Quote:
	
	
		
			
				
					Originally Posted by  Andre
					 
				 
				Internet attacks on 9/11 Truth intensify 
 
Indeed, the myriad ways in which the internet is under attack is too large to list in one article, but some more ideas of just how 9/11 Truth and free speech on the internet in general is being suppressed may be gleaned from the video below: 
			
		 | 
	
	
 I realize that many people today tune out the world with Ipod's Chatrooms and hiding from life in Forums and if its not in a 30 second flick on Youtube... it gets no attention... 
But I wish people would dig a little deeper than Youtube and realize just how serious this is before its to late
Web of Security Issues
By Paul Stone
American Forces Information Service
Washington -- In a briefing room deep in the Pentagon earlier this year, Air Force Lt. Col. Buzz Walsh and Maj. Brad Ashley presented a series of briefings to top DoD leaders that raised more than just a few eyebrows.
Selected leaders were shown how it was possible to obtain their individual social security numbers, unlisted home phone numbers, and a host of other personal information about themselves and their families -- simply by cruising the Internet.
Walsh and Ashley, members of the Pentagon's Joint Staff, were not playing a joke on the leaders. Nor were they trying to be clever. Rather they were dramatically, and effectively demonstrating the ease of accessing and gathering personal and military data on the information highway -- information which, in the wrong hands, could translate into a vulnerability.
"You don't need a Ph.D. to do this,"Walsh said about the ability to gather the information. "There's no rocket science in this capability. What's amazing is the ease and speed and the minimal know-how needed. The tools (of the Net) are designed for you to do this."
The concern over personal information on key DoD leaders began with a simple inquiry from one particular flag officer who said he was receiving a large number of unsolicited calls at home. In addition to having the general's unlisted number, the callers knew specifically who he was.
TOO MUCH ABOUT TOO MUCH
Beginning with that one inquiry, the Joint Staff set out to discover just how easy it is to collect data not only on military personnel, but the military in general. They used personal computers at home, used no privileged information -- not even a DoD phone book -- and did not use any on-line services that perform investigative searches for a fee.
In less than five minutes on the Net Ashley, starting with only the general's name, was able to extract his complete address, unlisted phone number, and using a map search engine, build a map and driving directions to his house.
Using the same techniques and Internet search engines, they visited various military and military-related web sites to see how much and the types of data they could gather. What they discovered was too much about too much, and seemingly too little concern about the free flow of information versus what the public needs to know.
For example, one web site for a European-based installation provided more than enough information for a potential adversary to learn about its mission and to possibly craft an attack. Indeed, the web site contained an aerial photograph of the buildings in which the communication capabilities and equipment were housed. By pointing and clicking on any of the buildings, a web surfer would learn the name of the communications system housed in the building and its purpose.
http://www.defenselink.mil/specials/websecurity/
Pentagon: The internet needs to be dealt with as if it were an enemy "weapons system".
The Pentagon's 
Information Operations Roadmap is blunt about the fact that an internet, with the potential for free speech, is in direct opposition to their goals. The internet needs to be dealt with as if it were an enemy "weapons system".
The 2003 Pentagon document entitled the Information Operation Roadmap was released to the public after a Freedom of Information Request by the National Security Archive at George Washington University in 2006. A detailed explanation of the major thrust of this document and the significance of information operations or information warfare was described by me here. 
http://www.globalresearch.ca/index.p...xt=va&aid=7980
If HR 1955 is passed... THIS site, my site, ATS and many others will CEASE to EXIST over night...
The FEMA concentration camps are ready....
FOIA will be flushed down the toilet
Freedom of Speech? Never heard of it...
Constitution?
GOP leaders told Bush that his hardcore push to renew the more onerous provisions of the act could further alienate conservatives still mad at the President from his botched attempt to nominate White House Counsel Harriet Miers to the Supreme Court.
"I don't give a goddamn," Bush retorted. "I'm the President and the Commander-in-Chief. Do it my way."
"Mr. President," one aide in the meeting said. "There is a valid case that the provisions in this law undermine the Constitution."
"Stop throwing the Constitution in my face," Bush screamed back. "It's just a goddamned piece of paper!"
http://www.capitolhillblue.com/artma...cle_7779.shtml
Welcome to America... Land of the Free, Home of the Brave...
Once Upon a Tyme.... in a Land Far Far Away....
Mourn for what we have lost