This page contains a Flash digital edition of a book.
TOTAL LICENSING
ibly RFIs into all Jews, we don’t know and a lot we can’t know! Un- has now granted itself access to our bankcards,
rather than trying to easily we reflect how it can be that in the six internet searches, subway cards, electronic toll
sew yellow stars on years since 9/11 there was no follow up attack. booth passes and even the ID cards that get us
clothing which here Have there been foiled efforts? We have heard into buildings. This Orwellian situation (he con-
or there courageous so! We are grateful! But we don’t know what tinues) simply crept up on us. Nobody voted
individuals could rip- to think! Then we read in the Wall Street Jour- for it and no legislature even debated it. These
off, and quietly try to nal of, as recent as, January 28, 2008, that since increasingly sophisticated devices for tracing in-
escape into the mul- 2005 the Department of Homeland Security has dividuals are largely unknown to the public at
titude of unmarked kept statistics of another very difficult to detect large. The number of complaints to the National
other people. How operation : Commission on Information Technology has
much easier and simpler and more efficient it skyrocketed. People have been refused loans
would have been to use spy chips for identifica- CYBER ATTACKS and even have lost jobs because of errors in the
tion purpose. Yes, this is when hackers, for instance, investi- police files. It turns out that innocent people do
Well, Hitler was long ago—but now think of gate American military information such as the really have something to fear from a society run
Uganda, Darfur, Chechnya. highly secret “quiet drive” that helps submarines by Big Brother” (there he is again!)
For prescient prediction, Bible students might to avoid detection. There is a nightmare circu- Take the German citizen, Khaled El Masri, whose
read something about end times in Revelations lating around in Mr. Chertoff’s Department of attorney Ben Wizner is trying to sue the CIA.
l3:16-17: “And he causeth all, both small and Homeland Security’s Washington Office: could It seems his client was kidnapped on a vaca-
great, rich and poor, free and bond, to receive a a Cyber attack be unleashed on the sensitive tion in Macedonia and was beaten, drugged and
mark in their right hand or on their foreheads. systems of Wall Street, on telephone switching dumped into a secret prison in Afghanistan. Five
And that no man might buy or sell save that stations, or could someone hack into subway or months later it became clear that the CIA had
he had the mark or the name of the beast, or power stations’ control systems? mistakenly grabbed the wrong guy and spirited
the number of the beast, or the number of his Homeland Security sensors counted 4,095 in him away to Albania. The US administration in its
name!” such attacks in 2005 compared to 37,284 in defense before a federal court squashed the suit
Scary, huh? 2007. with the simple defense that they did not have
Obviously it is all a question of practical efficien- WOW! to respond because hearing the case “would
cy versus unintended abuses of power facilitated It could be done, even a long time ago when sys- threaten national security”. So no redress was
by initial acceptance from us. What seemed so tems were simpler. The British broke the Ger- possible for the victim. CIA records must re-
good and practical in the beginning, is a question man army code by intercepting German radar main secret.
of supervision guaranteeing that the good pur- communications that were thought to be top Just now, in unconnected action the Democratic
pose will not turn into the predatory evil power secret. This certainly helped the final victory! Congress is goading the Bush administration
of “Big Brother.”(Hats off to George Orwell and Now, the U.S. government has proposed to about a set of miraculously lost CIA tapes pos-
his prophetic book “1984,” published as long ago spend 30 million dollars over six years to pro- sibly dealing with the torture method of “wa-
as 1949!) tect the USA effectively against this type of terboarding”.
cyberspace attacks. Of course Civil Libertar-
THE TERRIBLE CHOICE ians are marshalling their friends in congress, CAN SECURITY INVOLVE INTERNA-
Now analyze for yourself. Would you like to take but these objectors are faced with the peren- TIONAL TRADE? AND HOW!
a chance? We can – returning to the efficiency nial question “wouldn’t you rather be safe than We all remember the Brouhaha, that did not
arguments from manufacturers of products sorry?” Overall, the feeling by the perplexed allow Dubai Ports World to take over the op-
like Verychip who work on these at breakneck congressmen and politicians is “we’ll lose if we eration of some failing American ports. Just
speed to expand their use – we can require use do, and we’ll lose if we don’t!” now, on February 21
st
, the American CFIUS let
of chips hidden in products to clearly explain What now? it be known that the purchase of 3COM by
their presence in the product and explain the Meantime the EU also has justified jitters after Bain Capital of Boston and its partner, Chinese
use and purpose of the chip, just as we now London and Madrid and Franco Frattini, the EU’s Huawei Technologies was not welcome. CFIUS
force explanations from food manufacturers to top justice official wants to follow the U.S. lead is an unofficial group with no legislative power
list ingredients (see column of last issue). with a biometric electronic record that would that examines all foreign acquisitions and merg-
It’s remarkable how consumer interest and pur- tighten borders through fingerprints, security ers involving American properties. It has one
chasing power can guide us away from unwise lists and would record each entry and each exit member from each of twelve different U.S. gov-
purchases through pressure from an educated from the now 27 nation territory. How nice ernment offices and operates without official
marketplace. The same education demanded on an identity card with an all knowing chip would explanation of its actions.
food, can also motivate us as private citizens, to be! They were fearful that because 3COM manu-
keep our government alert when technocrats Did I make this up? Read on! factured anti hacking computer software for
become careless in their love for the system And in France—Le Monde, the large, reason- the military, among other things. The product
they have invented, and overlook questions of ably staid, newspaper some years ago so privacy is highly secret and known as Tipping Point and,
social significance. conscientious, now asks: “If you have nothing to of course, there is always the thought that some
hide you have nothing to fear”. information confidential and secret to the USA,
MORE ON THE TERRIBLE DILEMMA Why does that argument sound so ominous? might somehow be passed on to China, inas-
Again, of course, Big Brother is not all bad and Michael Alberganti, journalist says, “Under Presi- much as Huawei Technologies has ties to the
sometimes we look to Big Uncle – “Uncle Sam” dent Sarcozy the government has now 300,000 Chinese military.
to protect us from the ever present real chal- cameras trained on us and the number is to be The Chinese were not happy but they withdrew
lenges of the War on Terror. There is so much tripled in the next few years. The government their offer fearing the unfavorable publicity and
114
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92  |  Page 93  |  Page 94  |  Page 95  |  Page 96  |  Page 97  |  Page 98  |  Page 99  |  Page 100  |  Page 101  |  Page 102  |  Page 103  |  Page 104  |  Page 105  |  Page 106  |  Page 107  |  Page 108  |  Page 109  |  Page 110  |  Page 111  |  Page 112  |  Page 113  |  Page 114  |  Page 115  |  Page 116  |  Page 117  |  Page 118  |  Page 119  |  Page 120
Produced with Yudu - www.yudu.com