Brazil Also Violates Civil Liberties

By Luis R. Miranda
The Real Agenda
May 11, 2010

Brazil is well-known by its Samba, wonderful beaches and friendly relaxed people. It is often compared to more developed countries for its size, population and resources. But there is one more way in which Brazil is similar to the so called developed world: It also violates civil liberties. Different from say, the United States or England, police here do not harass citizens that much. However, the violation of their liberties and rights is still done quietly. Brazil is a country with very limited access to information and people here know very little about their rights and duties. This panorama is fertile ground for government abuse and corruption.

The giant of South America has been known to have some of the greatest impunity throughout the years. Corruption runs rampant from north to south and east to west. In a recent survey, it was determined that Brazil is among the first countries in corruption and impunity. Although much of this corruption amounts to politicians providing and receiving large sums of money for political favors, there is more beyond regular bureaucracy corruption. The former Portuguese colony is rapidly adopting globalist measures of population control, much like the United States, England, Australia and New Zealand.

Throughout the last 12 months, a few newspapers have revealed in the back of their pages and in tiny one column articles, the almost compulsory nature of the vaccination campaign against the H1N1 flu, which although it has been proven to be a sham, continues to be implemented countrywide. Fortunately, some people have been made aware of the dangers of the vaccine, and the campaign has not had the results first expected by government health authorities. According to Zero Hora newspaper, only 670,000 elderly got vaccinated instead of the 1.4 million expected in the state of Rio Grande do Sul. Less than 50 percent have taken the regular flu vaccination. However, this does not mean Brazil can escape from the control of the World Health Organization. The vaccinations continue to be carried out for different population groups all over the country.

Brazil also uses a form of fluoride in the water supply, a practice largely adopted for its supposed benefits on people’s teeth, but that has also been found to be pseudoscience. Recently this publication interviewed a head chemist at SEMAE, a government organization that cares for the quality of water in the town of Sao Leopoldo, Brazil. With a Master’s Degree in chemistry, she not only admitted she never saw a study that confirmed the claim fluoride, in any form, is beneficial to people, but also confessed that fluoride is put in the water based on the belief it helps to promote oral health. When asked about the dangers sodium fluoride and substances of the like pose to people, she said she never learned anything about that in college or training courses she attended. In fact, fluoride causes tooth decay, mouth cancer and several neurological disorders in addition to lowering intelligence.

The country is in advanced stages of implementing National Identification Cards as well as using Airport Body Scanners. These last two technologies are already being used or will be in force in less than 10 years. In the case of the radiation emitting body scanners, there are several of them in national and international airports. According to the newspaper Zero Hora, from the state of Rio Grande do Sul, beginning in May 2010, travelers who board planes in the cities of Guarulhos, Rio de Janeiro, Recife and Manaus, may be selected as candidates for walk through one of the full body scanners. This measure is taken even though in more developed countries, the use of the scanners raised concern not only for the radiation they emit, but also due to the fact people’s bodies are seen completely naked in the images the machine generates.

According to many civil rights and privacy groups the use of scanners is a gross violation of privacy laws. The images generated from the scanners are saved in hard drives and kept for further use in surveillance. Although authorities in Brazil deny the capacity of the scanners to provide such images, Angelo Gioia, from the Federal Police in Rio de Janeiro, admitted it is a more invasive method of surveillance. Currently, Brazilian laws allow for searches of people when there are founded suspicions of illegal activities, but do not regulate the use of this kind of scanners. Goia believes there should not be any limits when it comes to security. The cost of every body scanner is $170,000. Body scanning technology operates based on the use of millimeter waves over a body to measure the energy reflected back to render a 3D image.Millimeter wave scanners produce,30 to 300 gigahertz electromagnetic waves, something close to what a cellphone emits. The promoters of Airport Body Scanners always cite the huge benefits they provide in preventing safety hazards such as guns, explosives, etc. But the truth is that a pat down or bomb sniffing dogs are as useful or more accurate. Just as it has been done in other countries, in Brazil the use of this technology is presented as an added convenience, so more people receive it and adopt it willingly. Little is talked about the violation to the right to be private as persons and in our property. Added to the convenience, there is another factor injected in the adoption of the scanners: Fear. The threat of terrorism is the extra ace under the sleeve always ready to be pulled out in case people complain or find the scanners to be an inconvenience.

