Monday, July 13, 2009

Eeyores news and view


This coin comes from an interesting source http://www.futureworldcurrency.com/ If you go to there manifesto and look at what they want it is truely amazing, look at #10

ART. 10
It will be the responsibility of the world's future citizens and the governments they put in place to make our Project a reality. This project is driven by a firm belief in the unification and co-existence of different peoples. It aims to promote an increasingly equal distribution of the planet's resources and human intellect.

Medvedev Shows Off Sample Coin of New ‘World Currency’ at G-8
By Lyubov Pronina
July 10 (Bloomberg) -- Russian President Dmitry Medvedev illustrated his call for a supranational currency to replace the dollar by pulling from his pocket a sample coin of a “united future world currency.”
“Here it is,” Medvedev told reporters today in L’Aquila, Italy, after a summit of the Group of Eight nations. “You can see it and touch it.”
The coin, which bears the words “unity in diversity,” was minted in Belgium and presented to the heads of G-8 delegations, Medvedev said.
The question of a supranational currency “concerns everyone now, even the mints,” Medvedev said. The test coin “means they’re getting ready. I think it’s a good sign that we understand how interdependent we are.”
Medvedev has repeatedly called for creating a mix of regional reserve currencies as part of the drive to address the global financial crisis, while questioning the U.S. dollar’s future as a global reserve currency. Russia’s proposals for the G-20 meeting in London in April included the creation of a supranational currency.
http://www.bloomberg.com/apps/news?pid=20601087&sid=aeFVNYQpByU4

Lawmaker says CIA director ended secret program
WASHINGTON (AP) - CIA Director Leon Panetta has terminated a "very serious" covert program the spy agency kept secret from Congress for eight years, Rep. Jan Schakowsky, a House Intelligence subcommittee chairwoman, said Friday.
Schakowsky is pressing for an immediate committee investigation of the classified program, which has not been described publicly. Rep. Silvestre Reyes, D-Texas, the chairman of the House Intelligence Committee, has said he is considering an investigation.
"The program is a very, very serious program and certainly deserved a serious debate at the time and through the years," Schakowsky told The Associated Press in an interview. "But now it's over."
Democrats revealed late Tuesday that CIA Director Leon Panetta had informed members of the House Intelligence Committee on June 24 that the spy agency had been withholding important information about a secret intelligence program begun after the Sept. 11 terrorist attacks.
Schakowsky described Panetta as "stunned" that he had not been informed of the program until nearly five months into his tenure as director.
Panetta had learned of the program only the day before informing the lawmakers, according to a U.S. intelligence official. The official spoke on condition of anonymity Friday because he was not authorized to discuss the program publicly.
Panetta has launched an internal probe at the CIA to determine why Congress was not told about the program. Exactly what the classified program entailed is still unclear.
The intelligence official said the program was "on-again/off-again" and that it was never fully operational, but he would not provide details.
Schakowsky, D-Ill., said Friday that the CIA and Bush administration consciously decided not to tell Congress.
"It's not as if this was an oversight and over the years it just got buried. There was a decision under several directors of the CIA and administration not to tell the Congress," she said.
Schakowsky, who chairs the Intelligence subcommittee on oversight and investigations, said in a Thursday letter to Reyes that the CIA's lying was systematic and inexcusable. The letter was obtained by The Associated Press on Friday.
She said Reyes indicated to her the committee would conduct a probe into whether the CIA violated the National Security Act, which requires, with rare exceptions, that Congress be informed of covert activities. She told AP she hopes to conduct at least part of the investigation for the committee.
She said this is the fourth time that she knows of that the CIA has misled Congress or not informed it in a timely manner since she began serving on the Intelligence Committee two and half years ago.
In 2008, the CIA inspector general revealed that the CIA had lied to Congress about the accidental shoot down of American missionaries over Peru in 2001. In 2007, news reports disclosed that the CIA had secretly destroyed videotapes of interrogations of a terrorist suspect.
She would not describe the other incident.
Schakowsky said she thinks Panetta is changing the CIA for the better, adding that the failure to inform Congress was indicative of "contempt" the Bush administration and intelligence agencies under him held for Congress.
"Many times I felt it was an annoyance to them to have to come to us and answer our questions," she said. "There was an impatience and a contempt for the Congress."
The House is expected to take up the 2010 intelligence authorization bill next week. It includes a provision that would require the White House to inform the entire committee about upcoming covert operations rather than just the "Gang of Eight"_ the senior members from both parties on the House and Senate Intelligence Committees and the Democratic and Republican leaders in both houses.
The White House this week threatened to veto the final version of the bill if it includes that provision.
Democratic aides said the language may be softened in negotiations with the Senate to address the White House's concern.
But Schakowsky said the wider briefings are the best remedy to avoiding future notification abuses.
Republicans charge that Democratic outrage about the Panetta revelation is just an attempt to provide political cover to House Speaker Nancy Pelosi, who in May accused the CIA of lying to her in 2002 about its use of waterboarding.
What Pelosi knew about the CIA's interrogation program and when she knew it _ and why she did not object to it sooner _ is expected to be emphasized by Republicans during debate over the intelligence bill.
http://www.federalnewsradio.com/?nid=27&sid=1699547

84 sick cadets isolated at Air Force Academy
AIR FORCE ACADEMY, Colo. (AP) - The Air Force Academy says 84 cadets with flu-like symptoms have been isolated are being tested for swine flu.
Academy spokeswoman Capt. Corinna Jones told The Gazette in Colorado Springs Thursday that most of the cadets are "doolies", members of the incoming freshman class who began training June 25. She said the cadets under isolation in a dormitory began coughing and showing other upper respiratory symptoms over the past two days.
The academy has contacted the U.S. Centers for Disease Control and Prevention and the Air Force Surgeon General's office.
Jones says tests have been sent to a laboratory in San Antonio for analysis, and results are expected within 24 hours.
http://www.federalnewsradio.com/?nid=29&sid=1714503

Chips in official IDs raise privacy fears
Climbing into his Volvo, outfitted with a Matrics antenna and a Motorola reader he'd bought on eBay for $190, Chris Paget cruised the streets of San Francisco with this objective: To read the identity cards of strangers, wirelessly, without ever leaving his car.
It took him 20 minutes to strike hacker's gold.
Zipping past Fisherman's Wharf, his scanner downloaded to his laptop the unique serial numbers of two pedestrians' electronic U.S. passport cards embedded with radio frequency identification, or RFID, tags. Within an hour, he'd "skimmed" four more of the new, microchipped PASS cards from a distance of 20 feet.
Increasingly, government officials are promoting the chipping of identity documents as a 21st century application of technology that will help speed border crossings, safeguard credentials against counterfeiters, and keep terrorists from sneaking into the country.
But Paget's February experiment demonstrated something privacy advocates had feared for years: That RFID, coupled with other technologies, could make people trackable without their knowledge.
He filmed his heist, and soon his video went viral on the Web, intensifying a debate over a push by government, federal and state, to put tracking technologies in identity documents and over their potential to erode privacy.
Putting a traceable RFID in every pocket has the potential to make everybody a blip on someone's radar screen, critics say, and to redefine Orwellian government snooping for the digital age.
"Little Brother," some are already calling it - even though elements of the global surveillance web they warn against exist only on drawing boards, neither available nor approved for use.
But with advances in tracking technologies coming at an ever-faster rate, critics say, it won't be long before governments could be able to identify and track anyone in real time, 24-7, from a cafe in Paris to the shores of California.
On June 1, it became mandatory for Americans entering the United States by land or sea from Canada, Mexico, Bermuda and the Caribbean to present identity documents embedded with RFID tags, though conventional passports remain valid until they expire.
Among new options are the chipped "e-passport," and the new, electronic PASS card - credit-card sized, with the bearer's digital photograph and a chip that can be scanned through a pocket, backpack or purse from 30 feet.
Alternatively, travelers can use "enhanced" driver's licenses embedded with RFID tags now being issued in some border states: Washington, Vermont, Michigan and New York. Texas and Arizona have entered into agreements with the federal government to offer chipped licenses, and the U.S. Department of Homeland Security has recommended expansion to non-border states. Kansas and Florida officials have received DHS briefings on the licenses, agency records show.
The purpose of using RFID is not to identify people, says Mary Ellen Callahan, the chief privacy officer at Homeland Security, but "to verify that the identification document holds valid information about you."
An RFID document that doubles as a U.S. travel credential "only makes it easier to pull the right record fast enough, to make sure that the border flows, and is operational" - even though a 2005 Government Accountability Office report found that government RFID readers often failed to detect travelers' tags.
Critics warn that RFID-tagged identities will enable identity thieves and other criminals to commit "contactless" crimes against victims who won't immediately know they've been violated.
Neville Pattinson, vice president for government affairs at Gemalto, Inc., a major supplier of microchipped cards, is no RFID basher. He's a board member of the Smart Card Alliance, an RFID industry group, and is serving on the Department of Homeland Security's Data Privacy and Integrity Advisory Committee.
In a 2007 article published by a newsletter for privacy professionals, Pattinson called the chipped cards vulnerable "to attacks from hackers, identity thieves and possibly even terrorists."
RFID, he wrote, has a fundamental flaw: Each chip is built to faithfully transmit its unique identifier "in the clear, exposing the tag number to interception during the wireless communication."
Once a tag number is intercepted, "it is relatively easy to directly associate it with an individual," he says. "If this is done, then it is possible to make an entire set of movements posing as somebody else without that person's knowledge."
Echoing these concerns were the AeA - the lobbying association for technology firms - the Smart Card Alliance, the Institute of Electrical and Electronics Engineers, the Business Travel Coalition, and the Association of Corporate Travel Executives.
Meanwhile, Homeland Security has been promoting broad use of RFID even though its own advisory committee on data integrity and privacy issued caveats. In its 2006 draft report, the committee concluded that RFID "increases risks to personal privacy and security, with no commensurate benefit for performance or national security," and recommended that "RFID be disfavored for identifying and tracking human beings."
For now, chipped PASS cards and enhanced driver's licenses are not yet widely deployed in the United States. To date, roughly 192,000 EDLs have been issued in Washington, Vermont, Michigan and New York.
