The nation waits
Slowly it goes to the substance. The lines have been drawn and somewhat hardened. Formerly pale candidates have received an almost human face.
The question remains: What is going on with Rainer?
stand on the plus side, certainly the confused statements of recent days, but can this really all have been? Or does the Master Plan on about in secret? So slowly the time passes.
is clear: If nothing more happens kann die Revolte von ´68 als gescheitert gelten.
Monday, January 24, 2011
Thursday, January 20, 2011
How To Beat The Puzzle On Collapse
police state 2.0
NOTE:
Aufgrund des großen Interesses an meinem Research Paper zu Projekt INDECT habe ich nun folgende kurze Einführung zu diesem Thema verfasst. Das vollständige Research Paper findet man weiterhin hier:
Überwachungsstaat 2.0
This has to be involved in the project can be certain: they seem really hard to work on their research and to strive for results to be. With the possible consequences of their research they deal appears to be but little. At the 27th " Chaos Communication Congress " such as steel, an employee of INDECT from Poland [3] - as he said himself - a young lady who was giving a lecture on INDECT the show. Why he came up with this idea, I'm not quite clear, for he is cryptographer in INDECT and was in no way capable of relating to ethical, social or political issues enter into the project, although in this paper was indeed all about, not about technical details. He only commented, should policy discussions with the EU Commission and not done with him. This proposal is understandable in itself, certainly, the problem is just that so far seem not even members of parliament and other politicians serious information from the EU Commission regarding INDECT get, let alone journalists or "simple" citizens.
project INDECT - Discovering the European Security Research Programme
NOTE:
Aufgrund des großen Interesses an meinem Research Paper zu Projekt INDECT habe ich nun folgende kurze Einführung zu diesem Thema verfasst. Das vollständige Research Paper findet man weiterhin hier:
Überwachungsstaat 2.0
Eine kurze Einführung zu Projekt INDECT
und der Sicherheitsindustrie im allgemeinen
von Domingo Conte
Das Geschäft mit Überwachungstechnologien und Data-mining ist in den letzten 10 Jahren rasant angewachsen und wächst immer noch konstant weiter. Nicht nur in den USA sondern auch in der EU wird intensiv an neuen Technologien und Methoden zur effektiveren Überwachung der Bürger geforscht. But the already existing data from the flood which is over 4 million surveillance cameras in London has long since become unmanageable, but the data collection and monitoring of governments not to be delusional. This feature is especially logistical problems, because all possible data about all sorts of people have one thing that all of this data analysis is quite different. But even with these problems are being researched intensively.
so financed by the European Union as part of their safety research program since 2009 a research project, which deals specifically so that this continuous growing flood of data under control. The project is called INDECT, which stands for "Intelligent information system to support surveillance, search and discovery for the safety of citizens in urban environments . This research project will run for a period of 5 years and is to be completed by the end of 2013. Participants include several companies from the security and multimedia industry, police and various European universities . First test runs of the project are planned for 2012 European Football Championship 2012 in Poland.
goal of the project is eine Sicherheitsarchitektur zu entwerfen, die sämtliche bestehenden Überwachungs-technologien logisch miteinander verknüpft, in Echtzeit auswertet und verwaltet - und das alles soll vollautomatisch durch intelligente Computersysteme erfolgen. Die dazu verwendeten Datenquellen sind u.a. Videoüberwachung, Vorratsdatenspeicherung, Telekommunikation, Gesichtserkennung, Websites, Diskussionsforen, Usenet-Gruppen, Datenserver, P2P-Netzwerke sowie individuelle Computersysteme und alle vorhandenen Datenbanken wie Namen, Adressen, biometrische Daten, Interneteinträge, polizeiliche, geheimdienstliche, militärische, forensische und zivile Datenbanken, Daten von luft- und seegestützte Plattformen und Satelliten usw. Und als wären that's not enough sources for monitoring is in addition also researched in dozens of other projects in various new surveillance technologies: Beginning of autonomous, with video and audio systems equipped drones, to technologies for the early identification of illegal substances such as explosives or drugs. Finally, all available databases to be only INDECT linked intelligently to be able to then search automatically in real time for dangerous situations or security risks and evaluate. This will start with situations such as: Man steals woman's purse on the street and being filmed by surveillance cameras - INDECT the system detects it and reports it and the local police department. But that's not enough. With INDECT you want to go much further:
is another goal of INDECT about it to recognize abnormalities or abnormal behavior automatically, at an early stage with the eventual aim of dangerous situations and criminal activity - that before anything happened - identify and report where appropriate to the responsible security officer. That we want to be, for example, a person's identity, which becomes suspicious about by extremist posts in a forum, with the help of call data can be determined. If the suspect is identified, it could then be observed by surveillance cameras and drones on. And all that basically automatically, without human intervention. But this is just another of many possible scenarios, such INDECT could be used.
The operator of the project, especially the "Polish Platform for Homeland Security" stress, INDECT is a purely scientific project and target is nothing more than the production of functional prototypes. This may be true also for the present research project. However, the evidence is increasing that man sich bereits jetzt auch damit beschäftigt, wie man die Endresultate schlussendlich kommerzialisieren kann. Dies verwundert nicht sehr, in Anbetracht der hohen Kosten für Projekt INDECT: Offiziell beläuft sich das Budget für INDECT auf knapp €15 Millionen. 10 Millionen davon werden von der EU, also aus Steuergeldern, finanziert, der Rest von den verschiedenen Unternehmen und Organisation die in das Projekt involviert sind.
Manche mögen einwenden, dass das Budget des Projektes doch gar nicht so hoch wäre, doch darf man dabei einerseits nicht außer acht lassen, dass INDECT nur eines von vielen Projekten im europäischen Sicherheitsforschungsprogramm , and many of the needed for INDECT or there deployable technologies developed within these other projects. (Only in the areas of risk analysis and risk estimate "," Biometrics and Identification "and" detection and monitoring "the EU projects funded with over € 200 million.) On the other hand, we should not forget that it is only available from INDECT itself is the development of a purely software-based technology for networking of all control, monitoring and information systems. Other technologies required for the project are already available now: So you INDECT for example, appears in working with the operators of a the largest supercomputers in the EU's interest - the GALERA system at the Technical University of Gdansk in Poland. [1]
Furthermore, the real level of funding of INDECT is not all that perfectly clear. It was recently announced as being operated as part of project INDECT at least yet another, separate project called INSIGMA, but where are the funds for it, has not been clarified, as apart from the fact that this project of several INDECT parties were publicly mentioned and also on the website a quick note INDECT [2] has been published to, otherwise only very little information available to INSIGMA. However, it seems this project is also to go to the development of audio and video surveillance. And probably will still tweaking on other projects.
UPDATE: Meanwhile, further details of project INSIGMA been published, see:
INSIGMA project and other research projects as part of INDECT
UPDATE: Meanwhile, further details of project INSIGMA been published, see:
INSIGMA project and other research projects as part of INDECT
This has to be involved in the project can be certain: they seem really hard to work on their research and to strive for results to be. With the possible consequences of their research they deal appears to be but little. At the 27th " Chaos Communication Congress " such as steel, an employee of INDECT from Poland [3] - as he said himself - a young lady who was giving a lecture on INDECT the show. Why he came up with this idea, I'm not quite clear, for he is cryptographer in INDECT and was in no way capable of relating to ethical, social or political issues enter into the project, although in this paper was indeed all about, not about technical details. He only commented, should policy discussions with the EU Commission and not done with him. This proposal is understandable in itself, certainly, the problem is just that so far seem not even members of parliament and other politicians serious information from the EU Commission regarding INDECT get, let alone journalists or "simple" citizens.
This INDECT employees increased in any case patiently for about half an hour, taking questions from the audience (or those to avoid), all in all hat der gute Mann allerdings gar nicht sonderlich viel gesagt, auch wenn er viel geredet hat. Was nach dieser halben Stunde aber recht klar war, war seine Einstellung bezüglich seiner eigenen Verantwortung als Wissenschaftler: Ihm schien die Idee, selbst Verantwortung für mögliche negative Konsequenzen seiner Forschungsarbeiten zu übernehmen recht fremd zu sein. Er ist ja nur Wissenschaftler - der forscht und sich nicht darum kümmert, was mit seinen Forschungsresultaten irgendwann geschehen könnte... Der mehrfach gestellten Frage, was die Endziele dies Projektes wären, wich er dann auch immer wieder mehr oder weniger geschickt aus. Er erwähnte, dass die irische Polizei besonders scharf auf Drohnen sei und dass man INDECT auch im Kampf gegen Kinderpornografie gut einsetzen könne. Über kommerzielle Ziele des Projektes weiß er nichts.
Sein Kollege Mikołaj Leszczuk , der ebenfalls in Polen an INDECT forscht, war in einem Radiointerview [4] diesbezüglich nicht so zurückhaltend. Er meinte ganz klar, dass man ihre Forschungsarbeiten an INDECT, sobald diese funktionstüchtig sind, auch kommerzialisieren würde und dass sie mit möglichen Interessenten auf jeden Fall kooperieren würden. Auf mögliche Gefahren von Missbrauch dieser Technologien angesprochen meinte it just that you can indeed Pixelize the faces on video and so then no one can follow his own wife abuse with INDECT.
's what most of the technical scientists of INDECT only a harmless project is research, but could eventually become a very dangerous weapon. Of course they do not tinker with conventional weapons such as bombs or guns - they are from the Western states in general so used primarily to defend the external security. Technologies such as INDECT but, if they are operational again, especially in defense of the homeland security use . See These technologies are implemented only once, completely new possibilities for the comprehensive monitoring. Movies like " The No.1 " or " Minority Report " or Orwell's book 1984 then perhaps lose some of their flavor of science fiction and nice words such as "presumption of innocence" could be very soon from our Vocabulary disappear and be replaced by words such as "general suspicion" or "Pre crime prevention".
If these technologies, the from projects such as INDECT result, once ready, it's only a matter of time before we begin, this will be also implemented in all sorts of places. First in public urban areas such as subways, train stations, airports, etc., and if they prove to be effective there, the implementation in an urban environment will be extended further and further. The process will be the same as in the CCTV surveillance cameras, which have spread in recent years more and more in the cities of the EU, so they now have in the city, a modern city are.
Since the present Time is still unclear who will ultimately be the end customer for technologies such as INDECT, there are a number of potential risks that lie behind such technologies. Especially since the whole project has purely conceptual look at the European and German data protection law and constitutional law in contradiction. Even if INDECT and similar technologies only by police and military are used, the risk of abuse is probably much higher than the supposed benefit in terms of improved security for the citizens. But the probability is high that these technologies are eventually sold to various other places - From the secret services of private security to paramilitary organizations. The potential risks would still be far higher. Certainly, only that the taxpayer funded research on technology for its own supervision and at some point companies will make any profit so much. And we will be then monitored over the country. Whether the population will benefit from these security measures as much benefit as the security industry is another question.
about the value and usefulness of such security research programs can be discussed much. There is etwa ethische Bedenken: Will wirklich jeder ständig und überall überwacht werden, nur um dadurch vielleicht, vielleicht auch nicht, etwas sicherer zu sein? Es gibt soziale Bedenken: Wie wird sich das gesellschaftliche Leben verändern, wenn wir alle wissen, das wir ständig von intelligenten Computersystemen überwacht werden, welche uns permanent nach abnormem oder auffälligem Verhalten abscannen. Oder auch politische Bedenken: Was wird aus mehr oder weniger demokratischen Ländern, wenn das Volk von einigen Wenigen permanent überwacht werden kann und keiner diese Überwacher überwacht.
Aber auch die USA arbeiten an ganz ähnlichen Projekten wie INDECT. Allein die Defense Advanced Research Projects Agency (DARPA) hat mehrere Forschungsprogramme auf diesem Gebiet. CTS oder Combat Zones That See [5] beispielsweise ist ein Projekt mit dem Ziel, in bestimmten abgegrenzten Gebieten wie Frontlinien oder auch in Städten, nach eigenen Angaben, „alles was sich bewegt zu verfolgen.“ Dies wollen sie mit Hilfe eines massiven Überwachungskamera-Netzwerkes erreichen welches mit einem Computer-system mit künstlicher Intelligenz verbunden ist und jede Bewegung identifizieren und verfolgen kann. Auch das Video Image Retrieval and Analysis Tool (Virat) Program [6] that the Information Processing Technology Office (IPTO ) of the DARPA funded with $ 20 million, aims to similar technologies such as those of INDECT. The aim of the program to develop a database containing large amounts of video stores and one can quickly search by using intelligent software agents on the desired video content. Mind's Eye [7] ist noch ein weiteres Projekt der DARPA zur intelligenten Video-Analyse mittels künstlicher Intelligenz.
Sicherheit und Sicherheitsforschung ist also nicht nur in der EU ein großes Thema, sondern auch in den USA beispielsweise. Und das nicht erst seit 9/11. Doch seit 2001 ist ein regelrechter Sicherheitswahn in der westlichen Welt ausgebrochen. Nachdem der Kalte Krieg vorbei war und der kommunistische bzw. sozialistische Feind verschwand – der, wie uns gesagt wurde, unser aller Leben bedrohte – haben wir nun eine new threat, a new enemy: the Islamic international terrorism. And we are told that we were in great danger of being blown up all at any time by a suicide bomber or a dirty bomb in the air. Each neighbor, even the blonde, blue-eyed who likes people to listen to music could be a sleeper to be trained at any Al-Qaida -terror camp in Pakistan to terrorists, and now sits in his basement and is working on a much larger massacre as 9 / 11 . We are all blown up in acute danger of mistaken fanatics unworkable in the air. That is why we need more security and all these security programs, and therefore must still tighter security measures ago.
Only because of the few people in our society, completely out of hand - as murderers, rapists or child molesters - it is difficult to explain to the population that each individual's permanent and all his Security must be managed, and that this technology such as INDECT must be developed. In Germany there are, for example, about 1,000 murders a year, and that's why 80 million people are always and everywhere be monitored? This is not particularly convincing.
Man braucht also einen besseren, einen eindrucksvolleren Grund, um die Bevölkerung davon zu überzeugen, dass sie – zu ihrer eigenen Sicherheit – immer besser überwacht werden muss. Und was für ein Grund wäre da geeigneter als internationaler islamistischer Terrorismus mit Schläfern in jeder Ecke die nur darauf warten, unschuldige Zivilisten wegzusprengen. Damit macht man Sicherheitsprogramme für die Bevölkerung schmackhaft. Mit zum Teil völlig bizarren Horrorgeschichten bringt der Staat die Menschen dazu, aus Angst ganz von selbst nach mehr und mehr Überwachung zu rufen.
Nun einmal angenommen, all diese doch recht dubious Islamist terrorist organizations really exist. Then perhaps you should first explore why these terrorists is so attached to wage war against the Western world and here blow up buildings and people in the air. Is this simply because, as George W. Bush said so beautiful that they are evil and hate our freedoms? More likely than us - you and me - hate is that they hate our governments of the EU and the USA. And for that, have identified some of them very good reasons. To do this, you just take a look at Afghanistan. This country, our respective Governments and their military and private security agencies such as Blackwater or Xe Services in the last decade as much freedom and peace that brought the U.S. - and EU troops should be there constantly reinforced. For in fact there there for ten years of war and the country has disintegrated into chaos and anomie. And by the way contaminated the entire areas in USA for decades with its uranium ammunition with which they infect humans, soil, water and air.
But perhaps hate the Islamic terror groups, our governments, because these people frequently have seen our governments, governments in Islamic and other countries immer gleich zu Sturz brachten, sobald diese es wagten, irgendetwas gegen die US- oder EU-Interessen zu tun. Wie etwa 1953 im Iran der demokratisch gewählte Premierminister Mohammad Mossadegh von CIA und MI6 zu Fall gebracht wurde weil er es sich erlaubte, die iranische Ölindustrie zu verstaatlichen. Damit waren die westlichen Regierungen nicht sonderlich glücklich und installierten dafür nach ihrem Coup d'etat eine Diktatur unter Mohammad-Rezā Shāh Pahlavi welche über 25 Jahre andauerte. Oder vielleicht mögen sie unsere Regierungen nicht, weil diese in ihren Wahnvorstellungen, Weltpolizei spielen zu müssen, sich andauernd in Angelegenheiten anderer Länder einmischen und die Welt als ihre Spielwiese ansehen. So wie beispielsweise die deutsche Regierung davon überzeugt ist, dass ihre Sicherheit mit Truppen am Hindukusch verteidigt werden müsse.
Denkt man kurz etwas ernsthaft über die Frage nach, weshalb Muslime auf die Idee kommen sollten, Terrororganisationen zu gründen und Anschläge in der westlichen Welt zu verüben, so kommt man auch noch auf einige andere Ursachen und Gründe. Die aller meisten dieser Gründe beziehen sich allerdings More on the reluctance of humans to various Western governments and their "commitment" in Muslim countries, and not so much the fact that these terrorists simply hate the people in the western world and their freedom. Our governments would never publicly admit this, but. Because it would create based on the discussions on our security a small dilemma: namely, the state would then develop monitoring projects such as INDECT for our own safety, only to be able to protect ourselves from the threats, which he produced himself (and provoked). In this case, it might make more sense that all the money in safety projects wie INDECT investiert wird, stattdessen für Forschungsprojekte auszugeben welche dabei helfen könnten, das alle Menschen und Nationen dieser Welt etwas friedlicher und sicherer miteinander leben können.
All das setzt natürlich voraus, dass die ganze Geschichte mit der Bedrohung durch internationale islamistische Terrororganisationen überhaupt der Realität entspricht. Es existieren genügend Indizien die berechtigte Zweifel diesbezüglich aufkommen lassen könnten. Jedenfalls gibt es mittlerweile genügend gut fundierte Forschungsarbeiten über alle möglichen Fälle aus unserer nähren Vergangenheit, aus denen deutlich hervorgeht, dass nicht nur die bösen Schurkenstaaten und ihre Diktatoren, sondern auch unsere eigenen europäischen Staaten, und auch die NATO mit ihren Stay-Behind Organisationen [8] mehr als nur gelegentlich in terroristische Aktivitäten verwickelt waren und dies wohl auch immer noch sind. In diesem Zusammenhang ist es z.B. auch recht aufschlussreich, einmal die US-Army Definition von „ Low Intensity Warefare “, einer Taktik welche die USA ja ganz offiziell verfolgen, mit ihrer Definition von „Terrorismus“ im US-Code zu vergleichen. Dabei wird man feststellen, dass fast kein Unterschied zwischen beiden existiert. However, this was noted only in passing. In view of these facts would have to be still very different questions about the usefulness and benefits of security and provide surveillance programs, which are beyond the scope of this article, however.
Domingo Conte, 20. January 2011
____________________________________________________
Sources:
[5] Tether, Tony: "Statement by Dr. Tony Tether (DARPA) to the Senate Armed Services Committee " (March 9, 2005)
[6 ] ars technica: DARPA building search engine for video surveillance footage
[7] NY Times: Computers That See You and Keep Watch Over You (January 1, 2011)
[ 8] On this subject see, for example: Daniele Ganser - NATO's Secret Armies - Operation Gladio and Terrorism in Western Europe (2005)
[For all non-specified sources in relation to project INDECT see project INDECT Research Paper ]
detailed information on INDECT can be found here:
_________________________________
APPENDIX:
My research project to INDECT originally started from a purely personal interest. Over a period of more than a year, I collected all meticulously only to-find information together and studied them. Towards the end of 2010, I came up with the idea of \u200b\u200bwriting a small article on this subject and I thought: maybe this is it somehow and then released again.
The first rough draft of this article, consisting of 3.4 pages but grew quite fast and was becoming more and more detail. When he was finally close to 20 pages long, then I came first doubts. because the paper is now far too long and too technical, it was to publish in newspapers, etc., can, and I was wondering how much it actually makes sense to invest so much time and effort in this paper if, in the end but no one reads or if I would reach only a few people with it.
I was in my work but so late, I decided to make a first, rough draft suitable for publication online. This was on 1/14/2010. And the timing was well chosen any better. to my knowledge - - Already on the following Monday was the first, albeit brief report on INDECT on German television. By this time, a link appeared on my blog on the INDECT article in the German Wikipedia. And on the very day I had my first 600 visitors on this blog, on the fifth day there were already about 1000 - all on my part without any kind of advertising or promotion. All I had done until then was the link to pass on to my blog to a few friends and it to 2.3 other blogs, which had also published short reports on INDECT to post in the comments to it.
any rate, the interest on INDECT to be much larger than I had imagined it would actually meant - what I very pleased. Since many people have so far not ever heard of INDECT, I now decided to write this brief introduction to project INDECT to those who deal only recently with the theme to allow a little insight - given the fact that my research paper on project INDECT quite extensive and sometimes quite technical.
detailed information on INDECT can be found here:
Tuesday, January 18, 2011
Burst Capillaries Eczema
The suffering of young Who was it?
Die neue Staffel ist fantastisch angelaufen, anders kann man das wirklich nicht ausdrücken.
Und ganz nebenbei macht das Dschungelcamp noch etwas, bei dem die Politiker derzeit völlig versagen: Es bringt Menschen zusammen. Es vereint Millionen.
Natürlich nicht unbedingt in freundlicher Weise, eher hasserfüllt, aber immerhin. Galt für den kleinen Mann bis vor kurzem noch das Credo "Stell dich auf einen Spiegel" wenn er auf jemanden herabschauen wollte, reicht heute die Nichtidentifikation mit der toughen Sara.
Rainer Langhans macht ebenfalls eine sehr gute Figur, er positioniert sich quasi schon jetzt als moralischer Boss.
Absolute surprise is the guy who is called Jay. Through his constant attacks on legitimate og Sara he is now a center of unrest, that the work of Rainer adds crucial.
Was Jay at the beginning but very clear, but clearly he has inzwioschen well, not color, but can still win contrast .
Die neue Staffel ist fantastisch angelaufen, anders kann man das wirklich nicht ausdrücken.
Und ganz nebenbei macht das Dschungelcamp noch etwas, bei dem die Politiker derzeit völlig versagen: Es bringt Menschen zusammen. Es vereint Millionen.
Natürlich nicht unbedingt in freundlicher Weise, eher hasserfüllt, aber immerhin. Galt für den kleinen Mann bis vor kurzem noch das Credo "Stell dich auf einen Spiegel" wenn er auf jemanden herabschauen wollte, reicht heute die Nichtidentifikation mit der toughen Sara.
Rainer Langhans macht ebenfalls eine sehr gute Figur, er positioniert sich quasi schon jetzt als moralischer Boss.
Absolute surprise is the guy who is called Jay. Through his constant attacks on legitimate og Sara he is now a center of unrest, that the work of Rainer adds crucial.
Was Jay at the beginning but very clear, but clearly he has inzwioschen well, not color, but can still win contrast .
Saturday, January 15, 2011
Answers To Jerome Shostak Vocabulary Units
observers in the sky
Auf Demonstrationen und anderen politischen Veranstaltungen gibt es in den USA immer wieder mal Menschen, die Mini-Überwachungsdrohnen am Himmel gesehen haben wollen, während andere sagen, es wären nur Libellen oder andere Insekten gewesen. Wer von beiden recht hat, kann ich not say. But what is interesting about this is the fact that in these cases, both at the same time could be right. At least in the not too distant future. For in the research and development of still smaller surveillance drones has happened in the last few years.
Mini-Überwachungsdrohnen oder doch
nur Insekten – oder vielleicht beides?
PDF Version
Auf Demonstrationen und anderen politischen Veranstaltungen gibt es in den USA immer wieder mal Menschen, die Mini-Überwachungsdrohnen am Himmel gesehen haben wollen, während andere sagen, es wären nur Libellen oder andere Insekten gewesen. Wer von beiden recht hat, kann ich not say. But what is interesting about this is the fact that in these cases, both at the same time could be right. At least in the not too distant future. For in the research and development of still smaller surveillance drones has happened in the last few years.
Research on UAVs (unmanned aerial vehicles ) or also called drones, dates back to the Second World War. Tom Ehrhard , a retired Air Force colonel, said in an interview for the Washington Post: " Flying robots by the military since the Second World War II, used but in the last decade, their number and their level of development has increased enormously. " [1]
Today, there are all kinds of UAVs, ranging from those in the size of aircraft such as the Predator or Reaper models that come about in Afghanistan for surveillance and attack purposes used to called MAVs ( micro air vehicle ) which are mostly for intelligence and military intelligence use and its size has been reduced some of them already on a plate, to even smaller Small UAVs (Suave), many of which are still in the developmental phase, and, officially at least, not yet in use. The trend in these mini-threat is very clear so as to develop ever smaller, better camouflaged surveillance drones.
Many of the officially used UAVs are based on the rotor drive principle or on the principle of helicopters or Quadrocopter. The so-called Ornithopter form another class of UAVs. They are based on different variants of the oscillating wing-drive which has already been explored by Leonardo da Vinci just under 500 years. The concept behind the swing-wing drive is to attempt that through the study of birds, dragonflies, flies and other animals function is the movement techniques on mechanical techniques to transferred.
researched early as the 1970s the Office of Research and Development the CIA in gasoline Ornithopter drones which they Insectothopter called and had roughly the size of a dragonfly. In this Laborbedingugen Insectothopter were fit to fly, under natural conditions But apparently they had quite a big problem to control things. In any case, the program was reinstated, as these drones had been checked for side winds too difficult. [2] from gasoline operation is now ready to come, but the research and development of ornithopter ran continuously and had made great progress. There are now free for years on the market, toy Ornithopter different Shapes and sizes. [3] And the development continues. Today there are Ornithopter the size of a fly, and possibly even already have smaller versions. Dr. Robert Wood constructed several years ago at Harvard University mg one airworthy Ornithopter with a wingspan of 3 cm and a weight of 60. [4] students at the Delft University of Technology demonstrated in their DelFly project a flying Ornithopter with built-in camera with a weight of 3 grams [5]
Who among modern surveillance drones, so something in the way imagine how in dem Bild weiter oben mit dem Polizisten und seinem monströsen Quadrocoper, der liegt sehr weit daneben. Die Drohnen, an denen heutzutage gebastelt wird sind so klein wie Fliegen und sehen beispielsweise so aus: [6]
Quelle: delfly.nl und trendbird.co.kr
Bei diesen Ornithopter -Modellen handelt es sich natürlich still prototypes. But intelligence agencies like the CIA's research also, but in secret, in such and similar drones. And how far can they are already well advanced in its development only guess.
As mentioned before, but there has for some years already reports of similar Ornithopter models on events such as demonstrations in the USA will be gone into action [7] what the authorities however, is disputed. is talking about how far you really with the development of such threats, you will by the authorities but not necessarily.
What Alber is now known, the n 's just the helicopters or UAVs with Quadrocopterantrieb, of which various versions have long been in use, and besides the just mentioned Ornithopter technologies, is also stimulating in very different types of UAVs. An ultimate surveillance drones, to be precise. Smart people of Defense Advanced Research Projects Agency (DARPA) thought arises: Why build complicated and a lot of money for ever-smaller mechanical robots that try to simulate the behavior of insects, but if you look like cyborg insects can breed. Small, seemingly harmless creature flying around by remote control and watch so everything can be completely unobtrusive: Cybugs .
this purpose, the DARPA program called Hybrid Insect Micro-Electro-Mechanical Systems (HI-MEMS) before [8] few years, in which in which one operates on a budget of $ 12 million moth cyborgs and the like tinkering. [9] As a first step, they built a " Cyborg Beetle Microsystem " as it was then called. By implanting electrodes in different brain and muscles of a beetle, they could remotely control it soon appeared. [10]
Source: technovelgy.com
Then came the experiment of this research program on moths or on their larvae. Dr. Jack Judy , program manager justifies the HI-MEMS research on the project as follows:
" The animal world has the human For thousands of years served as a means of transportation. For example, we have used horses and elephants for locomotion in wars or trade. Birds were used to send secret messages to recognize and gas in coal mines. ... The HI-MEMS program aims to develop technology that allows to get more control over the movement of insects, be just like saddles and horseshoes needed to control the movement of horses. ... The HI-MEMS program seeks to develop close-knit machine-insect interfaces by planting micro-mechanical systems in the insects while they are still at an early . State of metamorphosis are "
He said further that with the help of these micro-mechanical systems insects can then remotely control a variety of ways: by means of GPS coordinates, radio frequencies, optical or ultrasonic signals. And cheap is this all be ever: "The derived from HI-MEMS technology will enable many robotic capabilities at low cost, with great importance on the development of future autonomous defense systems." [11]
Quelle: technovelgy.com
Rodney Brooks , Direktor des Computer Science and Artificial Intelligence Lab am Massachusetts Institute of Technology (MIT), der ebenfalls am HI-MEMS Programm beteiligt ist, erklärte in einem Artikel der Sunday Times , [12] dass Roboter-Technologien mittlerweile zu den wichtigsten Forschungsgebieten des US Militärs gehören würden, und das die Cyborg-Motten nur eine von einer Anzahl von Technologien wäre, welche bald in Kampfzonen zum Einsatz kommen würde. Hinsichtlich der Motten sagte er: „ Einige Experimente wurden in den letzten paar Jahren durchgeführt, bei denen einfache Tiere wie Ratten oder Küchenschaben per Joystick ferngesteuert wurden, doch dies ist das erste Mal, dass ein Chip bereits im Verpuppungsstadium [der Motte] eingepflanzt wurde und dieser sozusagen innen gewachsen ist. … Sobald die Motte schlüpft wird maschinelles Lernen angewendet um sie zu kontrollieren. “ Brooks ist auch der Ansicht, dass es Zeit wäre, die Genfer Konvention dahingehend abzuändern, dass die Verwendung Such cyborg drones are allowed
source. technovelgy.com
The HI-MEMS researchers hope eventually to use swarms of insects which are all equipped with different sensors such as video cameras, microphones or chemical detectors and can be sent on reconnaissance missions.
As with all the emerging technology of warfare and security, come several inevitable questions. Such as how technologies such as cyber-insects will be affected by the warfare of the future? And as the future standard view on the use of animals for the creation of hybrid animal-cyborg creatures and Bioengineering in general? Will there be common in the future, the governments of all sorts of biological life forms in this way exploit for political and economic goals? And if the governments of these technologies at some point in widely available, have to be that way they have in the context of internal security, so in civilian use? moment we know in any case only that a are unknown such cyborg insects in the laboratories of the DARPA bred and grown under the eyes of scientists to remote-controlled moths
-. Domingo Conte (January 2011)
cyborg moth in an early phase of the experiments
_______________________________
Sources:
[4] MIT Technology Review: Robotic Insect Takes Off (July 19, 2007) and http://micro.seas.harvard.edu/research.html
[5] DelFly micro site
[5] DelFly micro site
[6] image sources: http://www.delfly.nl/? DIII site = & menu = & lang = nl and http://www.trendbird.co.kr/2347
[7] See for example: Washington Post, "Dragonfly or Insect Spy ? Scientists at Work on Robobugs "(October 9, 2007) and The Telegraph:" U.S. accused of making insect spy robots (. 10 Oct 2007)
[7] See for example: Washington Post, "Dragonfly or Insect Spy ? Scientists at Work on Robobugs "(October 9, 2007) and The Telegraph:" U.S. accused of making insect spy robots (. 10 Oct 2007)
[8] Hybrid Insect MEMS (HI-MEMS) or http://www.darpa.mil/mto/solicitations/baa06-22/index.html
[9] Armedforces News: U.S. Military Insect Robot Technology in Progress (15/07/2009)
[9] Armedforces News: U.S. Military Insect Robot Technology in Progress (15/07/2009)
Dental Implant For 2 Front Teeth
External materials about surveillance drones
More Articles & information about surveillance drones
Article:
- LiveScience: Create Insect Cyborgs Implants
- The Sunday Times: Can cyborg moths bring down terrorists?
- DARPA MTO Program: Hybrid Insect MEMS (HI-MEMS)
- FedBizOpps.gov: Hybrid Insect MEMS (HI-MEMS)
- GlobalResaearch: Implanting Microchips into Insects. US Military Develops "Cybug Spies"
- DARPA Defense Sciences Office: Nano Air Vehicle
- ReNaChip Project: Cyborg Moth Gets a New Radio
- Technovelgy.com: HI-MEMS: Cyborg Beetle Microsystem
- Technovelgy.com: HI-MEMS: Control Circuits Embedded In Pupal Stage Successfully
- Telegraph: US accused of making insect spy robots
- International Relations and Security Network: Wasps of War
- Amit Lal, Program Manager DARPAMTO Presentation: Hybrid Insect MEMS Proposer’s Day (PDF)
More Articles & information about surveillance drones
Article:
- LiveScience: Create Insect Cyborgs Implants
- The Sunday Times: Can cyborg moths bring down terrorists?
- DARPA MTO Program: Hybrid Insect MEMS (HI-MEMS)
- FedBizOpps.gov: Hybrid Insect MEMS (HI-MEMS)
- GlobalResaearch: Implanting Microchips into Insects. US Military Develops "Cybug Spies"
- DARPA Defense Sciences Office: Nano Air Vehicle
- ReNaChip Project: Cyborg Moth Gets a New Radio
- Technovelgy.com: HI-MEMS: Cyborg Beetle Microsystem
- Technovelgy.com: HI-MEMS: Control Circuits Embedded In Pupal Stage Successfully
- Telegraph: US accused of making insect spy robots
- International Relations and Security Network: Wasps of War
- Amit Lal, Program Manager DARPAMTO Presentation: Hybrid Insect MEMS Proposer’s Day (PDF)
Do You Have To Wear White To Sorority Initiation
final assembly of a legend
(winter orbit de opted not to report.) After the total breakdown in last year, there is finally rise to power: The Jungle Camp is back.
can in my role as a media educator, I confirm: this Show summarized all warnings about the medium "television" to a high explosive grenade entertainment. Not
last it's up to the Zausel Rainer Langhans, which some of us from the history course high school would still be known. The expected and gratifying humorless reaction of his former companions shows that the man actually has more potential. I for one am pretty excited about the future course.
The other participants are more prominent than really known, a return to past seasons but is: As soon as the first blood injection, awaken the sympathy even for the abgehalftertste Wrack, frei nach dem Motto: Am Ende der Fahnenstange muss man Flagge zeigen.
(winter orbit de opted not to report.) After the total breakdown in last year, there is finally rise to power: The Jungle Camp is back.
can in my role as a media educator, I confirm: this Show summarized all warnings about the medium "television" to a high explosive grenade entertainment. Not
last it's up to the Zausel Rainer Langhans, which some of us from the history course high school would still be known. The expected and gratifying humorless reaction of his former companions shows that the man actually has more potential. I for one am pretty excited about the future course.
The other participants are more prominent than really known, a return to past seasons but is: As soon as the first blood injection, awaken the sympathy even for the abgehalftertste Wrack, frei nach dem Motto: Am Ende der Fahnenstange muss man Flagge zeigen.
Friday, January 14, 2011
The Razor Bladenecklace
The Austrian foreign intelligence: HNA (Military Intelligence Office)
Locations:
command building Hütteldorferstr. 126, 1140 Vienna
Maria Theresia barracks (eh Fasanengarten barracks): At the Pheasant Garden 2, 1130 Vienna
Fixed radio monitoring stations: u.Neulengbach Königswarte (Lower Austria), Kolomannsberg (Upper Austria), Koralpe (in the south of Austria)
Leader: Major General Fritz Weber (since 2003)
official website: No
______________
SOURCES:
[1] http://www.bmlv.gv.at/organisation/standorte/wien.shtml
[2] http://www.bmi.gv.at/cms / bmi_verfassungsschutz
[3] http://www.raw.at/sub/texte/inteam/inteam6/int6_vorwaerts_zu_metternich.htm
[4] http://derstandard.at/2459148
[5] http://www.bmlv.gv.at/journalist/pa_body.php?id=580
[6] # structure http://de.wikipedia.org/wiki/Heeresnachrichtenamt or http://de. wikipedia.org / wiki / Defense Official #
tasks [7] http://www.kripo-online.at/krb/show_art.asp?id=854
[8] http://www.bundesheer.at/truppendienst/ausgaben/artikel.php?id=920
[9] http://de.wikipedia.org/wiki/Heeresnachrichtenamt#Aufgaben
[10] http://www.bmi.gv.at/cms/BMI_OeffentlicheSicherheit/2005/07_08/files/Heeresnachrichtenamt.pdf
[11] http://www.parlament.gv.at/PG/DE/BR/BRSITZ/BRSITZ_00689/fnameorig_113975.html
[12] European Parliament Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system, 2001/2098(INI)), nachzulesen: http://www.scribd.com/doc/21458788/Echelon-Report-English oder: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//DE oder: http://www.heise.de/tp/r4/artikel/1/1683/1.html siehe diesbezüglich auch „ENFOPOL-Papiere“: http://www.heise.de/tp/r4/artikel/6/6326/1.html
[13] http://www.raw.at/texte/inteam/inteam6/int6_vorwaerts_zu_metternich.htm
[14] http://www.parlament.gv.at/PG/DE/XX/A/A_00555/fnameorig_124888.html
siehe auch: http://www.parlament.gv.at/PG/DE/XX/NRSITZ/NRSITZ_00084/fnameorig_114157.html#Seite_120.html
[15] Konrad Becker: The politics of the Infosphere: World-Information.Org, page 96, (read: http://books.google.at/books?id=FZHHkEUvWQcC&pg=PA96-IA1&dq = Military Intelligence + becker & cd = 1 # v = onepage & q & f = false )
[16] http://www.parlament.gv.at/PG/DE/XX/AB/AB_05482/fnameorig_135370.html (Item 4)
[17] http://www.raw.at/texte/inteam/inteam6/int6_vorwaerts_zu_metternich.htm
[18] http://www.heise.de/tp/r4/artikel/ 5/5205/1.html
[19] http://www.acipss.org/intelligence/beitraege/bound_to_cooperate/current_organizations.htm or "Die Presse", 27 December 1999 ("Vienna as a playground for the agents)
[20] http://de.wikipedia.org/wiki/Heeresnachrichtenamt #
structure [21] Konrad Becker: The politics of the Infosphere: World-Information.Org , page 96
[22] http://www.parlament.gv.at/PG/DE/XX/AB/AB_05482/fnameorig_135370.html
[23] http://www.politspiegel.at/? p = 992
see [24]: http://www.parlament.gv.at/PG/DE/XXIV/J/J_03364/fnameorig_169868.html or: http://www.falter.at/ print/F2002_24_1.php
[25] http://www.parlament.gv.at/PG/DE/XX/AB/AB_05482/fnameorig_135370.html
Download "The military intelligence office" in PDF format
signals intelligence system Königswarte District Bruck an der Leitha
Locations:
command building Hütteldorferstr. 126, 1140 Vienna
Maria Theresia barracks (eh Fasanengarten barracks): At the Pheasant Garden 2, 1130 Vienna
Fixed radio monitoring stations: u.Neulengbach Königswarte (Lower Austria), Kolomannsberg (Upper Austria), Koralpe (in the south of Austria)
Leader: Major General Fritz Weber (since 2003)
official website: No
The military intelligence official (Hnaa or HNA) is the foreign intelligence service of the Austrian Armed Forces and under, just like his partner services, the „ Heeres-Abwehramt “ (HAA oder HabwA) genannte (militärische) Inlandsnachrichtendienst, dem Bundesministerium für Landesverteidigung und Sport (BMLVS) [1]. Daneben gibt es noch eine dritte Behörde die sich mit nachrichtendienstlichen Tätigkeiten befasst: das Bundesamt für Verfassungsschutz und Terrorismusbekämpfung (BVT), der zivile Inlandsgeheimdienst der Bundesrepublik welcher dem Bundesministerium für Inneres (BMI) untersteht. [2]
Am 21. Januar 1985 ist der ehemalige Heeresnachrichtendienst durch Verteidigungsminister Friedhelm Frischenschlager im Zuge der Lucona affair been resolved, and it then emerged, both the Army news Agency (HNA - foreign espionage) and the Army Defense official (HAA - domestic spying). The HNA is attributed to the ÖVP, the HAA rather the Social Democrats. [3]
According to the " Standard " was the HNA is to 1991, largely uncontrolled, and since 1991 it referred to in Article 52a of the Federal Constitution under parliamentary oversight, which in turn are more stringent duty of confidentiality is subject to [4]. Parliamentary control is carried out since since 1 Military power law in force in July 2001 (MBG) durch den Rechtsschutzbeauftragten (RSB) beim BMLVS. Der Rechtsschutzbeauftragte hat die Aufgabe, HNA und AbwA auf eventuelle Grundrechtsverletzungen und widerrechtliche Datenverwendung hin zu überprüfen. Am 23. Jänner 2004 erklärte der Verfassungsgerichtshof Teile des neuen Militärbefugnisgesetzes für verfassungswidrig [5], jedoch erhielt der Leiter des Heeresnachrichtenamtes noch im selben Jahr einen eigenen Stab in der Zentralstelle des Verteidigungsministeriums (damals unter der Leitung von Gert-René Polli ), wodurch das HNA keine nachgeordnete Dienststelle des Ministeriums mehr ist. [6]
In einem Artikel von 2005 erwähnte die ehem. Innenministerin Liese Prokop that HNA and 2000, and state protection (BMI) were always strictly separate areas, they would have enjoyed the era streets were close ties. In BAT, the connecting lines are even enshrined in the management. Between 11 and 20 December 2004, interior and defense ministries in the hands of a minister, the ex-policeman from Tyrol, Guenther Platter . [7]
The HNA is the (only) strategic foreign intelligence service in Austria, and therefore part of the "security warning system." The Office obtained information on security policy-relevant regions, countries and organizations. From this information, write experts situational awareness. On the findings, including the Office informed the Department of Defense, the State Department and the Federal Government [8]. The HNA collects information mainly on Austria's eastern neighbors and the Balkans. In this region it is, according to newspaper reports as one of the best informed services in the world. [9]
quote from Major General Fritz Weber (since 2003 Head of the HNA) for the responsibilities of the HNA [10]:
"The Army News Agency is part of the security early warning system of the Republic of Austria and the European Union. His strength and exclusivity are the intelligence information about foreign countries. The Hnaa is responsible for the extensive intelligence information about foreign countries. This implies information across the security spectrum. A separation of information gathering in a military and civilian, the complexity of the modern situation report no longer with international practice. This information will then serve as basis for decisions on the political and military level. [...]While the Federal Agency for State Protection and Counter Terrorism (BVT) in accordance with the Security Police Act domestic-based work, the Army News Agency, the military power of law is followed, foreign-oriented. Knowledge about foreign countries are - specific interest profiles or specific requests for assistance on the part of the Ministry for the Interior -. The department made available "
At a meeting of the Federal Council on 27 June 2002 describes Federal Reinhard Todt (SPÖ Vienna) the powers of the HNA follows: "The Military Intelligence Office, the Defence Office has exactly the same opportunities as the police after security police law. You can find hidden Equip people with false identities. This is the last building blocks of a total surveillance " And even if it on the part of various ÖVP and FPÖ deputy was contradicted in this regard, it was his testimony at the meeting yet, at least indirectly confirmed -. So said ÖVP Federal Dr. Vincenz Liechtenstein later in the meeting "I think it is really necessary - and the 11th September, has shown very specifically - that look to give the police, the military intelligence office has plenty of opportunities, where there can be hazards. If you prevent this, you can wait more than a thank you letter from Mr Bin Laden . " [11]
The report of an investigation commission of the European Parliament in 2001, it is clear also that the HNA and the AbwA also in the ECHELON interception system are integrated and that the interception of foreign communications (incoming and outgoing civilian, military and diplomatic communications) and State communications (military, embassies, etc.) are used. [12]
specific details about the general and specific activities of HNA are rare or absent. However, there is an interesting article in the left newspaper Rosa Antifa Wien "which is received in particular to the general tasks of the military intelligence services in the course of military power law expansions in 2001 [13], and a very insightful application by Mr Rudolf Anschober with entitled " Army intelligence - 12 years sprawl are enough ", which states inter alia:
is "In fact, the current organization of the Army Defense Ministry and the military intelligence and in particular the work of these two services to every citizen of this Country's enigmatic and politically uncontrollable. [...] An effective policy review of the work of the two military intelligence services is not due to the lack of supervisory powers of the competent control sub-committees is currently possible. [...]
(Robert) Elmes said further that the testimony of defense with regard to international recognition and excellent quality are to question the military intelligence office. Some annual reports of the news office is inevitable, namely the suspicion that the copyright must be limited to the Austrian position. [...] (See also APA dated 17/04/1996) are currently von den Heeresnachrichten-diensten pro Jahr nach Schätzungen der Grünen ca. 5.000 Akten mit personenbezogenen Daten bearbeitet. […] Wie der Bundesminister für Landesverteidigung bestätigt, sind bis heute die Aufgaben und Befugnisse der Heeresnachrichtendienste gesetzlich nicht geregelt.“ [14]
Verschiedenen Berichten zufolge war das HNA u.a. involviert in die FPÖ-Spitzelaffäre , in verschiedene Fälle von illegalen Observationen und Abhöraktionen im Inland (oftmals in Verbindung mit dem AbwA und dem BVT), in der Sahara-Geiselnahme 2008, der Christian Waldner Ermordung, dem sogenannten „Hufeisenplan“ während the Yugoslav crisis and the fall Franz Fuchs , with evidence in the last two mentioned the facts most clearly for a direct involvement of the HNA. So the U.S. government thanked in the Kosovo conflict once on the Washington Post for the good performance of the Austrian news services [15]. Due to a recent message is to be discussed here are also short of a detail in the case of Franz Fuchs which have most of the media at that time paid little or no attention. But first to the current message:
early January 2010, the message went through the media that a international team of researchers have
set a new record: they cracked a 758-bit RSA key and needed it - with a network of hundreds of computers - 2.5 years [for more information, for example, " standard "].
And now to the detail in the case of Franz Fuch s: 1996 the magazine " profile " a 15 pages long
encrypted letter of confession of the then-unknown bomber Franz Fuchs . This letter was a RSA 1024-bit key cipher [see for example, "The Power of Mathematics to Protect Data and to Break Data Protection “, p.10] und von den Behörden an
Dechiffrierungsexperten des HNA, des BSI ( Deutsches Bundesamt für Sicherheit in der
Informationstechnik ) der NSA (amerikanische National Security Agency ) und andere Institutionen
Bekennerschreiben entschlüsselt, offenbar unter Beteiligung des mittlerweile verstorbenen deutschen Mathematikers und Kryptologen Hans Dobbertin [siehe „ heise online "or" taz.de "].
About the internal organization structure of the HNA is basically only known that it is divided into seven departments: 1 Guide, 2nd Information, 3 Evaluation, 4 Logistics, 5 Information Technology, 6 Communications Intelligence Service and 7 Operating point [16]. The signals intelligence service or telecommunications Reconnaissance Battalion (FAMB) was in 1994 as part of the Army division "New" included in the HNA. The FAMB is responsible for all the signals intelligence interception by different stations (eg the King waiting in Lower Austria). The headquarters of the FAMB is at the Maria Theresia barracks in Vienna. The so-called Peilkommando is in Neulengbach (the whole region is known as a security and risk zone) [17], further clarification will be entertained and mobile stations. [18]
The budget of the HNA, is exactly like that of the HAA, not included in the defense budget, thus also the ACA in this regard not the full insight. The annual budget is in a 1999 article published in the newspaper the Press "on 40 Mil. € estimated [19]. The number of employees has also been published anywhere and is not even for the Control relevant parliamentary sub-commission reported. suspect, according to a report in the newspaper "Kurier " insiders "that 800 civil servants working for the service [20], in the book" The Politics of infosphere: World-Information.Org "by Konrad Becker is called the figure of around 2,000 employees [21]. The information provided by former Federal Minister of Defence Werner Fasslabend respect to a request (5766 / J) by Mr Madeleine Petrovic in HNA, both soldiers and civil servants, including women and men employed, which the use of groups H1, H2, M BO 1, M Bo 2, M Z O 2, UO / C, M BUO 1, M BUO 2, M ZUO 2, M ZCh, A 1, B, A 2, C, A 3, D, A 4, A 5, VB I / a, VB I / b, VB I / c, belong to VB I / d and V4. Among them are university graduates, particularly in the areas of language and legal [22]. About the recruitment and selection of prospective employees apart from the above-mentioned article in the newspaper Rosa Antifa Wien "little concrete is known, however, is apparently not, as is common with other intelligence agencies, universities recruited [23]. External informants, according to the former Federal Minister of Defence Werner Fasslabend in HNA not employed, however, speak a lot of evidence against this claim [24]. More demands from MPs and other bodies with regard to the Parliament the HNA usually rejected with the following standard formula: " information within the meaning of the question for reasons of secrecy (Article 20 para 3 B - V) or no data protection suitable discussed at a parliamentary question to answer publicly be. " [25]
of Domingo Conte (February 2010)
______________
SOURCES:
[1] http://www.bmlv.gv.at/organisation/standorte/wien.shtml
[2] http://www.bmi.gv.at/cms / bmi_verfassungsschutz
[3] http://www.raw.at/sub/texte/inteam/inteam6/int6_vorwaerts_zu_metternich.htm
[4] http://derstandard.at/2459148
[5] http://www.bmlv.gv.at/journalist/pa_body.php?id=580
[6] # structure http://de.wikipedia.org/wiki/Heeresnachrichtenamt or http://de. wikipedia.org / wiki / Defense Official #
tasks [7] http://www.kripo-online.at/krb/show_art.asp?id=854
[8] http://www.bundesheer.at/truppendienst/ausgaben/artikel.php?id=920
[9] http://de.wikipedia.org/wiki/Heeresnachrichtenamt#Aufgaben
[10] http://www.bmi.gv.at/cms/BMI_OeffentlicheSicherheit/2005/07_08/files/Heeresnachrichtenamt.pdf
[11] http://www.parlament.gv.at/PG/DE/BR/BRSITZ/BRSITZ_00689/fnameorig_113975.html
[12] European Parliament Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system, 2001/2098(INI)), nachzulesen: http://www.scribd.com/doc/21458788/Echelon-Report-English oder: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//DE oder: http://www.heise.de/tp/r4/artikel/1/1683/1.html siehe diesbezüglich auch „ENFOPOL-Papiere“: http://www.heise.de/tp/r4/artikel/6/6326/1.html
[13] http://www.raw.at/texte/inteam/inteam6/int6_vorwaerts_zu_metternich.htm
[14] http://www.parlament.gv.at/PG/DE/XX/A/A_00555/fnameorig_124888.html
siehe auch: http://www.parlament.gv.at/PG/DE/XX/NRSITZ/NRSITZ_00084/fnameorig_114157.html#Seite_120.html
[15] Konrad Becker: The politics of the Infosphere: World-Information.Org, page 96, (read: http://books.google.at/books?id=FZHHkEUvWQcC&pg=PA96-IA1&dq = Military Intelligence + becker & cd = 1 # v = onepage & q & f = false )
[16] http://www.parlament.gv.at/PG/DE/XX/AB/AB_05482/fnameorig_135370.html (Item 4)
[17] http://www.raw.at/texte/inteam/inteam6/int6_vorwaerts_zu_metternich.htm
[18] http://www.heise.de/tp/r4/artikel/ 5/5205/1.html
[19] http://www.acipss.org/intelligence/beitraege/bound_to_cooperate/current_organizations.htm or "Die Presse", 27 December 1999 ("Vienna as a playground for the agents)
[20] http://de.wikipedia.org/wiki/Heeresnachrichtenamt #
structure [21] Konrad Becker: The politics of the Infosphere: World-Information.Org , page 96
[22] http://www.parlament.gv.at/PG/DE/XX/AB/AB_05482/fnameorig_135370.html
[23] http://www.politspiegel.at/? p = 992
see [24]: http://www.parlament.gv.at/PG/DE/XXIV/J/J_03364/fnameorig_169868.html or: http://www.falter.at/ print/F2002_24_1.php
[25] http://www.parlament.gv.at/PG/DE/XX/AB/AB_05482/fnameorig_135370.html
Download "The military intelligence office" in PDF format
Subscribe to:
Comments (Atom)