5/27 Memorialize This?

Obama: Technology Must Not be Used to Abuse Rights
4/23/12 VOA News
President Obama issued an executive order that for the first time will allow U.S. authorities to impose sanctions on foreign entities who help authoritarian governments use modern technologies to commit human rights abuses. The order specifically targets companies and individuals aiding the Iranian and Syrian governments, but officials say could be expanded to include other countries using technology to crack down on dissent...“These technologies should be in place to empower citizens, not to repress them...national sovereignty is never a license to slaughter your people". The order freezes U.S. assets linked to people who provide technological help - like satellite, computer and phone monitoring -- to oppressive governments... part of what he called a comprehensive strategy to prevent and respond to atrocities includes creation of an Atrocities Prevention Board's meeting the first time Monday. Obama defended administration efforts to prevent genocide worldwide -- mentioning Libya, Sudan and the manhunt for African warlord Joseph Kony....

Homeland Security to Legally Monitor U.S media:
The U.S. government may now legally collect and retain personal information of journalists, news anchors, reporters or anyone using "traditional and/or social media in real time to keep their audience situationally aware and informed.

4/22/09 Obama Administration to Create New Military Command to Combat Cyber Spies in Russia or China: CYBERCOM

Counterinsurgency (COIN) Intelligence, Surveillance, Information, global information infrastructure, and social media...Advance intelligence and information partnerships... National Security Agency (NSA), National Geospatial-Intelligence Agency (NGA)... update, balance, and integrate all the tools ...

According to a March 2009 briefing DoD's Defense Advanced Research Project Agency (DARPA) describe defense of current Internet Protocol-based networks as a losing proposition, called for an “independent examination of alternate architectures.” DARPA is proceeding with a six-month analysis of alternatives.

“Online Security and Privacy Study”, conducted on behalf of Microsoft and the National Cyber Security Alliance, Harris Interactive, March 2009
We cannot improve cybersecurity without improving authentication, and identity management is not only about authenticating people. Authentication mechanisms also can help ensure that online transactions only involve trustworthy data, hardware, and software for networks and devices.
www.microsoft.com/mscorp/twc/endtoendtrust/vision.aspx, Scott Charney, “Establishing End to End Trust,” Microsoft, 2008, at 5.

Internet Security Alliance, “The Cyber Security Social Contract Policy Recommendations for the Obama Administration and 111th Congress: A Twenty-First Century Model for Protecting and
Defending Critical Technology Systems and Information” (undated)
The Communications Act of 1934 authorized the President, if he deems it necessary in the national security or defense and the requisite threshold condition exists, to use, control, or close communications services, systems, and networks under the jurisdiction of the Federal Communications Commission in conditions ranging from “state of public peril”to “war.” Executive Order 12472 established a joint government-industry National Coordinating Center to assist in the initiation, coordination, restoration and reconstitution of communications services or facilities under all conditions of crisis or emergency. NSPD-51/HSPD-20 on “National Continuity Policy”(May 4, 2007) assigns roles in the Federal government regarding continuity communications....The Department of Homeland Security (DHS) is working toward providing national security and emergency users with access to the converged information services of a next-generation network

Pentagon Announces First U.S. Cyber Command and First U.S. CYBERCOM Commander...a sub unit of U.S. Strategic Command.
5/21/10 U.S. Department of Defense News Release No. 419-10 , http://www.fas.org/irp/news/2010/05/dod052110b.html

Dedicated servers and websites, social networking tools as propaganda machines.
2/10/10 http://www.dhs.gov/xlibrary/assets/ privacy/ ....www.fas.org/sgp/crs/terror/R41674.pdf
CRS Terrorist Use of the Internet: Cyberspace Information Operations (See “Counterpropaganda: Strategic Communications, Public Diplomacy, and Information Operations”) Cybersecurity proposals from the 111th Congress such as S. 3480, containing controversial provisions, the president's Internet “Kill Switch”, are likely to be reintroduced in some form in the 112th Congress. With growing efforts in strategic communications and public diplomacy, there may also be an effort to revise the Smith-Mundt Act.

Permitted 'news'
Public Diplomacy in Grand Strategy Foreign Policy Analysis (2006)
(brief excerpt)onlinelibrary.wiley.com/doi/10.1111/j.1743-8594.2006.00025.x/abstract
‘‘Public diplomacy’’ and ‘‘propaganda’’ are used interchangeably in this paper...the influence of the information revolution is not restricted to the developed world,
as evidenced even in the resistance it meets from some non-democratic governments. Furthermore, one should not underestimate the exploitation of new technologies in third-world public diplomacy that is aimed at the developed world, especially at the U.S. All this should not obscure the continuing relevance of force ( hard power) to many interstate relations and increasingly terrorism which presents governments with a grand-strategic challenge: how to combine effectively soft and hard national means to obtain desired political outcomes... especially in the current international system, depends on the government’s ability to manage the complicated balances and tradeoffs that inhere in the relationship between hard force and soft diplomacy... the traditional and time-honored concern of statecraft; however experience can be drawn on with respect to newer forms of force and of communications, such as fighting terrorism in the age of global, real-time television and the Internet...

Secret documents reveal DHS lies about tracking on social media
DHS social media analyst instructions

forbidden information threats to National Security State
Department of Homeland Security National Operations Center Media Monitoring Capability Desktop Reference Binder

Media Monitoring Capability Mission & Reporting Parameters:
1.1 The MMC  Mission has three primary missions:
 First - to continually update existing National Situation Summaries (NSS) and International Situation Summaries (ISS) with the most recent, relevant, and actionable media information
 Second - to constantly monitor all available open source information with the goal of expeditiously alerting the NOC Watch Team and other key Department personnel of emergentsituations
 Third - to receive, process, and distribute media captured by DHS Situational Awareness Teams(DSAT) or other streaming media available to the NOC such as Northern Command's (NORTHCOM) Full Motion Video (FMV) and via open sources
These three missions, accomplished by employing various tools, services and procedures described in detail in this document.(see doc for full contents), have three key components:
Leverage Operationally Relevant Data
 Leveraging news stories, media reports and postings on social media sites concerning Homeland Security, Emergency Management, and National Health for operationally relevant data, information, analysis and imagery is the first mission component. Traditional and social media teams review a story or posting from every direction and interest, utilizing thousands of reporters, sources, still/video cameramen, analysts, bloggers and ordinary individuals on scene. Traditional Media outlets provide unmatched insight into the depth and breadth of the situation, worsening issues, federal preparations, response activities, and critical timelines. Social Media outlets provide instant feedback and alert capabilities to rapidly changing or newly occurring situations. The MMC works to summarize the extensive information from these resources to provide a well rounded operational picture for the Department of Homeland Security.
Support NOC in Identifying Relevant Operational Media
 Supporting NOC by ensuring they have a timely appreciation for evolving Homeland Security news stories and media reports of interest to the public and DHS/other federal agencies involved in preparations and response activities is the second key component. DHS and other federal agencies conducting joint operations may be affected by other evolving situations. These situations may be related; have a cause and effect relationship; or be unrelated but have a detrimental effect. Through coordination with NOC Duty Director (NDD), SeniorWatch Officer (SWO) the MMC works to ensure the NOC Watch Team is aware of such stories and news and has time to analyze any effect on operations. Timely reporting of current information is an integral element in maintaining complete operational awareness by Homeland Security Personnel. The MMC understand it is vital

Critical Information Requirements
 The attribution of IOIs by CIR allows the MMC to catalog articles into five specific categories depending on the potential impact or type of article being distributed. These CIRs include:
1) Potential Threat to DHS, other federal, and state/ local response units, facilities and resources.2) Potential impact on DHS capability to accomplish the HSPD-5 mission
3) Identifying events with operational value…corroborating critical information 4)Identifying media reflecting adversely on DHS and response activities5) Standing HSC planning scenarios1.
Item of Interest Categorization (IOI)
 The categorization of IOIs in the daily log allows analysts to track the types of articles distributed as they relate to 14 characterizations. These include:
1)Terrorism : Includes media reports on the activities of terrorist organizations both in the United States as well as abroad. This category will also cover articles that report on the threats, media releases by al Qaeda and other organizations, killing, capture, and identification of terror leaders and/or cells.
2) Weather/Natural Disasters/Emergency Managemen: Includes media reports on emergency and disaster management related issues including hurricanes, tornadoes, flooding, earthquakes, winter weather, etc. (all hazards).Reports that outline the tracking of weather systems, reports on response and recovery operations, as well as the damage, costs, and effects associated with emergencies and disasters by area, also articles regarding requests for resources, disaster proclamations, and requests for assistance at the local, state, and federal levels. 3)Fire:Includes reports on the ignition, spread, response, and containment of wildfires/industrial fires/explosions regardless of source.
4) Trafficking/Border Control Issue: reports on the trafficking of narcotics, people, weapons, and goods into and out of the United States of an exceptional level. Reports will also include articles outlining the strategy changes by Agencies involved in the interdiction of the items outlined above.
5) Immigration :reports on the apprehension of illegal immigrants, policy changes with regard to immigration in the United States
7) HAZMAT: reports on the discharge of chemical, biological, and radiological hazardous materials as well as security and procedural incidents at nuclear facilities around the world, and potential threats to U.S. nuclear facilities. Also reports and response to suspicious powder and chemical or biological agents  
8) Nuclear: reports on international nuclear developments, stateside occurrences such as melt downs, mismanagement of nuclear weapons, releases of radioactive materials, illegal transport of nuclear materials, and breaches in nuclear security protocol.
9) Transportation Security: reports on security breaches, airport procedures, other transportation related issues, and any issues that affect transportation...
10) Infrastructure: Reports on national infrastructure including key assets and technical structures, articles related to failures or attacks on transportation networks, telecommunications/ internet networks, energy grids ,utilities, finance, domestic food and agriculture, government facilities, and public health, as well as those listed above.
11) National/International Security: reports on threats or actions taken against U.S. national interests at home and abroad, articles related to threats against U.S. political figures, military installations, embassies, consulates, efforts taken by local, state, and federal agencies to secure the homeland. Articles involving intelligence will also included in this category.
12) Health Concerns, National/International: articles on national and international outbreaks of infectious diseases, recalls of food or other items deemed dangerous to the public health.
13) Public Safety: Includes reports on public safety incidents, building lock downs, bomb threats, mass shootings, and building evacuations.
14) Reports on DHS, Components, and other Federal Agencies :positive and negative reports on FEMA, CIS, CBP, ICE, etc. as well as other organizations outside of DHS
15) Cyber Security : Reports on cyber security matters that could have a national impact on other CIR Categories; internet trends affecting DHS missions such as cyber attacks, computer viruses; computer tools and techniques that could thwart local, state and federal law enforcement; use of IT and the internet for terrorism, crime or drug-trafficking; Emergency Management use of social media strategies and tools that aid or affect communications and management of crises.
Icing on the fascist infowar surveillance system: 'red flag' words to identify us, potential / 'suspected terrorists' targets guilty of exposing the state:
included in 2011 National Operations Center (NOC) 'Analyst's Desktop Binder' words to identify 'media reports that reflect adversely on government

A senior Homeland Security official told Huffington Post the manual 'is a starting point, not the endgame' in situational awareness of threats and denied government monitors for signs of dissent. http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-...

4/22/09 Obama Administration to Create New Military Command to Combat Cyber Spies in Russia or China: CYBERCOM

21st Century Statecraft , the brainchild of Secretary of State Hillary Clinton.

“Traditional forms of diplomacy still dominate, but 21st-century statecraft is not mere corporate re-branding—swapping tweets for broadcasts. It represents a shift in form and in strategy— to amplify traditional diplomatic efforts, develop tech-based policy solutions and encourage cyberactivism” ...Washington turned to “Software engineers, entrepreneurs and tech C.E.O.’s…to think of unconventional ways to shore up democracy and spur development” abroad...a “marriage of Silicon Valley and the State Department,” January 2010 Clinton said in a speech on internet freedom reported findings by the Lowy Institute for International Policy showing that the U.S. State Department now operates some 230 Facebook accounts, 80 Twitter feeds, 55 YouTube channels and 40 pages on Flickr.
Judith McHale, former under secretary for Public Diplomacy and Public Affairs,said in March 2011 at the State Department: “New media and connective technologies enhance our ability to listen…Social media provides new ways for us to keep our ear to the ground,” said McHale . “Of course, we are not interested in developing social media platforms for the sake of having them. We are interested in applying social media to promote our strategic objectives in the Americas.”

"As a public diplomacy tool, this process is invaluable..."
12/31/11 by Philip Seib, http://uscpublicdiplomacy.org/index.php/newswire/cpdblog_detail/the_us_p...

Obama's tech guru team to unleash 'Holy Grail'
Barack Obama's re-election campaign to launch its secret weapon: Dashboard...[that] melds data collection with a social media aspect...Eli Pariser, former director of Moveon.org the liberal [Soros] website and CEO of the new Upworthy site. "If Dashboard works as billed, it will import into politics the kind of feedback loops we are familiar with from Facebook and online games."... with a team of more than 100 statisticians, predictive modellers, data mining experts, mathematicians, software engineers, bloggers, internet advertising experts and online organisers...to amplify the electoral impact of campaign organisers and volunteers on the ground by connecting them to each other in real time and to the central HQ through the internet....

Google pretexts blaming China were a greenlight for US cyber information war offensive
Google to enlist NSA to help it ward off cyberattacks
By Ellen Nakashima, http://www.washingtonpost.com/wp-dyn/content/article/2010/02/03/AR201002...
The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity....The partnership strikes at the core of one of the most sensitive issues for the government and private industry in the evolving world of cybersecurity: how to balance privacy and national security interests. On Tuesday, Director of National Intelligence Dennis C. Blair called the Google attacks in January, a "wake-up call." Cyberspace cannot be protected without a collaborative effort that incorporates both the U.S. private sector and our international partners" ...“Google and N.S.A. are entering into a secret agreement that could impact the privacy of millions of users of Google’s products and services around the world,” said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a Washington-based policy group. On Thursday, the organization filed a lawsuit against the N.S.A., calling for the release of information about the agency’s role as it was set out in National Security Presidential Directive 54/Homeland Security Presidential Directive 23 , a classified 2008 order issued by President George W. Bush dealing with cybersecurity and surveillance...The relationship the N.S.A. has struck with Google is known as a cooperative research and development agreement... Created as part of the Federal Technology Transfer Act of 1986, essentially a written agreement between a private company and a government agency to work together on a specific project... intended to help accelerate the commercialization of government-developed technology. In addition to N.S.A., Google has been working with the F.B.I....

China Sharply Rebukes U.S. on Google Attacks
By Michael Wines, http://www.nytimes.com/2010/01/26/world/asia/26google.html?ref=science
Secretary of State Hillary Rodham Clinton called for Beijing to conduct a “transparent” inquiry into the attack...also singled out China’s Internet censorship as a threat to the free flow of information...The sharpest language, however, came from the Global Times... quoting a Chinese analyst calling Google’s complaint “a U.S. government-initiated strategy with covert political intentions. As the global landscape is undergoing profound irreversible shifts, the calculated free-Internet scheme is just one step of a U.S. tactic to preserve its hegemonic domination,” said Yan Xuetong, who heads the Institute of International Studies at Beijing’s Tsinghua University. A separate article noted that the US Congress had expanded the power of security agencies to monitor Americans’ e-mail and Internet activities in the wake of the Sept. 11 attacks, and accused Mrs. Clinton of preaching a double standard by criticizing China’s limitations on Internet freedoms.

Google flips the Kill Switch
A feature common in phones will let Microsoft remotely disable malware
Bloomberg http://www.businessweek.com/printer/magazine/the-kill-switch-comes-to-th...
Google flipped a little-known kill switch, reaching into more than 250,000 Android phones... Kill switches, standard on most smartphones, tablets, and e-readers can reach into devices to delete content or edit code without users’ permission...With the rollout of the Windows 8 operating system expected this year, millions of desktop and laptop PCs will get kill switches for the first time. . The feature was publicized in a widely cited Computerworld article in December when Microsoft posted the terms of use for its new application store, a feature in Windows 8 that will allow users to download software from a Microsoft-controlled portal. Windows smartphones, like those of its competitors, have included kill switches for several years, though software deletion “is a last resort, and uncommon,” says Todd Biggs, director of product management for Windows Phone Marketplace...

Google privacy changes across products that users can’t opt out
Google will know far more about who you are and what you do on the Web. The Web giant announced Tuesday it will follow, collect, and now combine users data to stitch together a fuller portrait of users across all of its ubiquitous Web sites, including YouTube, Gmail, its leading search engine google.com... except Google Wallet, the Chrome browser and Google Books...
...Google will collect information when users activate an Android mobile phone, sign into their accounts online or enter search terms... and also store cookies on people’s computers to see which Web sites they visit and use its popular maps to estimate users location. ..“If you’re signed in, we may combine information you’ve provided from one service with information from other services,” Google’s director of privacy for product and engineering, wrote in a blog post ...
Jeffrey Chester, executive director of the Center for Digital Democracy said “There is no way a user can comprehend the implications of Google collecting across platforms information about your health, political opinions and financial concerns.”

