While the European Union — many of whose member states are facing dire economic crises — struggles to convince the world of its significance and necessity, it has taken on a controversial new agenda: Internet control. Reports indicate that the EU will soon be creating a mandatory electronic ID system for all citizens of the European Union.
The EU’s Digital Agenda Commissioner, Neelie Kroes, asserts that the legislation will promote “the adoption of harmonized e-signatures, e-identities and electronic authentication services (eIAS) across EU member states.”
An internal document related to the proposal explains:
A clear regulatory environment for eIAS would boost user convenience, trust and confidence in the digital world. This will increase the availability of cross-border and cross-sector eIAS and stimulate the take up of cross-border electronic transactions in all sectors.
According to EurActiv.com, Neelie Kroes would later “widen the scope of the current Directive by including also ancillary authentication services that complement e-signatures, like electronic seals, time/date stamps, etc,” as the EU attempts to coerce nations into participating.
It’s worth noting that Kroes is a longtime attendee at the secretive Bilderberg meetings of elite globalists, and it seems likely the legislation will be an item on the agenda for the upcoming Bilderberg meeting in Chantilly, Virginia, May 31-June 3.
Across the Atlantic, the Obama administration has been a major proponent of a national Internet ID system, but has faced harsh backlash for the proposal. Critics have voiced a variety of concerns surrounding the Internet ID system, focusing on the power such a plan would grant to federal authorities to monitor the online activities of all U.S. citizens. When the idea was first proposed by President Obama, EndoftheAmericanDream.com noted, “The potential for government abuse of such a system is absolutely staggering.”
Additional concerns were raised over the vulnerability that such a system would create for consumers. If someone were to steal another’s ID and authenticate it, the thief would then have access to many different areas of the victim’s life.