Reply
Results 1 to 6 of 6
  1. #1
    Registered User chicagopizzaboy's Avatar
    Join Date: Mar 2023
    Age: 54
    Posts: 2,295
    Rep Power: 19495
    chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000)
    chicagopizzaboy is offline

    EU Passes Digital ID Which Will Be Voluntary, Until It Isn't-Soon Required to Use Web

    The key thing to remember is they dilute opposition by saying it will be VOLUNTARY.Then they use the COVID vaccine playbook.

    Sure, if you want to have a bank account, get your tax refund, collect unemployment, social security, get medical care, or log on to the Internet to watch online porn that your wife will see on your centralized statement. Forums like this will be dead with your true identity behind every comment. You will be doxing yourself. The Internet will be deemed "critical infrastructure."

    Biometric face-mapping like in China will be standard, and is already required by TSA to avoid standing in long lines. First voluntary. Then you have no choice. Then face recognition cameras can pull you out of the crowd anytime night or day. If you, for example, share "misinformation" that Ashley Biden's diary is real. Oh wait.

    Voluntary. YeaRight.jpg Fool you once, shame on them.

    Of course if you don't have your latest boosters, or whatever they want to do with your body at the moment, they just shut the central ID off, so it doesn't work with anything. CNN says you are a public health menace.

    Besides they need billions of guinea pigs for all the medical experiments the elites have planned, for extending their lives to 200 years. Only the billionaire .001% will be able to afford it. Many experiments are bound to go horribly wrong.

    Stop this chit now check in at Stop Digital ID https://stopdigitalid.info/ (only search engine Yandex.com will bring it up lol)


    Verizon website
    https://www.verizon.com/business/res...ge-businesses/



    https://sociable.co/government-and-p...dia-mandating/



    Will the EU follow India’s example once the digital identity wallets are launched?


    The European Union parliament says that the digital identity wallet will be voluntary, which is what India said about its own digital ID scheme before government agencies began mandating it for certain services.

    On February 29, the EU parliament adopted an updated regulation to the digital identity wallet, which European lawmakers assured would be used on a voluntary basis.

    According to a EU press release, “The EU wallet will be used on a voluntary basis” while the “Updating the European digital identity framework” briefing adds that “The wallet is voluntary and free of charge for individuals, while businesses may incur costs. It does not replace existing identification and authentication means but complements them.”

    However, with digital identity, they can say it’s voluntary, but without it, you might not be able to access goods and services, such as opening a bank account or collecting benefits, as was the case in India.

    India’s digital identity scheme, Aadhaar, is a prime example of how the goal posts can shift over time.

    “Enrolment for Aadhaar is entirely voluntary,” reads a government press release from December, 2013.

    However, that same year Forbes India reported, “Aadhaar was always voluntary. But over the last year, more and more states and government agencies were making its use mandatory for a host of services, from buying cooking gas to registering marriages and renting houses.”

    Then in 2017, Reuters reported that between January and March, 2017, “Various ministries make Aadhaar mandatory for welfare, pension, and employment schemes. Aadhaar made mandatory for filing of income tax returns. Aadhaar holders crosses 1.14 billion.”

    That same year, the Reserve Bank of India clarified that Aadhaar linking with bank accounts was mandatory, and if you visit the Aadhaar website in the “myth-busters” section, it will say, “It is mandatory to submit Aadhaar number to the banking service provider” for those wishing to receive certain benefits or subsidies.

    In May of 2022, Business Today described how ubiquitous India’s digital identity scheme had become, stating, “Aadhaar has emerged as the national identity and a treated as a preferred/ mandatory identity proof for avail services such as obtaining a SIM card, hospitalization, opening a bank account or availing government subsidies and benefits of various government-run welfare schemes, even for the COVID-19 vaccination.”

    For more than a decade, the story of Aadhaar has been filled with government overreach and courtroom battles to overturn said overreach.

    Today, India’s digital identity has reached virtually its entire population — 1.4 billion people who “volunteered” to sign up for the scheme.

    Will the EU follow India’s example once the digital identity wallets are launched?

    The EU press release cited earlier says that “During negotiations, MEPs secured provisions to safeguard citizens’ rights and foster an inclusive digital system by avoiding discrimination against people opting not to use the digital wallet.”
    https://web.archive.org/web/20230106...ccess-by-2027/

    The Defense Department has finally laid out its plan for protecting its cyber networks after years of pledging to make it a commitment.

    The Office of the Chief Information Officer released “The DoD Zero Trust Strategy” in November — which laid out metrics and deadlines for the department to achieve full zero trust adoption by 2027. Cybersecurity experts said the government and private sector should work together to leverage resources to successfully enter the new regime.

    “Cyber physical [b[threats to critical infrastructure[/b] really are one of our biggest national security challenges that we’re facing today, and that the landscape that we’re dealing with has gotten more complex,” Nitin Natarajan, deputy director at the Cybersecurity and Infrastructure Security Agency, said during a MeriTalk event in October.

    Cyber attackers have more resources than they have in the past, and it’s less expensive to do a lot of damage to an unsecure system, he said. It’s not just lone wolf hackers, but nation states and cyber terrorists who can pose a threat....


    Netherlands MP Rob Roos, this is a "top down" thing nobody asked for.


    What the US will look like with centralized digital ID and facial recognition





    "TSA kicks off facial recognition trial in Las Vegas airport"
    https://www.nextgov.com/cybersecurit...irport/210963/


    “Any package, pallet or container can now be equipped with a sensor, transmitter or radio frequency identification (RFID) tag that allows a company to track where it is as it moves through the supply chain—how it is performing, how it is being used, and so on….In the near future, similar monitoring systems will also be applied to the movement and tracking of people.” -- The Fourth Industrial Revolution, Klaus Schwab, the founder of the World Economic Forum,

    CBDC tied to centralized digital ID will be the biggest Trojan Horse in history | Prof. Richard Werner



    https://www.gatesfoundation.org/idea...tal-id-systems


    Gates on the need for digital certificates


    Centralized digital ID and CBDC: the wet dream of tyrants


    Last edited by chicagopizzaboy; 05-16-2024 at 12:54 PM.
    Who is J6 "Scaffold Commander," the key to the J6 Fedsurrection? https://rumble.com/v45y4z6-why-is-the-king-pin-of-j6-scaffold-commander-not-wanted-nor-identified-by-t.html
    Reply With Quote

  2. #2
    Registered User chicagopizzaboy's Avatar
    Join Date: Mar 2023
    Age: 54
    Posts: 2,295
    Rep Power: 19495
    chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000)
    chicagopizzaboy is offline
    This article is scrubbed from Internet, only on Wayback Machine.

    https://web.archive.org/web/20230106...ccess-by-2027/

    The Pentagon Creates Road Map For ‘Zero Trust’ Internet Access By 2027

    (U.S. Air Force photo by Airman 1st Class Scott Warner)
    POSTED BY: MEREDITH ROATEN VIA NATIONAL DEFENSE JANUARY 6, 2023

    TN has examined this topic in detail several times. Ultimately, the only people who will be able to hop on the Internet, regardless of the entry point (5G, 6G, fiber optic, private of public WiFi) will first have to be definitively identified. This will require a personal, registered ID comparable to an electronic passport. No digital ID? You don’t use the Internet. Got ID? Every activity is tracked, catalogued and saved. The military is paving the way for this. ⁃ TN Editor


    The Defense Department has finally laid out its plan for protecting its cyber networks after years of pledging to make it a commitment.

    The Office of the Chief Information Officer released “The DoD Zero Trust Strategy” in November — which laid out metrics and deadlines for the department to achieve full zero trust adoption by 2027. Cybersecurity experts said the government and private sector should work together to leverage resources to successfully enter the new regime.

    “Cyber physical threats to critical infrastructure really are one of our biggest national security challenges that we’re facing today, and that the landscape that we’re dealing with has gotten more complex,” Nitin Natarajan, deputy director at the Cybersecurity and Infrastructure Security Agency, said during a MeriTalk event in October.

    Cyber attackers have more resources than they have in the past, and it’s less expensive to do a lot of damage to an unsecure system, he said. It’s not just lone wolf hackers, but nation states and cyber terrorists who can pose a threat.

    For example, the 2019 SolarWinds cyber attack, which swept past the defenses of thousands of organizations, including the federal government, has been linked to Russia-backed operatives.

    The new strategy’s basic tenet is that treating organizations’ security like a moat around a castle doesn’t keep out bad actors.

    “Mission and system owners, as well as operators, increasingly embrace this view as fact. They also see the journey to [zero trust] as an opportunity to affect positively the mission by addressing technology modernizations, refining security processes and improving operational performance,” the document said.

    Zero trust culture requires every person within a network to assume that it is already compromised and requires all users to prove their identities at all times.

    The strategy lists technologies that can help cultivate a zero trust environment such as continuous multi-factor authentication, micro-segmentation, advanced encryption, endpoint security, analytics and robust auditing.

    While these various technologies can be used to implement this basic premise, it essentially means that “users are granted access to only the data they need and when needed.”

    The strategy revolves around four pillars: accepting the culture of zero trust, operationalizing zero trust practices, accelerating zero trust technology and department-wide integration. The strategy notes that while IT departments across the Pentagon may need to purchase products, there is no one capability that can solve all their problems.

    “While the objectives prescribe ‘what’ shall be done in furtherance of the goal, they do not prescribe ‘how,’ as DoD Components may need to undertake objectives in differing ways,” the strategy read.

    For the technology pillar, the Pentagon’s zero trust strategy calls for capabilities to be pushed out faster while reducing silos. Capabilities that promote simpler architecture and efficient data management are also important, according to the document.

    While many methods can be used to authenticate users, the integration pillar calls for creating an acquisition plan for technologies that can be scaled department-wide by early fiscal year 2023.

    One technology development already underway is the Thunderdome, a $6.8 million contract awarded to Booz Allen Hamilton earlier this year. The technology would protect access to the Secure Internet Protocol Router Network, the Pentagon’s classified information transmitter, according to a Defense Information Systems Agency press release.

    It won’t be possible to completely retrofit every legacy platform with technology such as multi-factor authentication, the strategy points out. However, the services can implement safeguards for these less modern systems in the interim.

    The securing information systems pillar will also require automating artificial intelligence operations and securing communications at all levels.

    Automating systems is an important part of zero trust, said Andy Stewart, senior federal strategist at digital communications company Cisco Systems and a former director at Fleet Cyber Command/U.S. Tenth Fleet. If the processes behind zero trust don’t work well, people can struggle to use the technology and adopt the zero trust mindset.

    “Zero trust is about raising the security, but it also means, ‘How do I operate more efficiently?’” he said. “The user experience should get a vote.”

    While the strategy marks a turning point for the effort, the Pentagon started down the road of zero trust years ago. Its 2019 Digital Modernization Strategy mentioned that zero trust was an emerging initiative concept it was “exploring.”

    Accepting more rigorous cybersecurity measures through the zero trust mindset is something the Marine Corps has been working on through education and raising awareness, said Renata Spinks, assistant director and deputy chief information officer of information, command, control, communications and computers and acting senior information security officer.

    “We spend a lot of time educating, because if people know what they’re doing and why they’re doing it … it has been my experience that they will get on board a whole lot sooner than resisting,” she said

    The 2021 zero trust mandate from President Joe Biden’s administration was “a godsend” because it gave justification for personnel inside the Marine Corps who may not have understood the necessity of some of the IT initiatives, she said.

    A successful zero trust implementation will reduce threats to some of the most critical types of capabilities that warfighters will be relying on in the future: cloud, artificial intelligence and command, control, communications, computer and intelligence.

    The military needs the help of defense contractors to protect sensitive data, Spinks noted. Industry can help the military’s IT personnel understand how to work with the type of data that they will be providing and to how much the military will need access.

    “Zero trust will not be zero trust successfully if we don’t get help in managing identities,” she said.

    The Marine Corps recently hired a service data officer who could use input from contractors about how much access the military will need to figure out the best ways to classify and manage the service’s data, she noted.

    Having access to secure data anywhere will help military members and personnel in the defense industrial base who are working outside of business hours and in remote locations, according to the Pentagon’s strategy.

    The push for zero trust is different from some cybersecurity initiatives because it has muscle behind it, Spinks added. Leadership has provided policies and procedures and are willing to be held accountable, she said.

    “Cybersecurity is not an inexpensive venture. But I think what truly drives it is the vicious adversary and all of the activity across not just the federal government, but even at the state and local levels,” she said.

    Better cybersecurity practices will also be needed to secure supply chains, Natarajan noted. Making them more resilient, especially in critical technologies such as semiconductors, has been a focus at the Pentagon in recent years.

    “We know that this is being used by malicious cyber actors really to exploit a lot of third party risk after going after an organization’s supply chain,” he said.

    That’s another reason why the government can’t work alone, he added.

    “As we look at this, we’re looking at this not just from a sector perspective but also looking at this from national critical functions,” he said.

    CISA released cybersecurity performance goals for companies to measure themselves in October. Though the performance goals don’t cite zero trust specifically, the goals are intended for companies to use regardless of their size.

    “We’re really looking at these to be that minimum baseline of cyber protections that will reduce the rest of critical infrastructure operators,” he said. “But at the end of the day, by doing that we’re also impacting national security and the health and safety of Americans throughout the nation.”

    The private sector in turn needs the government’s investment in education and resources to build up its cyber workforce.

    “Cyberspace involves not just the hardware and software, the technology, your tablets, your iPhones, your technology, but it involves people. People developed cyberspace. People use cyberspace. We are in cyberspace,” Kemba Walden, principal deputy director of the National Cyber Director’s Office, said during the MeriTalk event.

    Not yet at full operating capacity, the National Cyber Director’s Office was established in 2021 to take the lead on cyber issues at the federal level, including the first national cybersecurity strategy.

    Just as important as the broad strategy will be the national workforce and education document that will be released after the cybersecurity strategy, Walden said.

    “We took a look and recognized that 700,000 or so U.S. jobs with the word cyber in it are left unfilled,” she said. That number comes from market research firm Lightcast’s 2022 report based on 2021 data.

    “As a national cyber and national security lawyer, that frightens me,” she said. “That is a national security risk from my perspective.”

    In recent years, organizations such as Joint Cyber Defense Collaborative and the National Security Association’s Cybersecurity Collaboration Center have sprung up to gauge the needs and collect feedback from large enterprises, she said.

    “Those are the types of collaborative efforts that I think are necessary in order to evolve public-private collaboration and information sharing overall,” she said.

    Ultimately, the benefits of zero trust trickle down to the warfighter, according to the document.

    For example, the Pentagon’s joint all-domain command and control effort — which aims to link sensors and shooters while using artificial intelligence to make decisions — relies on that data being secure. If it falls into the wrong hands, military leaders can’t achieve information dominance, the strategy notes.

    “We need to make certain that when malicious actors attempt to breach our zero trust defenses; they can no longer roam freely through our networks and threaten our ability to deliver maximum support to the warfighter,” Chief Information Officer John Sherman said in the strategy.
    Who is J6 "Scaffold Commander," the key to the J6 Fedsurrection? https://rumble.com/v45y4z6-why-is-the-king-pin-of-j6-scaffold-commander-not-wanted-nor-identified-by-t.html
    Reply With Quote

  3. #3
    High Value Poster OPGenesis's Avatar
    Join Date: Mar 2015
    Posts: 26,532
    Rep Power: 303054
    OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000) OPGenesis has a reputation beyond repute. Second best rank possible! (+100000)
    OPGenesis is online now

    Talking

    You’re so wrapped up in your conspiracies that you end up having conversations with yourself in your threads nobody replies to lmao.
    "I am a rational animal who occupies the intermediary position between angel and beast"

    "The upper class is afforded their position by the collective burden the underclass must carry for them"


    **Summer Walker Crew**
    Reply With Quote

  4. #4
    Darth Beer icetrauma's Avatar
    Join Date: Mar 2006
    Posts: 16,614
    Rep Power: 124926
    icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000) icetrauma has a reputation beyond repute. Second best rank possible! (+100000)
    icetrauma is offline
    It'll never happen here because you will need computers to do it and according to Hochul, certain members of our population do not even know what a computer is and I thought getting an ID was racist or is it racist for only getting a voter id?
    Official Supp. Misc Beer Crew

    There's a taste of fear
    When the henchmen call
    Iron fist to tame them
    Iron fist to claim it all
    Reply With Quote

  5. #5
    Registered User chicagopizzaboy's Avatar
    Join Date: Mar 2023
    Age: 54
    Posts: 2,295
    Rep Power: 19495
    chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000)
    chicagopizzaboy is offline
    Originally Posted by OPGenesis View Post
    You’re so wrapped up in your conspiracies that you end up having conversations with yourself in your threads nobody replies to lmao.
    Remarkable. That wasn't even a minute in response time. Do you mass murder accessories work these handles in shifts?

    Is Klaus Schwab and his billionaires telling you flat out what they want to do a conspiracy?

    “Any package, pallet or container can now be equipped with a sensor, transmitter or radio frequency identification (RFID) tag that allows a company to track where it is as it moves through the supply chain—how it is performing, how it is being used, and so on….In the near future, similar monitoring systems will also be applied to the movement and tracking of people.” -- The Fourth Industrial Revolution, Klaus Schwab, the founder of the World Economic Forum,
    Last edited by chicagopizzaboy; 05-16-2024 at 12:53 PM.
    Who is J6 "Scaffold Commander," the key to the J6 Fedsurrection? https://rumble.com/v45y4z6-why-is-the-king-pin-of-j6-scaffold-commander-not-wanted-nor-identified-by-t.html
    Reply With Quote

  6. #6
    Registered User chicagopizzaboy's Avatar
    Join Date: Mar 2023
    Age: 54
    Posts: 2,295
    Rep Power: 19495
    chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000) chicagopizzaboy is a splendid one to behold. (+10000)
    chicagopizzaboy is offline
    Originally Posted by icetrauma View Post
    It'll never happen here because you will need computers to do it and according to Hochul, certain members of our population do not even know what a computer is and I thought getting an ID was racist or is it racist for only getting a voter id?
    You don't need a computer. Just a QR code, which they will give you free. Then this banker says it will be a chip about the size of a grain of rice that goes into your right hand. Sweden is already doing it.



    “Any package, pallet or container can now be equipped with a sensor, transmitter or radio frequency identification (RFID) tag that allows a company to track where it is as it moves through the supply chain—how it is performing, how it is being used, and so on….In the near future, similar monitoring systems will also be applied to the movement and tracking of people.” - Klaus Schwab, The Fourth Industrial Revolution
    https://www.defenseone.com/technolog...ection/163497/

    Why are pandemics so hard to stop? Often it’s because the disease moves faster than people can be tested for it. The Defense Department is helping to fund a new study to determine whether an under-the-skin biosensor can help trackers keep up — by detecting flu-like infections even before their symptoms begin to show. Its maker, Profusa, says the sensor is on track to try for FDA approval by early next year.

    The sensor has two parts. One is a 3mm string of hydrogel, a material whose network of polymer chains is used in some contact lenses and other implants. Inserted under the skin with a syringe, the string includes a specially engineered molecule that sends a fluorescent signal outside of the body when the body begins to fight an infection. The other part is an electronic component attached to the skin. It sends light through the skin, detects the fluorescent signal and generates another signal that the wearer can send to a doctor, website, etc. It’s like a blood lab on the skin that can pick up the body’s response to illness before the presence of other symptoms, like coughing.
    Who is J6 "Scaffold Commander," the key to the J6 Fedsurrection? https://rumble.com/v45y4z6-why-is-the-king-pin-of-j6-scaffold-commander-not-wanted-nor-identified-by-t.html
    Reply With Quote

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts