Wednesday, November 26, 2008

Blood Sucking Oil Companies

Toyota, working to meet the Zero Emission Vehicle mandate, set up a production line in 1997 for the "large-format" EV-95 batteries needed for their Toyota RAV4-EV.

These EV-95 NiMH batteries, after years of research, were perfected for EVs:

* Deep Cycle, no memory effect;

* High energy output for acceleration;

* Long lifetime, longer than the life of the car -- even a Toyota car. Toyota's EV-95 batteries are still running Toyota RAV4-EV cars more than 20,000 miles per year, and for over 100,000 miles so far.

But no more EV-95 batteries can be made, after Chevron sued Toyota. In 1994, Stan Ovshinsky, the inventor of the NiMH battery and principal of Energy Conversion Devices with the late Dr. Iris Ovshinsky, sold control of the NiMH batteries to a jont venture, GM Ovonic, between GM and his company, with the goal of manufacturing patented NiMH batteries for EVs.

Ostensibly, GM was supposed to go into production, and thus, it seemed, perhaps, natural to allow them control of the battery they would, supposedly, be using. In the event, Honda and Toyota used NiMH 4 years prior to GM's final release of a NiMH version of the EV1. But passing control of the batteries to GM proved a fatal mistake for the future of EVs. GM announced on Oct. 10, 2000 the sale of the worldwide patent rights for the NiMH batteries to Texaco. Six days later, on Oct. 16, 2000, even before the sale was consumated, Texaco then merged with Chevron. The sale of the batteries was finally concluded on July 17, 2001, long after Texaco had become one with Chevron.

Chevron/Texaco received "...GM's 60 percent stake in [NiMH] batteries, and a 20 percent stake in ECD itself...", giving Chevron effective control of NiMH. On Mar. 6, 2002, just months after inheriting control of NiMH batteries, Chevron's subsidiary filed suit against Toyota, Panasonic, their PEVE joint venture, Sanyo et al. On December 12, 2001, Chevron's affiliates filed an arbitration demand...with the International Chamber of Commerce...In December 2002, an arbitration agreement...on Nov. 4-19, 2003, the hearing was held, and concluded on Jan. 21, 2004. On July 7, 2004, the settlement agreement ended in complete defeat for Toyota, Matsushita and their joint venture, PEVE. NiMH was only mentioned for "hybrids", those which cannot plug in, and Cobasys, Chevron's unit, became distributor of PEVE batteries, received $20 million licensing fee, in addition to $10 million paid to Energy Conversion Devices. "Cobasys will also receive royalties through December 31, 2013 on certain NiMH batteries sold by [Toyota] in North America."

Chevron oil, the successor to Standard Oil of California, thus worked with GM to eliminate the batteries needed for plug-in EVs, similar to how America's small urban commuter railroads were bought up by the same surprising buyers.

The railroads were dismantled, the right-of-way lost to the public domain, just as the NiMH batteries are now unavailable to run EVs or plug-in hybrids that can replace our oil addiction and address global warming concerns.

Until we move to plug-in cars and electric trains, any talk of dealing with climate change, decreasing oil use, or getting free of our oil addiction anemia, is a sham. Chevron's subsidiary sued Toyota, Panasonic and all other battery makers, forcing a settlement agreement and $30,000,000 payment from Toyota to Chevron's subsidiary.

* Most importantly, Toyota's NiMh EV-95 production line was closed down, and

* No more EV-95 batteries are available for any purchaser at any price. Toyota closed down their production line, and the batteries which power the RAV4-EV or the 1999 EV1 are no longer available. Chevron's patent rights don't expire until 2014.
All so the Oil Companies can continue to rake in record profits while a far better alternitive exists.  

Thursday, November 13, 2008

The RAPE of AMERICA.....

Rape is a word I do not use lightly.  
It also means an act of plunder, violent seizure, or abuse; despoliation; violation, ie: the rape of the countryside. There is no other word to describe what has been happening in Washington, DC., for the past two and a half months. The so-called (BAIL-OUT) which in truth is theft of the highest order, of lending institutions and banks has turned into a free for all that is sickening.  The figure of 700 Billion has already rocketed into the TRILLIONS with no end in sight. 
This unconstitutional looting of the American people's labor has been murder and rape on a national scale.
The Federal Reserve is refusing to identify the recipients of almost $2 trillion of emergency loans from American taxpayers or the troubled assets the central bank is accepting as collateral. Fed Chairman Ben S. Bernanke and Treasury Secretary Henry Paulson said in September they would comply with congressional demands for transparency in a $700 billion bailout of the banking system. Two months later, as the Fed lends far more than that in separate rescue programs that didn't require approval by Congress, Americans have no idea where their money is going or what securities the banks are pledging in return."
The US Congress knowingly gave the privately owned "FED" and Treasury total power with the bail out deal and now it's the American people who are being robbed. Lending institutions who received all this borrowed, worthless paper called a (BAIL-OUT) or (Rescue Plan) are stealing the future from our children.  The finical rape of American citizens is going to pay HUGE bonuses and Lavish raises, black tie gala events, while Congress sits around counting their hidden kick back monies. 


 
The US Congress, in the first place, never had the authority to to rob and plunder the American taxpayers hard earned money.   This self inflicted injury by the US Congress has NOW turned into a finical wound which is bleeding money so profusely that it will soon kill the hosts these parasites are feeding from.  

R.I.P. The United Sates of America 2009.  Cause of Death, the US Congress's willingness to surrender National sovereignty to a small group of Private European Bankers. 
The US Congress has no right to steal from you via heavier and heavier taxation to bail out, rescue or make Non-Repayable loans to companies in the private sector. That is until Congress, with the blessing of Bush, simply decided a little over two months ago to finally burn Art. 1, Section 8 of the U.S. Constitution. They have become the internal threat to Domestic security the military USE to pldge to defend the American people from.  Those calling themselves US government employees are NOW totally lawless in their their seditious actions.
The US Congress, willfully and knowingly, violates the U.S. Constitution now as a matter of doing business. These crooks, including  the new thinly vield Marxist president elect Obama will complete bankrupt this country.  
The verifiable Facts and raw, hard numbers are there for anyone willing to look. Despite  Americans demanding that this historic RAPE of the American People NOT go forward.  The duplicitus US Congress acted in this manner.   
Of the Bail Out, Senator Diane Feinstein said...
"I have recieved 91,000 calls and emails with over 86,000 plus TOTALY OPPOSED to this Bail Out.  I know all those in my district do not want this Bail out, but I don't care what they want, they are too stupid to know what they want. So I will do what I want." 
This is what has become of the once great Democracy known as the United States of America. 
A godless, totalitarian government, with an incoming Demagog as the head the new  Fascist regime .

Saturday, November 08, 2008

Those Who Forget The Past....


Are Forver Doomed To Repeat It's Bloody Atrocities....


Whenever someone wishes to demonize someone, they inevitably compare the person or group to Adolf Hitler. The message immediately resonates with people because everyone knows that Hitler was a brutal dictator.

How many people know how Hitler actually became a dictator? How did he pull it off, especially given that after World War I Germany had become a democratic republic. Much like the USA purports to be now.

In the presidential election held on March 13, 1932, there were four candidates: the incumbent, Field Marshall Paul von Hindenburg, Hitler, and two minor candidates, Ernst Thaelmann and Theodore Duesterberg. The results were:

Hindenburg 49.6 percent
Hitler 30.1 percent
Thaelmann 13.2 percent
Duesterberg 6.8 percent

Almost 70 percent of the German people voted against Hitler, causing his supporter Joseph Goebbels, who would later become Hitler’s minister of propaganda, to lament in his journal, “We’re beaten; terrible outlook. Party circles badly depressed and dejected.”

Since Hindenberg had not received a majority of the vote, however, a runoff election had to be held among the top three vote-getters. On April 19, 1932, the runoff results were:

Hindenburg 53.0 percent
Hitler 36.8 percent
Thaelmann 10.2 percent


Thus, even though Hitler’s vote total had risen, he still had been decisively rejected by the German people.

On June 1, 1932, Hindenberg appointed Franz von Papen as chancellor of Germany, whom Shirer described as an “unexpected and ludicrous figure.” Papen immediately dissolved the Reichstag (the national congress) and called for new elections, the third legislative election in five months.

Hitler and his fellow members of the National Socialist (Nazi) Party, who were determined to bring down the republic and establish dictatorial rule in Germany, did everything they could to create chaos in the streets, including initiating political violence and murder. The situation got so bad that martial law was proclaimed in Berlin.

Even though Hitler had badly lost the presidential election, he was drawing ever-larger crowds during the congressional election.


Much, like President Elect Obama.



In one just one single day, July 27, he spoke to 60,000 persons in Brandenburg, to nearly as many in Potsdam, and that evening to 120,000 massed in the giant Grunewald Stadium in Berlin while outside an additional 100,000 heard his voice by loudspeaker.


Hitler’s rise to power


The July 31, 1932, election produced a major victory for Hitler’s National Socialist Party. The party won 230 seats in the Reichstag, making it Germany’s largest political party, but it still fell short of a majority in the 608-member body.

On the basis of that victory, Hitler demanded that President Hindenburg appoint him chancellor and place him in complete control of the state. Otto von Meissner, who worked for Hindenburg, later testified at Nuremberg,

Hindenburg replied that because of the tense situation he could not in good conscience risk transferring the power of government to a new party such as the National Socialists, which did not command a majority and which was intolerant, noisy and undisciplined.
Political deadlocks in the Reichstag soon brought a new election, this one in November 6, 1932. In that election, the Nazis lost two million votes and 34 seats. Thus, even though the National Socialist Party was still the largest political party, it had clearly lost ground among the voters.

Attempting to remedy the chaos and the deadlocks, Hindenburg fired Papen and appointed an army general named Kurt von Schleicher as the new German chancellor. Unable to secure a majority coalition in the Reichstag, however, Schleicher finally tendered his resignation to Hindenburg, 57 days after he had been appointed.

On January 30, 1933, President Hindenburg appointed Adolf Hitler chancellor of Germany. Although the National Socialists never captured more than 37 percent of the national vote, and even though they still held a minority of cabinet posts and fewer than 50 percent of the seats in the Reichstag, Hitler and the Nazis set out to to consolidate their power. With Hitler as chancellor, that proved to be a fairly easy task.


The Reichstag fire

On February 27, Hitler was enjoying supper at the Goebbels home when the telephone rang with an emergency message: “The Reichstag is on fire!” Hitler and Goebbels rushed to the fire, where they encountered Hermann Goering, who would later become Hitler’s air minister. Goering was shouting at the top of his lungs,

This is the beginning of the Communist revolution! We must not wait a minute. We will show no mercy. Every Communist official must be shot, where he is found. Every Communist deputy must this very day be strung up.
The day after the fire, the Prussian government announced that it had found communist publications stating,

Government buildings, museums, mansions and essential plants were to be burned down... . Women and children were to be sent in front of terrorist groups.... The burning of the Reichstag was to be the signal for a bloody insurrection and civil war.... It has been ascertained that today was to have seen throughout Germany terrorist acts against individual persons, against private property, and against the life and limb of the peaceful population, and also the beginning of general civil war.

So how was Goering so certain that the fire had been set by communist terrorists? Arrested on the spot was a Dutch communist named Marinus van der Lubbe. Most historians now believe that van der Lubbe was actually duped by the Nazis into setting the fire and probably was even assisted by them, without his realizing it.

Why would Hitler and his associates turn a blind eye to an impending terrorist attack on their national congressional building or actually assist with such a horrific deed? Because they knew what government officials have known throughout history — that during extreme national emergencies, people are most scared and thus much more willing to surrender their liberties in return for “security.” And that’s exactly what happened during the Reichstag terrorist crisis.



Think 9/11 and the Patriot Act being rammed through the US Congress at lighting speed.

Suspending German civil liberties

The day after the fire, Hitler persuaded President Hindenburg to issue a decree entitled, “For the Protection of the People and the State.” Justified as a “defensive measure against Communist acts of violence endangering the state,” the decree suspended the constitutional guarantees pertaining to civil liberties:

Restrictions on personal liberty, on the right of free expression of opinion, including freedom of the press; on the rights of assembly and association; and violations of the privacy of postal, telegraphic and telephonic communications; and warrants for house searches, orders for confiscations as well as restrictions on property, are also permissible beyond the legal limits otherwise prescribed.

