….

NORTHROP GRUMMAN WINS INFORMATION SECURITY “PROJECT OF THE YEAR” AWARD FOR ONEBADGE IDENTITY SOLUTION
ONEBADGE STRENGTHENS DEFENSES AGAINST CYBER THREATS
http://www.msnbc.msn….

ONE BADGE. ONE NORTHROP GRUMMAN.
http://www.sb.northro…

DOD INTEROPERABILITY COMMUNICATIONS EXERCISE
http://jitc.fhu.disa….

WILL THE NATIONAL ID BECOME A GLOBAL ID?
http://www.endtime.co…

NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE
http://www.nstic.idea…

IDENTITY ECOSYSTEM AT CORE OF OBAMA’S ONLINE PLAN
http://www.secureidne…

CONSIDERING ALL SIDE OF THE ISSUES: A LAWYER LOOKS AT NSTIC
http://blogs.gartner….

NSTIC BLUEPRINT FOR ONLINE NATIONAL ID PROFILE GOES LIVE FRIDAY
http://beatthechip.bl…

FIPS 201 AND INDIA NATIONAL ID, INTEROPERABILITY ANYONE?
http://www.secureidne…

COMMERCIAL BREAKTHROUGH FOR PRECISE BIOMETRICS IN NIGERIAN STATE ID PROJECT
http://feed.ne.cision…

CASHLESS COLLEGES: STUDENT IDS TURN INTO PAYMENT SYSTEMS
CAMPUS ID CARDS PAY FOR LAUNDRY, MOVIE DISCOUNTS AND EVEN ‘E-WIENERS’
http://www.creditcard…

SCHOOL FOOD SERVICE MANAGEMENT POS SOFTWARE
http://www.foodserve….

Advertisements

Comments»

No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: