Pirate Bay Lawyer Arrested and DNA Swabbed

June 3rd, 2006

I always thought Swedes were civilized:

The image “http://photos1.blogger.com/blogger/7600/1425/320/viborg.jpg” cannot be displayed, because it contains errors.

While talking the officer conducting the hearing suddenly enters the room only to inform me that an order has been issued by the prosecutor to collect a DNA-sample from me. For an instant I think that she is trying to make a tasteless joke. But I can tell from her facial expression that she is not. Do I sense a touch of rapture from her? Is she enjoying this as much as I am NOT enjoying it?

(Note that a court order is not needed to get a DNA-sample in Sweden. Only an executive decision by the prosecutor handling the case. The only criteria that he has to adhere to are that jail must be a possible punishment for the crime and that the person forced to leave the sample is under justified suspicion of the crime. However an infringement into someone’s right to protection from invasive procedures of this magnitude requires that a criterion of necessity and proportionality is considered. “Luckily” in this case the prosecutor is not one know from listening to whiny arguments about personal freedoms and other such nancy stuff)
[…]

http://viborginternational.blogspot.com/2006/06/operation-take-down.html

Clearly I was wrong.

They swabbed him for the sole purpose of humiliation, nothing else. This is the true spirit behind biometrics and DNA databases; debasement of humanity, humiliation and subjugation.

There is absolutely no reason to do this in a SUSPECTED case of copyright infringement. These people are beyond insane.

SHAME on Sweden for engaging in this bad business.


iHair!

June 2nd, 2006

istraight Japanese Hair Straightening System

YOUR HEALTHY SHINY HAIR IS OUR MAIN CONCERN.
Just imagine for a moment if you will, after your shower there is no need to fight your curly hair straight. You don’t have to avoid humidity like a Vampire avoids the sun. You can dance around a garden sprinkler, walk away with wet hair that dries straight and frizz free. Our Client Roxanne told us she has waited for this moment for 48 years. She still cannot believe it – she has straight and almost maintenance free hair.
Keep in mind that her hair was not pulled straight with a brush and a blow dryer. We simply blew some slightly warm air from the top of her head until her hair was dry. No pulling and straightening anymore for her for about six month’s. After the 5 hour process we asked Roxanne: Was it worth it for you? She said “You bet it’s worth it” It’s worth every penny and every minute”

Read more about it!

[…]

Our Japanese Contact had returned from Japan in April 2002. His mission was to comb the entire hair industry for the best straightening product that is in existence today.
And he struck Gold.
At Hair Café we now offer the “iStraight” Japanese Straightening System which is gentler than other systems. “iStraight” is most effective on curly virgin hair although it can be used on color treated hair. The hair’s porosity must be evaluated before treatment. We do not recommend the process for African America hair that had a Sodium hydroxide (Lye) in the past.
That means your hair can be straightened permanently even if you have Highlights or colored hair. As you can see on our website. It also means that you can add Highlights or Hair Color after the hair has been straightened making it the safest Straightening System available today. After all, your healthy and shiny hair is our main concern!
Please not that using the ReactionB3 conditioner is an absolutely essential home care regimen that goes along with the Japanese straightening process.


Why Bother?!

June 2nd, 2006

Looking good for the camera has its secrets.

a little lighter…

a little brighter…

a little tighter.

Why bother?!

All you really need is Ice Shine from Pantene

It makes your hair shine…

Just like that.

Shine with the new Pantene Ice Shine collection.

And now there’s also Ice Shine styling, as featured in Vogue.

[…]

http://www.pantene.co.uk/salon/tv-ad/transcript.html


Crypto Love Letters. How Sweet!

June 1st, 2006

Modern Love
In the salad days of spying, back when Ivy Leaguers working for the CIA would sneak messages into and out of East Germany in walnuts carried by unsuspecting globetrotting boy’s choirs, intelligence services used coded shortwave radio transmissions to send one way messages to their agents.

The transmissions consisted of repeated strings of numbers and the military alphabet code and were made famous years later when Wilco used a recording of a East German woman repeating Yankee Foxtrot Hotel in its breakout album (and got sued for it).

Now, it seems someone is keeping the mystery alive via the potent 21st Century combination of Craigslist and VoIP, according to Homeland Stupidity blogger Michael Hampton.

On or around May 8, the following personal ad appeared on the Internet classified ad site Craigslist. (It has since been removed.)

For mein fraulein

Mein Fraulein, I haven’t heard from you in a while. Won’t you
call me? 212 //// 796 //// 0735

If you actually called the number, up until a couple of days ago you would have heard this prerecorded message (MP3). It’s a head scratcher to keep you National Security Agency analysts occupied in your spare time. Each block of numbers is repeated twice; but below I have transcribed them only once for clarity.

Group 415
01305 60510 12079 04606 50100
93000 08203 90130 94069 01207
81080 17028 01706 90220 73038
01401 70150 15073 00402 00680
12013 12510 00540 04091 01401
30150 86022 09608 10660 02082
05507 00020 00000 02208 30290
08022 01200 40710 13065 02709
40190 29014 02200 80020 11083
07300 30260 19000 00700 00000
86

Link.

Hampton and the fine pholks over at 2600 Magazine did some digging and found that the number was a pre-paid VoIP account, but not much more than that could be divined.

Hampton suggests that the best way to figure out the answer is to attack the code.

I think he’s probably wrong.

My guess is that some young cryptanalysts are sending love notes and taunting Mossad, the NSA and the phone phreakers at the same time.

And if they are using unbreakable one-time pads, nobody, including the NSA with their fancy computers, can ever be privy to their sweet nothings.

My blessings (29564 20456 18435 05689 77329) to the happily anonymous couple. […]

http://blog.wired.com/27BStroke6/index.blog

!

“cryptanalysts … sending love notes and taunting Mossad, the NSA and the phone phreakers at the same time”

Romantics….

UPDATE:

‘Now there’s two of them!’

415-704-0402

Is the telephone number that has a recording of a musical intro, then some numbers read out by a machine, made up of very different voices.

These two messages have an interesting feature. They both have a ‘group’ count that has nothing to do with the number of groups delivered.

Now why would someone do that?

A: They know the form of Numbers Stations, but not the actual workings.
B: They know the form and the workings, and are misusing the word ‘group’ deliberately.
Someone has pointed out that all the groups in these messages can be found in large primes. Large primes are big enough so that you can find many five figure groups in them. This doesn’t prove, point to or say anything.

Some people are saying that this is for sure, a government operation of some kind. Any telephone call can have its two ends pinpointed. That means that anyone calling this number to recieve a message can be black bagged. Also because the messages are long, the person collecting it will be exposed for a signifigant amount of time while she transcribes it. Its risky. A far safer way to send a message like would be to use the radio.

No criminal would do this, because they understand how telephones work. ‘Terrorists’ don’t use crypto. So, what we have left is the most likely culprit; someone having fun.

But who could it be? It could be anyone, and now that they know that people are actively looking at the source of the ‘call me’ messages we will no doubt have some more of them. Or maybe not.

Who wants to bet?


Pirates sunk – for now

June 1st, 2006

In the morning of 2006-05-31 the Swedish National Criminal Police showed a search warrant to Rix|Port80 personnell. The warrant was valid for all datacentres of Rix|Port80 and was directed at The Pirate Bay. The allegation was breach of copy-right law, alternatively assisting breach of copy-right law.

“The necessity for securing technical evidence for the existance (sic) of a web-service which is fully official, the legality of which has been under public debate for years and whose principals are public persons giving regular press interviews, could not be explained,” said the statement.

“Asked for other reasoning behind the choice to take down a site, without knowing wether (sic) it is illegal or not, the officers explained that this is normal.”

http://news.bbc.co.uk/1/hi/technology/5036268.stm

Who is behind this? You can bet your last Krona that it isn’t Swedish police or the Swedish government directly. So that leaves external (and most probably) commercial interests directing the activity of a domestic justice system in the complete absence of any legally substantiated wrongdoing.

Sweden, I am ashamed of you.

Regarding the internet-savvyness of record labels, this interesting piece from the Grauniad sheds some light.


You seem to be using Tor!

June 1st, 2006

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) are supporting Tor’s development as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as “traffic analysis.” Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you’re travelling abroad and you connect to your employer’s computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that’s an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you’re doing and, possibly, what you’re saying. That’s because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you—and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it’s going. […]

Running Tor

http://tor.eff.org/

When you use Tor, your ISP cannot record where you have been surfing. That means that any legislation any government passes mandating the storage of your internet usage is rendered moot.

You need to download this and run it as a server when you are not using your bandwidth. A MUCH better use of your CPU/Pipe than searching for coals in Newcastle with SETI@home was.

Like I always say; complaining is good, but there comes a point when you have to stop complaining and take action. Someone has taken the time to create Tor, now all you need to do to assert your rights is to download the software and use it.

Your privacy is restored.

You did’nt even have to shoot a gun.


The trickle down effect

May 31st, 2006

If the government can benefit, it must be kept secret
If the businesses can benefit, it must be tolerated
If the middle class can benefit, it must be licensed
If everyone can benefit, it must be taxed
If a minority can benefit, it must be criminalised


The Customer is always right

May 30th, 2006

There is a new thread of doublespeak weaving its way through the rotting corpse that is HMG: ‘Customer’.

They have replaced the word ‘Citizen’ and ‘Subject’ with the word ‘customer’, as they move to create a state where the wholey disenfranchised sheeple consume the ‘social control’ and tyrrany dished out by them and theircriminally negligent outsourcing partners like those Keystone Cops of Capitalism Capita.

Look at the two places where we have seen this word in this new context; the apprentice cat from the belly of babylon ‘Katherine Courtney’:

‘I think it is important to say that while the pilot itself is not really about testing the robustness and scalability of the particular biometric technologies that are being deployed, it is about studying the enrolment process and the customer experience and being able to validate some of the assumptions that we have built into the business case around the time that it takes to enrol and the customer acceptability.’ […]

http://politics.guardian.co.uk/comment/story/0,,1784770,00.html

And then there is this piece of grotesque insane asylum chatter from Jack ‘Straw Man’ Straw.

Well, I have some news for you, you venal, mass murdering, enslaving, pillaging hellspawn:

THE CUSTOMER IS ALWAYS RIGHT.

We were RIGHT about not illegally invading Iraq.
We ARE RIGHT about ID cards.
We ARE RIGHT about not flushing Britain down the toilet at the behest of companies keen to fleece us all.
And lastly but not finally We are RIGHT about THROWING YOU OUT.


The definition of ‘Delusional’

May 30th, 2006

‘Customers to blame’

Meanwhile Commons leader Jack Straw has claimed the “fundamental problem” with the Home Office it is the people it deals with, rather than its staff.

He described many of its “customers” as “dysfunctional individuals” who proved to be a “burden” and a “challenge”.

Commons leader Jack Straw

Mr Straw blamed difficult ‘customers’ rather than incompetent staff

Mr Straw said in every other area of government activity – such as health or education – the “customers of the department” were generally “willing volunteers”.

This was “last thing” that applied to the people with whom the Home Office dealt, he said.

“They are dysfunctional individuals many of them: criminals, asylum seekers, people who do not wish to be subject to social control – the purpose of the Home Office.

“It is that which places the burden on the staff and provides a challenge both to staff and to ministers.”
http://news.bbc.co.uk/1/hi/uk_politics/5017028.stm

[…]

For this post, I have instantiated a new category: ‘Astonishing’.


hair

May 30th, 2006

beehive yourself

Hairarchives


No Surprises!

May 30th, 2006

NIR electronic records are two years late

By Nicholas Timmins, Public Policy Editor
Published: May 29 2009 21:54 | Last updated: May 29 2009 21:54

Plans to give all 70m residents in England a full electronic biometric record are running at least two to two-and-a-half years late, Lord Dithup, the Home Office minister who oversees the project, has confirmed.

He also admitted that the full cost of the programme was likely to be nearer £20bn than the widely quoted figure of £6.2bn. The latter figure covered only the national contracts for the systems’ basic infrastructure and software applications, he said.

The Passpoert Service and other ‘clients’ of the NIR would, however, spend billions more on training staff, buying PCs and upgrading and assimilating existing systems over the decade-long programme, Lord Dithup said in an interview with the Financial Times.

The extra money did not mean the programme would cost more than expected, he said, but instead reflected the full expense of switching existing IT spending from outdated systems to the new ones.

The delays to the electronic biometric record, which mean it may not be in place until early 2011, come in part because of delays in providing the software, which is being developed by *Soft and other companies.

But the record’s introduction is also being stalled by a fierce and unresolved dispute within the Home Office over what could be included on the National Identity Register, and how citizens data should be accessed. Some see it as threatening to “derail” the programme.

Lord Dithup said some parts of the programme “are going pretty well and pretty much to time”.

But others, he admitted, “are going more slowly than we would otherwise like”. The government has had to “re-group” over the national summary record, meant to make patients’ data available “wherever and whenever” it is needed.

etc. (all below becuase the FT requires registration and is unreasonably slow to load).

Today it’s the NHS tomorrow it will be the NIR – and you can be sure that the attendant databses held by the police, DVLA and (groan) the NHS again, will also require costly overbudget upgrades when everything is updated to access the NIR. Not just a useless moneypit the NIR will be a blackhole of government spending, unremittingly sucking everything related to its operation into its centre.

Or perhaps:

Winners feel the pain from billion-pound contracts

The programme originally proposed that the summary record would include major diagnoses, operations and recent tests, as well as current medications and allergies. It was also proposed that patient data would be added on an “opt out” model, implying that consent to have the basic data added would be assumed, but with patients retaining the right to opt out.

Ministers recently agreed, however, that the initial upload of data, in pilot schemes to be run next year, would cover only current prescriptions, allergies and contra-indications, and that patients would then be asked if they were happy to have other information added.

But the British Medical Association family doctors’ committee has recently rejected that proposal, saying patients’ consent should be sought even before their medications are added to the summary record.

The programme had reached “a pivotal point”, Lord Warner said, and with many hospital doctors favouring a much richer summary record, “the medical profession have to come together” to agree on what data will be included and how it is added.


They work for you – once in a blue moon!

May 30th, 2006

Aircraft at Heathrow

The US said the deal was essential after the 9/11 attacks

The European Court of Justice has ruled illegal an EU-US agreement that allows European airline passenger data to be transferred to the US authorities.The court said the May 2004 agreement did not ensure privacy protection for European travellers.

European airlines have been obliged to give US authorities passengers’ names, addresses and credit card details.

The measure – opposed by the European Parliament – was designed to help prevent acts of terrorism.[…]

I nearly choked on my cornflakes when I read this. Amazing.

Now watch as Bliar twists and bends OUR law in an attempt to appease his US ringmasters. You know he will do it, and those opposed will be painted as lily-livered liberati collaborators.

Reds under beds are back in fashion.

Yesterday, in a discussion on “Britishness”, I heard a commentator say one of the characteristics she found so adoring about the British is that they are so apathetic that there will never be another civil war.

She will have plenty of time to reconsider her position on the Isle of Wight Gulag, comrades!

Blair and his bitches underestimate the British at their peril.

I am reminded, somehow, of John Selwyn Gummer, forcing his child to eat a beefburger to downplay the threat of BSE.

The image “http://news.bbc.co.uk/furniture/special_report/1999/06/99/bse_inquiry/image2.jpg” cannot be displayed, because it contains errors.

Let’s see Bliar frog-marching his sons into Basra without the correct equipment if he wants to demonstrate his resolve and conviction that his war is worth the sacrifices.

Goshdarn it, how I got here from there I don’t know. It’s Tuesday but it’s a Monday feel and my brain is confused.


Kill Blair!

May 26th, 2006
Blair attack ‘morally justified’

George Galloway (left) greets Fidel Castro (right) during a Cuban television programme

George Galloway met Fidel Castro in Cuba this week

MP George Galloway has said it would be “morally justified” to assassinate Tony Blair, but stressed he was not calling for his death. In an interview with GQ magazine he was asked whether a suicide bomb attack on Mr Blair would “be justified as revenge for the war on Iraq”.

He said it would be morally equivalent to Mr Blair “ordering” Iraqi deaths.

But Mr Galloway said he would not support an attack and would tell the authorities if he knew of any plot.

Alert the authorities?

In the interview, former Daily Mirror editor Piers Morgan asked: “Would the assassination of, say, Tony Blair by a suicide bomber, if there were no other casualties, be justified as revenge for the war on Iraq?”

The Respect MP replies: “Yes it would be morally justified. I am not calling for it, but if it happened it would be of a wholly different moral order to the events of 7/7.

“It would be entirely logical and explicable, and morally equivalent to ordering the deaths of thousands of innocent people in Iraq as Blair did.”

He was also asked whether he would alert the authorities if he knew Mr Blair was to be assassinated by Iraqis.

Mr Galloway replied: “My goodness this is a moral maze.

“Yes I would, because such an operation would be counterproductive because it would just generate a new wave of anti-Muslim, anti-Arab sentiment whipped up by the press.

“It would lead to new draconian anti-terror laws, and would probably strengthen the resolve of the British and American services in Iraq rather than weaken it. So yes, I would inform the authorities.”

Respect says Mr Galloway is “sticking by” his comments.

In a statement, the MP said: “Like the prime minister’s wife commenting on suicide bombings in Israel I understand why such desperate acts take place and why those involved might believe such actions are morally justifiable.

“From the point of view of someone who has seen their country invaded and their family blown apart it’s possible, of course, for them to construct a moral justification.

“But I’ve made my position clear. I would not support anyone seeking to assassinate the prime minister.

“That’s why I said in the interview I would report to the authorities any such plot that I knew of.

“What I did make abundantly clear to Piers Morgan in the GQ interview is that I would like to see Tony Blair in front of a war crimes tribunal for sending this country to war illegally and for the appalling human consequences which resulted. That’s what I will continue to press for.”

‘Disgrace’

Liberal Democrat leader Sir Menzies Campbell condemned the comments.

“If Mr Galloway is being accurately reported, he could well be regarded as providing encouragement to someone who might be disposed to carry out a crime of that kind,” said Sir Menzies.

“No politician, ever, by act, word, or deed either expressly or by implication, should give any support to the notion that violence might be justified.”

Labour MP Stephen Pound told The Sun newspaper the remarks were “disgraceful”.

He said: “These comments take my breath away. Galloway is disgraceful and truly twisted.

“Every time you think he can’t sink any lower he goes and stuns you again. It’s beyond reprehensible to say it would be justified for a suicide bomber to assassinate anyone.”

Mr Galloway has been in Cuba this week, where he made a surprise appearance on live television alongside Fidel Castro.

[…]

http://news.bbc.co.uk/1/hi/uk_politics/5020222.stm

Sir Menzies Campbell, Britians own Ralph Nader, making sure the votes of millions are wasted year after year, a man who cannot understand the english language:

“No politician, ever, by act, word, or deed either expressly or by implication, should give any support to the notion that violence might be justified.”

??? Utter, unrefined bullshit; and Bliar has done none of this how exactly? If the answer is that he has, then Menzies agrees with internationally renowned hero G. Galloway that Bliar should be hauled up to the court at Den Hague on a charge of mass murder, crimes against humanity and illegal warfare all of which he unjustifiably ordered. “I was just following Bush” will not be taken by the court as a viable excuse.
Honestly, if this is the quality of thinking that comes out of the Lib Dems, they should give up right now and stop wasting everyone’s time.


Grundgesetzt macht frei!

May 25th, 2006

On 22 May the German Constitutional Court has declared illegal under the German Constitution the practice of screening data across several private and public databases in order to find potential terrorists (“sleepers”). Several federal states will now have to change their police laws. The decision does not make data screening (“Rasterfahndung”, literally: “grid investigation”, usual transliterations: “dragnet investigation” or “data trawl”) completely illegal, but binds it to very narrow conditions. The measure is still legal for investigations in specific criminal cases, as it was used against the left-wing guerrilla RAF in the 1970s, when the “Rasterfahndung” was invented. But for crime prevention purposes, it can only be done in the presence a concrete danger for the lives or liberties of persons or for the existence of the Federal Republic of Germany or a federal state (Land). This requires factual indicators for an imminent attack. A general threat condition or foreign tensions like after 9/11 2001 are not sufficient.

The future UK Bill of Rights will similarly protect the population against State-sponsored data trawling, of course it will in fact go further than the German Constitution as the Bill of Rights will only contain attestations of our Rights and not the rug pulling of their Constitution.

Even so you can see that a Constitution that protects peoples rights ‘works’ when the State isn’t allowed to disregard it into oblivion (c.f. USA)

As their website seems to be unresponsive I shall blockquoth the rest for you below (at least read the very last line.), incidentally there is another article about German Greens are questioning the legality of the EU directive on mandatory retention of communications traffic data, you should subscribe!

subscribe by e-mail
To: edri-news-request@edri.org
Subject: subscribe.

The Federal Police Agency (Bundeskriminalamt) had coordinated such screenings, in cooperation with the state-level police authorities after the terrorist attacks of 11 September 2001. Universities, private companies, private security firms, public transport institutions, facility providers, municipal authorities, and the Federal Register of Foreign Residents were required to submit comprehensive information they had on anybody matching a set of criteria (male, aged between 18 and 40, student or former student, country of origin mainly Muslim) to the state police agencies. The latter did a screening run for matches across the different submitted databases that combined included more than 8 million people. The 31 988 hits were stored in a central file called “sleepers” and again screened by the Federal Police Agency against a database that included up to 300 000 persons who held a pilot license, were supposed to be dangerous, or matched some other criteria. The remaining several thousand persons (matches) was manually reviewed by the state police agencies. The whole exercise did not lead to a single terrorist suspect or prosecution.

The plaintiff, a Morrocan citizen who studied in Germany in 2001, argued that his right for informational self-determination was breached, that the screening was an especially severe breach of fundamental rights because it took place unbeknownst to the people affected, that it was not proportionate because of the lack of factual indicators for an imminent terrorist attack in Germany, and that the criteria were discriminating him and fellow Muslims on the basis of religion. The lower courts had overturned his arguments.

The official data protection commissioners, the opposition parties Greens, Liberals and Socialists, and civil liberties groups applauded the court decision and demanded an immediate stop of plans for similar measures like communications traffic data retention, license-plate screening, or the creation of new investigative powers for the Federal Police Agency for the prevention of crimes. A spokesperson of the federal Ministry of the Interior said that in international terrorism, there was only a thin line between a general and a concrete threat condition, making it difficult to apply the decision. The Bavarian Minister of the Interior, Günther Beckstein, called the decision “a black day for the effective fight against terrorism in Germany.” The association of student representatives, which had supported the plaintiff, demanded a “personal apology” from the responsible authorities for the illegal and unconstitutional discrimination of foreign and Muslim students in Germany.

Up to eleven federal states will now have to change their police laws and criminal procedures acts. The decision will also have an impact on the discussion about the legality of mandatory communications data retention in Germany. The Constitutional Court explicitly re-emphasised in the reasons given for the judgement the “strict prohibition, beyond statistical purposes, of the storage of personally identifiable data on stock.” (“auf Vorrat”). “Vorratsdatenspeicherung” – literally: “data storage on stock” – is the German term for data retention.


ID cards to be used for criminal record checks

May 23rd, 2006

Criminal Records Bureau outlines five-year strategy…

By Andy McCue

Published: Tuesday 23 May 2006

The Criminal Records Bureau (CRB) has outlined initial plans for integrating ID cards into the criminal record vetting process as part of a “period of major change” in its new five-year business strategy.

The CRB’s current disclosure service charges employers to vet the suitability of new staff who will be working with children and vulnerable adults, although it has been dogged by technical problems since its launch in 2002. Just this week the Home Office admitted that 2,700 innocent people had wrongly been branded as paedophiles and violent robbers because their details were similar to people with criminal convictions.

From 2009 the CRB said it will begin the first phase of integrating the ID card in the authentication and application process for verifying the identity of those undergoing criminal record checks. More immediate targets include a move to complete electronic services as part of the strategy to reduce the cost of processing CRB checks. The current service is based only on paper and phone applications but the CRB said it is aiming for full “e-service delivery” for single and bulk electronic applications by 2008.

The CRB business plan said: “Removing the paper form and moving rapidly to a position where electronic transactions are the most used application channel is an essential step in the drive to create a low-priced but high value disclosure service.” This will lead to the CRB operating on a self-funding basis for the first time since it was set up, with a surplus of £2.4m projected for this current financial year.

Another key change in the CRB will be the setting up of a new online register of vetted people – run by the Department for Education and Skills – for employers to check. Anyone who undergoes a criminal record check will be added to the register which will then be continuously updated. Some of these developments will require changes to the CRB’s £400m PFI contract with Capita, which runs until 2012.

The range of data sources the CRB can search is also to be extended from the Police National Computer and police intelligence sources to include the British Transport Police, Royal Military Police, the Serious and Organised Crime Agency and the police forces for Guernsey, Jersey and the Isle of Man. […]

http://www.silicon.com/publicsector/0,3800010403,39159065,00.htm

My emphasis.

Like we have been saying, the NIR is going to be the key to everything you do and are in the UK.

They are going to check if you have a criminal record or not in real time, on a person by person basis with a swipe of your card. They are going to be able to check you even if you are not present, by submitting your NIR number. You are going to be checked en masse in bulk background checks when companies collect millions of NIR numbers and want to weed out the ‘criminals’.

You can imagine what it will be worth to have your NIR removed from the criminal records DB and put into the ‘trusted people’ DB. Some Home Office bod is going to make hundreds of thousands ‘upgrading’ people…or he is going to get all the ‘free’ sex he can handle.

Note the company that is in charge of all this, Capita, that incompetent firm that has no responsibility for ruining peoples lives. Note also that they intend it to be self funding, meaning that every time a check is made, someone has to pay, and your data is being used to make money for Capita. A licence to fleece the British man….SHAME!

This scheme changes the nature of criminal justice. When you were convicted of a crime, and you pay your ‘tarrif’ to the state, the matter is then finished. With these background checks being done all the time, you will pay for your crimes, no matter how big or small, for the rest of your life.

That is not right.


“Enormous” security breach leaves Britons vulnerable to ID theft

May 23rd, 2006

By Christopher Lee and Steve Vogel

The Daily Mirror

LONDON — As many as 26.5 million citizens were placed at risk of identity theft after intruders stole an electronic data file this month containing their names, birthdates and NIR numbers from the home of a Home Office employee, Secretary Jim Nicholson said Monday.

The burglary occurred May 3 in Basildon, according to a source with knowledge of the incident who requested anonymity because the matter is under investigation.

“In terms of NIR numbers, it’s the biggest breach,” said Evan Hendricks, author of the book “Credit Scores & Credit Reports.” “As long as you’ve got that exact NIR, most of the time the credit bureaus will disclose your credit report, and that enables the thief to get credit.”

A career data analyst, who was not authorized to take the information home, has been put on administrative leave pending the outcome of investigations by the SOCA, local police and inspector general of the Home Office, Nicholson said. He would not identify the employee by name or title. […]

http://www.newsfromthefuture.com/

And there you have it. The ‘Frances Stonor Saunders’ email predicts that such a breach will happen, either with or without the public being informed. All your personal information will be ‘out there’ and there will be no way to get it back.

Of course, in the UK it will be far worse than any mass theft of SSNs. Your indellible biometric details, the record of your unique essence will have been stolen, those poor vets can all be re-issued clean SSNs; you cannot be issued with new fingerprinits, iris patterns or DNA. This is the profound difference between changable numbers in a centralized database and your biometric details in a centralized database. Both are dangerous, but the latter is permanently damaging to you and your good reputation.

People from court ushers to students were wrongly labelled pornographers, thieves and violent robbers because their names and dates of birth matched those of convicted criminals on the Police National Computer.

Victims had to go to police stations to be fingerprinted to clear their names.

The mismatches were made by Capita, the controversial computer firm with many lucrative government contracts despite a woeful record on major technology projects. […]

Mirror

My emphasis. The counter statistic that is bandied about to do with this scandal is that 27,000 people were stopped from getting jobs in sensitive positions, and that millions of checks are carried out each year, and these errors are the most tiny of percentages.

Wait a minute. MILLIONS of checks each year? What are the exact numbers, and who on earth is making all of these checks?

One of the girls in the list of people wrongly branded criminals was falsely accused TWICE.

None of the people who have been found to be falsely accused have been able to sue Capita, HMG or anyone for defamation of character, loss of earnings, pain and suffering.

The problem of this and other private companies ruining the lives of individuals is going to be vastly greater if the NIR is rolled out. You had better not register your details in the NIR; this is the only way that you will be absolutely sure that you are not marked as a criminal as they attempt to bring all government databases under the unique key of the NIR number.


Keep complementary medicine out of NHS, say leading doctors

May 23rd, 2006

Some of the UK’s most eminent doctors have mounted a direct challenge to the integration of complementary medicine into the NHS, on the day that Prince Charles urges the World Health Assembly in Geneva to back the cause of alternative and complementary medicines alongside scientifically-proven treatments.

Thirteen senior doctors have written to every hospital and primary care trust in the UK urging them not to suggest anything but evidence-based medicine to their patients.

There has been growing concern among some in medical and scientific circles about the increasing referral by GPs to complementary medicine practitioners. Some GPs use therapies such as acupuncture and homeopathy on their patients; others are increasingly willing to send them to complementary therapists in cases where they cannot themselves provide treatment.

Signatories to the letter include Sir James Black, who won the Nobel Prize for Medicine in 1988, Sir Keith Peters, president of the Academy of Medical Science, and, according to the Times, six fellows of the Royal Society. Yesterday a spokesman for the Royal Society said that it had not organised the letter, but acknowledged that the society took a sceptical view. “As far as the society is concerned, it has always said that alternative medicine needs to be assessed on the same sort of criteria as conventional medicine – but we have not expressed a view about its role within the NHS,” said Bob Ward.

The letter was organised by Michael Baum, a cancer specialist who is emeritus professor of surgery at University College London. Edzard Ernst, professor of complementary medicine at Exeter University, is another signatory.

The doctors urge primary care trusts not to spend money on unproven therapies at a time when the NHS is short of cash. It criticises two recent initiatives of the Prince’s Foundation for Integrated Medicine – a patient guide to complementary medicine, for which it was given government funds – and last year’s Smallwood report, which purported to find that complementary medicine on the NHS was cost-effective. […]

http://www.guardian.co.uk/medicine/story/0,,1781148,00.html

Look carefully at the authors and signatories of this letter:  ’emeritus professor’, ‘Nobel Prize winner’, ‘president of the Academy of Medical Science’, ‘fellows of the Royal Society’…’the UK’s most eminent doctors’.

All of these men are interested in only one thing; thier own positions of power and social standing. They say that they want to save the NHS money. If that were the case, they would not care how the patient was treated, as long as she was treated and no longer a financial burden on the system.

The fact of the matter is that these ‘doctors’ are not in the slightest bit interested in the health of the patient; they are only interested in the primacy of thier philosophy. Nowhere is there any mention that harm can come to a patient from getting accupuncture treatment (for example) and of course, those true, patient centered scientists and medical practitioners know for a fact that accupuncture is so powerful that it can be used in the place of anesthesia for surgery.

Many of these people are not only morally bankrupt but they are completely corrupt, owning shares in pharmaceutical companies, whose products if abandoned in favour of ‘alternative’ medicine, would cause financial loss to these very same venal drug peddlers. They therefore have a double cause to be against the NHS adopting patient centered medicine; not only will people ignore their built up staus, but they will face financial ruin also.

Thankfully those health workers on the front line, dealing with the scarcity of resources both physical and financial will use anything to get the job done, not only for those reasons, but because they are in constant contact with human sufffering, are actually interested in alleviating that suffering, rather than being concerned about the method of relief above all else.