Two weeks after the Reichstag fire, Hitler requested the Reichstag to temporarily delegate its powers to him so that he could adequately deal with the crisis. Denouncing opponents to his request, Hitler shouted, “Germany will be free, but not through you!” When the vote was taken, the result was 441 for and 84 against, giving Hitler the two-thirds majority he needed to suspend the German constitution. On March 23, 1933, what has gone down in German history as the “Enabling Act” made Hitler dictator of Germany, freed of all legislative and constitutional constraints.



Just like the very vague, but exceptionally broad power grabbing potential, of President Bushes executive order giving Him complete control of the US government in the case of something so vague as a regional weather incident.   It's called the Continuity of Government Order.


The judiciary under Hitler

One of the most dramatic consequences was in the judicial arena. Shirer points out,

Under the Weimar Constitution judges were independent, subject only to the law, protected from arbitrary removal and bound at least in theory by Article 109 to safeguard equality before the law.
In fact, in the Reichstag terrorist case, while the court convicted van der Lubbe of the crime (who was executed), three other defendants, all communists, were acquitted, which infuriated Hitler and Goering.

Within a month, the Nazis had transferred jurisdiction over treason cases from the Supreme Court to a new People’s Court, which soon became the most dreaded tribunal in the land. It consisted of two professional judges and five others chosen from among party officials, the S.S. and the armed forces, thus giving the latter a majority vote. There was no appeal from its decisions or sentences and usually its sessions were held in secret. Occasionally, however, for propaganda purposes when relatively light sentences were to be given, the foreign correspondents were invited to attend.


One of the Reichstag terrorist defendants, who had angered Goering during the trial with a severe cross-examination of Goering, did not benefit from his acquittal. Shirer explains:
The German communist leader was immediately taken into “protective custody,” where he remained until his death during the second war.


In addition to the People’s Court, which handled treason cases, the Nazis also set up the Special Court, which handled cases of political crimes or “insidious attacks against the government.” These courts consisted of three judges, who invariably had to be trusted party members, without a jury. A Nazi prosecutor had the choice of bringing action in such cases before either an ordinary court or the Special Court, and invariably he chose the latter, for obvious reasons. Defense lawyers before this court, as before the Volksgerichtshof, had to be approved by Nazi officials. Sometimes even if they were approved they fared badly. Thus the lawyers who attempted to represent the widow of Dr. Klausener, the Catholic Action leader murdered in the Blood Purge, in her suit for damages against the State were whisked off to Sachsenhausen concentration camp, where they were kept until they formally withdrew the action.
Even lenient treatment by the Special Court was no guarantee for the defendant, however, as Pastor Martin Niemoeller discovered when he was acquitted of major political charges and sentenced to time served for minor charges. Leaving the courtroom, Niemoeller was taken into custody by the Gestapo and taken to a concentration camp.

The Nazis also implemented a legal concept called Schutzhaft or “protective custody” which enabled them to arrest and incarcerate people without charging them with a crime.
Protective custody did not protect a man from possible harm, as it did in more civilized countries. It punished him by putting him behind barbed wire.

                                             
Think  military tribunals and Guantanamo Bay  prison camp, which operates the US Constitution.

On August 2, 1934, Hindenburg died, and the title of president was abolished. Hitler’s title became Fuehrer and Reich Chancellor. Not surprisingly, he used the initial four-year “temporary” grant of emergency powers that had been given to him by the Enabling Act to consolidate his omnipotent control over the entire country.


Accepting the burgeoning New World Order

Oddly enough, even though his dictatorship very quickly became complete, Hitler returned to the Reichstag every four years to renew the “temporary” delegation of emergency powers that it had given him to deal with the Reichstag-arson crisis. Needless to say, the Reichstag rubber-stamped each of his requests.

For their part, the German people quickly accepted the new order of things. Keep in mind that the average non-Jewish German was pretty much unaffected by the new laws and decrees. As long as a German citizen kept his head down, worked hard, took care of his family, sent his children to the public schools and the Hitler Youth organization, and, most important, didn’t involve himself in political dissent against the government, a visit by the Gestapo was very unlikely.

Keep in mind also that, while the Nazis established concentration camps in the 1930s, the number of inmates ranged in the thousands. It wouldn’t be until the 1940s that the death camps and the gas chambers that killed millions would be implemented.

Just as the Americans began building their FEMA relocation camps in the 1980's.
It won't be until the the economic collapse, and the decleration of the North American Union with the introduction of the new currency,
the AMERO that they will be filled with US citizens.

                                                                                                              
                                                                                                                                                                    The overwhelming majority of Germans did not seem to mind that their personal freedom had been taken away, that so much of culture had been destroyed and replaced with a mindless barbarism, or that their life and work had become regimented to a degree never before experienced even by a people accustomed for generations to a great deal of regimentation....

The Nazi terror in the early years affected the lives of relatively few Germans and a newly arrived observer was somewhat surprised to see that the people of this country did not seem to feel that they were being cowed.... On the contrary, they supported it with genuine enthusiasm. Somehow it imbued them with a new hope and a new confidence and an astonishing faith in the future of their country.


Much like those who delcare President Elect Obama, a New Hope, a New Future for the American Country. 

Wednesday, November 05, 2008

The Seat of the NWO Part II

Hundreds of drivers are being FORCED to take part in government-funded road-pricing trials that could result in charges of up to £1.30 a mile on the most congested roads.
The test runs will start early next year in four locations and will involve fitting a satellite-tracking device to the vehicles of volunteers. An on-board unit will automatically deduct payments from a shadow account set up in the driver’s name.

Paul Clark, the Transport Minister, confirmed yesterday that the trials would proceed despite previous statements from the Government suggesting that it had abandoned the idea of a national CAR ID.

The on-board unit could be used to collect all information connected to the vehicle and it's driver. The Farce of congestion in London and Manchester are to to be the3 cover story for further loss of individual privacy inside the seat of the NWO.
In the longer term the technology WILL BE USED to track every movement, of every citizen of the UK, 24hrs a day, 7days a week, 365days a year.  

Drivers would use the internet to check all their payments on a single bill. They would choose whether the bill showed where they had travelled or simply the amounts they had paid.

Ministers hope to overcome concerns about loss of privacy by allowing drivers to instruct the on-board unit not to transmit locations to the billing center but simply the number of miles driven at each charging rate. Of course, this information will not be in any way, used against the citizen, should the government deem it expedient.

The Department for Transport (DfT) has appointed four companies to test different charging systems and a further three companies to test methods of enforcing the FALSE cover story of a pricing scheme and ensuring its accuracy.

The Times has learnt that one of the four trials will involve up to 100 BT staff working at Martlesham, Suffolk. BT is working with T-Systems, the German company that collects tolls from lorries on 12,000 miles of autobahn.

Trafficmaster, a leading provider of traffic information and satellite navigation systems, is running another trial.

The nails are being pounded at a furious rate into the coffin of all free men.... 

The Seat of the NWO.....

 

UK Government black boxes will 'collect every email, every web page visit, every chat room entry, every download, every upload, all cell phone calls, every text message, and finally, all internet activity.'

All in the interest of our safety of course!


Internet "black boxes" will be used to collect every email and web visit in the UK under the Government's plans for a giant "big brother" database, The Independent has learnt.
Home Office officials have told senior figures from the internet and telecommunications industries that the "black box" technology could automatically retain and store raw data from the web before transferring it to a giant central database controlled by the Government.
Plans to create a database holding information about every phone call, email and internet visit made in the UK have provoked a huge public outcry. Richard Thomas, the Information Commissioner, described it as "step too far" and the Government's own terrorism watchdog said that as a "raw idea" it was "awful".

Nevertheless, ministers have said they are committed to consulting on the new Communications Data Bill early in the new year. News that the Government is already preparing the ground by trying to allay the concerns of the internet industry is bound to raise suspicions about ministers' true intentions. Further details of the database emerged on Monday at a meeting of internet service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB were given a PowerPoint presentation of the issues and the technology surrounding the Government's Interception Modernisation Programme (IMP), the name given by the Home Office to the database proposal.

Whitehall experts working on the IMP unit told the meeting the security and intelligence agencies wanted to use the stored data to help fight serious crime and terrorism, and said the technology would allow them to create greater "capacity" to monitor all communication traffic on the internet. The "black boxes" are an attractive option for the internet industry because they would be secure and not require any direct input from the ISPs.

During the meeting Whitehall officials also tried to reassure the industry by suggesting that many smaller ISPs would be unaffected by the "black boxes" as these would be installed upstream on the network and hinted that all costs would be met by the Government.

"It was clear the 'back box' is the technology the Government will use to hold all the data. But what isn't clear is what the Home Secretary, GCHQ and the security services intend to do with all this information in the future," said a source close to the meeting.
He added: "They said they only wanted to return to a position they were in before the emergence of internet communication, when they were able to monitor all correspondence with a police suspect.

This exact thing has already been in place inside the USA for some years now....

Again, for our safety, of course!

Sunday, November 02, 2008

DARPA the New MURDER Inc.

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) has begun granting contracts to software firms to create algorithms that can be applied to the real-time video feeds from drone aircraft so the data can be sorted and stored on a wide range of human activities, from digging a ditch to climbing into a car to kissing someone.
The contracts represent the latest step in the Bush administration’s seven-year drive to develop high-tech spying capabilities that can be applied to a variety of situations and locales to detect terrorist or insurgent activities.
The on-going DARPA project is already developing algorithms that would identify specific human activities – both by individuals and by groups – and evaluate if these actions suggested behavior that would justify a military response.
The list of activities that would draw attention to a single person include “digging, loitering, picking up, throwing, exploding/burning, carrying, shooting, launching, walking, limping, running, kicking, smoking, gesturing,” according to DARPA’s contract description.
For person-to-person activities, the project would identify and catalogue cases of “following, meeting, gathering, moving in a group, dispersing, shaking hands, kissing, exchanging objects, kicking, carrying together.”
Categories relating to vehicles include getting into or out of a car, opening or closing the trunk, driving, accelerating, turning, stopping, passing and maintaining distances.
According to DARPA’s description, the research project addresses challenges faced by intelligence analysts in processing and retrieving the vast amounts of visual data created by live video feeds from Predator drones and other aerial surveillance over Iraq and Afghanistan. By identifying and indexing specific actions, the analysts would be helped in evaluating potential threats and could retrieve video regarding similar behavior.
“The U.S. military and intelligence communities have an ever increasing need to monitor live video feeds and search large volumes of archived video data for activities of interest due to the rapid growth in development and fielding of motion video systems,” said the DARPA document, written in March but withheld from the public until September.
Kitware, a software company with offices in New York and North Carolina, won an initial $6.7 million contract for what is technically called Video and Image Retrieval and Analysis Tool, or VIRAT.
In a statement about the contract award, Kitware projected that through its proposed system, “the most high-value intelligence content will be clearly and intuitively presented to the video analyst, resulting in substantial reductions in analyst workload per mission as well as increasing the quality and accuracy of intelligence yield.”
Anthony Hoogs, Kitware’s project leader, said, ”This project will really make a difference to the war fighter.”
To carry out the project, Kitware said it was teaming up with two leading military technology companies, Honeywell and General Dynamics, as well as a number of academic researchers. [See Kitware Awarded $6.7M DARPA Contract.]
Repression Works
Though this DARPA project is not expected to be completed until early next decade, other technological breakthroughs reportedly have helped U.S. forces identify and kill insurgents in Iraq. 
In his latest book, The War Within, Bob Woodward writes that highly classified U.S. intelligence tactics allowed for rapid targeting and killing of Iraqi insurgent leaders, representing a more important factor in undermining the insurgency than President George W. Bush’s much touted troop “surge.” However, Woodward withheld details of these secret techniques so as not to undermine their effectiveness.
Still, there have been previous glimpses of classified U.S. programs that combine high-tech means of identifying insurgents – such as sophisticated biometrics and night-vision-equipped drones – with old-fashioned brutality on the ground, including on-the-spot executions of suspected insurgents. [For details, see Consortiumnews.com’s “Bush’s Global Dirty War” and “Iraq’s Laboratory of Repression.”]
