It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by cosmo740
I cant wait untill we can vote hime out!!!!
Originally posted by Blaine91555
reply to post by ImaginaryReality1984
So if Obama is part of a crowd who wishes to do this, it excuses him for going along with it? Is that what you mean? He is an innocent little lamb who shares no guilt if he pushes this through?
Originally posted by IgnoranceIsntBlisss
reply to post by ImaginaryReality1984
No. By all means these types of systems, and their history, are my forte. I'd really like to know more background on this. So far the data only shows Obma and the minions around him, and down at Homeland Security. The project was started a year ago. So far you've only mentioned Bill Gates alone... sort of like in a dark smokey room.
But that doesn't mean I'm letting Obama off the hook.
You say don't let the real people behind it off the hook, but so far I don't see you lifting the veil.
I didn't know there are a whole lot of good people left in the upper echelons of government, and above.
Originally posted by AmericanHero
When the government wants to help you do things like get better reception for your tv and now a digital identity so you no longer have to bother with passwords...
You have to wonder if it's a gigantic waste of tax payer's money, or there's a major ulterior motive.
I'm going to go with the latter on this one...
Originally posted by ImaginaryReality1984
The only reason i have mentioned Microsoft alone is because that's what i remember from an article i read over 4 years ago, you may have a photographic memory but i don't. I can't remember the name of the system and so it's difficult to google it. Hopefully someone else will remember, i did an hour of googling and couldn't find what i was after *shrugs*.
Self-Organizing Neighborhood Wireless Mesh Networks
...
Community-based multi-hop wireless networks is disruptive to the current broadband Internet access paradigm, which relies on cable and DSL being deployed in individual homes. It is important because it allows free flow of information without any moderation or selective rate control. Compared to the large DSL and cable modem systems that are centrally managed, mesh networking is organic — everyone in the neighborhood contributes network resources and cooperates.
As for lifting the veil lol, sorry man but the only way it will change is if everyone stands up, and i mean everyone and protests. I do my part, do you do yours?
Originally posted by JohnPhoenix
I do not think they can pull this off. They already do not have the ability to protect even government computer systems from hackers, how are they going to put in an infrastructure to protect against theft from this?
Originally posted by IgnoranceIsntBlisss
A couple years ago I was doing some deep research into the CIA's venture capital firm, In-Q-Tel. I had gotten down into some specific techno gadgets involved in such a MESH grid... but oh dear the file with the copy-pastes is buried DEEP in the bowels of my massive archives.
SmartMesh Managers and Motes together comprise the complete system of hardware, firmware and software required for wireless network operation, and each has robust APIs for quick development and extensive system configurability. The SmartMesh IA-500 family consists of two product lines:
SmartMesh IA-510 Industrial (I) is designed for critical monitoring and control applications. It serves a wide range of applications from renewable energy generation, such as solar and wind power, to factory machine health monitoring and building energy management.
The SmartMesh IA-510 WirelessHART® (H) is compliant to the international IEC 62591 (WirelessHART®) standard and enables industrial automation vendors to meet the rapidly growing demand for integrated WirelessHART solutions.
SmartMesh systems combine Dust Networks’ Intelligent Networking Platform and industry-leading IEEE 802.15.4 radio technology to enable our customers to deliver a wide range of innovative wireless sensing solutions and services to end users.
Organizations will spend nearly $4 Billion on Identity and Access Management (IAM) software this year to implement controls and enforce compliance. Too often, these projects fail to deliver expected results within the expected time. They fall short for two reasons:
* IAM technologies cannot provide a 360-degree view of user activity, because these systems are simply not connected to the majority of things a user touches during the workday. For example, IAM is not connected to file shares or USB ports and cannot report on which confidential files a user opened or saved. As a result of having only limited user activity data, IAM can only provide a limited report on user activity and controls.
...
ArcSight IdentityView is a specialized solution module, built on the ArcSight SIEM Platform, designed to enhance the value of IAM technologies. It combines the broad activity collection and correlation of SIEM with the user and role management of IAM. As a result, organizations realize the value of their IAM investment more quickly, get a complete picture of user activity, and can pass compliance audits with confidence.
ArcSight IdentityView includes:
* Pre-built connectors to leading IAM systems, to import users and roles easily
* Specialized reports for activity-based role modeling, access violations, and enterprise-wide separation-of-duties tracking
* “Unique ID” mapping to tie all of a user’s activity to a single identity
* Activity profiling to determine combinations of actions that raise a warning. For example, IdentityView can scan the activities of the last 50 terminated employees to see which actions might serve as early warnings about future at-risk employees
* Automatic watch-list creation and escalation of users to different severity levels
* Out-of-the-box rules for fraud detection, unauthorized actions, etc.
ArcSight Logger 4 collects information from any system that generates log data. It can process that information as much or as little as desired, and can produce ultra-fast searching across the data. As a result, organizations of any size can quickly detect cybercrime, automate compliance reporting and streamline IT operations.
As consumers become more comfortable with online financial services, the sheer number of transactions and amount of money handled via the internet has exploded. This has brought an equally large boom in online fraud. Today’s online banking customer faces financial risk from bots, viruses, hackers and phishers. In fact, growth in fraud may derail online financial services if widespread fraud can’t be stopped.
Gartner Group recently stated that 7.5 percent of all U.S. adults lost money to some form of financial fraud in 2008. Recent examples include:
* Bots executing “Man in the Browser” attacks to steal funds during fully-authenticated sessions
* Phishing attacks to capture authentication credentials
* Payment card number theft and illegal purchases online using stolen account numbers
ArcSight FraudView detects and prevents online fraud by evaluating and scoring financial transactions in real time. Unlike legacy fraud prevention technologies, ArcSight FraudView can correlate activity across multiple banking channels, to detect sophisticated fraud schemes that span online, ATM, telephone and bank branch activity.
ArcSight FraudView can also aggregate information from a variety of risk and fraud scoring products, to create a single, high-level risk score of any transaction, as it occurs. As a result, banks can better leverage their investments in legacy fraud detection technologies.
Gemalto Mobile Financial Services have been designed to integrate easily with the existing mobile network and banking infrastructure while opening up new business opportunities for mobile operators and financial institutions, and providing a foundation for new cost-effective services and revenue opportunities.
Banking on the move
Gemalto has created a complete financial services solution for mobile operators and financial institutions: The Mobile Financial Services offer provides secure access from a mobile phone for mobile banking, mobile payment and mobile money transfer services.
A wide range of services
* Mobile banking:
a solution for customers with existing bank accounts to get connected to their banks or financial institutions over the mobile network. It also gives customers without bank accounts access to financial services.
* Mobile payment services
Mobile payment enables the customer to pay for services any time anywhere, from either a bank account, a mobile wallet or a mobile top-up
* Mobile money transfer services
Transferring Money via International or national Remittance hubs enables the following services:
> Bank account or mWallet to mWallet or bank account
> Cash to Bank account or mWallet
> Bank account or mWallet to Cash
Banking solutions to suit everyone
The scope of our Mobile Financial Services solutions is only limited by your vision - alongside full mobile banking and mobile authentication, our payment solutions offer prepaid airtime purchase, prepaid electricity purchase, bill payment, and others.
Ezio Token Authentication Solution
is fully integrated with services such as token personalization, packaging, end-user mailing and fulfillment. Gemalto also provides an outsourced hosted service or onsite server for OTP authentication. Ezio token authentication is a complete end-to-end solution sized and designed to handle large two factor authentication customer deployments.
