top
US
US
Indybay
Indybay
Indybay
Regions
Indybay Regions North Coast Central Valley North Bay East Bay South Bay San Francisco Peninsula Santa Cruz IMC - Independent Media Center for the Monterey Bay Area North Coast Central Valley North Bay East Bay South Bay San Francisco Peninsula Santa Cruz IMC - Independent Media Center for the Monterey Bay Area California United States International Americas Haiti Iraq Palestine Afghanistan
Topics
Newswire
Features
From the Open-Publishing Calendar
From the Open-Publishing Newswire
Indybay Feature

Here Comes Big Brother With The Gag

by Steve Watson/ Brian Harring
article on plans to destroy the internet and replace it with the same hired lies permeating other "American" (sic) media


Federally Funded Researchers Plan to Close down the Internet

Need further funding from Congress for “clean slate” and Internet 2

April 18, 2007

by Steve Watson

Global Research

Researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time.

Time magazine has reported that several foundations and universities including Rutgers, Stanford, Princeton, Carnegie Mellon and the Massachusetts Institute of Technology are pursuing individual projects, along with the Defense Department, in order to wipe out the current internet and replace it with a new network which will satisfy big business and government:

One challenge in any reconstruction, though, will be balancing the interests of various constituencies. The first time around, researchers were able to toil away in their labs quietly. Industry is playing a bigger role this time, and law enforcement is bound to make its needs for wiretapping known.

There's no evidence they are meddling yet, but once any research looks promising, "a number of people (will) want to be in the drawing room," said Jonathan Zittrain, a law professor affiliated with Oxford and Harvard universities. "They'll be wearing coats and ties and spilling out of the venue."

The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.

This would be a faster, more streamlined elite equivalent of the internet available to users who were willing to pay more for a much improved service. providers may only allow streaming audio and video on your websites if you were eligible for Internet 2.

Of course, Internet 2 would be greatly regulated and only "appropriate content" would be accepted by an FCC or government bureau. Everything else would be relegated to the "slow lane" internet, the junkyard as it were. Our techie rulers are all too keen to make us believe that the internet as we know it is ";already dead".

Google is just one of the major companies preparing for internet 2 by setting up hundreds of "server farms" through which eventually all our personal data - emails, documents, photographs, music, movies - will pass and reside.

However, experts state that the "clean slate" projects currently being undertaken go even further beyond projects like Internet2 and National LambdaRail, both of which focus primarily on next-generation needs for speed.

In tandem with broad data retention legislation currently being introduced worldwide, such "clean slate" projects may represent a considerable threat to the freedom of the internet as we know it. EU directives and US proposals for data retention may mean that any normal website or blog would have to fall into line with such new rules and suddenly total web regulation would become a reality.

In recent months, a chorus of propaganda intended to demonize the Internet and further lead it down a path of strict control has spewed forth from numerous establishment organs:

· In a display of bi-partisanship, there have recently been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.

· Republican Senator John McCain recently tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.

· During an appearance with his wife Barbara on Fox News last November, George Bush senior slammed Internet bloggers for creating an "adversarial and ugly climate."

· The White House's own recently de-classified strategy for "winning the war on terror" targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to "diminish" their influence.

· The Pentagon recently announced its effort to infiltrate the Internet and propagandize for the war on terror.

· In a speech last October, Homeland Security director Michael Chertoff identified the web as a "terror training camp," through which "disaffected people living in the United States" are developing "radical ideologies and potentially violent skills." His solution is "intelligence fusion centers," staffed by Homeland Security personnel which will go into operation next year.

· The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.

· A landmark legal case on behalf of the Recording Industry Association of America and other global trade organizations seeks to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web - and their argument is supported by the U.S. government.

· A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.

· The European Union, led by former Stalinist and potential future British Prime Minister John Reid, has also vowed to shut down "terrorists" who use the Internet to spread propaganda.

· The EU data retention bill, passed last year after much controversy and with implementation tabled for late 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens' data on phone calls, sms', emails and instant messaging services.

· The EU also recently proposed legislation that would prevent users from uploading any form of video without a license.

· The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. "At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites."

We are being led to believe that a vast army of maniac pedophiles or terrorists are on the loose and we must do away with all forms of privacy in order to stop them. This is akin to saying that blanket cctv prevents crime. As if to say "if we film everyone all the time, even innocent people, then no one will ever commit any crimes."

Increasingly we are seeing this in every aspect of our lives. Recording, tracking and retaining our data in the name of keeping us all safe. Everyone is now treated as guilty until proven innocent.

Make no mistake, the internet, one of the greatest outposts of free speech ever created is under constant attack by powerful people who cannot operate within a society where information flows freely and unhindered. Both American and European moves mimic stories we hear every week out of State Controlled Communist China, where the internet is strictly regulated and virtually exists as its own entity away from the rest of the web.

The Internet is freedom's best friend and the bane of control freaks. Its eradication is one of the short term goals of those that seek to centralize power and subjugate their populations under a surveillance panopticon prison, whether that be in Communist China, Neoconservative America or the Neofascist EU

Internet2 or UCAID (University Corporation for Advanced Internet Development) is a non-profit consortium which develops and deploys advanced network applications and technologies, for education and high-speed data transfer purposes. It is led by 208 universities and partners with 60 companies in areas from the networking (Cisco Systems), publishing (Prous Science) and technology industries such as Comcast, Intel and Sun Microsystems. "Internet2" is a registered trademark

Why were Internet2 and the Abilene network created? These technologies and their organizational counterparts were not only created to make a faster alternative to the internet. More and more applications for Internet2 technology become apparent all the time. Many fields have been able to use the Abilene network to foster creativity, research, and development in a way that was not previously possible. Students who belong to poor quality libraries now find themselves downloading not only text but sound recordings, animations, videos, and other resources. Another application is the robust video conferencing now available to Internet2 participants. Neurosurgeons can now video conference with other experts in the field during an operation in a high resolution format with no apparent time lag. The applications of this type of network are endless, and will lead the way into the future of internet use

Comment: The Electronic Communications Privacy Act established a complex set of protocols for law enforcement access to records of or concerning electronic communications, including e-mail, web traffic, and other forms of Internet communication. While those protocols are too complex to describe here in full, in general they provide greater protections for, and require more formal process to access, real-time communications than stored communications, unretrieved communications than retrieved ones, and contents than subscriber or transaction ("envelope") records. A very basic "summary" of those protocols (from the 267-page Department of Justice Manual on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations) is attached at the end of this document.

Law enforcement has grown accustomed to having a technically simple wiretap capability, which is an "accidental" feature of the PSTN's design. Having the ability to tap access circuits in DSLAMs and cable head-ends is a fairly natural extension, but having a general-purpose capability to tap VoIP could have disastrous effects. VoIP's decoupling of identity and address from physical access, makes it impossible to support CALEA without destroying some of the most valuable features of the technology (mobility, resiliency, low latency media path routing, end-device call control, etc.).

In the past there has been a similar threat on the encryption front (with the effort to require key escrow). The leaked "PATRIOT II" act already moves in the direction of criminalizing encrypted communications. The problem with this trend, of course, is that while it makes it easier to snoop on disapproved elements, it also makes it easier for those seeking more government control to observe putative enemies Brian Harring
Add Your Comments
We are 100% volunteer and depend on your participation to sustain our efforts!

Donate

$110.00 donated
in the past month

Get Involved

If you'd like to help with maintaining or developing the website, contact us.

Publish

Publish your stories and upcoming events on Indybay.

IMC Network