If you are concerned about your Privacy, Security, Safety or FREEDOM, this is a MUST READ Novel.
Yes, it may be a novel, but it is packed with FACTS and Specifics about USA Government Organizations or Related Organizations that are, AT THIS VERY MINUTE, possibly invading your security/privacy/FREEDOM!
Somewhere deep inside the United States government is a closely guarded list. Members of Congress never get to see it–only the President and a secret team of advisors. Once your name is on the list, it doesn’t come off … until you’re dead.
Someone has just added counterterrorism operative Scot Harvath’s name.
Somehow Harvath must evade the teams dispatched to kill him long enough to untangle who has targeted him and why they want him out of the way.
Somewhere, Someone, Somehow can put all the pieces together. The only question is, will Harvath get to that person before the United States suffers the most withering terrorist attack ever conceived?
I am in the midst of reading the latest thriller from Brad Thor. He is one of the best and most exciting authors around today. He also is a great Patriot and supporter of the USA as far as I can determine! This book is scarry amazing! In it he references so many different ways the USA Government is invading our privacy on so many levels, it is really terrifying. Now, normally, I would shrug this off and say, "Wow, what a great novel!", but I decided to take some notes while reading as so many things rang bells or seemed that they could actually be true!
What I found was this! IT IS TRUE! These are truths wrapped in a fictional representation. I spent a lot of time taking notes and now researching on the Net for validity and accuracy. He is SPOT ON! Too spot on for comfort.
To save you some time, I'm providing the reference list (so far) that I have researched. I wanted to take some time to enjoy the novel and this will make it more 'realistic' as I continue. The thing is that all the references are ALL FACTUAL when it comes to the government servileness and other programs. Check them out for yourself. I've included links that I found that are as recent as possible. If you find more information, let me know and I'll add it here!
You MUST read this book if you care about your privacy, security or your FREEDOM!
Black List - References
Iron Key - https://www.ironkey.com/
With Trusted Access, you gain the ability to:
· Enable secure BYOD and secure access to cloud apps
· Eliminate endpoint hardware and management costs
· Manage policies in one central location from the cloud
· Meet compliance and risk management standards
· Reduce capital investment and operating expenses
· Enforce cloud security to prevent data loss
· Access whitelisting and blacklisting from the endpoint
· Support all mobile and desktop devices – Mac, PC, Android and iOS
· Create a common user experience to reduce training and helpdesk costs
Onion Router - http://www.onion-router.net/
Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Like someone unpeeling an onion, each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.
Onion Routing differs from other anonymity services in three ways: Communication is real-time and bidirectional; the anonymous connections are application independent; and there is no centralized trusted component. Applications may choose whether to identify their users over an anonymous connection. However, the use of a switched public network should not automatically reveal who is talking to whom. This is the traffic analysis that Onion Routing complicates.
Tor Network - https://www.torproject.org/
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.
CamelBak Backpack - http://www.camelbak.com
"Thank you for contacting CamelBak. We do have a concealment pack but it’s only for the police and military at this time. It’s not available to the public though."
Camelbak Products, LLC
2000 S. McDowell Blvd., Suite 200
Petaluma, CA 94954
Filter Bubbles - http://www.thefilterbubble.com/
A filter bubble is a situation in which a website algorithm selectively guesses what information a user would like to see based on information about the user (such as location, past click behavior and search history) and, as a result, users become separated from information that disagrees with their viewpoints, effectively isolating them in their own cultural or ideological bubbles. Prime examples are Google's personalized search results and Facebook's personalized news stream. The term was coined by internet activist Eli Pariser in his book by the same name; according to Pariser, users get less exposure to conflicting viewpoints and are isolated intellectually in their own informational bubble. Pariser related an example in which one user searched Google for "BP" and got investment news about British Petroleum while another searcher got information about the Deepwater Horizon oil spill and that the two search results pages were "strikingly different. The bubble effect may have negative implications for civic discourse, according to Pariser, but there are contrasting views suggesting the effect is minima and addressable.
PCNAA - Internet Kill Switch - http://www.opencongress.org/bill/111-s3480/show
S.3480 - Protecting Cyberspace as a National Asset Act of 2010
Momentum is building for the U.S. government to exercise complete control over the Internet, as mainstream media beats the drum about the threat of a cyber attack on America. Both CNN and FOXNews have had “experts” on to warn of the vulnerabilities of utility companies, specifically pointing out that the SCADA systems are not on isolated networks, and are accessible to hackers via the Internet. CNN even had a 2 hour simulated event entitled Cyber Shockwave with Wolf Blitzer and former high level government officials simulating an attack. Talk about mainstream media propaganda!
FBI - eGuardian - http://itlaw.wikia.com/wiki/EGuardian_system
The FBI's eGuardian system facilitates the sharing at the unclassified level of information derived from Suspicious Activity Reports. It enables near real-time sharing and tracking of terror information and suspicious activities with local, state, tribal, and federal law enforcement agencies. The information is available through the FBI's secure Law Enforcement Online Internet portal to more than 18,000 agencies, which can run searches and input their own reports.
TrapWire is registered as a trademark with the United States Patent and Trademark Office. In the submitted document, the system is described in detail. The assumption is that terrorists are vulnerable due to their need to conduct pre-attack surveillance, "such as photographing, measuring and signaling". Such suspicious activities, as detected in imagery from pan-tilt-zoom cameras or human reports, are entered into a database, using a "10-characteristic description of individuals" or vehicle information. The data is correlated across the network, claiming a "network effect" of increased security due to this correlation. The result is a TrapWire Threat Meter (TIM) level which may be monitored by security personnel. The system distinguishes threat and vulnerability information, the latter of which is not shared through the network.
Stingray - Cell Phone Surveillance - http://reason.com/blog/2012/10/23/with-a-stingray-cops-can-turn-your-mobil
A Stingray works by masquerading as a cell phone tower—to which your mobile phone sends signals to every 7 to 15 seconds whether you are on a call or not— and tricks your phone into connecting to it. As a result, the government can figure out who, when and to where you are calling, the precise location of every device within the range, and with some devices, even capture the content of your conversations.
AQUAINT - Advanced Question Answering for Intelligence - http://www-nlpir.nist.gov/projects/aquaint/
AQUAINT technology is advancing the development of components and functions that allows users to pose a series of intertwined, complex questions and obtain comprehensive answers in the context of broad information-gathering tasks. Additionally, while most information retrieval systems present only links to documents, AQUAINT is producing technology which will actually present answers to the user's questions. This Question-Answering technology is being developed with features for managing: semantic similarity, co-reference, event characterization, opinions, linguistic and social and world inferencing, redundancy, deception, and missing or contradictory information. In order to allow the analyst to guide the exploration in concert with the machine, AQUAINT technology employs: interactive question-answering, the automatic suggestion of additional paths of exploration, and the inferencing of the social context of the information search.
The Retrieval Group - (Not specifically mentioned in the book but looks like the 'evil' organization to me!) http://www.itl.nist.gov/iaui/894.02/
The Retrieval Group of the Information Access Division works with industry, academia and other government agencies to promote the use of more effective and efficient techniques for manipulating (largely) unstructured textual information, especially the browsing, searching, and presentation of that information.
FAST - Future Attribute Screening Technology - http://en.wikipedia.org/wiki/Future_Attribute_Screening_Technology
The system measures pulse rate, skin temperature, breathing, facial expression, body movement, pupil dilation, and other "psycho physiological/behavioral patterns" to stop "unknown terrorists". The technology would mostly be used at airports, borders, and special events Fox News reported that the mobile units transmit data to analysts, who use "a system to recognize, define and measure seven primary emotions and emotional cues that are reflected in contractions of facial muscles." The system is named MALINTENT. Results are transmitted back to screeners.
NGI - Next Generation Identification - http://www.pcworld.com/article/262044/how_the_feds_are_tracking_us.html
The FBI's $1 billion Next Generation Identification (NGI) program's aim is to significantly improve the existing fingerprint identification service. The ambitious project may raise the hackles of privacy advocates, but the FBI is intent on including facial recognition, iris scanning, DNA analysis and voice identification tech as the new face of criminal investigation -- reliability and accuracy concerns aside.
PROMIS - Prosecutor's Management Information System - http://en.wikipedia.org/wiki/Prosecutor's_Management_Information_System
But the real power of PROMIS, according to Hamilton, is that with a staggering 570,000 lines of computer code, PROMIS can integrate innumerable databases without requiring any reprogramming. In essence, PROMIS can turn blind data into information. And anyone in government will tell you that information, when wielded with finesse, begets power. Converted to use by intelligence agencies, as has been alleged in interviews by ex-CIA and Israeli Mossad agents, PROMIS can be a powerful tracking device capable of monitoring intelligence operations, agents and targets, instead of legal cases.
—Richard L. Fricker, Wired magazine, 1993, "The INSLAW Octopus".
TIP - Total Information Paradigm
Nothing Found - YET!
Copyright © 2012 - 2014
On Strike: 09/14/2014