Posts Tagged ‘USA’

DE UNDE ne vine biometria. SUA in fata unei lumi de "teroristi". De la US-VISIT la Eurodac, BioVisa si IDENT pentru FBI si DHS. PLANURILE DE VIITOR

Testimony of Deputy Assistant Secretary for Policy Kathleen Kraninger, Screening Coordination, and Director Robert A. Mocny, US-VISIT, National Protection and Programs Directorate, before the House Appropriations Committee, Subcommittee on Homeland Security, “Biometric Identification”

Release Date: March 19, 2009

Rayburn House Office Building
(Remarks as Prepared)

“Chairman Price, Ranking Member Rogers, and other distinguished Members, we are pleased to appear before you today to discuss how the use of biometrics and identity management programs enhances our Nation’s security. The Department of Homeland Security (DHS) continues to refine our capabilities to identify accurately and more efficiently process individuals at the border, in airports, and across our screening programs. The Screening Coordination Office (SCO) within the DHS Office of Policy was established to integrate, where appropriate, the wide range of DHS screening and credentialing activities to enhance our missions of keeping dangerous people and things out of the U.S. and securing critical infrastructure. US-VISIT provides the Department’s biometrics identification and analysis services to agencies throughout the immigration and border management, law enforcement and intelligence communities. US-VISIT supports the Department’s mission by providing biometric identification services to Federal, State and local government decision-makers to help them accurately identify people and assess risk.

Access to our nation is critical for a terrorist to plan and carry out attacks on our homeland. As the 9/11 Commission’s Final Report states, “Terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack. To them, international travel presents great danger because they must surface to pass through regulated channels to present themselves to border security officials, or attempt to circumvent inspection points.” As the Department continues to implement and integrate key screening programs, the establishment of an integrated immigration and border screening system represents a significant achievement that has improved national security.

The Value of Biometrics
The Department began to collect digital fingerprints and photographs from international visitors applying for visas or arriving at U.S. ports of entry (POE) in 2004 to help immigration officials make visa-issuance and admission decisions. With biographic screening capabilities already well established, biometrics became the next logical step in the evolution of identity management. Unlike names and dates of birth, biometrics are unique and extremely difficult to forge. They provide a reliable, convenient, and accurate way to establish and verify visitors’ identities. Moreover, biometrics are a scalable technology and can be upgraded to stay one step ahead of terrorists and criminals. Biometrics help us meet the challenge of making travel difficult for those who want to do us harm, while making it convenient and efficient for legitimate visitors.

Through its use of biometrics, the Department’s US-VISIT program collects, stores, and shares digital fingerscans and digital photographs for subsequent verification. This biometric information is paired with biographic information pertaining to an individual and used to establish and verify that individual’s identity.

We want to reinforce the critical progress we have made by discussing key capabilities that biometrics provide: greater security, increased efficiency, and a new level of identity assurance.

The Department’s implementation of biometrics capabilities has laid the foundation for the rapid expansion of biometric identification to other agencies. Today, this biometric coordination across the Government is making our screening more collaborative, more streamlined, and more effective than ever before.

Five years ago, our immigration and border management system had disparate information systems that lacked coordination. Today, the Department is unifying these systems to promote a centralized source for biometric-based information on criminals, immigration violators, and known or suspected terrorists.

Five years ago, U.S. Immigration and Customs Enforcement (ICE) lacked timely and accurate information about visitors who overstay their visas. Today, US-VISIT provides more than 250 credible leads weekly to ICE, enabling that organization to better enforce our immigration laws. Through ICE’s Secure Communities Program, we are also helping to identify immigration violators arrested by State and local law enforcement.

Five years ago, the United States was alone in applying biometrics to the immigration and border management communities. Today, the United Kingdom and Japan already have robust programs using biometrics. The European Union, Canada, Mexico, Australia, Argentina, Peru and many other countries are in various stages of applying biometrics to immigration control.

Five years ago, we were relying on visual inspection of travel documents to try to identify those that were fraudulent. Today, because of increased information sharing within DHS and with the Department of State (DOS), along with the use of biometrics and machine-readable travel documents, we are able to more quickly identify fraudulent documents. As an example, DHS and DOS partnered in developing the e-passport, which set a new international standard for the security features of a travel document, and the passport card, providing U.S. citizens a secure, limited-use travel document in a more convenient format.

As you know, DHS is preparing for the June 1, 2009, implementation of the Western Hemisphere Travel Initiative (WHTI), which will require U.S. and Canadian citizens to present standardized, secure documentation denoting identity and citizenship for entry at the U.S. land and sea ports of entry. WHTI addresses the vulnerabilities inherent when travelers can present a wide range of documents that are highly susceptible to fraud and cannot be verified. WHTI- compliant documents available to U.S. citizens (the passport book, passport card, Trusted Traveler Program cards, and Enhanceds Driver’s Licenses) are issued in a secure manner and include a biometric (digital photograph) on the face of the card. The WHTI solution is transforming the border by moving away from a vehicle-centric system to a person-centric one.

Radio-frequency identification technology embedded in most WHTI-compliant travel documents, with the appropriate privacy protections and infrastructure, allow DHS the ability to verify an individual’s identity and perform real-time queries against lookout databases even before the traveler pulls up to the inspection booth. The trained DHS officer can compare the digital photograph and biographic information on the document to the traveler in front of them, as well as to the photograph and information on the DHS border officer’s screen that is provided by the document’s issuer—all of which assist the officer in making better decisions about an individual’s admissibility to our country.

While implementing the screening programs across the Department, DHS has maintained focus on the four guiding principles first established for US-VISIT, which are to:

Enhance the security of our citizens and visitors;
Facilitate legitimate travel and trade;
Ensure the integrity of our immigration system; and
Protect the privacy of our visitors.
Screening and Credentialing Programs
DHS continues to identify opportunities to harmonize and enhance screening processes for both security and efficiency reasons across DHS programs. In doing so, we must rationalize and prioritize investments in screening technologies and systems while recognizing that each program faces individual challenges, operates in different environments, and adheres to its respective legal authorities.

In July 2008, DHS finalized the DHS Credentialing Framework Initiative (CFI) to guide the selection and coordination of credentialing activities and investments throughout DHS. In developing the CFI, the SCO led a DHS-wide effort to analyze and compare key programs across the credentialing lifecycle of registration and enrollment, eligibility vetting and risk assessment, issuance, and expiration and revocation; identify the relationships between the credentialing processes and business capabilities and the Information Technology services related to screening and credentialing across the DHS enterprise; and outline the projects needed to actualize a robust, cohesive environment across DHS programs.

While one size does not fit all, every program does not have to reinvent the wheel. The CFI aims to provide a consistent, security risk-based framework across all DHS credentials, improve credentialing processes to eliminate redundant activities, utilize existing information more effectively and improve the experience for individuals applying for DHS credentials. The guidance directs the following:

Design credentials to support multiple licenses, privileges, or status, based on the risks associated with the environments in which they will be used.
Vetting, associated with like uses and like risks, should be the same.
Immigration status determinations by DHS components should be verified electronically.
Eligibility for a license, privilege, or status should be verified using technology.
Design enrollment platforms and data collection investments so that they can be reused by other DHS programs – establishing a preference for “enroll once, use many” environment, where appropriate.
Ensure opportunities for redress – individuals should be able to correct information held about them.

Integrating a Streamlined Transportation Screening Platform
The Transportation Security Administration’s (TSA) Transportation Threat Assessment and Credentialing (TTAC) entity is in the initial stages of an enterprise modernization that is being designed to meet the mission of TSA in line with the CFI requirements. The TTAC Enterprise Modernization Program supports TSA’s mission by significantly improving the vetting management and adjudication platform currently used for conducting security threat assessments on various transportation populations through the use of software applications and a common information technology infrastructure. The current TTAC vetting and credentialing enterprise architecture was created to support 2.5 million individuals per year. Today, the populations supported by TTAC have almost tripled.

It is anticipated that after five years, existing stove-piped business processes and information systems will either be reengineered or replaced by a new integrated business enterprise architecture that will: consolidate multiple enrollment methods, implement identity management services across programs, standardize the approach for customer relationship management, standardize the physical and virtual credentialing processes, standardize threat assessment processes, and consolidate operations, integrating program-specific IT systems and business processes into a common secure enterprise vetting and credentialing architecture. The TTAC Enterprise Modernization program presents an opportunity to eliminate redundant business practices, processes, and subsequent IT investments to achieve significant economies of scale benefits associated with a unifying business integration effort.

In line with the CFI, the TTAC Enterprise Modernization program provides for a unified, modular, and maintainable architecture that will reduce the cost, risk, and time associated with implementing new capabilities, on-boarding new populations, improving the robust nature of the architecture, and on-going operations and maintenance. The Department expects that TTAC modernization will support not only TSA needs but also other special population vetting programs that may support the security of critical infrastructure sectors. Further, TTAC modernization is being coordinated with the Department’s other ongoing information technology modernization efforts.

Biometric Screening and Identification
In another effort to streamline DHS processes, DHS has designated US-VISIT’s Automated Biometric Identification System (IDENT) as the biometric storage and matching service for the Department, providing biometric identification and analysis services to agencies throughout the immigration and border management, law enforcement, and intelligence communities. US-VISIT supplies the technology for collecting and storing biometric data, provides analysis of the data to decision-makers, and ensures the integrity of the data.

IDENT plays an important role in the biometric screening and identity verification of non-U.S. citizens for ICE, CBP, U.S. Citizenship and Immigration Services (USCIS), and U.S. Coast Guard. US-VISIT also supports the Department of State’s (DOS) BioVisa Program and shares information with the Federal Bureau of Investigation (FBI).

Here is how it works:

With each encounter, US-VISIT checks a person’s biometrics against a watchlist of more than 5.2 million known or suspected terrorists, criminals, and immigration violators identified by U.S. authorities and Interpol.
When an identification document is presented, a person’s biometrics are also checked against those DHS has on file as associated with the document to ensure that the document belongs to the person presenting it and not to someone else.
US-VISIT provides the results of these checks to decision-makers when and where they need them.

Biometric Services for DHS and Other Agencies
To give you an idea of the breadth of our services, every day US-VISIT provides access to biometric data for 30,000 authorized Federal, State, and local government agency users to help them identify, mitigate, and eliminate security risks. Let us give you a few examples.

USCIS uses biometrics to screen applicants for immigration benefits.
Border Patrol and U.S. Coast Guard use biometrics as part of their efforts to apprehend illegal migrants.
Department of Defense (DOD) and the intelligence community provide biometrics, including latent fingerprints, they collect from locations where terrorists have been, such as safe houses or training camps to DHS in order to determine whether we’ve previously encountered individuals they suspect to be terrorists and terror suspects.
And finally, State, local and other federal agencies submit biometrics to DHS to support their investigations. Our Biometric Support Center (BSC) verifies almost 50,000 fingerprints each week—helping to solve crimes, identify John or Jane Does, and support terrorist investigations.
Additionally, the US-VISIT Program Office is working with a number of other DHS components, such as the TSA, on future and planned credentialing and identity management programs.

10-Fingerprint Transition
DHS’s transition from collecting 2 digital fingerprints to collecting 10 digital fingerprints at ports of entry from visitors to the United States is nearly complete. DHS deployed new 10-fingerprint scanners at U.S. POEs in 2008, providing the capability to capture 10 fingerprints from 97 percent of in-scope travelers. The transition to 10-fingerprint collection increases DHS’s ability to keep dangerous people out of the United States, while making legitimate travel more efficient. Today, the new fingerprint scanning devices are in place at all major POEs, so international visitors can expect to use the upgraded technology when they enter the United States.

The use of 10 fingerprints for biometric verification offers many enhancements. In 2007, DOS began collecting 10 fingerprints from visa applicants at all of our embassies and consulates to enhance the ability to establish and verify applicants’ identities. 10-fingerprint readers improve the accuracy of identification; improve interoperability with the FBI and DOS, local, and tribal governments; and will mean fewer travelers will be referred to CBP secondary inspection. DHS will now also be able to conduct full searches against the FBI Unsolved Latent File, which, for example, allows DHS to match against prints lifted from crime scenes and those collected in Afghanistan and Iraq.

Interoperability with the Departments of Justice and State
DHS’s 10-fingerprint collection standard makes our system more compatible with the FBI’s biometric system, the Integrated Automated Fingerprint Identification System (IAFIS). We have been working with the FBI for the last several years to make our two databases fully interoperable to more seamlessly match biometric information so we can better identify people who pose a threat to our country.

DHS, the Department of Justice (DOJ), and DOS signed a memorandum of understanding on interoperability on August 1, 2008. The first-phase capabilities for the initial operational capability were deployed in October 2008.

This integrated system will allow authorized users access to all relevant information in a timely manner so they can make the right decisions about the individuals they encounter. IDENT/IAFIS interoperability increases the ability of DHS and DOS to screen individuals; and it benefits the FBI and other law enforcement organizations by providing them with increased access to immigration information about high-risk individuals to whom DOS has refused visas and those whom DHS has expeditiously removed.

Secure Communities
The Department’s Secure Communities initiative will change immigration enforcement by using technology to automate sharing with law enforcement agencies and by applying risk-based methodologies to focus resources on assisting all local communities to remove high-risk criminal aliens.

In 2008, DHS and DOJ began an information-sharing program with local law enforcement counties in North Carolina by providing them access to immigration violation information on their criminal arrests. This capability is part of DHS and DOJ efforts to distribute integration technology that will link local law enforcement agencies to both FBI and DHS biometric databases.

US-VISIT and the FBI Criminal Justice Information Services Division continue to work with ICE in preparation for further deployment of Secure Communities.

Developing Interoperability with the Department of Defense
DHS and DOD have begun identifying ways the two departments can exchange information in a more systematic manner to further each other’s missions consistent with legal authorities and privacy. Central to this effort is an automated exchange of biometric data on individuals’ DOD encounters overseas. Such information would greatly enhance the ability of DOS and DHS to effectively screen who is admitted into the United States. DHS information is useful to DOD for credentialing and access control vetting, among other uses. As with interoperability with DOJ and DOS, some of the most complex issues concerning data sharing are not technical, but rather those dealing with policy and business processes. DHS and DOD are working diligently to explore potential opportunities and to identify technical and process solutions.

Air/Sea Biometric Exit
DHS has performed significant planning and testing over the past three years examining possible solutions for integrating US-VISIT biometric exit requirements into the international air departure process. The options of deployment at airline ticket counters, TSA checkpoints, airline boarding gates, and in airport terminals are being considered. For more than two years, US-VISIT ran biometric exit pilots at 14 air and sea locations. These pilots evaluated the use of both automated kiosks and mobile devices in port terminals. The pilots ended in May 2007 and demonstrated that the technology works, but also that compliance by travelers was low.

On April 24, 2008, DHS published a notice of proposed rulemaking (NPRM) on the collection of biometrics from aliens departing from air and sea ports. The NPRM proposed that commercial air carriers and vessel carriers collect and transmit international visitors’ biometric information to DHS within 24 hours of their departure from the United States. Development and publication of a final rule is pending the completion of pilots as required by the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act, 2009 (Pub. Law 110-329). The 2009 Appropriations Act restricts US-VISIT from spending any money to create an air exit solution, until the pilots are completed and a report on the pilot test is submitted to the Committees on Appropriations of the Senate and the House of Representatives and reviewed by GAO. DHS is assessing methods for conducting air exit pilots consistent with the FY 2009 appropriation. The results of the pilot evaluation, combined with the review of public comments submitted in response to the NPRM, will inform the decision on the option to be selected for publication in the final rule.

When a long-term exit solution is deployed, it will also be deployed to commercial seaports to provide an integrated biometric exit capture for vessel carriers passengers. However, the scope for biometric exit at sea will be considerably smaller than for air.

International Cooperation and Collaboration
When DHS began the US-VISIT program to collect biometrics as part of port of entry screening, the world watched skeptically to see if the benefits of biometrics would work on a large scale. Although a handful of nations were testing biometrics, DHS was the first to launch a comprehensive biometric-based identity management system for immigration and border management. Five years later, more and more countries are approaching us to discuss our lessons learned as they develop their own similar systems. We want other countries to benefit from our experience, and in turn, we can learn from them.

Some countries have already begun operations or are nearing deployment. For example:

In November 2007, Japan implemented a two-fingerprint biometric entry system that is similar to US-VISIT’s initial implementation.
The United Kingdom is collecting 10 fingerprints from visa applicants and is testing fingerprint collection at ports of entry.
The European Union is building a 10-fingerprint visa-issuance program based on the very successful Eurodac.
We are working closely with Australia, which has been a pioneer in facial recognition, as it advances its identity management program.
The United Arab Emirates has been using iris scans as part of its immigration and border control processes for some time now.
Other countries are actively pursuing biometrics:

In August 2008, Peru announced it is working to implement biometric technology in its migration control systems to guarantee the authenticity of personal identification documents and to speed visitor control.
Mexico is planning to modify its currently successful biographic-based system to incorporate biometrics, which is similar to what we did in 2004.
Canada recently approved the budget for a 10-fingerprint visa-issuance program.
As the use of biometrics increases worldwide, the importance of international standards and best practices cannot be overstated. Consistent international standards for biometrics are essential to developing compatible systems, and compatible systems are essential to crippling international criminal enterprises as well as terrorists’ ability to travel. Appropriate data sharing can only be accomplished with consistent standards.

The Future of Biometric Screening
Biometrics offer real opportunities to dramatically increase the efficiency of identifying people. The Department is researching emerging technologies to expand our screening and identification capabilities. We recognize that future identity management systems will require increased assurance, efficiency, ease of use, and flexibility.

As DHS implements biometric exit procedures, both at airports and land border POEs, we are looking for more efficient, less invasive technologies to verify visitors’ departures. Particularly at the land border, we are looking for technologies that might meet our needs better than requiring visitors to have their fingerprints scanned while driving at speed through a POE.

In some cases, the key to expanding biometric screening is to bring the technology to remote locations where decision-makers need it.

For example, Coast Guard is using mobile biometric collection and analysis capabilities on the high seas off the coasts of Puerto Rico and Florida. This project has helped the Coast Guard identify and refer for prosecution and/or administrative immigration proceedings hundreds of repeat illegal migrants who are ineligible to enter the United States, including some wanted for human smuggling and murder.
In addition, CBP’s Air and Marine Operations is examining opportunities to use mobile biometrics to its areas of operation.

Success Stories
Our biometric entry procedures have made a tremendous difference in efforts to improve the integrity of our immigration and border management system. Some of our many success stories include stopping more than 2,400 criminals or immigration violators at the POEs based on biometrics alone, and identifying thousands who are ineligible to receive visas to travel to the United States. There is no doubt that we have deterred countless more.

DHS’s use of biometrics is helping eliminate the ability to use fraudulent or altered travel documents. Now when travelers arrive in the United States, we are able to quickly verify their identity and identify those who are known to have committed immigration violations. Here is an example:

On March 16, 2008, a subject arrived at the John F. Kennedy International Airport in New York and applied for admission with a valid Turkish passport and an unexpired B1/B2 visa. The subject was referred to secondary inspection as a match to the IDENT biometric watchlist for a previous voluntary departure.
During secondary inspection, queries revealed that on November 10, 2003, the subject had been apprehended taking pictures of the Ft. Leonard Wood Missouri Military Base. While in custody, it was discovered then that he had overstayed his period of admission in the United States.
This subject had been admitted into the United States on June 9, 1997, and was granted voluntary departure by an immigration judge on May 13, 2005, to remove himself by September 13, 2005.
On March 16, 2008, the subject attempted to enter the United States using the identity of his twin brother through his brother’s travel documents. The subject was denied access. The subject is inadmissible to the United States for willful misrepresentation and not being in possession of valid travel documents.
Biometrics are helping enforce our borders away from ports of entry, too.

In December 2007, the U.S. Coast Guard interdicted 10 migrants attempting to illegally enter Puerto Rico by sea. When the migrants’ biometrics were checked against IDENT, it was revealed that two of the migrants had illegally entered the United States before, had been subsequently removed from the United States, and were suspected of being part of a human trafficking organization. The two suspected traffickers were brought ashore for referral for prosecution along with two witnesses who would testify against them. Since the Coast Guard began using mobile biometric services to identify illegal migrants at sea, prosecutions of repeat offenders have increased dramatically and illegal migration has dropped by 60 percent in the area where the technology is being used.

US-VISIT Privacy
DHS is committed to adhering to the strictest privacy standards. DHS only collects information needed to achieve the program objectives and mission and only uses this information in a manner consistent with the purpose for which it was collected. DHS also conducts periodic audits of its systems to ensure appropriate use within the limitations of the Privacy Act.

Ultimately, the success of the US-VISIT program will be measured by not only our ability to identify those who may present a threat, but also our ability to protect against identity theft and fraud. We are acutely aware that our success depends on how well we are able to protect the privacy of those whose biometrics we hold. A breach of this most personal data would undermine the public’s trust. We have a dedicated privacy officer responsible for ensuring compliance with privacy laws and procedures and for creating a culture of privacy protection within the US-VISIT Program. Furthermore, we are transparent. From the beginning, we made clear that the information gathered by DHS or State will be used only for the purposes for which it was collected, consistent with those uses authorized or mandated by law. Our policy extends to non-U.S. citizens most of the same privacy protections we give by law to U.S. citizens. We regularly publish privacy impact assessments and system of records notices to provide people with a clear view of the information we collect, how we store it, and our policies and practices to ensure it is not abused.

Conclusion
To ensure we can shut down terrorist networks before they ever get to the United States, we must also take the lead in driving international biometric standards. By developing compatible systems, we will be able to securely share terrorist information internationally to bolster our defenses. Just as we are improving the way we collaborate within the U.S. Government to identify and weed out terrorists and other dangerous people, we have the same obligation to work with our partners abroad to prevent terrorists from making any move undetected. Biometrics provide a new way to bring terrorists’ true identities to light, stripping them of their greatest advantage—remaining unknown.

Biometrics have increased our Nation’s security and the security of nations around the world to a level that simply did not exist before. Biometrics are affording us greater efficiencies, making travel more convenient, predictable, and secure for legitimate travelers. Biometrics are enabling people to have greater confidence that their identities are protected, and in turn decision-makers are more certain that the people they encounter are who they say they are.

So what is next? We need to aggressively pursue innovation. Those who want to do us harm continue to contemplate ways to exploit our weaknesses, so we cannot afford to slow down. We too must contemplate ways to create even more efficient and affordable identification technologies. We have to continue to explore mobile biometrics and biometrics captured at speed, and we must do so safely.

We must also continue to advocate abroad. We recognize that with the power of biometrics and a foundation of international cooperation, we can transform and enhance the way the people travel the world and the way we protect our nations from those who would do us harm.

Chairman Price, Ranking Member Rogers, and other distinguished Members, we have outlined our current efforts that, with your assistance, will help DHS continue to protect America. The Department’s use of biometrics plays a critical role in supporting many programs and initiatives within DHS and other Federal agencies.

Thank you for again for this opportunity to testify. We will be happy to answer any of your questions. “

Intrebarile si raspunsurile, in curand, aici

Cercetatorul american dr Larry Watts: Intelegerile Budapestei cu Kremlinul. Proiectele URSS privind Transilvania

Intelegerile Budapestei cu Kremlinul
La inceputul celui de-al doilea razboi mondial, chestiunea teritoriala basarabeana si cea transilvaneana erau strans conexate in conceptia sovietica. Politica dusa de Comintern, ca Romania sa cedeze acele teritorii impreuna cu Bucovina si Dobrogea, a fost revigorata dupa criza cehoslovaca din 1938, cand…
Proiectele URSS privind Transilvania
Horthy ar fi incercat sa satisfaca solicitarea Moscovei de neimplicare militara in schimbul Transilvaniei, dar directa subordonare a fortelor Honved comandei germane, in perioada 1941-1942, au facut acest lucru imposibil. Situatia s-a schimbat, in primavara lui 1943, odata cu numirea la conducerea Fortelor…

Enigmele 11 septembrie 2001. Identitatile furate ale teroristilor

Dosare Ultrasecrete: Enigmele 11 septembrie 2001
Evenimentele de la 11 septembrie 2001 din Statele Unite au generat cele mai mari enigme ale inceputului de secol XXI. La sapte ani de la tragicele evenimente este evident un singur lucru: incercarea disperata a Administratiei Bush de a impune scenariul oficial asupra evenimentelor de la 9/11 au tot mai putini adepti. Cu trecerea anilor, intrebarile care se pun sunt tot mai grave, iar raspunsurile lipsesc. Un sondaj “Zogby International”, din 23-27 august 2007, arata ca 51% dintre americani nu mai cred in versiunea oficiala a Administratiei Bush si a vicepresedintelui Cheney inainte, in timpul si dupa evenimentele din 11 septembrie 2001. Sondajul are o marja de eroare de 3,1% “Marea necunoscuta” a secolului XXIConform versiunii oficiale a Administratiei Bush, la 11 septembrie 2001, 19 arabi – inarmati pana in dinti cu bricege si spray-uri cu piper – au deturnat 4 “Boeinguri”…
Identitatile furate ale teroristilor
FBI-ul a prezentat, pe 19 septembrie 2001, identitatile, biografiile, iar pe 27 septembrie, fotografiile celor 19 “pirati ai aerului” (Operatiunea Pentbom). Suspectii erau din Arabia Saudita, Emirate Arabe Unite, Liban si Egipt. Identificarea s-a facut in 72 de ore, dupa cartile de credit si biletele…

Obama ales presedinte de Ziua Unitatii Rusiei. McCain si-a recunoscut infrangerea la 6.16 ora Romaniei. VIDEO: cine va conduce de fapt America

Ce va fi va fi…
Urmariti cu atentie interviul BBC cu Zbigniew Brzezinski, unul dintre “vulturii”, plesuvi si hulpavi, care vor sta pe umerii lui Obama.

Stephen Sackur with Zbigniew Brzezinski

In a HARDtalk programme broadcast on 14th October, Stephen Sackur talks to the former US National Security Adviser, Zbigniew Brzezinski.
Click here to watch the full interview
Opinion polls show that the world beyond America’s borders overwhelmingly wants Barack Obama to win the Presidential election.
But does he have the experience and insight to make a real difference to America’s foreign policy?
Zbigniew Brzezinski was National Security Adviser to President Carter and a sometime adviser to the Obama campaign.
Will Obama set America on a different course?
Vezi si
The Power of the Global Elite

Hardtalk discussionIn a HARDtalk programme broadcast on 29 October, Stephen Sackur talks to David Rothkopf & Jonathan Aitken about the growing power of the global elite.
Click here to watch the full interview
The global economy has been rocked by financial crisis … from the US, to Iceland and Pakistan the limited power of parliaments and politicians has been exposed.
Our guests discuss the power and influence of the international select group, operating alongside the traditional power structures, who are remaking the modern world through their roots in business, finance and the media.
Stephen Sackur asks “is it time we challenged the power of the global elite?”

Cititi si
Sosesc rusii. Cu bani The Russians are coming. With cash
Guvernul Rusiei sta pe o baterie imensa de bani pe care planuieste sa ii investeasca in activele straine. Imaginea muschilor sai economici a iesit la iveala de curand, cand prim-ministrul Islandei a anuntat ca Rusia ar putea ajuta cu cinci miliarde de dolari economia islandeza aflata in criza. Cine s-ar fi gandit ca, data fiind situatia haotica a Rusiei anilor ’90, doar dupa zece ani de la acel moment va ajunge in postura de a ajuta financiar o tara dezvoltata?

Prayer for Peace – Memorial Day, 2008

A Proclamation by the President of the United States of America
On Memorial Day, we honor the heroes who have laid down their lives in the cause of freedom, resolve that they will forever be remembered by a grateful Nation, and pray that our country may always prove worthy of the sacrifices they have made.
Throughout our Nation’s history, our course has been secured by brave Soldiers, Sailors, Airmen, Marines, and Coast Guardsmen. These courageous and selfless warriors have stepped forward to protect the Nation they love, fight for America’s highest ideals, and show millions that a future of liberty is possible. Freedoms come at great costs, yet the world has been transformed in unimaginable ways because of the noble service and devotion to duty of these brave individuals. Our country honors the sacrifice made by those who have given their lives to spread the blessings of liberty and lay the foundations of peace, and we mourn their loss.
Today, our service men and women continue to inspire and strengthen our Nation, going above and beyond the call of duty as part of the greatest military the world has ever known. Americans are grateful to all those who have put on our Nation’s uniform and to their families, and we will always remember their service and sacrifice for our freedoms.
On this solemn day our country unites to pay tribute to the fallen, who demonstrated the strength of their convictions and paid the cost of freedom. We pray for the members of our Armed Forces and their families, and we ask for God’s continued guidance of our country.
In respect for their devotion to America, the Congress, by a joint resolution approved on May 11, 1950, as amended (64 Stat. 158), has requested the President to issue a proclamation calling on the people of the United States to observe each Memorial Day as a day of prayer for permanent peace and designating a period on that day when the people of the United States might unite in prayer. The Congress, by Public Law 106-579, has also designated the minute beginning at 3:00 p.m. local time on that day as a time for all Americans to observe the National Moment of Remembrance.
NOW, THEREFORE, I, GEORGE W. BUSH, President of the United States of America, do hereby proclaim Memorial Day, May 26, 2008, as a day of prayer for permanent peace, and I designate the hour beginning in each locality at 11:00 a.m. of that day as a time to unite in prayer. I also ask all Americans to observe the National Moment of Remembrance beginning at 3:00 p.m., local time, on Memorial Day. I encourage the media to participate in these observances. I also request the Governors of the United States and the Commonwealth of Puerto Rico, and the appropriate officials of all units of government, to direct that the flag be flown at half staff until noon on this Memorial Day on all buildings, grounds, and naval vessels throughout the United States, and in all areas under its jurisdiction and control. I also request the people of the United States to display the flag at half staff from their homes for the customary forenoon period.
IN WITNESS WHEREOF, I have hereunto set my hand this twenty-second day of May, in the year of our Lord two thousand eight, and of the Independence of the United States of America the two hundred and thirty-second.
GEORGE W. BUSH

Romania, "the best kept secret in Europe"

REMARKS OF AMBASSADOR NICHOLAS F. TAUBMAN
ON THE OCCASION OF A BUSINESS BRIEFING IN ATLANTA DURING US-Romanian ambassadorial road show
Atlanta, Georgia, USA, February 7, 2008

Good Morning. I am delighted to be here this morning, along with Ambassador Adrian Vierita and the rest of our delegation, to share with you my experience as the U.S. Ambassador to one of the most dynamic and fascinating markets in Europe, a country that has become the hottest market for Foreign Direct Investment throughout the entire region.
[…]
Romania is often referred to as “the best kept secret in Europe” and now – the European Union. I trust that after our brief remarks this afternoon, you’ll understand why, as the U.S. Ambassador and the founder and former CEO of what is now a Fortune 500 company, I would urge you to carefully consider Romania as your next market, if you are not there already.
I’ve played witness to tremendous changes in Romania in my time as Ambassador. Romania has emerged from the long, dark night of communism and has made incredible progress in the last few years. One can sense the casting off of the old ways and a rediscovery of latent possibilities.
Romania’s recent achievements are impressive. They include NATO membership in 2004, EU membership in 2007, and eight years of solid economic growth that have refashioned the country into a modern democracy and a market economy.
Romania is a country of enormous promise and potential with a marketplace of 22 million consumers. It is rich in agricultural lands, energy and mineral resources, and human capital, with a well-educated and productive labor force. I’ve been impressed by the creative, entrepreneurial spirit of the people. Their talent, skill, and ambition are already turning Romania into a key player in the region and beyond.
Romanians can be found in the boardrooms of major corporations from Silicon Valley to Wall Street, as well as at the helm of operations in Romania. The country’s human talent has allowed major multinationals to move quickly to reliance on domestic managers, rather than expensive foreign staff. Romanians are known for having both outstanding engineering and language skills. People are beginning to talk about the so-called “Return to Romania,” which is a very encouraging sign. I’ve heard plenty of stories about some of Romania’s brightest, including many who left under very trying circumstances, returning home to establish companies and capitalize on their Western know-how, some after more than two decades. A well-known American executive recruiting firm tells me they’ve been quite successful at placing Romanian-born executives in positions back in their home country.
One of the Romania’s great success stories can be found in the Information Technology sector. Not only is it recognized as one of the strongest in the region, boasting 85 percent American products and continuing to attract high-levels of investment; Romania’s own innovations have become globally recognized products. The legislation governing the sector has served to encourage investors and helped stem the so-called “brain drain” experienced in other sectors. I recently read that the Economist Intelligence Unit ranks Romania ahead of India, Russia, and China in terms of IT sector competitiveness.
On the occasion of the inauguration of Microsoft’s Global Technology Support Center in Bucharest a year ago, I asked Bill Gates “why Romania?” His response was simple – great geographic location, great engineers, and great foreign language speakers. They say that after English, one of the languages heard most often at Microsoft’s Seattle headquarters is Romanian, spoken by the 300 plus Romanians employed there. Bill Gates knows a thing or two about the war for talent…
But Microsoft is not alone. Leading U.S. and European companies have moved eagerly into the Romanian market. Airline connections throughout Europe and beyond are proliferating. In fact, Georgia’s own Delta Airlines made it that much easier to bridge the Atlantic last June when they inaugurated their direct flight to JFK. It’s amazing to think that Foreign Direct Investment in Romania from the U.S. and Europe is up over 600% since 2000!
In a few short weeks, Bucharest will be in the world spotlight as dozens of foreign leaders, including President George Bush, converge there for the NATO Summit. For this, the people and leaders of Romania have good reason to be proud.
What can you expect to find upon arrival to Bucharest? A city bustling with activity, framed by construction cranes and anchored by bumper to bumper traffic, serving as testimony to the city’s exponential growth. In fact, Romania now ranks first in the EU in construction works – boasting an annual growth rate of 33 percent. You could make a case that the construction crane should be the new “national bird” of Romania.
But the explosive growth is not limited to the capital city. The fact that the investment locations are decentralized is one of the attributes that makes Romania so attractive. Constanta, known as the “eastern gateway of Europe” is home to the second largest port in Europe in terms of capacity, and still has potential to grow; Iasi, Timisoara and Cluj are recognized as industrial and IT hot spots, experiencing some of the fastest growth rates in the country. Ploiesti and Craivoa are becoming automotive hubs, with Ford Motor Company slated to open its largest new plant in 36 years in Craiova.
Cluj is attracting plenty of investment and media interest. You may have noticed the hoopla surrounding Nokia’s new mobile-phone plant. I saw first hand what the excitement was about when I visited Cluj last November to check on the progress of the Transylvania Motorway, a 3.2 billion dollar project that will nearly triple the amount of motorway in Romania. The four-lane road, the biggest project in Europe, will cut travel time to Hungary in half, making it much easier to get your products to the major European markets. And you know the road will be quality, because Bechtel is building it. This road is drawing investment to the region already, and it’s not even done. St. Louis-based Emerson is set to join Nokia with a new Cluj plant in the near future. The list goes on and on, and so could I, but I won’t as I want to leave time for your questions.
I’ll end with this. The more I travel the globe, the more I come to realize that we need to start focusing on our similarities as people rather than our differences. In the case of Romania that is a pretty simple task as our two countries and peoples have much in common. In fact, Ambassador Vierita even shares a birthday with the United States! He is in for quite a surprise when he celebrates his first birthday party this 4th of July in our nation’s capital. From my own experience, I have found Romanians to be warm, open and friendly. Romanians are hard workers and we both believe in working hard to make our lives better. I believe that the time to build on success is while you’re successful. For Romania, that time is now. It should be for you as well. Thank you.

Basescu la France 24

Cette semaine dans le TALK DE PARIS, l’invité de Ulysse Gosset est le président de la Roumanie Traian Basescu. Entrée dans l’Europe il y a un an, la Roumanie est-elle plus proche de la France ou des États-Unis ? Quelle est sa politique d’immigration ? Est-elle favorable à l?indépendance du Kosovo ? Réponse le vendredi 8 février à 19h10, heure de Paris, sur F24 !

Benjamin Ribout de la France 24 imi trimite doua linkuri ale inregistrarilor emisiunii.

Le gasiti aici:

Prima parte: https://dl.free.fr/ispyoiGzN/basescupart1.mp3

Partea a doua: https://dl.free.fr/jx1U40jzc/basescupart2.mp3

Foto: Sorin Lupsa https://www.presidency.ro/

Powered by WordPress

toateBlogurile.ro

customizable counter
Blog din Moldova