Components
# Ezio Strong Authentication Server is the core software platform, providing full authentication features to bank’s back-end system
# Ezio Time Token
# Ezio Display card
# Token packaging and fulfillment services – direct to the end-customers
Gemalto smart card devices together with our middleware or Microsoft’s PKI infrastructure are used for digital signatures. The document is signed by the author’s smart card device using a digital certificate that binds a public key with a secure identity credential. The signature is validated through a chain back to a trusted Certificate Authority server.
* Data formats: Microsoft Office, Adobe PDF, text, html, RTF and more
* Verification features: Online Certificate Status Protocol (OCSP) validation, time stamping
Network Chemistry is a Wi-Fi security startup based in Redwood City, California. The firm was founded in 2002 by several co-founders including Rob Markovich and Dr. Christopher Waters and is backed by venture capital firms such as San Francisco-based Geneva Venture Partners, Innovacom and In-Q-Tel, the investment arm of the CIA.
The company sells products such as RFprotect Distributed, a wireless intrusion detection system ; RFprotect Endpoint, a laptop security product; and RFprotect Mobile, a portable tool for analyzing network security. The most recent product is RFprotect Scanner, a wired-side rogue access point detection and mitigation system utilizing patent-pending device fingerprinting technology.
Network Chemistry also created and continues to maintain the Wireless Vulnerabilities and Exploits [1] database, which is the result of a collaborative industry effort to catalog and define exploits and vulnerabilities specifically related to the use of wireless technologies in IT networks.
The wireless security business of Network Chemistry was sold to Aruba Networks (NASDAQ: ARUN) in July 2007.
This recommendation targets not just the activities of the Federal Government, but also the activities of the Nation as a whole – including both public and private interests. The role of government is to address the safety and economic needs of its people. As a result, the White House determined that the Federal Government would take a leadership role in developing a strategy to combat these threats. The Federal Government has already done much in addressing trusted digital identities. For example, the Federal Government’s ongoing efforts to execute the Federal Identity, Credential, and Access Management (FICAM) Roadmap6 are representative of the progress made. This Strategy seeks to accelerate those activities and extend trusted digital identities beyond the Federal boundaries and into the national domain. Working in close collaboration with the private sector through eighteen critical infrastructure and key resource sectors and encompassing nearly seventy different stakeholder groups, an interagency writing team developed the National Strategy for Trusted Identities in Cyberspace. This writing team developed the Strategy over approximately 12 months from October 2009 to October 2010.
On August 27, 2004, President Bush signed Homeland Security Presidential Directive 12 (HSPD-12), Policy for a Common Identification Standard for Federal Employees and Contractors, which directs the implementation of a new standardized identity badge designed to enhance security, reduce identity fraud, and protect personal privacy.
...
Federal PKI
The Federal Public Key Infrastructure (PKI) uses a security technique called Public Key Cryptography to authenticate users and data, protect the integrity of transmitted data, and ensure non-repudiation and confidentiality. Components of Federal PKI include the Federal Bridge Certification Authority and the Federal PKI Common Policy Framework.
...
Identity, Credential and Access Management (ICAM)
The goal is a consolidated approach for all government-wide identity, credential and access management activities to ensure alignment, clarity, and interoperability.
IQT is focused on new and emerging commercial technologies that have the potential to give the CIA and broader U.S. Intelligence Community (IC) mission-advantage today and in the future. As a strategic partner for the IC we understand complex customer requirements, and we constantly survey the leading edge of the commercial marketplace in order to identify, adapt, and deliver technology solutions to our customers.
Capabilities of interest in this IQT Technology Practice Area include:
* Software applications for enterprise and consumers that automate and support analytics, knowledge management, and collaboration
* Infrastructure technologies for storage, computing platforms, networking and communication, and facilities
* Embedded sensing, computing, and communicating platforms and software
* Tools to exploit text-, multimedia-,and geospatial-based data in their native language and format
* Hardware and software-based solutions that enhance mobility
Capabilities of interest in this IQT Technology Practice Area include:
* Identity management
* Access control
* Risk analysis capabilities
* System design and analysis tools
* Policy definition and management