However, the marriage of advanced technology and military repression has raised concerns among some human rights advocates that these techniques could open the door to an Orwellian future in which authoritarian regimes repress popular resistance.
DARPA, with its mandate to push the envelope on the application of technology for military and intelligence purposes, also has been caught up before in controversies about balancing security against liberty.
In 2002, DARPA came under criticism when it unveiled plans for Total Information Awareness, a project that sought to detect terrorist activities by mining electronic data about virtually everyone on earth, anyone who participated in the modern economy.
The plan was to map out “transactional data” collected from every kind of activity – “financial, education, travel, medical, veterinary, country entry, place/event entry, transportation, housing, critical resources, government, communications,” according to the DARPA Web site.
The program would then cross-reference this data with the “biometric signatures of humans,” data collected on individuals’ faces, fingerprints, gaits and irises. To run the sensitive project, the Bush administration selected retired Admiral John Poindexter, who was convicted of five felony counts in the Iran-Contra Affair (though a conservative-dominated appeals court later reversed the jury verdicts).
Public and congressional outrage over this massive data-mining operation supposedly killed the TIA program in 2003, but the National Journal revealed in February 2006 that the project was ended in name only, kept alive within the secret budget of the National Security Agency.
One TIA component, called the Information Awareness Prototype System, was renamed “Basketball” at NSA, but still provided the basic architecture tying together information extraction, analysis and dissemination tools developed under TIA.
Meanwhile, the Bush administration began deploying similar advanced technology to Iraq with the goal of throttling the insurgency that was challenging the U.S. military occupation.
In effect, Iraq was transformed into a test tube for modern techniques of repression, including use of night-vision optics on drone aircraft, heat resonance imaging, and firepower that is both deadly and precise.
The new techniques marked a modernization of tactics used in other counterinsurgencies, such as in Vietnam in the 1960s and in Central America in the 1980s.
In Vietnam, U.S. forces planted sensors along infiltration routes for targeting bombing runs against North Vietnamese troops. In Guatemala, security forces were equipped with early laptop computers for use in identifying suspected subversives who would be dragged off buses and summarily executed.
Last year, a conservative counterinsurgency expert sent me a video, spliced together by the U.S. military in Iraq, showing how some of the modern techniques worked in Iraq. The video showed night-vision aerial surveillance of suspected “terrorists” as they moved in the dark with what was described as a truck-mounted anti-aircraft gun, the muzzle still warm from firing.
The tiny figures of these “terrorists” then walked into a forested area where they were mowed down by miniguns from an AC-130. Their truck also was blown to bits.
Biometrics
Besides using Predator drones to monitor the movement of Iraqis from the sky, massive amounts of biometric data have been collected on the country’s people for use in identifying suspected insurgents.
Explaining the value of this computerized database, Pentagon weapons designer Anh Duong told the Washington Post that it gave valuable information to soldiers on the ground. 
"A war fighter needs to know one of three things: Do I let him go? Keep him? Or shoot him on the spot?” Duong said.
Though Duong is best known for designing high-explosives used to destroy hardened targets, she also supervised this Joint Expeditionary Forensics Facilities project, known as a “lab in a box” for analyzing biometric data, such as iris scans and fingerprints, that have been collected on more than one million Iraqis.
The labs – collapsible, 20-by-20-foot units each with a generator and a satellite link to a biometric data base in West Virginia – let U.S. forces cross-check data in the field against information collected previously that can be used to identify insurgents.
Duong said the next step would be to shrink the lab to the size of a “backpack” so soldiers who encounter a suspect “could find out within minutes” if he’s on a terrorist watch list and should be killed. [Washington Post, Dec. 1, 2007]
By identifying and indexing a wide range of human activities captured on surveillance videos, the new DARPA project could augment some of these other security projects, already in place or in development.
Regarding the video analysis, however, DARPA specifically prohibited inclusion of biometric algorithms for identifying people by their gaits or other individual features. However, those elements, which are being developed separately, presumably could be added to the overall technological package at a later date.