Google+ name policy updated allows nicknames
Google changed its name policy on Google+, allowing users to add nicknames and pseudonyms to their personal pages. According to a Google+ post from Google product vice president Bradley Horowitz, the social network relaxed its policy requiring users to use only their real, legal name on their Google+ accounts...a “small step towards improving the ways in which you can communicate your identity on Google+.

Google Plus launches verified accounts
Google hasn’t released information about how the identity verification process happens — the company didn't respond to a request for comment. Some verified Google+ users have said they don’t know how or why...“My account was verified. They didn't ask if it was OK. They didn't ask if I had any ID. I didn't know before they turned it on.” said prolific tech blogger Robert Scoble.

Pentagon sets up new spy agency to eavesdrop on changing world: Defense Clandestine Service
The Pentagon's new spy service will focus on global strategic threats and the challenges posed by countries including Iran, North Korea and China, bringing to 17 the total number of US intelligence organisations...The US already has 16 intelligence organisations scattered around defence, state, justice, homeland security and energy departments, as well as the armed services.
The Defense Clandestine Service is to work closely with its counterpart in the CIA'S National Clandestine Service, recruiting spies from the ranks of the Pentagon's Defense Intelligence Agency (DIA) and deploying them globally to boost the flow of intelligence on perceived long-term threats to US national interests....
US military news website Insidedefense said the Defence Department asked for authority for spies to work undercover posing as businessmen when conducting covert operations abroad.
Obama administration officials have said they want to move main US national security focus away from the Middle East to long-term issues such as China's rise and nuclear threats from North Korea and Iran.... also focus on Africa where al-Qaida affiliates are on the rise....

Dec 9, 2006 ... social media partners... Army open source intelligence (OSINT) operations approved for immediate use in training and operations

2/25/10 DoD Social Media Hub "Social media is an integral part of Department of Defense operations..." www.defense.gov/socialmedia/ "controlled by Department of Defense or Federal Goverment Intemet- based capabilities ...include collaborative tools such as SNS, social media, user- ..." www.defense.gov/news/dtm%2009-026.pdf

25 Feb 2010...Directive Memorandum DTM-09-026Official public affairs activities conducted on non-DoD Internet sites (e.g.Combatant Commands on Facebook, Chairman of the Joint ..." www.dtic.mil/whs/directives/corres/pdf/DTM-09-026.pdf

3/1/10 US Defense Department OKs Social Networking http://www.pcworld.com/article/190457/us_defense_department_oks_social_n... "Service members and DoD employees are encouraged to use new media to communicate with family and friends -- at home stations or deployed." ..."This policy recognizes that Internet based capabilities are integral to operations across the Department of Defense"

DoDLive "The Social Media Operations team created to facilitate DoD's participation in online and social media communications...is part of the Defense Media Activity, which operates a number of information media tools...and hosts hundreds of Web Sites for DoD and the military services. DMA is a field activity of the Office of the Assistant Secretary of Defense for Public Affairs. www.dodlive.mil/index.php/about-dod-social-media/

plausible deniability 'news'
Senators say military cyber ops not reported
The Pentagon failed to disclose clandestine offensive cyber military actions activities in a classified report to Congress, according to a Senate document...cyber experts suggest they may involve secret operations against insurgents in Iraq and Afghanistan, and possibly include other hotspots such as Yemen or Somalia....U.S. use of offensive cyber warfare has only rarely been disclosed, the most well-known instance being the electronic jamming of Iraqi military and communications networks just before the lightning strike against Saddam Hussein’s army in 2003. But Pentagon officials have been clear that cyber espionage and attacks from well-funded nations or terror groups are the biggest threats to military networks, including critical battlefield communications... Cyber Command was created to better deal with threats, but has yet to define the parameters of its offensive and defensive cyber operations...

