“By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:
Section1. General Principles. Openness in government strengthens our democracy, promotes the delivery of efficient and effective services to the public, and contributes to economic growth. As one vital benefit of open government, making information resources easy to find, accessible, and usable can fuel entrepreneurship, innovation, and scientific discovery that improves Americans’ lives and contributes significantly to job creation.”
The U.S. Government already has already made some information readily available such as weather data from the Global Position System. Thanks to this we can predict weather patterns, issue warnings and use location based applications. Other data resources such as health, medicine, education, public safety and other areas have experienced growth thanks to the free machine-readable information data posted on Data.gov. The government wants to continue to promote both job and economic growth so they have devised a plan to ensure that not only data is released but that it is made easily accessible to the public. In the world where we find much of our information out by clinging to the news or online sources hoping we can catch a glimpse into the world of the U.S. Government it’s refreshing for them to acknowledge our need for information and give us something to grow on and really get us going.
This search engine is a great option if you value your privacy above all else. The team behind DuckDuckGo believes in better search functions without tracking its users. Its features include “goodies” (special search queries such as calculations and programming), browser extensions and perhaps most of all, peace of mind.
Instead of searching the web for answers to your questions, Wolfram|Alpha conducts dynamic computations based on built-in data, algorithms and other methods. The search engine's goal is to build on existing knowledge and become a single, reliable source for definitive answers.
When Facebook doesn't cut it for finding people, Ark comes in handy. As an alternative to Graph Search, you can search through more than 1 billion people based on filters such as location, college and employment. If you just moved to a new city, Ark comes in handy to find others with similar interests.
Taiwan uses free widespread Wi-Fi to lure tourists
Taiwan is making it easy for foreign tourists to stay connected.
The government recently announced that international travelers to the country will be able to access free Wi-Fi at 4,400 hotspots at indoor public spaces throughout the country. By showing a passport, tourists can open an account on the 1Mbps iTaiwan Wi-Fi network that’s found at major tourist spots, transportation hubs, cultural establishments, and government offices, covering much of the island nation.
“The Taiwan Tourism Bureau and the Research, Development, and Evaluation Commission are working to provide the utmost convenience for foreign visitors and eliminate any communications problems they may encounter. This new service will considerably brighten Taiwan’s already shining image for quality travel services,” said the Taiwan Tourism Bureau in a statement.
The iTaiwan program isn’t new. The government started it in 2011, with free Wi-Fi in 3,000 indoor public areas throughout the country. But until now it was only available for citizens.
Last year, Taiwan grew the number of foreign tourists by 20 percent with a record 7.3 million who helped the tourism industry generate $11 billion.
AMYGOODMAN: William Binney, can you respond to the director of national intelligence, James Clapper? And then I want to ask Glenn to do the same.
WILLIAMBINNEY: Sure. In my mind, that’s a red herring. I mean, it’s just a false issue. The point was, the terrorists have already known that we’ve been doing this for years, so there’s no surprise there. They’re not going to change the way they operate just because it comes out in the U.S. press. I mean, the point is, they already knew it, and they were operating the way they would operate anyway. So, the point is that they’re—we’re not—the government here is not trying to protect it from the terrorists; it’s trying to protect it, that knowledge of that program, from the citizens of the United States. That’s where I see it.
U.S. agencies did not find Headley or warn foreign counterparts about him in the first half of 2009 while he conducted surveillance in Denmark and India and met and communicated with ISI officers and known Lashkar and al-Qaida leaders.
In an exclusive interview carried out from a secret location in the city, the former Central Intelligence Agency analyst also made explosive claims that the US government had been hacking into computers in Hong Kong and on the mainland for years.
The government would like to shift the conversation to accuse other people of wrongdoing, when it is their own wrongdoing that should be discussed and examined before the American people. David Colapinto, a lawyer who has represented a number of whistleblowers
When the federal government went looking for phone numbers tied to terrorists, it grabbed the records of just about everyone in America. Why every phone number? “Well, you have to start someplace,” Director of National Intelligence James Clapper told NBC News on Monday. (J. Scott Applewhite / Associated Press / June 12, 2013)
According to Snowden, the NSA has engaged in more than 61,000 hacking operations worldwide, including hundreds aimed at Chinese targets. Among the targets were universities, businesses and public officials.
Snowden's allegations appear to give weight to claims by some Chinese government officials that the country has been a victim of similar hacking efforts coming from the United States.
With some honorable exceptions, their primary function is protecting the interests of the political and corporate establishments, often by finding some novel and tendentious way to legitimate their self-interested actions.
Within this framework, scandal is best understood as a disruption of the natural, sacred order, which is restored by ritual exposure, condemnation, punishment, and cleansing. Conceptually, the essence of scandal is that things are not as they seem, or as they should be – that supposedly “high” things are actually “low”, that righteous things are corrupt, honourable things dishonorable – and that all must be made right again.
The techno-social revolution that we are living through spurred by the Internet, social media and cleverly designed, inconspicuous platforms are inviting us to throw away our personal privacy. This revolution is driven by a combination of commercial competition between the Information Age commerical giants and encouraged by governments desperate to deliver us to the ‘promised land' of safety and security. The question is – whose safety, whose security?
A poll conducted by the Pew Research Center over the four days immediately after the news first broke found that just 41 percent of Americans deemed it unacceptable that the National Security Agency “has been getting secret court orders to track telephone calls of millions of Americans to investigate terrorism.”
“Existing laws do not seem to have kept up with the threat to privacy and other rights posed by the government’s relatively new capacity to collect and analyze quickly vast quantities of personal information,” said Kenneth Roth, executive director at Human Rights Watch.
While the Ed Snowden story getting all the attention, another story came and went never got enough attention when it first came out, but perhaps this older story is more relevant now than when it first came out. It's the story of “Main Corp,” which was first written by Christopher Ketchum of Radar Magazine. The roots of this program go back to the 1980's. Ketchum wrote:
According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect.
Tom Bearden has been advising the public about Scalar-based weather-warfare for over 20 years, and he was well aware of this SoD quotation long before NaturalNews just recently picked it up. Here is his 1997 early warning.
(NaturalNews) The development of so-called “weather weapons” has been dismissed by many as paranoid hyperbole, the work of science fiction movie script writers and conspiracy theorists, but the fact is they have existed, at least in the laboratory, for decades.
None other than former U.S. Defense Secretary William Cohen, in fact, has talked about the development of weather-related weaponry – or, more specifically, techniques to create weather events to support offensive military operations. During a question-and-answer session at the Conference on Terrorism, Weapons of Mass Destruction, and U.S. Strategy at the Georgia Center in Athens, Ga., in 1997, Cohen addressed them: