Thursday, December 10, 2009

DARPA Testing Intelligence Gathering Tools on Public

Zachary T Baker- 12/09/2009

A once scarcely known government agency known as the Defense Advanced Research Projects Agency or DARPA hosted the DARPA Network Challenge on Saturday to mark the 40th anniversary of their creation, the Internet. DARPA boast that the competition will “explore the roles the Internet and social networking play in the timely communication, wide-area team-building, and urgent mobilization required to solve broad-scope, time-critical problems.” (1)

Forty thousand dollars was offered to the first group to successfully locate ten large red weather balloons hidden in a list of secret locations across the United States.(2) Massachusetts Institute of Technology created their own website whereby the financially struggling public participating in the contest could be paid $2,000 cash for giving them all the balloon locations. To no one’s surprise Team MIT ended up winning first place.

The purpose of the contest was to see whether or not civilians could be paid for producing solid intelligence and how effective DARPA monitored social networking sites could be used for intelligence gathering purposes when fully operational.

DARPA admits that the purpose of the contest was to “see whether social networking sites like Facebook and Twitter should be seen as credible sources of information." (3)

So was this wonderfully fascistic event a success?

Regina Dugan, the director of DARPA said, "DARPA salutes the MIT team for successfully completing this complex task less than nine hours after the balloon launch."

Well let me assure you folks that the government, DARPA in particular considers everything on Facebook, Twitter, e-mails and phone calls as credible sources of information. In fact, most of the information goes into a database stored at the Information Awareness Office, a sub agency of DARPA whose symbol was originally a pyramid with an eye watching the planet. The office name has recently changed to the less threatening Information Processing Techniques Office and the symbol was quickly dropped once the public became cognizant of their existence.

IAO Vision: The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define. IAO plans to develop technology that will allow understanding of the intent of these networks, their plans, and potentially define opportunities for disrupting or eliminating the threats. To effectively and efficiently carry this out, we must promote sharing, collaborating and reasoning to convert nebulous data to knowledge and actionable options. IAO will accomplish this by pursuing the development of technologies, components, and applications to produce a proto-type system.

Examples: collaboration and sharing over TCP/IP networks across agency boundaries, real time learning, pattern matching and anomalous pattern detection, foreign language machine translation and speech recognition, biometric signatures of humans, entity extraction from natural language text, human network analysis and behavior model building engines, event prediction and capability development model building engines, change detection, and truth maintenance, biologically inspired algorithms for agent control, other aids for human cognition and human reasoning. (4)

Any bank transactions, credit card transactions, medical records, plane tickets, educational transcripts, utility bills and any other transactions dealing with communication, transportation, education housing, travel, medical, veterinary, financial transaction go through DARPA.(5)

For those who are unaware that the social network website Facebook was adapted into DARPA’s official information collecting hubs after being created by college students. Check out the link below to learn how Facebook was funded by companies setup by the CIA and filtered by the Department of Defense.(6)

An event held by DARPA in 2007 dubbed the Urban Challenge seemed eerily similar to the contest on Saturday. According to DARPA’s website the event required teams to “build an autonomous vehicle capable of driving in traffic, performing complex maneuvers such as merging, passing, parking and negotiating intersections.”(7)

Many scholarly institutions including MIT participated in the event. The event was the first time an autonomous vehicle interacted with both manned and unmanned vehicle traffic in an urban environment. Much like its drone aircraft counterpart, an unmanned drone humvee with combat capability is the right type of technology any scientific dictatorship would need in order to create a perfect prison planet.

A New World Order may indeed prevail if our federal government continues to take away our firearms, our ammunition, our privacy, our wealth, our health, our children and any other liberty that allows us to remain independent and free. These traitors to humanity expect the people to continue funding the research and development of their Nazi style control mechanisms that without a doubt will totally enslave every last one us.

International corporations operating inside the United States who wrap their product or service inside the American flag and profit off the seizure of this republic shall be considered a threat to US sovereignty. This warning pertains to every drone aircraft, biometric scanning device, data mining software, weather modification contract, surveillance device, disinformation network, re-education camp, concentration camp and private mercenary that is produced by the military industrial complex.










Photos on Flicker:




No comments: