Skip to content or view screen version

The New World Order and a Network of Spies.

Ken Craggs | 05.10.2009 12:58 | World

The European Union Institute for Security Studies (EUISS) is an autonomous research body created in 2001 that comes under the European Union's second pillar - the Common Foreign and Security Policy (CFSP). Its main objectives are to promote a European security culture and influence the strategic debate.

 http://kencraggs.blogspot.com/2009/10/new-world-order-and-network-of-spies.html

A EUISS document published in July 2007 entitled Building the future: the EU’s Contribution to Global Governance, suggests (p146) that “the next frontier in the future’s improvement process is global governance. Global challenges and opportunities call for concerted action….This paper foresees that a global ‘constitutional moment’ may appear at the beginning of the 2010s.”

Another EUISS document (July 2009), What Ambitions for European Defence 2020 covers long term EU security strategy, including the problems of "hierarchical class society", with the "elite" of the world on one side, and the rest of the world on the other. To avoid "global systemic collapse", the document suggests that the "full spectrum of high intensity combat" be used to protect what is called "globalisers" from "localisers". The paper elaborates on "barrier operations shielding the global rich from the tensions and problems of the poor". It states that "as the ratio of the world population living in misery and frustration will remain massive, the tensions and spillover between their world and that of the rich will continue to grow. As we are unlikely to have solved this problem at its root by 2020 - i.e. by curing dysfunctional societies, we will need to strengthen our barriers. It is a morally distasteful, losing strategy, but will be unavoidable if we cannot solve the problems at their root."

In an effort to help cure dysfunctional societies, the EU has initiated Project INDECT, a so-called ‘intelligent information system supporting observation, searching and detection for security of citizens in urban environment’. According to the official website, the main expected results of INDECT include:

• construction of agents assigned to continuous and automatic monitoring of public resources such as: web sites, discussion forums, UseNet groups, file servers, p2p networks as well as individual computer systems.

• construction of a search engine for fast detection of persons and documents based on watermarking technology and utilising comprehensive research on watermarking technology used for semantic search.

• construction of a family of prototypes of devices used for mobile object tracking.

• implementation of a distributed computer system that is capable of acquisition, storage and effective sharing on demand of the data as well as intelligent processing.”

The EU document Internet of Things (IoT) states that:

“Simply leaving the development of IoT to the private sector, and possibly to other world regions is not a sensible option in view of the deep societal changes that IoT will bring about. Many of these changes will have to be addressed by European policy-makers and public authorities……”

“IoT covers different modes of communication: things-to-person communication and thing-to-thing communications, including Machine-to-Machine (M2M) communication that potentially concerns 50-70 billion ‘machines’, of which only 1% are connected today. These connections can be established in restricted areas (‘intranet of things’) or made publicly accessible (‘Internet of things’).”

“The Commission recently adopted a Recommendation that provides guidelines on how to operate RFID applications in compliance with privacy and data protection principles; in 2010 it intends to publish a broader Communication on privacy and trust in the ubiquitous information society.”

“Eurostat will start publishing in December 2009 statistics on the use of RFID technologies. Monitoring the introduction of IoT related technologies will provide information on their degree of penetration and allow the assessment of their impact on the economy and the society as well as the effectiveness of the related Community policies. IoT is not yet a tangible reality, but rather a prospective vision of a number of technologies that, combined together, could in the coming 5 to 15 years drastically modify the way our societies function.” Such technologies may include computer screens or other display screens that simultaneously take pictures while showing images. Thousands of microscopic image sensors are inserted between the liquid crystal display cells in the screen. Each sensor captures its own small image, but software stitches these together to create a single, larger picture. See also The next steps: Internet Governance.

In July 2001 the European Parliament reported on the existence of a global system for the interception of private and commercial communications (ECHELON). The report states that “there can now be no doubt that the purpose of the system [ECHELON] is to intercept, at the very least, private and commercial communications, and not military communications.”

Section 7.4 of the same report states: "To sum up, it can therefore be said that the current legal position is that in principle an ECHELON type intelligence system is not in breach of Union law [lawful interception] because it does not concern the aspects of Union law that would be required for there to be incompatibility. However, this applies only where the system is actually used exclusively for the purposes of state security in the broad sense. On the other hand, were it to be used for other purposes and for industrial espionage directed against foreign firms, this would constitute an infringement of EC law. Were a Member State to be involved in such action, it would be in breach of Community law."

Almost all countries have lawful interception (LI) capabilities and have implemented them using global requirements and standards developed by the European Telecommunications Standards Institute ETSI. The ETSI is currently attempting to produce all encompassing global LI standards. The Global Lawful Interception Industry Forum lists many of the legal requirements relating to lawful interception of communications in different countries, as does the Council of Europe secretariat. For example, in the United Kingdom the LI law is known as RIPA (Regulation of Investigatory Powers Act). If the data is not obtained in real-time, the activity is referred to as access to retained data (RD).

Europe continues to maintain global leadership in the interception and retention of data courtesy of the Data Retention Directive. The Directive applies to almost all public electronic communications and the information must be made available to law enforcement agencies and government departments upon lawful request. The Directive is being emulated in many other countries.

A New World Order that can spy on everyone will also be aided by technologies from the EU funded URUS project and related projects such as the Network Robot Forum. These projects are designing a network of robots that interact with human beings and the environment for tasks of assistance, transportation of goods, and surveillance in urban areas. URUS describes surveillance as an experimental objective, with the main objectives being the development of an adaptable cognitive network of robots which integrate the following functions:

a. Cooperative localisation and navigation.
b. Cooperative environment perception.
c. Cooperative map building and updating.
d. Human robot interaction.
e. Multi-task negotiation.
f. Wireless communication with hand held devices, ubiquitous sensors, and other robots.

Robot technology will undoubtedly assist Intelligence and Security Services including the Trusted Borders Consortium that comprises Raytheon Systems, QinetiQ, Accenture, Capgemini, Detica, Daon, Serco, and Steria.

Raytheon, in addition to other things, has a central role in further developing and maintaining ECHELON.

QinetiQ (pronounced Kinetic) is an international defence and security technology company.

Accenture is responsible for training end users of the system and helping to measure the overall business benefits of the e-Borders programme. Accenture is a global management consulting, technology services and outsourcing company with experience working with border and identity management agencies around the world.

Capgemini is responsible for the development of business architecture including the design of business processes, organisation structure and primary data flows.

Detica specialises in collecting, managing and exploiting information to reveal actionable intelligence. Detica is a leading UK information intelligence specialist, working extensively in this area for commercial, law enforcement and national security clients.

Daon (pronounced day-on) is an international biometrics and identity assurance software company.

Serco is a leading international service company which specialises in providing operational, management and consulting expertise to the UK and other governments. Serco already provides the Mycroft intelligence management system to the UK Borders and Immigration Agency.

Steria is a major European IT services provider with extensive experience of European border management systems, through programmes such as the Schengen Information System (SISII).

 http://kencraggs.blogspot.com/2009/10/new-world-order-and-network-of-spies.html

Ken Craggs

Comments

Display the following 2 comments

  1. Mistaken Identity — Danny
  2. Blue Sky Thinking — Sky Net