media embeds truth in 'public diplomacy' lies
New Photos Allegedly Show US Soldiers Posing With Afghan Insurgent Remains
The photos from 2010 obtained by the LATimes US Army members posing with the bodies of insurgents who killed themselves in suicide attacks. The Times published two of the 18 photographs on its website Wednesday.
The photos from 2010 obtained by the Los Angeles Times show members of the United States Army posing with the bodies of insurgents who killed themselves in suicide attacks. The Times published two of the 18 photographs on its website Wednesday.
According to the Times, an American soldier released the photos to the newspaper on condition of anonymity in order to draw attention to a breakdown in leadership and discipline that he believed posed a threat to the safety of troops. The images posted online show U.S. paratroopers and Afghan police grinning while holding severed legs. In the Times' description of the other photos, two soldiers are holding a dead man's hand posed to make an offensive gesture, while another has an unofficial platoon patch reading "Zombie Hunter" next to bomber remains.According to the Times, an American soldier released the photos to the newspaper on condition of anonymity in order to draw attention to a breakdown in leadership and discipline that he believed posed a threat to the safety of troops. The images posted online show U.S. paratroopers and Afghan police grinning while holding severed legs. In the Times' description of the other photos, two soldiers are holding a dead man's hand posed to make an offensive gesture, while another has an unofficial platoon patch reading "Zombie Hunter" next to bomber remains.
U.S. Defense Secretary Leon Panetta rejected the conduct depicted in the photographs saying the two-year-old images "by no means represent the values or professionalism of the vast majority of U.S. troops serving in Afghanistan today." He voiced disappointment that the Times did not honor an official request not to publish the pictures. The U.S. defense secretary warned the material could be used to incite violence against U.S. and Afghan service members. The photos' release comes at a sensitive time. In January, an online video showed four U.S. Marines urinating on Afghan corpses. In February the inadvertent burning of copies of the Quran at a U.S. base near the Afghan capital triggered violent countrywide riots that killed 30 people and led to the deaths of six Americans. Last month, a U.S. Army sergeant allegedly went on a shooting rampage in two Afghan villages that killed 17 civilians, including many children.

Weaponized Data: New Front in Global Capital’s Control Grid
by Tom Burghardt / April 23rd, 2012, http://dissidentvoice.org/2012/04/weaponized-data-a-new-front-in-global-...
From driftnet surveillance to data mining and link analysis, the secret state has weaponized our data, “criminal evidence, ready for use in a trial”... No longer the exclusive domain of intelligence agencies, a highly-profitable Surveillance-Industrial Complex emerged in the 1980s with the deployment of the NSA-GCHQ ECHELON intercept system. As investigate journalist Nicky Hager revealed in CovertAction Quarterly back in 1996:
The ECHELON system is not designed to eavesdrop on a particular individual’s e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet.
With the exponential growth of fiber optic and wireless networks, the mass of data which can be “mined” for “actionable intelligence,” covering everything from eavesdropping on official enemies to blanket surveillance of potential dissidents is now part of the landscape: no more visible to the average citizen than ornamental shrubbery surrounding a strip mall....
George Ciccariello-Maher pointed out in CounterPunch in the wake of last summer’s London “riots,” a mass response to police murder (coming soon to an “urban exclusion zone” near you): “Irrational, uncontrollable, impermeable to logic and unpredictable in its movements, these undesirables have once again ruined the party for everyone, as they have done from Paris 1789 to Caracas 1989. In Fanon’s inimitable words: ‘the masses, without waiting for the chairs to be placed around the negotiating table, take matters into their own hands and start burning…’”.... the great fear of those lording it over the slaves down on the global plantation

FCC and major telecommunications companies database of ID numbers, International Mobile Equipment Identity (IMEI) numbers unique to each phone....
According to an investigation by the ACLU, law enforcement agencies can obtain cell phone records from service providers giving them access to the phone’s locational data. In addition, computers scientists found it is relatively easy and inexpensive to set up a device to track a cell phone’s position without collaboration with cell phone service providers. The FCC's anti-theft PROJECTS initiative will be supported by mobile phone manufacturers...as well as ISPs... setting up of a massive universal database, which will enable the carriers to automatically disable cellphones as well as wireless-enabled tablets reported 'stolen.'...http://www.stockwatch.in/fcc-announces-projects-initiative-fight-cellphone-theft-29426

Your smart phone is a government issued tracking device
By Daniel Taylor | Old-Thinker News | February 1, 2012 ,
“…imagine [your cell phone] being able to aggregate this sort of information from large numbers of phones. It would be possible to determine and analyse how people move around cities, how social groups interact, how quickly traffic is moving and even how diseases might spread. The world’s 4 billion mobile phones could be turned into sensors on a global data-collection network.”
You post facebook updates from your phone, you post tweets, and you send texts. This information is being used to track social movements , predict crime, and build psychological profiles on individuals. Some phones are even being made that act as breathalyzers .

We have all likely heard about the NSA wiretapping of phone calls, but cell phones and mobile devices offer an entirely new level of real time information. “Social awareness ” and geolocation, i.e. the “tagging” of your location with the popular Foursquare app is an example. Police are also scanning cell phones with wireless devices during routine traffic stops. The device can retrieve all photos and video from a cell phone and “…works with 3000 different phone models and can even defeat password protections.”

The Air Force is developing a “Social Radar” that will track social developments and aid counter insurgency operations. An earlier model was developed by the Pentagon called the “Sentient World Simulation ” that predicts “…how long you can go without food or water, or how you will respond to televised propaganda.” In 2010 Dr. Mark Maybury, an artificial intelligence specialist, wrote his paper on the proposed Social Radar for the MITRE Corporation. Wired magazine’s Danger room reports,

“Using sociometrics, it will pinpoint groups. Facebook timelines, political polls, spy drone feeds, relief workers’ reports, and infectious disease alerts should all pour into the Social Radar, Maybury writes, helping the system keep tabs on everything from carbon monoxide levels to literacy rates to consumer prices.”

The NSA is developing an artificial intelligence system called Aquaint (Advanced QUestion Answering for INTelligence). James Bamford, who helped expose the NSA’s illegal wiretapping under the Bush administration, covered the story in 2009 . Bamford quotes one researcher who worked on the system – and quit after finding out how intrusive the technology was – as saying, “Think of 2001: A Space Odyssey and the most memorable character, HAL 9000, having a conversation with David. We are essentially building this system. We are building HAL.” As Bamford reports, this system will use  “…phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records…”
Not only does the government monitor your cell phone, it can now seize control of it through mandatory chips installed in new phones. Most major cell phone providers have signed on to the government program so terror alerts and other messages can be sent to your phone

US drones spy on Americans - ‘incidentally’
5/12/12, http://rt.com/usa/news/drone-spying-memo-leaked-088/
A leaked 4/23 US Air Force document posted on Secrecy News: USAF Drones May Conduct “Incidental” Domestic Surveillance May 8, by Steven Aftergood of the Federation of American Scientists www.fas.org/blog/secrecy/2012/05/usaf_drones.html
The Air Force may not record information 'non-consensually'; however..." Even though information may not be collectible, it may be retained for the length of time necessary for transfer it to another DoD entity or government agency to whose function it pertains.". Additionally it justifies the gathering of data on domestic targets in certain cases including surveillance of natural disasters, environmental studies, system testing and training, and counterintelligence and security-related vulnerability assessments.... 30,000 unmannned aerial drones are predicted to be operational in US airspace by 2020...

"Frictionless Social Media Reader app.
The Washington Post was the first publication to experiment with a "frictionless" social reader app, which launched last year . If you use Facebook you've probably come across it: it manifests as a clustered list of stories that are almost completely unrelated except that they all come from the same publication. If you click on a link it doesn't take you to the story, it shunts you to a signup screen for Social Reader, which you have to accept if you want to make it through to the site....Social Readers a little too share-y, even for Facebook...more like the... mandatory services from Google...

Pentagon Quits The Avengers
The Pentagon halted cooperation with Marvel Studios’ blockbuster The Avengers... S.H.I.E.L.D., led by Samuel L. Jackson’s super-spy Nick Fury, is an international peacekeeping/global surveillance/crisis response/quasi-military organization. But its murky relationship with the U.S. basically stopped the U.S. military, normally an eager industry collaborator from teaming up with the Avengers. “We couldn’t reconcile the unreality of this international organization and our place in it,” Phil Strub, Defense Department Hollywood liaison, tells Danger Room. “To whom did S.H.I.E.L.D. answer? Did we work for S.H.I.E.L.D.?...".Marvel now describes it [S.H.I.E.L.D.] as an “extra-government” body, though many takes on the organization clearly emphasize its international character. Yet U.S. presidents have fired S.H.I.E.L.D. directors (Fury, Tony Stark/Iron Man) and appointed others (Norman Osborn/The Green Goblin, incumbent Steve Rogers/Captain America) — that might operate by an informal international understanding, like the U.S. appoints the World Bank Director

A Liberal Memorial Day Lament