But as more Americans carry them "you can bet that long-range tracking of people on a large scale will rise exponentially," says Paget, a self-described "ethical hacker" who works as an Internet security consultant.
But Gigi Zenk, a spokeswoman for the Washington state Department of Licensing, says Americans "aren't that concerned about the RFID" in a time when "tracking an individual is much easier through a cell phone."
In the wake of the Sept. 11 attacks - and the finding that some terrorists entered the United States using phony passports - the State Department proposed mandating that Americans and foreign visitors carry "enhanced" passport booklets, with microchips embedded in the covers.
In February 2005, when the State Department asked for public comment, it got an outcry: Of the 2,335 comments received, 98.5 percent were negative, with 86 percent expressing security or privacy concerns, the department reported in an October 2005 notice in the Federal Register.
Identity theft and "fears that the U.S. Government or other governments would use the chip to track and censor, intimidate or otherwise control or harm them" were of "grave concern," it noted. Many Americans worried "that the information could be read at distances in excess of 10 feet."
Those citizens, it turns out, had cause.
According to department records obtained by researchers at the University of California, Berkeley, under a Freedom of Information Act request and reviewed by the AP, discussion about security concerns with the e-passport occurred as early as January 2003 but tests weren't ordered until the department began receiving public criticism two years later.
(AP) In this May 28, 2009 photo, a new "enhanced" United States passport lies, at left, beside an...
When the AP asked when testing was initiated, the State Department said only that "a battery of durability and electromagnetic tests were performed" by the National Institute of Standards and Technology, along with tests "to measure the ability of data on electronic passports to be surreptitiously skimmed or for communications with the chip reader to be eavesdropped," testing which "led to additional privacy controls being placed on U.S. electronic passports ... "
In 2005, the department incorporated metallic fibers into the e-passport's front cover, to reduce the read range, and added encryptions and a feature that required inspectors to optically scan the e-passport first for the chip to communicate wirelessly.
But what of concerns about the e-passport's read range?
In its October 2005 Federal Register notice, the State Department reassured Americans that the e-passport's chip would emit radio waves only within a 4-inch radius, making it tougher to hack.
But in May 2006, at the University of Tel Aviv, researchers directly skimmed an encrypted tag from several feet away. At the University of Cambridge in Britain, a student intercepted a transmission between an e-passport and a legitimate reader from 160 feet.
The State Department, according to its own records obtained under FOIA, was aware of the problem months before its Federal Register notice and more than a year before the e-passport was rolled out in August 2006.
"Do not claim that these chips can only be read at a distance of 10 cm (4 inches)," Frank Moss, deputy assistant Secretary of State for passport services, wrote in an April 22, 2005, e-mail to Randy Vanderhoof, executive director of the Smart Card Alliance. "That really has been proven to be wrong."
The chips could be skimmed from a yard away, he added - all a hacker would need to read e-passport numbers, say, in an elevator.
In February 2006, an encrypted Dutch e-passport was hacked on national television, and later, British e-passports were hacked. The State Department countered that European e-passports weren't as safe as their American counterparts because they lacked safety features such as the anti-skimming cover. Recent studies have shown, however, that more powerful readers can penetrate that metal sheathing.
The RFIDs in enhanced driver's licenses and PASS cards contain a silicon computer chip attached to a wire antenna, which transmits a unique identifier via radio waves when "awakened" by an electromagnetic reader.
The technology they use is designed to track products through the supply chain. These chips, known as EPCglobal Gen 2, are intended to release their data to any inquiring Gen 2 reader within a 30-foot radius.
The government says remotely readable ID cards transmit only RFID numbers, which correspond to records stored in secure government databases. Even if a hacker were to copy an RFID number onto a blank tag and place it into a counterfeit ID, officials say, the forger's face still wouldn't match the true cardholder's photo in the database.
Still, computer experts say government databases can be hacked. Others worry about a day when hackers might deploy readers at "chokepoints," such as checkout lines, skim RFID numbers from people's driver's licenses, then pair those numbers to personal data skimmed from chipped credit cards (though credit cards are harder to skim). They imagine stalkers skimming RFID tags to track their targets, and fear government agents compiling chip numbers at peace rallies, mosques or gun shows, simply by strolling through a crowd with a reader.
Others worry more about the linking of chips with other identification methods, including biometric technologies, such as facial recognition.
Should biometrics be coupled with RFID, "governments will have, for the first time in history, the means to identify, monitor and track citizens anywhere in the world in real time," says Mark Lerner, spokesman for the Constitutional Alliance, a network of nonprofit groups, lawmakers and citizens opposed to remotely readable identity and travel documents.
The International Civil Aviation Organization, the U.N. agency that sets global standards for passports, now calls for facial recognition in all e-passports.
http://apnews.myway.com/article/20090712/D99CRDAG0.html

Gay couple detained near Mormon plaza after kiss
SALT LAKE CITY – A gay couple say they were detained by security guards on a plaza owned by the Mormon church and later cited by police, claiming it stemmed from a kiss on the cheek.
The Church of Jesus Christ of Latter-day Saints said that the men became argumentative and refused to leave after being asked to stop their "inappropriate behavior." The men say they were targeted because they are gay.
Matt Aune said he and his partner, Derek Jones, were walking home from a concert nearby on Thursday night, cutting through the plaza near the Salt Lake City Mormon temple.
Aune, 28, said he gave Jones, 25, a hug and kiss and that the two were then approached by a security guard, who asked them to leave, telling them they were being inappropriate and that public displays of affection aren't allowed on the property. He said other guards arrived and the men were handcuffed.
"We asked what we were doing wrong," Aune told The Associated Press.
Church spokeswoman Kim Farah said in a statement Friday that the men were "politely asked to stop engaging in inappropriate behavior — just as any other couple would have been."
"They became argumentative and used profanity and refused to leave the property," she said. The church did not immediately respond to a request for more comment.
Police later arrived and both men were cited with misdemeanor trespassing, Salt Lake City Police Sgt. Robin Snyder said.
"It doesn't matter what they were asked to leave for," Snyder said. "If they are asked to leave and don't they are ... trespassing."
The church has been the target of protests over its support of a ban on gay marriage in California.
http://news.yahoo.com/s/ap/20090711/ap_on_re_us/us_mormon_church_trespassing_1

Mosquito pools test positive for West Nile virus
July 11, 2009 - 5:04pm
WASHINGTON (AP) - D.C. Department of Health officials say three mosquito pools have tested positive for the West Nile virus.
Officials said Saturday the mosquito pools were collected from a block on Washington Boulevard southwest, near Fort McNair.
No one in D.C. have been infected by West Nile virus this year. In 2008, six residents tested positive for the virus.
The health department recommends that residents eliminate mosquito breeding areas around their home by removing standing water.
http://www.wtop.com/?nid=596&sid=1715806

No comments: