Search


 

 

REAL ID an International ID
 
 

Sovereignty - Complete independence and self-government.

 

Free Enterprise - an economic and political doctrine holding that a capitalist economy can regulate itself in a freely competitive market through the relationship of supply and demand with a minimum of governmental intervention and regulation.      
 
 
          RFID TAG
    SECURITY RISKS

   March 1, 2010 
EPC RFID Tags in Security Applications - Passport Cards, Enhanced Drivers Licenses, and Beyond

In this paper, we explore the systemic risks and challenges
created by increasingly common use of EPC (Electronic Product Code) for security applications. As a central case study, we examine the recently issued United States Passport Card and Washington State "enhanced" drivers license (WA EDL), both of which incorporate Gen-2 EPC tags. We explore several issues:

1. Cloning: We report on the data format of Passport
Cards and WA EDLs and demonstrate their apparent susceptibility to straightforward cloning into off the shelf EPC tags. We show that a key anti-cloning feature proposed by the U.S. Department of Homeland Security (the tag-unique TID) remains undeployed in these cards.

2. Read ranges: We detail experiments on the read-range
of Passport Cards and WA EDLs across a variety of physical configurations. These read ranges help characterize both issues regarding owner privacy and vulnerability to clandestine "skimming" and cloning.
 
3. Design drift: We find that unlike Passport Cards, WA EDLs are vulnerable to scanning while placed in protective sleeves, and also to denial-of-service attacks and covert-channel attacks.
 
     REAL/PASS ID
       NATIONAL ID 

   February 27, 2010 

REAL ID/PASS ID Letter Michigan State HR Paul E. Opsommer


As written, I therefore believe that both REAL ID and PASS ID would constitute a
national ID card program unless the process is done via a rulemaking process that is fully negotiated and would require Congressional approval for any changes to the program that would take place after the initial rulemaking process. Such issues as advanced biometrics, the use of RFID, and international data sharing are simply too important to be left in the hands of future unelected or non-governmental agents. If not repealed, any replacement for REAL ID must contain extensive and detailed provisions regarding what DHS can not do in the future or it will simply be a blank check.
 
         RFID DATA
          SNIFFED 

   February 7, 2010 

LAS VEGAS — It’s one of the most hostile hacker environments in the country –- the
DefCon hacker conference held every summer in Las Vegas.

But despite the fact that attendees know they should take precautions to protect their
data, federal agents at the conference got a scare on Friday when they were told they might have been caught in the sights of an RFID reader.

The reader, connected to a web camera, sniffed data from RFID-enabled ID cards and
other documents carried by attendees in pockets and backpacks as they passed a table where the equipment was stationed in full view.
 

It was part of a security-awareness project set up by a group of security researchers and consultants to highlight privacy issues around RFID. When the reader caught an RFID chip in its sights — embedded in a company or government agency access card, for example — it grabbed data from the card, and the camera snapped the card holder’s picture.


This year they planned to add data collected from the RFID reader and camera (below) — to
raise awareness about a privacy threat that’s becoming increasingly prevalent as RFID chips are embedded into credit cards, employee access cards, state driver’s licenses, passports and other documents.
 

You have probably heard of Radio Frequency Identification (RFID) technology in many different contexts. RFID describes a broad range of technologies that allow the identification and tracking of physical items using radio waves, and have far-reaching implications for processes as wide-ranging as factories, hospitals, airports, battlefields and retail sales.
 

RFID The Right Frequency for Government IBM


The integration of RFID technology with other information technology makes a paradigm shift now possible.
RFID technology can track patient safety by error-proofing processes for medication, as well as providing global visibility of worldwide shipments, which will improve the flow of commerce and the security of nations. The future role of RFID will dramatically increase its impact over that of its predecessors.

The potential of RFID is indeed great. The supply chain management industry refers to the “three V’s of RFID”:
visibility, velocity, and value. RFID promises to increase visibility to make earlier and better decisions and actions possible. Second, RFID will enable the flow of goods and information to be accelerated, with a higher certainty of information for decision making. Finally, RFID will enable important enhancement of value, often in new ways. As described by Professor Wyld, RFID offers the potential to provide increased safety for patients, faster movement of automobiles from manufacturer to dealer, and greater national security.
 
         COMMENTARY     
         MARK LERNER       


   September 27, 2009 
In The News  

ARTICLEA Surveillance Society or a Free Society - By Mark Lerner, for the Constitutional Alliance, Inc.


The Big Question
- should government control the people or should the people control government?

Orwell’s prediction of a future big brother government came true. Whether acknowledged or not,
Americans now live in a surveillance society.

Most of that American public falls into one of the categories the Department of Homeland Security
(DHS) calls “potential threats;” environmentalists, animal lovers, anti-war protestors, pro-lifers, evangelical Christians, observant Jews, Constitutionalists, returning veterans, and third party candidate supporters are all “potential domestic terrorists.”

Just how far is the American public willing to let the government go in order to assure public safety? Do
the people want the police on every block, all emails read by the government, phone calls overheard, or every financial transaction monitored? Do the people want sensors placed in cities that detect how much an individual perspires, in order to assess and monitor supposed guilt?

How about computer software programs that decide whether or not the way people walk or dress
presents a threat to the government? In Britain citizens are captured on surveillance cameras an average of 300 times a day; does the American public want to be subjected to this level of scrutiny?
 
   SENSITIVE DATA BASE INFORMATION JEOPARDIZED
       


   March 6, 2009 
In The News  
ARTICLEFBI Investigates $9 Million ATM Scam - Reported by John Deutzman; MYFOXNY.

 A Fox 5 investigation exposes a worldwide ATM scam that swindled $9 million and possibly jeopardized sensitive information from people around the world. Law enforcement sources told Fox 5 it's one of the most frightening well-coordinated heists they've ever seen. (Watch video report)

      FUSION CENTERS 
       CONNECT DATA        


   March 1, 2009 
In The News  
 
What Is the Fusion Process?

 

“The concept of fusion has emerged as the fundamental process to facilitate the sharing of homeland security-related and crime-related information and intelligence. For purposes of this initiative, fusion refers to the overarching process of managing the flow of information and intelligence across levels and sectors of government. It goes beyond establishing an intelligence center or creating a computer network. The fusion process supports the implementation of risk-based, information-driven prevention, response, and consequence management programs. At the same time, it supports efforts to address immediate and/or emerging threat-related circumstances and events. Data fusion blends data from different sources, including law enforcement, public safety, and the private sector, resulting in meaningful and actionable intelligence and information. The fusion process also allows for relentless reevaluation of existing data in context with new data in order to provide constant updates. The fusion process turns information and intelligence into actionable knowledge.” Page 2; Version 1.0 - Version Date: July 25, 2005 
 
        GOOGLE MAPS 
      TRACKS PEOPLE        


   February 8, 2009 
In The News  
Know where your kids are? Check Google Maps - By Michael Liedtke; Associated Press

“The new software to be released Wednesday will enable people with mobile phones and other wireless devices to automatically share their whereabouts with family and friends…..

 

"This adds a social flavor to Google maps and makes it more fun," said Steve Lee, a Google product manager…..

It could also raise privacy concerns, but Google is doing its best to avoid a backlash by requiring each user to manually turn on the tracking software and making it easy to turn off or limit access to the service……

 

Google also is promising not to retain any information about its users' movements. Only the last location picked up by the tracking service will be stored on Google's computers, Lee said…..

 

There are no current plans to sell any advertising alongside Google's tracking service; although analysts believe knowing a person's location eventually will unleash new marketing opportunities. Google has been investing heavily in the mobile market during the past two years in an attempt to make its services more useful to people when they're away from their office or home computers…..”- By Michael Liedtke

              REAL ID 
         IN THE NEWS        


   September 8, 2008 
In The News  
ARTICLERFID Chips easily compromised -Video; DeepSec 2007: Melanie Rieback - The RFID Guardian 
 
              REAL ID 
         IN THE NEWS        


   August 24, 2008 
In The News  
ARTICLEREAL ID: Connecting the Dots to an International ID - By Pennsylvania Representative Sam E. Rohrer
August 24, 2008 - NewsWithViews.com
"History offers many examples of societies which have sought to increase security by sacrificing freedom. America itself provides many pertinent instances. However, our founding fathers have not left us without wisdom on this issue. Ben Franklin has famously stated, "People willing to trade freedom for temporary security deserve neither and will lose both."

REAL ID undoubtedly exemplifies a scenario in which a difficult tension exists between freedom and security. By commandeering every state's driver's license issuing process, REAL ID threatens the results warned by Franklin - loss of both freedom and security. It has become the biometric enrollment phase of a plan to implement a terribly invasive tracking system, largely without public knowledge or approval.

REAL ID is merely the current face of a far larger, international government and private economic effort to collect, store, and distribute the sensitive biometric data of citizens to use for the twin purposes of government tracking and economic control.

At issue are much more than standardized or non-duplicative driver's licenses. This effort extends worldwide, threatening every person alive today. Although very legitimate security concerns exist in this age of terrorism, this Act extends far beyond terrorism prevention or protection of the innocent. Keeping that broad picture in mind, let us move to some background behind the face of REAL ID implementation in America."......

 HOMELAND SECURITY   
 RECORDS RETENTION 


   August 23, 2008 
In The News  
"The priority mission of U.S. Customs and Border Protection (CBP) is to prevent terrorists and terrorists' weapons from entering the country while facilitating legitimate travel and trade.

BCI will maintain border crossing information on travelers who are admitted or paroled into the United States, this information includes: Certain biographical information; a photograph (if available); certain itinerary information provided by air and sea carriers and any other forms of passenger transportation, including rail, which is or may subsequently be mandated, or is or may be provided on a voluntary basis; and the time and location of the border crossing.

Previously, maintenance of this information was covered by the Treasury Enforcement Communications System (TECS) ``system of records notice.'' See 66 FR 52984, dated October 18, 2001. As part of DHS's ongoing effort to increase transparency regarding the collection of information at the Department, as well as its efforts to specifically review the personally identifiable information maintained on the TECS information technology platform, DHS and CBP have identified different data sets that call for individual notices so as to provide appropriate routine uses, retention, and exemptions to the Privacy Act."

 

"At the time of arrival at the border, the travel document, either through a CBP Radio Frequency Identification (RFID) Reader reading a unique RFID number from the RFID chip contained in the travel document, or through the CBP Machine Reader reading the MRZ of the travel document, will be used to retrieve the biographical data and photograph associated with the travel document from NEDS and populate a record in BCI, following admission/parole, to permit CBP to electronically verify identity and citizenship, to perform law enforcement queries to identify security risks to the United States and to expedite CBP processing upon arrival in and prior to departure from the United States.

Upon admission/parole of the individual by CBP at the United States border or its functional equivalent,
a record of the crossing will be created in BCI.

Prior to mission/parole and during the process of inspecting the individual, information relating to identity and citizenship is compiled by the CBP in TECS, as part of the screening process to determine admissibility. For records where traveler-specific information is accessed from a non-federal authority's travel document database at the time of the traveler's crossing, the biographical data and photograph will be first collected from the traveler by the issuing authority of the respective travel document and the issuing authority will maintain its own travel document database; the data from such issuing authorities will not reside in NEDS.

At the time of arrival at the border, the travel document, either through a CBP RFID Reader reading the RFID number from the RFID chip contained in the travel document, or through the CBP Machine Reader reading the MRZ of the travel document,
will be used to access that traveler's biographic data and photograph, displaying it in TECS; upon admission to the United States, that data will be recorded in BCI.

CBP also uses this information to perform law enforcement queries to identify security risks to the United States and to expedite CBP border processing. For records where the information is provided by another component of DHS or another federal government authority, such as the State Department's Visa and Passport database or USCIS Permanent Resident Card data, the information will be transferred from the federal authority's or DHS's system of records, displayed in TECS, and then used to create a record in BCI at the time of admission or parole into the United States." 

          INTEGRATED
         INTELLIGENCE
          ENTERPRISE


   August 10, 2008 - Read this and then ask if REAL ID isn't destined as a Global System
In The News  
ARTICLEVision 2015 – A Globally Networked and Integrated Intelligence Enterprise (10MB)

Strategy:

Integrate foreign, military, and domestic intelligence capabilities through policy, personnel and technology actions to provide decision advantage to policy makers, warfighters and homeland security officials and law enforcement personnel.- J.M. McConnell - Director of National Intelligence

 

We live in a dynamic world in which the pace, scope, and complexity of change are increasing. The continued march of

globalization, the growing number of independent actors, and advancing technology have increased global connectivity, interdependence and complexity, creating greater uncertainties, systemic risk and a less predictable future. These changes have led to reduced warning times and compressed decision cycles. Although this interconnected world offers many opportunities for technological innovation and economic growth, it also presents unique challenges and threats. In this environment, the key to achieving lasting strategic advantage is the ability to rapidly and accurately anticipate and adapt to complex challenges.

 

Not only will the type of customer change within our existing federal policy-making sets, but the range of customers will broaden to emphasize other federal departments (e.g., Health and Human Services, Agriculture, Commerce), state and local agencies, international organizations, and private sector and non-governmental organizations. 

FREEDOM21 CONFERENCE 
 GLOBAL TRACKING SYS.


   August 2, 2008
In The News  
ARTICLEGlobal Tracking System  - Amanda Teegarden; Freedom21 PowerPoint

Global Information Infrastructure for the Global Supply Chain

A Presentation of OK-SAFE, Inc. 2008 In Collaboration with V.L. Davis & D. Niwa, Researchers

        STOP REAL ID  
     LERNER & BROWN


   July 13, 2008
In The News  

Public Participation

The Department of Homeland Security (DHS) invites interested persons to participate in this rulemaking by submitting written comments or data, and has requested comments on specific portions of this rulemaking as described in section VI below. We also invite comments relating to the economic, environmental, energy, or federalism impacts that might result from this rulemaking action.

ARTICLE
REAL ID Drivers License Agreement DLA
Uniformity among all member jurisdictions concerning the exchange of information on driver licenses, identification cards, records, convictions, withdrawals and other data related to the driver licensing process;

ARTICLEREAL ID Memo DLA Implementation Funding 6-15-06
Throughout the DLA development process, we often heard from jurisdictional reps that a significant barrier to DLA involvement would be the costs. These NHTSA grants may be the means to overcome that barrier. By being actively involved in your State's strategic traffic safety planning process and ensuring DLA inclusion, your state will be positioned to apply for a NHTSA grant project that includes DLA implementation. Further information on this strategic planning effort can be obtained through your Regional/State NHTSA representative or possibly by contacting your jurisdiction’s lead agency for federal transportation grants.

ARTICLEREAL ID Biometric Fact Sheet Proposed Legislation Final Rules

Biometrics relies on computers to automatically identify individuals based on unique physical characteristics. Many nations, states, municipalities, organizations, schools and businesses are already using biometrics, like facial recognition, digital fingerprinting and iris recognition. The result is a slow methodical global enrollment process, filling databases with personal-biometric information.

 

Robert Mocny (Department of Homeland Security, US-Visit) stated that information sharing is appropriate around the world,” and DHS plans to create a Global Security Envelope of internationally shared biometric data that would permanently link individuals with biometric ID, personal information held by governments and corporations.”

ARTICLEREAL ID Your Body is Your ID 7-13-08
U.S. citizens are being identified and enrolled in this system without their knowledge, through DL/ID cards and passports. A global biometric system relies on common standards designed by two international organizations, over which U.S. citizens have no control, the American Association of Motor Vehicle Administrators (AAMVA) and the International Civil Aviation Organization (ICAO), part of the United Nations (UN). AAMVA sets biometric DL/ID card standards and provides the information-sharing network, AAMVA net, which will include Mexico, Canada and other nations under the REAL ID ACT of 2005 (a federal DL/ID law that imposes these international standards on state ID). ICAO sets facial recognition photo and international biometric “e-Passport” standards (enrollment is 50 million/year).

      PENNSYLVANIA 
      FIGHTS REAL ID


   June 26, 2008
In The News  
 

The methodology Governor Rendell allowed to be employed is illegal on several accounts. Constitutional law provides the right for every citizens to be secure in their persons. Furthermore, statutory law would require a specific exemption to the prohibition against taking personal information like a faceprint. This exemption has been granted in specific criminal cases for the purpose of keeping a record of the physical characteristics (i.e. DNA or fingerprints) of criminals should they again run afoul of the law. However, neither PennDOT nor Viisage has inherent authority nor have they granted any exception

to take biometric information from the citizens of the Commonwealth. This is particularly egregious since it is being done without informed consent. In fact, when asked how “constitutional issues related to privacy [have] been addressed,” Governor Rendell’s Secretary of Transportation responded by saying, “PennDOT has determined that the use of this tool is not a constitutional violation. Obtaining a driver’s license is a privilege. The state is entitled to condition the grant of that privilege on the individual’s consent to have [sic] their picture taken and used as necessary to protect security and for

other legitimate government functions. It is PennDOT’s responsibility to take steps to ensure the integrity of the process, and facial recognition software is one tool we use to do that” (Feb. 15 letter from PennDOT). The actions allowed by Governor Rendell further violate statutory law. PennDOT, as an agency created by the legislature of Pennsylvania, has only those powers given it by the legislature.” 
 
The Arizona state legislature has made it quite clear that it wants nothing to do with the federal Real ID drivers' license plan. Lawmakers on Wednesday sent a bill to the governor prohibiting the state from implementing the proposed national ID card program. The legislation had sailed through the state House on a 51-1 vote after clearing the state Senate last month by a 21-7 vote.


WHITE HOUSE REPORT


   May 31, 2008
In The News  
The United States, Canada, and Mexico are making progress to standardize fingerprint-based biometric technology. Moreover, the three countries are cooperating in conducting trials and reviewing the compatibility of their biometric traveler systems.


        IN THE NEWS


   May 22, 2008
In The News  
ARTICLEChina’s All-Seeing Eye- Naomi Klein; May 29, 2008

With the help of U.S. defense contractors, China is building the prototype for a high-tech police state. It is ready for export.

 

"The security cameras are just one part of a much broader high-tech surveillance and censorship program known in China as "Golden Shield." The end goal is to use the latest people-tracking technology — thoughtfully supplied by American giants like IBM, Honeywell and General Electric — to create an airtight consumer cocoon: a place where Visa cards, Adidas sneakers, China Mobile cellphones, McDonald's Happy Meals, Tsingtao beer and UPS delivery (to name just a few of the official sponsors of the Beijing Olympics) can be enjoyed under the unblinking eye of the state, without the threat of democracy breaking out. With political unrest on the rise across China, the government hopes to use the surveillance shield to identify and counteract dissent before it explodes into a mass movement like the one that grabbed the world's attention at Tiananmen Square."

 

"Remember how we've always been told that free markets and free people go hand in hand? That was a lie. It turns out that the most efficient delivery system for capitalism is actually a communist-style police state, fortressed with American "homeland security" technologies, pumped up with "war on terror" rhetoric. And the global corporations currently earning superprofits from this social experiment are unlikely to be content if the lucrative new market remains confined to cities such as Shenzhen. Like everything else assembled in China with American parts, Police State 2.0 is ready for export to a neighborhood near you." - Naomi Klein


        IN THE NEWS


   May 15, 2008
In The News  
ARTICLEDHS Wants to Spy on Americans, Dems Charge
 
The Department of Homeland Security wants to set up a new program to illegally spy on Americans, two senior Democratic lawmakers charged Thursday in a letter urging colleagues to deny funds for the program.

 

"We are left to conclude that the only reason to stand up a new office would be to gather domestic intelligence outside the rigorous protections of the law -- and, ultimately, to share this intelligence with local law enforcement outside of constitutional parameters," Thompson and Harman wrote.


        IN THE NEWS


   May 2, 2008
In The News  
ARTICLEBe Scared, Be Very Scared - Brian Ervin UTW – April 30, 2008
 
Along with what he called its "blatant violation" of the Constitution, as well as its potential as an interim step toward a "Big Brother"-type New World Order, Brogdon said the Real ID Act will, if it's not stopped, "proliferate identity theft like we have never seen before." 


    SENATE HEARING


   April 29, 2008
In The News  
ARTICLESenate Homeland Security Subcommittee Hearing – REAL ID Act of 2005 - Video


        IN THE NEWS


   April 28, 2008
In The News  

ARTICLEWill it be Freedom or Slavery? - Republic Magazine


"Born into this world we are poked with needles then assigned a 9-digit number. From the moment your unknowing parents hand you over, you cease being a free individual. You are now a piece of inventory that is assigned a value. Welcome to involuntary servitude. Even prior to the inception of the Social Security Number, instruments have been introduced to aid in the tracking of that inventory. Drivers’ Licenses, Credit Cards, License Plates, and Employee ID numbers are only a short list of identifiers that code you into their control system. Today, with the advent of modern technology that utilizes radio frequencies and global positioning systems, the coded system has been perfected to the point where you can be physically tracked almost to the place where you stand. These technologies should never be applied to people, as it is an infringement of our freedom and privacy. If applied to individual lives, these technologies will not stop where they begin, and will form invisible shackles around us that can never be removed. Is this real freedom? Johann Goethe made a statement during his life that will forever hold true: “None are more hopelessly enslaved than those who falsely believe they are free. “ Technologies like the VeriChip, smart cards, pay pass credit cards, secure Social Security cards and Real ID are no different than having a house arrest locator strapped to your ankle. Yet this house has no walls, windows, or doors — its borders extend as far as the radio frequencies can travel, the satellites can trace, and the databases can hold. In this issue we will explore the dark side of the technologies that are being sold to us as a means to make our lives easier and safer. As you read these pages, allow the words of Benjamin Franklin to linger: “He who sacrifices freedom for security deserves neither.” May the words of our sixth issue of Republic Magazine aid you in the choice you make: Will it be freedom or slavery?" – Editor Gary S. Franchi Jr.
 

     REAL NIGHTMARE 
               LINK


   April 13, 2008
In The News  

·         REAL INVASIVE – Will create America’s first national identity card, increase the threat of

            identity theft, enable the routine tracking of individuals, and propel us toward a surveillance society.

 

·         REAL RED TAPE – Will mean bureaucratic nightmares, long lines, repeated trips, and higher fees

            for individuals trying to get licenses and IDs.

 

·         REAL EXPENSIVE – With a cost in the billions, REAL ID is a hidden tax increase that will force

           Americans to either pay higher fees to get their IDs, or pay more in state taxes.

 

·         REAL POINTLESS – Will do little if anything to protect against terrorism. 

        REAL ID 
      SHOWDOWN


   March 30, 2008
In The News  
ARTICLEStates Rebel - Concerns about Real ID Act turn into Boston Tea Party
 
“Officials from the U.S. and Germany have initialed a bilateral agreement to share access to biometric
data. The agreement also provides for the spontaneous sharing of data and DNA samples of known and suspected terrorists, and marks a high point in U.S.- German cooperation in the war on terror.”
 
ARTICLEREAL ID Act of 2005  Public Law 109 -13

“Officials from the U.S. and Germany have initialed a bilateral agreement to share access to biometric data. The agreement also provides for the spontaneous sharing of data and DNA samples of known and suspected terrorists, and marks a high point in U.S.- German cooperation in the war on terror.”

ARTICLE
Real ID Showdown

The REAL ID Act of 2005 is a REAL BAD IDEA.

 

The biometric data and the other personal data will become part of both a national and international database of information, accessible not only by state agencies, but by the federal government and foreign governments, including Mexico and Canada and potentially by corporations.

 

Biometric information belongs to the individual, not the state, and should not be shared with other agencies, other countries, or any corporations. This is a fundamental tenant of a Free People.

 

 “Robert Mocny, acting program manager for the U.S. Visitor and Immigrant Status Indicator Technology program, sketched the outline of a Global Security Envelope of internationally shared biometric data that would permanently link individuals with their personal data held by governments and corporations.” 

 

“Mocny sketched a federal plan to extend biometric data sharing to Asian and European governments and corporations, so as to create a Global Security Envelope of identity management.”

 

All of our Oklahoma US Representatives voted for the REAL ID Act of 2005 and the Senate passed it on a voice vote in the middle of the night when no one was around.

 

Could it really be that our Oklahoma US Delegation really understood what they voted for?

 

MAY 11th is the day Home Land Security plans to breech States rights and move to limit your freedom of movement unless you acquiesce to their demands.

 

The Oklahoma State Legislature is all that is standing in the gap to protect your freedom and privacy.

 

Please call your US Senators and Representatives and ask them to reconsider the ramifications of the

REAL ID  Act of 2005 and  to support H.R. 1117 REAL ID Repeal and Identification
Security Enhancement Act of 2007 and S. 717 Bills Identification Security Enhancement Act of 2007.          

 
 
        REAL ID 
      SHOWDOWN


   February 15, 2008
In The News  

ARTICLEGovernor Brad Henry REAL ID Letter to DHS

 
On behalf of the State of Oklahoma, I respectfully request an extension of the May 2008 deadline for complying with the REAL ID rule. Thank you for your prompt attention to and approval of this request, and, of course, please do not hesitate to contact me should you have questions or need additional information. – Oklahoma Governor Brad Henry
 

ARTICLEDHS Response to Henry on REAL ID Extension

 

Thank you and the State of Oklahoma for your continued commitment to improve Oklahoma's drivers' license and identification issuance processes. These new processes will lead to improved identification security. We received your February 15, 2008 request for an extension of the May 11, 2008 deadline for compliance with the REAL ID

Act and implementing regulations.
 

This document serves as your official notification that the Department of Homeland Security has granted your request for an extension of the compliance date until December 31, 2009. If you have questions or require additional assistance, please contact Mr. Darrell Williams at (darrell.williamsl@dhs.gov) or (202) 447-3836. – Richard C. Barth, Ph.D.

 
   
In The News  

Please send technical comments and problems to: webmaster

Fair Use Notice: This site contains copyrighted material, the use of which may not always have been specifically authorized by the copyright owner. Such material is made available for educational purposes, and as such constitutes "fair use" of any such copyrighted material as provided for in Section 107 of the U.S. Copyright Act. In accordance with Title 17 U.S.C. Section 107 the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

Our Privacy Policy: The only personal information we give to any third party is the information you provide to us when using your debit or credit card to make a donation or purchase. All other information and correspondence are strictly confidential. We never sell, give away or barter mail lists or other information to any person, business, organization or corporation for any reason. We will not provide any personal information about you to any government or agency or employee of any government, foreign or domestic, except when we are under a court order to do so.

Other Resources

Supporting Documents

The Bill Of Rights:
(Outside Document)

Oklahoma Constitution:
(Outside Document)

The United States Constitution:
(Outside Document)

The Declaration of Independence:
(Outside Document)

The NAFTA Agreement:
(Outside Document)

CAFTA:
(OK-Safe Document)

SAFETEA-LU Public Law 109-59:
(OK-Safe Document)

USDOT Corridors of the Future Program:
(OK-Safe Document)

Participants in USDOT Corridors of the Future Program:
(OK-Safe Document)


State of Oklahoma 

Oklahoma's Official Website

(http://www.ok.gov/)

Oklahoma Governor's Office

(http://www.ok.gov/governor/index.php)

Oklahoma Lieutenant Governor's Office

(http://www.ok.gov/ltgovernor/)

Oklahoma Secretary of State

(http://www.sos.state.ok.us/)

Oklahoma Agency Directory

(http://www.ok.gov/genthree/agency.php?let=all)

Oklahoma Office of State Finance

(http://ok.gov/OSF/index.html)

Oklahoma Open Books

(http://www.ok.gov/okaa/)

OklahomaState Legislature

(http://www.lsb.state.ok.us/)

OklahomaState Courts Network

(http://www.oscn.net/applications/oscn/start.asp)

OklahomaState Constitution

(http://www.oscn.net/applications/oscn/index.asp?ftdb=STOKCN&level=1)

OklahomaState Statutes

(http://www.oscn.net/applications/oscn/index.asp?ftdb=STOKST&level=1)

OklahomaState Election Board

(http://www.ok.gov/~elections/)

Find Your Legislators

(http://www.capitolconnect.com/oklahoma/default.aspx)


Links To Other Organizations 

LibertyForge:
(http://www.libertyforge.us)
Corridor Watch

(http://www.corridorwatch.org/)

Freedom 21

(www.freedom21.org)

American Policy Center:

(http://www.americanpolicy.org/)

Eco-Logic Powerhouse:
(http://www.freedom.org/eco/index.html)

Sovereignty International, Inc.
(
http://sovereignty.net)    

Conservative News:
(http://www.humanevents.com/)

Judicial Watch:
(http://judicialwatch.org/)

The August Review:
(http://www.augustreview.com/)

Trans-Texas Corridor:
(OK-SAFE Document)

WorldNet Daily:
(http://www.worldnetdaily.com/)

Texans for Immigration Reform

(www.tfir.org)

The Conservative Caucus:
(http://www.conservativeusa.org/)

The John Birch Society :
(http://www.jbs.org/)

The Minuteman Civil Defense Corps:
(http://www.minutemanhq.com/)

Coalition for a Prosperous America:
(http://www.prosperousamerica.org)

State Legislators for Legal Immigration:
(http://www.statelegislatorsforlegalimmigration.com)

Owasso Taxpayer Alliance:

(http://www.owassotaxpayer.com/)

Liberty Ark Coalition:

(http://www.libertyark.net/)

Farm and Ranch Freedom Alliance:

(http://farmandranchfreedom.org/content/)

NONAIS:

(http://www.nonais.org/)

Arkansas Animal Producers:
(http://arkansasanimalproducers.8k.com/)

The Arizona Sentinel:

(http://thearizonasentinel.wordpress.com/)

Parental Rights:

(http://www.parentalrights.org/)

(http://restoretherepublic.com/)

(http://billkumpelawfirm.sharepoint.com/Pages/default.aspx)

(http://www.tulsansunitedforfairness.org)


Research  
(http://www.crosswalk.com/blogs/epiper/archives.html)

(http://www.bastiatsociety.com/)

Vicky Davis of Channeling Reality:
(http://www.channelingreality.com/)

Joan Veon of WomensGroup.org:
(http://www.womensgroup.org/)

Joan Veon of NewsWithViews.com:
(http://www.newswithviews.com/Veon/joanA.htm)

Charlotte T. Iserbyt of AmericanDeception.com:
(http://www.americandeception.com/index.php?page=home)

Charlotte T. Iserbyt of DeliberateDumbingDown.com:

AxXiom for Liberty

(http://axiomamuse.wordpress.com/)

 

 

 

 

 

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
   
Copyright ©2007 Oklahomans for Sovereignty and Free Enterprise, Inc. All Rights Reserved