How much terrorism is there in Brazil? Compared to other countries like Ireland, Israel, Palestine, Pakistan or Great Britain, the answer is: nothing. The country has never suffered a major terrorist attack in modern history. The closest to terrorism are the occasional shootings between drug lords and military police in small neighborhoods of Rio or Sao Paulo. So why does Brazil need the scanners? It does not. As in many other countries, the adoption of this technology is all about submission and loss of liberties. In fact, history shows that the most incredible terror attacks have been of the false-flag kind. Trend forecaster and founder of the Trends Research Institute, Gerald Celente, a notable guest in main stream media outlets such as CNN and NBC, believes 2010 will be the year of multiple government sponsored attacks. “It’s the crash of 2010 as we predicted it,” says Celente. “The global economy collapse in March of 2009 when they inflated the markets with fiat money.” Celente predicted the current crisis, falling stock market, civil unrest in Greece and the collapse of Iceland, Argentina, Portugal, Spain as well as the crisis in the United States and the United Kingdom. “Anyone who believes this kind of stuff is beneficial, deserves what they get.” Gerald Celente warns people on what will happen once this kind of policies are fully implemented. Watch this clip at 5 minutes and 30 seconds.

When it comes to the National Identification Card in Brazil, information about it is very scarce. Most people here visit Federal PolicRFIDe offices all around the country to renew their driver licenses or identification and do not inquire or wonder about the new technology used in those documents. In other countries where it has been implemented, the National ID card is rejected by informed citizens as well as pro privacy groups because it contains all information related to the bearer of the card: Social Security number, physical address and a unique identification number that unlocks a wide variety private information such as bank accounts, savings, workplace, voting record, and so on.

In Brazil, the new National ID Card, provides a unique ID number according to the state the person lives in. In the south, people will have ID’s with a unique 10 digit number, in Brasilia, 7 digits, Sao Paulo 9 digits, and so on. The issuance of the new card will begin in October 2010, and it is estimated that every citizen, naturalized and legal immigrants will be part of the database by 2020. According to technology expert Chris Paget, Radio Frequency Technology, the type used in National ID Cards, has been used for years in credit and checking cards. “There have been hundreds of millions of cards issued with RFID. The problem is that people do not know that technology is contained in the cards, and therefore they don’t do anything to protect it” It sounds strange to say the least, that the technology that is supposed to keep us safe, needs to be protected itself. Right now, anyone with an RFID reader can pin point credit and checking cards and obtain enough information to clone it and use it in a transaction. So, why do countries what to literally count and have such a tight control of their citizenry? Dr. Katherine Albrecht, Founder and Director of CASPIAN Consumer Privacy believes there is a massive push for governments to identify and number all of their citizens, and in the process, use technology created by mega corporations which then, would be in control of personal information such as identification number, banking accounts, social security, pension fund accounts, credit card numbers and so on. “We are seeing this in China, where 1 billion people have been issued National ID Cards with radio frequency devices. They are doing the same in Mexico, 1.2 billion people in India…”

According to historian Daniel Estulin, the use of National ID cards along with other technologies is a push for creating a cashless society. “No more money will be needed, because you will have credit assigned to your identification number. The problem is you are not going to be the one deciding how many credit to put on the card. The government will.” Estulin as well as Albrecht recognize the existence of government databases for jobs, credit and crime, and warn the use of National ID Cards will allow for the creation of a worldwide complete database where everyone will be included.

In Brazil, the issuance of the National ID Card will begin as a pilot project in every region. The card will be similar to a Credit Card, with a chip containing information such as the CPF or Cadastro de Pessoa Fisica, voter registration number, fingerprint, or an iris scanned image which will be accepted by the system known as AFIS or Automatic Fingerprint Identification System. This system is recognized worldwide, and is the one utilized by governments in all 5 continents. The resulting number will be a standardized RG or Registro Geral. With this local, regional and national database, Brazil will be one of the last giants in the planet to succumb to the plan to submit to a global registration program where corporations know each and every human being, no matter where they live.

Sources:

Immigration Proposal Creates National ID Card, fingerprint database

https://realagenda.wordpress.com/2010/05/02/dems’-immigration-proposal-creates-national-id-card-‘fingerprints-database/

A Fluoretacao da Agua: O Maior Caso de Fraude Cientifica do Seculo

https://realagenda.wordpress.com/2010/05/01/a-fluoretacao-da-agua-o-maior-caso-de-fraude-cientifica-do-seculo/

Cnet News

http://news.cnet.com/8301-27083_3-10423199-247.html

Gerald Celente, Trend Forecaster

http://www.youtube.com/watch?v=QVonJr9XvK0&feature=player_embedded#!

Shadow Government Film, RFID

http://www.youtube.com/watch?v=Vfpdbxh-8-o

Shadow Government Full Documentary

http://www.liveleak.com/view?i=56a_1265516934

Zero Hora Newspaper, Friday May 7th, 2010

“Identidade terá novo modelo em outubro.” Page 54

Zero Hora Newspaper, Friday May 7th, 2010

“Aeroportos terao scanner de corpo.” Page 57

Automatic Fingerprint Identification System

http://www.interoptest-berlin.de/pdf/DERMALOG_Company_Profile.pdf

European Health Council Unveils H1N1 Fraud

http://www.associatedcontent.com/article/2664587/health_council_of_europe_unveils_h1n1.html?cat=5

Russia Today. Get Ready for the European Double Dip

http://rt.com/Business/2010-05-07/ready-european-double-dip.html

RFID Reader

http://www.cypress.com/?docID=15592

National ID Card

http://epic.org/privacy/id-cards/

CASPIAN Consumer Privacy

http://www.nocards.org/

Daniel Estulin

http://www.danielestulin.com/el-hombre-tras-los-libros/

Cybersecurity: The Takeover of the Internet

By Luis R. Miranda
The Real Agenda
May 1, 2010

In the United States, a recent version of a bill was passed by the House Of Representatives, which will give the Federal cybersecurityCommunications Commission (FCC) complete dominion over the web. The bill includes the creation of a new sector of internet security which will include the training, research and coordination of cyberspace. It allows the National Institute of Standards and Technology (NIST) to create a program to recruit children from Kindergarten up to 12 years old to teach them how to carry out internet surveillance, as part of the new Cyber Army. The scholarship program that will fund the training will teach the students how to create and identity management systems used to control access to the web, computer networks, and data. It will also create a series of standards which all service providers will have to meet in order to remain active. Internet users will have to put up with endless requirements, which include the use of government issued software. Bye, bye Linux!

In section 12, subsection 4, the document reads: “We shall provide a procedure to identify K-12 students to participate in summer work and internship programs that will lead to the certification of a federal information technology workforce standards…” In other words, anyone who intends to work anywhere close to the internet, will need to be certified by the federal government, and the federal government will assure itself it will have the “humans resources” to carry this plan out by recruiting children as young as 5 years of age.

Besides the programs described above, the bill also talks about the creation of new protocols that will provide enhanced security. All software made available will have to first be reviewed by the government and then pre-aproved. Again, bye bye open source! Coincidentally, Google has announced the creation of their own version of the internet; which many worried citizens recognize as a beta test for the coming internet 2.0. Among some of the suggested practices that would be adopted under this internet 2.0, is the use of biometric identification in order to access the web. This would allow the government and its technology partners -AKA Microsoft, Google, AT&T, Verizon and others- to further monitor anyone who uses the web, since such identification would narrow down the work to a single individual operating from a specific computer at a specific location. This type of practices have been put in place by technology manufacturers in computers, external hard drives and other devices, which were biometrically enabled. Recently, Microsoft unveiled the latest version of their Xbox game console which features a 5 megapixel camera that activates on movement and recognizes specific body movements.

Section 7, which talks about licensing and certification of cybersecurity professionals reads: “Beginning three years after the enactment of this act, it shall be unlawful for any individual to engage in business in the United States or to be employed in the United States as a provider of cybersecurity services to any federal agency or information system or network … who is not licensed and certified by the program.” Reading further into the bill, it is clear the mentioned networks include not only the all public ones, but also all private ones.

The Comprehensive National Cybersecurity Initiative will give the President emergency powers -to be added to the ones he got under the Patriot Act- that include contingencies to limit the publication of content, access to the internet and shut down of the web. Some presidential aides as well as technology professional who support the bill tried to dampen critics concerns alleging the president already has vast powers to regulate the Internet during emergencies. No one would think the government’s intent is to take advantage of a bill like this in order to limit or end access to the net, if it was not for the crystal clear statements that government officials have put out with respect to net neutrality, internet 2.0, access to the web and so on. One of the best examples we can use to illustrate what the military industrial complex is planning to do is the most recent statements by Barack Hussein Obama’s Regulatory Czar, Cass Sunstein. He said websites should be mandated remove “rumors” and “hateful” or “absurd” statements, usually contained in “right wing” websites. “In the era of the Internet, it has become easy to spread false or misleading rumors about almost anyone,” Sunstein writes. “Some right-wing websites like to make absurd and hateful remarks about the alleged relationship between Barack Obama and the former radical Bill Ayers; one of the websites’ goals was undoubtedly to attract more viewers. “On the Internet as well as on talk radio, altruistic propagators are easy to find; they play an especially large role in the political domain. When Sean Hannity, the television talk show host, attacked Barack Obama because of his alleged associations, one of his goals might have been to promote values and causes that he cherishes.”

The kind of policies bills like the passed in the U.S. House of Representatives wants to implement, are also being proposed and adopted elsewhere in the world. In Australia, senators are rocking their newly acquired powers, by telling the citizens what is legal and what is illegal to say or publish on the web. One of the many people advancing censorship in the land down under is Senator Steve Fielding, who is a member of the party called Family First. He wants all X-rated content banned for everyone, including adults. Mr. Fielding is open to wide censorship on the internet.

Meanwhile in Indonesia, the local government is following on the steps of the United States and Australia. “There are myriad violations by Internet users in Indonesia. We don’t have any intention to move backward… but we don’t want people to think that the government ignores matters like pornography on the Internet.” Recent laws passed in Indonesia were adopted despite firm opposition and widespread protests. The bill was supported by conservative Muslim groups such as the Prosperous Justice Party (PKS), which traces its origins back to Egypt’s outlawed Muslim Brotherhood.

Governments and organizations that support internet censorship and push for cybersecurity acts usually cite pornography, rumors, hate speech and conspiracy theories as the reasons to intervene with what is written and read online. In reality, however, such plans are efforts to minimize or eliminate dissent, much like some governments like Venezuela, Iran, Saudi Arabia and Cuba close newspapers and television stations that challenged the “official position”.

In the United Kingdom, a bill labeled as The Digital Economy Bill includes a new code to limit Internet access. Local reports warn that the government may bypass the regular consultation process to bring it into force. The bill in the UK contains two clauses, 10 and 11, which are particularly worrisome. They would enable Ofcom to move forward with technical measures as soon as the Initial Obligations code has been introduced. This is seen as a government plan to jump the gun, and ahead to limit the Internet without following the appropriate steps. According to the site IPINTEGRITY.com, the rules included in the bill mirror the language of ‘limitations’ contained in the Universal Services directive in the E.U. Telecoms Package.

What other goals do these kind of internet bills will try to achieve?

Back in the United States, section 5 of the Cybersecurity bill states: “The transfer of cybersecurity standards, processes, technology and techniques, will be developed by NIST.” Both NIST and the FCC, have praised Google’s initiative to build a high speed version of the internet. At the same time, the FCC is in the process of submitting a National Broadband Plan which will effectively limit the amount of time and areas a user can access. In addition, internet users would be charge by the use of bandwidth, the amount of downloads and so on. Among the plans to be implemented with the new cybersecurity bill is the “harmonization” of the web. This means, people will eventually have to use software approved by federal agencies in order to access the world wide web.

Section 6, which details the new standards NIST will put in place, indicates that those who do not comply with federal regulations will be barred from using the internet. Subsection 2.2, again touches on the FCC’s prerogative to decide what are safe standards and to allow access to the web only to those Internet Service Providers (ISP’s) and other companies that meet those standards. In other words, companies that provide internet services and the users themselves will have to operate under the federal governments boundaries or simply forget about what up until now has been a freely accessed medium. This type of policies match Cass Sunstein’s views regarding the use of the web. He says: “freedom usually works, but in some contexts, it is an incomplete corrective.” He proposes a “chilling effect” on “damaging rumors” or using “corrective” measures to deter future rumor mongers. WND reported about Sunstein’s “First Amendment New Deal” also known as a new “Fairness Doctrine” that includes the creation of a panel of “nonpartisan experts” to force “diversity of view” on the airwaves. The regulatory Czar’s radical proposal is contained in his 1993 book “The Partial Constitution.

Section 8, which talks about Domain Name Contracts, gives an advisory panel created by the act veto power on decisions made by the assistant secretary of commerce for Communications and Information with respect to renewal or modification of the Internet Assigned Numbers Authority for the operation of Domain Name System. This seems to echo what was stated by the two representatives who presented the cybersecurity bill. “We must protect our critical infrastructure at all costs—from our water to our electricity, to banking, traffic lights and electronic health records,” Jay Rockefeller said. Olympia Snowe agreed with her colleague: “if we fail to take swift action, we, regrettably, risk a cyber-Katrina.” The governments that approve bills like the ones in the U.S., and initiatives like the ones in Indonesia, Australia, New Zealand, the United Kingdom and other countries, will certainly follow on the steps China has left behind. There, “companies like Cisco Systems, Nortel Networks, Microsoft, Sun Microsystems and Websense – stand accused of aiding and abetting human rights violations,” states the website campaignforliberty.com. The group Amnesty International documented violations committed by Chinese authorities which have introduced regulations, closed LAN houses, spied on and blocked e-mails, taken down search engines as well as foreign news and politically-sensitive websites. More recently, a new filtering system was put to work, with the intention of banning a list of key words and terms”. Such control, it seems, can be implemented either through a central organization that will oversee all internet providers and users, or through regional and local management posts, which the American bill states, will be established through the monetary support of non-profit organizations which will serve as branches for the centralized cybersecurity center.

Groups concerned with the far reaching powers the bill appropriates to the president -whomever he or she happens to be- as well as federal agencies are already mobilizing to show their opposition. GoPetition.com, is a place where people can sign a petition to reject S773. The site correctly states that if the bill passes, “Barack Obama can silence his dissenters directly by ordering a shutdown of all Americans’ access to the Internet. The Internet is a free marketplace of ideas and information and not a federal government property.” Another site called thepetitionsite.com also prompts people to make their voice heard by signing their petition. “If you’re on this site, then you probably know how useful the internet is for the sharing of information.” And it continues, “You also probably enjoy the many ways you can interact with others and entertain yourself. This will all come to and end if the cybersecurity Act of 2009 (s773) passes.” The website freedomfactory.us begins its opposition by citing what many internet users are familiar with: “The usual threats and scare tactics are used to justify giving Big Brother greater powers, including giving the President the power to shut down portions of the internet he deems a threat to national security, and access to vast amounts of digital data currently legally off limits.”

Shelly Roche, from breakthematrix.com pointed out a very important issue. The more dis-centralized the management and control of the web is, the harder it is to “take it down” or significantly hack it to a level where it poses a threat to users or companies. “If common practices are forced on private companies via a federal certification program, hackers will have a road map that, once deconstructed, could unlock every compliant network.”

Just like the neoconservatives used Leo Strauss’ theory to create fictitious threats in the 20th century, engaging the fundamentalist Christians at home to build support, now communist/fascist infected federal governments have created a fake cyber threat in order to push their agenda to limit access to the world wide web. Just like the neocons succeeded in creating the fake war on terror based on a false premise and alliances with terrorist groups around the world -which they themselves financed and directed- now the liberals, -also controlled by banking interests- are trying to tighten the grip on the only medium that challenges their power and control; the only medium that brought some real freedom of information to the people; the only medium that put the brakes on their plan to create a global technocracy, to consolidate their scientific dictatorship.