Ad

Showing posts with label Government. Show all posts
Showing posts with label Government. Show all posts

Tuesday, November 10, 2015

UFO or Missile Test. The Government Says Missile Test.

"Missile tests like the one the Navy performed off the coast of Southern California on Saturday night present military officials with something of a conundrum."...public fear...conspiracy theory...UFO or trust the government?  Really?  Over a major city and in major airspace? How stupid is the government?...no, wait...don't answer that.
Conspiracy? Read more here...

"It was a UFO filled with aliens: Strange unidentified light in the sky? Of course, it’s the mothership coming to take over the planet! That was by far the most popular conspiracy theory among those who witnessed the bizarre light show happening across the Western sky. As many social media users pointed out, the UFO, which many immediately and frantically assumed to be an extraterrestrial spacecraft, appeared first as a brilliantly bright white light that could be seen from hundreds of miles away. Now, while that alone doesn’t prove an alien invasion, many pointed out that the UFO-shaped clouds were seen in South Africa...
ufo-gallery-3


...the day after the L.A. sighting. Some were also suspicious over the fact that the government didn’t announce the missile test ahead of time, and it was conducted over a densely populated city rather than a deserted desert, as is typically the case."

More on UFO Sighting In Los Angeles: Top 5 Conspiracy Theories Revealed here...

Coverage here...


My favorite reaction...










Embedded image permalinkWhat about this coincidence? Tijuana, Mexico...same night as L.A...















What about this one?
"Date of sighting:November 6, 2015 at 5:00-5:15pm Location of sighting:Xinzhuang Dist, New Taipei City, Taiwan"


There were multiple other sightings during the same time frame.  How can they all be explained as missile tests?





Wednesday, July 3, 2013

The Doom of Google Panda

Since the launch of Google Panda, because of the new algorithm, my site has taken a nose dive to 1/4 of its ranking and the same amount in revenue.  As much as this is a hobby of mine, I have decided that I will only blog every once in a while to keep documentation of the signs of the times.


To me, Google Panda is a way for our government to demote the readership of blogs and therefore censorship.  Bloggers get information in a much different way than main stream media and that scares our government.  They have talked about blogger control for some time now and this seems to be the way that they are doing it.

Thank you to all of you who read my blog(s).

Again, I will intermittently blog on signs of the times for my own hobby, however, I cannot pursue this as hard as I was prior because, even with great sources and great pieces of news gathering, my blog has nose dived to worse than when I first started writing in it.

Thanks again.  Please read when I post.

Wednesday, June 5, 2013

Massive protests in Turkey. Activists being arrested for using Twitter.

Turkey Is Now Arresting People For Using Twitter to Spread "Untrue Information"





















A Turkish art group preforms in support of protestors at Taksim Square onJune 5, 2013 in Istanbul, Turkey

Photo by Uriel Sinai/Getty Images
As my colleague Will Oremus wrote about earlier this week, Turkish Prime Minister Recep Tayyip Erdoğan has made no secret of how he feels about the use of Twitter. "Now we have a menace that is called Twitter," Erdoğan said on Monday, day four of the mass protests that are now in their sixth day. "The best example of lies can be found there. To me, social media is the worst menace to society."
At the time of those remarks, the Turkish government appeared to have no immediate plans to combat this menace/curse/scourge—despite scattered reports of Internet outages, the tweets continued to roll in, along with the Facebook posts, Instagram pics, and Vine videos. That may have changed Wednesday, via the Associated Press:
Turkey's state-run news agency says police have detained 25 people for "spreading untrue information" on social media and provoking protests. The Anadolu Agency says Wednesday the people were detained in the city of Izmir for allegedly "inciting the people to enmity and hate." It said police were still looking for 13 others.
No one seems to have any idea exactly which tweets in question landed the offending users in jail—something that only highlights the fact that Turkey's main media outlets have been noticeably slow to give the protests the coverage they deserve (which, in turn, has left many Turks relying on the social media site for their updates). Regardless, the arrest of a couple dozen Twitter users is unlikely to deter the thousands of others using the social media site to voice their displeausre with Erdoğan any more than the several thousands of arrests on the streets is going to deter the mass demonstrations that are now occuring across Turkey.

Dozens arrested in Turkey over protest tweets, accused of 'inciting hatred'


Published time: June 05, 2013










Stick on one of the buses in Istanbul. (RT Photo)


Turkish police have detained at least 25 Twitter users for allegedly spreading false reports, as anti-government demonstrations in Turkey continue for a sixth day.
Social media activists have been accused of using Twitter to “instigate public hatred and animosity,” according to Turkish media. Police raided 38 addresses to locate the suspects. 
A protestor uses a mobile phone to give latestt news about the clashes near Taksim in Istanbul on June 3, 2013. (AFP Photo / Ozan Kose)
A protestor uses a mobile phone to give latestt news about the clashes near Taksim in Istanbul on June 3, 2013. (AFP Photo / Ozan Kose)

The activists were arrested early Wednesday in the western city of Izmir. Police said that their tweets contained “misleading and libelous information,” state-run news agency Anatolia reported. However, Ali Engin, an official from the main opposition Republican People’s Party (CHP), said that they were detained for urging people to protest. 
Police tracked down the activists through their IP addresses, and were reportedly able to locate most of them. CHP said that they have sent lawyers to assist the arrested individuals.
The lawyers revealed to the media that police files on the individuals included tweets about where to meet, about police actions, and about the names of volunteer doctors and lawyers.
Earlier on Tuesday, Turkish Deputy Prime Minister Bulent Arinc apologized for the treatment of protesters during riots that grew out of a demonstration last Friday against the planned demolition of Taksim Gezi Park to build a mall. The police use of teargas and pepper spray to disperse protesters has been heavily criticized. 

Turkish riot police officer fires tear gas during clashes with protestors between Taksim and Besiktas in Istanbul on June 3, 2013 during a demonstration against the demolition of the park. (AFP Photo / Bulent Kilic)
Turkish riot police officer fires tear gas during clashes with protestors between Taksim and Besiktas in Istanbul on June 3, 2013 during a demonstration against the demolition of the park. (AFP Photo / Bulent Kilic)

Arinc said that the police’s actions were wrong, and that security forces have been ordered not to use teargas except in cases of self-defense. "The excessive violence that was used in the first instance against those who were behaving with respect for the environment is wrong and unfair. I apologize to those citizens," Arinc said at a news conference on Tuesday. 
After unrest began last Friday, tens of thousands of anti-government protesters held demonstrations in Istanbul, Ankara, Izmir, Mugla, Antalya, and many other cities and towns across Turkey. At least two people were killed and thousands were injured in the nationwide protests

Turkey protests continue despite apology

Protesters meet with deputy PM to demand cancellation of Gezi park demolition and release of dozens arrested in Izmir.

Last Modified: 05 Jun 2013 12:19




Protests have continued in Turkey as demonstrators defied a government appeal to end deadly unrest in which two people have died.

On Tuesday, Deputy Prime Minister Bulent Arnic apologised for "excessive violence" against protesters trying to save a park in Istanbul, a campaign which acted as catatlyst for deeper tensions within the country.

A meeting between the deputy prime minister and some of the protesters took place on Wednesday in Ankara. 

Police used tear gas and water cannon overnight and into Wednesday morning on hundreds of protesters, who ignored warnings to disperse in Istanbul, Ankara and the southeastern city of Hatay.
In Istanbul, thousands gathered peacefully at Taksim Square on Wednesday yelling defiance at Prime Minister Recep Tayyip Erdogan, who had earlier dismissed the protesters as "extremists" and "vandals".






Sunday, March 3, 2013

What Will the Sequester Do to the Military

U.S.: What the Sequester Will Do to the Military

March 1, 2013 | 1116 GMT

Summary

Sequestration, the automatic spending reductions scheduled to take effect March 1, will affect the U.S. military's ability to project force around the world. The current continuing resolution that Congress is using to fund the entire government until March 27 has already affected U.S. forces. The longer these funding cuts continue, the more degradation the U.S. military will incur, with longer-lasting effects. 

Analysis

Although Stratfor typically does not examine domestic U.S. issues, this one is geopolitically significant. The U.S. military, and particularly the Navy, is the most powerful force projection instrument in the world. When the sequester takes effect, it will immediately reduce military spending by 8 percent, with more than $500 billion in cuts to defense spending over 10 years divided equally among the military branches. The continuing resolution is already affecting the military since it has locked the military budget into 2011 spending levels and prevented spending increases or re-allocations among various budgets. On March 27, Congress will have to have a new budget in place, extend the continuing resolution or force a government shutdown; the most likely decision will be to maintain the continuing resolution. 

It is not the overall amount of the reductions that is damaging, necessarily; it is the way in which the cuts will be implemented. The across-the-board cuts required by the sequestration coupled with the limits set by the continuing resolution are constraining budget planners' options in how to absorb the spending reductions and thus are damaging all the military branches, programs, training, deployments and procurement. 

Funding Cuts and Force Readiness 

Just the threat of continued budget reductions has had an immediate effect on the military's readiness. The Navy decided not to deploy a second carrier to the Persian Gulf, backing down from its standard of two carriers in the region. Instead, the second carrier will serve in a surge capacity for the immediate future. The other branches have extended the deployments of units already in theaters and delayed others from rotating in as replacements since it is relatively less expensive to have units stay in place than move them and their equipment intercontinentally. 

Maintenance budgets across the forces have been reduced or suspended in anticipation of cuts. Training of all non-deploying forces who are not critical to the national strategic forces is also being heavily curtailed. These options were chosen because they are immediate cost-saving measures that can be reversed quickly as opposed to the big-budget procurement programs, in which changes can cause delays for years. In many cases, the Department of Defense would have to pay massive fines for withdrawing from binding contracts, and renegotiations are often very costly. The Defense Department hopes that the cuts will be short-lived, but the longer the spending constraints continue, the more the military's platforms and personnel units degrade in readiness. 

The medium- to long-term effects can be even more serious. Any given military platform, from a Stryker armored vehicle to an aircraft carrier, requires a lot of money in order to be ready for use at any time at its intended level of performance. These platforms require consistent use to maintain a certain readiness level because machines cannot sit idle for months to years and then operate effectively, if at all, especially if called on for immediate action. Moreover, the people that operate this equipment need to maintain their working knowledge and operational skill through continued use. This use causes wear and tear on the platform and requires consistent maintenance. All of this is necessary just to maintain the status quo. In the end, there must be a balance between a platform's readiness level and the amount of funding required for operations and maintenance, but if the money is no longer available there is no choice but to reduce readiness. 

Also, upgrades are needed so platforms can stay up to date and useable within the system the military is using to move, shoot and communicate. This is a constant cycle that, when interrupted, has very long-lasting consequences. For example, the Navy has said it is considering suspending operations of four of its nine carrier air wings while shutting down four of its carriers in various stages of the operations and maintenance process. This would essentially give the United States one carrier deployed with one on call for years. This will be sufficient if the world remains relatively quiet, but one large emergency or multiple small ones would leave the United States able to project limited force compared to previous levels. 

In the longer term, procurement programs for new equipment will either be delayed or cut altogether. This will put more pressure on existing platforms, requiring them to operate past their intended life spans, and will preclude or delay the introduction of better abilities into the military. Procurement cycles are very slow and take decades to implement; for instance, the Navy that the United States wants to have in 20 years is being planned now. An extreme example of the damage that a military force can incur because of a lack of procurement, operations, maintenance and upgrades is the current state of the Russian military. Russian forces still feel the effects of the Soviet Union's collapse and the subsequent decade of neglect. 

A Smaller Presence Around the World 

The U.S. military has a global presence, and sequestration would have appreciable effects on this in certain areas. Potentially, the hardest hit region will be the Pacific, which has been the focus of the United States' new strategy. If the United States wants to continue pivoting its focus toward the Pacific, the military would have to draw more resources than originally planned. No specific mention has been made of changing the U.S. military footprint in Japan, other than possibly curtailing combat air patrols, and U.S. forces are already consolidating their presence in South Korea to fewer bases south of Seoul and diminishing their role in relation to the South Korean military. The Navy's reduction in ship deployments to the region will just reinforce the current trend. 

The U.S. military's footprint is being reduced in a few other areas. The combat zone in Afghanistan has 66,000 troops, with 34,000 scheduled to come home by the end of the year. All but around 8,000 will return home by the end of 2014. The 5th Fleet headquartered in Bahrain is being affected by the Navy's decision to have only one carrier in the Persian Gulf. Europe is seeing a reduction from four brigade combat teams to two, which was already planned and is another reinforced trend. The U.S. ground presence in Africa and South America should be relatively unchanged, since these predominantly involve special operations forces -- the kind of deployment that is already being emphasized over larger conventional forces. 

Like this report? Subscribe to enjoy related reports and more:
  • U.S. Naval Update Map
  • The Origin of Wars
  • Syria: The Air Force's Importance to the Regime
The single biggest capability gap that will develop will be the U.S. military's surge capacity. If the Syria-Iraq-Lebanon corridor were to become more unstable, the United States will not be able to respond with the same force structure it had in the past. The U.S. military can still shift its assets to different regions to attain its strategic goals, but those assets will come from a smaller resource pool, and shifting them will lessen the presence in some other region. The military's ability to use one of its softer political tools -- joint military exercises -- will also be at risk. 

Reduced Relative Dominance 

This is not to say that the U.S. military will be wrecked immediately or that its condition is anywhere near that of the Russian military in the 1990s. A military's effectiveness is measured against its potential opponents, and the United States has enjoyed a large gap for decades. However, if a military is not growing in capabilities and other militaries or groups are, then its relative power is decreasing. This means that after sequestration is implemented or the continuing resolution is maintained, the U.S. military will remain dominant for years to come, but not as dominant as it has been relative to other forces. 

There are many ways the effects of funding cuts can be mitigated. Congress can continue to delay addressing budget issues and the military's concerns indefinitely, or it can make some changes, such as allowing the Department of Defense more discretion in how it implements these cuts. However, the budget cuts are already having preliminary effects, and the longer the cuts continue, the greater the potential for degradation of the U.S. military's force projection capabilities. Funding cuts are not necessarily abnormal for the United States while winding down into a postwar stance. Historically, the pattern has been a reduction in spending and retrenchment of a large volume of forces from abroad. However, Pentagon planners typically go into a postwar period with the stated goal of not damaging the force through these cuts and reductions. 

source: www.Stratfor.com

Tuesday, February 26, 2013

Transparency? Uhmmm. Obama Must Have Signed An Executive Order To Change The Definition.

TRANSPARENCY

TRANSPARENCY


TRANSPARENCY


TRANSPARENCY


TRANSPARENCY










-----------------------------------------------------------------------
Feb 26, 2013, 6:55am EST

Obama asks governors to urge 

Congress to avoid sequestration

---------------------------------------------
"The nation's governors don't have much patience for the fiscal follies now playing in Washington, D.C. They're required by their states' constitutions to balance their budgets -- they don't need blunt instruments like sequestration's across-the-board spending cuts to do the job. They and their state legislators simply make tough choices on spending and taxes -- the way government is supposed to work."
source: click here
--------------------------------------------------------------------------


February 25, 2013
By Melanie Hunter
(CNSNews.com) – At a meeting with the National Governors Association on Monday, President Barack Obama closed his prepared speech by saying he wanted the press cleared out of the room so he could take some questions.
After saying he looked forward to working with the governors to build a “thriving middle class," Obama said: “That’s our goal, and I know that’s the goal of all of you as well. So I look forward to our partnering--and with that, what I want to do is clear out the press so we can take some questions."
source: click here

Tuesday, November 27, 2012

Predictions for November-December 2012. Will Mayan 2012 Prophecy Impact Us On December 21, 2012?

If you do or if you don't believe in astrology, let's watch these videos and see what predictions come to pass.

We are told that "history is going to tip its hand".

Do you believe we are entering a 5th dimension, a spiritual awakening, or do you believe that this is the end of the world and will be apocalyptic?

 



















THE FIFTH DIMENSION

Abstract five-dimensional space occurs frequently in mathematics, and is a legitimate construct. Whether or not the real universe in which we live is somehow five-dimensional is a topic that is debated and explored in several branches of physics, including astrophysics and particle physics.
In physics, the fifth dimension is a hypothetical extra dimension beyond the usual three spatial dimensions and one time dimension of Relativity. The Kaluza–Klein theory used the fifth dimension to unifygravity with the electromagnetic force; e.g. Minkowski space and Maxwell's equations in vacuum can be embedded in a five-dimensional Riemann curvature tensor [1][unreliable source?]. Kaluza–Klein theory now is seen as essentially a gauge theory with gauge group the circle groupM-theory suggests that space–time has 11 dimensions, seven of which are "rolled up" to below the subatomic level. Physicists have speculated that the graviton, a particle thought to carry the force of gravity, may "leak" into the fifth or higher dimensions, which would explain how gravity is significantly weaker than the other threefundamental forces.
In 1993 the physicist Gerard 't Hooft put forward the holographic principle, which explains that the information about an extra dimension is visible as a curvature in a spacetime with one fewer dimension. For example, holograms are three-dimensional pictures placed on a two-dimensional surface, which gives the image a curvature when the observer moves. Similarly, in general relativity, the fourth dimension is manifested in observable three dimensions as the curvature path of a moving infinitesimal (test) particle. Hooft has speculated that the fifth dimension is really the spacetime fabric.

The "fifth dimension" in popular culture

In popular usage, the "fifth dimension" is often used to refer to unexplored or unknown aspects of the universe, and not necessarily to the mathematical concept of a 5-dimensional space. For example, the opening narration of The Twilight Zone begins: "There is a fifth dimension, beyond that which is known to man." In the fictional universe of DC Comics, the "fifth dimension" is said to be the place from whichMister Mxyzptlk, a Superman villain, comes. In 1966, The Byrds released an album titled Fifth Dimension, using the fifth dimension as a metaphor for unexplored and unknown aspects of the universe and oneself. The 5th Dimension is the name of an American vocal music group popular in the late 1960s and early 1970s. In Hindu philosophy, the fifth dimension of love of the Divine is termed by the Gaudiya Vaisnavas as turyatita, the dimension of the soul's Soul. The original Doctor Who episode hints at the 5th dimension being key to the abilities of the TARDIS.[citation needed]
Other uses of the "fifth dimension" are closer to its mathematical meaning. For example, the novel The Boy Who Reversed Himself features 4-dimensional and 5-dimensional spaces, using the mathematical fact that a 3-dimensional object can be turned into its mirror image if additional spatial dimensions were available for it to rotate through. The characters in Madeleine L'Engle's novel A Wrinkle In Time use the fifth dimension[citation needed] as a "dimensional shortcut" to travel through space. A similar concept appears in the Powerpuff Girls episode Bring Back Jojo, where a creature able to see higher dimensions takes a dimensional shortcut through a fifth dimension to travel through time. The Red Dwarf episode "Parallel Universe" refers to the fifth dimension as the space in which multiple four-dimensional spaces exist.
Not all references to the "fifth dimension" in the mathematical sense involve time travel or space travel; Douglas Adams' book Mostly Harmless advances the idea of the fifth dimension being probability.
In Mikhail Bulgakov's The Master and Margarita, valet Koroviev in an explanation to Margarita attributes the expansion of a small apartment into the size of a large auditorium to the fifth dimension.
In the song "M Theory", recording artist R.D. Peoples discusses thoroughly the fifth and eleventh dimensions. The song goes on to discuss dark matter, advanced beings and parallel universes; also sampling many quotes from Dr. Michio Kaku and Phil Plait.

Wimplygirl website 2
It’s possible that 65-90% of what you “feel” doesn’t belong to you.  Enjoy this interactive workshop exploring how the energy fields of others could be affecting you more than you realize. Using examples from the audience we will practice techniques to shift and restore your energy field.  As a massage therapist, Dewey would get energy sickness from other people until she developed effective methods for clearing this negative energy. For the past 15 years she has been educating and empowering people with this information. Come and learn how to raise your vibration and create an environment where you can move forward with greater strength and clarity.
child_universeThis world is moving rapidly forward to the next stage of evolution — a 5th dimensional reality where all things are possible. This shift is giving us unprecedented access to new energies and tools for personal transformation. In this workshop Dewey and Betsy Meyer will empower you with transmissions of energy and information that will open the way for you to:
  • Accelerate healing for yourself and others–mentally, emotionally, and physically
  • Clear energy blockages
  • Increase your personal energy, and reduce its loss
  • Clear negative energy from yourself, loved ones, homes, and businesses
  • Purify and energize food and water
  • Release cellular memory and accelerate the clearing of your karma
  • Assist wandering souls on their journey home
  • More accurately utilize truth discernment techniques–intuition, muscle testing, and pendulums–to access information directly from the field of all knowledge

OUR TRANSITION TO THE 5TH DIMENSION 

image

Right NOW we are experiencing a “shift of the Ages”, as was foreseen by the ancients, we are indeed in the dawning of the Age of Aquarius and the Earth and humanity are experiencing a vital transference shift from a third to a fifth dimensional frequency. This shift was and has been referred to as the ‘Time of no Time’. We are currently in the transition period of the fourth dimension which creates the illusion of being stuck in a time warp as Earth goes through a rapid shift in time and space. Throughout this transition our planet and humanity will continue to experience radical changes within their frequency, corresponding alchemical makeup and consciousness. We will enter the fifth dimension in 2013. At which time the world that we know will continue to go through radical changes so we can live in this new dimension already beginning to manifest within our reality. We are entering into a whole new way of being.
At this time of rapid Earth and human evolution, 
humanity is opening to and embracing the empowering and transformational energies of Transference Healing®, a modality that has come through to support our ascension into the new fifth dimensional world.

SOURCE: http://www.transferencehealing.com/channellings/index/821/6/channellings/our-transition-to-the-5th-dimension

Saturday, October 13, 2012

Virtual ID Cards. Facial Recognition. Fingerprinting. Retinal Identity Scan.

a very interesting pdf.
UN E-Government Readiness Program- survey 2012
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan048065.pdf

........

Bridging India’s identity divide with a number


Enrolment of a child for an unique identity number in DelhiThe unique number promises India's first unimpeachable proof of identity for its residents

Related Stories

On a boiling afternoon in the city of Surat in Gujarat state, men and women are rolling into a cavernous hall in the local municipality building to sign up for India's most ambitious plan to give a definitive identity to millions of residents.
It takes all of 10 minutes for each person to have their details keyed into a laptop before they are photographed on a webcam and their fingerprints and iris are scanned in what is also the world's biggest biometric identity exercise.
Since it launched two years ago, 200 million Indians have already signed up to India's "unique identity" (UID) scheme.
By 2014, another 400 million people are expected to enrol to get a 12-digit unique identification number - also called Aadhaar or foundation - fulfilling the scheme's mandate to cover about half of India's people. The Economist magazine calls it an "astonishing outcome" in a country which struggles to meet its most fundamental challenges.
"I have no idea of how this will help me. I have heard that it will do us some good," says Neruben, a municipal sweeper, who is waiting for her turn in the municipality hall, which once served as a Mughal inn.
Faceless existence
Neruben earns 12,000 rupees ($218) a month and has a bank account, a voters' identity card and a Permanent Account Number (PAN) card from income tax authorities which helps in opening bank accounts and filing tax returns. Most Indians are not as fortunate as her.

In pictures: Who am I?

Pictures
Millions are bereft of what identity scheme chiefNandan Nilekani calls "any form of acknowledged existence", which essentially ends up depriving them of their rights and pushes them into a faceless existence.
Many have no birth certificates or school certificates. About 58% of the children born in India are registered at birth, according to Unicef. Of those who are registered, not all have birth certificates.
In one of the world's fastest growing economies, some 40% of people living in villages don't have bank accounts, the number rising to three-fifths of people living in the east and north-east of India. (It is another matter that more than 40% of India's earners have no savings.) One of the main reasons why they don't have a bank account is that they have no definitive proof of who they are.
Also, identity - when available - is fickle and dubious.
There are more than a dozen documents that are variously accepted as proof of identity - a'ration card' that enables the poor to buy cheap food and cooking fuel, a voters card which enables people to cast their ballots, a driving licence and a PAN card are only some of them.
But most of these can be obtained in a thriving black market by using fake documents and paying a hefty bribe - a ration card can be purchased for up to 60,000 rupees ($1,095), and in some slums in Mumbai I visited recently, residents openly spoke about "buying" PAN cards for 600 rupees ($11), 10 times the official rate, through agents.
Identity is also not easily movable in India.
'Cycle of documentation'
Papers that people have in villages are often of no value when they move to cities in a country which is witnessing migration on a scale never seen before. So every time a villager travels to a city to work, he is faced with the problem of securing new identification, often by paying bribes.
Sonu Yusuf SheikhSonu Yusuf Sheikh has no job because he does not have proof of ID
There is also what project head Nandan Nilekani calls the chokehold of the "cycle of documentation" on people. "To get a driver's licence you need a ration card, to get a ration card you need a birth certificate [and so on]," he says.
The unique identity number aims to equip people with one unimpeachable, portable national identity aimed at helping the poor to access state welfare, open bank accounts and protect them from rampant police harassment. It promises to slash corruption in India's multi-billion dollar rural jobs guarantee scheme by paying salaries through bank accounts linked to the identity number. It will also help pay pensions and salaries, as well as enabling people to obtain cooking gas and mobile phone connections.
Financial inclusion, say enthusiasts for the scheme, is one of the major ways the identity number can change India.
When the majority of people living in India's 60,000 villages have their identity number, they will be able to open bank accounts and access their money without trudging for miles to reach the nearest branch and lose out on a day's wages. (More than 80,000 commercial bank branches across India cater to only 5% of the villages.) Bank representatives - usually local people - will keep some money and use nifty mobile micro-automated teller machines to make instant small deposits and withdrawals.
But biometric identity is a contentious issue all over the world, and the unique number has also raised a number of thorny questions.
Is it an invasion of privacy? Eminent economist Jean Dreze has called it a "national security project in the garb of a social policy initiative". Will the identity database be more reliable than the existing lists of beneficiaries for welfare schemes for the poor? Don't bet on it, says Dr Dreze.
The overwhelming concern is over the danger of restricting civil liberties by creating what one critic of the scheme has called the "infrastructure of authoritarianism".
Last year a parliamentary panel echoed similar sentiments about access and misuse of personal information, surveillance, profiling and securing of confidential information by the government. Authorities insist that there are enough safeguards to ensure the data is secure and protected.
'Something good'
The real problem may be that some have begun believing that the number can be used to track down wrong-doers.
A fisherman holds an identity card in MumbaiIdentity is usually not portable in India
"Why can't we use this database to detect criminals? It would be good if we could do so," Anilbhai Biscuitwala, a senior businessman in Surat from the Hindu nationalist BJP party, told me.

.........


Why India's identity scheme is groundbreaking


A woman getting enrolled in a UID booth in SuratIndia is building the world's largest biometric database

Related Stories

In an audacious technological mission, India is building a near foolproof database of personal biometric identities for nearly a billion people, something that has never been attempted anywhere in the world. 
Poorer Indians who have no proof to offer of their existence will leapfrog into a national online system, another global first, where their identities can be validated anytime anywhere in a few seconds.
"India will outdo the world's biggest biometric databases including those of the Federal Bureau of Investigation and the US-VISIT visa programme," says Nandan Nilekani, the technology tycoon who heads the programme popularly called by its acronym UIDAI.
The United States' visa programme is a biometric database of 120 million.
In comparison, the UIDAI has already registered 200 million members, less than two years after the first enrolment. 
By 2014 half of India's population will have an identity tagged to a random, unique 12-digit number. 
Radical ideas
As more and more Indians have their fingerprints taken, irises scanned and photographs clicked, UIDAI's chief technology architect Pramod Varma describes the database structure as a "Google-meets-Facebook" scale out.
UIDAI Network operation centre in BangaloreThe information is stored in a fortress like data centre in Bangalore
With its internet-class open source backbone, the database will accommodate more than 12 billion fingerprints, 2.4 billion iris scans and 1.2 billion photographs. 
Even more groundbreaking, once established and stored, a person's identity can easily be verified and authenticated using a cell phone, smart phone, tablet or any other device hooked to the internet.
The information is stored in a fortress-like data centre in Bangalore with a triple layer of security, and travels in highly encrypted packets.
Many of the radical ideas for UIDAI's technology have come from the talent the project has drawn from the Indian diaspora - tech entrepreneurs like Bala Parthasarathy of HP-acquired photo service, Snapfish and Silicon Valley returnees like Srikanth Nadhamuni, formerly with Intel.
Mr Nilekani himself co-founded and built the multi-billion dollar outsourcing company Infosys before being drafted by the government to head the project.
The programme has studied global best practices in biometric identity databases.
Unlike the United States' social security number, which is guessable and China's, which adds the date of birth, India's 12-digit identity number is randomly generated.
The United States' visa database does not factor in iris scans while India has included them to provide a greater degree of accuracy. 
India's telecom revolution leapfrogged over several stages of technology in the past decade-and-a-half to great success. Similarly, the massive UIDAI will vault over older technologies. 
"By starting on a clean slate and reconfiguring the structure, we have opened up a whole new set of possibilities," says Mr Nilekani. 
The project will stay abreast of the latest in biometrics, cloud computing and connectivity.
Woman in Mysore having fingerprint checked by gas man for ID number in pilot projectPilot projects using the unique number have begun in parts of India
Costs though have been kept low, first, by adopting an open policy in selecting devices and software and encouraging multiple private vendors.
Second, the project is technology-neutral, not locking in to any particular hardware or software.
If the technology architecture is unique, so is its accuracy in validating identities.
"The combination of 10-finger biometrics, two-iris scans and photograph establishes the identity of a person with over 99.5% accuracy," says Krishnakumar Natarajan, CEO of Bangalore-based tech outsourcing firm MindTree, which is one of the firms building applications for the project.  
The best of the biometric databases in the world have a single de-duplication check, to ensure that every person is identified and tagged only once.
Real challenge
UIDAI will de-duplicate three times over, accuracy that is vital in a country which has had a massive population migration in the past decade and welfare programmes that now total $60bn in value, says Ashok Dalwai, deputy director general of UIDAI.
"A lack of identity has become the divide in India, denying needy Indians access to welfare programmes," Mr Dalwai says.
In a country where billions of dollars in welfare get siphoned off by middlemen using fake identities, the programme will "stem leakage and fraud", he adds. 
The real challenge for the project, however, will be in the applications built around the unique identities.
A slew of pilots are currently testing the robustness of the system.
In a trial in Tumkur near Bangalore, Indians armed with a new unique identity number are opening bank accounts electronically.
In the northern Jharkhand state, the government is electronically dispensing payments under an employment guarantee scheme directly into the recipients' bank accounts, which were opened after acquiring an identity number. 
A UID enrolment booth in SuratThe project is technology-neutral, not locking in to any particular hardware or software.
In another pilot in the same region, people are authenticating themselves on a simple device connected to the network and withdrawing money from their new bank accounts.
In the future, every outlet with such a device can potentially serve as a cash-dispensing "micro ATM".
In the coming years, UIDAI holds the promise of being a game changer.
With a unique identity, previously anonymous poor Indians can have access to services such as bank accounts, mobile connections and driving licences.

source:  http://www.bbc.co.uk/news/world-asia-india-18156858

............

National 'virtual ID card' scheme set for launch (Is there anything that could possibly go wrong?)

Central online identity scheme 'will be a target for criminals'
The Government will announce details this month of a controversial national identity scheme which will allow people to use their mobile phones and social media profiles as official identification documents for accessing public services.

People wishing to apply for services ranging from tax credits to fishing licences and passports will be asked to choose from a list of familiar online log-ins, including those they already use on social media sites, banks, and large retailers such as supermarkets, to prove their identity.

Once they have logged in correctly by computer or mobile phone, the site will send a message to the government agency authenticating that user’s identity.

The Cabinet Office is understood to have held discussions with the Post Office, high street banks, mobile phone companies and technology giants ranging from Facebook and Microsoft to Google, PayPal and BT.

Ministers are anxious that the identity programme is not denounced as a “Big Brother” national ID card by the back door, which is why data will not be kept centrally by any government department. Indeed, it is hoped the Identity Assurance Programme, which is being led by the Cabinet Office, will mean the end to any prospect of a physical national ID card being introduced in the UK.

The identification systems used by the private companies have been subjected to security testing before being awarded their “Identity Provider” (IDP) kitemark, meaning that they have made the list of between five and 20 approved organisations that will be announced on 22 October.

The public will be able to use their log-ins from a set list of “trusted” private organisations to access Government services, which are being grouped together on a single website called Gov.uk, which will be accessible by mobile.

A cross-section of social media companies, high street banks, mobile phone businesses and major retailers has been chosen in order to appeal to as wide a demographic as possible.

The system will be trialled when the Department of Work & Pensions starts the early roll out of the Universal Credit scheme, a radical overhaul of the benefits system, in April.

Users who access the Government’s online one-stop-shop of public services will be asked to identify themselves by choosing one organisation from a selection of logos. (This feature is called a “Nascar screen”, in reference to the logo-filled livery of the famous American racing cars.)

Major web sites are able to recognise individuals by their patterns of use, the device they are accessing from and its location. Facebook, for example, asks users who sign on from an unusual location to take a series of security questions including identifying friends in photographs.

Privacy campaigners are not wholly convinced by the programme. “Although this is a fine scheme in principle and is backed by ministers the danger is that it could be side-lined and used as a fig leaf by the data-hungry government departments,” said Guy Herbert, general secretary of No2ID, which has been consulted by the Cabinet Office.

Details of the “identity assurance” scheme are being finalised amid growing concerns over identity theft and other forms of cybercrime. Foreign Secretary William Hague and Cabinet Office minister Francis Maude, who is at the head of the Identity Assurance Programme, will today (Thurs) meet international experts at the Budapest Conference on Cyberspace. Mr Maude will give a keynote speech.

The Cabinet Office believes its new identity model will “prevent ‘login fatigue’ [from] having too many usernames and passwords” and save public money by increasing trust in online services. The system is likely to be adopted by local authorities nationwide. The Government hopes the identity system will form the basis of a universally-recognised online authentication process for commercial transactions on the Internet, boosting the economy and strengthening Britain’s position as a leader in e-commerce.

In recent weeks, the Cabinet Office’s Government Digital Service has backed a UK working group of the Open Identity Exchange, which was set up in America to bring organisations including Google, AOL, PayPal and Experian together to find a simple method of online verification that doesn’t require multiple passwords.

Members of the Cabinet Office team travelled to the White House in May to exchange ideas with American counterparts working on the National Strategy for Trusted Identities in Cyberspace (NSTIC). The heads of the British and American identity assurance programmes will debate the subject next week in London at the RSA cyber security conference.

The first law passed by the Coalition Government was to scrap the national ID scheme, a move said to have saved taxpayers £1 billion over ten years. But ministers want to use the Internet to cut the cost of public services.

In order to limit concerns over Government snooping, the Cabinet Office has been working closely with a range of privacy campaign groups and consumer organisations including No2ID, Big Brother Watch and Which? The programme’s Privacy and Consumer Group drew up a list of nine Privacy Principles which underpin the framework of the scheme.

As part of the attempt to reassure privacy campaigners, a private identity partner (IDP) which authorises a user of a public service will not know which Government department is seeking authentication.

The Post Office’s involvement in the Identity Assurance Programmes was revealed by a notice placed in the Official Journal of the European Union. The Royal Mail subsidiary sought a third party provider to help in assembling consumer data including name, date of birth, address, gender, passport and driving licence numbers, financial history, electoral roll status and telephone numbers.
Some commercial organisations have been concerned that their consumers will react negatively to their involvement with government. But commercial partners will benefit from marketing opportunities and the trust that comes with IDP status.

Without the identity assurance scheme there are fears that high levels of online fraud will cause the public to lose confidence in digital channels, undermining the amount of business done online.

Civil servants acknowledge that some people will still wish to access public services in person. They argue that the online scheme will release additional resources to assist people who lack confidence in making digital transactions.

Q&A: What the scheme involves
Q. Is this just an ID card scheme by the back door?
A. No, it's a way of combating the menace of identity theft.
Q. Will the Government be able to use it to follow our movements online?
A. Authentication is done by trusted third parties and data will not be held centrally by the Government.
Q. But won't the private companies find out personal information that is none of their business?
A. The identity providers (IdPs) don't know for which government agency they are authenticating.
Q. Is a social media log-in sufficiently secure for a major financial transaction?
A. Individual IdPs will need to convince the Cabinet Office that their security checks are enough to meet the Level of Assurance (LOA) needed for the public service being requested. For example, a passport application is a high-security LOA3.
Q. Will it be possible to apply for a passport on your phone?
A. It is anticipated that part of the process will be offered online but some physical ID will still need to be presented in person to achieve LOA3.
Q. Is this just about public services?
A. No, the Government is helping to bring together online companies and create an icon that would enable online payments to be done securely.
Q. What would be the advantages?
A. It would also reduce the need to memorise multiple passwords.
Q. Will it work?
A. That depends partly on the efficiency of the chosen IdPs.