BIG BROTHER IS WATCHING YOU

By

F. Kenton Beshore

and

R. William Keller

World Bible Society Costa Mesa, California

Big Brother Is Watching You

Copyright 2011 by F. Kenton Beshore and R. William Keller

Published by World Bible Society P.O. Box 5000, Costa Mesa, California 92628

Book I, First Edition, December 2011 Printed in the United States of America

ISBN – 978-0-615-45545-7

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means – electronic, mechanical, photocopy, recording or otherwise – without prior written permission of the authors, except as provided by USA copyright law.

All Scripture quotations are from the American Standard Version unless otherwise noted.

For information about the ministry of Dr. Beshore and the World Bible Society, visit our web site: www.worldbible.com.

2

Dedication

We dedicate this book to our Lord and Savior Jesus Christ for His infallible holy Word which gives us the Blessed Hope of His return that all students of Bible prophecy eagerly look forward to by watching for the warning signs that precede it. One of those warning signs is the rise of Big Brother.

3

Acknowledgments

We acknowledge the tireless efforts of Alex Jones of PrisonPlanet.com PrisonPlanet.tv and InfoWars.com – the leading researcher and filmmaker exposing the machinations of Big Brother not only in America, but the entire planet. Jones is correct that Big Brother is turning Earth into a prison planet and this book documents that fact. We also acknowledge the excellent work of other researchers, past and present, who have committed their lives to exposing the machinations of Big Brother – Eric Blair, Gary Allen, James Bamford, David Bay, John Beaty, Michael Benson, Lenn Bracken, Ray Bradbury, William Guy Carr, Count Cherep-Spiridovich, John Coleman, Jerome Corsi, Dennis Cuddy, Bill Deagle, David Dees, Stan Deyo, Mark Dice, James Drummey, Daniel Estulin, Robert Eringer, Myron Fagan, Philip Gardiner, John Gatto, David Ray Griffin, Des Griffin, G. Edward Griffin, John Hankey, George Hansen, Harry Helms, Robert Hieronimus, Anthony J. Hilder, Michael A. Hoffman, Aldous Huxley, David Icke, Gary Kah, Jim Keith, George Knupffer, E.C. Knuth, Jim Marrs, Texe Marrs, Jack McLamb, Stan Monteith, Eustace Mullins, Chris Pinto, Michael Collins Piper, Robert L. Preston, James Pool, L. Fletcher Prouty, Jeff Rense, John Robison, John Stockwell, Anthony Sutton, Webster Tarpley, Victor Thorn, Jim Tucker, Jesse Ventura and Nesta Webster. These are just a handful of conspiracy researchers and men who saw the that the “elite” pose to mankind. It would take a whole chapter to list all of them. The men noted above have and are working tirelessly to expose the machinations of Big Brother. We must keep in mind that Big Brother and all of his minions lie, lie, lie and deceive 24-7, 365.25 days a year. Memorize this apriori truth made famous by Sir Walter Scott:

Oh what a tangled web we weave, When first we practise to deceive! (Marmion, Canto vi. Stanza 17)

Big Brother and his minions lie, lie, lie and deceive, deceive deceive!

There is a conspiracy of her prophets in the midst thereof, like a roaring lion ravening the prey; they have devoured souls ; they have 4 taken the treasure and precious things ; they have made her many widows in the midst thereof. Her priests have violated my law, and have profaned mine holy things: they have put no difference between the holy and profane, neither have they shewed difference between the unclean and the clean, and have hid their eyes from my sabbaths, and I am profaned among them. Her princes in the midst thereof are like wolves ravening the prey, to shed blood, and to destroy souls, to get dishonest gain . And her prophets have daubed them with untempered morter, seeing vanity, and divining lies unto them , saying, “Thus saith the Lord God,” when the Lord hath not spoken. (Ezekiel 22:25-28, c. 570 BC, emphasis added)

Conspiracies are as old as man himself. We are watching a massive conspiracy to create a New World Order in which the self-proclaimed “elite” are attempting to enslave all mankind. The “elite” are a fraud as YAHWEH has declared, “Men of low degree are only vanity, and men of rank are a lie” (Psalm 62.9).

This book and the remaining three volumes will eventually be banned by Big Brother. Remember this important truth concerning the banning of books:

“When any government, or any church for that matter, undertakes to say to its subjects, ‘This you may not read, this you may not see, this you are forbidden to know,’ the end result is tyranny and oppression, no matter how holy the motives.” (Robert Heinlein)

www.imdb.com/title/tt0048918

5

Notice

There are numerous free advertisements in this book. They were included by the authors for the benefit of the reader. The ads do not mean the owners of the products endorse this book or approve of everything in it. It also does not mean the authors approve of or endorse everything on the web sites and in the books and DVDs of the advertisers. They are included because it is the authors’ opinion that the men whose websites and products are featured in this book believe that a gang of criminals is attempting to create a New World Order for the sole purpose of enslaving the peoples of the world and eventually exterminating most of us. Please, visit the web sites noted in this book and purchase some of the products advertized and then spread the word.

Deesillustration.com

6

Invitation

We urge and encourage everyone to read this book . You do not need to read it from cover to cover. Read the chapters and appendices that interest you and once you have read them you will be motivated to read the rest of the book. This series of books is an encyclopedia of Big Brother . It clearly explains the goal of Big Brother to create his One World dictatorship – a world government, world economic system and a world church – and the technologies he is using to establish his tyranny. It also describes what you, the reader, can do to resist this Orwellian nightmare that is entangling us as a spider’s web. It also explains what you can do to escape it. Be sure to read the Afterword and the appendices, especially Appendix A. This book gives you a head’s up as to what to expect in the coming years and what to do before, when and after Big Brother establishes his One World Tyranny . Every technology depicted in this book is for real. You can verify each and every one of them. What we can verify today is what Big Brother had already developed 20 or more years ago in his secret labs. Keep in mind the truth that Dr. Stan Monteith has said thousands of times to begin his radio programs:

Bringng you the news behind the news, the story behind the story, hoping to convince you that reality usually is scoffed at and illusion usually is king. But in the battle for survival of Western civilization it’s going to be reality and not illusion or delusion that will determine what the future will bring.

We offer a large dose of reality to counter the endless drugging of the American people with illusion and delusion by the presstitutes at ABC, CBS, NBC, CNN, MSNBC, Fox, and Big Brother’s radio broadcasts, his newspapers and his magazines.

7 Comments are welcomed. If you have any comments about this book (positive or negative) please make them by email – [email protected] For more copies of this book and Books II, III and IV go to our website: www.freeworldfilmworks.com/bigbrother.htm or email us at – [email protected]

8

CONTENTS

PREFACE 13

INTRODUCTION 15

BOOK ONE

PART I – AND SPYING 23

1. SPACE AND AIR SURVEILLANCE 25 2. TRAFFIC AND PEDESTRIAN SURVEILLANCE 41 3. HOME, SCHOOL AND OFFICE SURVEILLANCE 65 4. CITY SURVEILLANCE 79 5. TRACKING 87 6. EAVESDROPPING 109 7. SPYING ON THE PEOPLE 135

PART II – INFORMATION GATHERING AND IDENTIFICATION 169

8. INFORMATION GATHERING 171 9. IDENTIFICATION PROGRAMS 203

PART III – BIG BROTHER TECHNOLOGY 239

10. MARK OF THE BEAST TECHNOLOGY 241 11. BIG BROTHER TECHNOLOGY 265

CONCLUSION 297

AFTERWORD 309

FINAL THOUGHTS 311

GLOSSARY 315

APPENDIX A The Solution 321

9 APPENDIX B Ten Commandments 333

APPENDIX C Ten Commandments of Patriots 334

APPENDIX D Ten Commandments of the state 335

APPENDIX E Recommended books, DVDs and Films 337

APPENDIX F Comparisons between 1984 and today 361

APPENDIX G Duty of all Christian Patriots 363

APPENDIX H Bill of Rights 365

BIBLIOGRAPHY 367

Note concerning the Table of Contents : The Conclusion, Glossary and Appendices A through H are the same in each book while the Bibliography varies for each book.

BOOK TWO

PART IV – BIG BROTHER LEGISLATION/PROPAGANDA

12. LEGISLATION 13. PRESIDENTIAL DIRECTIVES 14. PROPAGANDA 15. MEDIA PROPAGANDA 16. MIND CONTROL

PART V – ENFORCEMENT OF BIG BROTHER’S DICTATES

17. RANDOM CHECK POINTS & SEARCHES 18. MILITARY 10 19. ENFORCEMENT 20. NON-LETHAL ENFORCEMENT WEAPONS 21. LETHAL ENFORCEMENT WEAPONS

PART VI – BIG BROTHER’S END GAME

22. THE NEMESIS 23. THE END GAME

BOOK THREE

PART VII – BIG BROTHER IDENTIFIED

24. BIG BROTHER 25. OLIGOPOLY 26. BIG BROTHER NATIONS

PART VIII – CONFESSIONS AND WARNINGS

27. CONFESSIONS BY AND ABOUT THE CONSPIRATORS 28. STATEMENTS BY AND ABOUT THE BANKERS 29. WARNINGS ABOUT BIG BROTHER 30. LIES OF BIG BROTHER

PART IX – THE END GAME

31. GEORGIA GUIDESTONES 32. CONFESSIONS OF GENOCIDE

BOOK FOUR

PART X – THE EXECUTION

33. FALSE FLAG 34. CULLING THE HERD 35. THE PHONY WARS 36. ILLEGAL, UNETHICAL AND IMMORAL EXPERIMENTS 37. H.R. 2977 38. PROJECT BLUEBEAM

11

Courtesy of PrisonPlanet.com

12

PREFACE

WHO IS BIG BROTHER?

It is important to know who Big Brother is. He is not one person, one corporation, one organization or one government. Big Brother is made up of myriad individuals, corporations, organizations, secret societies, bureaucrats, government agencies, governments and international organizations and unions. Big Brother is a term that was coined by Eric Blair (a.k.a. George Orwell) in his book 1984 . It referred to the government. Most people understand that Big Brother refers to government, but it goes beyond that. Today we know that virtually all the governments in the world are controlled by powerful families that have been controlling the major powers of the world for hundreds of years. These families control the most powerful corporations along with the most influential think-tanks, and semi-secret and secret organizations. Below is a very short list of some of the most powerful families and the corporations, organizations, foundations, think-tanks and secret societies they control:

Families – Rothschild, Rockefeller, Orange-Nassau, Li, Sassoon and the House of Wettin-Stuart-Tudor-Orange-Nassau-Hanover-Saxe- Coburg-Gotha-Windsor.

International organizations – Bank for International Settlements, International Monetary Fund, INTERPOL, United Nations, World Bank, Organization for Economic Co-operation and Development, World Trade Organization and OPEC.

Foundations/Think-tanks – Carnegie Foundations, Rockefeller Foundations, Brookings Institution, ACLU, Ford Foundation, RAND Corp., Stanford Research Institute, Tavistock Institute and the Soros foundations.

Corporations – ADM, Amazon, American Express, AOL, Apple, ARCO, AT&T, Bank of America, Bank of England, BP, Bechtel, Berkshire Hathaway, Carlyle Group, Chevron, Citigroup, City of London Corp., Clear Channel, Comcast, Coca Cola, Concordia BV, Cox, Dell, Disney, Dow Chemical, Dow Jones, DuPont, Exxon/Mobil, Federal Reserve Corp., Facebook, Fox, General Electric, Goldman

13 Sachs, Google, GTE, IBM, Intel, J.P. Morgan Chase, K-Mart/Sears, LCF Rothschild Group, MasterCard, McDonald’s, , Monsanto, Myspace, NM Rothschild & Sons, Pepsi, Rand Corp., Rothschild Bank Int., Rothschild Continuation Holdings AG, Rothschild North America, Inc., Safeway, Shell, Sony, Sprint/Nextel, Standard Oil, Starbucks, Sunoco, Target, TBN, Total S.A., Twitter, Tyson, United Fruit Company, Verizon, Visa, Walmart, Wells Fargo.

Secret societies/shadow orgs – Bilderberg Club, Bohemian Club, Club of Rome, Council on Foreign Relations, Freemasons, Illuminati Order, Royal Institute for International Affairs, Skull and Bones Society and the Trilateral Commission.

For a detailed list of who Big Brother is see Book 3, Chapter 24, “Big Brother.”

David Rothschild NWO kingpin

David Rockefeller NWO kingpin 14

INTRODUCTION

Big Brother is real and it is vitally important for everyone on Earth to understand this. The purpose of this book is to inform as many people in the world to the danger that Big Brother poses to our freedom, security and prosperity, and to show them how to oppose and stop him. The ultimate goal of Big Brother is exactly what O’Brien said to Winston Smith in Eric Blair’s expose of Big Brother:

If you want a picture of this future, imagine a boot stamping on a human face –forever . (Orwell, George, 1984 , Book 3 Chapter 3, p. 220, emphasis mine)

For the average person it is most difficult to see signs of tyranny even though they are right in front of them in newspapers, magazines, books, movies, radio and television. This is why Eric Blair (a.k.a. George Orwell) said, “To see what is in front of one’s nose needs a constant struggle” ( In Front of Your Nose , 1946). Most Americans think the United States of America is the freest nation on Earth. They think America is the world’s defender of freedom, liberty, free enterprise and individuality. America was this until World War I. Since then it has slid down the hill to tyranny. As of 2010 America is ranked as the 5th worst police state in the world behind North Korea, Red China, Belarus and Russia.

America ranks as 5th worst police state

The Electronic Police State rankings for 2010 have 17 criteria that were used to define an electronic police state:

1. Daily documents : How much is required day-to-day for residents to present state-issued identity documents or registration. 2. Border issues : What is demanded for a border entry. 3. Financial tracking : The state’s ability to search and record financial transactions. 4. Gag orders : The penalties for revealing to someone else the state is searching their records. 5. Anti-crypto laws : Bans on . 15 6. Constitutional protections : Either a lack of protections or someone overriding them. 7. Data storage : The state’s ability to record and keep what it uncovers. 8. Data search : The processes to search through data. 9. ISP data retention : The demand for ISPs to save customers’ records. 10. Telephone data retention : States’ requirements for communications companies to record and save records. 11. Cell phone records : The saving and using of cell phone users’ records. 12. Medical records : Demands from states that medical records retain information. 13. Enforcement : The state’s ability to use force (SWAT teams) to seize someone. 14. Habeus corpus : Either an absence of such rights or someone overriding them. 15. Police-Intel barrier : the absence of a barrier between police and intelligence organizations. 16. Covert hacking : State operatives meddling in data on private computers covertly. 17. Loose warrants : Warrants that are being issued without careful review of police claims by a truly independent judge.

The countries making up the top ten in the rankings are:

1. North Korea 2. Red China 3. Belarus 4. Russia 5. USA 6. England/Wales 7. France 8. Israel 9. Singapore 10. Germany.

The next 41 worst police states are:

11. Ireland 12. Malaysia 13. Netherlands 14. Italy 15. South Korea 16. Australia 17. Belgium 18. Spain 19. Austria 20. Ukraine 21. Greece 22. Switzerland 23. Japan 24. Norway 25. Canada 26. India 27. New Zealand 28. Portugal 29. Danmark 30. Hungary 31. Poland 32. Sweden 33. Bulgaria 34. Taiwan 35. Czech Republic 36. Cyprus 37. Finland 38. Lithuania 39. Estonia 40. Luxembourg 41. Slovenia 42. Malta 43. Iceland 44. Latvia 45. South Africa 46. Argentina 47. Mexico 48. Thailand 49. Romania 50. Brazil 51. Philippines. 1

16 If all of the secret Big Brother technologies described in this book were taken into account by the above study America would be Number One far ahead of North Korea and Red China. In 2008 the USA was ranked Number 6. 2 Eventually it will be Number 1. [ Authors’ note : The rankings by the Cryptohippie website were taken down in 2011. They can be found on some other websites that copied the reports and reposted them. Yet the links to the original reports are still listed in the search engines. 4 You may still not believe that your beloved country is one of the worst police states on Earth. If so read on. Remember this eternal truth:

The prince that lacketh understanding is also a great oppressor . (Proverbs 28.16a)

According to the Bible the rulers of America (who are part of Big Brother) are great oppressors because they lack understanding. This is true of the Democrat and the Republican leaders.

Big Brother is here

There are dozens of signs that prove the United States has become a “Big Brother” police state. Here are just 20 of those signs:

1. A new bill being pushed by Senators John McCain and Joe Lieberman would allow the U.S. military to round up large numbers of Americans and detain them indefinitely without a trial if they “pose a threat” or if they have “potential intelligence value” or for any other reason the President of the United States “considers appropriate.” 2. Lawmakers in Washington D.C. working to create a new immigration bill have decided on a way to prevent employers from hiring illegal immigrants: a national biometric identification card all American workers would be required to obtain. 3. Barack Obama is backing a plan to create a national database to store the DNA of people who have been arrested but not necessarily convicted of a crime. 4. Just to get on an airplane, Americans will now have to go through new full-body scanners that reveal every detail of our exposed bodies to airport security officials. 5. If that was not bad enough, the Transportation Security Administration has announced that airport screeners will begin roving

17 through airports randomly taking chemical swabs from passengers and their bags to check for explosives. 6. Starting this upcoming December, some passengers on Canadian airlines flying to, from or even over the United States without ever landing there, will only be allowed to board their flights once the U.S. Department of Homeland Security has determined they are not terrorists. 7. Organic milk is a threat to the FDA which conducts military style raids on Amish farmers in Pennsylvania. 8. An NYPD officer has broken his silence confessing that innocent citizens are being set up and falsely arrested and ticketed in order to meet quotas. 9. A growing number of police departments across the U.S. are turning to mobile camera systems in order to fight motor vehicle theft and identify unregistered cars. 10. For decades, Arizona has been known as “the sunset state,” but lately many frustrated residents have started calling it “the surveillance state.” 11. Judges and police in Florida have been caught using “secret codes” on tickets in the state of Florida. 12. An extensive investigation has revealed that between 2003 and 2007, that state of Texas quietly gave hundreds of newborn baby blood samples to a U.S. Armed Forces laboratory for use in a forensics database. 13. A 6-year-old girl was recently handcuffed and sent to a mental facility after throwing temper tantrums at her elementary school. 14. A 12-year-old girl in New York was arrested and marched out of her school in handcuffs because she doodled on her desk. 15. In Florida, students have been arrested by police for things as simple as bringing a plastic butter knife to school, throwing an eraser, and drawing a picture of a gun. 16. When a mother on a flight to Denver spanked both of her children and cussed out a flight attendant who tried to intervene, she suddenly found herself handcuffed and headed for prison. She was charged with being a domestic terrorist under the Patriot Act. 17. A new global treaty will require U.S. Internet service providers to spy on what you do online. [They are doing that already.] 18. A leaked Obama administration memo has revealed plans for the federal government to seize more than 10 million acres of land from Montana to New Mexico. 18 19. Fifty-six percent of Americans questioned in a CNN/Opinion Research Corporation poll said that the U.S. government has become so large and powerful that it poses an immediate threat to the rights and freedoms of ordinary citizens. 20. A poll in 2010 found that 51 percent of Americans agree with this statement: “It is necessary to give up some civil liberties in order to make the country safe from terrorism.” 4

Here is a quote from the man who coined the term “Big Brother”:

Political language is designed to make lies sound truthful and murder respectable , and to give an appearance of solidity to pure wind. (Orwell, George, 1946, “Politics and the English Language,” collected in Shooting an Elephant , 1950, emphasis added)

Virtually all political parties and politicians lie, deceive, connive, conspire and do whatever it takes to stay in power. Most politicians are bought by billionaires and billion dollar corporations. They do what they are told and when they stop taking orders they are not re-elected or they die a mysterious death. Some obvious examples are Abraham Lincoln, James Garfield, William McKinley, Huey Long, John Kennedy and Robert Kennedy. Big Brother media and historians claim all of these men were killed by “lone nuts” but the truth is they were all assassinated because they did not take orders from Big Brother. Patriots in every country also need to come out of their political party system and become independent. The way to stop the billionaires who buy and control the politicians in America is to come out of the two-party political system. Continual loyalty to one political party is what Big Brother wants. Democrats blame the Republicans for all the problems in America and vice-versa. Both parties are to be blamed and to be rejected. No true Christian patriot should support either party. We should support independent candidates and only vote for a Democrat, Republican or independent candidate who is a true patriot. Who is a true patriot? Here are some things that a true patriot in America stands for and against:

1. Defend and support the Constitution and the Bill of Rights. 2. Defend the rights of all Americans (born or unborn). 3. Defend the rights of the States (Amendment 10). 4. Defend America’s sovereignty (its borders and independence). 5. Demand paper ballots for all elections that are counted in each polling place. 19 6. Demand changes in election financing to keep the rich from buying candidates and elections. 7. Demand constitutional currency according to Section 1, Article 8. 8. Oppose the Federal Reserve Corp. and seek to shut it down. 9. Oppose the illegal federal income tax and the fraudulent 16th Amendment. 10. Oppose wars of aggression by the military industrial complex. 11. Oppose the violation of the Constitution in the name of “national security.”

All Christian patriots and non-Christian patriots should oppose every politician that voted for the Patriot Act. That bill stripped the American people of numerous Constitutional rights. They should also demand that their congressman introduce a bill or co-sign a bill to repeal that un-Constitutional bill. All patriots should oppose all politicians (federal or state) who vote in favor of any bill that takes away the right of the people as stated in the Constitution for more “security.” Those who sacrifice freedom for security get neither. Instead they get tyranny. All patriots should demand that their state house representatives introduce a bill eliminating all voting machines and replace them with paper ballots. If a politician refuses to introduce a bill or be a co-signer they should be opposed. All patriots should demand that their Congressman introduce a bill or co-sign a bill to eliminate the Federal Reserve Corporation’s illegal and un-Constitutional power to coin and regulate money, and return it to Congress according to the Constitution (Article 1, Sec. 8, par. 4). All patriots should demand that their congressmen and senators oppose the illegal wars of aggression in Afghanistan and Iraq, and pull all American forces out immediately. For more about the illegal wars of aggression in Afghanistan, Iraq and now Libya read Book 4, Chapter 35, “The Phony Wars.” Take heed to the eternal truth that Benjamin Franklin made famous:

They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. (February 1775)

You are the Resistance!

The answer to 1984 is 1776!

20 Notes

1. The Electronic Police State. Cryptohippie. www.freeworldfilmworks.com/ abbro-policestate2010.pdf. 2. www.freeworldfilmworks.com/abbro-policestate2008.htm. 3. Our Final Electronic Police State Report. Electronic Police . State Report. This is our third and final Electronic Police State Report. There will not be another; at least not from us. Producing the report is a ... https://secure. cryptohippie.com/pubs/EPS- 2011.pdf 3. The Electronic Police State. The Electronic Police . State . 2010 National Rankings. The USA closes - https://secure.cryptohippie.com/pubs/EPS-2010.pdf. 4. “20 Signs That The United States Is Rapidly Becoming A Totalitarian Big Brother Police State.” http://thisistheendoftheworldasweknowit.com/archives/20-sig ns-that-the-united-states-is-rapidly-becoming-a-totalitarian-big-brother-police-state.

InfoWarsShop.com

21

DeesIllustration.com

22

PART I

SURVEILLANCE AND SPYING

Heterogenous Aerial Reconnaissance Team program developed by DARPA

23

DeesIllustration.com

24

ONE

SURVEILLANCE

Technology is being developed to insure Big Brother will know everything each citizen does, says, hears and even thinks. Fantastic surveillance technology has already been developed, and it is being used at present to track where people go, what they do, what they see and hear, and what they say. The Big Brother surveillance web is growing larger every day, and very few are able to keep from being caught in it.

Space surveillance

Space-based spy cameras are so ubiquitous Big Brother can watch virtually every square inch of the planet around the clock. “Every 10 seconds nearly the entire Earth’s is scanned by Defense Support Program (DSP) infrared surveillance satellites looking for the telltale signs of hostile missile launches. The Aerospace Corporation has been investigating the feasibility of using this existing capability to detect natural disasters and other related environmental phenomena.” 1 Former Department of Homeland Security (DHS) Chairman Michael Chertoff sought to implement a plan in April of 2008, that allowed domestic law enforcement agencies to use data gathered by spy satellites. DHS planned to create a new office that would expand access by law enforcement and other civilian agencies to data gathered by powerful intelligence satellites orbiting Earth. The National Applications Office will oversee who has access to the data. 2 This plan was questioned by Congressman Ed Markey, but not stopped. 3 Several agencies have access to satellites cameras capable of reading newsprint. They can request access to the satellites, and use them to track an individual, vehicle, a residence or a business. This was shown in the 1998 movie “Enemy of the State.” It is well worth it to watch that excellent movie. For a comprehensive list of other movies, television shows and old radio shows to watch and listen to go to Appendix E.

25 Take your pic from space

The Air Force plans to take a single picture of targets from space to create a three-dimensional image of a person’s face. Photon-X, Inc. of Huntsville, Alabama received an Air Force contract in 2011 to develop a camera that can snap a picture of anyone from space. The “bio-signature” (3D image of one’s face) can be used to track that person anywhere. With a few frames more, the device can capture that face’s unique facial muscle motions, and turn those movements into a “behaviormetric” profile that’s even more accurate. “The proposed work will help identify non-cooperative dismounts using remote sensors, from standoff distances that were previously impossible,” reported Toyon Research Corporation, which also got an Air Force grant for “bio-signature” development. “This identity information can help intelligence analysts connect specific people to events and locations, and learn about insurgent operations.” It allegedly “can help Humanoid Robots navigate and find objects in a cluttered room” and it could be used to monitor suspicious behavior practically anywhere. “A brief list of potential industries includes law enforcement, banking, private corporations, schools and universities, casinos, theme parks, retail, and hospitality.” 4 It will only be a matter of time before Big Brother snaps a picture from space of most people in the Western world. He currently has standard photos of virtually everyone in the Western world.

www.wired.com/dangerroom/2011/09/drones-never-forget-a-face

26 Long Range, Non-cooperative, Biometric Tagging, Tracking and Location system

The Army is developing drones will recognize your face and track you, based on how you look. The Pentagon has tried all kinds of technologies to keep track of its foes – tiny transmitters, lingering scents, and “human thermal .” The military calls the effort “Tagging, Tracking, and Locating,” or “TTL.” This technology is not perfect so a more exact technology is in the works. “If this works out, we’ll have the ability to track people persistently across wide areas,” says Tim Faltemier, the lead researcher at Progeny Systems Corporation, which recently won one of the Army contracts. “A guy can go under a bridge or inside a house. But when he comes out, we’ll know it was the same guy that went in.” Progeny is working on their drone-mounted, “Long Range, Non- cooperative, Biometric Tagging, Tracking and Location” system. It is one several firms that has developed algorithms for the military that use two-dimensional images to construct a 3D model of a face. “This overcomes a limitation in current TTL operations where… objects of interest only appea[r] periodically from sheltered positions or crowds,” the Army noted in its announcement of the project. If Progeny can get close enough, Faltemier says his technology can even tell identical twins apart. It also claims the software can help the military “not only learn the identity of subjects but also their associations in social groups.” 5 The military, NSA, NRO, ONI, CIA, and the FBI can gain access to a satellite and dedicate it to observe a single person, a group of people or area for an indefinite period. And all of these spy agencies use them on a daily basis to watch targets. Spy agencies in the Soviet Union, United Kingdom, Canada, Australia, France, Germany, India, Japan, Red China and Israel also have access to satellites which they use on a daily basis to spy on their own people but also on targets outside their respective nations. Private corporations also have their own satellites and use them to snoop on people and facilities around the world. These corporation rent out their satellites to other corporations and people. The most infamous of these corporations is Google which makes Google Earth available to just about anyone. Google Earth is a virtual globe, map and geographical information program that was originally called EarthViewer 3D, and was created by Keyhole, Inc, a Central Intelligence Agency (CIA) funded company 27 acquired by Google in 2004 (see In-Q-Tel). It maps the Earth by the superimposition of images obtained from satellite imagery, aerial photography and GIS 3D globe. It was available under three different licenses, two currently: Google Earth, a free version with limited function and Google Earth Pro ($399 per year), which is intended for commercial use. 6

Air surveillance

Blimps

Big Brother can watch virtually every square inch of Earth with space satellites, but he wants more surveillance options. He has been using helicopters and light planes for decades. The use of blimps is another option, and many are currently in use. A small blimp hovered over the 2009 Indy 500 to insure the safety of the people. 7 The Pentagon is building a large blimp to spy on Americans in the name of national security. The giant dirigible uses radar to constantly monitor activity on the ground from 65,000 feet. The Pentagon says that it intends to spend $400 million to develop a giant dirigible that will float above Earth for 10 years, providing detailed “radar surveillance of the vehicles, planes and even people below.” 8 The city of Ogden, Utah, planned to employ a blimp to fight crime in January 2011. “We believe it will be a deterrent to crime when it is out and about and will help us solve crimes more quickly when they do occur,” Ogden City Mayor Matthew Godfrey told Reuters. The airship is equipped with military technology now available to local law enforcement and it is more “cost effective” to operate than

28 helicopters or fixed winged aircraft. Operational costs are about $100 a month. “We anticipate using it mainly at night. The cameras have incredible night vision to see with tremendous clarity daytime and nighttime. It will be used like a patrol car. It will be used to go and check things out and keep things safe,” said Mayor Godfrey. Another benefit is that it is so narrow it should be undetectable from the ground. “It’s extremely silent. It can hover or stay stationery or silently meander over pre-programmed courses over the city at nighttime.” 9 The High Altitude Stratsopheric Airship is a project being funded by the Defense Department at the New Jersey Institute of Technology for the purpose of fighting crime and stopping terrorists. It is designed to fly at 65,000 and provide a high level, stable surveillance platform. Another proposed use for the airship is to monitor the millions of cargo containers (only a fraction are actually inspected) that arrive at U.S. ports each year. The researchers say their blimp could be outfitted with high tech sensors to scan the containers before they touch land. These super blimps would have better surveillance capabilities than satellites because of their proximity to the ground and because they would be unmanned they could remain in operation for up to a year. Although no design for the blimps has been finalized, the researchers say it may be up to 900 feet long, that’s about four times the length of the Goodyear blimp. 10

UAVs

DHS

Another option that he has is unmanned aerial vehicles (UAVs). The Department of Homeland Security (DHS) sought to put spy drones into use in America in 2006. The DHS wants them to patrol the borders, locate marijuana fields, and also for domestic surveillance by police departments. The MQ-9 Reaper is currently being used by the Border Patrol. Gaston County in North Carolina is using a spy drone. 11

Global Observer

The Global Observer, an unmanned aircraft system (UAS), is a cost- effective communications and surveillance platform that can stay aloft at 65,000 feet for a week.

29 It is designed to address an urgent national security need for a persistent stratospheric platform and provides a means to satisfy numerous high value civil and commercial applications. Mission applications include communications relay and remote sensing payloads for military or commercial customers. Multiple communi- cations and remote sensing applications have already been demonstrated from this operating position, including high definition broadcast (HDTV) video, and third generation (3G) mobile voice, video and data using an off-the-shelf mobile handset. 12

Military drones to fly over the Adirondack Mountains

The New York Air National Guard started launching regular surveillance flights of MQ-9 “Reapers” above the Adirondacks in 2011 to train drone crews for bombing and intelligence missions. Airmen with the 174th Fighter Wing fly the unmanned planes via satellite from command centers at Fort Drum and the Hancock Field Air National Guard Base in Syracuse, New York. The Reapers would not carry weapons and would make less noise than the unit’s F-16s that had previously used the mountain airspace for training. Yet they will be equipped with powerful day and night cameras that can focus on random vehicles and locations for training. Sen. Charles Schumer (D-NY) vigorously supports and wants to increase the number of test sites in the country from four to ten. Some patriots oppose the program arguing it could violate the privacy of law- abiding Americans. Known as “the big eye in the sky,” the MQ-9 has a 66-foot wingspan, can drop 500-pound bombs and stay in the air for more than 15 hours. They are effective in Afghanistan and other places where anti-aircraft fire is minimal. They have killed high-ranking terrorists, but also civilians. The CIA is reportedly using them in Pakistan. 13

ABACUS

The Pentagon is not content to simply watch the enemies it knows it has. It also wants to identify potentially hostile behavior and intent, in order to uncover clandestine foes. Charles River Analytics is building a so-called “Adversary Behavior Acquisition, Collection, Understanding, and Summarization (ABACUS)” tool. The system would integrate data from informants’ 30 tips, drone footage, and captured phone calls. Then it would apply “a human behavior modeling and simulation engine” that would spit out “intent-based threat assessments of individuals and groups.” In other words: This software could potentially find out which people are most likely to harbor ill will toward the U.S. military or its objectives. “The enemy goes to great lengths to hide his activities,” explained Modus Operandi, Inc., which won an Army contract to assemble “probabilistic algorithms th[at] determine the likelihood of adversarial intent.” The company calls its system “Clear Heart.” As in, the contents of your heart are now open for the Pentagon to see.14

Heterogenous Aerial Reconnaissance Team

Programs such as the Heterogenous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process. They have developed systems consisting of large teams of drone planes that pilot themselves, automatically decide who is “suspicious” and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, 15-17 reporting their activities back to a centralized monitoring station.

Drawing of HART operational architecture 31 Houston Police Dept. is using UAVs

The Houston Police Department started testing unmanned aircraft in 2007 and its first test was shrouded in secrecy. Fortunately, it was captured on tape by KPRC Local 2 Investigates. KPRC had four hidden cameras aimed at a row of mysterious black trucks. Satellite dishes and a swirling radar at the test site 70 miles northwest of Houston. HPD cruisers surrounded the farm with a roadblock in place to check each of the dignitaries arriving for the invitation-only event. The invitation spelled out, “NO MEDIA ALLOWED.” HPD Chief Harold Hurtt attended, along with the U.S. Department of Homeland Security and dozens of officers from various police agencies in the Houston area. Few of the guests would comment as they left the test site. News Chopper 2 had a Local 2 Investigates team following the aircraft for more than one hour as it circled overhead. Its wings spanned ten feet and it circled at an altitude of 1,500 feet. Operators from a private firm called Insitu, Inc. manned remote controls from inside the fleet of black trucks as the guests watched a live feed from the high- powered camera aboard the 40-pound aircraft. “I wasn’t ready to publicize this,” said Executive Assistant Police Chief Martha Montalvo. She and other department leaders hastily organized a news conference when they realized Local 2 Investigates had captured the entire event on camera. Montalvo told reporters the unmanned aircraft could be used for covert police actions and for writing traffic tickets. A large number of the officers at the test site were assigned to the department’s ticket- writing Radar Task Force. Capt. Tom Runyan insisted they were only there to provide “site security,” even though KPRC cameras spotted those officers heavily participating in the test flight. Houston police contacted KPRC from the test site, claiming the entire airspace was restricted by the Federal Aviation Administration. Police even threatened action from the FAA if the Local 2 helicopter remained in the area. However, KPRC reported it had already checked with the FAA on numerous occasions and found no flight restrictions around the site, a point conceded by Montalvo. The price tag for an unmanned aircraft ranges from $30,000 to $1 million each and HPD is hoping to begin law enforcement from the air by June of 2008 with these new aircraft. 18

32 Drone gives Texas police bird’s-eye view on crime

The Montgomery County Sheriff’s office is weeks away from launching an unmanned aerial asset to help deputies fight crime. The Vanguard Defense Industries ShadowHawk helicopter is six-feet long, weighs fifty pounds and fits in the back of an SUV. “We can put it over a fire, put it over ahazmat spill, put it over a house with a suspect barricaded inside and literally give the incident commander the ability to look at the entire scene with a bird’s eye view, ” said Chief Deputy Randy McDaniel. It is equipped with an infrared camera that can clearly read a license plate from an elevation of twelve hundred feet. The helicopter cost upwards of $300,000 and was purchased with a grant from the federal government. 19 The Department of Homeland Security posted a article on its website about this program of giving local police departments grants to purchase the UAVs:

For local police departments who do not have a helicopter unit or cannot afford one, small unmanned aerial vehicles (UAVs) are quickly becoming a cheap solution; the Montgomery County Sheriff’s Office in Texas recently purchased the ShadowHawk, a small remote controlled helicopter manufactured by Vanguard Defense Industries.

“The sheriff’s office has no air patrol unit,” said Chief Deputy Randy McDaniel. “To have an aircraft we can deploy quickly when we need it seems to be an appropriate means of equipment and technology. It’s something that will be able to protect our personnel on the ground and the public.” In response to criticism that drones violate privacy McDaniel said, “We’re not about spying on the residents of this county. We are about putting criminals in jail and putting a stop to criminal activity. We have better things to do, and spying is not our role.” McDaniels explained that one of the major uses of the drones will be to look for missing persons. “It will have specific missions. Certainly we will use it to locate lost individuals in wooded areas. That can be an elderly autism patient or someone lost in the National Forest, which is in the northeast corner of the county,” he said. “This would be a much more efficient use of time and resources when you can launch an

33 aircraft and search from the sky rather than get a bunch of people together and search on foot, horseback, or ATV.” 20 UAV are incredible tools for good. As McDaniels noted it is far cheaper to have a UAV search for a missing person than for a few dozen people to search on foot. Satellite surveillance is also an excellent tool for law enfocement. BUT every technology that has ever been invented has always been abused by evil people who have no regard for their fellow man and want to enslave them. History is littered with megalomaniacs who seek absolute power and use every technology at their disposal to get it.

MAVs

Some of the UAVs that may be used in America are micro air vehicles (MAVs) which were developed by the Defense Advanced Research Program Agency (DARPA).

Dade County and Charles County

The police department of Miami-Dade County is seeking permission to use them. 21 and the Charles County Sheriff’s office in Maryland has used a small unmanned flying device dubbed the “CyberBug” for crowd control and surveillance. The CyberBug looks like a model airplane married to a kite and is controlled by a joy-stick type device. It can be carried in the truck of a squad car and is launched on its way by literally tossing it into the sky. From there the joystick controller takes over and its camera signal is sent in real-time back to a laptop computer. The sheriff’s office used the device for two 30-minute flights in 2005 to monitor the annual “Blessing of the Bikes” event at the Charles County Fairgrounds, which officials said was attended by some 8,000 people. “I was quite impressed with how easy it was launch and how well it monitored the area,” said Lt. Chris Becker, commander, Homeland Security and Intelligence for the Charles County Sheriff’s department. “Besides crowd and traffic control, I see law enforcement using the CyberBug in a multitude of applications, especially when it comes to crime fighting and homeland security.” 22 The Miami-Dade police used a $50,000 grant to buy a MAV is used by the military to scan dangerous areas before troops are sent in. 23-24 34 [Authors’ note : Notice that police departments get federal grants to buy spy gizmos to keep tabs on law abiding citizens.]

Nano hummingbird

AeroVironment released a video of flight tests of its tiny Nano Hummingbird flapping-wing UAV in February 2011. It was built under DARPA’s Nano Air Vehicle (NAV) program. This vehicle, like a real hummingbird, hovers, maneuvers and flies under its own power, using its flapping wings for propulsion and control. The final concept demonstrator, built under Phase 2 of DARPA’s NAV program, has a wingspan of 16 cm and weighs just 19 grams – less than an AA battery. Carrying batteries, motors, a video camera and communication links, the vehicle is bigger than the average hummingbird, but smaller and lighter than the largest of the species. The remote-controlled Nano Hummingbird met or exceeded the Phase 2 goals, the company said. It demonstrated precision hovering within a 2 meter-diameter “virtual sphere;” stable hovering in wind gusts up to 5 mph; hovering endurance up to 8 minutes without external power; transition from hover to forward flight up to 11 mph; and flying from outdoors to indoors and back through a normal doorway. 25

Insectothopter

The Insectothopter was a miniature unmanned aerial vehicle developed by the Central Intelligence Agency in the 1970s. It was the size of a dragonfly and was hand-painted to look like one. It was powered by a small gasoline engine to make the wings move.26 The project was abandoned when the Insectothopter was found to be too difficult to control in crosswinds.27-28

Micromechanical Flying Insect

Micromechanical Flying Insect (MFI) Project The goal of the micromechanical flying insect (MFI) project is to develop a 25 mm (wingtip-to-wingtip) device capable of sustained autonomous flight. The MFI is designed based on biomimetic principles to capture some of the exceptional flight performance achieved by true flies. The high performance of true flies is based on large forces generated by non- steady state aerodynamics, a high power-to-weight ratio motor system, 35 and a high-speed control system with tightly integrated visual and inertial sensors. Our design analysis shows us that piezoelectric actuators and flexible thorax structures can provide the needed power density and wing stroke, and that adequate power can be supplied by lithium batteries charged by solar cells. The MFI project started in May 1998. In the first 3 years of this MURI grant, research concentrated on understanding fly flight aerodynamics and on analysis, design and fabrication of MFI actuators, thorax and wings. In August 2001, our MFI prototype (with 1 wing) showed thrust forces on a test stand. In September 2002, we switched our fabrication from folded stainless steel to carbon fiber. In March 2003 we demonstrated 500 microNewtons of lift from a single wing on a test stand. Since March 2003, we have been working on reducing weight, increasing actuator power density, increasing air frame strength, and improving wing control. 29 MAVs are also excellent tools for law enforcement, but as we noted powermongers always use technology for evil purposes. Big Brother will build numerous fleets of MACs to spy on you.

Bugs of war

The Defense Advanced Research Project Agency (DARPA) turned 50 in 2008 and invited Dick Cheney to the party. “This agency brought forth the Saturn 5 rocket, surveillance satellites, the Internet, stealth technology, guided munitions, unmanned aerial vehicles, night vision and the body armor that’s in use today,” Cheney told 1,700 DARPA workers and friends who gathered at a Washington hotel to mark the occasion. “Thank heaven for DARPA.” Cheney noted that DARPA’s mission is “to make sure that America is never again caught off guard.” So, the Agency does the basic research that may be decades away from battlefield applications. It does not develop new weapons, as much as it pioneers the technologies that will make tomorrow’s weapons better. One of DARPA’s many projects is HI-MEMS (Hybrid Insect Micro- Electro-Mechanical System), raising real insects filled with electronic circuitry, which could be guided using GPS technology to specific targets via electrical impulses sent to their muscles. These half-bug, half-chip creations – DARPA calls them “insect cyborgs” – would be ideal for surveillance missions, the agency says in a brief description on its website. 36 “The HI-MEMS program is aimed at developing tightly coupled machine-insect interfaces by placing micro-mechanical systems inside the insects during the early stages of metamorphosis," said Dr. Amit Lal. These bugs can “carry one or more sensors, such as a microphone or a gas sensor, to relay back information gathered from the target destination.” 30

United Kingdom

The United Kingdom launched a program in 2007 to provide all 43 police departments with UAVs. The Home Office will fund the project. 31

Russia

Protestors in Bolotnaya Square, Moscow thought they were being surveilled by a Micro-UAV and one protestor tried to shoot it down with a signal flare gun. The drone belonged to a news website which was streaming pictures and video of the protest. 32 If a news website can buy a surveillance drone what will keep the police from buying them? Nothing. As we have seen many police departments in America are using them as well as in England. Eventually the police and military in every nation will be using them. Corporations will also use them for securtity purposes. In a decade or so UAV drones will become a strategic form of surveillance by Big Brother. You will see them hovering over office complexes, shopping centers, public parks, beaches, stadium parking lots and just about everyplace there are large crowds. There will be no place to hide.

Micro-UAV in Moscow during a protest rally 32 37 Conclusion

Big Brother has hundreds of satellites, undisclosed numbers of military surveillance aircraft, dozens of different types UAVs and MAVs, and other surveillance craft we are not aware of. He can watch you 24-7 if he wants to. Look for thousands of UAVs to clutter the skies of America in the next decade. You will see these spy drones over virtually every major metropolitan area in America. You will also see them patrolling the vast deserts in the southwest of America and the coasts from the east to the west and along the southern coastline. They will be everywhere not only here in America but around the world.

Notes

1. Pack, Dee W. “Civilian Uses of Surveillance Satellites.” Crosslink. Volume 1, Number 1, Winter 1999/2000. Carl J. Rice, Barbara J. Tressel, Carolyn J. Lee- Wagner, and Edgar M. Oshika. www.aero.org/publications/crosslink/winter2000 /01.html. 2. Juliano, Nick. “DHS ignores civil liberties in domestic spy satellite plan, lawmakers say.” RawStory.com. 4.07.2008. & http://rawstory.com/news/2008/DHS_ domestic_spy_satellite_plan_lacks_ 0407.html. Shorrock, Tim. “Domestic Spying, Inc.” CorpWatch. 11.27.2007. www.corpwatch.org/article. php?id=14821. 3. “Markey Demands Answers on Bush Administration’s Plan to Turn Spy Satellites on Americans. 8.16.2007. http://markey.house.gov/index.php?option= content&task=view&id=3049 & http://markey.house.gov/docs/privacy/Spy/%20Sat ellites%20Letter%20to%20 Cher toff_081607.pdf. 4. www.dodsbir.net/solicitation/sbir112/af112.htm. 4. Shachtman, Noah. “Smile! Air Force Wants to Track You Forever With a Single Camera Click.” 5.19.2011. www.wired.com/dangerroom/2011/05/smile-air- force-wants-to-track-you-forever-with-a-single-camera-click4. Soller, Kurt. “Eye in the Sky: Raytheon’s unmanned blimp at this year’s Indy 500.” Newsweek. 6.11.2009. www.newsweek.com/id/201697. 5. Shachtman, Noah. “Army Tracking Plan: Drones That Never Forget a Face.” 9.28.2011. www.wired.com/dangerroom/tag/progeny-systems-corporation. 6. www.google.com/enterprise/earthmaps/earthpro-compare.html. 7. Frauenfelder, Mark. “Pentagon plans to build giant spy zeppelin.” BoingBoing.net. 3.13.2009. www.boingboing.net/2009/03/13/pentagon-plans-to-bu. html. 8. Barnes, Julian E. “Pentagon plans blimp to spy from new heights.” LA Times. 3.13.2009. www.latimes.com/news/nationworld/nation/la-na-spyblimp132009mar13, 0,4608400.story. 9. Nelson, James. Utah city may use blimp as anti-crime spy in the sky. Reuters. 1.16.2011. www.reuters.com /article/idUSTRE70F1DJ20110116?feedType=RSS&fe edName=domesticNews&rpc=76.

38 10. Meeks, Brock, N. “‘Eyes in the sky’ for Homeland security.” MSNBC. 8.27.2005. www.msnbc. .com/id/9069787. 11. Mick, Jason. “Homeland Security Department to Use Drones on Mexican Borders” Daily Tech. 6.24.2010 www.dailytech.com/article.aspx?newsid=18833. 12. Stratospheric Persistent UAS: Global Observer. www.avinc.com/uas/stratosph eric/global_ observer. 13. Yusko, Dennis. “‘Big eye’ has Adirondack sights.” 2.12.2011. www.times union.com/local/article/ Big-eye-has-Adirondack-sights-1010129.php. 14. Shachtman, Noah. “Army Tracking Plan: Drones That Never Forget a Face.” 9.28.2011. www.wired. com/dangerroom/2011/09/drones-never-forget-a-face. 15. “HART Overview.” IPTO (DARPA) – Official website . August 2008. www.darpa.mil/ipto/programs/hart/docs/HART_Overview.pdf. [Dead link] 16. “BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART).” Information Processing Technology Office (DARPA) – Official Website . December 5, 2003. www.darpa.mil/ipto/solicit/baa/BAA-04-05_PIP.pdf. [Dead link] 17. Sirak, Michael (Nov 29, 2007). “DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture.” Defense Daily . http://findarticles.com/ p/articles/mi_6712/is_40_236/ai_n29399227. 18. Dean, Stephen. “Local 2 Investigates Police Secrecy Behind Unmanned Aircraft Test.” 11.21.2007. www.click2houston.com/investigates/14659066/detail.ht ml. 19. Gutiérrez, Kris. “Drone Gives Texas Law Enforcement Bird’s-Eye View on Crime.” 11.16.2011. www.foxnews.com/us/2011/11/16/drone-gives-texas-law-enforc ement-birds-eye-view-on-crime. 20. DHS. Montgomery County adds drone to arsenal.” 11.15.2011 www.home landsecuritynewswire.com/srlet20111115-montgomery-county-adds-drone-to-arsenal. 21. Sofge, Erik. “Houston Cops’ Test Drone Now in Iraq, Operator Says.” 10.01.2009. www.popular mechanics.com/science/space/4234272. 22. “Houston, Texas to Deploy UAV Speeding Ticket Drones.” TheNewspaper. com. 11.23.2007. www. thenewspaper.com/news/20/2084.asp. 23. Meeks, Brock, N. “‘Eyes in the sky’ for Homeland security.” MSNBC. 8.27.2005. www.msnbc.msn.com/id/9069787. 24. “Dade Cops Waiting To Get Crime Fighting Drone Airborne.” 3.09.2011. http://miami.cbslocal.com/2011/03/09/dade-cops-waiting-to-get-crime-fighting-dron e-airborne. 25. Warwick, Graham. “AeroVironment’s Nano Hummingbird Flies!” 2.17.2011. www.aviationweek.com/aw/blogs/defense/index.jsp?plckController=Blog&plckScript =blogScript&plckElementId=blogDest&plckBlogPage=BlogViewPost&plckPostId= Blog:27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post:8fbf 39df-4ba9-45a0-aa20-9fd58 ed57693 & http://www.youtube.com/watch?v=96WePgcg37I. & http://hplusmagaz ine.com/2009/09/16/darpa-funds-nano-uav-hummingbird. 26. “Honeywell Wins FAA Approval for MAV.” Flying Magazine, Vol. 135., No. 5, May 2008, p. 24. 27. Reuters. “CIA exhibits spy gadgets with Bond edge.” CNN. 10.28.2003. www.cnn.com/2003/TECH/10/28/tech.cia.reut. 28. http://en.wikipedia.org/wiki/Insectothopter. 29. http://robotics.eecs.berkeley.edu/~ronf/MFI/index.html. 30. Thompson, Mark. “Unleashing the Bugs of War.” 4.18.2008. www.time.com/ 39 time/nation/article/0,8599,1732226,00.html. 31. La Franchi, Peter. “Flight International. UK Home Office plans national police UAV fleet.” Flight Global. 7.17.2007. www.flightglobal.com/articles/2007/07/17/ 215507/uk-home-office-plans-national-pol ice-uav-fleet.html. 32. “Showcase protest: Smoking WC ‘worst thing’ at Moscow rally.” Russia Today. 12.10.2011. https://www.rt.com/news/showcase-protest-moscow-bolotnaya- 517.

weaintgottimetobleed.com/vault

40

TWO

TRAFFIC AND PEDESTRIAN SURVEILLANCE

Road spy cams

Enforcement cameras

Traffic enforcement cameras are used to catch motorists that run red lights, exceed the posted speed limit, that use bus lanes and car pool lane improperly. These traffic camera systems are being utilized in many of the major cities throughout the United States as well as other countries around the world. The reason often cited for installing these devices, is to reduce the number of traffic accidents and related injuries. In general, these traffic violation cameras seem to contribute to the reduction of injuries related to running red lights and speeding violations. However, their use most often evokes a certain amount of disapproval from many drivers and in some cities the people have petition the government to remove them.1

ATS

The largest photo enforcement company in North America is American Traffic Solutions which serves more than 230 customers and with more than 2,100 installed (3,000 contracted) camera systems throughout the United States and Canada. Its president and CEO, James Tuton, pioneered the road safety camera industry in the United States with the first Speed Safety Camera program implemented in Paradise Valley, Arizona in 1987. Intersection Safety Cameras followed nearly 10 years later. As the market has matured and grown, so has ATS. ATS is the largest provider of road safety programs to America’s big cities, including: New York City and Nassau County, New York; Philadelphia, Pennsylvania; Washington, D.C.; St. Louis and Kansas City, Missouri; San Diego, California; Seattle, Washington; Fort Worth, Irving and Arlington, Texas; New Orleans and Baton Rouge, Louisiana; Memphis, Tennessee; Fort Lauderdale, Florida; and Tucson, Mesa, Glendale and Scottsdale, Arizona. ATS also provides Canada’s 41 largest Intersection and Speed Safety Camera program in Calgary, Alberta. 2

Iowa

Automated traffic enforcement systems designed to improve public safety and monitor vehicle speeds got the green light to continue operations in Iowa from a Senate panel in February 2011. A three-member Senate Transportation subcommittee heard testimony for and against cameras used by law enforcement in five Iowa communities to identify speeding and/or red-light violations before deciding 2-1 not to advance a bill that would impose a statewide ban on the use of automated traffic enforcement systems and terminate existing systems currently in use. Lt. Jeff Hembera of the Cedar Rapids Police Department said crashes at the city’s most-dangerous intersections that are monitored by cameras dropped by 40 percent from 2009 to 2010, while accidents on Interstate 380 are down 54 percent and there have been no deaths since speed-monitoring cameras went up last year. In Cedar Rapids, $2.5 million was generated by the cameras in the first seven months the cameras were turned on. Cedar Rapids received $1,583,225 in revenue from the cameras during the first sevens months after they were installed. Another $1,017,900 went to camera vendor Gatso USA, a Beverly, Massachusetts-based firm. Gatso said the number of red-light citations issued by traffic cameras in Cedar Rapids dropped by 60 percent in the first seven months. 3 Red light and speed cameras generate millions of federal reserve notes for Big Brother. He is installing thousands of them around the world to raise revenue for his tyranny. He does not care about safety. Many of his minions have a sincere desire to make the roads safe, but their concerns have nothing to do with spy cameras. If Big Brother truly cared about the safety of the people he would give auto makers tax breaks to produce crash-proof vehicles and let the people decide whether they want to drive a crash-proof vehicle or a death trap. There is no politician who cares about car safety in America except Ralph Nader who unfortunately has never won an election. The truth is the politicians in America (Republicans and Democrats) do not care about the safety of the American people. If they did they would do something about the incredible death toll on the roads.

42 Car Crash Stats

Auto deaths per year:

2009 – 33,808 2008 – 37,261 2007 – 41,059 2006 – 42,642 2005 – 43,443 2004 – 42,836 2003 – 42,643 2002 – 43,005 2001 – 42,196 2000 – 41,945 4

Virtually all of these lives could have been saved if the American people demanded auto makers make crash-proof vehicles. Until WE THE PEOPLE demand crash-proof vehicles this needless slaughter will go on and on. Should the federal government be waging a war against traffic fatalities? Should the federal bureaucrats and politicians be more concerned over the 30,000 plus Americans who die every year in auto accidents than the threat of another 911 terrorist attack? Ten times as many Americans die each year than perished on September 11, 2001. Since that tragic day about 400,000 Americans have died in traffic accidents. Even if you think billions of dollars must be spent each year to battle the dreaded Al Qaeda terrorist organization should we not spend more money than we are on reducing traffic fatalities?

Traffic monitoring cameras

Caltrans

Caltrans has over a thousand cameras monitoring freeway sections across California. Anyone can select the section of California they are interested in, then view the live streaming videos of traffic available for that region. 5

Frequently asked questions

What are those cameras I see on the freeways?

43 Closed-Circuit Television Cameras are being installed on many freeways in urban areas. The pictures are beamed into our Transportation Management Centers across the state, where the images are used to verify reported incidents and to dispatch the appropriate response. We are making some of these pictures available on this web page so commuters can make informed decisions as to when to take a trip on the freeway. Does Caltrans save the videos to use for other purposes? We don’t save any of the videos. Do you monitor speeders with the videos? There are strict guidelines regarding the use and transmission of these pictures. They are strictly for traffic management use only, not for law enforcement. Why don’t you offer all your cameras on the web? We would like to, but Caltrans has hundreds of cameras monitoring California freeways. Adding a camera to our site requires extra equipment and setup for each camera. We’re offering as many cameras as we have bandwidth and equipment for right now. 6 Each state will eventually have thousands of traffic monitoring cameras on its freeways, highways and city streets. Those millions of cameras will be connected to Automatic number Plate Recognition software allowing Big Brother to put a single license plate number into the system and if that car is on the road anywhere in America he will quickly know where it is. Eventually traffic monitoring cameras around the world will be connected giving Big Brother the ability to pick out any car on the road 24-7.

Santa Monica Mountains, California

Ashley Wilson was stunned when she got four tickets in the mail totaling $700. A hidden camera had captured her infractions on video. “I was totally shocked,” she said. The stop-sign camera is one of seven scattered in parks along the Santa Monica Mountains that have surprised Southern California road warriors used to seeing red-light cameras and speed traps on their daily drives. During an 18-month period ending May 31, 2010, nearly 35,000 citations have been issued and the parks have collected nearly $2 million. But the nation’s first stop-sign cameras, introduced in 2007, have angered critics who think they’re another aggressive government tactic to squeeze money out of motorists. 44 The cameras operated by Redflex Traffic Systems are activated when a sensor in the road detects a vehicle moving faster than 7 mph approaches a stop. The camera captures the rear license plate of cars that do not stop and an administrative ticket is issued to registered car owner. 7

Medina, Washington

Medina, a city of 3,100 with an average household income of $222,000 and hometown of has installed an elaborated Big Brother spy camera network. The city council took this draconian action because there were 11 burglaries in the previous year of 2008. Cameras installed at Medina intersections monitor every vehicle coming into the city. The cameras capture all license-plate numbers, in a crime-prevention measure that one council member says “outweighs concern over privacy.” It has new signs posted at the entrances to its Big Brother conclave warning: “You Are Entering a 24 Hour Video Surveillance Area.” Under the “automatic license plate recognition” project, once a car enters Medina, a camera captures its license-plate number. Within seconds, the number is run through a database. If a hit comes up for a felony – say, the vehicle was reported stolen or is being driven by a homicide suspect – the information is transmitted instantaneously to police, who can “leap into action,” said Police Chief Jeffrey Chen. All captured information is stored for 60 days – even if nothing negative turns up, he said. That allows police to mine data if a crime occurs later, Chen said. Doug Honig, spokesman for the American Civil Liberties Union of Washington, said such a system smacks of privacy violations. “Government shouldn’t be keeping records of people’s comings and goings when they haven’t done anything wrong,” he said. “By actions like this, we’re moving closer and closer to a surveillance society.” Medina City Councilman Lucius Biglow said crime prevention “outweighs concern over privacy.” “Privacy is considerably less nowadays than it was, say, 50 years ago,” he said. “I think most of us are pretty well-documented by the federal government ... simply because of the Internet and credit cards.” A 2005 city survey showed that nearly a half of Medina’s residents agreed with the camera installation. In 2007, the City Council unanimously approved moving forward. The city looked to nearby 45 Hunts Point as an example. The peninsula-shaped residential community just north of Medina has been using a video-camera setup to record a continuous loop of car traffic in and out of town for more than three years and not a single resident has complained about it. “We’re not elitist at all,” Council member Robert Rudolph said. “There is a of people in Medina of all economic strata. What we’re doing here is protecting our citizenry.” 8

New York State

The closed-circuit television systems (CCTV) system is critically important throughout New York State. It is a valuable source of traffic condition information that is provided to the media and the public. The New York State Department of Transportation has CCTV along certain state roadways as part of its Intelligent Transportation Systems (ITS) program. Using technologies such as CCTV systems, traffic detectors and electronic message signs, employees can monitor and collect information on traffic conditions, manage traffic, quickly detect incidents, dispatch the proper response and provide motorists advance notice of congestion, reducing the possibility of secondary accidents and allowing motorists to consider alternate routes, modes or travel times. NYSDOT policy requires that CCTV systems not be used to collect personal identifier information. 9

New Jersey

The New Jersey Department of Transportation uses cameras on state highways to help traffic flow as efficiently and safely as possible and to handle emergencies. You can watch any or all of its cameras at – www.state.nj.us/transportation/traffic/cameras

Edmonton, Canada

One can view the traffic monitoring cameras in the city of Edmonton, Canada at – www.edmontontrafficcam.com/default.aspx

Your own traffic camera

Anyone can purchase and set up their own traffic camera by going to – www.earthcam.net/transportation 46 Automatic number plate recognition

Automatic number plate recognition (ANPR) or license plate recognition (LPR) is being used by police departments around the world. As of 2006, the technology allows police to automatically scan license plates at one per second on cars traveling up to 100 mph. Police can use them in the patrol cars and in permanent locations. ANPR is also used for electronic toll collection on pay-per-use roads and the monitoring of traffic.

United Kingdom

ANPR technology was invented in 1976 at the Police Scientific Development Branch in the United Kingdom, and prototype systems were working by 1979. Yet some courts have ruled that the ANPR systems violate a person’s privacy. The Federal Constitutional Court of Germany ruled that the laws permitting the use of automated number plate recognition systems in Germany violated the right to privacy. The UK has an extensive (ANPR) automatic number plate recognition CCTV network. Effectively, the police and Security services track all car movements around the country and are able to track any car in close to real time. Vehicle movements are stored for 5 years in the National ANPR Data Centre to be analyzed for intelligence and to be used as evidence. 10 In 1997 a system of one hundred ANPR cameras, codenamed GLUTTON, was installed to feed into the automated British Military Intelligence Systems in Northern Ireland. Further cameras were also installed on the British mainland, including unspecified ports on the east and west coasts. 11

UK SPECS speed cameras

SPECS average speed camera systems utilize state of the art video system with Automatic Number Plate Reading (ANPR) digital technology consisting of a minimum of two cameras each fitted with infra red illuminators fitted on gantries above the road, so they can work day or night. SPECS speed cameras work out the vehicles average speed, given the time it takes to drive between the two camera positions. Groups of cameras can be linked to create a speed controlled network.

47 As vehicles pass between the entry and exit camera points their number plates are digitally recorded, whether speeding or not. Then, by ANPR recognition, the images on the video of matching number plates are paired up, and because each image carries a date and time stamp, the computer can then work out your average speed between the cameras. The locations within the Speed Camera Database can be viewed at www.speed camerasuk.com/specs.htm

UK Billboard Spy Cameras

An advertising campaign in the United Kingdom began using automated number plate recognition (ANPR) cameras to identify passing vehicles and create personalized advertisements. The motor oil giant Castrol UK Limited activated a set of five electronic billboards in London in 2009 that flash an image of the exact type of Castrol-brand motor oil appropriate for the nearest vehicle. The roadside digital billboards, seventeen feet wide and eight feet high, are owned by Clear Channel Outdoor. Castrol’s campaign added the license scanning technology which ties into the official UK Driver and Vehicle Licensing Agency (DVLA) database. The agency provides private registration information to just about any company willing to pay for it. ANPR cameras are used by law enforcement and private companies throughout the United States and the UK with no established legal framework limiting their use. Big Brother is keeping a very close eye on you while you drive. In America many cities have traffic monitoring video cameras at most major intersections. These cameras are allegedly designed to monitor the flow of traffic, but they can be used to spy on specific individuals. Eventually there will be so many road spy cameras that no one will be able to drive a vehicle without being spotted. If you think you will be able to drive around anonymously forget it. 12

United States

Long used in Europe, ANPR technology is currently in use in all 50 states in America and it is helping to combat the flow of drugs, illegal currency and weapons across the U.S.- Mexico border.

48 U.S. Customs and Border Protection awarded a contract in October worth as much as $350 million to increase its use along the border, where thousands of license plates are processed by the system every day. The relatively simple technology consists of cameras, either mounted on police cars or at a stationary location, capable of capturing and processing more than 100,000 license plate images an hour. Plate numbers are automatically run against “hot list” databases of stolen, suspicious or crime-related vehicles, said Capt. Kevin Reardon of the Arlington, Va., Police Department. “It’s quick and efficient,” Reardon said. “Officers can do their jobs better and catch more bad guys.” In Arlington, license plate readers lead to at least one arrest a day. There are 200 mobile cameras in the capital region, and a number of stationary cameras in Washington D.C. and Maryland.13

Chicago

Surveillance cameras on high-crime Chicago street corners are equipped with new software that makes it easier to catch bad guys who drive or park nearby – by scanning the license plates of up to 3,600 parked or moving vehicles an hour. “The Chicago Police Department is exploring the idea of installing Big Brother software on 300 ‘blue light’ cameras – along with the possibility of adding the plate-reading function to video cameras now installed in 30 squad cars to record traffic stops.” “The plate readers have scanned 2.3 million license plates, resulting in 148 arrests, 15 narcotics seizures and the recovery of 310 vehicles. People were nailed for everything from criminal sexual assault, public indecency and domestic battery to auto theft and armed robbery. In several instances, narcotics and rifles were recovered.” 14

Berkeley

In response to growing complaints from residents in areas drawing excessive visitors and parked cars, the city of Berkeley will implement a pilot Residential Parking program to increase the rate of turnover parking in the North Willard and Bateman neighborhoods within the next few months. The program will outfit parking enforcement vehicles with license plate recognition software in lieu of the current system of chalking cars 49 to monitor parking in two-hour zones. The program targets the two neighborhoods as they house two of the city’s largest employers – UC Berkeley and Alta Bates Summit Medical Center. Using chalk as the only two-hour parking enforcement has been ineffective, as some people tend to wipe it off or just move their cars forward a few feet instead of permanently leaving the area, according to Councilmember Kriss Worthington. He added that the new program would prevent such action. “Instead of the meter people having to chalk the tire, they would take a picture of the license plate,” he said. “When they come back around and scan it in again they can see you’re in the same place.” 15

Vehicle spy cameras

Honolulu buses

In 2007 the city of Honolulu began using surveillance cameras on city buses to “provide a sense of security for drivers and passengers, reduce criminal activity and reduce liability complaints.” Bus drivers opposed the plan. “The cameras really should be to monitor the perimeter of facilities and the people going onto the bus, not to monitor the operator or employees,” said Ron Kozuma, president of Local 996. “It’s like anybody else – how would they feel if they were watched by their boss for 8 hours a day or 10 hours a day. I think that’s unreasonable working conditions to be under. The company has an obligation to negotiate those types of things with the union, which they have not.” Honolulu would joined a growing list of cities with bus surveillance equipment that includes San Francisco, Cleveland, Philadelphia and Chicago. 16

Parents watch teen drivers

Parents in three Midwestern states will soon know just how good – or bad – their children’s driving is when they take the car for a drive. In February 2007 American Family Insurance offered customers with teen drivers free cameras that record what happens when a sudden change in the vehicle’s movement occurs. The cameras record the action inside and in front of the car in 20-second audio-video clips. The clips are transmitted by cellular technology to Drive Cam, a San Diego company that analyzes the clips for risky behavior. Parents can receive 50 a report on their children’s driving and view the clips on a home computer. Automobile accidents are the leading cause of death among U.S. teens, according to the National Highway Traffic Safety Administration. “At the end of the day, there will be fewer accidents,” said Rick Fetherston, vice president for public relations at American Family. American Family said it will test the system out by offering it for free for one year to 30,000 families in Wisconsin, Indiana and Minnesota. The aim of the pilot program is to see whether the system results in fewer accidents. If the system is proven to prevent accidents then customers who volunteer to use it might see their insurance premiums drop. Bruce Moeller, president and CEO of DriveCam, says his company’s system is already being used by companies with fleets of vehicles. “Some of our clients are all touting a 30% to 90% reduction in their risky driver events,” said Moeller. 17

Assembly Bill 1942 - Vehicle Dashboard Camera

For those of us concerned about the Government’s continuing expansion into areas of individual privacy, this has the potential to be another nightmare: Lawmakers are considering controversial new legislation that would allow vehicles to be equipped with dashboard cameras to record the moments leading up to accidents. The proposed law (AB1942) allows devices to record video, audio, how fast and which direction the vehicle is traveling, a history of where your car has been, steering and brake performance and seat belt usage. The devices would record in a continuous loop and would only save information if there is unusual vehicle motion or a crash. They could also be capable of transmitting the information to a central control center the moment of the accident. 18 The local CBS television station posted an article about this bill but took it down. It is only a matter of time before Big Brother requires all vehicles to have dashboard cameras in them so he can watch his subjects as they drive about their merry ways. He plans to watch you 24-7, in the privacy of your home, your vehicles, your workplace, on the streets and every shop, restaurant and place you visit.

51 Taxis in Oxford to have CCTV cameras installed

Oxford City Council plans to ensure all of its 600-plus cabs are fitted with at least one CCTV camera to record all conversations between passengers. Julian Alison, spokesman for Oxford City Council, said the new CCTV rules for taxis “would mean that video and audio would run all the time within the vehicle.” “There are laws in place (data protection, human rights, CCTV code of practice) that require the viewing of such images to be necessary and proportionate, and therefore must relate to a specific complaint/ incident/investigation,” she said. “The officers are not permitted to view any images that do not relate to the actual matter being investigated. “The risk of intrusion into private conversations has to be balanced against the interests of public safety, both of passengers and drivers.” “Oxford City Council considers that so long as clear notices are provided in vehicles which inform passengers that video and audio recording may be taking place, the risk of intrusion is acceptable compared to the public safety benefits. “In any event, the level of privacy reasonably to be expected in a licensed vehicle is far lower than that expected in the privacy of ones home or own car. “The fact that the recordings will be encrypted and only accessible in the event of a police investigation or investigation into a complaint against a driver are added safeguards.” Alison added that the footage will not be routinely viewed, but will be kept for 28 days on a CCTV hard-drive in case it is needed following a specific incident. The City Council said, “This means that they will have to consider whether insisting on the installation of CCTV would be justified as a proportionate and reasonable response to tackling and preventing crime and ensuring public safety. “As well as assessing the impact on privacy, we have accepted they can take into account factors such as the likelihood of crimes being committed against drivers and passengers; the vulnerable one-to-one situation; the fact that taxis are travelling all over the area at different times of day; and CCTV can protect both the driver and passengers.” All taxis licensed for the first time by the council must have the equipment installed from April 6 next year, while cabs which are

52 already registered will have until April 2015 to get the kit fitted, the council said. Alison explained why the CCTV system is a must for Oxford: “Oxford City Council is committed to ensuring the safety of those who live in, work in, and visit the city and through the implementation of schemes such as CCTV in licensed vehicles, Oxford is seen to be leading the way in providing a safe environment for all. CCTV is commonplace in buses and trains, and taxis and private hire vehicles are also public vehicles. “Such a scheme will promote the use of taxis and private hire vehicles in the city and enhance the confidence of those needing to undertake a journey and provide a safer environment for our licensed drivers.” The civil liberties campaign group Big Brother Watch said it will complain to the Information Commissioner over the scheme, which will record all conversations from once the engine is running until 30 minutes after the ignition is switched off. Nick Pickles, the campaign group’s director, said: “This is a staggering invasion of privacy, being done with no evidence, no consultation and a total disregard for civil liberties. Big Brother now has big ears, and they are eavesdropping on your conversations with absolutely no justification.” 19 It should be noted that the oldest university in the English speaking world, Oxford University (circa 1096), is headquartered in Oxford. It is the leading Big Brother/New World Order think tank in the world. Big Brother always launches its tyrannical schemes in its own conclaves. It is inevitable, but all vehicles (public/private) will eventually be required to have spycams in them which Big Brother will have access to 24-7.

Cameras in police cars

LAPD puts cameras in its squad cars

The Los Angeles Police Department plans to install cameras in 300 squad cars in South L.A. The police hierarchy argue that the long- awaited move will provide evidence of illegal behavior by suspects and police officers. Police Commission President John Mack said in-car videos have been a “a very top priority” for the civilian panel that oversees the LAPD. He noted that the federal judge who monitored reforms at the

53 department wanted cameras in its police cars, particularly to help weed out any racial profiling. The department’s spent $5.5 million to place cameras in 300 South L.A. police cars by the end of the summer of 2010. Police Chief Charlie Beck hopes to convince the City Council to spend another $20 million in 2011 to put cameras in all 1,600 LAPD cars, now that digital technology allows the department to more easily store and retrieve thousands of hours of video. “One of the holy grails that we are trying to here is being able to watch streaming video from the dash-cams of police cars, ya know, in my bedroom or wherever I need to see it,” he said. Putting cameras in police cars is an excellent use of Big Brother technology. It keeps Big Brother’s minions from framing law-abiding citizens and it can be helpful in weeding out corrupt police officers. This is a case where Big Brother gets a taste of his own medicine. 20

LAPD cruisers have infrared cameras & license plate scanners

AOL’s Translogic caught a sneak peek of the new squad car of choice for the Los Angeles Police Department: the Chevrolet Caprice Police Patrol Vehicle (PPV). Billed as the “sum total of all the law enforcement community has learned about patrol cars to date” by the report, the PPV boasts a 6.0L V-8 engine with 355 horsepower, 18-inch steel wheels, and a host of gadgets that puts any Hollywood squad car to shame. The Caprice, which replaces the long-used Ford Crown Victoria, is equipped with an infrared night vision camera, automated license plate scanner, and a touch-screen center console that replaces the older computers traditionally used by officers. In addition to horsepower and firepower, the cruiser is also outfitted with the latest in information technology, with ethernet, Wi-Fi and an experimental wireless-mesh network in the trunk. Even the bad guys can ride in comfort: cut-outs in the back seat are custom-made to accommodate any handcuffed suspect. LAPD officials say vehicle wrapping was used on all-black sedans instead of traditional paint to minimize repair expenses and protect resale value. This brings the expected taxpayer cost to be about $20,000. Drivers can expect to see the new 2012 Chevrolet Caprice PPV cruising city streets as early as mid-2011. 21-22

54 Macon County

Macon Police Chief Mike Burns said his goal is to install a camera in every marked car in the police fleet. To outfit all marked cars, the department will need about 100 more cameras. The cameras installed last week cost $3,218 each and were purchased using a combination of grant funds and the department’s own budget. 23

Road Cam Car Video Recorder

Road Cam Car Video Recorder Gadget. Basically an economical mini digital camcorder, this is designed to be mounted on a car dashboard, and enables you to capture video or images of road situations. Useful for insurance purposes or even law enforcement. Or even just for fun! Turn the camera to inside the car/taxi to record the suspected passenger, good for unsafe taxi passenger recording, Record TAXI robbery. Built in red laser pointer for aiming the camera’s line of sight. Download your videos by connecting to PC via USB – plug and play under Windows XP Records video on SD card (not supplied) up to 2GB. Using the provided AV cable you can connect the camera to a car monitor such as a Car DVD Player and view the video capture live. 24

Auto black boxes

Intelligent cars fitted with black boxes that can send video footage and information about driving behavior during accidents to the police and insurance companies are being developed by Intel. The boxes will record information about the vehicle speed, steering and braking along with video footage from inside and outside the vehicle. The information will be sent to police and insurance companies in the event of an accident to make it easier to determine the cause of car crashes and identify the person responsible. The device forms part of an intelligent car envisaged by researchers at Intel. They are developing technology that will transform cars into smart vehicles that are able to detect dangers on the road and even take over control from motorists. They have been in discussions with car manufacturers about developing cars that are permanently connected to the internet and other vehicles using wireless technology. Camera systems that can recognize street signs and then take over control of a car if the motorist 55 tries to drive the wrong way up a one-way street are being developed for use in vehicles. On board sensors will also be able to detect pot holes in the road and report their location to road maintenance authorities as the car is moving. These smart-cars of the near future will also be able to track the location of surrounding vehicles and alert drivers if they get too close or try to change lanes when another vehicle is in their blind spot. Motorists will even be able to use their mobile phone or computer to lock and unlock their car remotely, turn on the alarm and even start the engine to warm it up. “The intelligent vehicle is what we are talking about here,” said Justin Ratner, director of Intel Labs and chief technology officer. “Once a car is connected, more or less on a continuous basis, all sorts of interesting possibilities present themselves. With vision systems on cars, it is perfectly reasonable for a car on its own to see the sign that says ‘wrong way’ or ‘do not enter’ and bring the vehicle to a halt at the side of the road so we don’t have these senseless accidents where someone has failed to recognise a sign. We have talked to highway maintenance departments about using sensors that are already in cars to report the GPS coordinates for pot holes in the road to the maintenance department.” 25

Cop cams

The San Jose police department was the first in the nation to test out a technology to help officers collect evidence and protect themselves from false allegations of misconduct – the “cop cam.” They were put into service in November of 2009. 26 Base Products wants a deal with a cable network for a police reality show using the AXON head-mounted camera. Base, the producer of “Human Wrecking Balls” and “Fight Science,” is working with Taser, the camera’s Scottsdale, Arizona-based manufacturer, to produce the television show. 27 Eventually all police departments in the world will use “cop cams.” It is even conceivable that in the future Big Brother may require everyone to wear a “mini-cam” while out in public. It would make crime almost non-existent, especially if there is a severe penalty for not wearing one. We can also imagine a future in which Big Brother forces every home to have a spy camera in each room. He will also require

56 that every vehicle have one so he can watch everyone at home, in their vehicles and in public. No one will have any privacy ever. Big Brother wants spy cameras in all vehicles those of his obedient minions also. Whether you are a minion or one of the unwashed masses Big Brother will be watching you.

Pedestrian surveillance

‘Minority Report’ digital billboard ‘watches consumers shop’

A “Minority Report” styled digital billboard that targets consumers using customised advertising based on their demographics is being developed by Japanese researchers at the Nippon Electric Company (NEC). Cameras instantly identify a shopper’s age and gender as they walk past. The facial-recognition system, called the Next Generation Digital Signage Solution, then offers consumers a product it thinks is suited to their demographic. Company officials claim the images of customers faces would be immediately erased, but critics warned it was an invasion of privacy. The technology is being trialed in America later this year and, if successful, could be rolled out in other areas around the world. 28 Copcams are excellent tools both in the cruisers and on cops. They document police brutality. All police departments should equip all cruisers and cops with the copcams. After each shift the video must be downloaded to a civilian authority which can review the videos. The police must NOT have access to the videos. The civilian authority must have the power to discipline cops who abuse their authority and commit crimes. If this procedure were followed by ALL departments police brutality would cease.

Pedestrian spy cameras

VIRAT

To be in public is to be on camera, but most video footage is discarded, as only so much can be sorted and analyzed, until now. DARPA has created a technology that can index and analyze video in real-time, marking the end of anonymity in public places . In 2008, DARPA, the US military’s elite group of dvientists, began soliciting the tech industry to develop technologies that would allow 57 computers to sort through and index surveillance footage from the military’s fleet of drones, satellites, and miscellaneous other secret spy cameras. This was all part of the Agency’s proposed Video Image Retrieval and Analysis Tool (VIRAT) that would be able to describe specific human activities in real-time. This automated index would allow for searchable queries (i.e. “how often did an adult male taller than six-foot get in a car in the early morning between November 1st and December 22nd in this compound in Abbottabad?”) or flag behavior such as when someone carries a large package towards a car on the side of a road in Basra, but walked away empty handed. DARPA has had some success and issued contract announcement in May 2011, describing how the VIRAT system will be deployed into various military-intelligence video archives and systems. The contract will be fulfilled by Lockheed Martin for an unspecified amount. The military has an inherent interest in transferring surveillance duties from human eyeballs to an algorithm that cannot be swayed by political pressure. In the run-up to the Iraq invasion, human analysts famously misread surveillance footage as proof of Iraqi WMDs. (The problem with relying on flawed human analysis in order to support policy was described in depth in Malcolm Gladwell’s essay collection “What The Dog Saw”). As with many DARPA projects, the technology will eventually filter down into commercial industry and then finally to consumers. If the tech works as promised it will quickly be implemented in domestic surveillance programs . Much of the Western world has willingly traded privacy for the security of ubiquitous surveillance. Most riders on public transportation feel safer knowing that they are surrounded by cameras that are plugged in directly to some control room. Of course, a dedicated team of human observers could never effectively monitor all those screens covering an entire system, but with this new automated tech, authorities might be alerted to trouble. Additional facial- recognition software might compare a suspious person’s face to specific watch lists. Whether this Big Brotherly oversight makes you feel more or less safe is entirely up to you. Beyond surveillance, this automatic video tech could make all uploaded video searchable, regardless of tags or descriptors. As pocket- sized cell phones surpass the video technology of the camcorders of previous decades, we will all be captured on video and placed on the web on a regular basis. In the not-so-distant future, it may be possible for someone (your friends, potential employers, strangers, etc.) to 58 Google your name and find some incidental footage of you at that political protest from last summer that some stranger uploaded to YouTube. Everything that happens in public will be public record. 29

Intelligent street lamps to debut in 2011

Farmington Hills-based Illuminating Concepts launched its first “Intellistreets” concept installation in Farmington Hills in October 2011. Farmington Hills is using a federal grant to become the first site in the world to feature the Intellistreets system, a lighting pole system that combines energy conservation, homeland security features , audio entertainment, traffic control, advertising and more . Intellistreets amounts to an intelligent wireless network, completely concealed within the street light pole. Its lighting is variable for energy conservation, reacting to natural light, the environment, and wireless commands. It has sensors to monitor foot and vehicle traffic, and it LED screens. It can transmit information for emergency alerts, indicate evacuation routes, give Amber or hazardous environment alerts.30 On the web page of Illuminating Concepts public relations firm it explains in detail what the system can do. It is designed to “enhance public safety, inform residents and visitors, and connect commercial, residential, hospitality and entertainment components.” The Intellistreets components are: “lighting control, wireless communication, concealed audio and alert indication. Additional digital video signage and data acquisition components are available to further enhance functionality.” The concealed audio components can provide “background music, paging and announcements, emergency alert information, and even sirens.” The extra components of this system are:

Data Acquisition: A wide range of sensors can be added including weather and environmental sensors, toxic gas, radiation and other atmospheric monitoring and alert systems and the data can be transmitted to Homeland Security, emergency management and municipal operations. Future Features: In the future additional features are expected to come online such as downloadable maps and digital information packets for visitors, parking-meter capabilities, and even a portal to recharge hybrid or electric cars. 31

59 Identitypr.com which is handling the public relations campaign for Illuminating Concepts failed to say spycams and microphones can be installed in the lightpoles to snoop on pedestrians. Within 20 years most cities will have these Big Brother lightpoles equipped with Big Brother snooping technology. No one will be able to walk about town without being tracked, eavesdropped on and videotaped. These lightpoles may also have x-ray scanners in them to check pedestrians for weapons as they walk down the street. Those scanners are deadly. After a few dozen scans you will develop cancer and eventually die from it.

Big Brother can see through walls

The Massachusetts Institute of Technology’s Lincoln Laboratory has developed new radar technology that allow technicians to see through a solid wall. The 8½ feet long device consists of an array of antennae arranged in two rows. It is mounted onto a movable cart that can stand at a range from 15 to 40 feet from the location being observed. Researcher and leader of the project, Dr. Gregory Charvat, said the technology was developed so it could be used by U.S. soliders in war. “It can be powerful during military operations especially in urban combat situations,” he said. He said his vision is for soldiers to mount the device inside of a vehicle and use that as a sort of command center. The vehicle would then be parked around the corner or across the street from the target. Only moving images can be detected. They appear as red blobs moving about the screen The researchers are currently working on a detection algorithm that would convert these red blobs into a cleaner image. 32 Big Brother will use this in war, but the main use will be against civilians. Within one to two decades this gizmo will be shrunk down so it can be carried in a briefcase and operated by one man. It will become a super-tool for Big Brother to spy on Christians, Patriots and dissidents.

DARPA to collect ‘Physiological Signals’ through walls

DARPA, under request from the Defense Department, is developing technology to detect physiological signs through walls. 60 Via: Office of the Secretary of Defense/DARPA:

TECHNOLOGY AREAS: Information Systems, Biomedical, Electronics, Battlespace OBJECTIVE: Demonstrate the ability to collect, localize, and evaluate physiological signals (e.g., heart rate) at distances greater than 10 meters, non-line-of-sight, and through solid objects (walls, rock, concrete, etc.). DESCRIPTION: There is a need to remotely detect, collect, and evaluate physiological signals of interest. Applications and concepts- of-operations (CONOPs) that would benefit from this capability include, but are not limited to: building-clearing, warfighter health monitoring or battle damage assessment and triage, situational awareness and assessment. Existing micro-impulse radar (MIR) and ultra-wideband (U) technologies have the capability of detecting heartbeat and respiration at distances up to- 8 meters (1) but are limited in at greater distances and in challenging environments, such as penetration through thick or multiple walls, concrete, and RF-noisy environments. There is interest in counting and localizing the sources of multiple physiological signatures in a cluttered environment. For example, in a building that has experienced a catastrophic event (fire, earthquake, etc.), the detection of survivors and assessment of their medical condition, in addition to their location to within 1 meter accuracy, would improve the likelihood of recovery of personnel and their survivability. Additionally in a crowded environment it is highly challenging to uniquely identify persons based on collection of physiological signatures, such as electrocardiograms (ECGs). It is possible that high-frequency ECGs or other signals could improve the confidence level in unique identification. Approaches using “on body” sensors that transmit signals to remote locations will NOT be considered. 33 This technology would be fantastic for finding people who are trapped under rubble after a natural disaster or on the battlefield. BUT Big Brother will eventually use this in routine police work to determine how many people are in a building before they assault it or blow it up.

Conclusion

Big Brother wants to watch you every place you go in a vehicle or on the sidewalks. He is putting together a surveillance web that will be nearly impossible to escape. Within 20 to 30 years all vehicles, public 61 and private, will be required to have spy cameras inside and outside of them so Big Brother can watch everything you do and say in the privacy of your vehicle and see everything you see outside of it. When you step out of your vehicle he will watch your every step. As you enter an office building, shop, store, restaurant, library, museum, etc. he will continue to observe you. And when you return home he will be there to greet you and tuck you into bed.

Notes

1. Bryant, Lynn. “What are traffic enforcement cameras and how can they be avoided?” 3.23.2010. www.video-surveillance-guide.com/traffic-enforcement-camer as.htm. 2. www.atsol.com/about-us.html. 3. Boshart, Rod. “ Bill to ban traffic cameras in Iowa fails .” The Gazette. 2.10.2011. http://thegazette.com/2011/02/10/bill-to-ban-traffic-cameras-in-iowa. 4. http://en.wikipedia.org/wiki/List_of_motor_vehicle_deaths_in_U.S._by_year. 5. http://video.dot.ca.gov. 6. http://video.dot.ca.gov/faq.htm. 7. Nguyen, Daisey. “Stop-sign cameras catch Calif. drivers off guard.” Washington Post. 10.03.2010. www.washingtonpost.com/wp-dyn/content/article/201 0/10/02/AR20101 00201662.html. 8. Krishnan, Sonia. “Cameras keep track of all cars entering Medina.” Seattle Times. 9.16.2009. http://seattletimes.nwsource.com/html/localnews/2009873854_me dina16m.html. 9. https://www.nysdot.gov/divisions/operating/oom/transportation-systems/syste ms-optimization-section/ny-moves/traffic-cameras. 10. Smith, Emma & Gadher, Dipesh. “Spy cameras to spot drivers’ every move.” 11.13.2005. www.timesonline.co.uk/tol/news/article589690.ece. 11. http://en.wikipedia.org/wiki/ANPR. 12. The Newspaper. “UK billboards equipped with license-plate spy cameras.” 9.22.2009. www.thetruthaboutcars.com/2009/09/uk-billboards-equipped-with-license- plate-spy-cameras. 13. Steffen, Jordan. “License plate readers help police and Border Patrol, but worry privacy advocates.” LA Times. 12.26.2010. http://articles.latimes.com/2010/ dec/26/nation/la-na-license-reader-201 01226. 14. Spielman, Fran. “Chicago police cameras may scan plates for stolen cars, suspects.” Chicago Sun-Times, 11.14.2006. www.policeone.com/police-products/in vestigation/cameras/articles/1190979-Chicago-police-cameras-may-scan-plates-for- stolen-cars-suspects. 15. Randle, Kate. “City to Use License Recognition Software to Increase Parking Turnover.” Daily Californian. 3.07.2011. www.dailycal.org/article/112235/city_to_ use_license_recognition_software_to_ increase-parking-turnover. 16. Hao, Sean. “Cameras coming soon to Honolulu city buses.” Honolulu Advertiser. 5.25.2010. www.honoluluadvertiser.com/article/20100525/NEWS01/525 0336/Cameras+coming+soon+to+Honolulu+city+buses. 62 17. Dorell, Oren. “Cameras in cars keep watch on teen driving.” USA Today. 2.28.2007. www.usatoday.com/news/nation/2007-02-28-camera-cars_x.htm. 18. http://sacramento.cbslocal.com/local/video.cameras.cars.2.1849626.html. 18. www.city-data.com/forum/california/1053665-assembly-bill-1942-vehicle-das hboard-camera.html. 19. Mirror. “Taxis in Oxford to have CCTV cameras installed.” 11.14.2011. www.mirror.co.uk/news/top-stories/2011/11/14/taxis-in-oxford-to-have-cctv-cameras -installed-115875-23561711. 19. Taylor, Jerome. “CCTV taxi plan ‘a staggering invasion of privacy.’” 11.14. 2011. www.independent.co.uk/news/uk/home-news/cctv-taxi-plan-a-staggering-invas ion-of-privacy-6262221.html. 19. The self-proclaimed leading retailer of auto recorders is www.driverecorder. co.uk/taxi_cctv.htm. 20. Stoltze, Frank. “LAPD installing cameras in patrol cars - racial profiling a target.” 7.14.2010. www.scpr.org/news/2010/07/14/17260/lapd-finally-installing-cam eras-patrol-cars. 21. Moody, Brian. “In Detail: Chevrolet Caprice PPV.” 5.26.2011. http://translog ic.aolautos.com/2011/05/26/in-detail-chevrolet-caprice-ppv. 22. “2011 Chevrolet Caprice Police Patrol Vehicle taking over streets in 2011.” 10.05.2009. www.egmcartech.com/2009/10/05/2011-chevrolet-caprice-police-patrol- vehicle-taking-over-streets-in-2011. 23. Womack, Amy Leigh. “Improved police car cameras latest tool for Macon officers.” Macon.com. 2.07.2011. www.macon.com/2011/02/07/1441279/improved- police-car-cameras-latest.html. 24. http://ajoka.com/road_cam.htm. 25. Gray, Richard. “Intelligent cars will report accidents to authorities.” 7.03.2010. www.telegraph.co. uk/motoring/news/7870387/Intelligent-cars-will-report -accidents-to-authorities.html. 26. Brown, Claudia. “Cop Cams.” Fox News. 11.3.2009. http://onthescene.blogs. foxnews.com/2009/ 11/03/cop-cams. 27. James Hibberd. “New reality show features cop cams.” Hollywood Reporter. 12.22.2009. www.hollywoodreporter.com/hr/content_display/television/ news/e3i975 9cd94a98520c072a2379eadff72c0. 28. Hough, Andrew. Daily Telegraph. 3.10.2010. www.telegraph.co.uk/technol ogy/news/7411249/ Minority-Report-digital-billboard-watches-consumers-shop.html. 29. Dashevsky, Evan. “DARPA’s Automated Video Surveillance Will End Public Anonymity.” 5.05.2011. www.extremetech.com/article2/0%2c2845%2c2384968%2c 00.asp. 30. “Intelligent Street Lamps To Debut Friday.” (CBS, Detroit, 10.23.2011) http://detroit.cbslocal.com/2011/10/23/225836. 31. http://identitypr.com/pressrelease/illuminating-concepts/intellistreets-by-illumi nating-concepts. 32. Tejada, Alicia. “MIT Develops New Radar Technology: Military Could See Through Walls.” ABC News. 10.20.2011. http://abcnews.go.com/Technology/radar- technology-mit-walls/story?id=14773871. 33. Cryptogon. “ DARPA Wants to Collect ‘Physiological Signals’ at a Distance and Through Walls .” 11.20.2011. http://cryptogon.com/?p=26064 .

63

TexeMarrs.com

64

THREE

HOME, SCHOOL AND OFFICE SURVEILLANCE

Home surveillance

Security cameras

The city of Chicago is allowing residents to install security cameras that are connected to Chicago’s 911 center. Nearly two dozen colleges, businesses and high-rises have agreed to share their video with the 911 center to create a panoramic view of disaster scenes. They include Boeing, Macy’s, the Chicago Mercantile Exchange, the Chicago Board Options Exchange, Blue Cross-Blue Shield, Golub & Company, JPMorgan Chase Bank, Sears Tower, Prudential Plaza, the Cook County Administration Building, Rush Hospital, Columbia College, Harold Washington College, St. Xavier University, DePaul University, Roosevelt University, Ike Sims Village and an association of State Street merchants. The public-private Internet hookup will transmit fully encrypted video that cannot be compromised by computer hackers. It was made possible by software tied to Operation Virtual Shield. That’s the security grid that linked existing fiber optics into a single network and paved the way for hundreds more surveillance cameras, sophisticated software capable of spotting suspicious behavior and for mass transit cameras to be monitored by the 911 center. Considering the enthusiastic response in the first two months, City Hall is confident that hundreds of private cameras ultimately will be added to the city’s network. “Besides the inevitable of what happened on 9/11, we see now that we have to reach out to forge a partnership with the private sector, and they see that, too,” said Jim Argiropoulos, deputy executive director of the city’s Office of Emergency Management and Communications. “We’re here for a common cause: to enhance security,” he said. “They see that partnering with us and expanding the camera network is a win-win in terms of safety and security for Chicago.” 1 It will only be a matter of time before Big Brother will convince most Americans that they should have their home, business and office 65 security cameras hooked into the local police department. He will convince people that if the police can monitor your security cameras they will be safer. Once this insidious snooping becomes ubiquitous Big Brother will then mandate it by law. After that he will force all home owners, apartment owners, businesses, factories and stores to install interior security cameras that will be monitored by the police. At that point Big Brother will be able to keep an eye on everyone 24/7. He will also make spycams mandatory in all public and private vehicles, planes and ships. It is only a matter before all privacy is eliminated.

Laptop spy cameras

Big Brother wants to watch you in the privacy of your own home and he is doing this through the Internet. Tucked away in a 1,200-page bill now in Congress is a small paragraph that could lead distance-education institutions to require spy cameras in their students’ homes. It sounds Orwellian and no one in Congress objects to it. The paragraph is actually about clamping down on cheating. It says that an institution that offers an online program must prove that an enrolled student is the same person who does the work. The bill is spurring some colleges to try technologies that authenticate online test takers by reading their fingerprints, watching them via Web cameras, or recording their keystrokes. Some colleges claim there are advantages for students: The devices allow them to take tests anytime, anywhere. Many students must now travel to distant locations so a proctor can watch them take exams on paper. 2 66 Public school staff spy on students at their home

The federal prosecutor investigating the case of a Pennsylvania school district that spied on its students via remote-controlled laptop cameras says the school district won’t face criminal charges in the case. U.S. Attorney Zane David Memenger said in a statement that there is no evidence the Lower Merion School District, in suburban Philadelphia, had any criminal intent when it remotely activated cameras on laptops issued to students. “For the government to prosecute a criminal case, it must prove beyond a reasonable doubt that the person charged acted with criminal intent,” Memeger said, as quoted at Information Week. “We have not found evidence that would establish beyond a reasonable doubt that anyone involved had criminal intent.” The issue came to light in February, when the parents of Harriton High School student Blake Robbins filed a class-action lawsuit alleging the school district invaded Robbins’ privacy by filming him in his home through his school-issued laptop. It emerged later that the school district photographed Robbins 400 times in a two-week period, in various states of undress and even during his sleep. Investigators found that the remote-controlled cameras took some 56,000 pictures of Lower Merion School District students over a two- year period, with the cameras sometimes left on for weeks at a time. 3

Motion detectors

Brick House Security and other companies are providing in home motion detectors to keep occupants safe. The detectors allow Brick House employees to know whether the client has gotten out of bed, what room he is in, if he falls down or leaves his home. Clients are also provided panic buttons to alert security companies of any problems. The detectors can also alert the sercurity company if there is an intrusion. The security personel can notify paramedics, the police or dispatch their own employees to a client’s home in case of an emergency. These security companies provide an excellent service for the elderly, disabled or anyone who needs surveillance 24-7. This is what Big Brother plans for everyone. Motion detectors will be required in every domicile and then surveillance cameras will be mandatory in every room, the garage and outside so Big Brother can watch everything everyone does 24-7 in order to keep them safe and secure.4 67 Cable spy cameras

Comcast

Comcast plans to install cameras in its cable boxes to watch subscribers in their homes. At the Digital Living Room Conference in 2008, Gerard Kunkel, Comcast’s senior VP of user experience, said the cable company is experimenting with different built-in camera technologies to identify those in the room. The box recognizes the subscriber and makes recommendations or pulls up shows already in his profile. If parents are watching television with their children, parental controls could appear to block certain content from appearing on the screen. Kunkel said this type of monitoring is the “holy grail” because it could help serve up specifically-tailored ads. 5 Eventually, cable boxes, satellite boxes, televisions and computers will have cameras in them that will provide two-way communication. The idea of the government watching people in their homes is as old as George Orwell’s book, 1984 , written in 1948 and published in 1949. The cable companies are training field employees to spy on customers. When they see something unusual they report it to the police department. 6 If Big Brother is not spying on you already through your cable box he will be watching you through your laptop, desktop, PDA, Blackberry, iPad, iPhone, ThinkPad or whatever computer you have.

Computer spying

Bureaucrats in Germany are routinely planting malicious spyware on computers in seemingly innocuous emails. The spyware allows them to access the private communications of the owner and even to spy on the owner in the privacy of his own home or office. The monitoring of internet telephone communications is allowed by German law, but this spyware that is being used by some law enforcement agencies is “capable of much more intrusive snooping,” raising serious concerns about the potential for a “Big Brother” level of surveillance. The Computer Chaos Club, a hacker group, published details of their examination of spyware planted on a laptop in Bavaria. It found that the spyware – developed by DigiTask for the Bavarian police – was capable of much more than just monitoring internet phone calls. It could take screenshots, remotely add files and control a computer’s 68 microphone or webcam to monitor the person’s home . The authorities insist that they did not deploy these functions. 7 The day will come when Big Brother will mandate that all cell phones and computers must have video cameras and microphones built in and they must have spyware installed that will allow him to eavesdrop and watch every owner 24-7.

Google snooping

Google Maps Street View

Google Maps Street View has been highly criticized as an invasion of privacy. This addition to Google Maps provides eye-level views of many streets in the United States and Europe. The images are taken from cars driving along public streets, but they have inadvertently caught private moments such as the interior of a house, burglar activity and people visiting strip clubs. One couple even sued Google for invasion of privacy, but lost. 8

Google plans to keep watch over you

Google is working on a computer monitoring system that will watch people at work and tell them how to do their job and much more. The computer-vision system can watch a hospital room and remind doctors and nurses to wash their hands, or warn of restless patients who are in danger of falling out of bed. It can, through a computer-equipped mirror, read a man’s face to detect his heart rate and other vital signs. It can even recognize signs of severe pain, the onset of delirium or other hints of distress. A woman’s expressions as she watches a movie trailer or shops online can be analyzed, and help marketers tailor their offerings accordingly. Computer vision can also be used at shopping malls, schoolyards, subway platforms, office complexes and stadiums. “Machines will definitely be able to observe us and understand us better,” said Hartmut Neven, a computer scientist and vision expert at Google. “Where that leads is uncertain.” (It will lead to a Big Brother dictatorship.) Google has been both at the forefront of the technology’s development and a source of the anxiety surrounding it. Its Street View service, which lets Internet users zoom in from above on a particular

69 location, faced privacy complaints. Google has agreed to blur out people’s homes at their request. Google has also introduced an application called Goggles, which allows people to take a picture with a smartphone and search the Internet for matching images. The company’s executives decided to exclude a facial-recognition feature, which they feared might be used to find personal information on people who did not know that they were being photographed. (Big Brother is using that technology.) The future of law enforcement, national security and military operations will most likely rely on observant machines. A few months ago, the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s research arm, awarded the first round of grants in a five- year research program called the Mind’s Eye. Its goal is to develop machines that can recognize, analyze and communicate what they see. Mounted on small robots or drones, these smart machines could replace human scouts. “These things, in a sense, could be team members,” said James Donlon, the program’s manager. Millions of people now use products that show the progress that has been made in computer vision. In the last two years, the major online photo-sharing services – Picasa by Google, Photo Gallery by Microsoft, Flickr by Yahoo and iPhoto by Apple – have all started using face recognition. A user puts a name to a face, and the service finds matches in other photographs. It is a popular tool for finding and organizing pictures. , an add-on to Microsoft’s 360 gaming console, is a striking advance for computer vision in the marketplace. It uses a digital camera and sensors to recognize people and gestures; it also understands voice commands. Players control the computer with waves of the hand, and then move to make their on-screen animated stand-ins – known as avatars – run, jump, swing and dance. Since Kinect was introduced in November, game reviewers have applauded, and sales are surging. If the results at Bassett prove to be encouraging, more features can be added, like software that analyzes facial expressions for, said Kunter Akbay, a G.E. scientist. This technology could be beneficial: a person thinks twice and a crime goes uncommitted. Yet it could also lead to a society that is less spontaneous, less creative, less innovative (The main purposes of Big Brother spy cameras is to compel people to be mindless emotional robots.) 70 Google’s Goggles application lets a person snap a photograph with a smartphone, setting off an Internet search. Take a picture of the Eiffel Tower and links to Web pages with background information and articles about it appear on the phone’s screen. Take a picture of a wine bottle and up come links to reviews of that vintage. Google could have put face recognition into the Goggles application but it decided against it because smartphones can be used to take pictures of individuals without their knowledge, and a face match could retrieve all kinds of personal information – name, occupation, address, workplace. “It was just too sensitive, and we didn’t want to go there,” said Eric E. Schmidt, the chief executive of Google. “You want to avoid enabling stalker behavior.” 9 You can be assured that Big Brother is using facial recognition software to do what Google does not want the little people to do. Many researchers believe that Google is a front company for the NSA and CIA.

Google wants to control your home

First Google dominated the Web with search. Then it ruled mobile devices with Android. Now Google wants to control everything inside your home. At its annual I/O developers conference in San Francisco in May of 2011, the company previewed Android@Home, a future platform that will allow you to interact with practically any electronic device you own using Google. Connected devices like home media equipment, dishwashers, cars, and lights could soon be able to be controlled using the new platform. “We’d like to think of your entire home as an accessory, or better yet as a network of accessories, and think of Android as the operating system for your home,” said Joe Britt, head of the Android@Home team. Android@Home was developed as an open protocol that can be used by any connected device and controlled by any wireless device or computer, including non-Android devices like Apple’s iPhone or Microsoft’s Windows PCs. Google’s partners say that while they expect Android devices to be the first to use the new platform, other mobile device makers will follow suit. 10

71 Spy meters

Smart meters could become a ‘ spy in the home ’ by allowing social workers and health authorities to monitor households. Doretta Cocks, founder of the Campaign for Weekly Waste Collection, said: “This is Orwellian. We’re already under surveillance for what we put outside the home in bins and now we could be watched for what we’re doing inside as well. 11

CCTV cameras

Thousands of schools around the world have installed Closed-circuit television systems (CCTV) to monitor the behavior of the students and the teachers. It is only a matter of time before all public and private schools have cameras in the classrooms, halls and recreation areas. Everything students and teachers do and say will be recorded.

Home watch

Chicago and Houston

Orwell’s homeland of England has the largest surveillance network in the world, but other nations are racing to catch up. Two mayors in America want to install an elaborate network of surveillance cameras. In late 2004, Chicago’s mayor Richard Daley announced plans to install a network of surveillance cameras in the city. The initial network of 2000 cameras has an infinite capacity. The mayor of Houston plans to set up a surveillance network there, including cameras in private homes. 11 Chicago mayor Daley also wants to install surveillance cameras in private businesses, and then in offices, apartments and even homes. “Under the plan, private businesses that remain open more than 12 hours a day and bars that remain open until last call would have to install the cameras also. The bill as written now would not require that businesses hook up their mandatory cameras to city networks, but Chicago Tribune reports that eventually, ‘the city does plan to link cameras in office and apartment buildings and other private properties to its system.’” 12 Big Brother will get his way if WE THE PEOPLE do not say NO! He wants surveillance cameras in every building on the planet, including your home. WE must oppose this insanity! 72 School surveillance

Classwatch

Schools have installed CCTV cameras (Closed-circuit television) and microphones in classrooms to watch and listen to pupils as young as four. The Big Brother-style surveillance is being marketed as a way to identify pupils disrupting lessons. Classwatch, the firm behind the system, says its devices can be set up to record everything that goes on in a classroom 24 hours a day, and be used to compile evidence of wrongdoing. 13

Students’ food choices are monitored

A new technology allows parents in 29 states to monitor what their children are eating at school. Ben Hooks, CEO of Education Management Systems Inc. (EMS), a K-12 administrative software company headquartered in Wilmington, N.C., said that about half of North Carolina’s schools use the monitoring system. Other states with schools using the system include Pennsylvania, California and Virginia. For a mere $10 fee, Moore County Schools in North Carolina lets parents access their child’s food choices and expenses. The program allows parents to view their child’s 45-day purchase history. It is available 24 hours a day, 7 days a week on the Web site – www.lunchprepay.com. The 22 cafeterias of the Moore County Schools are linked on one server, where all transactions are recorded, monitored and available for viewing once parents register in the system. The program was created to fight childhood obesity. According to the Institute of Medicine of the National Academies, over the past three decades, child obesity has more than doubled for preschool children from 2 to 5 years old and adolescents from 12 to 19 years old. For children ages 6 to 11, obesity has more than tripled.14

Cafeteria spy cams

School officials in Texas are hoping surveillance cameras in the cafeteria will help them fight childhood obesity. High tech cameras have been installed in lunch rooms in San Antonio to capture what kids are eating, and what food is being left behind.

73 Digital imaging analysis of the snapshots will then calculate how many calories each student consumed. The two million dollar project, which is funded by the Department of Agriculture, is the first of its kind in America. Parents will have to sign a permission slip before their child is photographed. Researchers hope parents will change eating habits at home once they see what their kids are choosing in school. 15 This is a good idea, but Big Brother will morph this into a school- wide surveillance program. Eventually all public schools in America will have spy cameras in every cafeteria, office, classroom, hallway and playground. Big Brother will become omnipresent at school, home, the office, factory, retail store, restaurant, gas station, park, ballpark and the streets.

High school spy cameras

High school teachers in Australia are calling for surveillance cameras to be installed in all high schools to help stem a rising tide of violence. State School Teachers Union members at Morley Senior High School want the Education Department to place at least five video surveillance cameras in all district and senior high schools . Western Australia Secondary School Executives Association president Rob Nairn said use of surveillance cameras should be considered if they were found to be effective in deterring antisocial behavior. “I think we should use the technology where appropriate,” he said. “ You certainly wouldn’t have them in classrooms. That’s overkill.” (Emphasis added) The Education Department said it had no plans to install cameras in every school. Security head John Marapodi said that only 57 schools had closed-circuit television cameras. 16

United Kingdom school spy cameras

Hundreds of primary and secondary schools across England intend to install CCTV cameras in classrooms over the next five years to root out bad teachers and check up on naughty pupils. The decision was made after a test had been conducted in the Stockwell Park high school located in a deprived south London neighborhood. Two cameras were placed in each of its 30 classrooms 74 and another 40 in its canteen, corridors and playgrounds. Classwatch was the company that supplied the cameras. Classwatch says hundreds of schools have expressed an interest in installing cameras in classrooms over the next five years. Its managing director, Angus Drever, says 94 schools in the UK already use its high- definition cameras in their classrooms at a cost of £1,345 a year for the lease of two cameras in a classroom, including maintenance. “The children are very happy here because they know they are on a school site where they are safe,” said Stockwell Park’s deputy head- teacher, Mike Rush. “They are in a position where they are not going to be robbed and harassed and so on. The parents are very happy with it. We’ve had no complaints from the teachers ... they were the ones who suggested the cameras as a solution to people coming into the building, and disputes and problems with theft.” Leading head-teachers have labeled the surveillance networks in classrooms “ Big Brotherish ” and the expenditure of tens of thousands of pounds on the cameras “inappropriate.” 17(Emphasis added) It will only be a matter of time before Big Brother mandates that all public schools have surveillance cameras installed.

Surveillance cameras in Australian schools

Parents are lobbying to install closed-circuit television on school grounds in Australia, as concern mounts about bullying and harassment between students, the Advertiser reported. They believe the CCTV cameras, which would not cover classrooms or change rooms, do not breach privacy regulations; but the South Australian Education Department and teachers say there are better ways to control student misbehavior. “Parents are conscious of privacy concerns – nobody wants to create a Big Brother environment in public schools,” said SA Association of State School Organisations director David Knuckey. “However, with the prevalence of bullying and the devastating effects it can have on children, parents are going to give serious consideration to any idea that may help the school deal with these behaviour-related problems.” (Emphasis added) In 2010 Western Australian teachers called for surveillance cameras to be installed across the state, to protect them from violent outbursts from students and parents. The WA State School Teachers Union put

75 forward a motion to have at least five video surveillance cameras installed in all schools. 18

Spy cameras in school restrooms

Lipson School in Plymouth, England, removed the CCTV cameras in the students’ restrooms after vociferous protests from pupils. Principal Steve Baker said contractors fitted them on the orders of another staff member, who did not have the measure approved by him or school governors. “Someone made an error,” he said. “They had no authorisation from me or from the governors to install these cameras. There was quite rightly a perception that there could be an invasion of privacy, even though the cameras were not aimed at the cubicles. The students have used their voice effectively and maturely. We are grateful to the students who raised it with us in a mature way and to their parents.” He explained that there was no particular problem with toilet bullying or vandalism that would have required surveillance. “The students were telling us that if there had been a problem they could have understood it,” he said. He added that no one would be disciplined over the error. “It’s a learning situation, not a disciplinary one.” 19 It will only be a matter of time before all public and private schools in the United Kingdom put spy cameras in restrooms. Eventually all schools throughout the world will have spy cameras in every room including the restrooms.

Playgrounds and elevators to have CCTV in Korea

Surveillance cameras became mandatory on all apartment playgrounds and elevators in South Korea by July 2008. The Ministry of Land, Transport and Maritime Affairs revised a housing construction law to make it compulsory for all underground apartment parking lots, elevators, playgrounds and building entrances to be covered by surveillance cameras. The move was prompted by a raft of kidnappings involving children earlier this year. 20 It is no wonder Big Brother has spy cameras in his brainwashing factories. He keeps an eye on all of his minions and future minions. When Big Brother takes overt control of the world the children will be his most loyal subjects.

76 Office surveillance

Police tap into business cameras

The Sacramento Police Department will soon have more eyes on the streets by partnering with public and private entities to tap directly into existing surveillance cameras across the city. Officers say this will allow them to get to surveillance video more quickly. “There are hundreds of cameras across Sacramento and if we can tap into just some of those it will give us more eyes on the streets,” said Sacramento Police Department Sgt. Norm Leong. They say they will not be watching the new cameras live but will review tape after a crime is committed. 21

Conclusion

Big Brother is working triple overtime to get spycams in every factory, office, shop, store, public building and home. He will not be satisfied until he has a spycam in every room of every building on Earth. Do not fall into his trap thinking spycams are for your safety. He hates you and wants you dead. The millions of spycams all over the world are operating 24-7 to watch your every move. The only threat to Big Brother is WE THE PEOPLE ! To see what life may be like in the future read Eric Blair’s masterpiece 1984 or watch any of the “Max Headroom” TV shows.

Notes

1. “Homeowners can link private cameras to city’s surveillance network.” Chicago Sun Times. 9.29.2008. http://chicago.cbslocal.com/2011/02/08/aclu-blasts- chicagos-network-of-cameras & www.suntimes.com/news/24-7/1190403,CST-NWS - cameras29.article. 2. Spielman, Fran. “New 911 chief wants private-sector cameras to link in.” 4.07.2010. Chicago Sun Times cited by RestoretheRepublic.com. http://restorethere public.com/top-stories/new-911-chief-wants-private-sector-cameras-to-link-in.h tml. 3. Foster, Andrea L. “New Systems Keep a Close Eye on Online Students at Home,” 7.25.2008, Volume 54, Issue 46, Page A1. http://chronicle.com/free/v54/ i46/46a00103.htm. 4. www.youtube.com/watch?v=RUHMoXbPJ-o&feature=relmfu. 5. Tencer, Daniel. “No criminal charges for school that spied on kids through laptops.” Raw Story. 8.19.2010. www.rawstory.com/rs/2010/08/no-charges-school- spied-kids. 6. Albrecht, Chris. “Comcast Cameras to Start Watching You?” Newteevee.com. 3.18.2008. http://newteevee.com/2008/03/18/comcast-cameras-to-start-watching-you. 77 7. Dowling, Siobhan. “German authorities plant spyware on citizens’ computers.” 10.27.2011. www.globalpost.com/dispatch/news/regions/europe/german y/111027/spyware-scand al-germany. 8. “Google Earth’s Street View: Public Boon or Privacy Invasion?” www.engin eeringdaily.net/google-earths-street-view-public-boon-or-privacy-invas ion. 9. Lohr, Steve. “Computers That See You and Keep Watch Over You.” New York Times. 1.01.2011. www.nytimes.com/2011/01/02/science/02see.html?pagewan ted=1. 10. Goldman, David. “Google Wants to Control Your Home.” Money.com. 5.11. 2011. http://money. cnn.com/2011/05/11/technology/google_android_at_home/index. htm?source=zacks. 11. Jamieson, Alastait. “Smart meters could be ‘spy in the home’” Daily Telegraph. 10.11.2009. www. telegraph.co.uk/finance/newsbysector/energy/6292809/ Smart-meters-could-be-spy-in-the-home.html. 12. Plummer, James. “Chicago, Houston Consider Cameras in Private Businesses, Homes.” Human Events. 2.28.2006. www.humanevents.com/article.php?id=12683. 13. Lewis, Jason. “Big Brother CCTV to spy on pupils aged four - complete with CPS evidence kit.” Daily Mail. 12.28.2008. www.dailymail.co.uk/news/article- 1102205/Big-Brother-CCTV-spy-pupils-aged-complete-CPS-evidence-kit.html. 14. Maeser, Nadine. “New Web Site Monitors Kids' Food Choices in School Cafeteria.” 8.15.2009. http://abcnews.go.com/Technology/Parenting/story?id=83231 70&page=1. 15. “Cameras videotape the eating habits of school children.” 5.12.2011. www.my foxboston.com/dpp/news/national/cameras-videotape-the-eating-habits-of-school-chil dren-20110512. 16. Hiatt, Bethany. “Push for cameras to stop bullies.” Australian News. 5.28.2010. http://au.news.yahoo.com/thewest/a/-/breaking/7305726/push-for-cameras -to-stop-bullies. 17. Shepherd, Jessica. “Someone to watch over you.” The Guardian. 8.04.2009. www.guardian.co.uk/ educat ion/2009/aug/04/schools-cctv-surveillance. 18. Keller, Candace. “Parents want CCTV cameras in playgrounds.” The Advertiser. 11.09.2010. www.news. com.au/national/parents-want-cctv-cameras-in- playgrounds/story-e6frfkvr-1225949697692. 19. Pub defends toilet cameras as a means of tackling drug use. 4.08.2008. www.yorkpress.co.uk/news/2178968.pub_defends_toilet_cameras_as_a_means_of_ tackling_drug_use. 20. Chosumilbo. “Playgrounds, Elevators Required to Install Surveillance Cameras.” 5.16.2008. http://english.chosun.com/w21data/html/news/200805/200805 160010.html. & http://infowars.net/articles/may20 08/160508Playgrounds.htm. 21. CBS 13. “Sac Police To Tap Into Business Security Cameras To Deter Crime.” 3.05.2011. http://sacramento.cbslocal.com/2011/03/04/sac-police-to-tap-into- business-security-cameras-to-deter-crime .

78

FOUR

CITY SURVEILLANCE

Cities around the world are installing spy cameras to keep a very close watch over its residents and tourists. Some cities like New York and London have so many surveillance cameras people are watched almost everywhere they go.

Lancaster, Pennsylvania

The growing number of closed-circuit cameras that monitor Lancaster, Pennsylvania, are run by a private group of citizens, unlike the United Kingdom’s government-run CCTV system. It is run by a private non-profit group that does not directly report to any government agency. The Lancaster Community Safety Coalition hires private citizens to monitor the activity caught on camera and report any suspicious activity to police. Although proponents of the cameras point out that they have helped with the prosecution of crimes such as murder, assault, prostitution and public drunkenness, the crime rate in Lancaster actually rose while the cameras were being used. Lancaster might be the most closely watched town in America but it is nothing compared to many cities in the U.K. which is widely known as one of the most monitored places on Earth, with older estimates putting the number of closed circuit cameras at roughly 4.8 million. According to a 2002 article from BBC News, a U.K. citizen is caught on tape 300 times a day. Yet with all this surveillance crime rates have decreased slightly in only half the cities in the UK with the spy cameras. According to the Los Angeles Times, a UC Berkeley study found that the cameras installed in San Francisco may have helped prevent property crimes, but had little or no effect on violent crimes. In some U.S. cities the cameras have been rejected. Cambridge, Massachussetts, decided not to use cameras it had purchased in an effort to preserve the privacy of its citizens. Some residents of

79 Lancaster are threatening to move out of town if its network of cameras continues to grow. 1 The only way to stop the explosion of spy cameras is for WE THE PEOPLE to tell city hall, “NO MORE!” Get some Patriots together and speak with the mayor and city council. If they laugh you out of their dung heap vote them out.

Spy cameras in an Arizona park

Surveillance cameras in the 13-acre, $4.6 million Gateway Park in El Mirage, Arizona, allows the city’s assistant police chief Bill Louis to watch the park from his desk, operating a zoom lens so powerful he can see softball players, picnickers and potential crime suspects two blocks from a camera. Louis can also watch the video from the night shift supplied by Iveda Solutions, which operates the cameras and whose employees monitor the park from 10 p.m. to 6 a.m. “I defend the Constitution, and I’m concerned about Big Brother , too,” explained Louis. “But when we’re talking about a public park, historically, from a police department perspective, it’s a police problem location,” he said. “It’s one thing to have privacy in a place where there’s an expectation of privacy, but that’s not one of them. And I’ve never had anybody make an issue out of Big Brother or issues of privacy with cameras in the park. Certainly the benefit of having that outweighs any concern there would be, in my opinion.” (Emphasis added) In Tempe, live photos of people strolling on Mill Avenue pop up on the city’s website every 15 seconds, taken from the “ Sneaky Peak ” camera barely visible atop a nearby building. A rapidly spreading network of cameras is keeping watch on Phoenix-area residents. Over the past decade, government-operated closed-circuit-television cameras have sprung up in city libraries, pools and parks. Photo-enforcement cameras scan downtown streets and highways, casting the shadow of Big Brother across the Valley. The appearance of CCTV cameras in Arizona is part of a trend in electronic policing designed to increase security and deter crime. It has become popular with government agencies in other states and countries, but it also has raised an outcry over invasion of privacy. In Pennsylvania, a 15-year-old boy is suing a school district in suburban Philadelphia after it used webcams on laptops to snap nearly

80 56,000 photos of students who took the computers home. The district said it was trying to track lost and stolen laptops. In Britain, an estimated 4.2 million CCTV cameras track citizens so closely that a privacy watchdog estimates that people are captured on film in big cities 300 times a day. In Vancouver, British Columbia, nearly 1,000 cameras were installed for the 2010 Winter Olympics to monitor crowds. The cameras in the Valley are not that prevalent, but Chandler’s downtown library has 26 security cameras. In the public pool in Mesa, high-tech infrared cameras observe your movements as they monitor for vandalism and trespassing. Cameras on light-rail trains help the drivers keep an eye on what is happening inside and outside the cars. Alessandra Soler Meetze, executive director of the ACLU in Arizona, noted that Department of Homeland Security grants and grants from private companies have offered strong incentives for local governments to install cameras quickly and for a variety of purposes. Without safeguards, Meetze warns, Phoenix could become a “surveillance society,” with cameras in every public space and citizens having to cope with constant monitoring. A stimulus grant from the Department of Transportation is paving the way for a $90,000 camera system to watch cars on Glendale’s streets and show traffic conditions. The City Council approved the installation without discussion in October. At Iveda Solutions’ headquarters large plasma-television screens are divided into 16 squares. In one corner, a camera shows the lobby of a local small-town police station. Another shows a Michigan truck yard. Feeds from cameras in retail shops, parking lots and construction sites spread out across five other large monitors. One of them keeps track of the park in El Mirage. David Ly founded the video-surveillance business about five years ago. It outfits companies with cameras, has employees who monitor the feeds overnight and sets up remote access so that business owners can view the footage on personal computers and cellphones. The company can monitor images for about $2 to $3 an hour per camera, saving customers about 75 percent of the cost of hiring a security guard, Ly said. He also offers a portal to law enforcement to view live feeds. If a business is being robbed, police can see who is inside, where they are and what weapons they have. “These departments have less staff, and with the cutbacks in staff, it doesn’t mean you and I need any less service. So we’re providing 81 electronic policing,” Ly said. “It’s not about intrusion; it’s just leveraging the technology to be somewhere when you cannot send a staff out there.” As the number of cameras viewing the public increases, the technology also is advancing. Anyone with a smartphone can record friends and strangers and upload those photos and videos to the Internet for public consumption, giving people less control over their personal exposure. Sometimes that benefits law enforcement. To police and other authorities, the increase in camera surveillance could be good news: People will be less likely to deface neighborhoods with graffiti, drive dangerously or use drugs in public places. But critics see a downside: Most people being watched are doing nothing wrong and have no reason to be observed. Law professor Sandy Askland of Arizona State University compared the rapidly growing network of surveillance to that in Eastern Europe before the fall of the Berlin Wall, where the government had spies in the community and paid informants to identify potential dissenters. The ultimate result, he said, could be censored conversations and a society in which people are afraid to offer their opinions.2 Professor Askland is correct. When virtually every square inch of habitable land on Earth is monitored by spy cameras in space, the air and on the ground the behavior of most people will be dramatically altered for the worse. That is what Big Brother wants. He wants to turn people into self-centered snitches who will rat anyone and everyone out for money or to get ahead. He wants the world to become an East Germany Stasi nightmare!

CEDAP

Lower Township Police Chief Edward Donohue announced that the Department of Homeland Security will provide the Lower Township police in Cape May, New Jersey, with a Real Time Video Surveillance System through the Army’s Commercial Equipment Direct Assistance Program (CEDAP). The system consists of several cameras that send live video to police headquarters or vehicles several miles away. Donohue states the system will be utilized for police surveillance operations, tactical operations, and to monitor critical infrastructure. For security reasons he would not reveal the exact number of cameras or their complete capabilities, but said the system is free of charge at no cost to taxpayers. He also 82 confessed that this was the third time the department had utilized this program previously receiving Thermal Imaging Night Vision Equipment and Fiber Optic Cameras from the program, all at no cost. 3

Big Brother is watching the parks in NYC

“Big Brother may soon be watching – at your local playground.” This is how Rich Calder began his article about the installation of CCTV cameras in New York City’s parks. NYPD and Parks Department officials say it is only a matter of time before parks throughout the city are equipped with crime-fighting surveillance cameras. “It’s not a matter of if we are going to use the technology but when we are going to use this technology,” Deputy Parks Commissioner Kevin Jeffrey said during a recent City Council hearing on park safety. 3

NYC ring of steal

The New York Police Department plans to install hundreds more video surveillance cameras around Manhattan and the entire city. The “Ring of Steel” video surveillance project covers Lower Manhattan, home to the financial district that is seen as key to the regional, national and international economy. A similar project will cover Midtown Manhattan. This is the latest phase in New York City’s evolution into one of the most heavily-monitored cities in the world. Past estimates of the number of private and public video cameras range up to 40,000 – only London and the Chinese city of Shenzen have more electronic eyes watching public streets. The NYPD has applied for $75 million in federal funds from the Homeland Security Grant Program. Of that, $21 million is intended for the Midtown Manhattan Security.4

London ring of steel

The “ring of steel” is the popular name for the security and surveillance cordon surrounding the City of London that was installed in the 1990s to deter the IRA and other threats. The term was borrowed from an earlier stage of the Troubles when the center of Belfast was fortified against attacks, the perimeter of which was known as the “ring of steel.” The roads leading into the one-square mile district in greater 83 London are controlled by concrete barriers allowing police to regulate the flow of traffic. 5 Big Brother wants to install a “ring of steel” in every city on Earth. He wants enough cameras in space, the sky and on the ground to cover every square inch of the planet.

United Kingdom

Spying on citizens is out of control in England. Their movements are tracked by more than 4,000,000 CCTV cameras and about 8000 traffic cameras. In 2009, authorities plan to spy on homes using planes equipped with thermal imagining cameras to catch energy gluttons. 6 The British government launched a trial program in 2009 designed to keep watch of problem families with closed-circuit television (CCTV) cameras in 2000 homes. It hopes to expand the program to 20,000 or more homes. “£400 million ($668 million) will be spent on installing and monitoring CCTV cameras in the homes of private citizens to make sure the kids are doing their homework, going to bed early and eating their vegetables.” Bureaucrats hope that if a child has a more stable home life, he may not turn to crime and drugs. The government is also maintaining a private army called “Thought Police,” which will “be sent round to carry out home checks.” The most troublesome families can be taken out of their homes and moved to a neutral, government-run compound where they will be under 24-hour supervision .7 This mad rush to watch everything citizens do in public will accelerate. Virtually every city will have thousands of cameras monitoring vehicle and pedestrian traffic. Privacy will become a thing of the past. Most nations will also recruit and pay citizens to spy on their neighbors as they are doing in Britain. 8 They will also pay children to spy on their parents, and they will encourage parents to spy on their children. 9

Spy cameras in U.K. pub toilets

The Rose & Crown, in Lawrence Street, is the first pub in York, England, to introduce CCTV inside its toilet cubicles. Drug use in the pub was so bad that some people entered through the backdoor, going straight into the ladies’ room to buy drugs, without drinking at the bar. “We have the cameras in the cubicles, but they only 84 look up from a certain height. When people are sitting down, you can’t see anything at all. We have signs up too, which the police have seen,” said manager Sarah Coates. She assured customers they could not be viewed while on the toilet. The cameras were motion-sensitive and only switched on when they detected motion in the area above and behind the toilets. Coates said CCTV had not been installed in the men’s restroom because they had not had the same problems with drugs. “The men were going into the women’s and in fact were selling drugs in there,” she explained. 10

Conclusion

Big Brother wants to watch everyone when they walk out of their domiciles. He wants to be able to track everyone wherever they go whether it is for a walk, a bike ride, a drive in a private vehicle, a ride in a taxi, limousine, ambulance or police car, a flight in a plane or a cruise on a ship or in a boat. He will have the technology in place to do this within one to two decades. He will not stop with watching your every move outside your home. He will have spycams everywhere to watch you no matter what kind of building you enter, private or public.

Notes

1. Drogin, Bob. “Lancaster, PA, keeps a close eye on itself.” 6.21.2009. http://articles.latimes.com/2009/jun/21/nation/na-spycam-city21. 1. Lovett, Haley, A. “Small US town watched by private network of cameras. Finding Dulcinea.” 6.24.2009. www.findingdulcinea.com/news/technology/2009/Jun e/Small-US-Town-Watched-by-Private-Network-of-Cameras.html. 2. Boehnke, Megan. “Web of cameras raising privacy concerns.” The Arizona Republic. 5.01.2010. www.azcentral.com/arizonarepublic/news/articles/2010/05/01/ 20100501phoenix-cameras-privacy-fears.ht ml. 3. Cape May Herald. “Lower Police to Get Surveillance Cameras from Army Program.” 7.03.2008. www.capemaycountyherald.com/article/30965-lower-police- get-surveillance-cameras-army-program. 4. Calder, Rich. KEEPING AN ‘EYE’ ON PARK CRIMES CAMERAS COMING SOON, LIKE IT OR NOT. 2.11.2008. www.nypost.com/p/news/regional/ item_svmlQtzHRwliPVWLyD840O;jsessionid=319CB6C88090F1A3E60FDEE2AA 5514D5. 5. Winston, Ali. “The Eyes Have It: NYPD Plans More Cameras.” 6.01.2010. www.citylimits.org/news/articles/3751/the-eyes-have-it#. 6. BBC. “‘Ring of steel’ widened.” 12.18.2003. http://news.bbc.co.uk/2/hi/uk_ news/england/london/3330771.stm.

85 7. Levy, Andrew. “Council uses spy plane with thermal imaging camera to snoop on homes wasting energy.” Daily Mail. 3.24.2009. www.dailymail.co.uk/news/article -1164091/Council-uses-spy-plane-thermal-imaging-camera-snoop-homes-wasting-en ergy.html. 8. Sorrel, Charles. “Britain To Put CCTV Cameras Inside Private Homes.” Wired. 8.03.2009. www.wired.com/gadgetlab/2009/08/britain-to-put-cctv-cameras-inside-pri vate-homes. 9. Daily Mail. “Nosy neighbours offered £500 rewards by council to spy on residents.” 7.27.2009. www.dailymail.co.uk/news/article-1202434/Nosy-neighbours- offered-500-rewards-council-spy-residents.html. 10. Foldvary, Fred E. “Children Spying Against Parents.” Progress Report. www.progress.org/fold157.htm. 11. Grimshaw, Gerran. “Pub defends toilet cameras as a means of tackling drug use.” 4.08.2008. www.yorkpress.co.uk/news/2178968.pub_defends_toilet_cameras_ as_a_means_of_tackling_drug_use.

StanDeyo.com

86

FIVE

TRACKING

Big Brother has numerous ways of tracking the movement of people, vehicles, planes, trains and ships, and he is using them to track as many people and moving objects as possible. Eventually he hopes to be able to track everyone and everything that moves on the planet.

Artist’s conception of GPS Block II-F satellite in Earth orbit.

GPS tracking of people

One of the favorite technologies of Big Brother is the tracking of people by Global Positioning Satellites (GPS), and Big Brother wants to put a GPS transmitter in or on every man, woman and child on Earth.

87 GPS wristbands

The tracking of children and adults with Global Positioning System satellites (GPS) is a fairly new technology that will soon become commonplace. Parents are using the technology to keep track of their children and some couples are using it to track each other’s whereabouts. At the same time government bureaucrats will be tracking as many people as possible. A wristwatch designed to track the movements of children is the latest gadget in “child monitoring” technology currently on the market. Increasingly, parents are turning to technology to monitor their children’s movements. The latest device is the Num8 digital wristwatch which enables parents to keep track of their children via satellite. The gadget is designed by the British company Lok8u. For £149 ($218), worried parents can keep an eye on their children’s whereabouts through a GPS chip hidden inside the watch. The chip can transmit the location of the child and alert parents by text as accurately as the name of the road which the child is sited. 1 A new piece of free Google software recently released allows people to keep track of each other using their cell phones – and while it is opt- in, it is sure to create a privacy firestorm. “What Google Latitude does is allow you to share that location with friends and family members, and likewise be able to see friends and family members’ locations,” Steve Lee, product manager for Google Latitude, told CNET. “For example, a girlfriend could use it to see if her boyfriend has arrived at a restaurant and, if not, how far away he is.” 2 Brick House Security is another company that is marketing GPS wristbands for children that will enable parents know to where their children are 24-7. These GPS locators can also be worn by adults. It is an excellent way of keeping track of an elderly person who has dementia or Alzheimer’s. 3 Tracking people will become a popular fad in the near future. Parents will track their children, spouses will track each other and so will friends. At the same time, Big Brother bureaucrats will be tracking as many people as possible. Eventually everyone on the planet will be forced to where a GPS transponder of some kind with many opting for the implantable GPS transponders. Anyone caught without one will be arrested and incarcerated with trial and some will be executed.

88 Schools are tracking students

Beginning in 2010 public schools begann tracking students with GPS transmitters to ensure their safety and attendance. A judge ordered 22 students at Bryan High School in Texas to carry GPS tracking devices in the name of preventing truancy. “Bryan High students who skip school will soon be tracked 24 hours a day, seven days a week,” reports KBTX.4 Palos Heights School District 128 has become one of the first in Illinois to begin using GPS to track schoolchildren riding buses to and from school each day. It had previously been using ZPass, a GPS technology provided by Seattle-based Zonar Systems, to track the buses, but now students are tracked with a luggage tag-sized unit in their backpacks that logs when they step on and off the bus. Palos School Superintendent Kathleen Casey says the system helps alleviate parents’ concerns. The district spent $16,000 for the technology, which currently covers 10 buses. Parents say the cost is minimal for the benefits. 5 Contra Costa County officials are outfitting preschoolers with tracking devices they say will save staff time and money. The system requires preschoolers to wear a jersey that has a small radio frequency tag. The tag will send signals to sensors located throughout the school that help track a child’s movements. It also keeps track of their attendance and whether they have eaten or not. School officials say it will free up teachers and administrators who previously had to note on paper files when a child was absent or had eaten. The system cost $50,000, but it was paid by a federal grant. 6 There was no safety issue to compel Big Brother to track students. This program was implemented because Big Brother wants to track all students from preschool to college with RFID technology. This was just the start. Look for it to spread.

Google GPS tracking of people

Google Latitude, a free piece of software released in February 2009, allows people to keep track of each other using their cell phones. It is designed to work on any cell phone with Internet capabilities – except the iPhone, one of Google’s competitors. Google is marketing it to help parents keep track of their children. Yet one could secretly install allowing girlfriends, boyfriends, husbands and wives to track each others’ movements. 7 89 If the average person can track someone what do you think Big Brother can do? He can track the whereabouts of everyone who has a cell phone as you will see in the next article. Remember, that Big Brother can not only track your every move he can eavesdrop on your every word. He can remotely turn on the microphone in your cell phone and listen to everything you say and hear. Big Brother is not only watching you, he is listening to you.

iPhone keeps tract of where you go

Privacy fears were raised as researchers reveal a file on iPhone and 3G-enabled iPads that stores location coordinates and timestamps of owner’s movements. Security researchers have discovered that Apple’s iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner’s computer when the two are synchronised. The file contains the latitude and longitude of the phone’s recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner’s movements using a simple program. For some phones, there could be almost a year’s worth of data stored, as the recording of data seems to have started with Apple’s iOS 4 update to the phone’s operating system, released in June 2010.

Map shows location data collected from an iPhone that had been used in the southwest of England. 90 “Apple has made it possible for almost anybody – a jealous spouse, a private detective – with access to your phone or computer to get detailed information about where you’ve been,” said Pete Warden, one of the researchers. Only the iPhone records the user’s location in this way, say Warden and Alasdair Allan, the data scientists who discovered the file and are presenting their findings at the Where 2.0 conference in San Francisco in April 2011. Although mobile networks already record phones’ locations, it is only available to the police and other recognized organisations following a court order under the Regulation of Investigatory Power Act. Standard phones do not record location data. Ministers of Paliament in 2009 criticized Google for its “Latitude” system, which allowed people to enable their mobile to give out details of their location to trusted contacts. At the time MPs said that Latitude “could substantially endanger user privacy,” but Google pointed out that users had to specifically choose to make their data available. The iPhone system, by contrast, appears to record the data whether or not the user agrees. Apple declined to comment on why the file is created or whether it can be disabled. The Guardian has confirmed that 3G-enabled devices including the iPad also retain the data and copy it to the owner’s computer. If someone were to steal an iPhone and “jailbreak” it, giving them direct access to the files it contains, they could extract the location database directly. Alternatively, anyone with direct access to a user’s computer could run the application and see a visualization of their movements. Encrypting data on the computer is one way to protect against it, though that still leaves the file on the phone. Apple can legitimately claim that it has permission to collect the data: near the end of the 15,200-word terms and conditions for its iTunes program, used to synchronise with iPhones, iPods and iPads, is an 86-word paragraph about “location-based services.” It says that “Apple and our partners and licensees may collect, use, and share precise location data , including the real-time geographic location of your Apple computer or device . This location data is collected anonymously in a form that does not personally identify you and is used by Apple and our partners and licensees to provide and improve location-based products and services. For example, we may share geographic location with application providers when you opt in to their location services.” 8

91 German politician admits cell phone tracking

German Green party politician, Malte Spitz, learned in 2010 that everyone in the world who carries a cell phone is continually being tracked. Cell phone companies do not divulge how much information they collect so Spitz went to court to find out exactly what his cell phone company, Deutsche Telekom, knew about his whereabouts. He was dumbfounded by what he learned. In just a six-month period from August 31, 2009 to February 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times. “At any given instant, a cell company has to know where you are; it is constantly registering with the tower with the strongest signal,” said Matthew Blaze, a professor of computer and information science at the University of Pennsylvania who testified before Congress on the issue. In the United States, there are law enforcement and safety reasons for cellphone companies being encouraged to keep track of its customers. Both the F.B.I. and the Drug Enforcement Administration have used cellphone records to identify suspects and make arrests. If the information is valuable to law enforcement, it could be lucrative for marketers. The major American cellphone providers declined to explain what exactly they collect and what they use it for.9

Notice at malls managed by Forest City Commercial Management

92 Malls track shoppers’ cell phones on Black Friday

Starting on Black Friday and running through New Year’s Day, two malls in America – Promenade Temecula in southern California and Short Pump Town Center in Richmond, Virginia – will track guests’ movements by monitoring the signals from their cell phones. The network that collects data from shopper’s cell phones, is said to be anonymous. It can track each shoppers’ path from store to store. The goal is for stores to answer questions such as: How many Nordstrom shoppers also stop at Starbucks? How long do most customers linger in Victoria’s Secret? Are there unpopular spots in the mall that are not being visited? While U.S. malls have long tracked how crowds move throughout their stores, this is the first time they have used cell phones to do the job. The management company of both malls, Forest City Commercial Management, says personal data is not being tracked. “We won’t be looking at singular shoppers,’ said Stephanie Shriver-Engdahl, vice president of digital strategy for Forest City. “The system monitors patterns of movement. We can see, like migrating birds, where people are going to.” The company is preemptively notifying customers by hanging small signs around the shopping centers. Consumers can opt out by turning off their phones. The tracking system, called FootPath Technology, has already been used in shopping centers in Europe and Australia. It works through a series of antennas positioned throughout the shopping center that capture the unique identification number assigned to each phone (similar to a computer’s IP address), and tracks its movement throughout the stores. The system cannot take photos or collect data on what shoppers have purchased. And it does not collect any personal details associated with the ID, like the user’s name or phone number. That information is said to be protected by mobile carriers, but can be legally obtained through a court order. Manufactured by a British company, Path Intelligence, this technology has already been used in shopping centers in Europe and Australia. And according to Path Intelligence CEO Sharon Biggar, hardly any shoppers decide to opt out. Some American retail stores will soon be using the technology including JC Penney and Home Depot. The latter has considered

93 implementing the technology but is not currently using it any stores. JCPenney declined to comment on its relationship with the vendor. Some retail analysts say the new technology is nothing to be worried about. Malls have been tracking shoppers for years through people counters, security cameras, heat maps and even undercover researchers who follow shoppers around . [Authors’ note: That is sneaky and it should be illegal.] Retailers’ websites that track online shoppers are more invasive, recording the user’s name and purchases, and then targeting them with ads even after they have left a site. “Most of this information is harmless and nobody ever does anything nefarious with it,” said Sucharita Mulpuru, retail analyst at Forrester Research. “But the reality is, what happens when you start having hackers potentially having access to this information and being able to track your movements?” Last year, hackers hit AT&T, exposing the unique ID numbers and e-mail addresses of more than 100,000 iPad 3G owners. 10 There is a legitimate danger from hackers, but the greatest danger is from Big Brother who is compiling a total profile of everyone on Earth so he can predict what each individual will do in a specific situation as well as large groups of people and entire nations. He wants these profiles so he can determine what the best method is to impose his New World Order on the unwashed masses. One method will work with one group of people and another method with a different group.

Anyone can track anyone with a cell phone

Until recently, tracking people with Global Positioning System technology required purchasing expensive hardware and software. Now, complete solutions are available through cellular service providers. Stimulated by the events of September 11, 2001 , the demand for enhanced 911 (e911) emergency calling capabilities, pushed forward GPS tracking technology in cell phones. At the end of 2005, all cell phone carriers were required to provide the ability to trace cell phone calls to a location within 100 meters or less . To comply with FCC requirements, cell phone carriers decided to integrate GPS technology into cell phone handsets, rather than overhaul the tower network. However the GPS in most cell phones are not like those in your handy GPS receiver that you take hiking. Most cell 94 phones do not allow the user direct access to the GPS data, accurate location determination requires the assistance of the wireless network, and the GPS data is transmitted only if a 911 emergency call is made. Motorola and Blackberry were the first GPS-enable phones to proliferate the United States. Initially, Motorola “iDEN” phones were commonly used for employee tracking on the business-oriented Nextel network. Then GPS enabled Blackberry phones, once used almost exclusively by corporate and government VIPs, began to penetrate the consumer market stimulated by the demand for phones with advanced messaging capability. Next came specialty devices produced under the names of “Disney Mobile” and “Wherify Wireless” targeting use by children and elderly. In 2009, a variety of GPS-enabled phones and tracking services were available. It is important to note that Wi-fi complements the cellular grid, providing additional conduits for location information to pass through to the net. Your phone has a unique electronic identifier and – if enabled – can pass this information, locating you within the geographic area covered by the hotspot. There should be little doubt that the vast radioscape of urban environments is being mapped and your participation in services like Google Latitude improve their ability to locate you out of cell range and hidden from GPS satellites. Always read the terms of service before deciding to agree. Here are a few services and technologies that give the customer the ability to track others:

Accutracking is a full-featured low-cost LBS provider using Motorolla, Boost Mobile and Blackberry phones operating on the Sprint/Nextel network. See Accutracking.com.

Google Latitude is Nextel’s Mobile Locator is a service used in conjunction with Nextel calling plans with Nextel GPS-enabled phones. Mobile locator allows you to view and monitor your peoples’ location in real-time, either singly or within a group, on a zoomable, online map. The web interface allows you to view location history, based on your most recent queries. See: Sprint Mobile_Locator web site for more info

Mapquest Find Me can be used by Nextel phones, allowing one to view a group of your peoples’ locations on one map, or you can view a track of an individual’s location history. Powered by uLocate, Mapquest provides a web interface for mobile devices like 95 PDAs as well cell phones. Other features include in-depth location history detail. See www.mapquestfindme.com.

Sprint’s/Nextel’s Mobile Locator is a service used in conjunction with Nextel calling plans with Nextel GPS-enabled phones. Mobile locator allows you to view and monitor your peoples’ location in real-time, either singly or within a group, on a zoomable, online map. The web interface allows you to view location history, based on your most recent queries. See: Sprint Mobile_Locator web site for more info.

Wherify Wireless’ “Wherifone” is designed specifically for children and seniors. The Wherifone is supported solely by Wherify’s Global Location Service Center. See: Wherify.com.

Passive Tracking devices record location data internally so that it can be downloaded later. Also referred to “data logging,” which can provide location data even when the device has traveled outside the wireless network. Passive tracking is not a common feature built-in to cell phones (at the time this article was published), but more sophisicated java-enabled cell phones, PDAs, and other mobile devices may have this feature. You should ask your LBS provider if their appilication can accomodate passive tracking data from the more sophiscated tracking devices.

GeoFencing is a term used to describe a feature that enables the cell phone to only start tracking when it has entered or exited a predefined region, avoiding unnecessary tracking when your people are close to home, office, or school. Or GeoFencing may also mean that an alert is sent when their phone crosses a virtural fence. For example, AccuTracking will send email or SMS message when they move across the designated areas. 11

Android Tracking App Software is a reality

Cell phone GPS tracking app software has been in use since cell phones starting to hit the scene in the 90’s. At that time it was just the government that has the ability to track cell phones. Now with the advancements of cell phones into smart phones and the emergence of the Google Android cell phone there are now android spy phone applications made specifically for the Android cell phone. Its not the 96 government anymore that is doing the cell phone spying and cell phone tracking , its everyday people that can download this type of Android spy phone tracking software and become their own spy. View Call Records – If you’ve ever wanted to know exactly who your target is calling or who is calling them, then this spy phone feature will give you everything you need to know. All calls that are placed or received on the Android cell phone will be logged. You’ll get to see the ‘From’ and ‘To’ cell phone number, time, date, and duration. Additional details include call duration and the name of the number that is associated in the Android’s address book. SMS Text Message Logs – With this Android spy feature, you’ll be able to read the entire contents of all incoming & outgoing text messages. Regardless if the messages are deleted immediately after being read, you’ll still get a copy of each message. Web Site URL Logging – Know what web sites they are visiting. GPS Android Tracking App – Want to find out where your target is? With stealth GPS tracking, you’ll be able to track their movements wherever they go. As the Android spy software collects data from the Android cell phone, it will upload the Android GPS tracking coordinates to your online account. Once you log into your account, you can go through all the GPS logs and look for a specific date and time that you want to investigate. Once you identify a time and date, just click on the “View Map” link and you can see where that location is on a map. Remote Listening – Turn the phone on Remotely and listen to the phones surroundings. Secretly records photos snapped from the device – Now you can see all the photos that are taken from the device. As soon as your target snaps a pic, the image will be uploaded to your online account, where you can download it. No more wondering what type of photos are stored on your target’s cell phone. Android Tracking App features are growing! Upload all Videos recorded by the device – This feature is similar to the photo recording. What it does is uploads all new videos that are recorded on the Android phone. Records all E-mails sent from the device – Now you can read contents of all emails sent from the device. Documents all new Contacts – As new contacts are added to the Android cell phone, you will get full visibility into each new contact.

97 Keep in mind, this only works for NEW contacts added after Android spy app has been installed.

Become a spy with Android Software

Do you consistently loose your phone and need to be able to track its location? Android Cell Spy Software can help you. Does your significant other spend a lot of time text messaging or calling with people you don’t know? Download the Free Cell Phone Tracking Report. Do you suspect your teenager is lying to you and you feel that you need to track their location via GPS? Do you have employees that say they are working all day when you suspect they are at home watching TV? Do you want to protect your teenager from the dangers of sending or receiving sexually explicit text messages and pictures on their phone? (Sexting can label your teenager as a Registered Sex Offender for life. Cell Phone tracking and GPS tracking App will help you keep track of your teen.) Are your employees working for one of your competitors or stealing from you? 12

Stingray cell phone tracker

Stingrays are designed to locate a mobile phone even when it’s not being used to make a call. The FBI considers the devices to be so critical that it has a policy of deleting the data gathered in their use, mainly to keep suspects in the dark about their capabilities, an FBI official told The Wall Street Journal in response to inquiries. 13

GPS tracking of vehicles

GPS cell phone tracking & GPS car tracking

AccuTracking software turns your cell phones into a GPS tracking device (Motorola iDEN phones, RIM BlackBerry phones, phones, Android phones). The AccuTracking online GPS cell phone tracking service lets you see real-time locations, speed, and headings of your children/family members or cars/vehicles, and receive email or SMS alerts when they move across the designated areas or

98 exceeds speed limit. AccuTracking is your ultimate low cost real-time vehicle locator, child locator. 14

OnStar and LoJack

Besides putting a GPS transmitter in or on everyone on Earth Big Brother also wants to put them in every vehicle, boat, ship and aircraft on the planet so he can keep track of every moving mechanical object. GPS tracking of vehicles is becoming standard technology for trucking, limousine, taxi, courier and delivery companies. Some automobile manufacturers are installing GPS technology in their passenger vehicles. It will only be a matter of time before every vehicle, motorcycle, boat, ship and airplane will have a GPS transponder in it. The governor of Oregon wants to have all new vehicles registered in Oregon equipped for a GPS device so the owners can be taxed according to mileage rather than according to the amount of gas they purchase. 15 The OnStar service that is available in some General Motors vehicles monitors the vehicles whereabouts. Drivers and passengers can use its audio interface to contact OnStar representatives for emergency services, vehicle diagnostics and directions. In 2009 General Motors started equipping some new vehicles with Stolen Vehicle Slowdown service that enables OnStar to slow a vehicle to a stop in event it is reported stolen. The first succesful use of this service took place in October of 2009. OnStar stops truck that was carjacked at gunpoint.16 At this time the police can place a GPS transponder in the vehicle of someone suspected of engaging in criminal activity, but they must get a warrant. They must also find a way to install it without the suspect knowing about it. Police usually do this by impounding the vehicle for a whatever reason they can as in the case of S tate of Washington v. William Bradley Jackson .17 150 Wash. 2d 251, 76 P.3d 217, decided by the Supreme Court of Washington on September 11, 2003. The totalitarian state depicted in Eric Blair’s bleak vision of the future, 1984, was patterned after the Communist parties of the world. Unfortunately many of America’s Democrats and Republicans see no problem with a permanent police surveillance envisioned in the novel. The LoJack Stolen Vehicle Recovery System (www.lojack.com) is an aftermarket vehicle tracking system that allows vehicles to be tracked by police, with the aim of recovering them in case of theft. The 99 manufacturer claims a 90% recovery rate. The name “LoJack” was coined to be the “antithesis of hijack.”

FBI is placing GPS transmitters on cars

The FBI has been placing GPS transmitters on the vehicles of individuals they suspect are criminals or terrorists without warrants. This criminal activity came to light when Yasir Afifi, a 20-year-old computer salesman and community college student, took his car in for an oil change in 2010. The mechanic spotted an odd wire hanging from the undercarriage. They removed it from the car, posted images of it online and asked for help in identifying it. FBI agents paid Mr. Afifi a visit at his home and demanded the return of their property. One federal judge wrote that the widespread use of the device was straight out of George Orwell’s novel, 1984 . “By holding that this kind of surveillance doesn’t impair an individual’s reasonable expectation of privacy, the panel hands the government the power to track the movements of every one of us, every day of our lives,” wrote Alex Kozinski, the chief judge of the 9th U.S. Circuit Court of Appeals. This sane statement was part of his condemning dissent in which a three- judge panel from his court ruled that search warrants were not necessary for GPS tracking. The Obama administration asked the D.C. federal appeals court that ruled it was unconstitutional to plant GPS transponders on vehicles with warrants to change its ruling. It argued that investigators will lose access to a tool they now use “with great frequency.” 18

Galileo

The Galileo navigation system, which is being built by the European Union, is intended to provide measurements down to the meter range as a free service including the altitude above sea level, and better positioning services at high latitudes compared to GPS and GLONASS. As a further feature, Galileo will provide a global Search and Rescue (SAR) function. To do so, each satellite will be equipped with a transponder, which is able to transfer the distress signals from the user’s transmitter to the Rescue Co-ordination Centre, which will then initiate the rescue operation. 19 What if Big Brother places a transmitter in all GPS gadgets in the future that automatically transmits a signal to a satellite giving him the 100 exact location of everyone who has a GPS unit? In time will he be able to put GPS technology in every cell phone, laptop, vehicle, aircraft and ship? May he even be able to shrink it so a computer implant could have GPS technology?

LoJack for laptops

Absolute Software is offering software that enables law enforcement to recover stolen laptops by tracing them across the Internet. The product was initially sold under the name “Computrace” but in 2005 it licensed the LoJack brand name and produces the software under both the “Computrace” and “LoJack for Laptops” product names. Unlike the LoJack for vehicles and equipment products, which use a small radio installed in the tracked device, the Computrace/LoJack for Laptops product is laptop tracking software that periodically phones home to Absolute Software’s server to both announce its location and to check to see if the machine has been reported stolen. 20 It is only a matter of time before every non-consumable object produced in the world will have a RFID chip in it that will enable Big Brother to track everything on Earth 24-7. And yes, eventually everyone on Earth will have a tracking chip in them.

Sneaky tracking technologies

Tracking spray

The U.S. Air Force wants to hunt the next generation of its enemies with tiny drone that sneak up to a suspect, paints him with an unnoticed powder or goo that allows American forces to follow him everywhere he goes. In April of 2011 the Air Force issued a call for help making a miniature drone that could covertly drop a mysterious and unspecified tracking “dust” onto people, allowing them to be tracked from a distance. The proposal says its useful for all kinds of random things, from identifying friendly forces and civilians to tracking wildlife. Effectively tracking foes has become a high priority – and deeply secret – research effort for the Pentagon, which has failed dozens of times to sort out insurgent from innocent bystanders in Afghanistan, Iraq and elsewhere. The Navy has a $450 million contract with Blackbird Technologies, Inc. to produce tiny beacons to make terrorists

101 trackable. The Defense Department has admitted to spending more than $210 million on this program. A 2007 briefing from U.S. Special Operations Command on targeting technology stated that SOCOM was looking for “perfumes” and “stains” that would mark out bad guys from a distance. The presentation listed a “bioreactive taggant” as a “current capability” next to a picture of what looks like a painted or bruised arm. The tracking technology the DOD seems very interested in is “smart dust.” It is soliciting a technology that will be able to dust a target with a cloud of tiny sensors (electromagnetic signal-radiating taggants) that stick to him or his clothes. The DOD wants the “smart dust” to replace the “tracking chips” it currently places in cell phones. According to statements from a Pakistani Taliban commander, the U.S. gives local spies tracking “chips” in their cell phones in order to train Hellfire missiles on militants. The battery-powered infrared beacon that al-Qaida says it found spies using is a 1984 technology. A 1997 study for Darpa, “Small Scale Propulsion: Fly on the Wall, Cockroach in the Corner,” could mean the DOD wants MAVs that look like bugs to handle the “dusting” of targets. Another possibility DARPA is working on is MAVs that look like birds. The 1997 study also mentioned AeroVironment’s robotic hummingbird that can fly remotely for up to 10 minutes. 21

Tagging, tracking and locating

Scents that make you trackable, indoors and out. Nanocrystals that stick to your body, and light up on night-vision goggles. Miniradar that maps your location on Google Earth. You can run, but you’ll learn it is hard to hide from a new range of military tech. The Defense Department calls it “tagging, tracking and locating,” or TTL, this business of finding and following high-value targets on the battlefield. Ever since SEAL Team 6 took out Osama bin Laden a lot has been revealed about the technology used by special operators to find and reach their targets, from stealth helicopters to biometric identification devices. TTL gear ranks at the top of the spookiest Special Operations’ arsenal. The military has spent $450 million on TTL tech contracting all of it from Blackbird Technologies of Herndon, Virginia. Millions more have gone to the development of tracking methods, encompassing everything 102 from human-thermal- detection and miniature crop-dusting drones to radar-responsive tags. Al-Qaida says it found spies using infrared beacons to call in drone strikes in Pakistan. A Pakistani Taliban commander claims the United States puts tracking “chips” in cellphones, in order to train Hellfire missiles on militants. But these are nt the only technologies that they use to secretly track people. Tracer Detection Technology Corp. marks targets with a paraffin wax crayon, filled with a perfluorocarbon, a thermally-stable compound used in cosmetics to refrigerators. The vapor which lingers for hours can be tracked with sensors, such as a gas chromatograph. Hiding in a sealed room will not keep you safe because tracers can “permeate closed doors and windows, containers and luggage,” and even give you away for a while after a tagged item is removed. The company has received a number of research contracts from the Navy, but Tracer president Jay Fraser will not say much about how those projects have gone. “Tracer is developing a unique TTL capability that will make it very difficult for enemy and criminal enterprises to operate,” he e-mailed the Danger Room. “The nature of our current and pending customers makes it hard for us to answer the rest of your questions.” Another tracer technology is a clear liquid that can be applied to one’s hand. The tracker only needs to pat the target on the back. He might never notice it, if he was tagged in a crowd, but the tagger would be able to see and follow him from a distance using night vision goggles. Oregon-based Voxtel makes a product, “NightMarks,” that can do just that. NightMarks are tiny nanocrystal quantum dots that can be hidden in clear liquids and seen only through night-vision goggles. A contract Voxtel has requires “covert microtaggants composed of nanocrystals” visible through night-vision goggles to “enable war fighters the ability to track entities buried in urban clutter.” TIAX LLC is developing “degradable taggants” that will lose their signal over time to prevent opponents from reverse-engineer the material. Another space-age defensive tracking technology is made by SpotterRF. SpotterRF M600 points out humans creeping up on your position on Google Earth. It uses radio waves in the X band that can detect walkers up to .62 miles and vehicles as far away as one mile.22

103 Aerial Distribution of Taggants

This is a portion of the official solicitation by the Air Force for the distribution of aerial taggants:

AF112-002 TITLE: Aerial Distribution of Taggants

TECHNOLOGY AREAS: Air Platform

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.

OBJECTIVE: Develop and demonstrate innovative methods to unobtrusively distribute taggants onto moving targets for tracking, locating, and identification purposes.

DESCRIPTION: Taggants are very small devices that emit an electro-magnetic signal. They can be applied to targets of interest and used to track/locate them in tactical situations. These targets of interest could be vehicles or personnel, which could be moving or stationary. To effectively “tag” the target, the taggant must be administered “unobtrusively,” meaning that the target should not be cognizant that taggants have been applied to them. Obviously, this application is more easily accomplished by some sort of ground agent, but it is desirous to be able to distribute taggants aerially via a small remotely piloted aircraft (SRPA). This is not as an easy task when factoring unobtrusiveness. The easiest, but obtrusive, means of delivery would be for the SRPA to “divebomb” the target or “shoot a paintball” at the target. The target would obviously notice a swooping SRPA and likely feel the sting of the well-placed pellet. The key to “unobtrusiveness” for aerial application is the ability to deliver a “cloud” of taggants on the target’s location or directly in its path. In order to do this the taggants must be dust-like and have the ability to attach to the target. One method of distribution would be “crop-dusting” from a sufficiently high altitude (to avoid detection) and letting the dust-cloud fall on the target or in front of it if it is moving. This method would likely utilize a large amount of taggant to assure

104 probability of successful tagging, although it might be useful when tagging a group of targets. The next method would be to deliver a small munition close by and pneumatically blow a cloud of taggants on or in front of the target. The munition could potentially air burst above the application zone or emplace itself near the application zone and be proximity or command- detonated. These methods are given as examples; other innovative methods are also sought.

PHASE III DUAL USE COMMERCIALIZATION: Military Application: Counter-insurgency and global war on terror (GWOT), marking civilians to prevent collateral damage, marking coalition forces without Blue Force Tracker. Commercial Application: Law enforcement and Homeland Security, wildlife tracking, remote or toxic chemical spill mapping. REFERENCES: 1. Eardley, D. and Katz, J.. “Small Scale Propulsion Fly on the Wall, Cockroach in the Corner, Rat in the Basement, Bird in the Sky;” Report: JSR-97-135, 34p, Sep 1997. 2. Nunan, S.C., Coakley, P.G., and Niederhaus, G.A. Lum; “GLIMPS sensor and taggant delivery systems;” Proceedings of SPIE – The International Society for Optical Engineering, v 4232, p 252-257, 2001. 3. Van Leevwen, Johan. “Launched at 36,000g.” Science Magazine Vol 329. 23 Page 395, July 2010. TPOC: Raymond Bortner 23

Big Brother has thousands of scientists working on myriad tracking technologies. When his kingdom is established he will have technologies in use that we today could never dream of.

Monitoring of Internet social networks

CIA

The CIA formed a “strategic partnership and technology develop- ment agreement” with Visible Technologies, a company that specializes in data-mining social-networking sites such as Twitter, Flickr and YouTube for numerous clients including Microsoft, Hormel and Xerox.

105 In-Q-Tel, the investment arm of the CIA, was created in 1999 to identify “innovative technology solutions to support the mission of the CIA and the broader U.S. Intelligence Community.” Visible listens in to half a million sites a day covering forums and blogs. It also crawls commercial sites with forums such as Amazon. Customers of Visible receive real-time feeds on a required subject, based on a series of keywords. These are scored as neutral, positive or negative depending on the message and the influence of the writer. Wired magazine said: “Intelligence agencies or employees might be tempted to use the tools at their disposal to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. That is not permissible even if all of the information in question is technically ‘open source.’” 24

Conclusion

Big Brother is tracking your every move by the ubiquitous cell phone. You cannot hide from Big Brother as long as you carry a cell phone. If you truly want to move about anonymously do not carry a cell phone. Anonymity comes at a cost. Live without that precious cell phone for a few days and experience what life was like before the cell phone, that Big Brother snooping device, took over your life. Take the advice of Richard Stallman, founder of the free software movement and creator of the GNU operating system: “I don’t have a cell phone. I won't carry a cell phone. It’s Stalin's dream. Cell phones are tools of Big Brother. I’m not going to carry a tracking device that records where I go all the time, and I’m not going to carry a surveillance device that can be turned on to eavesdrop.”

Notes

1. Pickard, Gabrielle. “The ‘Mother’ of all gadgets!” Russia Today. 1.18.2009. http://rt.com/news/prime-time/the-mother-of-all-gadgets. & Maxted, Anna. “A new GPS device tracks your children.” Daily Telegraph. 10.19.2009. www.telegraph.co. uk/health/children_shealth/6345403/A-new-GPS-device-tracks-your-children.html. 1. www.gps-navigation-store.net/gps/c,k/bloglist/child+gps+tracking+device,0 & www.lok8u.com. 2. Byrne, John. “Google offers free software to track people.” Rawstory. 2.04.09. http://rawstory.com/news/2008/Google_offers_software_to_track_people_020 4.html. 3. www.brickhousesecurity.com/child-locator.html. 3. www.youtube.com/watch?v=cPFc4Nzjf0I&feature=related.

106 4. Stancik, Meredith. “Texas Schoolkids Tagged With GPS Tracking Devices.” 1.18.2010. www.kbtx.com/home/headlines/81988287.html. 5. NBC Chicago. “GPS Tracks Schoolbus Kids.” 8.31.2010. www.nbc chicago.com/news/local-beat/GPS-palos-heights-school-district-128-zpass.html. 6. Mercury News. “California students get tracking devices.” 8.18.2010. www.mercurynews.com/news/ci_15815706?nclick_check=1. 6. “Privacy and Safety Questions Loom Over Federal Program to Track Preschoolers .” 9.14.2010. https://www.eff.org/press/archives/2010/09/13 7. Byrne, John. “Google offers free software to track people.” Raw Story. 2.04.2009, John Byrne http://rawstory.com/news/2008/Google_offers_software_to_ track_ people_0204.html. 8. Arthur, Charles. “iPhone keeps record of everywhere you go.” 4.20.2011. www.guardian. co.uk/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears. 8. Angwin, Julia & Valentino-Devries, Jennifer. “Apple, Google collect user data.” Wall Street Journal. 4.22.2011. http://online.wsj.com/article/SB1000142 4052748703983704576277101723453610.html?mod=WSJ_hp_MIDDLETopStories. 8. Apple: We 'must have' comprehensive user location data on you.” International Business Times. 4.23.2011. www.ibtimes.com/articles/137432/2011042 3/apple-we-must-have-comprehensive-user-location -data-on-you.htm. 9. Cohen, Noam. “It’s Tracking Your Every Move and You May Not Even Know.” New York Times. 3.26.2011. p. A1. www.nytimes.com/2011/03/26/business/ media/26privacy.html?_r=2. 9. Geek.com “Automatic GPS on your cellphone.” 10.01.2001. www.geek.com/ articles/mobile/auto matic-gps-on-your-cellphone-2001101. 9. Crouch, Cameron. “Will Big Brother Track You by Cell Phone? The FCC requires cell phone companies to track you, in order to find you when you call 911-- but what about your privacy?” PC World. 8.02.2001. 10. Censky, Annalyn. “Malls track shoppers' cell phones on Black Friday.” 11.22.2011. http://money.cnn.com/2011/11/22/technology/malls_track_cell_phones_ black_friday/index.htm. 11. www.travelbygps.com/articles/tracking.php. 12. www.androidtrackingapp.com. 13. Jennifer Valentino-Devries. “‘Stingray’ Phone Tracker Fuels Constitutional Clash.” 9.22.2011. http://online.wsj.com/article/SB100014240531119041946045765 83112723197574.html. 14. www.accutracking.com. 15. Murphy, Kim. “Oregon considers subbing mileage tax for gas tax.” Los Angeles Times. 1.04. 2009. A15. http://articles.latimes.com/2009/jan/04/nation/na- gas-tax4. 16. Rohlin, Melissa. “OnStar stops truck that was carjacked at gunpoint.” Los Angeles Times. 10.19.2009. http://latimesblogs.latimes.com/technology/2009/10/on star-gps-carjacking.html. 17. Woodyard, Chris. “Device can remotely halt auto chases.” USA TODAY. 10.9.2007. http://abc news.go.com/Business/Autos/story?id=3706113. 17. State of Washington v. William Bradley Jackson , 150 Wash. 2d 251, 76 P.3d 217, decided by the Supreme Court of Washington on 9.11.2003. www.forensic- evidence.com/site/Police/GPS_ onCar.html.

107 18. Yahoo News. “Oil change reignites debate over GPS trakers.” 10.16.2010. http://news.yahoo.com/s/ap/20101016/ap_on_re_us/us_gps_tracking_warrants. 19. http://en.wikipedia.org/wiki/Galileo_%28satellite_navigation%29. 20. www.absolute.com/en/lojackforlaptops/home.aspx. 21. Rawnsley, Adam. “Drones Spray, Track the Unwilling in Air Force Plan.” 4.28.2011.www.wired.com/dangerroom/2011/04/crop-duster-drones. 22. Rawnsley, Adam and Shachtman, Noah. “Crazy-military-tracking-tech, From Super Scents to Quantum Dots.” 5.18.2011.” www.wired.com/dangerroom/2011/ 05/crazy-military-tracking-tech. 23. www.dodsbir.net/solicitation/sbir112/af112.htm. 24. Shachtman, Noah. “Exclusive: U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets.” Wired. 10.19.2009. http://current.com/1eqbi4c. 25. Brodkin, Jon. “Cell phones are 'Stalin's dream,' says free software movement founder.” Network World. 3.14.2011. www.networkworld.com/news/2011/031411- richard-stallman.html.

weaintgottimetobleed.com

PrisonPlanet.tv 108

SIX

EAVESDROPPING

Big Brother is not only watching everything you do and everyplace you go he is also listening to everything you say and hear.

Parabolic microphone

A parabolic microphone uses a parabolic reflector to collect and focus sound waves onto a receiver, in much the same way that a parabolic antenna (e.g., satellite dish) does with radio waves. Typical uses of this microphone, which has unusually focused front sensitivity and can pick up sounds from many yards away, include nature recording, field audio for sports broadcasting, eavesdropping , law enforcement, and even espionage . If Big Brother wants to he can eavesdrop on anyone outdoors with super-sensitive parabolic microphones.

Gunshot detectors

The idea of determining the origin of gunfire in cities by sound was conceived before World War I and it was developed during that war. Yet it was not until the 1990s that police put the technology to use. East Palo Alto and eastern Menlo Park in California were besieged with crimes related to drug trafficking and in 1992 there were 42 homicides in East Palo Alto, making it the per capita murder capital of the United States. In late 1992, John C. Lahr, a seismologist at the nearby U.S. Geological Survey, approached the Menlo Park police department to ask if they would be interested in applying seismological techniques to locate gun shots. Robert Showen, an Standford Research Institute employee and expert in acoustics developed a system to detect gunshots. A network consisting of one wired and four radio-telemetered microphones was established, with his home in eastern Menlo Park becoming the command center. Lahr modified the software typically used for locating earthquakes and recorded the data at a higher sample rate than is used

109 for regional seismology. After gunshots were heard Lahr would determine their location while his wife monitored the police radio for independent confirmation of their source. Using this system, Lahr was able to demonstrate to the police and others that this technique was highly effective, as the system was able to locate gunshots occurring within the array to within a ten’s of meters. 1

Raytheon’s gunshot detector 4

Since then the technology has been greatly improved allowing the police to locate the exact location of a gunshot. The technology is being used by numerous police departments around the world. ShotSpotter Inc. had instralled 30 systems in cities in America by 2008. 2 The military uses the technology to locate sniper fire.3 One of its systems is portable and a wearable system has been developed by Raytheon. 4 Corporations also use the technology for their own security. The Federal Reserve Bank of San Francisco is protected by a system made by safetydynamics.5 The Boomerang X system that allows a soldier to determine the location of gunfire will be shrunk down so it can fit on a soldier’s wrist like a watch. When that day comes it will be standard equipment for all soldiers and law enforcement officers. Along with this technology police officers will some day be equipped with minature parabolic 110 microphones enabling them to eavesdrop on anyone. They will also be equipped with spycams that will enable personnel in the control center to watch everything the officers in the field see in real time. Police officers will become Big Brother super-snoops.

“In general you could not assume that you were much safer in the country than in London. There were no telescreens, of course, but there was always the danger of concealed microphones by which your voice might be picked up and recognized.” (George Orwell, 1984 , Book Two, Chapter Two, p. 98)

Auto Eavesdropping

Hong Kong auto eavesdropping conspiracy

The Hong Kong Apple Daily has reported that since 2007, Red Chinese authorities have been installing eavesdropping devices on all dual-plate Chinese-Hong Kong vehicles, enabling them to create a massive network of eavesdropping across the archipelago. The devices are being installed as “inspection and quarantine cards” without charge by the Shenzhen Inspection and Quarantine Bureau on thousands of vehicles. Smugglers were the first to note something strange about the devices. A source told Apple Daily that after the cards were installed mainland authorities had no trouble picking off the cars carrying illicit goods. “For every ten cars we ran we only had [smuggled goods] in three or four to reduce the risk, but the border agents caught all of them. The accuracy was unreal!” Apple Daily quoted the smuggler saying. 111 The device about the size of a PDA is taped onto the vehicle’s front window. Protective tape covers the screws and to prevent tampering. Apple Daily removed two devices and asked Zheng Liming Associate Professor of Electrical Engineering at City University of Hong Kong and private investigator Zhang Dawei to examine them. Both said they could be used for eavesdropping. “But this device uses chips commonly found in Bluetooth and voice recording devices, designed for receiving voice transmission,” explained Liming saying it has a transmitting range of 12 miles. Apple Daily quoted a source saying there are at least 20,000 cars with dual license places, and tens of thousands of trucks and buses. When the reporter confronted an officials of the Shenzhen Inspection and Quarantine Bureau they denied it saying, “It’s not that high tech.” 1f Even if it is not an eavesdropping device what will keep Big Brother from making it mandatory for all vehicles to have such a device? In the future it will be mandatory in America and the rest of the world for all vehicles to have cameras with microphones and transmitters installed before they can be registered and licensed. Big Brother will be able to watch and listen to everything you say and do in your vehicle.

OnStar

The OnStar GPS service enables OnStar, and all law enforcement agencies to track the whereabouts of every car that has the service. It also can be used by OnStar employees or law enforcement personnel to eavesdrop on the passengers. OnStar denies they have this ability, but a 2003 lawsuit revealed that systems such as OnStar can be used for eavesdropping on passenger conversations. 2 Keep in mind that Big Brother can listen to you in the privacy of your own vehicle by turning your cell phone into a microphone.

Telephone and Internet eavesdropping

Roving bug

Natural News and CNet.com learned that the FBI has developed a technique that can remotely activate a nearby cell phone’s microphone, thereby turning it into a listening device. The “roving bug” technique was approved by U.S. Department of Justice officials for use on members of an organized crime family in New York that was getting

112 increasingly suspicious of tails, wiretaps or other traditional surveillance techniques. 3 Government intelligence agencies have the technology to turn any telephone into a microphone, and listen to every conversation that is said in the privacy of a home or business office while the telephone is not being used. 4 Tips on how to detect this kind of bugging can be found on the Internet. 5

Carnivore & NarusInsight

Carnivore was a system implemented by the Federal Bureau of Investigation designed to monitor email and electronic communications. It used a customizable packet sniffer that can monitor all of a target user’s Internet traffic. It was implemented during the Clinton administration with the approval of the Attorney General. The FBI changed the name of Carnivore to DCS 1000 due to massive negative press coverage. The program was canceled in 2001, but it was replaced with improved commercial software such as NarusInsight. 6 NarusInsight is a supercomputer system which is used by the NSA and other government agencies to perform and monitoring of citizens’ and corporations’ Internet communications in real-time, and whose installation in AT&T’s San Francisco Internet backbone gave rise to a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T, Hepting v. AT&T. 7 Big Brother watches everything everyone does on the Internet. He reads all emails and tracks every website you visit. He also keeps track of everything you put into a search engine. Watch where you go!

Investigatory Powers Act

The United Kingdom passed a law in 2009 that strengthens the Regulation of Investigatory Powers Act 2000. 8 The law mandates that all telecommunication companies and internet service providers to keep a record of every customer’s personal communications, showing who they have contacted, when and where, as well as the websites they have visited. 9 Big Brother has total access to every email you receive and send and every website you have ever visited. He does not need laws to do this. He has his parsitical politicians pass laws to keep Patriots from filing lawsuits to have the laws overturned.

113 Home and business eavesdropping

Radio wave microphone

Big Brother can even read the vibrations on a window from the outside, and decipher what is being said inside. This method of eavesdropping can be defeated by simply drawing the curtains. Eavesdroppers “shine a laser beam onto a glass window and decode any modulation of the reflected beam caused by sound vibrations in the room.” You can also defeat this technology by playing a radio as background noise. Make sure it is on a talk show, music can be filtered out. Big Brother has other tricks. The new “through-the-wall audio surveillance system” uses a “powerful beam of very high frequency radio waves instead of light.” Radio signals easily penetrate walls – that is how radios work in doors. “The system uses a horn antenna to radiate a beam of microwave energy – between 30 and 100 gigahertz – through a building wall. If people are speaking inside the room, any flimsy surface, such as clothing, will be vibrating. This modulates the radio beam reflected from the surface. “Although the radio reflection that passes back through the wall is extremely faint, the kind of electronic extraction and signal cleaning tricks used by NASA to decode signals in space can be used to extract speech.” 10 Play a talk radio program or television as background noise. Yet it is possible Big Brother might be able to filter out the background noise.

Google is listening to you

Google knows what search terms you use, what Web pages you are viewing, and what is in your e-mails – that is how it serves up the text ads targeted to the Web content on your screen. Soon Google will know what TV programs you watch – and will use that information to send you more advertising. Their prototype software uses a computer’s built-in microphone to listen to the sounds in a room . It then filters each five-second snippet of sound to pick out audio from a TV, reduces the snippet to a digital “fingerprint,” searches an Internet server for a matching fingerprint from a pre-recorded show, and, if it finds a match, displays ads, chat

114 rooms, or other information related to that snippet on the user’s computer. But the fingerprinting technology used in the Google prototype makes it impossible for the company to eavesdrop on other sounds in the room, such as personal conversations, according to the Google team. In the end, the researchers say, the only personal information revealed is TV-watching preferences. When word of the research first appeared in the media, some bloggers and other technology watchers reacted with horror; many assumed that the background conversation picked up by the microphone in Google’s system would be uploaded to Google. Prototype software from Google Research could listen to your TV and send back useful information – and ads of course. 11 You can defeat this eavesdropping by playing one or more background sounds. Turn a radio on to a talk station. This can be irritating to some people, but it is something you must live with to keep Big Brother from snooping on you. Or you can make sure your computer does not have a microphone and keep your cell phone and landline phone in another room. Read on for information on this eavesdropping trick.

ECHELON

ECHELON is a signals intelligence (SIGINT) network operated for the United States, United Kingdom, Canada, Australia and New Zealand. The AUSCANNZUKUS security agreement was reportedly created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s. Yet since the end of the Cold War it is also being used to search for hints of terrorist plots, the plans of drug dealers, and political and diplomatic intelligence. “In 1975, a congressional investigation revealed that the NSA had been intercepting, without warrants, international communications for more than 20 years at the behest of the CIA and other agencies. The spy campaign, code-named ‘Shamrock,’ led to the Foreign Intelligence Surveillance Act (FISA), which was designed to protect Americans from illegal eavesdropping. “Enacted in 1978, FISA lays out procedures that the U.S. government must follow to conduct electronic surveillance and physical searches of people believed to be engaged in espionage or 115 international terrorism against the United States. A special court, which has 11 members, is responsible for adjudicating requests under FISA.” 12 In 2001 the European Parliament published a report concerning ECHELON in which it concluded that it was capable of intercepting virtually every communication in the world by radio, television, land- line telephones, cell phones, email, fax, satellite transmission and microwave links. “If UKUSA states operate listening stations in the relevant regions of the earth, in principle they can intercept all telephone, fax and data traffic transmitted via such satellites.” 13 When the majority of communications was switched from satellites to fiber optic cable interception of communications ECHELON built special interception rooms. Equipment was installed at locations where fiber optic communications are switched. One such intercept site in America is Room 641A. It is a facility operated by AT&T for the , beginning in 2003. It is located in the SBC Communications building at 611 Folsom Street, San Francisco. (AT&T was purchased by SBC in 2005.) The room was referred to in internal AT&T documents as the “SG3 [Study Group 3] Secure Room.” It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic. It therefore has access to all Internet traffic that passes through the building. Room 641A and the controversies surrounding it were subjects of an episode of “Frontline,” that was originally broadcast on PBS on May 15, 2007. It was also featured on PBS’s “NOW” on March 14, 2008. 14 A Senate panel is probing claims that top secret government workers eavesdropped on communications from American service members, journalists and aid workers overseas. Senate intelligence committee chair Jay Rockefeller (D-WV) called the allegations, made on ABC News, “extremely disturbing.” Off of Capitol Hill, reaction was swift and sharp to the news that U.S. intelligence officials listened in to hundreds of private conversations, including pillow talk between U.S. military officers and their spouses. 15 British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. 16 George Bush authorized the Terrorist Surveillance Program in 2001 after the 911 attacks. It permitted warrantless wiretapping of international communications where one party to the communication 116 was believed to be affiliated with al-Qa’ida. 17 That program was abused and expanded to eavesdropping on an untold number of Americans who had no connection to al-Qa’ida.

Cell phone eavesdropping

Big Brother is listening: Government can eavesdrop on your life by secretly listening through your cell phone. Natural News learned in 2006 that the FBI has developed a technique that can remotely activate a cell phone’s microphone, thereby turning it into a listening device. The “roving bug” technique was approved by U.S. Department of Justice officials for use on members of an organized crime family in New York that was getting increasingly suspicious of tails, wiretaps or other traditional surveillance techniques. The cell phones of alleged mobster John Ardiot – considered by the FBI to be one of the most powerful men in the Genovese crime family – and his attorney Peter Peluso, also an alleged mobster, were activated by this technique in order for authorities to monitor nearby conversations. U.S. District Judge Lewis Kaplan ruled that the technique was legal in an opinion, stating that federal wiretapping law was broad enough to cover the monitoring of conversations occurring near a suspect’s cell phone. The method works whether the phone is on or off, because cell phones cannot be truly powered down without removing the battery. A 2005 Financial Times article noted that cell phone providers can install software on any phone from a remote location, allowing microphone activation, without the owner’s knowledge. In addition to activating the microphone, the software can also stop a display from indicating a call in progress, taking away another method by which a cell phone user could tell his phone had been compromised. According to counter- surveillance consultant James Atkinson, phones from Nextel, Samsung and Motorola are particularly vulnerable to remote software downloads. The bugging of mobster John Ardiot was not the first time the FBI has done this. In a 2003 suit, it was discovered that the FBI was able to activate the microphones of automotive systems such as OnStar and listen to passenger conversations without them knowing it.18 Big Brother can also eavesdrop on any landline phone anywhere on Earth. This information is explained at www.tscmvideo.com. Click on glossary and then hookswitch bypass. 19 117 E-Mail surveillance

The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said. Representative Rush Holt, Democrat of New Jersey and chairman of the House Select Intelligence Oversight Panel, disputed assertions by Justice Department and national security officials that the over- collection was inadvertent. “Some actions are so flagrant that they can’t be accidental,” he said. Other Congressional officials raised similar concerns but would not agree to be quoted for the record. “For the Hill, the issue is a sense of scale, about how much domestic e-mail collection is acceptable,” a former intelligence official said, speaking on condition of anonymity because N.S.A. operations are classified. “It’s a question of how many mistakes they can allow.” Under the surveillance program, before the N.S.A. can target and monitor the e-mail messages or telephone calls of Americans suspected of having links to international terrorism, it must get permission from the Foreign Intelligence Surveillance Court (FISA). Supporters of the agency say that in using computers to sweep up millions of electronic messages, it is unavoidable that some innocent discussions of Americans will be examined . Intelligence operators are supposed to filter those out, but critics say the agency is not rigorous enough in doing so. The N.S.A. is believed to have gone beyond legal boundaries designed to protect Americans in about 8 to 10 separate court orders issued by the Foreign Intelligence Surveillance Court, according to three intelligence officials who spoke anonymously because disclosing such information is illegal. Because each court order could single out hundreds or even thousands of phone numbers or e-mail addresses, the number of individual communications that were improperly collected could number in the millions , officials said. He said he and other analysts were trained to use a secret database, code-named Pinwale, in 2005 that archived foreign and domestic e- mail messages. He said Pinwale allowed N.S.A. analysts to read large volumes of e-mail messages to and from Americans as long as they fell within certain limits. Other intelligence officials confirmed the existence of the Pinwale e-mail database, but declined to provide further details. 118 The former analyst added that his instructors had warned against committing any abuses, telling his class that another analyst had been investigated because he had improperly accessed the personal e-mail of Bill Clinton.20

Eavesdropping psychoanalysis

Mind Machine Project

Big Brother has developed a technique in which he thinks he can determine if an individual will commit a violent act by listening to his conversation and reading his emails. Mathieu Guidere (University of Geneva) working with Dr. Newton Howard (Massachusetts Institute of Technology) who heads the Mind Machine Project explained that through computerized scanning of phone calls and electronic messages sent through e-mail and social networking mechanisms it is possible to identify someone who will commit a violent act. “The computer system detects resentment in conversations through measurements in decibels and other voice biometrics,” he said. “It detects obsessiveness with the individual going back to the same topic over and over, measuring crescendos.” The program can detect the same patterns of fixation on specified subjects in written communications. Using character traits that have been identified through psychological profiles conducted on lone bombers following the 911 terrorist attacks, Guidere said he and his colleagues developed programs that isolate signs pointing to a potential terrorist. According to them lone bombers are not mentally deranged but harbor hatred and deep resentment toward government. Their emotional spikes an be identified by the computer program. Once the individual has been identified, the information can be passed along to authorities so surveillance can begin. Currently, the computer program can review 10,000 voice or other electronic transmissions in an hour. The goal, the professor said, is to increase the capacity to 100,000 per hour. The program can also be used by psychologists and other mental health providers working with war veterans, law enforcement officials and others to measure their progress in recovery. “By recording the voice of the patient, the program can rate negativity and positivity with depression and other emotional disorders,” said Guidere, who is working with, director of MIT’s Mind Machine Project. 21 119 Layered Voice Analysis

Nemesysco is an Israeli company that makes lie detectors and other products based on voice analysis.22 They have been used in airports in Israel and Russia,23 by insurance companies and social security helplines in the United Kingdom and also sold to consumers. 24 This technology has raised controversy about privacy and whether is it scientific or not. 25 Users have claimed savings, mostly by subjects being more honest when told they are subjected to a lie detector. 26 CEO Amir Liberman and Executive Chairman David Ofek 27-28 call their trademarked method Layered Voice Analysis (LVA). A 2006 study at the University of Florida for the Counterintelligence Field Activity concluded that LVA did not show any sensitivity to the presence of deception or stress. 29 A 2008 study funded by the National Institute of Justice found that neither LVA nor the competing Computer Voice Stress Analyzer (CVSA) were able to detect lies better than random, but its use does deter people from lying, the bogus pipeline effect. 30 In 2007 two Swedish professors of linguistics, Francisco Lacerda of Stockholm University and Anders Eriksson of Gothenburg University, published an article called “Charlatanry in forensic speech science” 31 in the International Journal of Speech Language and the Law . Here they examined the workings of a Nemesysco product, and showed that it behaved in pseudo-random fashion when purporting to identify spoken lies. Nemesysco demanded that the article should be withdrawn from the online version of the magazine, and the publisher Equinox did so. 32- 33 Nemesysco’s lawyers then sent letters to the Swedish professors where they threatened to sue them for defamation if they published similar articles again. 34-35 This resulted in criticism of Nemesysco for trying to silence academic research, and of the publisher for not understanding how to manage a scientific journal. 36-37 The Royal Swedish Academy of Sciences branded the company’s behavior a “serious assault on research freedom.” 38 This technology is a clever scam. It is being peddled to companies and government agencies that are panicked over the phony war on terror.

Sentient World Simulation

In 2008 Christopher Ketcham showed that Big Brother is not just eavesdropping and spying on the American people, he is also 120 attempting to predict “what the target will do, where the target will go, who it will turn to for help.” The Pentagon is running an artificial intelligence (AI) program to see how people will react to propaganda and to government-inflicted terror. The program is called Sentient World Simulation. Defense, intelligence and homeland security officials are constructing a parallel world, on a computer, which the agencies will use to test propaganda messages and military strategies. Called the Sentient World Simulation, the program uses AI routines based upon the psychological theories of Marty Seligman and others. (Seligman introduced the theory of ‘learned helplessness’ in the 1960s, after shocking beagles until they cowered, urinating, on the bottom of their cages.) It features an avatar for each person in the real world, based upon data collected about us from government records and the internet. Indeed, as noted by Boston University’s Journal of Science and Technology Law, Fox News, the Daily Telegraph and other sources, the Department of Homeland Security is developing an airport scanner to be able to read people’s minds and predict terrorist behavior. Neuroscientists at UCLA say they can predict – using brain scanning – people’s behavior better than the people themselves can. And Northwestern University announced in July that scientists can read people’s brain waves to detect terrorism. Is it possible and probable that Big Brother’s AI program is designed to manipulate the American public, to concentrate power, to take away the liberties and freedoms of the American people, and to induce chaos in order to achieve these ends. 39

Sigard

A controversial covert surveillance system that records the public’s conversations is being used in Britain. Sigard, an eavesdropping system by Sound Intelligence, monitors movements and speech to detect signs of threatening behavior. Its designers claim the system can anticipate anti-social behavior and violence by analyzing the information picked up by its sensors. Sigard instantly sends alerts to police, nightclub bouncers or store security staff. The devices are designed to distinguish between distress calls, threatening behavior and general shouting. It was first used Dutch prisons, city centers and Amsterdam’s Central Rail Station. 40

121 “It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself – anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face (to look incredulous when a victory was announced, for example) was itself a punishable offense. There was even a word for it in Newspeak: facecrime, it was called.” (George Orwell, 1984 , Book 1, Chapter 5, p. 54, emphasis added)

“Your worst enemy, he reflected, was your nervous system. At any moment the tension inside you was liable to translate itself into some visible symptom.” (Ibid., Book 1, Chapter 6, p. 56)

This Big Brother technology is a fraud. He claims it is real, but it is just another phony technology used to frame Patriots, Christians and dissidents. He will continue to invent fake technologies and use his media presstitutes to sell the unwashed masses on its effectiveness. Do not believe the claims by the propaganda minions of Big Brother.

Warrantless wiretaps

Dick Cheney

Big Brother has tapped electronic communications without a warrant for decades, but it has always been illegal. That changed with the Bush administration after the . Vice President Dick Cheney is considered to be the architect of the warrantless wiretap program of the Bush administration. In December of 2005 he defended this illegal program. “The fact of the matter is this is a good, solid program,” he said on CNN during his stopover in Pakistan. “It has saved thousands of lives. We are doing exactly the right thing, we are doing it in accordance with the Constitution of the United States and it ought to be supported. This is not about violating civil liberties, because we’re not.” He went on say, “But I do believe that especially in the day and age we live in, the nature of the threats we face, the president of the United States needs to have his constitutional powers unimpaired, if you will, in terms of the conduct of national security policy.” [Authors’ note : What Cheney did was not legal and it was a major violation of the 122 Constitution. Big Brother always uses the excuse of security to commit illegal acts and then he says what he did was legal.] Judge James Robertson of the secret Foreign Intelligence Surveillance Court resigned in protest of the administration’s surveillance program. Professor Yoo, a legal scholar from Boalt Hall, the law school at the University of California, Berkeley, was a legal adviser who determined that warrantless wiretaps were legal among other things. “The government may be justified, in taking measures which in less troubled conditions could be seen as infringements of individual liberties,” wrote in the memorandum after the 911 attacks. Four days later, he wrote that Congress could not place “limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing and nature of the response.” He went on to write, “These decisions, under our Constitution, are for the president alone to make.” He went on to make more excuses to violate the Constitution saying, “When we were hit on 9/11, President Bush was granted authority by the Congress to use all means necessary to take on the terrorists, and that’s what we’ve done.” He ridiculed his critics saying “the 9/11 commission criticized everybody in government because we didn’t connect the dots. Now we are connecting the dots, and they’re still complaining. So it seems to me you can’t have it both ways.” (Men who take the oath of office to protect and defend the Constitution should do that no matter what.) Geoffrey R. Stone, a law professor at the University of Chicago, said he found the issue straightforward, at least as regards surveillance by the National Security Agency. “Some legal questions are hard,” he said. “This one is not. The president’s authorizing of N.S.A. to spy on Americans is blatantly unlawful.” 41 Cheney actually said in a PBS interview (September 16, 2011) that NO rights of the American people were infringed on after the attacks of September 11, 2001, and the subsequent passing of the Patriot Act and other anti-terror laws. Amazing!

NSA sought blanket eavesdropping in April 2001

The U.S. National Security Agency (NSA) asked AT&T to help it set up a domestic call monitoring site seven months before the Sept. 11,

123 2001 attacks, lawyers claimed in June 2006 in court papers filed in New York federal court. The allegation is part of a court filing adding AT&T as a defendant in a breach of privacy case filed earlier this month on behalf of Verizon Communications Inc. and BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President George W. Bush violated the Telecommunications Act of 1934 and the U.S. Constitution, and seeks money damages. The case is McMurray v. Verizon Communications Inc., 06cv3650, in the Southern District of New York. The lawsuit is related to an alleged NSA program to record and store data on calls placed by subscribers. More than 30 suits have been filed over claims that the carriers, the three biggest U.S. telephone companies, violated the privacy rights of their customers by cooperating with the NSA in an effort to track alleged terrorists. The NSA initiative, code-named “Pioneer Groundbreaker,” asked AT&T Solutions to build for the NSA a network operations center which duplicated AT&T’s Bedminster, New Jersey facility. That plan was abandoned in favor of the NSA acquiring the monitoring technology itself. The NSA said on its Web site that in June 2000, it was seeking bids for a project to “modernize and improve its information technology infrastructure.” The plan was said to be part of Project Ground- breaker. 42

NSA is eavesdropping on everyone

The National Security Agency is eavesdropping on everyone no matter what their rank in society may be. Russell Tice, former National Security Agency analyst, said, “The National Security Agency had access to all Americans’ communications – faxes, phone calls, and their computer communications. It didn’t matter whether you were in Kansas, in the middle of the country, and you never made foreign communications at all. They monitored all communications.” “What I was finding out, though, is that the collection on those organizations was 24/7 and 365 days a year – and it made no sense. ... I started to investigate that. That’s about the time when they came after me to fire me.” “While many details about the program remain secret, officials familiar with it said the N.S.A. eavesdropped without warrants on up to 124 500 people in the United States at any given time,” the Times wrote, shortly after the 2004 election. “The list changes as some names are added and others dropped, so the number monitored in this country may have reached into the thousands over the past three years, several officials said. Overseas, about 5,000 to 7,000 people suspected of terrorist ties are monitored at one time, according to those officials.” Senator Obama commented on the NSA’s eavesdropping program saying, “The President’s illegal program of warrantless surveillance will be over. It restores FISA and existing criminal wiretap statutes as the exclusive means to conduct surveillance – making it clear that the President cannot circumvent the law and disregard the civil liberties of the American people.” “I’ve never seen contempt for the rule of law such as this,” said Sen. Dodd in December 2007.43

Protect America Act

A new law expanding the government’s spying powers gave the Bush Administration a six-month window from August 2007, to install permanent back doors in the nation’s communication networks. The legislation was passed hurriedly by Congress over the weekend of August 6, 2007, and signed into law by George W. Bush. The Protect America Act removed the prohibition on warrantless spying on Americans abroad and gave the government wide powers to order communication service providers such as cell phone companies and ISPs to make their networks available to government eavesdroppers. While the nation’s spy laws have been continually loosened since the 911 attacks, the Administration never pushed for the right to tap the nation’s domestic communication networks until a secret court recently struck down a key pillar of the government’s secret spying program. Prior to the law’s passage, the nation’s spy agencies, such as the National Security Agency and the Defense Intelligence Agency, didn’t need any court approval to spy on foreigners so long as the wiretaps were outside the United States. Now those agencies are free to order services like , cell phone companies and even search engines to comply with secret spy orders to create back doors in domestic communication networks for the intelligence community. While it’s unclear whether the wiretapping can be used for domestic purposes, the

125 law only requires that the programs that give rise to such orders have a “significant purpose” of foreign intelligence gathering. One aspect of the law that is chilling is that it:

Forces Communication Service providers to comply secretly, though they can challenge the orders to the secret Foreign Intelligence Court. Individuals or companies given such orders will be paid for their cooperation and can not be sued for complying.

In short, the law gives the Administration the power to order the nation’s communication service providers – which range from Gmail, AOL IM, Twitter, Skype, traditional phone companies, ISPs, internet backbone providers, Federal Express, and social networks – to create permanent spying outposts for the federal government. These outposts need only to have a “significant” purpose of spying on foreigners, would be nearly immune to challenge by lawsuit, and have no court supervision over their extent or implementation. Abuses of the outposts will be monitored only by the Justice Department, which has already been found to have underreported abuses of other surveillance powers to Congress. In related international news, Zimbabwe’s repressive dictator Robert Mugabe also won passage of a law allowing the government to turn that nation’s communication infrastructure into a gigantic, secret microphone. 44

Past eavesdropping

The federal government has been eavesdropping on the American people for decades. Dick Cheney and Donald Rumsfeld pushed for warrantless wiretaps in the 1970s. Massive eavesdropping on Americans began long before the 911 attacks. Whistleblowers from major telecommunications companies have testified that the program began before 911. American intelligence agencies and intelligence agencies of other nations heard about the 911 hijackers plans from their own mouths. Investigators for the Congressional Joint Inquiry discovered that an FBI informant, Abdussattar Shaikh, had rented a room to two of the hijackers in 2000 and that, when the Inquiry sought to interview the informant, the FBI refused. The FBI hid him in an unknown location, and a high-level FBI official stated these blocking maneuvers were undertaken under orders from the White House. The New York Times 126 noted that Senator Bob Graham, the Florida Democrat who is a former chairman of the Senate Intelligence Committee, accused the White House of covering up evidence. According to Le Monde, the intelligence services of France and other governments had infiltrated the highest levels of Al-Qaeda’s camps, and actually listened to the hijackers’ debates about which airlines’ planes should be hijacked, and allied intelligence services also intercepted phone conversations between Al-Qaeda members regarding the attacks. According to journalist Christopher Ketcham, Israel tracked the hijackers’ every move prior to the attacks, and sent agents to film the attack on the World Trade Centers. The National Security Agency and the FBI were each independently listening in on the phone calls between the supposed mastermind of the attacks and the lead hijacker. Indeed, the FBI built its own antenna in Madagascar specifically to listen in on the mastermind’s phone calls. According to various sources, on the day before 911, the mastermind told the lead hijacker “tomorrow is zero hour” and gave final approval for the attacks. The NSA intercepted the message that day and the FBI was likely also monitoring the mastermind’s phone calls. The CIA and the NSA had been intercepting phone calls by the hijackers for years. Shortly before 9/11, the NSA also intercepted multiple phone calls to the United States from Bin Laden’s chief of operations. According to the Sunday Herald, two days before 9/11, Bin Laden called his stepmother and told her “In two days, you’re going to hear big news and you’re not going to hear from me for a while.” U.S. officials later told CNN that “in recent years they’ve been able to monitor some of bin Laden’s telephone communications with his [step]mother. Bin Laden at the time was using a satellite telephone, and the signals were intercepted and sometimes recorded.” Indeed, before 9/11, to impress important visitors, NSA analysts would occasionally play audio tapes of bin Laden talking to his stepmother. And according to CBS News, at 9:53 a.m on 911, just 15 minutes after the hijacked plane had hit the Pentagon, “the National Security Agency, which monitors communications worldwide, intercepted a phone call from one of Osama bin Laden’s operatives in Afghanistan to a phone number in the former Soviet Republic of Georgia,” and secretary of Defense Rumsfeld learned about the intercepted phone call 127 in real-time. [ Authors’ note : If the NSA monitored and transcribed phone calls in real-time on 911, that implies that it did so in the months leading up to 911 as well.] The massive eavesdropping by numerous agencies has not been focused on protecting Americans from terrorists. The NSA spied on U.N. diplomats in their deliberations on the so that the U.S. could figure out which countries were against the war and their reasons, to gain an advantage in twisting arms and selling the war. They have been spying on journalists from the New York Times, the Washington Post, and other publications for years and some eight million Americans are now listed in government threat assessment databases as potentially suspect. The government and its contractors have spent most of their time spying on antiwar protesters, environmentalists and other non- dangerous people prior to 911. 45 The 911 attacks were planned and carried out by the the NSA, military, CIA, FBI and other agencies. It was designed to give the Bush administration the excuse to invade Afghanistan and Iraq. It was also executed to give them the excuse they needed to turn America into a police state.

Citizens cannot record police officers in the line of duty

Christopher Drew, age 60, an artist and teacher and Tiawanda Moore, age 20, a former stripper, face 15 years in prison for recording police officers while performing their dutites. The authorities say that Mr. Drew and Ms. Moore audio-recorded their separate non-violent encounters with Chicago police officers without the officers’ permission, a Class 1 felony in Illinois, which, along with Massachusetts and Oregon, has one of the country’s toughest eavesdropping laws. “Before they arrested me for it,” Ms. Moore said, “I didn’t even know there was a law about eavesdropping. I wasn’t trying to sue anybody. I just wanted somebody to know what had happened to me.” Moore is accused of using her Blackberry to record two Internal Affairs investigators who spoke to her inside Police Headquarters while she filed a sexual harassment complaint last August against another police officer . Mr. Drew was charged with using a digital recorder to capture his 2009 arrest for selling art without a permit on North State Street in the Loop. 128 “That’s one step below attempted murder,” Mr. Drew said of their potential sentences. The crime they are accused of is eavesdropping . Adam Schwartz, a lawyer with the American Civil Liberties Union of Illinois, said that when “something fishy seems to be going on, the perfectly natural and healthy and good thing is for them to pull that device out and make a recording.” The Illinois Eavesdropping Act has been on the books for years. It makes it a criminal offense to audio-record either private or public conversations without the consent of all parties. Audio-recording a civilian without consent is a Class 4 felony, punishable by up to three years in prison for a first-time offense. A second offense is a Class 3 felony with a possible prison term of five years . Although law-enforcement officials can legally record civilians in private or public, audio-recording a law-enforcement officer , state’s attorney, assistant state’s attorney, attorney general, assistant attorney general or judge in the performance of his or her duties is a Class 1 felony, punishable by up to 15 years in prison. The A.C.L.U. filed its lawsuit after several people throughout Illinois were charged in recent years with eavesdropping for making audio recordings of public conversations with the police. The A.C.L.U. argued that the act violates the First Amendment and hinders citizens from monitoring the public behavior of police officers and other officials. On Jan. 10, a federal judge in Chicago dismissed the suit for the second time. Mr. Schwartz said the A.C.L.U. would appeal. Andrew Conklin, a spokesman for Anita Alvarez, the Cook County state’s attorney, said, “We did feel the A.C.L.U.’s claims were baseless and we’re glad the court agreed with us.” Beyond that statement, Mr. Conklin said, “we have no comment because we have these two cases pending.” Mark Donahue, president of the Fraternal Order of Police, said his organization “absolutely supports” the eavesdropping act as is and was relieved that the challenge had failed. Mr. Donahue added that allowing the audio recording of police officers while performing their duty “can affect how an officer does his job on the street.” [ Authors’ note: The fear of police being recorded in the act of their duties will ONLY encourage them to perform their duties in a legal manner. Once police know they cannot be recorded in the performance of their duties it will encourage them to perform their duties in an illegal manner!]

129 Moore’s case is more complicated and “disturbing,” said her lawyer, Robert W. Johnson, who is representing her pro bono. Police went to their home to settle a domestic quarrel. Moore and her boyfriend were separated, and the male officer molested her, propositioned her and gave her his phone number. Moore and her boyfriend filed a complaint with Internal Affairs and they tried to talk her out of filing a complaint, saying the officer had a good record and that they could “guarantee” that he would not bother her again. “They keep giving her the run-around, basically trying to discourage her from making a report,” Johnson said. “Finally, she decides to record them on her cellphone to show how they’re not helping her.” The investigators discovered that she was recording them and she was arrested and charged with two counts of eavesdropping. He noted that the law contains a crucial exception that if a citizen has “reasonable suspicion” that a crime is about to be committed against him he may obtain evidence by recording it. “I contend that the Internal Affairs investigators were committing the crime of official misconduct in preventing her from filing a complaint,” Johnson said. “She’s young. She had no idea what she was getting into when she went in there to make a simple complaint. It’s just a shame when the people watching the cops aren’t up to it.” Moore returned to Internal Affairs with her lawyer to file a full complaint. It is not surprising that law enforcement officers can eavesdrop, video record and spy on citizens whenever they want to and even without a warrant, yet citizens cannot audio or video record police in the performance of their duties in public view. This insane concept will lead to massive abuse by police and law enforcement authorities and eventually lead to a total Soviet/Nazi style dictatorship. 46

Conclusion

Big Brother records virtually every telephone call made in the world every day. They also intercept and record virtually every email, fax and all other electronic communications. The minions of Big Brother then use sophisticated software to catch pertinent conversations focusing on “key words” such as bomb, explosives, kill, bribe, chemicals, spy, sabotage, espionage, shoot, etc. The software picks out conversations which move to the next level. Another software program examines the conversation and makes a determination whether it is innocent or should be examined further. No one knows how many levels of 130 software a conversation goes through before a person listens to it. Yet thousands of conversations are listened to by NSA employees every day. Remember this fact of life – everything you say on the phone or write in an email or fax is recorded and examined by the NSA. Do NOT say or write anything you do not want Big Brother to hear. Loose lips sink ships and lives, maybe your life. Even though Big Brother watches everything you do, records it and uses it against you, according to him you cannot record his minions as they abuse you and violate your rights. Big Brother is wrong! You can record any Big Brother minion as he performs his duties legally or illegally. If they say you do not take them to court.

Notes

1a. https://secure.wikimedia.org/wikipedia/en/wiki/Gunfire_locator. 1a. www.microflown-avisa.com/land/gun-loc.html. 1a. www.shotspotter.com. 1b. www.nhregister.com/articles/2008/09/08/news/a3-shotspotter1_ mon.txt. 1c. http://defense-update.com/features/2008/november/231108_sniper_detection.h tml. 1d. www.bbn.com/products_and_services/boomerang/boomerang_warrior_x. 1e. www.safetydynamics.net. 1f. Ding, Albert & Robertson, Matthew. “Chinese Spying Devices Installed on Hong Kong Cars.”Epoch Times, 6.12.2011. www.theepochtimes.com/n2/china/ chinese-spying-devices-installed-on-hong-kong-cars-57587.html. & “Chinese Spy Device in Hong Kong Cars: Apple Daily.” 6.14.2011. http://english.ntdtv.com/ ntdtv_en/news_china/2011-06-14/chinese-spy-device-in-hong-kong-cars-apple-daily. html. 1f. Kage, Ben. “Big Brother is listening: Government can eavesdrop on your life by secretly listening through your cell phone.” NaturalNews. 12.05.2006. www. naturalnews.com/021240.html. 2. McCullagh, Declan. “Court to FBI: No spying on in-car computers.” ZDNet News. 11.19.2003. http://news.zdnet.com/2100-9584_22-132934.html. 3. McCullagh, Declan and Broache, Anne. “FBI taps cell phone mic as eavesdropping tool.” CNET News. 12.01.2006. http://news.cnet.com/2100-1029_3- 6140191.html. 4. www.tscmvideo.com/eavesdropping/hookswitch%20bypass.html#. 5. www.iiiweb.net/go/tscm. 6. Fox News. “FBI DITCHES CARNIVORE SURVEILLANCE SYSTEM.” 1.18.2005. www.fox news.com/story/0,2933,144809,00.html. 7. http://en.wikipedia.org/wiki/NarusInsight. & www.eff.org/cases/att. www.nar us.com & Bamford, James, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America . 8. www.opsi.gov.uk/acts/acts2000/ukpga_20000023_en_1. 131 9. London Telegraph. “State to ‘spy’ on every phone call, email and web search.” 11.10.2009. www.telegraph.co.uk/news/newstopics/politics/lawandorder/6534319/St ate-to-spy-on-every-phone-call-em ail-and-web-search .html. 10. Fox, Barry. “Invention: Wall-beating bugging.” 10.25.2005. www.new scientist.com.nyud.net:80 90/article/dn8208. 11. Roush, Wade. “Googling your TV.” Technology Review. 8.24.2006. www. technologyreview.com/computing/17354/?a=f. 12. Cauley, Leslie. “NSA has massive database of Americans’ phone calls.” USA Today. 5.11.2006. www.usatoday.com/news/washington/2006-05-10-nsa_x. htm. 13. Schmid, Gerhard (2001-07-11). “On the existence of a global system for the interception of private and commercial communications (ECHELON interception system), (2001/2098(INI))” (pdf – 194 pages). European Parliament: Temporary Committee on the ECHELON Interception System. www.europarl. europa.eu/ sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A5-2001-0264+0+DOC+P DF+V0//EN &language=EN. 14. http://en.wikipedia.org/wiki/Room_641A. 15. Rood, Justin. “NSA Eavesdropping ‘Outrageous’ and ‘Disturbing,’ Critics Say – Insiders Told ABC News What NSA Really Heard.” ABC News. 10.10.2008. www.abcnews.go.com/Blotter/story?id=5998860&page=1. 16. http://cryptome.org/echelon-nh.htm. 17. http://en.wikipedia.org/wiki/President%27s_Surveillance_Program. & http:// en.wikipedia.org/wiki /Terrorist_Surveillance_Program. 18. Kage, Ben. “Big Brother is listening: Government can eavesdrop on your life by secretly listening through your cell phone.” Natural News. 12.05.2006. www.nat uralnews.com/021240.html. 19. www.tscmvideo.com/eavesdropping/hookswitch%20bypass.html. 20. Risen, James and Lichtblau, Eric. “E-Mail Surveillance Renews Concerns in Congress.” New York Times. 6.16.2009. www.nytimes.com/2009/06/17/us/17nsa .html?_r=3&hp=&pagewanted=all. 21. Buffalo News. “Technology identifies troubled individuals.” 9.26.2010. www .buffalonews.com/city/article201702.ece. 22. “Speak no evil at airports.” News24.com/AP. 11.18.2005. www.news24.com/ News24/World/News/0,,2-10-1462_1836399,00.html. 23. Beard, Matthew. “Insurer to use lie detectors to root out false claims.” The Independent. 8.15.2003. www.independent.co.uk/news/uk/home-news/insurer-to-use- lie-detectors-to-root-out-false-claims-535911.html. 24. Hunter, Teresa. “‘We can tell if you’re fibbing.’” Daily Telegraph. 12.16. 2003. www.telegraph.co.uk/finance/personalfinance/insurance/2871936/%27We-can- tell-if-you%27re-fibbing%27.html. 25. Robins, Jon. “Why your insurer doesn’t like your tone of voice.” The Observer. 1.13.2008. www.guardian.co.uk/business/2008/jan/13/7. 26. Maney, Kevin. “The truth is out there, and lie-detection technology just might find it.” USA Today. 9.03.2003. www.usatoday.com/tech/columnist/kevinmaney/ 2003-09-02-maney_x.htm. 27. “Nemesysco Appoints Executive Chairman.” Security Park. 7.26.2007. www.securitypark.co.uk/security_article259789.html. 28. Silverstein, Jonathan. “Tech Blotter: Artsy Laptops and Airport Lie Detectors” ABC News. 11.21.2005. http://abcnews.go.com/Technology/story?id=13 27788. 132 29. Hollien, Harry; James D. Harnsberger. “Voice Stress Analyzer Instrumentation Evaluation.” (pdf), CIFA Contract – FA 4814-04-0011 , 3.17.2006. www.clas.ufl.edu/users/jharns/Research%20Projects/UF_Report_03_17_2006.pdf. 30. Damphousse, Kelly R. “Voice Stress Analysis: Only 15 Percent of Lies About Drug Use Detected in Field Test.” NIJ Journal (National Institute of Justice) (259). March 2008. www.ojp.usdoj.gov/nij/journals/259/voice-stress-analysis.htm. 31. Eriksson, Anders; Francisco Lacerda (2007). “Charlatanry in forensic speech science: A problem to be taken seriously.” International Journal of Speech Language and the Law (Equinox Publishing) 14 (2): 169–193. doi:10.1558/ijsll.2007.14.2.169. www.scribd.com/doc/9673590/Eriksson-Lacerda-2007. 32. Joyce, Janet (2008-12-04). “Note from Publisher.” Equinox Publishing. www.equinoxjournals.com/ojs/index.php/IJSLL/article/view/3775. 33. Bojs, Karin. “Lögndetektorer fungerar inte.” Dagens Nyheter. 12.28.2008. www.dn.se/DNet/jsp/polopoly.jsp?d=597&a=868300. 34. Larsson, Per. “All lies? Scientists threatened with legal action over lie detector article.” News and events. Stockholm University External Relations Office. 1.28.2009. www.su.se/ english/about/news_and_events/scientists_threatened_with_le gal_ action. 35. Jogestrand, Kristina. “Forskare hotas av åtal.” Dagens Nyheter. 1.27.2009. www.dn.se/DNet/jsp/polopoly.jsp?d=597&a=877743. 36. Bojs, Karin. “De försöker tysta ner forskning.” Dagens Nyheter. 1.27.2009. www.dn.se/DNet/jsp/polopoly.jsp?d=1298&a=877754. 37. “Lie Detector Company Threatens Critical Scientists With Suit.” Slashdot. 1.29.2009. http://yro.slashdot.org/article.pl?sid=09/01/29/2018254. 38. “Serious assault on research freedom.” Royal Swedish Academy of Sciences. www.kva.se/en/pressroom/press-releases-2009/Serious-assault-on-research-freedom. 39. Ketcham, Christopher. “The Last Roundup.” Radar Magazine. May/June 2008. www.christopher ketcham.com/wpcontent/uploads/2010/02/The%20Last%20 Roundup,%20Radar%20Magazine.pdf & www.informationclearinghouse.info/article 19871.htm. 40. Daily Telegraph. “Surveillance system monitors conversations.” 7.04.2010. www.telegraph.co.uk/technology/news/7870928/Surveillance-system-monitors-conv ersations.html. 41. Stevenson, Richard W. and Liptak, Adam. “Cheney Defends Eavesdropping Without Warrants.” 12.21.2005. www.nytimes.com/2005/12/21/politics/21cheney.ht ml?_r=1. 42. Harris, Andrew. “Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say.” 6.30.2006. www.bloomberg.com/apps.news?pid=newsarchive&sid=abIV0c06 4zJE. 43. Edwards, David and Webster, Stephen C. “Sen. Rockefeller: NSA may have spied on me.” Raw Story. 1.22.2009. http://rawstory.com/news/2008/Rockefeller_ NSA_may_have_spied_on_0122.html. 44. Singel, Ryan. “Analysis: New Law Gives Government Six Months to Turn Internet and Phone Systems into Permanent Spying Architecture.” 8.06.2007. www.wired.com/threatlevel/2007/08/analysis-new-la/#previouspost. 45. Washington’s Blog. “5 Surprising Facts About Spying In America.” 9.22.2010. www.washingtonsblog.com/2010/09/5-facts-you-dont-know-about-spying-in.html. 46. Terry, Don. “Eavesdropping Laws Mean That Turning On an Audio Recorder Could Send You to Prison.” New York Times. 1.22.2011. www.nytimes.com/2011/01/23/us/23cnc eavesdropping.html?_r=1. 133

DeesIllustration.com

134

SEVEN

SPYING ON WE THE PEOPLE

Big Brother not only watches and listens to virtually everything people do, say and hear he has hired nearly one million people to spy on We The People and he is even recruiting us to spy on each other.

Government spying

COINTELPRO

COINTELPRO (an acronym for Co unter Intel ligence Pro gram) was a series of covert, and often illegal, projects conducted by the Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within America. The FBI has used covert operations from its inception, however formal COINTELPRO operations took place between 1956 and 1971. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order.” According to FBI records, 85% of COINTELPRO resources were expended on infiltrating, disrupting, marginalizing, and/or subverting groups that opposed the government’s actions. The Select Committee to Study Governmental Operations with Respect to Intelligence Activities of the United States Senate (Church Committee), which determined there were at least two assassination teams involved in the murder of President Kennedy, found that the declared purposes of COINTELPRO – to protect the “national security” or prevent violence – were not the real purposes. Bureau witnesses admitted that many of the targets were nonviolent, and most had no connections with a foreign power. The FBI used COINTELPRO to suppress political dissent and to find “dirt” on politicians or famous citizens. 1 The Church Committee concluded that:

Too many people have been spied upon by too many Government agencies and too much information has been collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. 2

135 Although COINTELPRO was “officially” shut down in 1971 some believe unofficial COINTELPRO operations have continued. The Associated Press reported in November 2008 that documents released under the Freedom of Information Act show that the FBI tracked the late Pulitzer Prize-winning journalist and author David Halberstam for more than two decades. 3 You can be assured that some program similar to COINTELPRO is still operating. Big Brother “officially” shuts down illegal operations when caught, but keeps them going covertly.

Operation CHAOS

Operation CHAOS or Operation MHCHAOS was the code name for a domestic espionage project conducted by the Central Intelligence Agency . A department within the CIA was established in 1967 on orders from Lyndon B. Johnson and later expanded under Richard Nixon. The operation was launched under Director of Central Intelligence (DCI) Richard Helms, by chief of counter-intelligence, James Jesus Angleton, and headed by Richard Ober. The program’s goal was to unmask possible foreign influences on the student antiwar movement. 4-5 The “MH” designation is to signify the program had a worldwide area of operations. 6 During its time, Operation CHAOS made use of the facilities of other ongoing CIA domestic surveillance programs, many operating under the CIA’s Office of Security, including: 5

HTLINGUAL – Directed at letters passing between the United States and the then Soviet Union, the program involved the examination of correspondence to and from individuals or organizations placed on a watchlist. Project 2 – Directed at infiltration of foreign intelligence targets by agents posing as dissident sympathizers and which, like CHAOS, had placed agents within domestic radical organizations for the purposes of training and establishment of dissident credentials. Project MERRIMAC – Designed to infiltrate domestic antiwar and radical organizations thought to pose a threat to security of CIA property and personnel. Project RESISTANCE – Worked with college administrators, campus security and local police to identify anti-war activists and political dissidents without any infiltration taking place.

136 Domestic Contact Service – Focused on collecting foreign intelligence from willing Americans.

When President Nixon came to office in 1969, all of the existing domestic surveillance activities were consolidated into Operation CHAOS. 7 Operation CHAOS first used CIA stations abroad to report on antiwar activities of United States citizens traveling abroad, employing methods such as physical surveillance and electronic eavesdropping, utilizing “liaison services” in maintaining such surveillance. The operations were later expanded to include 60 officers. 6 In 1969, following the expansion, the operation began developing its own network of informants for the purposes of infiltrating various foreign antiwar groups located in foreign countries that might have ties to domestic groups. 5 Eventually, CIA officers expanded the program to include other leftist or counter-cultural groups with no discernible connection to Vietnam, such as groups operating within the women’s liberation movement .4 The domestic spying of Operation CHAOS also targeted the Israeli embassy , and domestic Jewish groups such as the B’nai B’rith . In order to gather intelligence on the embassy and B’nai B’rith , the CIA purchased a garbage collection company to collect documents that were to be destroyed. 8 Operation CHAOS contained files on 7,200 Americans , and a computer index totaling 300,000 civilians and approximately 1,000 groups .9 The initial result of investigations lead DCI Richard Helms to advise then President Johnson on November 15, 1967, that the agency had uncovered “no evidence of any contact between the most prominent peace movement leaders and foreign embassies in the U.S. or abroad.” Helms repeated this assessment in 1969.4 In total 6 reports where compiled for the White House and 34 for cabinet level officials. 5 In 1973, amid the uproar of the Watergate break-in, involving two former CIA officers, Operation CHAOS was closed. The secret nature of the former program however was exposed when Seymour Hersh published an article in the New York Times titled “Huge CIA Operation Reported in US Against Antiwar Forces, Other Dissidents in Nixon Years” on December 22, 1974. 4 The government, in response to the revelations, launched the Commission on CIA Activities Within the United States (The Rockefeller Commission ), lead by then Vice President Nelson Rockefeller , to investigate the depth of the surveillance. 4 Richard Cheney , then Deputy White House Chief of

137 Staff, is noted as stating of the Rockefeller Commission; it was to avoid “ ... congressional efforts to further encroach on the executive branch.”4 Following the revelations by the Rockefeller Commission, then DCI, George H. W. Bush , stated: “...the operation in practice resulted in some improper accumulation of material on legitimate domestic activities.” 6 You can read the reports about this illegal operation and see how bad it was. 10-11 The charter of the CIA does not allow it to spy on Americans inside the country. Yet it has been caught spying illegally on Americans over and over. It will continue to do so. Big Brother does not care about laws. He breaks them thousands of times every day.

Intelligence community

Since the 911 attacks the number of domestic spies in America has skyrocketed to nearly 1,000,000 and the budget is three times as high. A new survey of the intelligence network created in the wake of the 9/11 attacks estimates that some 854,000 people have been given high- level clearance. The estimate comes from the Washington Post which has dedicated a team of reporters to a two-year project on what it calls “Top Secret America.” They have also identified some 1,271 government bodies and 1,931 private contractors working on counter- terrorism. The Post believes the spy network in America is not only huge and expensive, it is also highly inefficient and unwieldy. The official US intelligence budget as of 2010 is $75 billion, almost three times its size in 2001. The intelligence community generates 50,000 intelligence reports a year that just a handful of top operatives, known as super users, are allowed to have an overview of all the findings. “I’m not going to live long enough to be briefed on everything,” one told the Washington Post. 12 Big Brother’s goal is to turn everyone on the planet into a spy for him. Spouses will be spying on each other and their children, children on their parents and each other, neighbors on neighbors, friends on friends, employees on each other and their employers and vice-versa. We know this because that is what the Bible says:

And brother shall deliver up brother to death, and the father his child: and children shall rise up against parents, and cause them to be put to death. Matthew 10.21)

138 This prophecy will be fulfilled during the Tribulation in which the Antichrist will be Big Brother.

Pentagon spying

The Pentagon has illegally been spying on the American people for decades, but now its spying is considered legal and necessary. In 2004 a small group of activists met at a Quaker Meeting House in Lake Worth, Florida, to plan a protest of military recruiting at local high schools. That innocent meeting scared the men at the Pentagon. A secret 400-page Defense Department document that was obtained by NBC News listed the Lake Worth meeting as a “threat” and one of more than 1,500 “suspicious incidents” across the country over a recent 10-month period. “I think Americans should be concerned that the military, in fact, has reached too far,” said NBC News military analyst Bill Arkin. The Department of Defense declined repeated requests by NBC News for an interview. A spokesman said that all domestic intelligence information is “properly collected” and involves “protection of Defense Department installations, interests and personnel.” The military has always had a legitimate “force protection” mission inside the U.S. to protect its personnel and facilities from potential violence. (It sounds like an excuse to spy on political dissenters.) “It means that they’re actually collecting information about who’s at those protests, the descriptions of vehicles at those protests,” said Arkin. “On the domestic level, this is unprecedented,” he says. “I think it's the beginning of enormous problems and enormous mischief for the military.” Christopher Pyle, a former Army intelligence officer said, “Some people never learn.” During the Vietnam War he blew the whistle on the Defense Department for monitoring and infiltrating anti-war and civil rights protests when he published an article in the Washington Monthly in January 1970. The public was outraged and a lengthy congressional investigation followed that revealed that the military had conducted investigations on at least 100,000 American citizens. Pyle got more than 100 military agents to testify that they had been ordered to spy on U.S. citizens – many of them anti-war protestors and civil rights advocates. In the wake of the investigations, Pyle helped Congress write a law placing new limits on military spying inside the U.S. “The documents tell me that military intelligence is back 139 conducting investigations and maintaining records on civilian political activity. The military made promises that it would not do this again,” he said. CIFA was superpower of data mining within the U.S. national security community. Since March 2004 it gave at least $33 million in contracts to corporate giants Lockheed Martin, Unisys Corporation, Computer Sciences Corporation and Northrop Grumman to develop databases that comb through classified and unclassified government data, commercial information and Internet chatter to help sniff out terrorists, saboteurs and spies. “The military has the right to protect its installations, and to protect its recruiting services,” says Pyle. “It does not have the right to maintain extensive files on lawful protests of their recruiting activities, or of their base activities,” he argued. Bert Tussing, director of Homeland Defense and Security Issues at the U.S. Army War College said “there is very little that could justify the collection of domestic intelligence by the Unites States military. If we start going down this slippery slope it would be too easy to go back to a place we never want to see again.” 13 The Pentagon is one of the biggest and most powerful arms of Big Brother. He will continue to use it to spy on the American people.

Obama snoopers spy on doctors

Obama administration officials are putting together a team of ‘mystery shoppers’ to pose as patients who call doctors’ offices and request appointments to see how difficult it is for people to get care when they need it. This operation, which will cost $347,370, is being carried out because of a shortage of primary care doctors. Officials say the operation will address the shortage and try to discover whether doctors are accepting patients with private insurance while turning away those in government health programs that pay lower reimbursement rates. Dr. Raymond Scalettar, an internist in Washington, said: “I don’t like the idea of the government snooping. It’s a pernicious practice – Big Brother tactics, which should be opposed.” 14 This is a publicity stunt. Barry Soetoro (a.k.a. Barak Obama) does not care about the poor and down-trodden. He is the banksters’ boy. He does exactly what he is told and nothing else. Soetoro and the banksters hate you, that is why they passed the death-care bill.

140 Corporate spying on Americans

InfraGard

InfraGard is a FBI Public-private partnership that began in the Cleveland, Ohio, Field Office in 1996. The program expanded, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) directed by R. Adm. James B. Plehal and to the FBI’s Cyber Division in 2003. InfraGard Alliances support FBI priorities in the areas of counterterrorism, foreign counterintelligence, and cybercrime. According to Matthew Rothschild, InfraGard had 23,000 members in 86 chapters around America in 2008. As of December of 2009 it has 32,000 members from all walks of life. He even alleges that the members have the authority during martial law to shoot and kill anyone they deem to be an “enemy of the state.”15 As noted before, Big Brother wants everyone to be spying on everyone else. Employers are easy to recruit to spy on their employees because most of them do not like their employees.

Institute of Terrorism Research and Response

The city of Philadelphia hired the Institute of Terrorism Research and Response to spy on to compile a list of activists as part of the state Homeland Security’s federally mandated mission to protect public infrastructure. Very little is known about this company. Co-directors are listed as Aaron Richman, a former Israeli police captain, and Michael Perelman, a former York police commander. ITRR’s website calls the company “the preeminent Israeli/American security firm providing training, intelligence and education to clients across the globe.” It describes its “Targeted Action Monitoring Center” as “no clipping service, but a powerful fusion center of battle-tested operatives, analysts, and researchers who have real-life experience fighting both terrorists and criminal entities… distinguished among other agencies by its access to a vast network of on-the-ground key-sources in virtually every region of the world.” A LexisNexis news search for the group’s name yields little, and there exists virtually no mention of the group anywhere in the mainstream media. The group appears to have appeared at a 2008 Philadelphia “Emergency Preparedness and Prevention and Hazmat 141 Spills Conference,” sponsored by the EPA, which included among its speakers ITRR directors Richman on “counter-terrorism techniques” and Perelman on “unlawful tactics used by eco-terrorists and anarchists.” According to Linkedin.com ITRR employs six men and two women. The median age of the eight employees is 30 and the median tenure is three years. It looks like a front company for the Mossad. 16 Big Brother will be hiring thousands of private companies to spy on the people. By the time the Antichrist takes power there will be tens of thousands of private companies around the world doing nothing but spying for him.

Citizen snitches

Operation TIPS

As part of the country’s war against terrorism, the Bush administration sought to recruit a million letter carriers, utility workers and others whose jobs allow them access to private homes into a contingent of organized government informants. The Terrorism Information and Prevention System (Operation TIPS), a national reporting pilot program, was scheduled to start in August of 2002 in 10 cities, with 1 million informants or nearly 4 percent of Americans initially participating in the program. 17 Then Attorney General Robert Ashcroft defended the program, equivocating on whether the reports by citizens on fellow citizens would be maintained in government databases. He said the information would not be in stored in a central database as part of Operation TIPS, yet it would be kept in databases by the various law enforcement agencies that obtained the tips. 18 When the Homeland Security Act was finally signed on November 25, 2002, the Operation TIPS program was prohibited:

Section 880. Prohibition of the Terrorism Information and Prevention System –Any and all activities of the Federal Government to implement the proposed component program of the Citizen Corps known as Operation TIPS (Terrorism Information and Prevention System) are hereby prohibited.

142 Democratic senator Patrick Leahy and Congressman Dick Army wanted Operation TIPS out of the DHS bill while Senator Joe Lieberman wanted it in. Lieberman argued Operation TIPS, which was described by the Department of Justice as “giving millions of American truckers, letter carriers, train conductors, ship captains, utility employees, and others a formal way to report suspicious activity,” was necessary for the defense of the homeland. Leahy argued that such a program “could have allowed unscrupulous participants to abuse their new status to place innocent neighbors under undue scrutiny.” Do not worry. Big Brother will launch another Operation TIPS program after the next major terrorist attack that will be carried out by assets working for Big Brother. In the meantime he has dozens of other spy programs operating as you will see.

Highway Watch

Highway Watch is a program the Department of Homeland Security started to create a nation-wide force of more than 400,000 men and women to spot terrorists. In 2004 the federal government gave $19.3 million to the American Trucking Associations to recruit a volunteer “army.” In that year DHS signed up 10,000 truckers to become spies. It expanded its program to add tollbooth workers, rest-stop employees and construction crews. Members of Highway Watch are given a secret toll-free number to report any suspicious behavior – people taking pictures of bridges, for example, or passengers handling heavy backpacks with unusual care. Highway Watch received an additional $22 million in 2005. The Department of Homeland Security also launched Port Watch, River Watch and Transit Watch. The Highway Watch website, which was shut down in 2008 along with the secret toll-free number, boasted that the program is open to “an elite core [sic] of truck drivers” who must have clean driving and employment records. The truth is their records were not vetted by the American Trucking Associations. “It could be infiltrated,” said Dawn Apple, Highway Watch’s director of training and recruitment. States and cities have started their own watch programs. Thousands of doormen and building superintendents in New York City have been trained to watch out for strange trucks parked near buildings and 143 tenants who move in without furniture. Other states that still have their own Highway Watch programs are Colorado, Georgia, Indiana, Massachusetts, Minnesota, Missouri, Nebraska, and New Jersey.19

First Observer

“First Observer” is a national safety and security program that uses the skills, experiences and “savvy” of America’s transportation professionals to help protect the critical transportation function that moves the goods and services and people across America. “First Observer” is operated by Team HMS under a Cooperative Agreement with the Department of Homeland Security (DHS) Trucking Security Program (TSP). The program’s mission is to administer an anti-terrorism and security awareness program for highway professionals in support of the National Preparedness Guidelines. A key component of the program is to recruit volunteers from the Trucking, Motor Coach Carriers and School Bus industries to act as our “First Observer” in reporting suspicious activities of either a criminal or potential terroristic nature to authorities. Our vision to the Trucking, School Bus and Motor Carrier Program includes developing a flexible training program designed to meet challenges head on. We endorse a training program that develops and launches training modules for different communities and different threats as they emerge. In advance of hurricane season, we envision creating hurricane specific training modules. Different communities require different levels of training. We intend to leverage our relationships within the law enforcement community and our program experience to create first responder community specific training modules as required. Training will be delivered via video, website and with support from key Team members at conferences, events, and union and stakeholder meetings across the nation. Our approach for the Program Highway ISAC includes meeting all of the Program stated requirements. 20

Terrorism liaison officers

The FBI is recruiting thousands of covert informants in the United States as part of a sprawling effort to boost its intelligence capabilities. According to a recent unclassified report to Congress, the FBI expects the “more than 15,000 informants” it plans to recruit here and abroad to 144 provide secrets about possible terrorists and foreign spies. Some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI said the push was driven by a 2004 directive from President Bush ordering the bureau to improve its counterterrorism efforts by boosting its human intelligence capabilities. 21 Hundreds of police, firefighters, paramedics and utility workers have been trained and dispatched as “Terrorism Liaison Officers” in Colorado and other states to hunt for “suspicious activity.” Their reports are put into secret government databases. It is a tactic intended to feed better data into terrorism early-warning systems and uncover intelligence that could help fight anti-American forces. But the vague nature of the TLOs’ mission, and their focus on reporting both legal and illegal activity, has generated objections from privacy advocates and civil libertarians. “Suspicious activity” is broadly defined in TLO training as behavior that could lead to terrorism: taking photos of no apparent aesthetic value, making measurements or notes, espousing extremist beliefs or conversing in code, according to a draft Department of Justice/Major Cities Chiefs Association document. 22

Crime Stoppers USA

Crime Stoppers USA was conceived when Michael Carmen was shot to death during a robbery at an Albuquerque, New Mexico gas station in July 1976. Detective Greg MacAleese had no idea who was responsible for the killing and decided to film a re-enactment of the crime and show it to the public. From that incident hundreds of police departments in America have become part of the program. The movement has gone worldwide and CSUSA is a regional member of Crime Stoppers International. Below is CSI’s vision, mission and goals:

Our Vision is to establish Crime Stoppers as the Premier Community Based Crime Solving Program in the United States.

Our Mission is to develop Innovative Resources and partnerships that promote Crime Stoppers throughout the United States.

Our Goals include:

145 Supporting existing community and school Crime Stoppers programs. Encouraging and assisting the growth of community and school Crime Stoppers programs throughout the United States. Helping Crime Stoppers be the most cost effective crime solving tool for law enforcement. Building a strong communications network among US Crime Stoppers programs, law enforcement, and the general public .

Calls to the crime stoppers hot lines increased by 25% or more in the first quarter of 2008. This increase was due to the downturn in the economy. The economic situation for the remainder of 2008 was even worse and for 2009 it was horrendous. 23

Crime Stoppers International

Crime Stoppers International is a network of 1,188 police departments around the world that work “to advance and support an effective crime-solving, crime reduction and crime prevention organization throughout the world; working in partnership with the Community, Media and Law Enforcement.” 24

Operation Bright Eyes

Bright House Networks launched a new neighborhood watch initiative in July of 2009. Operation Bright Eyes is designed to maximize the eyes and ears of Bright House Networks field service representatives and other employees to easily identify suspicious behavior and to quickly report criminal activities to the police. Bright House says each of its 3000 employees, including hundreds who regularly drive through and become familiar with residents and activities in neighborhoods, will receive crime-watch training designed by Central Florida Crimeline. Employees will also be equipped with a comprehensive list of emergency numbers to call. Current and new employees will receive the training. “Were committing our people, including hundreds of folks intimately familiar with the routes they drive, to helping law enforcement keep our neighborhoods safe. This is all about using the resources already at our disposal to do the right thing for our community,” said J. Christian Fenger, president of Bright House Networks Central Florida division.

146 Bright House Networks, the 6th largest multiple cable system operator in America, has 2.4 million customers in several large cities including Tampa Bay and Orlando, Florida; Bakersfield, California; Indianapolis, Indiana; Detroit, Michigan; and Birmingham, Alabama. 25

Indy Watch

Police chiefs meeting in Denver in October of 2009 adopted a model for a nationwide community watch program that teaches people what behavior is truly suspicious and encourages them to report it to police. Michael Spears, chief of the Indianapolis Metropolitan Police Department, attended the meeting and discussed implementing the program in Indianapolis, where it would be called “Indy Watch.” 26

iWatch

Los Angeles Police Chief William Bratton and Police Cmdr. Joan McNamara developed the iWatch program – the 21st century version of Neighborhood Watch. Using brochures, public service announcements and meetings with community groups, iWatch is designed to deliver concrete advice on how the public can follow the oft-repeated post-Sept. 11 recommendation, “If you see something, say something.” Program materials list nine types of suspicious behavior that should compel people to call police – and 12 kinds of places to look for it. The program also is designed to ease reporting by providing a toll-free number and Web page the public can use to alert authorities. 27

Waste Watch

Albany and Rensselaer Counties announced the launch of a new program in February 2008, where Waste Management will help to prevent crime. Drivers have been trained to observe and report to local law enforcement and first responders. Albany Police Chief Steven Krokoff says, “The more eyes and ears we have out there the safer we make our public.” Waste Watch is in place in more than 100 communities nationwide. The Capital Region is the first region in New York state to host the program. For more information visit – www.wm.com. 28

147 PatriotApp

Citizen Concepts, a DBA of Patriot Applications, LLC, bills itself as a “Florida Space Coast” software and services company. Its “PatriotApp” encourages active citizen participation in the War on Terror and in protecting their families and surrounding communities. Citizen Concepts announced the launch of PatriotAppTM in September 2010. It is the world’s first iPhone application that empowers citizens to assist government agencies in creating safer, cleaner, and more efficient communities via social networking and mobile technology. This app was founded on the belief that citizens can provide the most sophisticated and broad network of eyes and ears necessary to prevent terrorism, crime, environmental negligence, or other malicious behavior. This smartphone interface provides a quick and easy link for reporting events or citizen concerns to the appropriate governmental agency. The interface incorporates the following subject areas: National Security, Crime, Product Safety, Environmental Safety, Government Waste, and Corporate Issues (discrimination, racism and white collar crime) – all at the user’s fingertips. Dr. Roy R. Swiger, co-owner of Citizen Concepts, says, “This application was created on the belief that citizens are the strongest source of vigilance and action. We simply leverage technology to bridge the divide between people and their government.” Co-owner, Chuck Reinighaus, says, “The product is named PatriotApp™, to remind global citizens to be continually vigilant and to engage in preserving the security and safety of our world .” Citizen Concepts also has a SchoolSafteyApp http://patriotapps. com/SchoolApp.html – a HospitalEMSApp – http://patriotapps.com/ HEMSApp.html and a Data Mining: Post-Event Review – http://patriot apps.com/Data_Mining.html.29 The rhetoric for this spy tool sounds very Big Brotherish. Is it possible this company is a front organization of the FBI, CIA, DHS and or the NSA?

Eco-snoop

EcoSnoop is an iPhone application that allows anyone to turn in someone or a company they think is harming the environment or wasting energy. 148 EcoSnoop’s mission is to help our communities heighten awareness of opportunities to be more green, save energy, eco hypocrisy, and even fill pot holes. Leveraging the power of the community, EcoSnoops use their an iPhone to capture clear pictures of a problem and post these pictures on a community website so that building owners and others can take action. Have you ever:

Seen lights left on in a building, late at night, for no good purpose? Noticed a door that never closes properly, wasting heat or air conditioning? Observed a truck unnecessarily idling at a loading dock? Been bothered by a broken sprinkler in a city park running non stop? Complained about street lights left on all day? Wanted a pot hole filled?

EcoSnoop lets you help solve these problems. EcoSnoop is a photo driven “Trouble Ticket” system, letting you identify a problem while leveraging the community to find a fix. The EcoSnoop website is a tool for awareness and understanding efficency. By using the EcoSnoop iPhone application, the user becomes an important link in the chain of many helping to discover and mediate waste (energy, pollution, etc.) in government buildings and our community.

EcoSnoop claims it is “Not Big Brother” and it “is not about picking sides in the environmental or climate change debate.” For more information please contact [email protected] or visit http://blog. ecosnoop.com.30

It was always the women, and above all the young ones, who were the most bigoted adherents of the Party, the swallowers of slogans, the amateur spies and nosers-out of unorthodoxy. (George Orwell, 1984 )

As you can see Big Brother has thousands of spies scattered all over America doing his dirty work. Soon you will not be able to walk outside of your home without someone watching your every move. Make friends with everyone or the person you do not befriend may turn you in for a reward.

149

Big Sister

“If You See Something, Say Something”

On December 1, 2010, the Department of Homeland Security (DHS) announced the expansion of the national “If You See Something, Say Something” public awareness campaign throughout Minnesota – to include Mall of America as well as other public venues across the state. “Homeland security begins with hometown security, and every citizen plays an important role in ensuring America’s safety,” said Secretary Janet Napolitano. “The ‘If You See Something, Say Something’ campaign will provide the citizens of Minnesota and the many shoppers and visitors to Mall of America with the tools to identify and report indicators of terrorism, crime and other threats to the proper law enforcement authorities.” The “If You See Something, Say Something” campaign began by New York City’s Metropolitan Transportation Authority with a DHS grant of $13 million. The expansion of the “If You See Something, Say Something” campaign to Mall of America includes both print and video advertisements throughout the mall’s shopping and amusement park areas to help thousands of daily tourists and shoppers identify potential threats and suspicious situations. The state-wide expansion of the “If You See Something, Say Something” campaign will begin in Minneapolis and St. Paul and will leverage Minnesota’s participation in the Nationwide Suspicious

150 Activity Reporting (SAR) Initiative – an administration effort to share tips by citizens with law enforcement agencies around the country. Since this summer, DHS has worked with its state, local and private sector partners, as well as the Department of Justice, to expand Nationwide SAR Initiative to communities throughout the country, including the recent state-wide expansion of the “If You See Something, Say Something” campaign throughout New Jersey and new partnerships with organizations including the American Hotel & Lodging Association (AH&LA), Amtrak, the Washington Metropolitan Area Transit Authority (WMATA), the general aviation industry and six state and local fusion centers across the Southeastern United States that participate in Southern Shield. In the coming months DHS will continue to expand the “If You See Something, Say Something” campaign nationally with public education materials and outreach tools designed to engage America’s businesses, communities and citizens to remain vigilant and play an active role in keeping the county safe. 31

“If You See Something, Say Something” expands to 9,000 federal buildings

Department of Homeland Security announced the expansion of the national “If You See Something, Say Something” public awareness campaign to 9,000 federal buildings. “Homeland security begins with hometown security and every citizen – including government employees – plays a critical role in ensuring America’s safety and security,” said DHS Secretary Janet Napolitano. “Our partnership with the Federal Protective Service (FPS) and the General Services Administration (GSA) to expand the ‘If You See Something, Say Something’ campaign to our nation’s federal buildings is a crucial step in helping the millions of people who work in or visit our federal buildings every day identify and report suspicious activity indicators of terrorism, crime and other threats.” In the coming months, the Department will continue to expand the “If You See Something, Say Something” campaign nationally with public education materials and outreach tools designed to help America’s businesses, communities and citizens remain vigilant and play an active role in keeping the country safe. 32

151 Big Sister’s “If You See Something, Say Something” scam should anger you. WE THE PEOPLE must tell Big Sis she is a fascist swine and the snooping program must be shut down. With all of the “watch” programs how could any terrorist group pull off another attack? They could not. When you consider all the government, police and military watch programs it would be physically impossible for terrorists to make another attack. When the next attack takes place you can be 100% certain it will be an “Inside Job.”

“If You See Something, Say Something” campaign expands to Walmart

Department of Homeland Security announced on December 6, 2010, the expansion of the Department’s national “If You See Something, Say Something” campaign to hundreds of Walmart stores across the country. “Homeland security starts with hometown security, and each of us plays a critical role in keeping our country and communities safe,” said Secretary Janet Napolitano. “I applaud Walmart for joining the ‘If You See Something, Say Something’ campaign. This partnership will help millions of shoppers across the nation identify and report indicators of terrorism, crime and other threats to law enforcement authorities.” More than 230 Walmart stores nationwide launched program in December 2010 and a total of 588 other stores in 27 states joined the campaign in 2011. A short video message plays at select checkout locations to remind shoppers to contact local law enforcement to report suspicious activity. The message can be seen at YouTube.com www.youtube.com/watch?v=Czoww2l1xdw. 33 Eventually Big Brother will have his ads shown in virtually every retail outlet, bank, government offices, post offices, billboards and pedestrian mini-billboards.

“If You See Something, Say Something” program goes to the Super Bowl

Janet Napolitano today joined National Football League to announce a new partnership to bring the Department of Homeland Security’s “If You See Something, Say Something” public awareness campaign to Super Bowl XLV.

152 The campaign at Super Bowl XLV will include both print and video advertisements, as well as a training video for NFL employees to ensure that both employees and fans have the tools they need to identify and report suspicious activities and threats. DHS is also working with federal, state, local and private sector partners to support security efforts at the Super Bowl through additional personnel, technology and resources. 34 There have been 10 Super Bowls since 911 and NOT a single incident at any of them. Nine of them without the puppet figurehead of the DHS being there. Why was there an urgent need for Napolitano to be there in 2011? Could she just have wanted to muscle in on the Super Bowl party? The “If You See Something, Say Something” program is straight out of 1984 . All of the government watch programs are Big Brother programs designed to make everyone distrust everyone else and only trust in Big Brother. Do not become a Big Brother stooge! Do not turn anyone in to him for any reason. This insane program is not the end of Big Sister’s bizarre behavior. She has also forced the NFL to allow TSA perverts to molest their fans as they enter the ballparks. Say NO to Big Sis and do NOT attend any NFL game.

“If You See Something, Say Something” expands to coffee shops

Big Brother is watching you while you drink your coffee, or at least imploring you to watch others while you drink your coffee. 153 Coffee addicts getting their morning fix may notice an advertisement on their coffee-cup sleeves with a helpful message from the Department of Homeland Security. “If you see something, say something,” the ad says. “Report unattended bags and unusual behavior to police or transit personnel.” A DHS spokesperson said the Maryland Transit Administration started the coffee sleeve campaign. According to the sleeve, the ad was “purchased with funds provided by the U.S. Department of Homeland Security.” Part of the Department of Homeland Security’s guidelines for suspicious behavior include individuals “acting furtively and suspiciously” and “avoiding eye contact.” The side effects of heavy caffeine use include irritability, anxiety, tremulousness and muscle twitching. The sleeves are distributed by BriteVision Media, a company that sells ad space on coffee sleeves and then provides the sleeves free to restaurants and cafes. BriteVision did not immediately return requests for comment. DHS first launched its “If you see something” public awareness campaign in July 2010. The campaign’s website touts it as “a simple and effective program to raise public awareness of indicators of terrorism and violent crime, and to emphasize the importance of reporting suspicious activity to the proper state and local law enforcement authorities.” The trademarked “if you see something” slogan was coined by Allen Kay, chairman and chief executive of the Manhattan advertising agency Korey Kay & Partners, shortly after the 9/11 attacks. It was originally used by the Metropolitan Transportation Authority of New York City. 35

DHS video warning about “White Al Qaeda”

Prior to the terrorist attack in Oslo, Norway, the DHS released an information video encouraging Americans to keep a close watch for terrorists. The terrorists in the video are white males in their 30s. 36 This video and the more to be released in the future are part of Big Brother’s brainwashing program. He wants to condition the sheeple into turning in anyone and everyone who looks suspicious. Eventually America will be turned into a Soviet/Red Chinese/Nazi/East Germany Stasi style dictatorship in which most Americans will be snitches for Big Brother.

154 Plea by Big Sister to watch for terrorists

Janet Napolitano, DHS figurehead, called for Americans to keep a watch out for “terrorists” in a speech at the Brennan Center for Justice in June of 2011. A report by Bobby Cuza of New York One quoted her as saying, “…threats of terrorism are still here. They’re not going away. They’re real and they are rapidly evolving” and “we now operate on the assumption that individuals prepared to carry out terrorist attacks may be in the United States now and can carry out acts of violence with little or no warning” and “…we have to get to a place where every part of our society is cognizant of the kinds of threats that are out there and empowered to take some common sense steps to help counter them.” 37

Big Sister launches Spanish language campaign

In December of 2011 DHS Secretary Janet Napolitano announced a new Spanish language campaign encouraging Latinos to report suspicious threats. 38

The Nationwide Suspicious Activity Reporting Initiative

The Nationwide Suspicious Activity Reporting (SAR) Initiative is a program of the Department of Justice used to collect and share reports of suspicious activity by people in the United States. The Nationwide SAR Initiative (NSI) builds on what law enforcement and other agencies have been doing for years – gathering information regarding behaviors and incidents associated with criminal activity, but without the customary restrictions on collecting data on individuals in the absence of reasonable suspicion or probable cause. The program has established a standardized process whereby SARs can be shared among agencies to help detect and prevent terrorism-related criminal activity. This process is in direct response to the mandate to establish a “unified process for reporting, tracking, and accessing [SARs]” as called for in the 2007 National Strategy for Information Sharing (NSIS). Reports of suspicious behavior noticed by local law enforcement or by private citizens are forwarded to the 72 state and major urban area “fusion centers” as well as DHS and the FBI for analysis. Sometimes this information is combined with other information to evaluate the suspicious activity in greater context. 39

155 Do we need citizen spies?

Civil libertarians questioned why firefighters, paramedics and corporate employees – such as Xcel Energy and railroad officials in Colorado – are drafted into the effort. They say public trust in emergency responders will suffer. The emerging TLO system “empowers the police officer to poke his nose into your business when you’re doing absolutely nothing wrong. It moves the police officer away from his core function, to enforce the law, into being an intelligence officer gathering information about people,” said Mike German, a 16-year FBI agent now advising the American Civil Liberties Union. 40 Some politicalogists believe Big Brother has little interest in reducing crime. They contend that Big Brother wants more crime so he can demand more money and power to fight it. Eventually, Big Brother will have absolute power and unlimited resources exercising total control over everyone. Do not believe the lies of the Big Brother propagandists who say we need more police, we must have the military in the streets, the TSA goons must randomly grope citizens on the streets, we need many more anti-terrorist technologies and few if any freedoms or liberties to keep America safe from the boogie men – Al Qaeda and other radical Muslim terrorist groups.

www.keepandbeararms.com/images/FBI-MCSOTerroristFlyer-Front.jpg 156 MIAC

Federal, State & Local Public/Private Partnership Improving community safety, reducing crime & threats through improved communications within Missouri & neighboring states. Sign up today and start receiving threat information that could affect your organization or agency. What is MIAC and Why it is Needed? Missouri Information Analysis Center (MIAC) provides a public safety partnership consisting of local, state and federal agencies, as well as the public sector and private entities that will collect, evaluate, analyze, and disseminate information and intelligence to the agencies tasked with Homeland Security responsibilities in a timely, effective, and secure manner. MIAC is the mechanism to collect incident reports of suspicious activities to be evaluated and analyzed in an effort to identify potential trends or patterns of terrorist or criminal operations within the state of Missouri. MIAC will also function as a vehicle for two-way communication between federal, state and local law enforcement community within our region.

www.keepandbeararms.com/images/FBI-MCSOTerroristFlyer-Back.jpg

157 Who Should Participate? Our law enforcement and criminal justice allies are some of the most vital partnerships and valuable resources to business. Often our local criminal justice agencies are not aware of the many ways the private sector can support them. The MIAC member corporations’ value to our communities goes far beyond providing a safe place to operate business. Why Become a Partner? Intelligence is a vital key to the “War on Terrorism and Crime.” Becoming a partner in the MIAC program has several benefits; it ensures that potential threat-related, but not necessarily urgent, information is shared with our partners; it facilitates the productive liaison between federal, state and local law enforcement community; and it encourages the sharing of potentially crucial intelligence. Partners also benefit by receiving valuable training provided by MIAC members or other MIAC partner agencies. 41-42

MIAC Report

Alex Jones has received a secret report distributed by the Missouri Information Analysis Center (MIAC) entitled “The Modern Militia Movement” 41 which was dated February 20, 2009. A footer on the document indicates it is “unclassified” but “law enforcement sensitive,” in other words not for public consumption. A copy of the report was sent to Jones by an anonymous Missouri police officer. The MIAC report specifically describes supporters of presidential candidates Ron Paul, Chuck Baldwin, and Bob Barr as “militia” influenced terrorists and instructs the Missouri police to be on the lookout for supporters displaying bumper stickers and other paraphernalia associated with the Constitutional, Campaign for Liberty, and Libertarian parties. “Missouri Information Analysis Center (MIAC) provides a public safety partnership consisting of local, state and federal agencies, as well as the public sector and private entities that will collect, evaluate, analyze, and disseminate information and intelligence to the agencies tasked with Homeland Security responsibilities in a timely, effective, and secure manner,” explains the MIAC website. “MIAC is the mechanism to collect incident reports of suspicious activities to be evaluated and analyzed in an effort to identify potential trends or patterns of terrorist or criminal operations within the state of Missouri. 158 MIAC will also function as a vehicle for two-way communication between federal, state and local law enforcement community within our region.” [Emphasis added] MIAC is part of the federal “fusion” effort now underway around the country. “As of February 2009, there were 58 fusion centers around the country. The Department has deployed 31 officers as of December 2008 and plans to have 70 professionals deployed by the end of 2009. The Department has provided more than $254 million from FY 2004- 2007 to state and local governments to support the centers,” explains the Department of Homeland Security on its website. Missouri is mentioned as a participant in this federal “intelligence” effort. 43 As of July 2009 there are 72 fusion centers in America.44 The number will continue to grow into the hundreds in America and thousands around the world before the Tribulation starts.

Spying on employees

Most companies have cameras to observe employees and customers, but Microsoft has filed for a patent 45 and seeks to monitor all of its employees. “The Times has seen a patent application filed by the company for a computer system that links workers to their computers via wireless sensors that measure their metabolism. The system would allow managers to monitor employees’ performance by measuring their heart rate, body temperature, movement, facial expression and blood pressure. Unions said they fear that employees could be dismissed on the basis of a computer’s assessment of their physiological state.” “Technology allowing constant monitoring of workers was previously limited to pilots, firefighters and NASA astronauts. This is believed to be the first time a company has proposed developing such software for mainstream workplaces.” 46 Microsoft can monitor its employees through desktop or laptop computers, but even through mobile phones or handheld PCs, meaning that even out of the office the employee can still be monitored. In its most advanced format, the system will monitor users’ private interests. It records and analyzes what words and numbers are used or websites visited, and watches the user’s heart rate, breathing, body temperature, facial expressions and blood pressure. The patent application explains: “The system can also automatically detect frustrations or stress in the user via physiological and environmental sensors and then offer or provide some assistance accordingly.” 47

159 Little Brother

Hundreds of children in England, as young as ten, are being urged to spot potential terrorists and report them to the police. Around 2,000 children attended a safety seminar featuring a film explaining that extremist views can develop at school. Critics condemned the initiative as a nightmare extension of the “Big Brother state.” Concerns were also raised that children could become subject to police monitoring if their fellow pupils misinterpreted innocent remarks or play. Estella Schmid, a founder of the Campaign against Criminalising Communities, warned: “This is a nightmare scenario. This risks criminalising children and is showing the expansion of the state into the most private areas.” 48

“Too much bling? Give us a ring”

The Gloucestershire police in Britain is encouraging members of the public to report people wearing too much “bling” during the recession. Citizens are also being urged to report people who drive flashy cars or buy expensive items without the apparent means to afford them during the credit crunch. The campaign, run with Crimestoppers, was launched using the motto “Too Much Bling? Give Us a Ring.” 160 Former Home Secretary Ann Widdecombe expressed disbelief at the move. “Is this a joke?” she asked. “If the police spent half as much time tackling crime and getting out on the beat as they do coming out with this ridiculous stuff, we’d all be better off. How are you meant to judge if someone buying a piece of jewellery can afford it?” 49 This is outrageous! British Patriots should seek out the Rothschild gangsters and when they see them report them for too much bling. They have more bling than any crime family on the planet. The number of homes, farms, ranches, orchards and land that they own is incomprehensible. They also own most of the art and treasures that their minions, the Nazis, stole during their reign of terror. Those stolen goods are stashed deep in their basements.

The 20,000 snooper army

As many as 20,000 town hall snoopers have assumed powers to enter people’s homes without a warrant and search for information. The bureaucrats are benefiting from the 1,043 state powers of entry in primary and secondary legislation. They include checking for fridges which do not have the correct eco-friendly energy rating, making sure a hedge is not too high and inspecting a property to ensure ‘illegal or unregulated hypnotism ’ is not taking place. Alex Deane, director of Big Brother Watch, said: “Once, a man’s home was his castle. Today, the Big Brother state wants to inspect, regulate and standardise the inside of our homes. Councils are dishing out powers of entry to officers for their own ease, without giving due thought to the public’s right to privacy and the potential for abuse. There needs to be a much closer eye kept on the number of officers granted the right to barge into private premises without a warrant.” Big Brother Watch revealed in a paper, entitled “Barging In,” there were at least 14,793 officers with the power to enter private residences without warrants – the equivalent of 47 officers in every local authority in Britain. On top of these officers there are also another 20,000 snoopers with the power to enter a person’s home or business. The research focused only on town hall staff. If police, paramedics and firefighters are included, the total would be hundreds of thousands. Town halls are also carrying out thousands of “spying” missions under the Regulation of Investigatory Powers Act. The law was passed in 2000 to fight terrorism, but access to the spy powers has been extended to 653 state bodies – including 474 councils. 50 161 This insanity is coming to America. Big Brother will pass laws allowing his minions to inspect any home he wants to. Laws are already being written that will give bureaucrats authority to enter homes to inspect gardens, garage sales, toilets, lightbulbs, and thermostats. Big Brother will eventually require every home, office, shop, factory and building in the world to have spy cameras in them so he can watch everything everyone does.

British citizen spies

Councils across England have recruited thousands of ‘citizen snoopers’ to report “environmental crime.” These spies target dog foulers, litter louts and neighbours who fail to sort their rubbish properly. They are the ‘eyes and ears’ of their neighbourhoods and are encouraged to take photos of “environmental crime” and send them in with location details for a rapid response. Every spy is given a hand-held GPS computer for the task or phone cards to cover the cost of using their own devices. Evidence gathered this way is sometimes used in criminal prosecutions. As of November 2011 9,831 snoopers had signed up – a 17 per cent increase on the number two years ago. Another 1,310 are set to be recruited and trained as part of schemes run by 18 councils. Volunteers often apply to become “street champions” through council websites, but many have also been lured by recruitment drives in local newspapers. Critics said yesterday the trend to create an army of neighbourhood detectives was leading to “a Big Brother society and a culture where prying on neighbours was considered the norm.” “It should be deeply troubling for us all that councils seem not content with their own snooping and are now recruiting members of the public to assist them,” said Nick Pickles, director of the civil liberties campaign group Big Brother Watch. “If a crime is committed, it is the police who should be involved, not local residents given hi-tech gadgets by councils, many of whom rarely pass up an opportunity to invade our privacy or hand out spurious fines. These individuals operate with little or no training, and there is no evidence to suggest it helps combat environmental crime. “Councils seem to be unable to tell the difference between asking the public for help and getting the public to do their snooping for them.” 162 David Parsons, chairman of the Local Government Association’s environment board, disagreed saying, “Environmental crimes like dog fouling, fly-tipping and littering blight local areas and are a source of huge frustration. People hate seeing this sort of vandalism on their doorsteps. Schemes like street champions put people in charge of their own areas and help residents take a stand against the inconsiderate few who spoil them.” Hillingdon Council in London boasts the biggest street champions scheme with 4,850 volunteers, who record an average of 1,000 incidents a month. Emma Boon of the TaxPayers’ Alliance said: “Councils shouldn’t be asking people to spy on their neighbours…it could breed resentment within communities.” 51

Child spies

Michael Odell, reporter for the London Observer discovered that his five-year-old daughter, Rosa, was a Big Brother spy when he caught her looking through his passport. She question him asking, “How many times have you been on a plane to America?” “About 40,” Odell answered. “And how many trees have you planted?” she responded. “No trees,” he replied. She then said to her father, “I’m going to tell Miss White.” Miss White is Rosa’s year one teacher at St. Peter & St. Paul’s RC Primary School. Odell noticed that his daughter began to recycle, save energy and spout eco policy with great zeal. She confronted him over the following issues: energy-saving light bulbs, paper recycling; turning off the tap when I brush my teeth, grocery bags and air travel. He came to the conclusion that school children are being used by the government to re-educate their parents. He considers public school children to be pint-sized “eco-worriers” who are attempting to bully parents into getting with the eco-program. He learned from friends of his that lunch boxes are inspected for high food-miles products and non-recyclable packaging and students are required to report any trips parents takes outside of England to calculate the carbon footprint of those trips. They also report how long their parents spend in the shower. He read one of Rosa’s eco-books, “How to Turn Your Parents Green,” by Bristol-based writer James Russell. “Only you can make the 163 Groans [grown-ups] behave, because only you can make their lives a misery if they don’t.” The book suggests a levy of fines for anti- environmental infringements: 20p for every degree the home thermostat is set over 20C, 10p for every high-energy light bulb used, and so forth. This Big Brother nightmare started after the 1994 Rio Earth Summit and now 50% of schools in the United Kingdom subscribe to the Eco- Schools programme. Politicians and bureaucrats fully endorse this 1984ish program as attested to by David Miliband, the former environment secretary. “Children are the key to changing society’s long-term attitudes to the environment,” he said. The Eco-Schools programme is part-funded by Department for Environment, Food and Rural Affairs (Defra). Professor David Uzzell from Surrey University has 30 years’ experience as an environmental psychologist. He says reverse socialization does not work. His research paper “Children as Catalysts of Environmental Change” looked at children in the UK, Portugal, Denmark and France. “The key finding was that children do not work as shock troops for environmental change. Coming home and proselytising is not the answer. It only works in a specific type of household where the environment is deemed a suitable topic for discussion at the dinner table and where parents are willing to play pupil and allow the child to play teacher. Basically, well-informed, middle-class families.” [ Authors’ note : In the future parents who do not respond to their children’s advice will spend time in jail or even prison.] Frank Furedi, professor of sociology at the University of Kent and author of the forthcoming book “The End of Education,” objects on more fundamental grounds: “Mobilising children to police their parents’ behaviour used to be something you only found in totalitarian societies. I grew up in Eastern Bloc Hungary and I remember children being encouraged to tell teachers if their parents listened to rock’n’roll.” [Emphasis added] “It’s as though the politicians are saying: ‘The parents won’t change fast enough, let’s get the children,’” he said. The Big Brother program is working. In 2008 the UK Social Investment Forum conducted a poll of 1,500 parents which showed that 24% of parents cited their children as a key green motivator. Only 2% took their cue from politicians. 52

164 Odell is just one of millions of parents in the Western World who have discovered they are living in a “neo-Orwellian nightmare” in their own homes.

“It was almost normal for people over thirty to be frightened of their own children. And with good reason, for hardly a week passed in which The Times did not carry a paragraph describing how some eavesdropping little sneak – ‘child hero’ was the phrase generally used – had overheard some compromising remark and denounced its parents to the Thought Police.” (Orwell, George, 1984 , Book One, Chapter Two, p. 24)

Conclusion

Big Brother is putting together a massive worldwide spy network that will make the Nazi and Stasi networks of Germany look like child’s play. His goal is to have everyone on Earth spying on his family, relatives, neighbors, friends, employees, employers, fellow- workers, church members and strangers. His spy network will make the network depicted in George Orwell’s 1984 masterpiece seem like the rookie league. All Christians and Patriots must refuse to spy on people! Do NOT become a pawn of Big Brother for money or some other benefit! WE THE PEOPLE must stand up to Big Brother now and just say “NO! ”

Notes

1. www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIa.htm & http://en.wiki pedia.org/wiki/COIN TELPRO. 2. INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS, BOOK II, FINAL REPORT. www.icdc.com/~paulwolf/cointelpro/churchfinalreport IIa.htm. 3. Associated Press. “FBI tracked journalist for over 20 years.” Toronto Star. 11.07.2008. www.thestar.com/News/World/article/533203. 4. Theoharis, Athan G. and Immerman, Richard H. The Central Intelligence Agency: Security Under Scrutiny . Greenwood Publishing Group. pp. 49, 175, 195, 203, 322. 2006. 5. Napoli, Russell P. Intelligence Identities Protection Act and Its Interpretation . Nova Publishers. pp. 18-20. 2005. 6. Friedman, John S. The Secret Histories: Hidden Truths That Challenged the Past and Changed the World . Macmillan. pp. 278–279. 2005.

165 7. Goldstein, Robert Justin. Political Repression in Modern America: From 1870 to 1976 . University of Illinois Press. p. 456. 2001. 8. Loftus, John and Aarons, Mark. The Secret War Against the Jews: How Western Espionage Betrayed The Jewish People . St. Martin’s Griffin. p. 322. 1997. 9. Hixson, Walter L. Military Aspects of the Vietnam Conflict . Routledge. p. 282. 2000. 10. “CIA Intelligence Collection about Americans: Chaos and the Office of Security.” www.aarclibrary.org/publib/church/reports/book3/pdf/ChurchB3_9_CHA OS.pdf. 11. “SUPPLEMENTARY DETAILED STAFF REPORTS ON INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES UNITED STATES SENATE.” 4.23.1976. www.icd c.com/~paulwolf/cointelpro/churchfinalreportIIIi.htm. 12. Pilkington, Ed. “America’s secret army: how the ‘war on terror’ created a new industry.” London Guardian. 7.19.2010. www.guardian.co.uk/world/2010/jul/19/us- spies-triple-since-2001. 13. Myers, Lisa, Pasternak, Douglas, Gardella, Rich. “Secret Database: Pentagon Spies On ‘Suspicious’ Domestic Groups.” MSNBC. 12.14.2005. 14. Daily Mail Reporter. “Now Obama’s sending out ‘snoopers’ to pose as patients so they can check up on doctors.” 6.27.2011. www.dailymail.co.uk/ news/article-2008541/Obama-send-snoopers-pose-patients-check-doctors.html. 15. Rothschild, Matthew. “Exclusive! The FBI Deputizes Business.” The Progressive. 2.07.2008. www.progressive.org/mag_rothschild0308. & www.infra gard.net. & www.infragardmembers.org. 16. Thompson, Isaiah. “The mysterious institute that spied on Pa. anti-drilling activists.” 9.15.2010. http://citypaper.net/blogs/clog/2010/09/15/the-mysterious-agen cy-that-spied-on-pa-drilling-activists & www.terrorresponse.com & www.linkedin. com/companies/institute-of-terrorism-research-and-response. 17. Eggen, Dan. “Ashcroft backs away from TIPS informant program, just slightly.” Washington Post. 7.26.2002. Page A10. http://lists.jammed.com/politech/ 2002/07/0097.html. 18. Hentoff, Nat. “Volunteer Spying Corps Dismissed.” Village Voice. 12.17.2010. www.villagevoice. com/2002-12-17/news/the-death-of-operation-tips/1. 19. Ripley, Amanda. “Eyes And Ears Of The Nation.” 6.27.2004. www.time.com /time/magazine/article/0,9171,1101040705-658321-1,00.html & http://crimestoppers usa.com. 20. www.firstobserver.com/aboutus.php. 21. Ross, Brian. “FBI Proposes Building Network of U.S. Informants.” ABC news. 7.25.2007. http://blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html. 22. Finley, Bruce. “Terror watch uses local eyes 181 TRAINED IN COLO.” The Denver Post. 6.29.2008. www.denverpost.com/news/ci_9725077. 23. Dewan, Shaila and Goodman, Brenda. “As Prices Rise, Crime Tipsters Work Overtime.” New York Times. 5.18.2008. www.nytimes.com/2008/05/18/us/18 crime stopper.html?pagewanted=2&_r=1& partner=rssnyt&emc=rss. 24. www.c-s-i.org/default.aspx. 25. “Operation Bright Eyes.” My Fox Orlando. 7.22.2009. www.myfoxorlando. com/dpp/money/072209operation_bright_eyes. 166 26. Indy.com. “Indy to enlist citizens in terrorist watch program.” 10.04.2009. www.indy.com/posts/indy-to-enlist-citizens-in-terrorist-watch-program. 27. Los Angeles iWatch Web site: www.iWatchLA.org. 28. Hart, Deanna. “Waste Management drivers help fight crime.” Waste Age. 2.01.2008. http://wasteage.com/collections_and_transfer/waste_collection_detection. 28. Lowman, Kristin. “Waste Managment partners with police to fight crime.” Fox News. www.fox23 news.com/mostpopular/story/Waste-Mngment-partners-with- police-to-fight-crime/T5IKqURWfk2VoZO btp-adA.cspx. 29. Citizen Concepts. September 2010. http://patriotapps.com/index.html & www .prnewswire.com/news-releases/citizen-concepts-announces-launch-of-revolutionary- iphone-app---patriotapp-102054128. html & http://smginc.biz/Management_ .html. 30. Eco Snoop. “EcoSnoop: We need your help saving the world; 1 picture at a time.” 12.30.2009. http://ecosnoop.com/index.php?option=com_ecosnoop& view=list &select=recent. & www.rantburg.com/poparticle.php?ID=286748&D=2009-12-30& SO=&HC=3. 31. DHS. “Secretary Napolitano Applauds Expansion of ‘If You See Something, Say Something’ Campaign to Mall Of America.” 12.01.2010. www.dhs.gov/ynews /releases/pr_1291224227819.shtm. 32. DHS. “Secretary Napolitano and Administrator Johnson Announce Expansion of ‘If You See Something, Say Something’ Campaign to Federal Buildings Throughout the Country.” 12.08.2010. www.dhs.gov/ynews/releases/pr_12918312 42174.shtm. 33. DHS. “Seccretary Napolitano Announces Expansion of ‘If You See Something, Say Something’ Campaign to Walmart Stores Across the Nation.” 12.06.2010. www.dhs.gov/ynews/releases/pr_1291648380371.shtm. 34. DHS. “Secretary Napolitano Announces ‘If You See Something, Say Something’ Campaign at Super Bowl XLV.” 1.31.2011. www.dhs.gov/ynews/releas es/pr_1296509083464.shtm. 35. C.J. Ciaramella. “Homeland Security recruits jittery coffee drinkers to spot terrorists.” Daily Caller. 9.19.2011. 36. www.youtube.com/watch?v=Wk-BX4rqK8U. 37. www.youtube.com/watch?v=w2L09QmIMV8&feature=related & www.dhs. gov/ynews/speeches/ sp_1307479636063.shtm. 38. Spiering, Charlie. “Big Sis Debuts Spanish ‘See Something’ Terror Warning.” Washington Examiner. 12.13.2011. http://campaign2012.washingtonexaminer.com/ blogs/beltway-confidential/napolitano-debuts-spanish-terror-warning/251936 & www .infowars.com/big-sis-debuts-spanish-see-something-terror-warning. 39. http://nsi.ncirc.gov & http://en.wikipedia.org/wiki/Nationwide_Suspicious_ Activity_Reporting_ Initiative. 40. Finley, Bruce. “Where are we going to draw the line?” Denver Post , 6.29.2008. www.denverpost.com/news/ci_9725077. 41. www.miacx.org/default.aspx?AspxAutoDetectCookieSupport=1 & http://en. wikipedia.org/wiki/Missouri_Information_Analysis_Center. 42. www.constitution.org/abus/le/miac-strategic-report.pdf. 43. Nimmo, Kurt. “Secret State Police Report: Ron Paul, Bob Barr, Chuck Baldwin, Libertarians are Terrorists.” Infowars. 3.11.2009. www.infowars.com/ secret-state-police-report-ron-paul-bob-barr-chuck-baldwin-libertarians-are-terrorists. 44. http://en.wikipedia.org/wiki/Fusion_centers. 167 45. http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p =1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=13&f=G&l=50&co1=AND& d=PG01&s1=Microsoft&s2=%22monitoring+system%22&OS=microsoft+AND+"m onitoring+system"&RS=microsoft+AND+“monitoring+system”. 46. Mostrous, Alexi and Brown, David. “Microsoft seeks patent for office ‘spy’ software.” London Times. 1.16.2008. http://technology.timesonline.co.uk/tol/news/ tech_and_web/article3193480.ece. 47. Brown, David & Judge, Elizabeth. “How computer spy in the office will monitor everything you do.” London Times. 1.16.2008. http://technology.times online.co.uk/tol/news/tech_and_web/article3193223.ece. 48. Daily Mail. “Little Brother is watching you: Children of ten are taught how to spot a terrorist in police DVD.” 6.04.2009. www.dailymail.co.uk/news/article- 1190483/Little-Brother-watching-Children-taught-spot-terrorist-police-DVD.html. 49. Wilkes, David. “Police’s latest brainwave: Report people who wear too much ‘bling’ to Crime stoppers. 5.12.2009. www.dailymail.co.uk/news/article-1180911/ Polices-latest-brainwave-Report-people-wear-bling-Crimestoppers.html. 50. Slack, James. “The 20,000 snooper army: Vast number of town hall bureaucrats get power to enter your home without a warrant.” 12.28.2009. www.daily mail.co.uk/news/article-1238800/The-20-000-snooper-army-Vast-number-town-hall- bureaucrats-power-enter-home-warrant.html. 51. Ballinger, Lucy and Eccles, Louise. “Big Brother alert over surge in ‘citizen spies’ as thousands more volunteer to snoop on neighbours.” Daily Mail. 11.12.2011. www.dailymail.co.uk/news/article-2060522/Big-Brother-alert-surge-citizen-spies- thousands-volunteer-snoop-neighbours.html. 52. Odell, Michael. “So, how many trees have you planted, Daddy?” 1.31.2009. www.guardian.co.uk/environment/2009/feb/01/ethicalliving-family.

FreeWorldAlliance.com

168

PART II

INFORMATION GATHERING AND IDENTIFICATION

The iris is just one of many biometric identifiers that Big Brother wants from you.

169

Do not be a frog. Wake Up! Get Smart!

170

EIGHT

INFORMATION GATHERING

Big Brother is not content in watching everything you do and everyplace you go. Eavesdropping on everything you say and hear is also not enough. He wants to know everything about you and he has been collecting every scrap of data about you since you were born.

National Database

Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information to fight crime and uncover terror plots. While federal authorities struggled to meet information-sharing mandates after the September 11, 2001 terrorist attacks, police agencies on the West Coast poured millions of criminal and investigative records into shared digital repositories. These data warehouses give investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues. Those network efforts will expand as other police departments connect to a fledgling Justice Department system called the National Data Exchange (N-DEx). Federal authorities hope N-DEx will become what one called a “one-stop shop,” enabling federal law enforcement, counterterrorism and intelligence analysts to automatically examine the enormous caches of local and state records for the first time. 1 The NSA call database was created by the National Security Agency starting in 2001. It contains hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers: AT&T, SBC, BellSouth (all three now being called AT&T since AT&T bought BellSouth and SBC purchased AT&T but kept the AT&T name), and Verizon. 2 The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006. 3 It is estimated that the database contains over 1.9 trillion call-detail records. According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks.4 171 Big Brother has hundreds of government and private sector data bases at his dispoal. In time it will be virtually impossible for a person to not have their detailed personal file available to Big Brother.

Student database

The Department of Education has taken a giant step toward creating a de facto national student database that will track students by their personal information from preschool through career. Although current federal law prohibits this, the department decided to ignore Congress and, in effect, rewrite the law. Student privacy and parental authority will suffer. Buried deep within the American Recovery and Reinvestment Act of 2009 (stimulus bill) were provisions encouraging states to develop data systems for collecting copious information on public-school kids. To qualify for stimulus money, states had to agree to build such systems according to federally dictated standards. So all 50 states either now maintain or are capable of maintaining extensive databases on public school students. The administration wants this data to include much more than name, address and test scores. According to the National Data Collection Model, schools are to collect information on health-care history, family income and family voting status. Even though current federal law prohibits a nationwide student database and strictly limits disclosure of a student’s personal information the Obama administration is eager to create the database. In April of 2001 the Education Department proposed regulations that would allow it and other agencies to share a student’s personal information with practically any government agency or even private company, as long as the disclosure could be said to support an evaluation of an “education program.” The proposed regulations provoked a firestorm of criticism, but on December 2, 2011, the Department of Education rejected almost all the criticisms and released the regulations. As of January 3, 2012, interstate and intergovernmental access to your child’s personal information will be practically unlimited. The federal government will have a de facto nationwide database of supposedly confidential student information. The department says this won’t happen. If the states choose to link their data systems, it says, that’s their business, but “the federal government would not play a role” in operating the resulting 172 megadatabase. The department would have access to the data systems of each of the 50 states and would be allowed to share that data with anyone it chooses, as long as it uses the right language to justify the disclosure. Just as the department used the promise of federal money to coerce the states into developing these systems, it would almost certainly do the same to make them link their systems. The result would be a nationwide student database, whether or not it is “operated” from an office in Washington. 5

Google collects Wi-Fi data

Google’s legal problems surrounding data collection around the world intensified when it emerged that the company faces a police investigation in Australia, the latest in a growing number of countries expressing concern about the its Street View mapping services. The probe, which comes amid accusations that Google breached privacy laws, was announced a day after the firm agreed to hand over data it has collected through wireless networks to French, German and Spanish authorities. Canada has also recently launched a probe into Google amid privacy concerns relating to the Street View service which uses camera-equipped fleets of cars to take 360 degree panoramic pictures for an online atlas. In May of 2010 Google acknowledged it had mistakenly collected fragments of data over public and unsecured Wi-Fi networks in more than 30 countries as it was taking pictures of neighborhoods. It said it discovered the problem after German regulators launched an inquiry into the matter. [ Authors’ note: LIE!] In the UK, the information commissioner ruled in 2009 that Google’s Street View technology carries a small risk of privacy invasion but should not be stopped, although members of the public have taken direct action in at least one location to prevent the company from taking photographs on their streets. Residents in Broughton blocked the driver of a Google Street View car, which captures the photos, when it tried to enter the village, near Milton Keynes. The Australian investigation comes as more regulators and consumers watchdogs around the world are complaining that Google does not take people’s privacy seriously enough. [ Authors’ note: Google is a NSA/CIA front corporation!]

173 Australia’s communications minister Stephen Conroy has accused Google of being responsible for the “single greatest breach in the history of privacy.” “There have been some complaints voiced … by the public in respect to practices that have been reported involving allegations that some information may have been obtained by staff of Google travelling around the streets,” said Australia’s federal attorney general Robert McClelland. “In light of concerns having been raised by the public, my department thought there were issues of substance that were raised that require police investigation.” The case was referred to the Australian federal police on Friday, he said. It will focus on whether the company breached the country’s telecommunications interceptions act, which prevents people accessing electronic communications other than for authorized purposes. The US Federal Trade Commission has already begun an informal inquiry into the matter and Google has said it would co-operate with authorities. Suits have been filed in Washington, California, Massachusetts and Oregon by people who accuse Google of violating their privacy by collecting data from open Wi-Fi networks. On its official blog Google has said that the software code responsible for collecting the data was used by mistake , and that all Street View cars were grounded when the mistake was discovered. 5 [ Authors’ note : LIE!] Google is a NSA/CIA front corporation. It is conducting illegal data collection and surveillance for the NSA/CIA. When it gets caught the heat is on Google instead of the NSA/CIA which are two of Big Brother’s illegal/criminal spy agencies.

Google believes it is Big Brother

Google CEO Eric Schmidt believes that if you are concerned about Google retaining your personal data, then you must be doing something you should not be doing. “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place,” Schmidt told CNBC. He explained that everything Google collects is subject to government snooping. “If you really need that kind of privacy, the reality is that search engines – including Google – do retain this information for some time and it’s important, for example, that we are 174 all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities.”6 Google thinks it is Big Brother because it is. Google is not Big Brother by itself, but it is an integral part of Big Brother.

Google tracks your web searches

Google, MSN Search, Yahoo, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm. Would you want strangers to see searches that reference your online reading habits, medical history, finances, sexual orientation, or political affiliation? 7

Google tracks your web history

The FBI is pressing Internet service providers to record which Web sites customers visit and retain those logs for two years, a requirement that law enforcement believes could help it in investigations of child pornography and other serious crimes. FBI Director Robert Mueller supports storing Internet users’ “origin and destination information,” a bureau attorney said at a federal task force meeting in February 2010. As far back as a 2006 speech, Mueller had called for data retention on the part of Internet providers, and emphasized the point two years later when explicitly asking Congress to enact a law making it mandatory. But it had not been clear before that the FBI was asking companies to begin to keep logs of what web sites are visited. The FBI is not alone in renewing its push for data retention. As CNET reported in February 2010, a survey of state computer crime investigators found them to be nearly unanimous in supporting the idea. Matt Dunn, an Immigration and Customs Enforcement agent in the Department of Homeland Security, also expressed support for the idea during the task force meeting. Greg Motta, chief of the FBI’s digital evidence section, said it was trying to preserve its existing ability to conduct criminal investigations. Federal regulations in place since at least 1986 require phone companies that offer toll service to “retain for a period of 18 months” records including “the name, address, and telephone number of the caller, telephone number called, date, time and length of the call.” 8 175 Google voluntarily complied with the FBI request and keeps track of every web site you visit if you use its browser. Anyone who uses Google Chrome web browser can go to the Google web site and look up their surfing history. 9 Google admits that it keeps track of what books you read on Google Books, but claims it keeps the information for a “limited period of time to enforce viewing limits.” 10 Google and Microsoft admit they keep track of every search users make. 11 Let Google speak for itself:

Why does Google store search engine logs data?

We store this data for a number of reasons. Most importantly, we store data to improve our search results and to maintain the security of our systems. Analyzing logs data helps our engineers both improve your search quality and build helpful innovative services. Take the example of Google Spell Checker. Google’s spell checking software automatically looks at a user’s query and checks to see if that user is using the most common version of the word’s spelling. If we calculate a user is likely to get more relevant search results with an alternative spelling, we’ll ask “Did you mean: (more common spelling)?” In order to provide this service, we study the data in our logs. Logs data also helps us improve our search results. If we know that users are clicking on the #1 result, we know we’re probably doing something right, and if they’re hitting next page or reformulating their query, we’re probably doing something wrong. In addition, logs data helps us prevent against fraud and other abuses, like phishing, scripting attacks, and spam, including query click spam and ads click spam.

Why are search engine logs kept before being anonymized?

We strike a reasonable balance between the competing pressures we face, such as the privacy of our users, the security of our systems and the need for innovation. We believe anonymizing IP addresses after 9 months and cookies in our search engine logs after 18 months strikes the right balance. 12

Google is an intricate part of Big Brother. It keeps all data forever. Google and other search engine providers keep track of your searches and create a profile which it sells to advertizers. Google makes millions of federal reserve notes doing this, but it also gives Big Brother this 176 information. It dutifully turns over information upon request from governments. 13 We also believe that virtually all the information Google and other web companies collect is handed over to Big Brother because he created them. He uses it to create a complex profile of everyone who uses search engines with information from other sources such as web surfing, educational records, medical records, criminal record, voting record, traffic citations, work history, financial history, credit rating, purchases, library checkout records, telephone calls, televison/cable viewing, associations with people, churches, political parties, organizations and whatever else it can accumulate.

Acxiom

Acxiom is a global interactive marketing services company that uses consumer data, analytics, information technology, data aggregation, data integration, and consulting solutions to help companies conduct direct marketing programs. Acxiom’s interactive capabilities allow marketers to have direct interaction and response with consumers, and these services include direct-mail, e-mail, mobile advertising, display advertising, social media, and Web-site personalization. It has been described as “one of the biggest companies you’ve never heard of.” 14 In addition to collecting detailed information about people, the company helps marketers anticipate the future needs of consumers, according to the documentary “The Persuaders.” As the world’s largest processor of consumer data ,15 Acxiom has identified 70 types of consumers with its segmentation product PersonicX. Forrester Research considers Acxiom “a technology powerhouse” with deep industry expertise across a multitude of industries. Acxiom has traditionally been known for helping many of the world’s largest financial services companies conduct direct marketing campaigns, but now more than 75 percent of its revenue is derived from non-financial services clients. Today, Acxiom is a $1.38 billion-a-year company, representing more than 12 percent of the direct-marketing-services sector’s $11 billion in estimated annual sales. Acxiom has offices in several states in America, but it also has offices in the United Kingdom, France, Germany, Netherlands, Portugal, Poland, Australia, China and Brazil. Its services are also available to companies in scores of other countries. 16

177 Acxiom is a big Big Brother corporation that few have ever heard of. It has files on virtually everyone in America. Big Brother can access its files any time he wants to.

Law enforcement

FBI Joint Terrorism Task Force

A flyer was passed out in the Phoenix, Arizona area requesting law enforcement officers to keep a sharp lookout for American citizens which the NJTTF believes are “domestic terrorists.” They are patriots who do not want to see America fall prey to the New World Order Gang and their world dictatorship. According to the “Protecting America: National Task Force Wages War on Terror” press release of August 19, 2008, there “are 106 FBI Joint Terrorism Task Forces around the country, where local, state, and federal agencies work together to combat terrorism on a regional scale. “Coordinating the efforts of all those regional task forces is the National Joint Terrorism Task Force, a fusion of local, state, and federal agencies acting as an integrated force to combat terrorism on a national and international scale. The National Joint Terrorism Task Force, or NJTTF, was established in 2002 to manage the burgeoning Joint Terrorism Task Force program—the number of task forces almost doubled overnight, from 35 pre-9/11 to 56 soon after 9/11 (50 more have been established since then). Of course, JTTFs have been around since the 1980s, starting in New York and Chicago. Originally located at FBI Headquarters, the NJTTF moved to the multi-agency National Counterterrorism Center (NCTC), where it performs its mission while also working with NCTC personnel to exchange information, analyze data, and plan anti-terrorism strategies. So what exactly is the NJTTF’s mission? Managing the Bureau’s JTTFs around the country is major part of the operation, and it’s a huge job—there are currently more than 4,000 JTTF task force members from over 600 state and local agencies as well as 50 federal agencies. According to Special Agent Gregory Massa, who heads the NJTTF, “We support each task force in every way imaginable – from sharing intelligence and terrorism threat information to providing big-picture terrorism analysis…from offering guidance and oversight to setting sound program policies… from supplying resources for manpower, equipment, and space to facilitating training.” 178 Another vital aspect of the NJTTF’s mission is sharing information among its 80 members – officers, agents, and analysts – who then pass the information onto the 48 different agencies they represent. Those agencies – from the law enforcement, intelligence, homeland security, defense, diplomatic, and public safety sectors – Include the Department of Homeland Security, the U.S. military, and federal, state, and local partners. Men and women from the U.S. Secret Service, Federal Air Marshals, New York City Police Department, Naval Criminal Investigative Service, Federal Bureau of Prisons, Amtrak Police, and dozens of other organizations work together every day in the global war on terrorism. NJTTF members are also working together on joint initiatives designed to address broader terrorism threats. For example:

Operation TRIPWIRE focuses on information and intelligence- sharing operations from the NJTTF’s participating agencies to help identify terrorist sleeper cells in the U.S.

Correctional Intelligence Initiative assists JTTFs and correctional facilities to combat prison radicalization and recruitment of prisoners within federal, state, local, tribal, and territorial prisons.

Rail Liaison Agent Program works to protect the country’s critical mass transit and freight rail infrastructure by collecting and disseminating rail-related terrorism intelligence info to JTTFs and critical rail partners nationwide.

Military Working Group is comprised of 12 Department of Defense agencies who look at military-specific terrorism threats.

The NJTTF and the JTTFs work tirelessly to protect Americans from terrorism, but they can’t do it alone. Says Agent Massa, “Every law enforcement officer, first responder, military member, intelligence analyst, and private citizen has a role to play in the global war on terror.” And he asks that suspicious activity of any kind be reported to your local JTTF or FBI field office.17

Police download data from your cell phone

The Michigan State Police have been using devices capable of downloading text messages, address books and other data from cell phones. 179 The Data Extraction Devices are commonly used to transfer data from an old cell phone to a new one, but they are also used by law enforcement for obtaining information such as erased text messages. Police said they are using the devices in certain criminal cases, but after obtaining a search warrant or with the cell phone owner’s consent. “The implication by the ACLU that the (state police) uses these devices ‘quietly to bypass Fourth Amendment protections against unreasonable searches’ is untrue, and this divisive tactic unjustly harms police and community relations,” the state police said. The devices cost around $3,000 each, and the Michigan State Police have five. 18 Big brother has been stealing data from cell phones for years. Eventually laws will be passed giving the minions of Big Brother the “authority” to steal any and all data from cell phones, laptops, iPads, desktop computers, etc. The way to keep Big Brother from stealing your personal data is to not keep any on your e-devices. Keep all private data on flash drives or portable hard drives. Sell your fancy cell phones, iPhones, Smartphones, etc. and get a cheap cell phone with a camera. Do NOT keep pictures or personal information, phone numbers and data on the cell phone. Memorize your important phone numbers or keep them in an old fashion address book. If you must have a fancy cell phone get a flash drive that can be attached and keep all of your personal data on it. WAKE UP AMERICA! GET SMART!

UK phone and email database

A new Big Brother database holding the telephone numbers and email accounts of everyone in Britain would raise serious data protection concerns. Prime Minister Gordon Brown signaled plans to bring in the database holding details of every phone call, email and time spent on the internet by the public in last month’s draft Queen’s Speech. The proposal is part of Government plans to implement a European Union directive which was brought in after the July 7, 2005 bombings to encourage uniform record-keeping across EU states. Information commissioner Richard Thomas warned the database would be “a step too far for the British way of life.” “Do we really want the police, security services and other organs of the state to have access to more and more aspects of our private lives?” he asked. “There needs to be the fullest public debate about the justification for, and 180 implications of, a specially-created database – potentially accessible to a wide range of law enforcement authorities – holding details of everyone’s telephone and internet communications.” The danger of Big Brother having a record of everything everyone has ever said or written is frightening. A government or renegade bureaucrat could use a inappropriate statement by an individual to discredit or blackmail him. Commissioner Thomas also cited the expansion of the DNA database and the centralized collection and retention of data from Automatic Number Plate Recognition roadside cameras as two examples of other intrusive Big Brother programs. “Before major new databases are launched careful consideration must be given to the impact on individuals’ liberties and on society as a whole,” he cautioned. “Sadly, there have been too many developments where there has not been sufficient openness, transparency or public debate.” The fear of information being stolen or lost is real. There were a number of high profile data losses in 2008 including the loss by HM Revenue and Customs of the details of over 25 million families.19

Homeland Security tracks your air travel

The Department of Homeland Security keeps a record of every flight everyone in America makes. Starting in the mid-1990s, many airlines handed over passenger records to the government. Since 2002, the government has mandated that the commercial airlines deliver this information routinely and electronically. 20

Be careful what you read

International travelers concerned about being labeled a terrorist or drug runner by secret Homeland Security algorithms may want to be careful what books they read on the plane. Newly revealed records show the government is storing such information indefinietly.21

Biometric database

FBI and States Vastly Expand DNA Databases

Law enforcement officials are vastly expanding their collection of DNA to include millions more people who have been arrested or 181 detained but not yet convicted. The move is raising concerns about the privacy of petty offenders and people who are presumed innocent. Until now, the federal government genetically tracked only convicts. But starting in April of 2009, the Federal Bureau of Investigation (FBI) will join 15 states that collect DNA samples from those awaiting trial and will collect DNA from detained immigrants. The F.B.I., with a DNA database of 6.7 million profiles, expects to accelerate its growth rate from 80,000 new entries a year to 1.2 million by 2012 – a 15-fold increase. Criminal justice experts cite Fourth Amendment privacy concerns and worry that the nation is becoming a genetic surveillance society. Britain may provide a window into America’s genetic surveillance future: As of March 2008, 857,000 people in the British database, or about one-fifth, have no current criminal record. In December, the European Court of Human Rights ruled that Britain violated international law by collecting DNA profiles from innocent people, including children as young as 10. 22

The Newborn Screening Saves Lives Act

On April 24, 2008, President signed into law: S. 1858, the “Newborn Screening Saves Lives Act of 2007,” which authorizes through fiscal year 2012 new and existing programs at the Department of Health and Human Services concerning newborn screening. Sen. Christopher Dodd [D-CT] sponsored the bill and two of the co- sponsors were Sen. Edward Kennedy and Hillary Clinton. The bill violates the U.S. Constitution and the Nuremberg Code, writes Twila Brase, president of the Citizen’s Council on Health Care (CCHC). “The DNA taken at birth from every citizen is essentially owned by the government, and every citizen becomes a potential subject of government-sponsored genetic research,” she states. “It does not require consent and there are no requirements to inform parents about the warehousing of their child’s DNA for the purpose of genetic research. Already, in Minnesota, the state health department reports that 42,210 children of the 780,000 whose DNA is housed in the Minnesota ‘DNA warehouse’ have been subjected to genetic research without their parents’ knowledge or consent.” S.1858 is justified by the federal government as a “national contingency plan” in that it represents preparation for any sort of public health emergency. The bill states that the federal government should 182 “continue to carry out, coordinate, and expand research in newborn screening ” and “maintain a central clearinghouse of current information on newborn screening... ensuring that the clearinghouse is available on the Internet and is updated at least quarterly.” Sections of the bill also make it clear that DNA may be used in genetic experiments and tests. All 50 states are now routinely providing results of genetic screenings to the Department of Homeland Security and this bill will establish the legality of that practice plus include DNA. 23

The government has your baby’s DNA

Newborn babies in the United States are routinely screened for a panel of genetic diseases. Since the testing is mandated by the government, it is often done without the parents’ consent, according to Brad Therrell, director of the National Newborn Screening & Genetics Resource Center. In many states babies’ DNA is stored indefinitely, according to the resource center. DNA samples are kept so that tests can be repeated, if necessary, and in case it is ever needed to help parents identify a missing or deceased child. The samples are also used for medical research. Art Caplan, a bioethicist at the University of Pennsylvania, says he understands why states do not first ask permission to screen babies for genetic diseases. “It’s paternalistic, but the state has an overriding interest in protecting these babies.” Genetic testing for newborns started in the 1960s with testing for diseases and conditions that, if undetected, could kill a child or cause severe problems, such as mental retardation. Since then, the screening has helped save countless newborns. Over the years, many other tests were added to the list. Now, states mandate that newborns be tested for anywhere between 28 and 54 different conditions, and the DNA samples are stored in state labs for anywhere from three months to indefinitely, depending on the state. 24

Obama backs national DNA database

In an interview aired March 6, 2010 on “America’s Most Wanted,” Barak Obama expressed strong agreement as host John Walsh extolled the virtues of collecting DNA at the time of an arrest and putting it into a single, national database. 183 “We have 18 states who are taking DNA upon arrest,” Walsh said. “It’s no different than fingerprinting or a booking photo. ... Since those states have been doing it, it has cleared 200 people that are innocent from jail.” “It’s the right thing to do,” Obama replied. “This is where the national registry becomes so important, because what you have is individual states – they may have a database, but if they’re not sharing it with the state next door, you’ve got a guy from Illinois driving over into Indiana, and they’re not talking to each other.” “It’s a horrible idea – tremendously invasive,” said Bill Quigley of the Center for Constitutional Rights, who also disputed Walsh’s claim that DNA is no different from fingerprints. In 2004, California ballot measure requiring DNA testing for all felony arrests and for some misdemeanor arrests. New York City Mayor Michael Bloomberg wants DNA tests for everyone arrested in the city, even for misdemeanors. Just days before Obama took office, the Bush administration implemented a 2006 law to take DNA from federal arrestees, including immigration detainees. In 2006, then Senator Obama filed S. 109-3822 and in 2007 he filed S. 110-976 – legislation that would create a national DNA database. The same bill was filed by Sen. Patrick Kennedy in 2008 (S. 110- 6498). All three bills died in the Senate. 25 Big Brother will eventually have a massive international DNA database. He wants your DNA and he will not stop until he gets it.

Israel to be first to create biometric database for all citizens

The government of Israel approved a motion in 2008 calling for the establishment of a biometric database by the Ministry of Interior and the Public Security Ministry. The motion, dubbed the “identification card, travel papers and biometrics database bill,” became “The Biometric Database Law” חוק הכללת אמצעי זיהוי ביומטריים ונתוני זיהוי ביומטריים במסמכי זיהוי :Hebrew) .and was passed in 2009 ( -2009ט" התשס , ובמאגר מידע It gives the Israeli government the authority to collect fingerprints and facial features from all Israeli residents, and imbed the biometric information into identity cards and passports. It also gave the government the authority to create a biometric database of all citizens and residents.

184 The data is being used by the Ministry of Interior to create “smart,” forgery-proof identification papers and passports. Internal Security Minister Avi Dichter told the government that the “need to create a unique (physical) bond between the person carrying an ID and the data which appears on it, is essential in order to fight the worldwide forgeries… Should we succeed we would be able to create a nationwide database controlled, as it should be, by the State.” The existence of such a database – which includes every citizen – has yet to be sanctioned in any Western country.26

National fingerprint registry

Buried in the text of the revised legislation, approved by the Senate Banking Committee by a 19-2 vote in March 2008, is a plan to create a new national fingerprint registry. It covers just about everyone involved in the mortgage business, including lenders, “loan originators,” and some real estate agents. What’s a little odd is the lack of public discussion about this new fingerprint database. No mention of it appears in the official summary of the revised Senate bill that was introduced by Diane Feinstein (D- Ca.) and Mel Martinez (R-Fl.). No copy of the revised Senate legislation is posted on the Library of Congress’ Thomas Web site, which is the usual procedure. The federal fingerprint database requires any “loan originator” to furnish “fingerprints for submission to the Federal Bureau of Investigation” and a wealth of other unnamed government agencies. Loan originator is defined as someone who accepts a residential mortgage application, negotiates terms on a mortgage, advises on loan terms, prepares loan packages, or collects information on behalf of the consumer. Some states already have fingerprinting requirements. Colorado, Kansas, Mississippi, and Montana require “mortgage brokers” to get fingerprinted. In the proposed federal system, what remains unclear is what happens to the fingerprints once submitted. The legislation talks about a “background check” which creates a Nationwide Mortgage Licensing System and Registry. The bill does specify that the registry will be run by the Conference of State Bank Supervisors and the American Association of Residential Mortgage Regulators. Those two groups are currently developing a “central repository” of information with 185 document collecting and fingerprinting that “will be accessed through a secure Web site over the Internet.”27

Boston launches flu shot tracking

Using technology originally developed for mass disasters, Boston disease trackers embarked on a novel experiment in 2008 aimed at creating a citywide registry of everyone who has had a flu vaccination. Everyone who participates will get a bracelet printed with a unique identifier code. Information about the recipient and the shot will be entered into handheld devices similar to those used by delivery truck drivers. “Anything you can do to better pinpoint who’s vaccinated and who’s not, that’s absolutely vital,” said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. “I wish more cities were doing this kind of thing.” Boston is believed to be the first city to embrace this particular approach to tracking vaccinations against the seasonal flu, estimated to kill 36,000 people each year in America.28

Data mining/sharing

Government bureaucrats want to know every transaction that everyone in America makes. They are gathering and sharing as much information as possible about everyone in America. They say it is to help them prevent terrorists from launching more attacks against the American people. This is true, but this information can also be used to manipulate people or control them. Eventually it could be used by a world dictator to give him absolute control over everyone on Earth.

MATRIX

The Multistate Anti-Terrorism Information Exchange Program, also known by the acronym “MATRIX,” was a federally funded data mining system originally developed for the Florida Department of Law Enforcement. The system analyzed government and commercial databases to find associations between suspects or new suspects. The database and technologies used in the system were housed by Seisint, a Florida- based company since acquired by Lexis Nexis. 186 The Matrix program was shut down in June 2005 after federal funding was cut in the wake of public concerns over privacy and state surveillance. The amount of information that was being compiled on millions of people was astounding. The MATRIX allegedly gathered information about a person’s criminal history, driver’s license data, vehicle registration records, and public data record entries, credit history, driver’s license photographs, marriage and divorce records, social security number, date of birth, and the names and addresses of family members, neighbors and business associates. The ACLU argued that the type of data that the MATRIX compiles could be expanded to include information in commercial databases encompasses such as purchasing habits, magazine subscriptions, income and job history. 29

JRIES

The Joint Regional Information Exchange System (JRIES) began in December 2002 as an all-source intelligence/information sharing system. It was initially designed to connect the California Anti- Terrorism Information Center, the New York Police Department, and the Defense Intelligence Agency (DIA). These groups designed JRIES, which was first deployed in February 2003, to facilitate the exchange of suspicious activity reports, register events potentially related to terrorist activity, and foster real-time intelligence and law enforcement collaboration in a secure environment across federal, state, and local jurisdictions. The system provided a simple and efficient way for the law enforcement community to obtain situational awareness concurrently, without the need for hundreds of phone calls. In 2003 the DIA relinquished control to the Department of Homeland Security. As of 2004, about 100 law enforcement organizations were using JRIES. 30

RISS

Regional Information Sharing Systems (RISS) is an information- sharing program funded by the U.S. Federal government whose purpose is to connect databases from local and regional law enforcement so that they can use each other’s data for criminal investigations. 31 In 1997, RISS created RISSNET, a network to interconnect many local, state, regional, and tribal law enforcement databases. In 2002, RISSNET was connected with the FBI’s Law Enforcement Online 187 system. In 2003, the National Criminal Intelligence Sharing Plan (NCISP) declared that RISSNET would be the official “backbone” for all unclassified, but sensitive criminal intelligence data traffic. Later that year, members were also given access to the Automated Trusted Information Exchange (ATIX) database, which contains information on homeland security and terrorist threats. 32

HSIN

The Homeland Security Information Network (HSIN) is a web- based platform, run by the Department of Homeland Security, which is designed to allow local, state, tribal, and federal government agencies to share “Sensitive But Unclassified (SBU)” information with each other over a secure channel. 33

NCISP

The National Criminal Intelligence Sharing Plan (NCISP) is an intelligence-sharing initiative that links the computer databases of local, state, regional, tribal law enforcement agencies with those of the U.S. federal government. 34 Government agencies and corporations have detailed files on millions of Americans. The information in those files will grow larger, and they will be shared by numerous government agencies and corporations. The lives of most Americans are an open book. Knowledge is power, and having knowledge of people’s habits will give power-mongers greater advantage over them. Big Brother is building a massive data gathering network with numerous agencies and private corporations. He is gathering and storing as much information about everyone on Earth that he can. Information is power and the more he gets the more powerful he becomes. If you want to keep your personal information to yourself pull out of the Big Brother information web.

Feds tracking credit cards without warrant

Federal law enforcement routinely tracks individuals through their credit cards, cell phones, car rentals and even store customer loyalty programs without obtaining a warrant, an online privacy activist has discovered. 188 According to a document obtained from the Department of Justice by privacy activist Christopher Soghoian, federal agents working on a criminal investigation can draw up their own paperwork requesting that credit companies and retailers give the agents real-time access to purchases made by a particular person. No court reviews these orders, and the only role courts play in the process is to issue a non-disclosure order to the retailer or credit card company involved, meaning the person being tracked will never be notified of the surveillance . The process is known as a “hotwatch,” and it can be used to spy on cell phones, credit card use, purchases at stores when a customer loyalty card is used, car rentals, and flight ticket purchases. The process “sidestep[s] any Fourth Amendment protections,” Soghoian writes. “A search of Google, Lexisnexis and Westlaw revealed nothing related to ‘hotwatch’ orders, and so I filed a FOIA request to find out more,” Soghoian writes. “If the government ‘routinely’ applies for and obtains hotwatch orders, why wasn’t there more information about these?” A year-and-a-half and an appealed decision later the Justice Department released a document outlining “hotwatches.” 35

NSA to store yottabytes of surveillance data in Utah megarepository

The National Security Agency is constructing a datacenter in the Utah desert that they project will be storing yottabytes of surveillance data. There are a thousand gigabytes in a terabyte, a thousand terabytes in a petabyte, a thousand petabytes in an exabyte, a thousand exabytes in a zettabyte, and a thousand zettabytes in a yottabyte. A yottabyte is 1,000,000,000,000,000 gigabytes. What with millions of phones being tapped and all data duplicated, constant recording of all radio traffic, 24-hour high definition video surveillance by satellite, there’s terabytes at least of data coming in every day. And who knows when you will have to sift through August 2007’s overhead footage of Baghdad for heat signatures in order to confirm some other intelligence? A commentor pointed out that in the study cited, yottabytes are only one possible estimate for total storage requirements. The more realistic estimates are in the hundreds of petabytes, which is much easier for a datacenter to accommodate. 36

189 Big Brother has virtually unlimited storage space and he plans to collect every piece of data in the world and use software programs to analyze that data. Big Brother wants to be God and he will not stop until YAHWEH stops him. In the meantime we can resist him.

How NSA access was built into Windows

A Careless mistake by Microsoft programmers has revealed that special access codes prepared by the National Security Agency (NSA) have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. The first discovery of the new NSA access system was made in 1997 by British researcher Dr. Nicko van Someren. But it was only in early 1999 that a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA. specialists have been aware for two years that unusual features are contained inside a standard Windows software “driver” used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\systemdirectory of your computer. Dr. Nicko van Someren reported at last year’s Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery. Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys.

190 One was called “KEY.” The other was called “NSAKEY.” Later a third key was found. Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99” conference. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge. According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of , and once these security services are loaded, they can effectively compromise your entire operating system.” The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards. Dr. van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in CAPI. “It looks more fishy,” he said. Fernandez believes that NSA’s built-in loophole can be turned round against the snoopers. A demonstration “how to do it” program that replaces the NSA key can be found on Cryptonym’s website.37

UK Interception Modernization Program

United Kingdom’s Home Office says all data from the web could be stored in giant government database dubbed the Interception Modernization Program (IMP). Internet “black boxes” will be used to collect every email and web visit in the UK under the government’s plans for a giant “big brother” database. Further details of the planned database emerged at a 2008 meeting of internet service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB were given a PowerPoint presentation of the issues and the technology surrounding the IMP, the name given by the Home Office to the database proposal. Whitehall experts working on the IMP unit told the meeting the security and intelligence agencies wanted to use the stored data to help fight serious crime and terrorism, and said the technology would allow them to create greater “capacity” to monitor all communication traffic 191 on the internet. The “black boxes” are an attractive option for the internet industry because they would be secure and not require any direct input from the ISPs. 38 Big Brother will set up massive data bases in every country on Earth and then connect them to form one super data base with which he can access information about anyone, any company or organization.

Travel records kept by DHS

The Department of Homeland Security (DHS) collects and stores a great deal of information on everyone who flies into and out of America. According to the blog Philosecurity, DHS-member agency Customs and Border Protection (CBP) stores a surprising amount of personal information on international travelers underneath its Automated Targeting System (ATS) which began in the mid-1990s. International travelers flying into or out of the United States can expect this information to be collected and stored by DHS:

Credit card number and expiration IP address used to make web travel reservations Hotel information and itinerary Full name, birth date, and passport number Full airline itinerary, including flight numbers and seat numbers Cruise ship itinerary Phone numbers, including business, home, and cell Every frequent flyer and hotel number associated with the subject, even ones not used for the specific reservation

According to a DHS Privacy Impact Assessment from 2006, CBP collects such personally identifiable information because it enhances the agency’s “ability to identify possible violations of U.S. law or other threats to national security would be critically impaired without access to this data.” The program also collects and stores information regarding land border crossings as well as people involved with the import and export of cargo. Nearly two years ago, the Washington Post reported that the ATS database held much more information than previously revealed by the federal government, including what travelers brought to read during their trip.

192 The Post also told of one gentleman, Zakariya Reed, who has been stopped at the border at least seven times in approximately one year’s time. During two of those stops, the CBP officers questioned Reed about “politically charged” op-eds he wrote for his local paper that were critical of U.S. foreign policy in the Middle East. Once, during a secondary screening interview, officers “had them printed out on the table in front of me,” Reed told the Post.39

End Game

ADAMS

Anomaly D etection at M ultiple Scales (ADAMS) is a $35 million DARPA project designed to identify patterns and anomalies in very large data sets. It is under DARPA’s Information Innovation office and began in 2011. 40-43 The project is intended to detect and prevent insider threats such as “a soldier in good mental health becoming homicidal or suicidal,” an “innocent insider becoming malicious,” or a “a government employee [whom] abuses access privileges to share classified information.” 41, 44 Specific cases mentioned are Nidal Malik Hasan and Wikileaks alleged source Bradley Manning.45 Commercial applications may include finance. 45 The intended recipients of the system output are operators in the counterintelligence agencies. 41, 44 The Proactive Discovery of Insider Threats Using Graph Analysis and Learning (PRODIGAL) is part of the ADAMS project. 44, 46 The Georgia Tech team includes noted high-performance computing researcher David A. Bader.47-48

PRODIGAL

Pro active Discovery of Insider Threats Using Graph Analysis and Learning (PRODIGAL) is a computer system for predicting anomalous behavior of people by data mining network traffic such as emails, text messages and log entries.49 It is part of DARPA’s Anomaly Detection at Multiple Scales (ADAMS) project. 50 The initial schedule is for two years and the budget $9 million. 51 It uses graph theory, machine learning, statistical anomaly detection, and high-performance computing to scan larger sets of data more quickly than in past systems. The amount of data analyzed is in the range of terabytes per day. 51 The targets of the analysis are employees within the government or defense contracting organizations; specific 193 examples of behavior the system is intended to detect include the actions of Nidal Malik Hasan and Wikileaks alleged source Bradley Manning.49 Commercial applications may include finance. 49 The results of the analysis, the five most serious threats per day, go to agents, analysts, and operators working in counterintelligence.49, 51-52 The research is being carried out by:

Georgia Institute of Technology College of Computing Georgia Tech Research Institute Defense Advanced Research Projects Agency Army Research Office Science Applications International Corporation Oregon State University University of Massachusetts Carnegie Mellon University 53

How will a person who is arrested or grabbed by Big Brother be able to defend himself against the accusation that he planned to commit a terrorist act? Will he be given his day in court or will be be thrown in a military prison or concentration camp and never heard from again as Senate bill 1867 (The National Defense Authorization Act) allows for? Will be he tortured and eventually killed from abuse by Big Brother?

Total Information Awareness

Privacy and civil-rights groups have hailed the decision by Congress to kill a controversial Pentagon program to construct a powerful computerized surveillance system that would lead to unprecedented spying into the private lives of Americans. The program, “Total Information Awareness,” had its name changed to “Terrorist Information Awareness.” It was created by Ronald Reagan’s national security adviser, retired Admiral John Poindexter, who was convicted of five felony counts of lying to Congress about the Iran-Contra affair in the mid-1980s. 54 The program had a name change, but government bureaucrats can still use the technology to spy on law-abiding citizens. This technology could be used in the future by a world dictator to watch what everyone does and says. “The personal computer may soon be not-so-private, with the United States and some European nations working on laws allowing them access to search the content held on a person’s hard drive.” 55 194 Lifelog

LifeLog was a project of the Information Processing Technology Office of the Defense Advanced Research Projects Agency According to its bid solicitation pamphlet, it was to be “an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities.” The objective of the “LifeLog” concept was “to be able to trace the ‘threads’ of an individual’s life in terms of events, states, and relationships.” “LifeLog aims to compile a massive electronic database of every activity and relationship a person engages in. This is to include credit card purchases, web sites visited, the content of telephone calls and e- mails sent and received, scans of faxes and postal mail sent and received, instant messages sent and received, books and magazines read, television and radio selections, physical location recorded via wearable GPS sensors, biomedical data captured through wearable sensors, The high level goal of this data logging is to identify “preferences, plans, goals, and other markers of intentionality.” The DARPA program was canceled in 2004 after criticism from civil libertarians concerning the privacy implications of the system, but it may be operating in secret. 56 Technology eventually will be developed and implemented that can record everything a person sees, says, hears and even thinks. People will also be tracked wherever they go, and a record will be kept of every place they visit and everyone they encounter. Every detail of a person’s life will become the property of Big Brother’s government bureaurats.

MyLifeBits

MyLifeBits is a project inspired by Vannevar Bush’s hypothetical Memex computer system. The project includes full-text search, text and audio annotations, and hyperlinks. The “experimental subject” of the project is computer scientist Gordon Bell, and the project will try to collect a lifetime of storage on and about Bell. Jim Gemmell of Microsoft Research and Roger Lueder were the architects and creators of the system and its software. Computerologists are seeking the Holy Grail of computer technology – recording every byte of a person’s life from birth to death 195 and be able to access any moment in time by date or subject. They are in the infancy of this technology but within two decades they may have the hardware and software to make it a practical option for consumers. For information about this technology see the footnote. 57 Big Brother is working feverishly to develop this technology and make it mandatory for everyone on Earth to wear a video camera that will record everything one sees, hears and says. That information will be downloaded every 24 hours via the Internet or satellite and stored in massive databases in every country. Those databases will be accessible by Big Brother. He will also have software that will enable him to access anyone’s lifelog by date or subject matter. He will also be able to access live feeds from specific individuals if he so desires. Big Brother is also working on technology that will enable him to record every thought that a person has and store those thoughts in massive databases and retrieve any thought any time he chooses. If Big Brother attains this ability he will be god-like. That is what he wants – to be God Almighty, BUT he will NEVER be God. Instead the final Big Brother (the Antichrist) will come to an abrupt end after a brief reign of just seven years as world dictator. At the Second Advent of Jesus Christ he will be slain (Daniel 7.11), resurrected and cast alive into the Lake of Fire (Revelation 19.20) where he will spend all eternity being punished with literal fire and brimstone, burning wind, burning coals, unquenchable thirst and myriad other physical torments (Psalm 11.6; 140.10; Proverbs 25.22; Luke 16.24; Romans 12.20; Revelation 14.9-11; 20.10).

Amazon’s Big Brother patent will enable it to know where you will go

An Amazon patent, made public in December 2011, will allow Amazon to track, through mobile devices, where individuals have been, and determine where they are likely to go next to send them ads, coupons, or other messages that could appear on a mobile phone or on displays that individuals are likely to see on their routes. The patent which was granted on December 6, 2011, was submitted in March 2007. The language of the patent is a bit bureaucratic, but decipherable:

A system, comprising: a processor; and a memory coupled to the processor, wherein the memory comprises program instructions executable by the processor to: determine one or more locations a 196 user of a mobile device has visited on a current path; predict a next destination for the user of the mobile device based on the one or more locations the user of the mobile device has visited on the current path, wherein to predict the next destination, the program instructions are further executable to: predict a plurality of likely destinations, and receive one or more bids for communicating advertising content regarding one or more of the likely destinations for the user of the mobile device, wherein the next destination corresponds to a likely destination for which a selected bid was received; and communicate advertising content to a display device other than the mobile device located along the current path between a current location for the mobile device and the next destination.

The system calculates a path and then predicts a set of likely next destinations. It then takes bids from third parties that want to send marketing messages to displays along the route the person takes, monitoring speed and direction to time displays for maximum chance of visibility. Ads can also be sent to a person’s mobile device and messages telling the person to look over at a particular display as depicted in the science fiction movie “Minority Report.” According to the patent’s description, location could be specific spots inside a mall:

In some embodiments, mobile device users’ current and past travel patterns may be analyzed to determine a predicted next destination. For instance, by analyzing the recent movements of a mobile device user among stores in a shopping mall, it may be determined that a particular store is a predicted next destination for the mobile device user. Thus, advertising content for the predicted destination, such as coupons, may be sent to the mobile device user. 58

Sometime in the next decade or two this advertizing technology will be implemented in the Western world and then throughout the planet. People will be bombarded with advertisements everytime they step out of their homes. That is only the commercial end of this fantastic plan. Big Brother will use the technology to predict where people will go when they leave home, what they will do and what they will buy. Big Brother does not just want to watch your every move and eavesdrop on everything you say he wants to know what you plan to do before you do it. His ultimate goal will be to read your mind 24-7.

197 Retroactive surveillance

According to the Brookings Institution, authoritarian governments will soon be able to perform retroactive surveillance on anyone within their borders. These regimes will store every phone call, instant message, email, social media interaction, text message, movements of people and vehicles and public surveillance video and they will search through it at their leisure. This hideous fact was explained in detail in “Recording Everything: Digital Storage as an Enabler of Authoritarian Government,” written by John Villaseno, a senior fellow at Brookings and a professor of electrical engineering at UCLA. 59 This technology will allow bureaucrats to shadow a person’s movements and communications before he became an alleged “enemy of the state.” “For example, if an anti-regime demonstrator previously unknown to security services is arrested, it will be possible to go back in time to scrutinize the demonstrator’s phone conversations, automobile travels, and the people he or she met in the months and even years leading up to the arrest,” the report says. "These enormous databases of captured information will create what amounts to a surveillance time machine. ... This will fundamentally change the dynamics of dissent, insurgency and revolution.” Villaseno noted that when the government of Libya fell, insurgents found equipment that had captured 30 to 40 million minutes of phone conversations per month and enabled the government to read activist emails. There have been reports that the government of Syria wants to build communications intercepts as well. Key to this possibility is the dramatic drop in the cost of storage. In 1984 it cost an amazing $85,000 to store just one gigabyte, and today it costs five cents per gigabyte. In 2015 the cost of storing all the phone calls made in a year by an average person will be less than 2 cents. In Red China 500,000 video cameras will be installed throughout the city of Chongquing. By 2020, all that video could be stored for 25 cents per Chongquing resident per year. Total costs of surveillance – gathering, aggregating, managing, analyzing – will be greater, but as Big Data becomes a reality, tools for handling it will become better and cheaper. “Many of the solutions that are being developed in the commercial world for searching and analyzing data could be applied to state- sponsored surveillance as well,” Villaseno noted. “Awareness of the

198 likelihood that all messages – including those that are encrypted – will eventually be read by security services will chill dissent.” The main vendors that sell this technology are Blue Coat, Cisco, Huawei, NetApp, Qosmos (France) and Utimaco (Germany). 60 Big Brother will definitely examine as much surveillance data as possible to find political dissidents he may have passed by. He will also manufacture surveillance data to frame dissidents.

Conclusion

Big Brother wants every scrap of information about you that he can get. You must actively deny him this information. Do NOT give out personal information, DNA, fingerprints or any biometric information to the state or a company. Find a way to opt out and if there is no way do without the service or product. You can resist Big Brother!

Notes

1. O’Harrow, Robert, Jr. and Nakashima, Ellen. “National Dragnet Is a Click Away.” Washington Post. 3.06.2008. A01. www.washingtonpost.com/wp-dyn/con tent/article/2008/03/05/AR2008030503656_ pf.html. 2. www.usatoday.com/news/washington/2006-05-10-nsa_x.htm. 3. http://en.wikipedia.org/wiki/National_Criminal_Intelligence_Sharing_Plan. 4. Shane, Scott. “Former Phone Chief Says Spy Agency Sought Surveillance Help Before 9/11.” New York Times. 6.30.2006. www.nytimes.com/2007/10/14/business/ 14qwest.html?_r=1. 5. Emmett McGroarty, Jane Robbins. How the feds are tracking your kid.” 12.28.2011. www.nypost.com/p/news/opinion/opedcolumnists/how_the_feds_are_tra cking_your_kid_xC6wecT8ZidCAzfqegB6hL. 6. Davies, Caroline. “Google investigated by Australian police over Wi-Fi data collection: Google Street View cars around the world mistakenly collected Wi-Fi data.” Guardian. 6.06.2010. www.guardian.co.uk/technology/2010/jun/06/google-priv acy-data-collection-street-view 7. Metz, Cade. “Google chief: Only miscreants worry about net privacy.” The Register. 12.07.2009. www.theregister.co.uk/2009/12/07/schmidt_on_privacy. 7. http://bigbrotherxposed.com/page15.html#SAFESEARCHES. 8. “Six Tips to Protect Your Search Privacy.” Electronic Frontier Foundation. September 2006. www.eff.org/wp/six-tips-protect-your-search-privacy. 9. McCullagh, Declan. “FBI wants records kept of Web sites visited.” Cnet.com. 2.05.2010. http://news. cnet.com/8301-13578_3-10448060-38.html. 10. www.lifehack.org/articles/productivity/track-internet-history-on-any-comput er.html. 11. http://books.google.com/support/bin/answer.py?hl=en&answer=43733. 12. http://forums.canadiancontent.net/computers-internet/80817-did-you-know-mi crosoft-google.html. 199 13. www.google.com/intl/en/privacy/faq.html. 14. www.google.com/transparencyreport/governmentrequests. 15. Frontline “The Persuaders.” 11.09.2004. www.pbs.org/wgbh/pages/frontline/ shows/persuaders/etc/script.html. 16. Behar, Richard. “Never Heard Of Acxiom? Chances Are It’s Heard Of You. How a little-known Little Rock company – the world’s largest processor of consumer data – found itself at the center of a very big national security debate.” CNN. 2.23.2004. http://money.cnn.com/magazines/fortune/fortune_archive/2004/02/23/362 182/index.htm. 17. www.acxiom.com. 18. www.fbi.gov/news/stories/2008/august/njttf_081908. 19. Stern, Andrew and Woodall, Bernie. “Michigan police and ACLU in flap over cell phone downloads.” Daily Press. 4.21.2011. www.dailypress.com/news/nation world/sns-rt-usreport-us-michigatre 73k5cb-20110421,0,5821147.story. 20. Hope, Christopher. “‘Big Brother’ database of all phone calls and emails condemned by watchdog. 8.17.2008. www.telegraph.co.uk/news/newstopics/politics/ lawandorder/2403908/Big-Brother-database-of-all-phone-calls-and-emails-condemn ed-by-watchdog.html. 21. O’Neill, Sean. “Is this useful information or a waste of time?” http://travel. yahoo.com/p-interests-24971907. 22. Singel, Ryan. “U.S airport screeners are watching what you read.” 9.20.2007. www.wired.com/politics/onlinerights/news/2007/09/flight_tracking. 23. Moore, Solomon. “F.B.I. and States Vastly Expand DNA Databases.” 4.18.2009. www.nytimes.com/2009/04/19/us/19DNA.html. 24. 15. AAPS News. “President Bush Signs S. 1858 into Law.” 4.28.2008. www.whitehouse.gov/news/releases/2008/04/20080424-17.html. & www.govtrack. us/congress/bill.xpd?bill=s110-1858 & www.aaps online.org/newsoftheday/0025. & www.naturalnews.com/z025116.html. & Donovan, Patty. “The Bill Nobody Noticed: National DNA Databank.” 12.18.2008. www.govtrack.us/congress/bill.xpd?bill=s110 -1858. 25. Cohen, Elizabeth. “The government has your baby’s DNA.” CNN. 3.04.2010. www.cnn.com / 2010/HEALTH/02/04/baby.dna.government/index.html?hpt=Sbin. 26. Gerstein, Josh. “President Obama backs DNA test in arrests.” 3.09.2010. www.politico.com/news/stories/0310/34097.html. 27. Somfalvi, Attila. “Israel to be first in world to create biometric database for all citizens ynetnews, 8.03.2008. Attila Somfalvi www.ynetnews.com/articles/0,7340,L- 3577046,00.html. 28. McCullagh, Declan. “Housing bailout bill creates national fingerprint registry.” CNET. 3.23.2008. http://news.cnet.com/8301-13578_3-9951420-38.html. 29. Smith, Stephen. “Boston launches flu shot tracking.” Boston.com. 11.21.2008. www.boston.com /news/local/massachusetts/articles/2008/11/21/boston_launches_flu _shot_tracking. 30. Ramasastry, Anita. Find Law. 11.05.2003. http://writ.news.findlaw.com/ram asastry/20091229.html. 31. http://en.wikipedia.org/wiki/Joint_Regional_Information_Exchange_System. 32. www.riss.net. 33. www.riss.net/overview.aspx.

200 34. www.dhs.gov/files/programs/gc_1156888108137.shtm & www.fema.gov/em ergency/nrf/HSIN.htm. 34. http://en.wikipedia.org/wili/Homeland_Security_Information_Network. 35. http://en.wikipedia.org/wiki/National_Criminal_Intelligence_Sharing_Plan. 36. Tencer, Daniel. “Feds tracking credit cards, store purchases without warrants.” Raw Story. 12.03.2010. www.rawstory.com/rs/2010/12/feds-credit-cards-without- warrant. & www.scribd.com/doc/44542244/DOJ-powerpoint-presentation-on-Hotwat ch-surveillance-orders-of-credit-card-transactions. 37. Coldewey, Devin. “NSA to store yottabytes of surveillance data in Utah megarepository,” Crunch Gear. 11.01. www.crunchgear.com/2009/11/01/nsa-to-store- yottabytes-of-surveillance-data-in-utah-mega repository. 38. Campbell, Duncan. 4.09.1999. www.heise.de/tp/r4/artikel/5/5263/1.html. 39. Verkaik, Robert. Independent, 11.05.2008. www.independent.co.uk/news/uk/ home-news/govern ment-black-boxes-will-collect-every-email-992268.html. 40. Harwood, Matthew. “The Information DHS Stores on International Travelers.” 9.10.2009. www.securitymanagement.com/news/information-dhs-stores- international-travelers-006185. 40. http://philosec urity.org/2009/09/07/what-does-dhs-know-about-you. 40. www.washingtonpost.com/wp-dyn/content/article/2007/09/21/AR200709210 2347.html. 41. “ADAMS.” DARPA Information Innovation Office. www.darpa.mil/Our_ Work/I2O/Programs/Anomaly_Detection_at_Multiple_Scales_(ADAMS).aspx. 42. “Anomaly Detection at Multiple Scales (ADAMS) Broad Agency Announcement DARPA-BAA-11-04.” General Services Administration. 2010-10-22. https://www.fbo.gov/download/2f6/2f6289e99a0c04942bbd89ccf242fb4c/DARPA- BAA-11-04_ADAMS.pdf. 43. Ackerman, Spencer. “Darpa Starts Sleuthing Out Disloyal Troops.” Wired. 10.11.2011. www.wired.com/dangerroom/2010/10/darpa-starts-sleuthing-out-disloyal -troops. 44. Keyes, Charley. “Military wants to scan communications to find internal threats.” CNN. 10.27.2010. http://articles.cnn.com/2010-10-27/us/pentagon.e.mail. profiling_1_nidal-hasan-darpa-fort-hood. 45. “Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets.” Georgia Institute of Technology. 11.10.2011. www.gatech.edu/newsroom/release.html?nid=72599. 46. “Video Interview: DARPA’s ADAMS Project Taps Big Data to Find the Breaking Bad.” Inside HPC. 2011-11-29. http://insidehpc.com/2011/11/29/video- interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad. 47. Brandon, John. “Could the U.S. Government Start Reading Your Emails?” Fox News. 12.03.2011. www.foxnews.com/scitech/2011/12/03/could-us-government- start-reading-your-emails. 48. “Anomaly Detection at Multiple Scales.” Georgia Tech College of Computing. 49. http://en.wikipedia.org/wiki/Anomaly_Detection_at_Multiple_Scales. 50. “Video Interview: DARPA’s ADAMS Project Taps Big Data to Find the Breaking Bad.” Inside HPC. 2011-11-29. http://insidehpc.com/2011/11/29/video- interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad.

201 51. Brandon, John. “Could the U.S. Government Start Reading Your Emails?” Fox News. 12.03.2011. www.foxnews.com/scitech/2011/12/03/could-us-government- start-reading-your-emails. 52. “Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets.” Georgia Institute of Technology. 10.11.2011. www.gatech.edu/newsroom/release.html?nid=72599. 53. Storm, Darlene. “Sifting through petabytes: PRODIGAL monitoring for lone wolf insider threats.” Computer World. 12.06.2011. http://blogs.computer world. com/19382/sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_ threats. 54. http://en.wikipedia.org/wiki/Proactive_Discovery_of_Insider_Threats_Using_ Graph_Analysis_and_Learning. 55. Lobe, Jim. “Congress Defunds Controversial ‘Total Information’ Program.” OneWorld.net. 9.26.2003. www.commondreams.org/headlines03/0926-02.htm. 56. Russia Today. “A not-so-private PC.” 3.26.2009. www.russiatoday.com/ Sci_Tech/2009-03-26/A_not-so-private_PC.html. 57. http://en.wikipedia.org/wiki/DARPA_LifeLog. & http://web.archive.org/web/ 20030603173339/http%3a//www.darpa.mil/ipto/Solicitations/PIP_03-30.html. 58. http://research.microsoft.com/en-us/projects/mylifebits/default.aspx. 58. Wolf, Gary. “The Data-Driven Life.” NY Times. 4.28.2010. www.nytimes. com/2010/05/02/magazine/02self-measurement-t.html. 58. “Lifelogging, An Inevitability.” 2.21.2007. The Technium. www.kk.org/the technium/archives/2007/02/lifelogging_an.php. 59. Sherman, Erick. Amazon Big Brother patent knows where you'll go.” CBS News. 12.14.2011. www.cbsnews.com/8301-505124_162-57342567/amazon-big- brother-patent-knows-where-youll-go. 60. www.brookings.edu/~/media/Files/rc/papers/2011/1214_digital_storage_vill asenor/1214_digital_storage_villasenor.pdf. 61. Greene, Tim. “Coming soon: Ubiquitous surveillance from Big Brother’s wayback machine.” NetworkWorld. 12.15.2011. www.networkworld.com/news/2011 /121511-government-surveillance-254137.html?hpg1=bn.

www.carrollquigley.net/pdf/ Tragedy_and_Hope.pdf 202

NINE

IDENTIFICATION PROGRAMS

Big Brother wants to gather and collate every shred of information and every biometric piece of data about you including your DNA.

But, in general, his freedom and choice will be controlled within very narrow alternatives by the fact that he will be numbered from birth and followed, as a number , through his educational training, his required military or public service , his tax contributions , his health and medical requirements, and his final retirement and death benefits. (Quigley, Carroll, Tragedy and Hope , p. 866, emphasis added)

ID Cards

Biometric Social Security Card

New York Democrat Senator Chuck Schumer and South Carolina Republican Senator Lindsey Graham, presented an immigration bill that includes a proposal to issue a biometric ID card to all working Americans that would contain physical data such as fingerprints or retinal scans. The “enhanced Social Security card” is being touted as a way to curb illegal immigration by giving employers the power to quickly and accurately determine who is eligible to work. “If you say [illegal 203 immigrants] can’t get a job when they come here, you’ll stop it,” Schumer told the Wall Street Journal. Proponents also hope legal hiring will be easier for employers if there’s a single go-to document instead of the 26 that new employees can currently use to show they’re authorized to work. A similar program run by the Department of Homeland Security, in which 1.4 million transportation workers have been issued biometric credentials, required applicants pay $132.50 to help cover the costs of the initiative. 1 Big Brother will eventually force everyone in America to get a SS card with biometric identifiers in it. Passports and driver’s licenses will also have biometrics in them and within a decade or so everyone in America will be required to get a National ID Card loaded with biometrics. Patriots who opt out of the Big Brother program will not be able to collect Social Security benefits or receive any federal or state benefit. We will also not be able to get jobs, travel by plane, train or bus and we will not be able to get a passport. Patriots will be prisoners in America.

India launches universal ID system with biometrics

India launched an ambitious program to fit each of its 1.2 billion residents with an Unique Identification Number (UID). Each number is tied into three pieces of bio-metric data: fingerprints (all ten), iris scans (both eyes), and a picture of the face. Starting in September of 2010, the Unique Identification Authority of India (UIDAI) began processing people in various locations around the country. While residents are not mandated to get a UID, a growing list of services including social welfare and even some bank accounts will soon require the identification number. If successful, this will be the first biometrically verified universal ID implemented on a national scale. There is some chilling Big Brother-like aspects to this whole affair. Yet the problem of insuring that resources make it to India’s poor is very real, and there is the strong possibility that the UID will be empowering and democratizing to the 440 million Indians below the poverty level. 2 Big Brother intends to compel the politicians and bureaucrats of every nation on Earth to issue a national ID card to every citizen and illegal alien. After a national ID card has been issued to virtually 204 everyone on Earth the implantable computer chip will replace it. That day is only a couple decades away.

People’s Republic of China

The identity card contains basic information regarding the individual, such as the following:

Obverse side:

Full name – in Chinese characters only. Non-Chinese ethnic names and foreign names are transliterated into Chinese. First- generation ID cards contained handwritten names for Chinese characters, whilst the second-generation cards exclusively used computer-printed text in a larger font compared to that of the first generation, and do not support rarer characters. Gender – containing one character for either male or female. Ethnicity – as officially listed by the People’s Republic of China. Date of birth – listed in the Gregorian calendar format, in YMD order. Domicile – the individual’s permanent residence as dictated by the Identity Card Bill of the People’s Republic of China. Identification number Photo of the individual

Reverse side:

Issuing authority (first-generation cards utilised a stamp; second-generation cards display text only) The limits to validity of the document (for individuals under 16 years of age: five years; for individuals between 16 and 25 years of age: ten years; for individuals between 26 and 45 years of age: twenty years; for individuals over 46 years of age: long- term)

1 1 0 1 0 2/Y Y Y Y M M D D/8 8 8/X Address code Date of Birth code Order code Checksum

Information stored in the identity database for biometric ID cards documents information such as work history, educational background, 205 religion, ethnicity, police record, medical insurance status, landlord’s phone number and personal reproductive history. 3

ID badges

Texas students test electronic eye

Some schools in Texas have begun monitoring student arrivals and departures using technology similar to that used to track livestock and pallets of retail shipments. The Spring Independent School District is equipping 28,000 students with ID badges containing computer chips that are read when the students get on and off school buses. The information is fed by wireless phone to the police and school administrators. In a variation on the concept, a Phoenix school district in November is starting a project using fingerprint technology to track when and where students get on and off buses. Last year, a charter school in Buffalo began automating attendance counts with computerized ID badges – one of the earliest examples of what educators said could become a widespread trend. 4 Iris scanners

This technology will become commonplace

Homeland Security to test iris scanners

The Homeland Security Department plans to test futuristic iris scan technology that stores digital images of people’s eyes in a database. The DHS conducted a two-week test in October of 2010 of commercially sold iris scanners from Global Rainmakers Inc., at a 206 Border Patrol station in McAllen, Texas. The test cameras that take photos from three or four feet away, including one that works on people as they walk by, were used on illegal immigrants, said Arun Vemury program manager at the department’s Science and Technology branch. “The test will help us determine how viable this is for potential (department) use in the future,” Vemury said. Iris scanners are little used, but a new generation of cameras that capture images from six feet away instead of a few inches has sparked interest from government agencies and financial firms, said Patrick Grother, a National Institute of Standards and Technology computer scientist. In 2007, the U.S. military began taking iris scans of thousands of Iraqis to track suspected militants. The technology was used in about 20 U.S. airports from 2005 to 2008 to identify passengers in the Registered Traveler program, who could skip to the front of security lines. 5 Global Rainmakers, Inc. is a company founded by Hector Hoyos in Puerto Rico in 2006 (www.globalrainmakersinc.com).

Iris scanning to secure Leon, Mexico

The million-plus citizens of Leon, Mexico became the first example of a city secured through the power of biometric identification. Iris and face scanning technologies from Global Rainmakers, Inc. will allow people to use their eyes to prove their identity, withdraw money from an ATM, get help at a hospital, and even ride the bus. GRI’s eye scanning systems are not more secure than others on the market, but they are faster. Large archway detectors using infrared imaging can pick out 50 people per minute, even as they hustle by at speeds up to 3.3 mph. The first phase of the Leon iris and face scanning project began in 2010. It is estimated to cost around $5 million and focuses on law enforcement agencies’ security check points . Over the next three years commercial uses will be rolled out with banks leading the charge. We have to put this in a larger context, too. India just launched its enormous effort to digitally identify more than a billion residents using fingerprints, face, and iris scans. Japan already uses finger scans during entry into the country and the European Union is working on a variety of passive scanning technologies to help secure airports and other public spaces. 207 Government and commercial institutions will endeavor to create enormous shared databases of biometric data and scan huge numbers of private citizens everywhere they go. The first phase of the project in Leon is going to help track the movements of “watch-listed individuals.” What is the future of this technology? Jeff Carter, chief business development officer of GRI, explained what is coming in an interview with Fast Company’s Austin Carr:

…we’ve even worked with three-letter agencies on technology that can capture 30-plus feet away. In certain spaces, eventually, you’ll be able to have maybe one sensor the size of a dime, in the ceiling, and it would acquire all of our irises in motion, at a distance, hundreds–probably thousands as computer power continues to increase–at a time… if you’ve been convicted of a crime, in essence, this will act as a digital scarlet letter. If you’re a known shoplifter, for example, you won’t be able to go into a store without being flagged. For others, boarding a plane will be impossible.” 6

Iris scanning is just one biometric identifier Big Brother seeks to make ubiquitous. Other forms are facial recognition, fingerprints, heat signature, and DNA.

Police to use iPhone iris scans

Dozens of police departments nationwide are gearing up to use a tech company’s already controversial iris- and facial-scanning device that slides over an iPhone and helps identify a person or track criminal suspects. The “biometric” technology, which seems to take a page from TV shows like “MI-5” or “CSI,” could improve speed and accuracy in some routine police work in the field. However, its use has set off alarms with some who are concerned about possible civil liberties and privacy issues. The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies in Plymouth, Massachusetts, and can be deployed by officers out on the beat or back at the station. An iris scan, which detects unique patterns in a person’s eyes, can reduce to seconds the time it takes to identify a suspect in custody. This

208 technique also is significantly more accurate than results from other fingerprinting technology long in use by police, BI2 says. When attached to an iPhone, MORIS can photograph a person’s face and run the image through software that hunts for a match in a BI2- managed database of U.S. criminal records. Each unit costs about $3,000. Some experts fear police may randomly scan the population, using potentially intrusive techniques to search for criminals, sex offenders, and illegal aliens. Experts also say that before police administer an iris scan, they should have probable cause a crime has been committed. “What we don’t want is for them to become a general surveillance tool, where the police start using them routinely on the general public, collecting biometric information on innocent people,” said Jay Stanley, senior policy analyst with the national ACLU in Washington, D.C. Facial recognition technology is not without its problems, however. For example, some U.S. individuals mistakenly have had their driver’s license revoked as a potential fraud. The problem, it turns out, is that they look like another driver and so the technology mistakenly flags them as having fake identification. Roughly 40 law enforcement units nationwide will soon be using the MORIS, including Arizona’s Pinal County Sheriff's Office, as well as officers in Hampton City in Virginia and Calhoun County in Alabama. 7

Iris scan

The New York-based biometric security company Hoyos Group will market an iris scanner that connects to a personal computer. The device allows users to log into their online banking, social networks and emails – all in the blink of an eye. Hoyos unveiled their new security product, dubbed EyeLock, at the Finovate financial technology conference in May of 2011, amid claims that it is the first and only portable iris-scanning device for consumers. The device, which is the size of a standard business card and weighs about four ounces connects to the user’s computer by a USB cable. Once the accompanying software package is installed and configured, all the user needs to do to is wave the scanner in front of his eye to automatically log in to any password-protected application or website. “Every time you log in, it reads your iris and creates a unique key, which is a series of numbers, and this key changes every time you log

209 in, so no one can hack it,” explained Tracy Hoyos, assistant marketing director. According to Miss Hoyos, the security offered by iris scans trumps fingerprints which have around 18 unique points while irises have 2,000. The EyeLock will cost $99 (£60), but no release date has yet been announced. The company has already marketed another iris-scan product used in airport security and is researching ways to expand the service to other areas, including mobile phones. 8

Iris-scanning for frequent fliers is cut back in the UK

At the very time long passport control procedures are being blamed for long delays, most scanners have been closed with no indication they are to re-open soon. Iris recognition scanners were introduced at several British airports in recent years to allow grequent fliers to skip the traditional immigration controls at security gates. Yet in 2011 seven of the nine facilities for new applicants to sign up for the fast-track system were closed. The scanners themselves remain open. Yet with users of the system being required to renew their records every two years, even the estimated 385,000 current users are threatened by the office closures, meaning the number of people being forced to wait in long lines for conventional passport security will increase.8b This is just a minor setback for the technology. When the incompetent British bureaucrats get their act together they will expand the fast-track program and eventually require everyone entering the United Kingdom to undergo iris scanning along with fingerprinting, DNA testing, voice identification and other forms of identification. A decade or two from now people entering any nation will be scrutinized to the max. Big Brother may even require them to go through a verbal screening process in which lie detection technology will be used to determine if they are telling the truth. This technology is currently being used in Israel and will make its way to every nation in the bot too distant future.

Retinal scans

The human retina is a thin tissue composed of neural cells that is located in the posterior portion of the eye. Because of the complex 210 structure of the capillaries that supply the retina with blood, each person’s retina is unique. The network of blood vessels in the retina is so complex that even identical twins do not share a similar pattern. Although retinal patterns may be altered in cases of diabetes, glaucoma or retinal degenerative disorders, the retina typically remains unchanged from birth until death. Due to its unique and unchanging nature, the retina appears to be the most precise and reliable biometric. Advocates of retinal scanning have concluded that it is so accurate that its error rate is estimated to be only one in a million. 9 The idea for retinal identification was first conceived by Dr. Carleton Simon and Dr. Isadore Goldstein and was published in the New York State Journal of Medicine in 1935. 10 The idea was a little before its time, but once technology caught up, the concept for a retinal scanning device emerged in 1975. In 1976, Robert “Buzz” Hill formed a corporation named EyeDentify, Inc., and made a full-time effort to research and develop such a device. In 1978, specific means for a retinal scanner was patented, followed by a commercial model in 1981. 11

Facial recognition

USA, UK, Super Bowl, banks, etc.

Facial recognition systems (FRS) are being used around the world to identify known criminals. It is one biometric identification system that does not require assistance from the subject, and it can be used to screen people entering buildings, sporting events or walking down the street. The Pennsylvania Justice Network searches photographs and CCTV footage in the mug shot database of previous arrests. Since its use in 2005 it has helped solve several cases that were very cold. The Tampa Police Department in Florida had no success when it used FRS in a trial, and Boston’s Logan Airport also failed to produce results. The Department of State operates one of the largest FRS in the world with over 75 million photographs that is actively used for visa processing. The London Borough of Newham uses it in its CCTV system. Unfortunately the police have failed to identify a single criminal since its use in 2004. Germany uses it to allow voluntary subscribers to pass fully automated border controls at the Frankfurt Rhein-Main

211 international airport. The Australian Customs Service has an automated border processing system called SmartGate that uses it. Facial recognition systems have been tested at public events. At Super Bowl XXXV in January 2001, police in Tampa Bay, Florida, used the Identix facial recognition software, FaceIt, to search for potential criminals and terrorists. It found 19 people with pending arrest warrants. Some casinos use it to identify card counters and other blacklisted individuals. Banks may soon use FRS for identification at ATMs instead of passwords, and some companies may use it for purchases on line. Consumers would supply a photo to each vendor, and use a web cam to log-in. If banks use them for ATMs they will also use them at the teller’s window. In 2006, the performance of the latest face recognition algorithms were evaluated in the Face Recognition Grand Challenge. High- resolution face images, 3-D face scans, and iris images were used in the tests. The results indicated that the new algorithms are 10 times more accurate than the face recognition algorithms of 2002 and 100 times more accurate than those of 1995. Some of the algorithms were able to outperform human participants in recognizing faces and could uniquely identify identical twins. 12 The makers of the FRS have big dreams of how their technology can be used. They envision registers in retail stores being equipped with cameras that would take pictures of customers. The camera would be the primary means of identifying the customer, and if visual identification failed, the customer could complete the purchase by using a PIN (personal identification number). After the cash register had calculated the total sale, the face recognition system would verify the identity of the customer and the total amount of the sale would be deducted from the customer’s bank account. Face-based retailing would provide convenience for retail customers, since they could go shopping simply by showing their faces, and there would be no need to bring credit or debit cards, checks or cash. The FRS could also be used in gas stations, restaurants, movie theaters, car rental companies, hotels, amusement parks, stadiums, arenas, concerts and everyplace where financial transactions are made. 13 It is highly probable that in the future FRS will be connected to every cash register. Yet it is not the ultimate goal of Big Brother. He wants to put a computer chip in everyone on Earth that will have RFID 212 technology in it so it can be read by billions of RFID readers scattered around the world in stores, buildings, offices, homes and on pedestrian walkways. He also wants to put a GPS transponder in it that can be tracked by satellite anywhere on Earth. That chip will have numerous biometric information in it such as facial scan, retina scan, fingerprints, DNA and body odor.

Facial Recognition used by nightclub

A Melbourne nightclub installed facial recognition software in April of 2009 to stamp out thugs and known troublemakers. Chasers nightclub in Chapel St., which already has metal detectors to screen patrons for weapons, believes the system is one of the first in the world for nightclubs. Management now wants the technology to be adopted in other nightclubs to create a security network. Melbourne’s Lord Mayor Robert Doyle said the technology could help the fight against violence, and should be looked at for venues on their last warnings. On entering, patrons’ faces are scanned by a camera and the image and driver’s license details are stored on computer for 28 days. If someone banned from the club tries to enter, their face comes up with a red mark, alerting security to a problem. Chasers owner Martha Tsamis, who also owns Inflation on King St., said the $16,000 system was bought after an ammonia cocktail bomb, the effect of which is similar to mace, was set off last year. “The only way we could track people who do such things is with this, if they don’t have a criminal record,” Ms. Tsamis said. “The reports we have had, especially from females, is they are very happy because they know our system is there to protect people.” The Herald Sun revealed that police want hi-tech ID scanning equipment installed at all late-night city venues. A submission by Victoria Police to the Government will ask for scanners to be compulsory for “high-risk” nightclubs. 14 Before long Big Brother will require all commercial businesses to install facial recognition technology. This will enable him to track what stores, businesses, etc. that each individual visits. It will also be handy in catching political dissidents or individuals who are living outside of the system. If an outsider has his face scanned and there is no match in Big Brother’s world database the person will be detained by security or police. When Big Brother gets his tyrannical identification net in place 213 outsiders will not be able to freely move about. They will only be able to go outside of their hiding place at night and they will not be able to walk in any location that has spy cameras. If their face can be captured by a spycam the facial recognition software will be able to identify them. If no match is made Big Brother will know the person is an outsider and seek to have him arrested. Life for outsiders will be extremely difficult. They will not be able to make purchases of any kind and if stopped by authorities they will be detained and tossed into a concentration camp or prison.

Brazilian police use facial recognition cameras

A small camera fitted to the glasses of a police officer can capture 400 facial images per second and send them to a central computer database storing up to 13 million faces. The camera will generally be used to scan faces in crowds up to 50 metres (164ft) away but can be adjusted, if searching for a specific target, to recognise faces as far as 12 miles away. The system can compare biometric data at 46,000 points on a face and will immediately signal any matches to known criminals or people wanted by police. If there is a match a red signal will appear on a small screen connected to the glasses, alerting the police officer of the need to take further action or make an arrest. The devices are being tested at football matches and concerts by police in Brazil and will be used extensively at the 2014 World Cup to be held in Brazil in 2014. Military Police officials from Sao Paulo and Rio de Janeiro, which will both host key games in the World Cup, have been given demonstrations of how the device works. Major Leandro Pavani Agostini, of Sao Paulo’s Military Police, explained the benefits of the technology: “It’s something discreet because you do not question the person or ask for documents. The computer does it. To the naked eye two people may appear identical but with 46,000 points compared, the data will not be beaten.” He said the device will be useful to police trying to monitor many different locations and events, ranging from airports and bus terminals to concerts and football matches. “I can insert into the database a supporter who was involved in a brawl on the field and even with the old images, he can be located in the future,” he added. 15 This technology was depicted in the Robocop films. It is only a matter of time before it will be standard equipment for most police 214 officers around the world. Political dissidents will have a hard time going out in public without being caught.

Voice identification

Voiceprint identification can be defined as a combination of both aural (listening) and spectrographic (instrumental) comparison of one or more known voices with an unknown voice for the purpose of identification or elimination. Developed by Bell Laboratories in the late 1940s for military intelligence purposes, the modern-day forensic utilization of the technique did not start until the late 1960s following its adoption by the Michigan State Police. From 1967 until the present, more than 5,000 law enforcement related voice identification cases have been processed by certified voiceprint examiners. It has been used in a variety of criminal cases, including murder, rape, extortion, drug smuggling, wagering-gambling investigations, political corruption, money-laundering, tax evasion, burglary, bomb threats, terrorist activities and organized crime activities. It is part of a larger forensic role known as acoustic analyses, which involves tape filtering and enhancement, tape authentication, gunshot acoustics, reconstruction of conversations and the analysis of any other questioned acoustic event. 16

Vascular technology

Vein matching , also called vascular technology ,17 is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. 18 Though used by the Federal Bureau of Investigation and the Central Intelligence Agency,19 this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion. 18, 20

Walk identification

Big Brother scientists are working on technology that will enable Big Brother to identify people by the way they walk.

215 Abstract – We propose a view-based approach to recognize humans from their gait. Two different image features have been considered: the width of the outer contour of the binarized silhouette of the walking person and the entire binary silhouette itself. To obtain the observation vector from the image features, we employ two different methods. In the first method, referred to as the indirect approach, the high- dimensional image feature is transformed to a lower dimensional space by generating what we call the frame to exemplar (FED) distance. The FED vector captures both structural and dynamic traits of each individual. For compact and effective gait representation and recognition, the gait information in the FED vector sequences is captured in a hidden Markov model (HMM). In the second method, referred to as the direct approach, we work with the feature vector directly (as opposed to computing the FED) and train an HMM. We estimate the HMM parameters (specifically the observation probability) based on the distance between the exemplars and the image features. In this way, we avoid learning high-dimensional probability density functions. The statistical nature of the HMM lends overall robustness to representation and recognition. The performance of the methods is illustrated using several databases. 21

Mobile ID for law enforcement applications

Instant identification with biometric technology is another program designed to make sure everyone is under his thumb. Currently there are 26 companies in America that are providing instant identification technology to the civilian sector, to police and the military. 22 These biometric technology companies have field equipment that can run fingerprint, facial and iris scans and even DBA samples within minutes. One of those companies, L-1 Identity Solutions, “provides a full range of finger/palm, face, iris, and multi-biometric products for government-sponsored civilian identification management programs and criminal identification management procedures managed by law enforcement and military agencies. “With a global network of partners such as leading system integrators, defense prime contractors and OEMs, L-1 Identity Solutions serves a broad range of markets including federal, state and local government, law enforcement, financial services, border management and travel.” 23 This is what L-1 I.S. says about its products: 216 L-1’s portable, hand-held mobile identification devices allow officers in the field to get accurate information about their suspects’ identity immediately, instead of going to the booking station, where waiting time for results could be anywhere from three hours to three days. The products support multiple biometrics, enabling officers to verify an identity via a suspect’s finger, face or iris pattern. The Mobile ID products help:

Save valuable time and improve the productivity of officers in the field by eliminating unnecessary trips to the police station.

Reduce the chance of incorrectly releasing a dangerous criminal, thereby increasing public safety.

Prevent false arrest and avert having an innocent individual endure the inconvenience and time loss associated with false arrest.

Officers to make more identifications based on multiple biometric recognitions. Leveraging more biometric data sources – finger, face and iris – means more hits that are more accurate. 24 It is only a matter of time before police officers will make random checks of identification. They will randomly pull over drivers and check the ID of everyone in the vehicle. They will also check the ID of pedestrians. The Nazis said, “Papers, please.” Big Brother minions in America will command, “ID, now.” Please will not be in their vocabulary. The goal of Big Brother is to collect as much personal data as possible on the masses. In time police will routinely stop people for no reason just to get biometric data from them. If you still believe that America is a free country where everyone can live their life the way they want to without being told how to live, what to say, what to think, what to like and what to dislike go back to page 13 and read the Introduction carefully. America was the fifth worse tyrannical nation in the world in 2010.

Biometrics for national security (NSPD 59/HSPD 24)

Another Big Brother police state measure that came from the Bush administration, with virtually no press coverage, was NSPD 59 (HSPD

217 24) entitled Biometrics for Identification and Screening to Enhance National Security . NSPD 59 was issued on June 5, 2008, four days prior to the publication of Rep. Dennis Kucinich’s Articles of Impeachment of President George W. Bush by the House of Representatives. It became “law” with no public debate or congressional approval. This presidential directive goes far beyond the issue of biometric identification recommending the collection and storage of “associated biographic” information (information on the private lives of US citizens, in minute detail, all of which will be “accomplished within the law”):

The contextual data that accompanies biometric data includes information on date and place of birth, citizenship, current address and address history, current employment and employment history, current phone numbers and phone number history, use of government services and tax filings. Other contextual data may include bank account and credit card histories, plus criminal database records on a local, state and federal level. The database also could include legal judgments or other public records documenting involvement in legal disputes, child custody records and marriage or divorce records.”

It also calls for the integration of various data banks as well as inter- agency cooperation in the sharing of information, with a view to eventually centralizing the information on American citizens. In a carefully worded text, NSPD 59 “establishes a framework” to enable the Federal government and its various police and intelligence agencies to: “use mutually compatible methods and procedures in the collection, storage, use, analysis, and sharing of biometric and associated biographic and contextual information of individuals in a lawful and appropriate manner, while respecting their information privacy and other legal rights under United States law.” The directive recommends: “actions and associated timelines for enhancing the existing terrorist-oriented identification and screening processes by expanding the use of biometrics.” 25 The Bush administration took full advantage of the 911 attacks to pass and implement myriad Big Brother laws. The rush toward a total dictatorship by the Bush administration has been excelerated by the Obama administration. Total dictatorship is inevitable unless the American people stand up and say, “NO!” 218 KSTs (NSPD 59)

The stated intent of NSPD 59 is to protect America from terrorists, but in fact the terms of reference include any person who is deemed to pose a threat to the Homeland. The government requires the ability:

to positively identify those individuals who may do harm to Americans and the Nation . . . Since September 11, 2001, agencies have made considerable progress in securing the Nation through the integration, maintenance, and sharing of information used to identify persons who may pose a threat to national security.

The Directive is not limited to KSTs, which in Homeland Security jargon stands for “Known and Suspected Terrorists”:

The executive branch has developed an integrated screening capability to protect the Nation against “known and suspected terrorists” (KSTs). The executive branch shall build upon this success, in accordance with this directive, by enhancing its capability to collect, store, use, analyze, and share biometrics to identify and screen KSTs and other persons who may pose a threat to national security. The executive branch recognizes the need for a layered approach to identification and screening of individuals, as no single mechanism is sufficient. For example, while existing name-based screening procedures are beneficial, application of biometric technologies, where appropriate, improve the executive branch’s ability to identify and screen for persons who may pose a national security threat. To be most effective, national security identification and screening systems will require timely access to the most accurate and most complete biometric, biographic, and related data that are, or can be, made available throughout the executive branch.” 26

Radical groups & disgruntled employees

NSPD 59 calls for extending the definition of terrorists to include other categories of individuals “who may pose a threat to national security.” In this regard, it is worth noting that in the 2005 TOPOFF (Top officials) anti-terror drills, two other categories of individuals were identified as potential threats: “Radical groups” and “disgruntled 219 employees,” suggesting than any form of dissent directed against the federal government will be categorized as a threat to America. 26

Universal Adversary

In a previous 2004 report of the Homeland Security Council, entitled “Planning Scenarios,” the enemy was referred to as the Universal Adversary (UA). The Universal Adversary was identified in the scenarios as an abstract entity used for the purposes of simulation. Yet upon more careful examination, this UA was by no means illusory. It included the following categories of potential “conspirators”: “foreign [Islamic] terrorists,” “domestic radical groups,” [antiwar and civil rights groups] “state sponsored adversaries” [“rogue states,” “unstable nations”] and “disgruntled employees” [labor and union activists]. 27

DNA collection

CODIS

The Combined DNA Index System ( CODIS ) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes. 28

The Newborn Screening Saves Lives Act of 2007

Government bureaucrats want to create a DNA database that will eventually have a DNA sample from every man, woman and child in America. They have already started to build a DNA data base. In April of 2008, then President Bush signed into law S. 1858, which allows the federal government to screen the DNA of all newborn babies in America. This was to be implemented within 6 months, meaning that this measure is now being carried out. Congressman Ron Paul states that this bill is the first step towards the establishment of a national DNA database. S. 1858, known as “The Newborn Screening Saves Lives Act of 2007,” is justified as a “national contingency plan” in that it represents preparation for any sort of public health emergency. 29

220 Government bureaucrats want to create a DNA database that will eventually have a DNA sample from every man, woman and child in America.

Feds to collect DNA

The federal government began to collect DNA samples from everyone arrested by a federal law enforcement agency. Using authority granted by Congress through two different laws passed in 2005 and 2006, the government also plans to collect DNA samples from foreigners who are detained, whether they have been charged or not. The DNA would be collected through a cheek swab, said Justice Department spokesman Erik Ablin. That would be a departure from current practice, which limits DNA collection to convicted felons . Expansion of the DNA database, known as CODIS, raises civil liberties questions about the potential for misuse of such personal information, such as family ties and genetic conditions. Justice officials estimate the new collecting requirements would add DNA from an additional 1.2 million people to the database each year. A Chicago study in 2005 found that 53 murders and rapes could have been prevented if a DNA sample had been collected upon arrest. “Many innocent lives could have been saved had the government began this kind of DNA sampling in the 1990s when the technology to do so first became available,” said Sen. Jon Kyl (R-Az). Thirteen states have laws similar to the federal one: Alaska, Arizona, California, Kansas, Louisiana, Maryland, Minnesota, New Mexico, North Dakota, South Dakota, Tennessee, Texas and Virginia.30 Big Brother wants your DNA and he will not stop until he gets it or you are dead. Do not let him get it for as long as you can. Some will deny him their DNA to the point of death.

DNA taken upon arrest not conviction

The government plans to begin collecting DNA samples from anyone arrested by a federal law enforcement agency – a move intended to prevent violent crime, but which also is raising concerns about the privacy of innocent people. Using authority granted by Congress, the government also plans to collect DNA samples from foreigners who are detained, whether they have been charged or not. 221 Justice Department spokesman Erik Ablin said the DNA would be collected through a cheek swab. This would be a departure from current practice, which limits DNA collection to convicted felons. 31 “The F.B.I., with a DNA database of 6.7 million profiles, expects to accelerate its growth rate from 80,000 new entries a year to 1.2 million by 2012 – a 17-fold increase. F.B.I. officials say they expect DNA processing backlogs – which now stand at more than 500,000 cases – to increase.” 32 The goal is to get a DNA sample from everyone in America and the planet. It will only be a matter of time before the bureaucrats get their wish.

Police draw blood

A select cadre of officers in Idaho and Texas received training in 2009 to draw blood from those suspected of drunken driving. The federal program’s aim is to determine if blood drawn by police officers can be an effective tool against drunk drivers. If the results seem promising after a year or two, the National Highway Traffic Safety Administration will encourage police nationwide to undergo similar training. “Officers cannot hold down a suspect and force them to breath into a tube but they can forcefully take blood – a practice that’s been upheld by Idaho’s Supreme Court and the U.S. Supreme Court,” said Ada County, Idaho, Deputy Prosecutor Christine Starr. (It is much easier for police to force an uncooperative suspect to breath into a tube than to draw blood. A suspect could bleed to death if he resisted and the officer cut a vein or artery.) The nation’s highest court ruled in 1966 that police could have blood tests forcibly done on a drunk driving suspect without a warrant, as long as the draw was based on a reasonable suspicion that a suspect was intoxicated, that it was done after an arrest and carried out in a medically approved manner . “I would imagine that a lot of people would be wary of having their blood drawn by an officer on the hood of their police vehicle,” said Steve Oberman, chair of the National Association of Criminal Defense Lawyers’ DUI Committee. Once the trained officers are back on patrol, they will draw blood of any suspected drunk driver who refuses a breath test. They will use

222 force if they need to, such as getting help from another officer to pin down a suspect and potentially strap them down. This is beyond incredible! This makes the Nazis look like girl scouts. This bizarre practice started in 1995 in Arizona. This weird Big Brother scheme has numerous problems. Vials can be mixed up, preservative levels in the tubes used to collect the blood can be off, or the blood can be stored improperly, causing it to ferment and boosting the alcohol content. Lawsuits should eventually put an end to this insane practice. If this scheme becomes commonplace around the country what will keep Big Brother from drawing blood in the field from anyone who is detained by police? If Big Brother wants a DNA sample from everyone, one way of getting a sample from those who do not voluntarily give it is to have police officers randomly demand a blood sample from anyone they stop. Instead of demanding identification they will also demand blood or saliva from a cheek swab.33

HIV testing at the DMV

One Department of Motor Vehicles office in Washington, D.C. began a program in which motorists could be tested for HIV when they applied for a driver’s license or to renew one. Participants in this first-of-its-kind will receive up to $15 to help defray their DMV costs. “We wanted to have a broad audience and a captive audience. You’re captive at the DMV,” said Angela Fulwood Wood, chief operations officer of the Family and Medical Counseling Service. “We’re normalizing people’s thoughts of testing. You can do organ donation at the DMV. You can do voter registration at the DMV. If people don’t want to do it, we can at least talk to them.” The city Health Department is supplying HIV testing kits and educational materials, and the DMV is contributing office space. Family and Medical Counseling Service received $250,000 in funding from Gilead Sciences, a Foster City, California, biopharmaceutical company, to help cover staff costs and the $15 money orders. Gilead spokeswoman Cara Miller said in an e-mail that the project is in keeping with the company’s efforts to “ normalize ” testing in “traditional and non-traditional settings.” 34 This may be a program designed to help people, but it may also be a way to get a DNA sample from people. Big Brother is very sneaky and devious.

223 New portable DNA screener

Homeland Security plans to begin testing a DNA analyzer in the summer of 2011 that is small enough to be portable and fast enough to return results in less than an hour. The analyzer, known as a rapid DNA screener, is about the size of a laser printer. Initially will be used to determine kinship among refugees and asylum seekers. It also could help establish whether foreigners giving children up for adoption are their parents or other relatives, and help combat child smuggling and human trafficking. Eventually, the analyzer also could be used to positively identify criminals, illegal immigrants, missing persons and mass casualty victims, he said. Using a process called digital micro-fluidics, the analyzer processes a DNA sample and provides results in less than an hour for under $100 per sample as compared to the days or weeks and $500 per sample to get results when it is tested in a laboratory. As with other DNA tests, the process begins with a sample collected on a swab, typically from inside the mouth. The sample is placed in a disposable cartridge, and the analyzer does the rest of the work. “We’re not about advancing the technology so much as integrating and automating it into a fieldable device,” said Christopher Miles, biometrics program manager in the DHS Office of Science and Technology. Boston-based NetBio, which developed the rapid DNA analyzer for DHS, described it as a “game-changing technology” platform that “consists of instruments, biochips and analytical software.” It eliminates the need for a trained technician and special operating site. The analyzer was designed for Homeland Security, the military, intelligence and police agencies. The machines are expected to cost about $275,000 apiece. “That sounds like a lot of money, but compare that to a laboratory full of equipment that would cost millions of dollars and a building that would cost tens of millions of dollars.” After the rapid analyzers are in production, he added, the cost is likely to come down. 35 Ten years from now the cost of these machines could drop to a few thousand dollars a piece. The speed of identifying a person will also drop to just a few minutes. When the price drops low enough police departments will buy them to put in patrol cars so a person’s identity can be verified within a few minutes. Eventually stores and all government offices will have them to make a positive ID of everyone apply for benefits or seeking government services. 224 As noted previously, Big Brother will routinely gather biometric data from the masses through police officers. He will also have his minion officers collect DNA from people with no justifiable reason. A DNA sample is the holy grail of biometric data. Big Brother wants your DNA and he will think up any scheme to get it. Do not fall for his scams. Keep your DNA to yourself and tell Big Brother he cannot have it.

Biometrics Identity Management Agency

On March 23, 2010, the Biometrics Task Force (created in 2000) was redesignated the Biometrics Identity Management Agency (BIMA). “The Biometrics Identity Management Agency leads Department of Defense activities to prioritize, integrate, and synchronize biometrics technologies and capabilities and to manage the Department of Defense’s authoritative biometrics database to support the National Security Strategy,” according to the March 23 order issued by Army Secretary John M. McHugh (www.fas.org/irp/doddir/army/bima.pdf). Dr. Thomas Killion, the former Chief Scientist of the U.S. Army who served as Science Advisor to the Director of Joint IED Defeat Organization, became Director of BIMA on October 26, 2010. 36

Fingerprinting

History of fingerprinting

Fingerprinting for identification is an old Big Brother technology that was first used in Babylon in 1750 B.C. In 300 A.D. the Chinese used handprints for evidence in trials and by 650 A.D. they knew fingerprints could be used to identify people. By 1300 A.D. they used fingerprints for identification. The British used them in India for identification, and in 1891 an Argentine police chief created the first modern fingerprint file. Scotland Yard created the first fingerprint bureau in 1901, and in 1906 the New York Police Department introduces fingerprinting to America. Today virtually every nation on Earth has programs designed to get the prints of everyone, including children. Big Brother is fingerprint crazy.

225 Fingerprinting real estate agents

The Senate housing bill of 2008 contains a provision to create a new national fingerprint registry. It covers just about everyone involved in the mortgage business, including lenders, “loan originators,” and some “real estate agents.” 37 Real estate certainly has its risks and fraud is a growing problem, but now there’s a new law that’s supposed to protect buyers. As CBS 2’s Mike Puccinelli reports the new law will also place an unusual burden on the seller. Fingerprinting is something we often associate with crime. So the fact that Cook County home sellers will soon have to provide a thumb print left some people shocked. The new law, set to go into effect June 1, 2009, will force anyone selling property in Cook County to provide a thumbprint from their right hand. 38

Auto rentals

James Glave said he learned about the mandatory thumbprinting when he sought to rent a car from Dollar Rent A Car. He noticed a display featuring a drawing of a big thumb, with the words “Thumbs Up!” printed on it. Glave explained that thumbprints were being collected from customers as part of an effort to reduce fraud and theft. When he did not comply, the employee refused to rent him a car. 39 When Big Brother demands a thumbprint, fingerprint or any biometric identification tell him “NO!” Go elsewhere to buy a product or service. The way to slow Big Brother down is to stop buying his junk and worthless services. If you cannot purchase an item or a service without giving him biometric information do without it.

Thumbprint at checkout stand

A pet store in Herndon, Va., accepts cash, credit cards, checks or your thumbprint. Customers at Fox Mill Pets can pay for their goods and pets by placing a thumb on a fingerprint scanner at the register. The scanner which is connected to a computer network analyzes the print and matches the print to the customer. The customer’s checking account is then debited the amount of the purchase. Biometric devices such as fingerprint readers, retinal scanners and facial recognition systems are often part of high-tech security, but until

226

This technology will replace cash, checks and credit cards.

2002, biometrics has been considered too expensive and cumbersome for everyday use. Fox Mill Pets , Eleven Food 4 Less stores in the Midwest, three Kroger grocery stores in Texas and Duthler Family Foods in Grand Rapids, Michigan are trying fingerprint scanners along with other shops. BioPay (www.biopay.com), which has the nation’s largest commercial electronic fingerprint database , is the leader in this industry.40 “It improves productivity, reduces operating costs, improves cash flow and lowers fraud,” said Ron Smith, CEO of Biometric Access , which makes fingerprint systems similar to the one at Fox Mill Pets. “It puts the ‘express’ in ‘express lane.’” Pay By Touch is another company making a similar product. For most systems customers must sign up which takes about five minutes. They must provide their name, phone number and checking account or credit card information. Two index fingers are scanned and an electronic photo is taken of the customer. The next time customers buy something the computer compares their print with ones in the database to find a match. A major problem with this system is security. The customer’s biometric information is stored in the computer system in the store and at the office of the company that supplies the scanners. Every customer’s negative check-cashing information is stored in a central 227 database and shared between all merchants using the BioPay system. A hacker or employee can steal this information. “All it takes is one good breach,” said Will Doherty of online advocacy group Electronic Frontier Foundation. Southern California grocery chain Cardenas Market lost $500,000 a year on check-cashing fraud, but since they started using biometric fingerprint scanners in its nine stores fraud has dropped to one-percent said general manager Steve Vallance. “Biometrics is one way to really identify the customer you’re dealing with,” he says. 41 Biometric identification is an excellent way to eliminate fraud. But there is a better way to stop fraud and not infringe on the privacy of people. The perfect solution is cash. It may cause criminals to engage in more mugging and theft of purses and wallets, but it is nothing compared to credit card and electronic fraud.

Mexico to fingerprint buyers of cell phones

Mexico will start a national register of mobile phone users that will include fingerprinting all customers in an effort to catch criminals who use the devices to extort money and negotiate kidnapping ransoms. Under a new due to be in force in April of 2009, mobile phone companies will have a year to build up a database of their clients, complete with fingerprints. Hundreds of people are kidnapped in Mexico every year and the number of victims is rising sharply as drug gangs seek new income. Politicians who pushed the bill through Congress say there are around 700 criminal bands in Mexico, some of them operating from prison cells that use cell phones to extract extortion and kidnap ransom payments. Most of Mexico’s 80 million mobile phones are prepaid handsets with a given number of minutes of use that can be bought in stores without any identification. The phones can have more minutes added through purchases from vendors on street corners. The plan also requires operators to store all cell phone information such as call logs, text and voice messages, for one year. Information on users and calls will remain private and only available with court approval to track down criminals. Unregulated vendors sell cell phones and chips for cash from street side stands. It is unclear how such vendors would be made to comply with the new law. 42 228 Tennessee traffic violaters could get fingerprinted

Motorists stopped for traffic violations in Tennessee could be fingerprinted if state lawmakers approve a bill pending in the legislature. Currently, when drivers are cited during traffic stops, police officers ask for the driver’s signature on the ticket, but the proposed bill would allow police departments to the choice of collecting a signature or a fingerprint, or collecting a signature and a fingerprint. Supporters say collecting fingerprints would save money and help police determine whether the driver is wanted for a criminal offense, but opponents worry that it allows the government to tread on individual privacy rights. 43

Houston teachers next in line to be fingerprinted

Senate Bill 9, approved in September 2007, requires all certified staff members and substitute teachers of the Houston Independent School District to be fingerprinted by September 1, 2011. New hires have been required to do this since January 1, 2008. The process is pretty rigid. After the Texas Education Agency notifies the district, they will have 80 days to fingerprint eligible employees. The fingerprinting is done through a state-selected vendor, and prints must be deemed acceptable by the FBI and Department of Public Safety by the district’s March 5 deadline. Any employee who does not meet the standard by the deadline will have their certificate deactivated. If the district discovers any felonies, the employee will be dismissed. 44

Vending Machines Take Finger Scans Instead of Cash

Biometric scanners are popping up everywhere, and now Hitachi has debuted the first vending machine that will accept a finger scan instead of cash or coins. By linking the scan to a credit card account, customers can simply place their finger in the machine and make a purchase. The biometric sensor in Hitachi’s new vending machine uses light to scan and read the number and orientation of veins in your finger tip without directly touching a sensor. Hitachi has not decided if it will market the machine. 45

229 UK police to use mobile fingerprint scanners

All United Kingdom police forces will be issued mobile fingerprint scanners amid plans to carry out random identity checks on people in the street. The hand-held devices will enable every officer on the ground to receive instant images of suspects as part of a scheme codenamed Project Midas. No bigger than a BlackBerry smartphone, the technology will be widely distributed to every force in the UK by spring of 2011. The Home Office is understood to have already allocated £50 million for 10,000 of the mobile devices by September. A prototype machine has already been used during a series of tests carried out by motorway patrols. Large public occasions, sporting events, festivals and political conferences could be targeted as well as the 2012 London Olympics. 46

Biometric ID in Scottish schools

Dozens of Scottish schools have introduced “intrusive” biometric systems, such as fingerprinting, to identify pupils as young as four. New figures show 68 schools are now using technology to manage meals, control library books and even allow access to toilets. 47

UK school prints children without consent

Capital City Academy in Brent, north London, caused an uproar after taking children’s fingerprints without permission from their parents. Pupils were forced to be fingerprinted so they could use touch screens in the canteen to have money deducted from their account. It also introduced an opt-out for parents uncomfortable with the technology, allowing pupils to enter a four-digit pin code instead of scanning their print. The revelation comes as teachers today warned schools are routinely taking children’s fingerprints without permission from their parents. As many as 3,500 schools in the UK take biometric data from pupils to speed up basic administration such as buying canteen lunches or borrowing library books. A 2007 survey by the Liberal Democrats found that out of 285 schools using fingerprint scanners, only 48 had first sought parental consent. 230 Hank Roberts of the Association of the Teachers and Lecturers said civil liberties were being eroded. “There has been a severe diminution of civil liberties and freedoms in this country and we face the danger of more and worse to come. It’s outrageous that children’s fingerprints can be taken without parents’ consent.” “Should we allow Big Brother in our schools?” asked Azra Haque, a teacher from Brent. “Today’s children are in general much more closely monitored than previous generations. We really do need a strong and explicit law in this regard.” 48

Parents to be fingerprinted in the UK

Up to 50 nurseries and playgroups in the United Kingdom have already signed up for a new security measure that requires parents to be fingerprinted. Up to 50 nurseries and playgroups have signed up for the new security measures, thought to be the first time parents have been targetted in this way. The new entry system requires people who collect their children to place their finger on a scanner, to make sure that only nominated individuals can get through secure entrances. Kidsunlimited, the nursery chain, will be rolling out the new technology to its 50 playgroups. Honeycomb Solutions, the security firm behind the technology, says it is an effective way to monitor who is on their premises. George Bathurst, Managing Director of Honeycomb Solutions said: “This cutting edge system will revolutionise the way we keep our children safe by ensuring that only authorised people can get into the classroom. Even when you have authorisation staff will know who you are, and when arrived. This can be monitored centrally, providing an additional layer of security. We predict that within the next five years this system will become common place across the country.”49

Nine industries that know your every move

The government agency that gathers the most personal information on millions of Americans is the Federal Bureau of Investigation. It keeps a database of over 90 million fingerprints, which can be accessed by other law enforcement agencies. It also has an extensive DNA database. The bureau’s ability to collect information expanded following the terrorist attacks of September 11, 2001. It now tracks a 231 large portion of mail, cell phone traffic and Internet activity of people it deems suspicious. Thanks to advances in technology thousands of corporations track and record your every move. Although they share some of their information about you with government agencies and other corporations, there are numerous security breaches where sensitive information about their customers is stolen. The following sectors of commercial industry have a great deal of information about you:

1. Credit rating corporations

The three credit bureaus – Equifax (EFX), Experian (EXPGY), and TransUnion – know not only your credit history, but also have the data to project your credit future. Each has files on over 200 million people. The companies collect a history of all credit use by an individual, including payment of bills, mortgages, and credit cards.

2. Cell phone service providers

Cell phone companies have come to possess a wealth of information about their customers. Covering over 90% of the American population, cell phone providers can tell who you call, when you call, how often you call certain people and what you say in your text messages. With GPS, they also now know where you are whenever you have your phone. As smartphones become the equivalent of miniature computers, cellular companies can also track personal behavior, such as use of multimedia and wireless e-commerce transactions.

3. Social media companies

Facebook has amassed an enormous amount of user information. It knows who your friends are, what you like, and what photos you are in. It also tracks which profiles you view, who you communicate with most often, companies and causes you support, your personal calendar, and personal information about your friends and family. This ominous corporation can also access the information you have deleted, including photos and status updates, from their servers.

232 4. Credit card companies

There are currently 610 million credit cards owned by U.S. consumers. In an economy dominated by credit, the amount of power held by credit card companies, such as Visa, MasterCard and American Express, should not be surprising. They know their customers’ credit scores, credit histories, what they buy, when they buy, and when they are likely to default on their payments.

5. Search engines

Every search you perform on Google goes into its database, which it uses to keep a profile of your habits and interests. The search engine also keeps track of which links you click on during your search and which advertisers you visit. Google uses your interest profile and search history to place targeted ads in your browser. Perhaps most disturbingly, Google uses its Gmail service to monitor the content of your email in order to place targeted advertising in your email account. Google even keeps records of account and credit card information for everyone who uses their “Checkout” service, tracks which videos people watch on YouTube, where people are planning to visit, and what they plan to do there. Google’s location-based map systems also allow the search company to know where people are in real time through the use of smartphones and other GPS-enabled devices.

6. Retail chains

Walmart uses data-mining services to collect and store information for all its customers in a central location. This allows it to determine the purchasing behavior of people who shop in its stores or on its website. It also optimizes inventory distribution by determining which products people are most likely to buy in the future. In August, Walmart began installing Radio Frequency Identification Devices (RFID) in their underwear and jeans, which lets them track items and customers around the store. This means they are able to determine how much time someone who buys a specific pair of pants spends in each aisle. Walmart plans to use this data to reorganize displays and further control inventory. The retail giant also sells this information to thousands of other businesses, who use consumer profiles for advertising and demographic research. 233 7. Casinos

Casinos like the Wynn Resorts are increasingly using “loyalty cards” to monitor the behavior of their patrons. The Wynn “red” cards are used in place of tokens, and allow the casino to keep track of which machines and tables each gambler visits on a regular basis, the path they take during their visits (using RFID chips), and even how often and how much they are willing to lose before giving up. When a slot machine in Wynn detects a gambler is close to his breaking point, it will issue a small payout in order to keep him spending money.

8. Banks

Large banks, such as Bank of America, Chase and Citibank, have access to customer account information, which includes savings, employer payroll deposits, and the time and date of ATM and teller visits. They track transfers made by account holders to third parties. A bank also knows your income, your salary, and your balance, moment-by-moment. Perhaps among the most confidential data a bank keeps is how often people move money in and out of accounts. Banks know how much you save each month, and often exactly how those savings are invested. Banks use this information to assess the risk of giving you a mortgage or loan, and they are legally allowed to use data-mining companies to check your website activity.

9. Life insurance companies

About 140 million households have life insurance. In order to apply for it, applicants generally must disclose their health history. This includes incidence of heart disease, height, weight, smoking habits, and often includes full records from your doctors. Perhaps more invasive, life insurers seek disclosure of hospitalization for mental illness, use of illegal drugs, and whether or not you have had to file for bankruptcy. Insurance companies use a national prescription database to determine whether or not you have ever been prescribed medication. And certain high-risk professions and hobbies usually have to be disclosed. 50

234 Conclusion

Within 10 years virtually all forms of identification will incorporate biometrics. Driver’s licenses will have biometric identification markers as mandated by law and most credit cards will also. Most retail outlets will require some form of biometric identification to get a rewards card or to make purchases. Checks and credit cards will eventually be phased out by most major retail outlets. Cash will also disappear and people who purchase goods with cash will be identified and placed on a watch list as a suspected terrorist. Yet even though the Big Brother net will get bigger and draw most people in the best way to proceed is to NOT opt into the program. Keep buying with cash and do NOT give the state, bank or any company biometric information. Refuse all DNA, facial, retinal and fingerprint scans. Life will get harder for true Patriots but we must resist and work together.

Notes

1. Steinmetz, Katy. “Ready for Your Biometric Social Security Card?” Time. 3.29.2010. www.time.com/time/nation/article/0,8599,1974927,00.html?xid=feed-yah oo-full-nation-related. 2. Saenz, Aaron. “India Launches Universal ID System with Biometrics.” 9.13.2010. http://singularityhub.com/2010/09/13/india-launches-universal-id-system- with-biometrics. 3. http://en.wikipedia.org/wiki/Resident_Identity_Card. 4. Richtel, Matt. “In Texas, 28,000 Students Test an Electronic Eye.” TexasISD. com. 11.17.2004. www.texasisd.com/artman/exec/view.cgi/25/22495. 5. “Homeland Security to test iris scanners.” USA Today. 9.13.2010 www.usa today.com/tech/news/surveillance/2010-09-13-1Airis13_ST_N.htm. 6. Saenz, Aaron. “Iris Scanning Set To Secure City in Mexico, Then the World.” 9.26.2010. http://singularityhub.com/2010/09/26/iris-scanning-set-to-secure-city-in- mexico-then-the-world-video. 7. Howard, Zach. “Law enforcement to begin iPhone iris scans amid privacy concerns.” Reuters, 7.20.2011. www.reuters.com/article/2011/07/20/us-crime-identif ication-iris-idUSTRE76J4A120110720?feedType=SS&feedName=domesticNewsrpc =22&sp=true. 8. “Log-in to Facebook with an iris scan: Eye-scanner for your PC set to go on the market in months.” Daily Mail. 5.11.2011. www.dailymail.co.uk/sciencetech/ article- 1385959/Under-look-key-PC-iris-scanner-security-device-set-market-months. html. 8b. Hastings, Rob. “Iris-scanning registration booths scaled back.” 11.15.2011. www.independent.co.uk/news/uk/home-news/irisscanning-registratio n-booths-sca led-back-6262597.html. 9. Retinography: How Retinal Scanning Works. www.discoveriesinmedicine. com/Ra-Thy/Retino graphy.html. 235 10. “Eye Prints.” TIME Magazine. 12.16.1935. www.time.com/time/printout/0,8 816,755453,00.html. 11 . Hill, Robert. “Retina Identification.” Msu.Edu. www.cse.msu.edu/~cse891/ Sect601/textbook/6.pdf. 12. http://en.wikipedia.org/wiki/Facial_recognition_system. 13. http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recogni tion.htm. 14. Herald Sun. “Nightclub goes for face-scanning security.” 4.23.2009. www.news.com.au/heraldsun/story/0,21985,25373233-2862,00.html & http://pursuit o.wordpress.com/2009/04/26/nightclub-goes-for-face-scanning-security & www.you tube.com/watch?v=c8NGjcMnXmw. 15. Yapp, Robin. “Brazilian police to use ‘Robocop-style’ glasses at World Cup.” 4.12.2011. www.telegraph.co.uk/news/worldnews/southamerica/brazil/8446088/ Brazilian-police-to-use-Robocop-style-glasses-at-World-Cup.html. 16. Steve Cain, Lonnie Smrkovski and Mindy Wilson. http://expertpages.com/ news/voiceprint_identif ication.htm. 17. Finn, Peter. “Report: Top al-Qaeda figure killed Pearl.” Washington Post. 1.20.2011. www.washingtonpost.com/wp-dyn/content/article/2011/01/19/AR201101 1907114.html. 18. Blackburn, Bradley. 1.20.2011. “Report Says Justice Not Served in Murder of , Wall Street Journal Reporter. ABC News. pp. 1–2. http://abcnews.go. com/US/report-justice-served-murder-daniel-pearl/story?id=12721909. 19. Cratty, Carol. “Photos of hands backed up Pearl slaying confession, report finds.” CNN. 1.20.2011. www.cnn.com/2011/WORLD/asiapcf/01/20/pakistan.dan iel.pearl.execution. 20. Ackerman, Spencer. “Qaeda Killer’s Veins Implicate Him In Journo’s Murder.” Wired. 1.20.2011. www.wired.com/dangerroom/2011/01/qaeda-killers-vein s-implicate-him-in-journos-murder. 21. Kale, Amit, Sundaresan, Aravind, Rajagopalan, A.N., Cuntoor, Naresh P., Roy-chowdhury, Amit K., Krüger, Volker. “Identification of humans using gait. 2004. www.cfar.umd.edu/~cuntoor/01323098.pdf & www.cfar.umd.edu/~kale/my proposal.pdf & www.ee.ucr.edu/~amitrc/iptrans_gait.pdf & www.metaverselab.org/ pub/paper2/hmmjrnl.pdf. 22. www.thomasnet.com/products/identification-systems-biometric-95992699-1. html. 23. www.l1id.com/pages/17-biometrics. 24. www.l1id.com/pages/46-mobile-id-for-law-enforcement. 25. http://en.wikipedia.org/wiki/NSPD-51. 26. www.fas.org/irp/offdocs/nspd/nspd-59.html. 27. Chossudovsky, Michel. “‘Big Brother’ Presidential directive: ‘Biometrics for Identification and Screening to Enhance National Security’” Global Research. 6.13.2008. www.globalresearch.ca/index.php?context=va&aid=9296. 28. http://en.wikipedia.org/wiki/CODIS. 29. “The Bill Nobody Noticed: National DNA Databank.” GovTrack.us. S. 1858 – 110 Congress (2007): Newborn Screening Saves Lives Act of 2007, GovTrack.us (database of federal legislation) www.govtrack.us/congress/bill.xpd?bill=s110-1858. 30. Sullivan, Eileen. “Feds to collect DNA from every peson they arrest.” AP. Yahoo News. 4.16.2008. http://news.yahoo.com/s/ap/20080416/ap_on_go_ca_st_pe/ 236 dna_collection. & State Laws on DNA Data Banks: www.ncsl.org/programs/cj/ dnadatabanks.htm & www.dnaresource.com/documents/2008DNAExpansionLegis lation.pdf. 31. Sullivan, Eileen. “Feds to collect DNA from every person they arrest.” Yahoo News. 4.16.2008. Associated Press. http://news.yahoo.com/s/ap/20080416/ap_on_go _ca_st_pe/dna_col lection. 32. New York Times. “F.B.I. and States Vastly Expand DNA Databases.” www.nytimes.com /2009/04/19/us/19DNA.html?_r=2. 33. Boone, Rebecca. “Police say syringes will help stop drunk driving. 9.15.2009. www.policeone.com/patrol-issues/articles/1883923-Police-say-syringes-will-help-sto p-drunk-driving. 34. Stewart, Nikita. “D.C. brings HIV testing to the crowd at the DMV.” 9.30.2010. www.washington post.com/wp-dyn/content/article/2010/09/30/AR201009 3003463_pf.html. 35. Matthews, William. “New portable DNA screener to debut this summer.” NextGov.com. 2.24.2011. www.nextgov.com/nextgov/ng_20110224_1299.php?oref= topnews. 36. Aftergood, Steve. “A U.S. Biometrics Agency.” Secrecy News. 3.29.2010. ww w.fas.org/blog/secrecy/2010/03/biometrics_agency.html & www.biometrics.dod. mil. 37. McCullagh, Declan. “Housing bailout bill creates national fingerprint reg- istry.” Cnet. 3.23.2008. http://news.cnet.com/8301-13578_3-9951420-38.html. 38. Puccinelli, Mike. “Giving The Fingerprint: Home Law Raises Concern.” CBS. 3.14. 2009. http://cbs2chicago.com/local/Mike.Puccinelli.fingerprint.2.957819.html. 39. Scheeres, Julia. “No Thumbprint, No Rental Car.” Wired. 11.21.2001. www. wired.com/politics/security/news/2001/11/48552. 40. “BioPay Announces Check Guarantee Program for Grocers.” 1.26.2002. www.prweb.com/releases/2002/01/prweb32495.htm. 41. Kessler, Michelle. “Thumbs pay at some stores.” USA Today. 11.16.2003. www.usatoday.com/tech/news/techinnovations/2003-11-17-biometrics_x.htm. 42. “Mexico ‘to fingerprint all mobile phone owners’” 2.09.2009. www.telegraph. co.uk/news/worldnews/centralamericaandthecaribbean/mexico/4573514/Mexico-to- fingerprint-all-mobile-phone-users.html. 43. Young, Nicole. “Tennessee speeders could get fingerprinted.” The Tennessean. 5.16.2009. www.tennessean.com/article/20090516/NEWS03/9051603 41/Tennessee+speeders+could+get+fingerprinted. 44. Houston Chronicle. “Houston teachers next in line to be fingerprinted.” 11.06.2009. http://blogs.chron.com/schoolzone/2009/11/houston_teachers_next_in_l ine.html. 45. Saenz, Aaron. “Vending Machines Take Finger Scans Instead of Cash.” 8.24.2009. http://singularityhub.com/2009/08/24/vending-machines-take-finger-scan s-instead-of-cash. 46. Drake, Matthew. “Police to get mobile fingerprint scanners amid plans to hold random identity checks.” Daily Mail. 10.27.2009. www.dailymail.co.uk/news/article- 1080841/Police-mobile-fingerprint-scanners-amid-plans-hold-random-identity-checks .html. 47. “BIOMETRIC ID CHECK ON SCOTS SCHOOLCHILDREN AS YOUNG AS FOUR.” 12.28.2010. www.express.co.uk/posts/view/219758/Biometric-ID-check-

237 on-Scots-schoolchildren-as-young-as-fourBiometric-ID-check-on-Scots-schoolchild ren-as-young-as-four#ixzz19jJwUcix. 48. Clark, Laura. “Pupils ‘frogmarched by teachers to have fingerprints taken’ so they could eat in canteen.” 3.30.2010. www.dailymail.co.uk/news/article-1262 087/Schools-taking-fingerprints-pupils-parent s-knowing.html. 49. Khan, Urmee. “Parents to be fingerprinted by nursery schools. 10.29.2008. www.telegraph.co.uk/news/uknews/3275246/Parents-to-be-fingerprinted-by-nursery- schools.html. 50. McIntyr, Douglas. “Nine industries that know your ever move.” Daily Finance, 9.24.2010. www. dailyfinance.com/story/credit/who-is-watching-you-nine- industries-that-know-your-every-move/19629445.

InfoWarsShop.com

238

PART III

BIG BROTHER TECHNOLOGY

239

www.freeworldfilmworks.com/dvd_catalog.html

240

TEN

MARK OF THE BEAST TECHNOLOGY

We have seen the development of the mark of the Beast technology for the last 59 years. A patent for the universal product code technology was issued in 1952, and it was first used in 1974. The next generation of the mark of the Beast technology was the RFID (radio frequency ID) which was patented on 1973 and first used in the 1990s.

Universal product code

Norman Joseph Woodland and Jordin Johanson received a patent for their barcode system on October 7, 1952. The “Universal Product Code” (UPC) system was first used in Marsh’s supermarket in Troy, Ohio. The first purchase through the IBM UPC barcode scanner was made on June 26, 1974, by Clyde Dawson. The item was a 10-pack of Wrigley’s Juicy Fruit gum, and it was scanned by Sharon Buchanan at 8:01 a.m. The pack of gum and the receipt are now on display in the Smithsonian Institution. 1

Smart Card

Contact or contactless smart cards are being used in myriad ways. They can be programmed with multiple banking credentials, medical entitlements, driver’s license or public transport entitlement, loyalty programs, club memberships and much more. A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card with embedded integrated circuits. It contains a CPU and some non-volatile storage. In most cards, some of the storage is tamperproof while the rest is accessible to any application that can talk to the card. This capability makes it possible for the card to keep some secrets, such as the private keys associated with any certificates it holds. The card itself actually performs its own cryptographic operations. 2 Governments gain a significant enhancement to the provision of publicly funded services through the increased security offered by smart cards. These savings are passed onto society through a reduction in the necessary funding or enhanced public services. 2 241 Individuals gain increased security and convenience when using smart cards designed for interoperability between services. For example, consumers only need to replace one card if their wallet is lost or stolen. Additionally, the data storage available on a card could contain medical information that is critical in an emergency. Microsoft is the leader in the Smart Card industry. Like a bank or credit card, if a Windows Powered Smart Card is lost or stolen, an 800 number can be used to turn off the card and activate the issuance of a new card. Unlike a bank or credit card, however, a Windows Powered Smart Card can be produced at a branch office for quicker turnaround. 2 This Big Brother technology was invented in 1968 by German engineer Helmut Gröttrup and Jürgen Dethloff. They were given a patent in 1982, and the first mass use of the cards was as a Télécarte for payment in French pay phones in 1983. 3 Most people have a smart card or two that they use almost daily. Credit cards, rewards cards, government benefit cards, food stamp cards, medical ID cards and some driver’s license cards are smart cards. Smart cards will eventually be replaced by the implantable computer chip. Cards can be lost, stolen, destroyed and counterfeited. Even though they can be cancelled and replaced quickly the losses due to theft and fraud are in the billions of dollars each year. This problem will be solved by the implantable chip. It is only a matter of time before all financial transactions, identification will be replaced by the skin chip. The skin chip will become as commonplace as credit cards and most people will take one long before the Rapture and the Tribulation.

Radio frequency identification

A patent for a radio-frequency identification (RFID) system was issued in 1973, and put into use in the 1990s. RFID tags are used for bookstore tracking, jewelry tracking, pallet tracking, airline baggage tracking, apparel and pharmaceuticals tracking, and building access control. High-frequency tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. RFID is currently used for animal identification. Some cities require pets to be chipped, and the tags have found wide-spread use in livestock management. This technology has also found its way into people. In Japan, England and the United States they are being put in students’ clothing, backpacks and ID cards so they can be tracked at 242 school. In Ohio they are being used to keep track of inmates. Some hospitals in America are implanting patients with the chips. 4 Eventually the RFID tags will replace the UPC barcode technology. The future is a RFID chip imbedded or implanted in just about everything. Once this technology becomes universal, it will allow the Antichrist to track everything bought and sold, among other things. On the 60 Minutes broadcast of February 10, 2002, Andy Rooney said, “We need some system for permanently identifying safe people. Most of us are never going to blow anything up and there’s got to be something better than one of these photo IDs. I wouldn’t mind having something planted permanently in my arm that would identify me.” 5

RFID in use

RFID chip in driver’s license

America’s Department of Homeland Security seeks next-generation real ID, and privacy advocates are concerned. The RFID chip implanted in drivers’ licenses would allow agents to compile attendance lists at freedom rallies by reading the chips inside wallets and purses by walking through the crowd. 6

The chip that has been implanted in thousands of people and millions of pets.

Jacobs family is chipped

The Jacobs family of Boca Raton, Florida, was the first family to get chipped (implanted with a tiny RFID device, called a VeriChip, that 243 emits radio frequencies). The chip is a personal ID that also contains vital medical information. Jeff and Leslie Jacobs, along with their 14- year-old son, Derek, had the VeriChips implanted in their arms in 2002. Each chip is about the size of a grain of rice, and insertion takes about a minute under local anesthesia. 7

Students to be chipped

A Rhode Island school district has announced a pilot program to monitor student movements by means of radio frequency identification (RFID) chips implanted in their schoolbags. The Middletown School District, in partnership with MAP Information Technology Corp., has launched a pilot program to implant RFID chips into the schoolbags of 80 children at the Aquidneck School. Each chip would be programmed with a student identification number, and would be read by an external device installed in one of two school buses. The buses would also be fitted with global positioning system (GPS) devices. Parents or school officials could log onto a school web site to see whether and when specific children had entered or exited which bus, and to look up the bus’s current location as provided by the GPS device. Because the pilot program is being provided to the school district at no cost, it did not require approval from the Rhode Island ethics commission. 8

Airport employees to be chipped

In May of 2007 Congress put into motion measures that will ensure airport employees are subjected to stricter security checks. Everyone from Restaurant employees to airline mechanics could be forced to provide biometric finger and iris scans and may even face the possibility of being implanted with a microchip . Currently all airport employees must pass a police and FBI background check, however this may soon be upgraded to include credit checks, routine searches of bags and property and the use of biometric readers with the possibility of microchip implants on the table. The measures are still under Congressional discussion. Local News Channel KENS5 broadcast a report on the proposals from San Antonio airport.9

244 Tommy Thompson to be chipped

Tommy Thompson, four consecutive term governor of Wisconsin and former Secretary of Health and Human Services, wanted to be tagged with radio frequency identification for digital access to his medical records. Thompson, who joined the board of directors of Applied Digital on July 8, 2005, planned to have one of Applied Digital’s VeriChip tags injected into his arm sometime in 2005. “We are all well aware of the need to enhance information technology in healthcare,” he said in a statement. “It is my belief that VeriChip is an important and secure means of accessing medical records and other information.” VeriChip, a subsidiary of Applied Digital headquartered in Florida, estimates that almost 2,000 of its chips already have been installed in humans for healthcare or security purposes, with up to 50 of those being in America. The company manufactures passive RFID tags which store a unique 16-digit identification number that provides access to a user’s healthcare records. The tags are about the size of a grain of rice and in human users are injected into the fatty tissue of the tricep muscle. Thompson went on to suggest that military personnel should have RFID tags as well to replace dog tags. 10 We do not know if he was chipped. It most likely was a publicity stunt.

Homeless to be chipped

The U.S. Department of Health and Human Services said in 2004 that it was about to begin testing a new technology designed to monitor and assist the nation’s homeless population. Under the pilot program homeless people in participating cities will be implanted with mandatory Radio Frequency Identification (RFID) tags that social workers and police can use track their movements. The RFID technology was developed by HHS’ Health Resources and Services Administration (HRSA) in partnership with five states, including California and New York. “This is a rare opportunity to use advanced technology to meet society's dual objectives of better serving our homeless population while making our cities safer,” said HRSA Administrator Betty James Duke. She called the RFID tagging pilot

245 program “a high-tech, minimally-intrusive way for the government to lift our citizens away from the twin perils of poverty and crime.” The miniscule RFID tags are no larger than a matchstick and will be implanted under the skin. Data from tracking stations mounted on telephone poles will be transmitted to police and social service workers, who will use custom Windows NT software to track movements of the homeless in real time. In what has become a chronic social problem, people living in shelters and on the streets do not seek adequate medical care and frequently contribute to the rising crime rate. Participating states will receive grants of $14 million to $58 million from the federal Projects for Assistance in Transition from Homelessness (PATH) program, which was created under the McKinney Act. A second phase of the project, scheduled to be completed in early 2005, will wirelessly transmit live information on the locations of homeless people to handheld computers running the Windows CE operating system. 11

Mexican AG office employees are chipped

In July of 2004, Mexico’s attorney general had a RFID microchip inserted under the skin of his arm to give him access to a new crime database and also enable him to be traced if he is ever abducted. Attorney General Rafael Macedo said a number of his staff (over 160) had also been fitted with chips which will give them exclusive and secure access to a national computerized database for crime investigators. 12

London Bobbies are chipped

All 31,000 Metropolitan police officers in London have been “microchipped” so their movements can be monitored. The new technology, the Automated Personal Location System (APLS), replaced the unreliable Airwave radio system. 13

British prisoners to be chipped

The British government is developing a plan to track current and former prisoners by means of microchips implanted under the skin, drawing intense criticism from probation officers and civil rights groups. 14

246

Will everyone be getting a chip in the near future?

Nightclub patrons are chipped

The VIP Baja Beach Club in Barcelona, Spain, is chipping its customers. Customers who have a chip implanted do not have to show identification to enter, and all their purchases are made by scanning the chips. 15

Soldiers to be tagged

DARPA has developed technology to electronically tag US combat soldiers in a similar fashion to criminals under judicial restraint. The plan has been dubbed “Individual Force Protection System” (IFPS) and Science Applications International Corporation (SAIC) will be given the contract. According to this presentation (pdf), given last year by DARPA officials, IFPS would consist of a small, three-inch lightweight tag attached to a soldier’s uniform and a variety of vehicle-borne or portable receivers which could locate the tag even amid the busy electromagnetic spectrum of the modern battlefield. This tag does not

247 have GPS satnav in it which allows its battery to last much longer. The tracking range is 90 miles in line of sight. 16

One in four Germans wants an implanted microchip

A poll taken in 2010 found that one in four Germans would be happy to have a microchip implanted in their body if they derived concrete benefits from it. In all, 23 percent of around 1,000 respondents in the survey said they would be prepared to have a chip inserted under their skin “for certain benefits.” Around one in six (16 percent) said they would wear a chip to allow emergency services to rescue them more quickly in the event of a fire or accident. Five percent said they would be prepared to have an implant to make their shopping go more smoothly. Yet 72 percent said they would not “under any circumstances” allow electronics in their body. 17 Within a decade or two most people will accept an implanted microchip to replace all forms of ID, credit/debit cards, checks and cash.

IDF orders chips

The Israel Defense Forces (IDF) placed an order from PositiveID Corporation for the VeriChip. “We believe there are many important applications for the VeriChip and our associated intellectual property including next-generation identification and bio-sensing capabilities,” said Marc Poulshock, PositiveID’s Vice President of Business Development. “Our partner is looking to help healthcare organizations, militaries including the IDF, and governments with their disaster preparedness and emergency response needs.”18 It is possible the IDF will begin chipping its soldiers and possibly Palestinians.

Britain’s dogs to be chipped

All dogs in Britain will be fitted with microchips which contain their owner’s details, under cross party plans designed to track family pets. Owners will be forced to install the microchip (the size of a grain of rice) containing a barcode that can store their pet’s name, breed, age 248 and health along with their own address and phone number. The barcode’s details would then be stored on a national database which local councils could access in a bid to easily identify an owner’s pet. If an owner fails to insert a chip they could be fined or face the possibility of having their pet taken away. 19 How long do you think it will be before you are chipped? When the time comes to get chipped just say, “NO!”

Trash cans to be chipped

The city of Cleveland plans to have all trash and recycling cans equipped with RFID chips and bar codes The chips will allow city workers to monitor how often residents roll carts to the curb for collection. If a chip shows a recyclable cart has not been brought to the curb in weeks, a trash supervisor will sort through the trash for recyclables. Trash cans containing more than 10 percent recyclable material could lead to a $100 fine, according to Waste Collection Commissioner Ronnie Owens. Recyclables include glass, metal cans, plastic bottles, paper and cardboard. The City Council decided in 2010 to expand a pilot program that began in 2007 with 15,000 households. The expansion will continue at 25,000 households a year until nearly all of the city’s 150,000 residences are included. The chip-embedded carts are just starting to catch on elsewhere. The Washington, D.C. suburb of Alexandria, Virginia earlier this year announced it would issue carts to check whether people are recycling. Some cities in England have used the high-tech trash cans for several years to weigh how much garbage people throw out. People are charged extra for exceeding allotted limits. 20

Smart trash cans

Philadelphia is going greener by compelling its residents to recycle as much waste as possible with help from the new Smart Carts. “We’ve turned an injection-molded piece of plastic into a smart, traceable piece of plastic,” said JoAnne Perkins, general manager of Cascade Engineering in Grand Rapids, Michigan. Sensors in the garbage truck read the chip. Forks outfitted with scales weigh what’s inside. The Smart Cart automatically records the information in computers. 249 “The householder gets rewarded for the amount of recyclables that they have just put into the truck,” explained Fred Keller, CEO of Cascade Engineering. Each week Philadelphia residents can go on-line, find out how much they have recycled and collect Recycle Bank Dollars. They can get coupons for anything from groceries, gas, clothes, Starbucks, travel agencies and many more participating companies. Cities save money and trash companies track recycling operations to reduce landfill disposal and optimize truck usage. Households get discounts, and businesses get foot traffic without paying for advertising. Cascade Engineering is responsible for making the bins.21

UK trash cans are chipped

More than 2.5 million homes in the United Kingdom now have trash cans fitted with microchips to weigh their contents. Research by the Big Brother Watch campaign group showed that the use of chipped trash cans has quietly spread over the past year. In March 2009, a survey based on Freedom of Information inquiries showed there were 42 councils which used trash cans with microchips. But the latest check requests, put the number of authorities with electronic bins at 68 – one in five of all those that collect household rubbish. The latest count is 2,629,052 homes now have chipped trash cans.22

Smart shopping carts

In a few years’ time, shoppers will be able to simply walk past a check-out which will automatically recognize the goods and debit their account. The technology to do this already exists – it is called RFID (radio frequency identification). Instead of having to be passed in front of a scanner as products with the UPC do, tiny transponders send out radio signals. Each tag is unique so every item in a store can be identified by receiver. As shoppers pass through a checkout stand the receiver will read each RFID signal, add the total and deduct it from the person’s bank account. Experts predict this technology will become commonplace within a decade or so. As of 2011 it is too expensive to put a RFID tag on individual products. Instead megacorps use it to track shipping pallets. 250 “RFID technology is still too expensive,” said Christian Koch, of the software company SAP, which is involved in trials of the technology at a German supermarket. “But it will come. It is only a question of when and how fast.” RFID trials have met resistance and suspicion. Wal-Mart abandoned plans to put tags on razor blades because of consumer protests. Yet in 2003 Marks and Spencer became one of the first retailers to test individual tags on men’s shirts, ties and jackets in a London store. Glover Ferguson, the chief scientist at consultants Accenture, said it best: “It is like nuclear energy, you can’t uninvent it. We’re going to have to learn to live with it. The genie is out of the bottle.” 23 All store owners will implement this technology as quickly as possible. Once in place all a store has to do is make sure receivers are not only placed at the checkout stands but also at the exists. Any thief who walks out the exit will instantly be caught.

The Matrix is coming with chips in clothing, cars, buildings, etc.

It sounds far-fetched, but it is a fact that RFID chip are being planted inside clothing and the chips can alert Big Brother to your location as you move about town. This technology is just one of many ways for objects to go online – a concept dubbed the “internet of things,” which industry insiders have shortened to IoT. When the switch from Internet Protocol version 4 (IPv4), which supports about 4.2 billion addresses, is made towards IPv6, which will support some 340 trillion trillion trillion addresses, trillions of objects will be able to be tracked on the Internet. IoT advocates claim that overall interconnectivity would allow us to locate and monitor everything, everywhere and at any time. “Imagine a smart building where a manager can know how many people are inside just by which rooms are reflecting motion – for instance, via motion- sensitive lights,” said Constantine Valhouli from the Hammersmith Group, a strategy consulting firm. “This could help save lives in an emergency.” “A typical city of the future in a full IoT situation could be a matrix- like place with smart cameras everywhere, detectors and non-invasive neurosensors scanning your brain for over-activity in every street,” said Rob van Kranenburg, a member of the European Commission’s IoT expert group.

251 The RFID chips can be activated by radio waves. When a chip is hit by a specific radio wave sent from a reader/transmitter the RFID chip sends a signal back. The signal has a numeric code which allows the reader to identify the chip using the Internet as a data base. All a hacker needs to know is what radio frequency triggers the chip to reply and he can know who the object belongs to. A classic example of how this technology works is the Soviet’s “The Thing” or “Great Seal Bug” scam. During the Cold War the Soviets presented a US ambassador with a wooden carving of the Great Seal that had a proto-RFID bug in it. “The Thing” was a passive cavity resonator, which became active only when a radio signal of the correct frequency was sent to the device from an external transmitter. Sound waves caused the membrane to vibrate, which varied the capacitance "seen" by the antenna, that in turn modulated the radio waves that struck and were retransmitted by “The Thing.” The Soviets eavesdropped on the conversations at the ambassador’s office by beaming radio signals to it. 24 Within 20 years virtually all non-consummable products will have RFID chips in them and there will be billions of readers scattered all over the world to track the movement of objects. Big Brother will have the ability to pick any person on the planet and within seconds determine what he is wearing, the objects in his clothing and what he is carrying, where he is traveling (walking, driving, riding in, flying in, sailing on), what he is listening to, watching, saying and even thinking! This desire to know everything about everyone is what we call the “God Complex” and that is what Big Brother has in a very bad way.

Microchipped jerseys

In 2011 the Tampa Bay Lightning hockey team introduced a replica team jersey equipped with a radio frequency chip embedded in the sleeve that season ticket holders can scan at stadium stores to receive discounts on refreshments. The promotion nearly gave the team a twofold increase in season ticket sales that year. According to Brad Lott, the team’s executive vice president of service and operations, the unique innovation – believed to be the first of its kind in the sporting world – was spurred by lagging season-long fan support in an area of the U.S. known for attracting migrants from other parts of the country. Season ticket sales skyrocketed from about 6,000 to 11,000. 252 “Initially we just wanted to give all season ticket holders a jersey,” Lott said, adding that the home team’s colors would sometimes be outnumbered by visiting teams’ jerseys. “Then that morphed into the idea of a chip.” The chip isn’t the only difference in the exclusive new jerseys – the Lightning also added a patch identifying wearers as “Season Ticket Members” and gave their most loyal fans the option to personalize the backs of their jerseys with custom names and numbers. “Fans already feel more like a part of the organization,” said Lott. “Now at home games we have our bowl filled up with about 70% Lightning jerseys.” When season ticket holders scan the quarter-sized chip embedded in their jerseys’ right sleeve, they receive a 25% discount on all concessions and 35% on all merchandise purchased at the arena. Each chip also has a unique ID, allowing the team to track who buys what, which Lott says will allow the team to analyze the most effective future deals and promotions. And Lott says there are many more bonuses to come. “We’re already hoping to roll out stored value, where fans who don’t want to bring cash to the game can just pay for things using the chip. We’re hoping to roll out a new feature each year.” Lott credits Lightning owner Jeff Vinik, a hedge-fund manager who bought the team last year, for infusing the organization with a culture of progressive innovation. 25

ZigBee

ZigBee is the name of a network similar to WiFi and Bluetooth that enables embedded sensors in objects to monitor the environment and relay the data to a data base via the Internet. The ZigBee Network, started in 1998, currently has a few hundred companies and IBM is working on a project that monitors the health of elderly people in Bolzano, Italy. Sensors embedded all over the patients’ homes, provide round-the-clock peace of mind not only for the patients but for their families too. The sensors read the levels of carbon monoxide, carbon dioxide, methane, temperature and smoke, and send the information to the caretakers’ PCs and mobile devices. To protect the patients’ personal data, IBM uses encryption, said Bharat Bedi from the firm’s lab in Hursley, UK. 253 A Spanish company Worldsensing has come up with a similar sensor-based technology. With help of a special app on a smartphone, drivers can receive data from sensors installed in parking spaces, telling them where the closest free spot is. 24, 26 In about two decades most buildings in the Western world, especially homes, will have sensors scattered throughout them giving Big Brother the ability to know exactly whatever everyone in them is doing 24-7. These buildings and homes will also be jammed with microphones and spy cams. The nightmare world of 1984 is on its way.

Cars talk to drivers

Engineers are working on technology to enable vegicles of the future to speak the driver and passengers just as though they are a member of the family. Toyota has teamed up with Salesforce.com to allow cars to chat to their drivers on a private social network. The venture, called Toyota Friend, will first work only for hybrid and electric cars. The primary purpose of the system is to alert the driver that the battery is running low and how long it will take to recharge. 24 The OnStar system in many General Motors models gives them directions and allows them to communicate with operators in case of an emergency. In the near future computers in vehicles will have the ability to speak to the passengers just as though they are a fellow passenger. The future depicted in many science fiction movies is just over the event horizon.

GPS tracking chips

Computer chips with Global Positioning Satellite (GPS) tracking technology are being marketed today:

The Xega Company has created an injectable chip, which is the size and shape of a rice kernel. It can be injected into the client’s body using a syringe. The chip sends out signals from the person’s body and one could locate and pinpoint the location of someone in distress. The chip costs about $4000 and comes with an annual fee of $2200. This may mean we won’t see any more kidnappings and persons going missing. 27

254 These human tracking chips will soon become commonplace. Most people will purchase them for the safety reasons and these GPS chips will become as indispensable as cell phones.

Putin’s dog has GPS collar

Russian Prime Minister Vladimir Putin purchased a dog collar with a computer chip that can be tracked by the Russian GLONASS and the American GPS satellite navigation systems. 28

Toddler Tag

Connect Software recently launched Toddler Tag, and Globalpoint Technologies is offering parents products that will enable them to track their children wherever they are. 29

Cell phones are GPS transmitters

Cell phone users of the future may never have to get lost or deal with the embarrassment of asking for directions. If they ever need help, police and paramedics will have no trouble tracking them down. 30 Big Brother knows exactly where you are 24-7 if you have your cell phone with you. They constantly ping cell towers letting the towers know where they are. This is why the clock in your cell phone changes the time when you cross a time zone and it is how Big Brother knows where you are. The only way to prevent this is to pull out the battery. The best way to defeat Big Brother is to not carry a cell phone. They are harmful to your health. See Book 4, Chapter 34 to learn how dangerous they are to your health.

British cars to be fitted with tracking meter

All cars in Britain will be fitted with a “big brother” satellite tracking meter to charge drivers up to 45 pence a mile for every journey taken, under radical plans to slash congestion on British roads. 31 It will only be a matter of time before Big Brother requires all vehicles, trucks, buses, motorcycles, bicycles, RVs, ATVs, planes, ships and anything that is used to transport people to have a GPS tracking device in it so he can keep track of the whereabouts of every moving object. He will also mandate everyone on Earth get a implanted chip with a GPS transponder in it. 255 Anyone caught without a chip or a GPS transponder in his vehicle will be arrested, fined and spend time in jail. He will also have a GPS transponder put in his vehicle and a chip in him. This will take place before the Rapture/Tribulation.

Digital Tattoo Interface

The 2x4-inch “Digital Tattoo Interface” cell phone is a Bluetooth device made of thin, flexible silicon and silicone. It is inserted through a small incision as a tightly rolled tube, and then it unfurls beneath the skin to align between skin and muscle. Through the same incision, two small tubes on the device are attached to an artery and a vein to allow the blood to flow to a coin-sized blood fuel cell that converts glucose and oxygen to electricity. After blood flows in from the artery to the fuel cell, it flows out again through the vein. The tattoo display communicates wirelessly to other Bluetooth devices – both in the outside world and within the same body. Although the device is always on (as long as your blood’s flowing), the display can be turned off and on by pushing a small dot on the skin. When the phone rings, for example, an individual turns the display on, and “the tattoo comes to life as a digital video of the caller,” Mielke explains. When the call ends, the tattoo disappears. The sci-fi device offers health benefits by continually monitoring for many blood disorders, alerting the person of a health problem.32 Big Brother will also develop a cell phone that will be implanted into a person’s skull just behind the ear. A section of the skull will be removed and the cell phone will replace it. It will be covered by articial skin and wired directly into the brain. A person will answer and make calls by just thinking. 256 Who knows, maybe Big Brother will develop an implantable computer that can be jacked directly into the brain allowing a person to do anything with a computer by just thinking. The computer display would be seen by the person in his mind or on the inside of virtual glasses. Imagine being able to write a book, make calls, watch television, cable, satellite, Internet programs, cruise the Internet, send emails, text messages and much more by just thinking. One problem will have to be solved concerning making calls by just thinking. Each person will have to shut off transmission of their thoughts when the other person communicates by thought. It would get a bit hard to follow with both parties communicating at the same time. Imagine how confusing it would be with a conference call.

No cash

Britain’s homeless take credit cards

Britain’s homeless community began a program in which they accept donations with the “chip and PIN” card payment system in January 2010. The hi-tech system is intended to bring those living on the high street in line with High Street retailers, who switched to the system in 2005. From the weekend, homeless people and other beggars will have to use special portable card readers in order to obtain payment from passers-by and good Samaritans. The Association for Payment Clearing Service says that the chip and PIN will deliver greater convenience and an overall better giving experience for the consumer. Credit and debit cards contain an embedded microchip and are authenticated automatically using a personal identification number (PIN). When a customer wishes to pay for goods using this system, the card is placed into a “PIN pad” terminal or a modified swipe-card reader, which accesses the chip on the card. Once the card has been verified as authentic, the customer enters a 4-digit PIN, which is submitted to the chip on the smartcard. If the two match the chip tells the terminal the PIN was correct and the transaction is complete. If the two do not match the transaction is not completed. 33 Cash will eventually be done away with and when it is eliminated the homeless beggers will have to take credit cards or scan a donor’s chip.

257 Cash to become extinct

Cash may soon go the way of Betamax, eight track tapes, pagers and public telephones. Credit cards and wallets will also likely disappear. Bankers told The Advertiser’s round table forum that cash and credit cards will be replaced by computer chips embedded in mobile phones, watches or other portable devices. “Cash will disappear as there will be other forms of carrying cash, stored value in your phone or whatever it might be. It will transfer automatically,” said Australian Central chief executive Peter Evers. “We’re very close in countries around the world. If you go in to Hong Kong or Singapore, the low-value transactions have already disappeared. You can’t go anywhere, like on public transport, without pre-purchasing a card. I think the Australian Payment Systems Board is very much on top of it and is trying to move down a path, but hasn’t publicly put things into place yet.” Savings & Loans chief executive Greg Connor said “Whereas now we have a wallet and purse, it will be a chip in your phone or your watch or something like that as your access.” 34

Discovery Bay no longer accepts cash

Beginning in May of 2011 residents of Discovery Bay will no longer have the option of paying for town services with cash. Residents will be able to use checks, credit or debit cards and money orders to pay for town services. The Discovery Bay Community Services District board voted this week to ban cash transactions for all services, including water bills and park reservations. Board members said the new policy will ensure the safety of town clerks and save the district time and money, but some say it is also a response to anonymous requests for public records the town has received. Those requesting records anonymously have been using cash to pay for the cost of copying the documents. Directors Mark Simon, Chris Steele and Kevin Graves said the new policy is not a response to these anonymous requests. The presence of cash at town offices might endanger staff by attracting thieves, the directors said, though they acknowledged that this has never happened . Former director David Piepho, who retired from the board in December, a month after the no-cash policy was introduced, said the change was designed to put an end to anonymous requests.35 258 City directors are lying. This policy of no cash is designed to track every payment made. Big Brother hates cash.

Louisiana moves to eliminate cash

Rep. Rickey Hardy introduced a bill (HB 195) to the Louisiana state legislature which prohibits secondhand merchandisers to purchase goods with cash:

A secondhand dealer shall not enter into any cash transactions in payment for the purchase of junk or used or secondhand property. Payment shall be made in the form of check, electronic transfers, or money order issued to the seller of the junk or used or secondhand property and made payable to the name and address of the seller. All payments made by check, electronic transfers, or money order shall be reported separately in the daily reports required by R.S. 37:1866.

The dealer also has to record the seller’s name, address, driver’s license number and the license plate number of the vehicle in which the goods were delivered along with a detailed description of everything they bought. The dealer is required to then e-mail all of that information to the local police daily. If the seller refuses to provide the proper information the dealer cannot complete the transaction. 36 A few of the more important items in this Big Brother bill are:

If you sell more than one item per month, you are considered a “second hand dealer.” “CB Radios,” “diamonds” and “cassettes” are specifically mentioned in the bill as examples of items that need to be regulated. “Junk” is defined as stuff commonly known as “junk.” Sale of car parts is regulated, but it exempts people who are “engaged in the business of buying, selling, trading in, or otherwise acquiring or disposing of motor vehicles and used parts of motor vehicles, and shall not apply to wreckers or dismantlers of motor vehicles.” Nobody under 17 is allowed to buy or sell anything. Coin collectors, tire dealers, and “cash for gold” places are exempt. Penalties include up to a $100 fine and three months in jail. “Second hand dealers” (people who sell more than one item per month) who are not properly “licensed” and do not comply with the necessary recordkeeping can be fined $250 and/or get 60 days in jail! 259 A second offense gets you $2000 fine and 2 years of “hard time” in prison. The third offense: $10,000 and five years hard time. 37

Here are the Big Brother minions who co-sponsored this Big Brother bill:

Clifton Richardson (R-Baton Rouge) Bobby Badon (D-Carencro) Regina Barrow (D-Baton Rouge) Wesley Bishop (D-New Orleans) Thomas Carmody (R-Shreveport) Franklin Foil (R-Baton Rouge) Reed Henderson (D-Chalmette) Kay Katz (R-Monroe) J. Rogers Pope (R-Denham Springs) Stephen Pugh (R-Pontchatoula) Alan Seabaugh (R-Shreveport) Major Thibaut (D-New Roads) Thomas Wilmott (R-Kenner) Sen. Dale Erdey (R-Livingston)

The bill sailed through the house and denate with just one vote against it in the senate. Gov. Bobby Jindal signed the bill on July 1, 2011. 36 Big Brother will outlaw all sales and purchases with cash. Within 20 years or so the only things people will be able to purchase with cash will be from vending machines and eventually that will be eliminated. The use of cash will be virtually eliminated before the Rapture.

Conclusion

A world-wide mark of the Beast technological infrastructure will be in place and in use before the Rapture/Tribulation. It is technically impossible for a worldwide economic system using implanted computer chips or whatever the “mark” of the Beast will be in just 3½ years (the amount of time between the start of the Tribulation and the time the Antichrist issues his “mark”). In time virtually everyone on Earth will be using RFID and GPS technology. Yet, if a person uses this technology before the mid-point of the Tribulation, he will not have taken the “mark” of the Beast. It is only after the Antichrist demands that everyone worship him and take 260 his “mark” that people will be forced to make a decision. Those who refuse to worship the Antichrist and take his “mark” will be hunted down and executed (Revelation 13.15). Those who worship him and take his “mark” will condemn themselves to eternal punishment in the Lake of Fire (Revelation 14.9-11).

Notes

Photo credit of mark of the beast – www.sl-webs.com/deesillustration/artwork .asp ?item=329&cat=politics. Photo credit of chip in hand - http://en.wikipedia.org/wiki/RFID. 1. http://en.wikipedia.org/wiki/Universal_Product_Code. 2. http://technet.microsoft.com/en-us/library/dd277362.aspx. 3. http://en.wikipedia.org/wiki/Smart_card. 4. http://en.wikipedia.org/wiki/RFID. 5. www.youtube.com/watch?v=WDW4CAAbvA4. 6. Unruh, Bob. “Radio chip coming soon to your driver’s license?” WorldNet Daily. 2.28.2009. www.worldnetdaily.com/index.php?pageId=90008. 7. Collins, Dan. “Fla. Family Takes Computer Chip Trip.” CBS News. 5.10.2002. www.cbsnews.com/stories/2002/05/10/tech/main508641.shtml. 8. Gutierrez, David. “U.S. School District to Begin Microchipping Students.” Natural News. 6.16.2008. www.naturalnews.com/023445.html. 9. http://rfid.worldwidewarning.net/www/archives/81 & www.youtube.com/wat ch?v=Keo2TR1Zouw&eurl=http%3A%2F%2Finfowars.net%2Farticles%2Fmay2007 %2F190507Microchipping.htm. 10. Chappell, Les. “Tommy Thompson to get RFID implant.” 7.28.2005. http:// wistechnology.com/articles/2044. 11. UPI. “Forced Injected Microchips For Homeless.” LPJ. 4.06.2004. http://pitts burgh.indymedia.org/news/2004/04/13377.php & VeriChip Corporation Technology That Cares™ Miniaturized, Implantable Identification Technology – www.adsx.com/ prodservpart/verichip.html. 12. Weissert, Will. “Mexican attorney general personally goes high-tech for security.” AP. 7.14.2004. www.usatoday.com/tech/news/2004-07-14-mex-security-im plant_x.htm. 13. Daily Mail. “Met Police officers to be ‘microchipped’ by top brass in Big Brother style tracking scheme.” 4.10.2008. www.dailymail.co.uk/pages/live/articles/ news/news.html?in_article_id=558597&in_ page_id=1770. 14. Natural News. “U.K. to Begin Microchipping Prisoners.” 6.21.2008. www.nat uralnews.com/023481.html. 15. “Barcelona clubbers get chipped.” 9.29.2004. http://news.bbc.co.uk/2/hi/tech nology/3697940.stm. 16. DARPA plans soldier-tagging system for US troops, theregister, 7.18.2008, Lewis Page www.theregister.co.uk/2008/07/18/darpa_soldier_tagging & http://pro ceedings.ndia.org/7040/11%20IFPS %20by%20Marshall.pdf.

261 17. Agence France-Presse, france24. “One in four Germans wants microchip under skin: poll.” 3.01.2010. www.france24.com/en/20100301-one-four-germans- wants-microchip-under-skin-poll. 18. PositiveID Corporation Receives VeriChip Order for Use With Israeli Military.” 10.11.2011. www.marketwatch.com/story/positiveid-corporation-receives- verichip-order-for-use-with-israeli-military-2011-10-11. 19. London Telegraph “All dogs to be microchipped with owner’s details to ‘help track pets.’” 9.28.2009. www.telegraph.co.uk/news/uknews/6237084/All-dogs-to-be- microchipped-with-owners-details-to-help-track-pets.html. 20. Gillispie, Mark. “High-tech carts will tell on Cleveland residents who don’t recycle ... and they face $100 fine.” 8.20.2010. The Plain Dealer. http://blog. cleveland.com/metro/2010/08/city_of_cleveland_to_ use_high-.html. 21. Science Daily. “Smart Trash Cans.” 10.01.2006. www.sciencedaily.com/vid eos/2006/1001-smart_trash_cans.htm. 22. Doughty, Steve. “Spy chips hidden in 2.5 MILLION dustbins: 60pc rise in electronic bugs as council snoopers plan pay-as-you-throw tax.” 3.05.2010. www.dailymail.co.uk/news/article-1255565/Spy-chips-hidden-2-5-million-dustbins- council-snoopers-plan-pay-throw-tax.html. 23. Hermida, Alfred. “Get ready for the smart shopping basket.” 10.27.2003. http://news.bbc.co.uk/2/hi/technology/3211373.stm. 24. Moskvitch, Katia. “Internet of things: Should you worry if your jeans go smart?” BBC News. 9.22.2011. www.bbc.co.uk/news/business-15004063. 25. Laird, Sam. “How Microchipped Jerseys Are Changing Hockey Fans’ Experience.” Mashable Business. 12.02.2011. http://mashable.com/2011/12/02/micro chip-nhl-jersey. 26. http://en.wikipedia.org/wiki/ZigBee 27. Impact Lab. “Human tracking chip created by Xega.” 8.23.2008. www.impact lab.com/2008/08/23/human-tracking-chip-created-by-xega. 28. Russia Today. “Putin dog’s nephew gets first sat nav collar.” 9.11.2008. www.russia.today.com/scitech/news/30254. 29. Times On Line. “Would an implanted chip help to keep my child safe?” 5.17.2007. http://women.timesonline.co.uk/tol/life_and_style/women/families/article 1788169.ece. 30. Glasner, Joanna. “Feds OK Cell Phone Tracking.” Wired. 9.16.1999. www. wired.com/techbiz/media/news/1999/09/2178. 31. Walters, Joanna. “Drivers face road charge by satellite.” The Observer. 2.24.2002. www.guardian.co.uk/politics/2002/feb/24/uk.environment . 32. Zyga, Lisa. “The tattoo display is still just a concept, with no word on plans for commercialization. Electronic tattoo display runs on blood.” February 21, 2008. www.physorg.com/news122819670.html. 33. “Homeless prepare for switchover to chip & pin.” 1.18.2010. www.newsbis cuit.com/2010/01/18/homeless-prepare-for-switchover-to-chip-pin. 34. Keane, Anthony. “Cash to become extinct as chips take off.” Sydney Advertiser. 6.15.2009. www.news.com.au/technology/story/0,28348,25637102-50142 39,00.html. 35. Dreier, Hannah. “Cash no longer king in Discovery Bay.” 1.19.2011. www. contracostatimes.com/ bay-area-news/ci_17143670?nclick_check=1.

262 36. www.mygov365.com/legislation/view/id/4db66f7549e51bd334be0300/tab/ve rsions. 36. www.techdirt.com/articles/20111019/17424316421/louisiana-makes-it-illega l-to-use-cash-secondhand-sales.shtml. 36. http://bsalert.com/artsearch.php?fn=2&as=2663&dt=1. 37. http://www.legis.state.la.us/billdata/streamdocument.asp?did=760886.

RadioLiberty.com

263

264

ELEVEN

BIG BROTHER TECHNOLOGY

Big Brother has untold technologies some of which we have documented in this book. This chapter deals with some miscellaneous technologies that are being implemented and some that will find their way into the public arena within the next decade or two.

Smart meters

A smart meter is usually an electrical meter that records consumption of electric energy in intervals of an hour or less and communicates that information at least daily back to the utility for monitoring and billing purposes. Smart meters enable two-way communication between the meter and the central system. Unlike home energy monitors, smart meters can gather data for remote reporting. 1 But now there are growing numbers of activists who are protesting against Smart Meters for another reason. They contend that the radio frequency (RF) Smart Meters emit is harmful to human health. People living with the meters are claiming mild to severe symptoms that are all over the board: Concentration and memory problems, dizziness, tinnitus, heart palpitations, headaches, sleep disruptions, nausea, anxiety and behavioral problems in children. People are especially concerned about certain groups who are vulnerable to Smart Meter health risks, such as children (who absorb radiation at a greater rate than adults), electrosensitive people, people with pacemakers, and chronically ill people whose immune systems are compromised. 2 The smart meter is just one more scam of Big Brother to get total control over you. Imagine in the future Big Brother says everyone has to conserve energy. He will be able to set your thermostat and you will not be able to change it. If you live in an area that gets real cold in the winter and hot in the summer you could find yourself freezing to death or being baked alive or both. The smart meters are also capable of monitoring your Internet surfing and what you watch on cable or satellite television.

265 Wrist computer

In 1998 Seiko marketed the Ruputer, a computer in a (fairly large) wristwatch. It was a flop. In 2001 IBM developed and publicly displayed two prototypes for a wristwatch computer running Linux. IBM is still working on it and thinks it might cost about $250. In 2002 Fossil, Inc. announced the Fossil Wrist PDA, which ran the Palm OS. It finally made it to market in January of 2005. The Timex Datalink, Hitachi’s Poma and Eurotech’s ZYPAD wrist computers available to the public. The latter comes with GPS, Wi-Fi and Bluetooth connectivity. Wrist computers will not become big sellers until they can be shrunk to the size of a normal wristwatch and have a holographic screen, GPS, Wi-Fi and Bluetooth connection. Eventually people will wear two or more computers that will work together performing specific tasks. One might wear a computer on his wrist, belt buckle, glasses, wallet, and in the heels of his shoes. Women will have one or more in their purse. Everything will work hands-free by voice or by thought commands.

Dick Tracy style wrist phone

The W “phonewatch” from Kempler & Strauss combines a touchscreen interface with basic phone functionality so you can use the device while doing most anything. The GSM phone works with both AT&T and T-Mobile but it does not yet have 3G or Wi-Fi capability. Just open the back and pop in a SIM card there to get started. It has a microphone and a speaker, but the company recommends that the phone be paired with a Bluetooth headset. It is intended to be a companion for your iPhone, Droid or BlackBerry. The watch-phone idea is not a new product. Last year, LG’s watch phone was a surprise hit at the Consumer Electronics Show. LG showed a slim watch with a touchscreen phone, camera, 3G and Bluetooth capability. Worn on the wrist, it looks like an ordinary watch displaying the time but when a call comes in, the screen changes. Raise your hand a little closer to your mouth, press a button and you can talk into the watch. That device never made it to the United States, though it eventually went on sale in Europe for around $1,500. The W phonewatch works similarly. It has a digital clock but a single touch pulls up a basic menu that includes icons for phone,

266 messages, address book and calendar. The device even has a 1.4- megapixel camera that can do both still photos and videos. 3 Big Brother can remotely turn on the microphone in any cell phone or landline phone. He can also turn on any cell phone with Internet connection and video capabilities and watch you. Once the phonewatch has Internet connection Big Brother will have the ability to watch you 24/7. If you have a cell phone with video and Internet capabilities Big Brother can watch you now. Disable your Internet connection except when you are cruising the Net. The end game of Big Brother for surveillance of individuals is getting close. It will still be some time before most people have watch phones and cell phones with Internet connection. Yet in time most will be connected to Big Brother’s Internet most of their waking hours. Big Brother has even scarier technology up his sleeves. Within 10 years an implantable cell phone will become the rage of the geek world. Once people take implants Big Brother will have the ability to implant thoughts 24-7. Any implant can be equipped with an accessory that will allow Big Brother to transmit a thought, command or idea directly into the implant which will relay it directly into the brain. He will be able to brainwash people much more easily. Reject implants!

EyeTap

An EyeTap 4-5 is a camera that records what a person sees and at the same time is a heads-up display that can project data. 6-7 EyeTap 8 is also the name of an organization founded by inventor Steve Mann 9-10 to develop and promote EyeTap-related technologies such as wearable computing.11-12 Imagine Big Brother requiring everyone on the planet to wear EyeTap glasses so he can watch everything you see in real time. Look for this technology to become mandatory for parolees, sex offenders, felons, political dissidents, Christians and eventually everyone.

Teenager moves video icon with his mind

A 14-year-old who suffers from epilepsy, is the first teenager to play a two-dimensional video game (Space Invaders) using only the signals from his brain to make movements. Eric C. Leuthardt, M.D., an assistant professor of neurological surgery at the Washington University in St. Louis School of Medicine, 267 and Daniel Moran, Ph.D., assistant professor of biomedical engineering, performed their research on the boy who had the grids implanted so that neurologists and neurosurgeons can find the area in the brain serving as the focus for an epileptic seizure, with hopes of removing it to avoid future seizures. With approval of the patient and his parents and the School of Medicine Institutional Review Board, they asked the boy to do various motor and speech tasks, moving his hands various ways, talking, and imagining. The team could see from the data which parts of the brain and what brain signals correlate to these movements. They then asked the boy to play a simple, two- dimensional Space Invaders game by actually moving his tongue and hand. He was then asked to imagine the same movements, but not to actually perform them with his hands or tongue. When he saw the cursor in the video game, he then controlled it with his brain. “He cleared out the whole level one basically on brain control,” said Leuthardt. “He learned almost instantaneously. We then gave him a more challenging version in two-dimensions and he mastered two levels there playing only with his imagination.” 13 In the distant future Big Brother may develop the technology to enable machines to control what a person thinks. This technology of a man’s mind controlling a machine could be reversed giving Big Brother a terrifying power. When that day comes Big Brother could force everyone to take a special computer chip implant that would allow him to remotely control what a person thinks and does. Could the “mark of the beast” be a chip implant with this ability?

Drive Your car with your brain

Researchers in Germany are working on technology that will allow drivers to operate their vehicles using only their minds. They have conducted an experiment with drivers in a car simulator, and report in the July 2011 issue of the Journal of Neural Engineering that they were able to identify brain waves that corresponded to a driver’s wish to press the brake pedal. They tried the experiment with 18 test subjects, each of whom wore a cap wired with EEG sensors. If the drivers wanted to slam on the brakes, the car did it a crucial fraction of a second more quickly than they could. “Waiting for the driver’s response can lead to a slow response in emergency situations,” wrote Stefan Haufe of the Berlin Institute of Technology. "Therefore, in order to obtain a faster confirmation, our 268 study suggests that it is feasible to detect a driver’s intention to brake, which naturally precedes any observable actions.” They In 2008, in an experiment at the University of Pittsburgh, a monkey was able to use brain waves to command a robot arm to lift food to its mouth. Toyota may back an experiment by a Pennsylvania firm called Deeplocal, which is working on a bicycle that can shift gears based on EEG signals received through the cyclist’s helmet. 14-15

Computers to be controlled by your mind

Apple, Google and Microsoft are already investigating voice-and motion controlled gadgets, but IBM is predicting mind-controlled computers will be on the market by 2016. “Mind-reading has been wishful thinking for science fiction fans for decades, but their wish may soon come true,” said an IBM spokesman. The company is investigating smartphone and PC technology where, “You would just need to think about calling someone, and it happens.” The prediction was part of IBM’s annual “Five in Five” report. The company also predicted that by 2016, passwords would have disappeared. Instead, the complex, hard-to-remember strings of numbers and letters will be replaced by biometric readers that “work out” who you are by reading unique things about you.

Mattel’s Mindflex game 269 Primitive mind-control is already used in games such as Mattel’s Mindflex, where the user wears a brainwave-reading headband and concentrates to raise and lower a ball – held mid-air by jets of air that respond to his brainwaves. Mattel unveiled a new version – Mindflex 2 – at the Consumer Electronics Show in January of 2012. It is quite possible that we may be moving a mouse by our thoughts in 2016, but if we are not fully operating a computer with our minds we will be using other high-tech methods such as controlling our computer with our eyes. Security passwords will be made obsolete within a decade or so. Computer makers such as Alienware already use “biometric” security – where laptops recognize people via biometric markers such as the shape of their face.

Marketing gadget that tracks brainwaves as you watch TV

A headband designed by San Francisco firm EmSense can sense your brainwaves as you have reactions to watching something and then record the data for researchers. The process of measuring your reaction to something is known as ‘quantitative neurometrics’ and it can be carried out as you watch a computer or television screen. The firm is launching its “in-home” research panel employing the EmBand monitoring technology in an attempt to get better feedback on emotional responses. It can also measure how much attention you are paying, or your “cognitive engagement,” by measuring brainwave activity, reported technology site Venture Beat. The firm does studies by asking respondents to voluntarily share their information.

270 This has been compared to the controversial 1971 film A Clockwork Orange, where authorities try to psychologically modify the behaviour of a teenage thug. But the big difference with EmSense is that the test subjects are volunteers. Comparisons: In the controversial 1971 film A Clockwork Orange, authorities try to psychologically modify the behaviour of a teenage thug. EmSense claims market research firms want to measure emotional responses more accurately to get better reactions to advertising, creative concepts, packaging and shopping. EmSense ships the user a kit with an EmBand wireless headset and a wireless receiver for use with his or her PC computer, directing them to a specific web page. It has 80 employees and was founded by technologists from Hewlett-Packard and the Massachusetts Institute of Technology in 2004. It has tested more than 100,000 respondents in 25 countries. 17 Eventually Big Brother will force everyone to wear the EyeTap glasses which will be equipped with the EmSense technology. He will then not only be able to watch everything you see in real time and record it for further study, he will be able to record your thoughts and examine what you were thinking when you watched certain things. This will give him god-like powers.

Predicting future actions

Researchers at the University of Western Ontario from The Centre for Brain and Mind claimed they are able to determine the action a person is planning moments before that action takes place. The findings were published in June of 2011 in the “Journal of Neuroscience.” “This is a considerable step forward in our understanding of how the human brain plans actions,” said Jason Gallivan, a Western Neuroscience PhD student, who was the first author on the paper. Over the course of the one-year study, human subjects had their brain activity scanned using functional magnetic resonance imaging (fMRI) while they performed one of three hand movements: grasping the top of an object, grasping the bottom of the object, or simply reaching out and touching the object. The team found that by using the signals from many brain regions, they could predict, better than chance, which of the actions the volunteer was merely intending to do seconds later.

271 “Neuroimaging allows us to look at how action planning unfolds within human brain areas without having to insert electrodes directly into the human brain. This is obviously far less intrusive,” explained Western Psychology professor Jody Culham, who was the paper’s senior author. Gallivan says the new findings could also have important clinical implications: “Being able to predict a human’s desired movements using brain signals takes us one step closer to using those signals to control prosthetic limbs in movement-impaired patient populations, like those who suffer from spinal cord injuries or locked-in syndrome.” This research is funded by the Canadian Institutes of Health Research (CIHR). A past recipient of the CIHR Brain Star Award, Gallivan is funded by a Natural Sciences and Engineering Research Council of Canada (NSERC) graduate scholarship. 18 Now imagine a time in the near future when Big Brother makes it mandatory for everyone on Earth to wear special glasses that allows him to watch everything you see in real time and record it for further study. Imagine these glasses are also capable of recording your thoughts allowing Big Brother to examine what you were thinking when you watched certain TV broadcasts. He wants to be ableand even predict what you plan to do a few minutes before you do it. He will have god-like powers, but he will not use them for good. Instead he will use them for evil.

Mind’s Eye

The Mind’s Eye is a video analysis research project using artificial intelligence that is funded by the Defense Advanced Research Projects Agency.19 Twelve research teams have been contracted by DARPA for the Mind’s Eye program: Carnegie Mellon University, Co57 Systems, Inc., Colorado State University, Jet Propulsion Laboratory/Caltech, Massachusetts Institute of Technology, Purdue University, SRI International, State University of New York at Buffalo, TNO (Netherlands), University of Arizona, University of California Berkeley and the University of Southern California.20 “The Mind’s Eye program seeks to develop in machines a capability that exists only in animals: visual intelligence. This program pursues the capability to learn generally applicable and generative representations of action between objects in a scene directly from 272 visual inputs, and then reason over those learned representations. A key distinction between this research and the state of the art in machine vision is that the latter has made continual progress in recognizing a wide range of objects and their properties – what might be thought of as the nouns in the description of a scene. The focus of Mind's Eye is to add the perceptual and cognitive underpinnings for recognizing and reasoning about the verbs in those scenes, enabling a more complete narrative of action in the visual experience.”21-22 The Mind’s Eye program information was posted on DARPA’s website but was pulled soon afterword. Fortunately, the information was posted on the InfoWars.com website. 3

Military is funding mind reading technology

The U.S. military is paying scientists to study ways to read people’s thoughts. The hope is that the research could someday lead to a gadget capable of translating the thoughts of soldiers who suffered brain injuries in combat or even stroke patients in hospitals. Scientists are studying brain signals in order to decipher what a person is thinking and to whom the person wants to direct the message. The $4 million Army project is a collaboration among researchers at the University of California, Irvine; Carnegie Mellon University; and the University of Maryland. Scientists use brain-wave reading technology known as electroencephalography (EEG) to measure the brain’s electrical activity through electrodes placed on the scalp. In the future, scientists hope to develop thought-recognition software that will enable a computer to speak or type out a person’s thought. “To have a person think in a free manner and then figure out what that is, we’re years away from that,” said lead researcher Michael D’Zmura, who heads UC Irvine’s cognitive sciences department. D’Zmura said such a system would require extensive training by people trying to send a message and dismisses the notion that thoughts can be forced out. “This will never be used in a way without somebody’s real, active cooperation,” he said.24 Big Brother will develop mind-reading technology and require everyone to wear a gadget that will allow him to read your mind 24-7 – it is only a matter of time. Since the Antichrist will not appear on the scene for 20 or more years, Big Brother has plenty of time to perfect this technology and hundreds of other technologies.

273 Scientists read minds with infrared

Researchers at Canada’s largest children’s rehabilitation hospital, Holland Bloorview Kids Rehabilitation Hospital, have developed a technique that can read minds. The goal of this research is to determine preferences of subjects, ultimately opening the world of choice to children who cannot speak or move. In a study published this month in the “Journal of Neural Engineering,” Bloorview scientists demonstrated the ability to decode a person’s preference for one of two drinks with 80 per cent accuracy by measuring the intensity of near-infrared light absorbed in brain tissue. “This is the first system that decodes preference naturally from spontaneous thoughts,” said Sheena Luu, the University of Toronto PhD student in biomedical engineering who led the study under the supervision of Tom Chau, Canada Research Chair in pediatric rehab engineering. Luu noted that the brain is too complex to ever allow decoding of a person’s random thoughts. “However, if we limit the context – limit the question and available answers, as we have with predicting preference – then mind-reading becomes possible,” she said. 25 The experts said man would never travel to the moon. They were wrong and so is Luu. Big Brother will have the ability to read your mind in the near future if he does not already have it. When the Antichrist rises to power most people on Earth will have brain implants or be wearing computers that will allow him to read your mind 24-7.

Northrop to make mindreader-helmet

Northrop Grumman won a Pentagon contract in 2008 to develop a mindreading hat which will allow US soldiers to identify threats. The military calls the technology Cognitive Technology Threat Warning System (CT2WS), but Northrop refers to it as HORNET (Human-aided Optical Recognition/Notification of Elusive Threats). “HORNET leverages the latest advances in real-time coupling of human brain activity with automated cognitive neural processing to provide superior target detection,” said Michael House, Northrop’s executive in charge of the program. HORNET is envisaged as a kind of mindprobe-augmented set of binoculars. As a soldier sweeps his surroundings in the hostile combat zones, “a custom helmet equipped with electro-encephalogram electrodes placed on the scalp” will be checking what his subconscious 274 mind makes of what it is seeing. The idea is that the primitive parts of the human brain can spot threats which the conscious mind will miss. When the paranoid id spots a threat, the HORNET intellect-o-specs will register this and flash up a marker on the screen, allowing the conscious mind to know what has spooked its deeper levels. The initial prototype test system costs $6.7 million.26

Intel wants to put a chip in your brain

Computer chip maker Intel wants to implant a brain-sensing chip directly into the brains of its customers to allow them to operate computers and other devices without moving a muscle. Intel believes its customers would be willing to have a chip implanted in their brains so they could operate computers without the need for a keyboard or mouse using thoughts alone. The implant could also be used to operate devices such as cell phones, TVs and DVDs. The chip is being developed at Intel’s laboratory in Pittsburgh. It would sense brain activity using technology based on Functional Magnetic Resonance Imaging (FMRI). The brain sensing chips are not yet available, but Intel research scientist Dean Pomerleau thinks they are close. Pomerleau said that with human beings and machines converging in many ways, people will want to give up the need for an interface such as a keyboard, mouse or remote control and operate the devices using their brain waves. He is convinced that some time within the next decade or so people will be “more committed” to the idea of the brain implants. Intel claims they are very close to a functional headset incorporating brain sensing technology to operate a computer. The next step is to develop the brain implant, which would be much less cumbersome for the user. Associate Professor Charles Higgins of the University of Arizona predicts hybrid computers using a combination of living tissue and technology will be available to the public within 10 to 15 years. Researchers there have successfully built a robot guided by the eyes and brain of a moth. Toyota researchers also working in this field, have developed a wheelchair controlled by brain waves. The first use of this technology will be to enable quadriplegics to do things with just their mind. 27

275 The ultimate goal of Big Brother is to have a “control chip” implanted into everyone’s brain that will give him the ability to control one’s thoughts. It will also be used to record everything a person thinks, sees, hears, says and does. Big Brother wants to be God Almighty.

Animal microchips linked to causing cancer

Identification microchips injected into the necks of cats and dogs are touted as useful in recovering lost pets, but are they safe? A new lawsuit against Merck & Co., Inc., maker of the HomeAgain pet microchip, alleges the microchip induces cancerous tumors in pets. According to the Food and Drug Administration and the British Small Animal Veterinary Association potential health risks associated with implantable microchips include “adverse tissue reaction” “swelling,” “infection,” “abscesses,” and “tumors.” 28 There is an interesting description of an ailment that befalls everyone who takes the “mark of the Beast” in the Bible:

And the first went, and poured out his bowl into the earth; and it became a noisome and grievous sore upon the men that had the mark of the beast, and that worshipped his image . (Revelation 16.2)

Is it possible that the chip the Antichrist forces everyone to take will be the cause of these sores? It may be possible, but then again it could be divine judgment on the wicked.

TV experiment

One moment they were happily munching on their dinner and watching their favorite cartoon show on television. The next moment, hundreds of children across Japan were shaking and convulsing and being rushed to hospitals. In a bizarre illustration of the medical effects that television can have on viewers, more than 700 children and adults were taken to hospitals after having been affected by flashing lights on the animated television show “Pocket Monsters” (Pokemon) which features characters created by the video game and toy maker Nintendo Company. The 1997 broadcast caused some children to vomit blood and others had seizures or lost consciousness. Victims said they got headaches or felt nauseated. Others said they felt groggy or carsick. 276 Some victims recovered within an hour, while others were put in intensive care with breathing difficulties. Most victims were children, but some adults were also affected and some spent the night in the hospital. Fortunately no one died. Producers of the cartoon say that they were stumped as to why an animation technique that has been used “hundreds of times” could cause such a widespread, violent reaction. “This may be the first case of mass suffering from photo stimulation,” said Toshio Yamauchi, a professor at Saitama Medical School and chairman of an organization called Electronic Screen Game and Seizures. As cartoon makers push the limits to find new ways to entice children to their programs, doctors and psychologists warn that this episode is a stunning reminder of how vulnerable children can be to certain contemporary television shows. The incident is likely to prompt calls here for stiffer controls on cartoons and shows for children. The scene which caused the crisis was a vaccine bomb that exploded to kill a computer virus. A bright red explosion filled the screen. Red and blue lights flash for about five seconds. “There was an explosion scene toward the end of the show,” said Takaaki Kii, a spokesman for Shogakkan Production Company, which produced the show. “But those type of scenes are seen on many animation programs.” The scene apparently combined almost simultaneously two techniques that are frequently used in cartoons. The first, called “paka- paka” in Japanese, uses different-colored lights flashing alternatively to cause a sense of tension. The second, called “flash,” emits a strong beam of light. Dr. Yamauchi said light emitted at frequencies between 10 hertz and 30 hertz, a unit of frequency meaning cycles per second, can induce seizures and that the color red is also stimulative. It is not clear whether all 700 victims have seizure disorders. So far, no evidence has emerged that any were epileptic. Because the phenomenon is so unusual, doctors in Japan and America could not immediately identify the condition, but some medical experts here have called it “optically stimulated epilepsy.” In Japan, more than 10,000 people are said to have suffered this neurological disorder, which can be easily treated with medication, according to Japanese news reports. Few cases have been reported in people over 20 years of age. “Five to 10 percent of the population is said to be susceptible to flashing lights,” Shunsuke Otawara, a professor at Okayama University Medical School, told a Japanese newspaper. 29 277 It does not matter whether or not this was a freak incident or a Big Brother experiment. One thing is certain Big Brother knows how to give children and adults seizures. It most likely was a Big Brother experiment to see how one of his technologies works in the real world. He is using this technology to brainwash the unwashed masses to submit to his tyrannical rule and he will increase his use of it to keep people in line.

Movie causes seizures and prompts warning

The Maryland-based Epilepsy Foundation advises parents of seizure-prone children to skip the movie, “Breaking Dawn” of the “Twilight” film series because it can cause a child to have a seizure. Officials at the Epilepsy Foundation issued a warning in November 2011 to their 11,000 followers on Facebook, saying people prone to certain types of seizures might want to skip the film, which had been the top-grossing movie in the country for two weeks straight. People susceptible to this sort of attack suffer from what is known as photosensitivity, a stimulus-induced seizure disorder. According to Dr. Tricia Ting, an assistant professor of neurology at University of Maryland School of Medicine, people with this disorder often do not realize they have it until they suffer a seizure. “They may have gone their whole lives without having a seizure, but in this circumstance, when presented with a flickering light, it can induce their first seizure.” “The stimulus triggers an abnormal electrical discharge in the brain,” Ting explained. “That spark can lead to an electrical storm, which is a full seizure. If people are seeing the film and they start to feel funny, they can stop that by not continuing to look at the screen. They need to block it with their hands. You really have to cover it completely.”30 A well-known instance of a photosensitive reaction happened in Japan in 1997, when nearly 700 children were hospitalized after suffering seizures while watching the Pokemon cartoon on TV. The phenomenon has also been known to occur in people playing video games. Some researchers believe that TV viewers can be placed into a trance-like state from the flicker rate of the broadcast in which they are more susceptible to suggestion. It is considered to be a form of brainwashing that the viewer is totally unaware of.

278 LifeLog

The Pentagon launched an incredibly ambitious research project designed to gather every conceivable bit of information about a person’s life, index all the information and make it searchable. The LifeLog program being developed by Defense Advanced Projects Research Agency (DARPA) which began in 2003 places everything an individual does into a giant database. This includes every e-mail sent or received, every picture taken, every Web page surfed, every phone call made, every TV show and movie watched, every magazine, newspaper and book read, every song listened to, every place visited and more. Other bits of information collected are audio- visual sensors to capture what a subject sees and says, and biomedical monitors to keep track of one’s health. This amalgamation of information will then be used to “trace the ‘threads’ of an individual’s life,” to see exactly how a relationship or events developed, according to a briefing from the DARPA. Someone with access to the database could “retrieve a specific thread of past transactions, or recall an experience from a few seconds ago or from many years earlier ... by using a search-engine interface.” Steven Aftergood, a defense analyst with the Federation of American Scientists, and other scientists are worried. The Pentagon’s Total Information Awareness database project is tracking all of an individual’s “transactional data” (all purchases, emails, web sites visited). Some computer geeks are attempting to create their own life log. Mini-computer pioneer Gordon Bell calls it a “surrogate memory.” Bell, who works for Microsoft, scans all his letters and memos, records his conversations, saves all the Web pages he has visited and e-mails he has received and puts them into an electronic storehouse that he calls “MyLifeBits.” Steve Mann of the University of Toronto professor also has created a life log. Since his teen years in the 1970s, he has worn a camera and an array of sensors to record his existence. He claims he has convinced 20 to 30 of his current and former students to do the same. It is all part of an experiment into “existential technology” and “the metaphysics of free will.” John Pike, director of defense think tank GlobalSecurity.org, said it is “hard to believe” the explanation military gave to develop LifeLog. The military claims it will help train robotic assistants. “It looks like an outgrowth of Total Information Awareness and other DARPA 279 homeland security surveillance programs,” he said in an e-mail. It most likely will be used to profile suspected terrorists, said Cory Doctorow, with the Electronic Frontier Foundation. 31

Pill to erase bad memories

A drug which can be taken in pill form appears to erase painful memories has been developed by scientists. The astonishing treatment could help sufferers of post-traumatic stress disorder and those whose lives are plagued by hurtful recurrent memories. But British experts said the breakthrough raises disturbing ethical questions about what makes us human. They also warned it could have damaging psychological consequences, preventing those who take it from learning from their mistakes. Dr. Daniel Sokol, a lecturer in medical ethics at St. George’s, University of London, said: “Removing bad memories is not like removing a wart or a mole. It will change our personal identity since who we are is linked to our memories.” In the latest study, Dr. Merel Kindt of Amsterdam University tested the drugs on 60 men and women. His team created fearful memories in volunteers by showing them pictures of spiders while giving them gentle electric shocks. The volunteers were urged to “actively remember” the images, creating a strong negative association between spiders and discomfort. The following day the volunteers were split into two groups. One was given the beta blocker and the other a placebo pill before both were shown the same spider pictures. The group given the beta blocker had a much weaker fear response than those given the placebo. In theory, it could eradicate memories of traumatic events that happened years ago. It might also help patients overcome phobias, obsessions, eating disorders and even sexual hang-ups. “Traditionally, therapists seek to teach people with such disorders strategies to build new associations and block bad memories but the problem is the memories remain and people often relapse,” said Kindt. 32 If Big Brother perfects the memory eraser drug he could use it to reprogram political dissidents, radicals, religious fanatics and anyone who opposes him. Imagine what power Big Brother will have if he perfects a memory erasing pill that can target specific memories. He could also erase a person’s memories and plant new memories. If he

280 ever gets this power he will be able to reprogram everyone to be obedient slaves.

DeesIllustration.com

Will Frankenfood feed the world?

For many people, the concept of genetically altered, high-tech crop production raises all kinds of environmental, health, safety and ethical questions. Particularly in countries with long agrarian traditions – and vocal green lobbies – the idea seems against nature. Bill Gates believes the hope for the Third World is genetically modified organisms (food). According to him, “genetically modified foods are already very much a part of our lives. A third of the corn and more than half the soybeans and cotton grown in the U.S. last year were the product of biotechnology, according to the Department of Agriculture. More than 65 million acres of genetically modified crops will be planted in the U.S. this year (2000). The genetic genie is out of the bottle.” According to Gates and most people that are in favor of GMO food we must accept it because it is already being grown in humungous quantities. Yet he says there should be “rigorous testing” in wealthy countries, but in the “developing countries desperate to feed fast-

281 growing and underfed populations, the issue is simpler and much more urgent: Do the benefits of biotech outweigh the risks?” Gates then bemoaned the rapid population growth, six billion in 2000, and by 2050 it will probably be near 9 billion. While the population is growing “cultivable land per person is declining” and it will decrease “by half over the next 50 years, according to the International Service for the Acquisition of Agri-Biotech Applications (ISAAA).” The U.N. estimates that nearly 800 million people around the world are undernourished and this is another reason GMO food is necessary. “How can biotech help?” he asked. Biotechnologists have developed GMO foods that are fortified with essential vitamins and they can “also improve farming productivity in places where food shortages are caused by crop damage attributable to pests, drought, poor soil and crop viruses, bacteria or fungi.” Another terror that frightens Gates is the damage caused by pests. The answer is GMO crops incorporating “pest-resistant genes into seeds” that “can help restore the balance.” He proclaimed proudly that “fears that genetically modified, pest-resistant crops might kill good insects as well as bad appear unfounded.” Another plus is that genetically modified, “virus-resistant crops can reduce” damage to crops by viruses. Also “drought-tolerant seeds in regions where water shortages limit the amount of land under cultivation” is essential for saving lives. A major problem in half of the world’s arable land is aluminum toxicity due to acidic soil. It can cause many staple-crop failures. Biotechnologists can modify crops with a “gene that helps neutralize aluminum toxicity.” Gates closed his commentary with this question, “Will ‘Frankenfoods’ feed the world?” His answer is, “Biotech is not a panacea, but it does promise to transform agriculture in many developing countries. If that promise is not fulfilled, the real losers will be their people, who could suffer for years to come.” 33 The argument for GMO crops is extremely weak and based solely on fear – that if GMO crops are not grown millions of people will starve to death. We do not need GMO crops to save the world. A more effective method of farming is organic farming. If all arable land on Earth were to be farmed using organic methods there would be a humungous surplus of food for every country on Earth. No one would be undernourished and no one would ever go to bed hungry. 282 It is more likely that Big Brother wants GMO crops to become the main source of food for the entire planet because people will develop serious health problems from eating GMO foods and billions of people will die from “Frankenfoods.” We know that organically grown crops are the safest, the most productive and the healthiest foods. Why does Big Brother not endorse and promote organic foods? Why does he claim organic food is no better than GMO food? The only answer is – Big Brother is trying to kill billions of people with his “Frankenfoods!” Make sure you read Book Four, Chapter 34, “Culling the Herd,” to learn more about the dangers of GMO foods and the other poisons that Big Brother is deliberately putting in food, water and vaccines to slowly kill you. GMO is just one of many “soft kill” weapons that Big Brother is using to reduce the world’s population. Also read Book Three, Chapter 31, “Georgia Guidestones,” to see that Big Brother wants to murder over 90% of the people on the planet! Remember this truth: Big Brother hates you and wants to kill you! It is only a matter of time before he murders everyone on the planet except his loyal minions who carry out his demented plans. Once he develops technology to transfer his mind into a computer in a robot he will no longer need mortal men. He will then exterminate all men, women and children on the planet except his faithful minions. Eventually those murderers will be systematically exterminated until there is only a handful of the super-gangsters left. They will turn on each other until only one is left standing. That genocidal maniac will learn that being the only man left in the universe is not fun and terminate himself. Thankfully, Big Brother and his gang of murdering, psychotic sycophants will NOT get their wish. Instead, they will be terminated before they can carry out their genocidal plan. Jesus Christ will return to Earth as He promised and He will personally execute Big Brother (Antichrist), the members of the Rothschild/Rockefeller crime family and all of their minions:

And I saw the beast, and the kings of the earth, and their armies, gathered together to make war against him that sat upon the horse, and against his army. And the beast was taken, and with him the false prophet that wrought the signs in his sight, wherewith he deceived them that had received the mark of the beast and them that worshipped his image: they two were cast alive into the lake of fire that burneth with brimstone: and the rest were killed with the sword of him that sat upon the horse, [even the sword] which came forth 283 out of his mouth: and all the birds were filled with their flesh . (Revelation 19.19-21)

Chimeras and hybrids

Big Brother scientists are working feverishly to create grotesque monsters similar to those described in H.G. Wells’ classic novel, The Island of Dr. Moreau . They have been creating monsters that have human and animal DNA (manimals), that have human and plant DNA (manplants) and that have animal and plant DNA (plantimals). This insane race to turn Earth into a chamber of horrors filled with ghoulish monsters will continue until WE THE PEOPLE say NO MORE!

Organ farms

Wait until Big Brother gets his way and cloning of people for organ transplants is legal. The “Clonus Horror” will no longer be a science- fiction fantasy. It will be reality. Watch the trailer of this horrifying nightmare movie – www.youtube.com/watch?v=h6ryWiw72pU. We will see something very similar prior to the start of the Tribulation.

284 Scientists have found they can create chimeric animals that have organs belonging to another species by injecting stem cells into the embryo of another species. The researchers injected stem cells from rats into the embryos of mice that had been genetically altered so they could not produce their own organs, creating mice that had rat organs. The researchers say the technique could allow pigs to grow human organs from patient’s stem cells for use as transplants. By using a patient's own stem cells it could help to reduce the risk of the transplanted organ being rejected while also providing a plentiful supply of donor organs. Current organ shortages mean that patients must endure long waiting lists for transplants. 34

Geep

Scientists have been breeding chimeras for over 30 years with the first successful breeding by combining the embryos of a goat and a sheep producing a geep. The first geep was successfully bred in 1978 by Dr. R.S. White of Manumbar, Australia. 35

Human chimeric embryos

In August 2003, researchers at the Shanghai Second Medical University in China reported that they had successfully fused human skin cells and dead rabbit eggs to create the first human chimeric embryos. The embryos were allowed to develop for several days in a laboratory setting, then destroyed to harvest the resulting stem cells.36

Mancow

During November 2006, UK researchers from Newcastle University and King’s College London applied to the Human Fertilisation and Embryology Authority for a three-year license to fuse human DNA with cow eggs. The proposal is to insert human DNA into a cow’s egg which has had its genetic material removed and then create an embryo by the same technique that produced Dolly the Sheep. This research was attempted in the United States several years before and failed to yield such an embryo. In April 2008 the researchers from Newcastle University reported that their research had been successful. The resulting embryos lived for 3 days and the largest grew to a size of 32

285 cells. The researchers are aiming for embryos that live for 6 days so that embryonic stem cells can be harvested. 37

Mansheep

In 2007, scientists at the University of Nevada School of Medicine created a sheep that has 15% human cells and 85% sheep cells. 8

Manimals

Scientists have created more than 150 human-animal hybrid embryos in British laboratories. The hybrids have been produced secretively over the past three years by researchers to develop embryonic stem cells which can be used to treat a range of incurable illnesses. Figures seen by the Daily Mail show that 155 ‘admixed’ embryos, containing both human and animal genetic material, have been created since the introduction of the 2008 Human Fertilisation Embryology Act. Three labs in the UK – at King’s College London, Newcastle University and Warwick University – were granted licences to carry out the research after the Act came into force. This legalized the creation of a variety of hybrids, including an animal egg fertilised by a human sperm; ‘cybrids,’ in which a human nucleus is implanted into an animal cell; and ‘chimeras,’ in which human cells are mixed with animal embryos. Some scientists are repulsed by this noting there is no need for creating embryonic stem cells because of the 80 treatments and cures which have come about from stem cells, all have come from adult stem cells – not embryonic ones. Human-animal hybrids are also created in other countries, many of which have little or no regulation. 39 British scientists will be allowed to research diseases such as Alzheimer’s and Parkinson’s using human-animal hybrid embryos, after the House of Commons rejected a ban recently. Advocates of human-animal embryo research say that scientists need every available means possible to research devastating diseases. Critics, on the other hand, say that scientists are promoting a frightening and irreversible future. The main kinds of mixed embryo permitted by the Bill are “cytoplasmic hybrids” or “cybrids”, which are made by moving a 286 human nucleus into an empty animal egg. These are genetically 99.9 per cent human. It allows true hybrids, chimeras that combine human and animal cells, and transgenic human embryos that include animal DNA. Edward Leigh, British Member of Parliament for Gainsborough, who supported the amendment to ban all human-animal embryos, said that mingling animal and human DNA crossed an “ultimate boundary”. He says exaggerated claims give patients false hope while the dangers of the research are not being considered. “In many ways we are like children playing with landmines without any concept of the dangers of the technology we are handling,” Leigh said. At this point, it is legal to culture admixed embryos up to 14 days, but illegal to transfer them to a human or animal womb. But many scientists around the globe want permission to keep embryos alive longer, perhaps even to full term through implantation. Cornell scientists Nikica Zaninovic, who helped create the worlds first genetically modified human embryo says that in order to be sure that a new gene had been inserted and the embryo had been genetically modified, scientists would ideally want to keep growing the embryo and carry out further tests. But ethicists worry that by approving human-animal embryos, lawmakers are opening the door to a future of “enhanced” or “mutant” humans that have animal traits. It is even thought possible to so drastically alter human genomes that a type of superhuman species could emerge. In theory, the bio-fusion options are limitless. Any gene that exists in another species could be brought over to a human cell. Imagine some of the incredible traits of the animal kingdom that some humans don’t possess such as night vision, amazing agility, or the ability to breath underwater. The precedence for these types of radical changes is already in place. Experimental mice, for example, were successfully given the human ability to see in color. If animals can be engineered to have human traits, then humans can certainly be mutated to have “desirable” animal traits. The fear with germline engineering is that since it is inheritable, offspring and all succeeding generations would carry the modified traits. This is one reason why this type of engineering is currently banned – it could lead to irreversible alteration of the entire human species! 287 Ethics, not scientific limitations, is the real brick wall at this point. Most scientists believe manipulating genes in order to make an individual healthy is a noble and worthwhile pursuit. But some are against even that notion, arguing that historically amazing individuals have sometimes been plagued by genetic mental and physical disorders, which inadvertently shaped the greatness of their lives. Should we rob the human race of character shaping frailty? Very few scientists would dare to publicly endorse the idea of using genetic engineering to make a normal, healthy individuals somehow superior to the rest of the human race. Athletes, on the other hand, might feel differently. In theory, the single most effective way to radically alter your physical capacities is to manipulate your genes. Authorities are already worried that “genetic doping” will become widespread in the world of athletic competition. Now that we’ve mapped out the human genome and identified exactly which genes make you buff, tough and rough – experts say it’s only a matter of time. Gene doping could spawn athletes capable of out-running, out- jumping and out-cycling even the world’s greatest champions. However, researchers are attempting to prevent that from happening by detecting the first cases of gene doping in professional athletes before the practice becomes mainstream. “WADA has had a research program in place for some years now, to try to develop tests for gene-based doping,” said Theodore Friedmann, M.D., head of the agency’s panel on genetic doping and director of the gene therapy program at the University of California, San Diego. But if the past history of traditional steroid doping is any indication of the future, some people – including athletes, doctors, and scientists – will likely break the rules. 40 Big Brother’s goal for the unwashed masses is to make them a manimal hybrid creature. The minions of Big Brother want two distinct races – the race of mankind (the NWO Gangsters) and the race of manimals (the unwashed masses). This goal would not be realized for several hundred years if they get their way, but it is part of their end game. We must conclude that the NWO Gangsters believe they are superior to the unwashed masses and are or should be a separate race. Since this is ludicrous they seek to make it true through their genetic experiments. If the NWO Gangsters were to get their way several hundreds years hence they would devolve into a hideous race similar to that of the 288 Morlocks in H.G. Wells’ book, The Time Machine . They want to evolve into a super race, but if left to themselves they would devolve into a horrific cannibalistic race of genocidal maniacs. Sorry, they are that already they just do not look like the Morlocks right now. Many conspiriologists are convinced the NWO Gangsters are cannibals who regularly feed on human flesh and drink human blood. The proof is out there!

A Morlock and an Eloi (Yvette Mimieux) 41 289

The NWO Gangsters believe they will all be tall, beautiful, healthy people (second from right) while the unwashed masses will be short, ugly and sickly (far right). They imagine themselves as being gods to the unwashed masses who will worship them. This will never happen. Instead, they will all be executed when Jesus Christ returns and be cast into Hell! Their dream of godhood and immortality will be terminated by the Creator of the universe. [ Authors’ note : Evolution is a practical joke of the devil.]

Offspring of glowing monkeys also glow

290 Glowing monkeys

The first genetically modified primates that can pass their modifications to their offpsring have been created by Japanese scientists. The marmosets, pictured above, express a green fluorescent protein in their skin. The gene for producing the glow was delivered to the first marmoset embryos via a modified virus. But now that modification method could become unnecessary. One male marmoset, number 666 , fathered a child that also contained the transgenes. “The birth of this transgenic marmoset baby is undoubtedly a milestone,” wrote developmental biologists Gerald Schatten and Shoukhrat Mitalipov at the Pittsburgh Development Center and Oregon Stem Cell Center, in a commentary accompanying the study in Nature. “The cumbersome and often frustrating process of making a transgenic animal from scratch need now only occur with founder animals.” Transgenic animals are a key tool in the biomedical researchers’ toolbox. They allow scientists to model the function of genes and the efficacy of treatments. Many transgenic mice lines exist, but often the small rodents are too different from humans to effectively extrapolate their responses to human beings. Primates, on the other hand, are far closer biologically to humans, but before the new technique, creating primate models had proven difficult and expensive. Now, biologists may be able to produce whole groups of marmosets that mimic humans with genetic diseases like cystic fibrosis. “Subsequent generations can be produced by natural propagation, with the eventual establishment of transgene-specific monkey colonies — a potentially invaluable resource for studying incurable human disorders, and one that may also contribute to preserving endangered primate species,” Schatten and Shoukhrat explained. Instead of using bonobos or chimps, the research team led by Erika Sasaki at the Central Institute for Experimental Animals in Japan picked the common marmoset because its “size, availability, and unique biological characteristics” make it a potentially useful animal, particularly in tough fields like neuroscience and stem cell research. The time will come when people will be able to have their body modified to glow or do something else. It will become a fad to get your body modified to look odd. 42 Big Brother will create genetically engineered monsters just as Satan did millennium ago. The devil is giving Big Brother scientists the

291 technology to create monsters. Look for myriad genetic monsters to be created in the near future.

Conclusion

Within two decades wearable computers, eyeTap and brain chip implant technology will become commonplace. The move toward cyborgdom is rushing ahead in overdrive. Big Brother wants the unwashed masses to become cyborgs so he can more easily control us. Once most people have computer implants they will be susceptible to stealth influence by Big Brother. He will be able to implant thoughts, ideas and various concepts directly into one’s brain if that person has a brain implant. He will also be able to induce people to believe things and do things through telepathic communication. He will send signals via satellite into a cyborg’s wearable computer and then redirect it directly into the brain. The best way to prevent reception of stealth influence is to not become a cyborg. Even if you refuse all cyborg technology you will still have to avoid subliminal messages which are being sent via numerous television, radio and Internet transmissions. There is no way to defeat subliminal messages other than to not watch TV or listen to radio or Internet broadcasts. Not every program has subliminal messages in them but some do. The best way to defeat the flicker rate influence is to not watch television directly. Read a book, newspaper, magazine or work on the computer while you watch television. Look for Big Brother to increase his subliminal messages and to use the flicker rate to brainwash, make sick and even kill people. Big Brother will introduce as soon as possible technology to monitor the brainwaves of everyone watching television or sitting in front of their computer without the subject wearing a headband. He wants to determine whether a person likes what he is watching or dislikes it. The likes/dislikes of everyone will be carefully recorded and software will be used to create a profile of the subject. Big Brother will have various categories ranging from “ zombie ” to “enemy of Big Brother .” The “ zombies ” are the Fox news viewers, and the radio audiences of Rush Limbaugh, Glenn Beck, Bill O’Reilly, Sean Hannity and the other neo-cons, the “ near zombies ” are the viewers of ABC, CBS, CNN, ESPN, CNBC, NBC, MSNBC and the audiences of the liberal radio talk show hosts. The “ near sane ” are those who do not listen to the neo-con and liberal propagandists but 292 accept most of Big Brother’s lies. The “ sane ” are those who reject Big Brother’s propaganda lies from the liberal loons and neo-conartists, but they do not understand Big Brother is a threat to them. “ Patriots ” are those who reject all of Big Brother’s propaganda lies and they understand Big Brother is a threat. The “ enemies of Big Brother ” are those who are actively exposing the lies of Big Brother and the danger he poses. There are ancient legends of bizarre half-breed manimals such as the minotaur (man-bull), the satyr (man-goat) and the centaur (man-horse). The Bible also describes demonic creatures that are super-centaurs with special attributes the ancients never dreamed of (Revelation 9.7-10; 17- 19). Mankind will see these demonic chimeras during the Tribulation and they will wish they never did.

Notes

1. Federal Energy Regulatory Commission Assessment of Demand Response & Advanced Metering. www.ferc.gov/legal/staff-reports/12-08-demand-response.pdf. 2. www.earthcalm.com/5582/emf-dangers-2/smart-meter-radiation-risks. 2. www.bioinitiative.org/freeaccess/report/docs/report.pdf. 3. 29. Ganapati, Priya. “$200 Watch-Phone Is a Fun, Affordable Accessory.” 1.06.2010. www.wired.com/ gadgetlab/2010/01/new-watch-phone-w. 4. “Why life as a cyborg is better.” www.dailytimes.com.pk/default.asp?page =story_19-1-2004_pg6 _4. 5. Bergstein, Brian. “Professor’s 25 years of cyborg life mirrors tech advances.” USA Today 1.13.2004. www.usatoday.com/tech/news/2004-01-12-steve-mann_x.htm 6. Bergstein, Brian. “Professor’s 25 years of cyborg life mirrors tech advances.” USA Today 1.12.2004. www.usatoday.com/tech/news/2004-01-12-steve-mann_x.htm 7. “The ultimate wearable computer.” USA Today. 6.25.2001. www.usatoday .com/tech/columnist/ccmak000.htm. 8. “Eyetap Personal Imaging Lab.” www.eyetap.org. 9. King, Brad. “Part Man, Part Film, All Mann.” 3.12.2002. www.wired.com/sci ence/discoveries/news/2002/03/50976. 10. Schechter, Bruce. “SCIENTIST AT WORK: STEVE MANN; Real-Life Cyborg Challenges Reality With Technology.” New York Times. 9.25.2001. www.nytimes .com/2001/09/25/science/scientist-at-work-steve-mann-real-life-cyborg-challenges-re ality-with-technology.html. 11. Makulowich, John. “The ultimate wearable computer.” USA Today. 6.25.2001. www.usatoday.com/tech/columnist/ccmak000.htm. 12. Shinn, Eric. “Part man, part machine- all nerd; ‘Wearable computer’ pioneer Steve Mann keeps one eye locked on the future.” 7.08.2001. http://pqasb.pqarchiver .com/thestar/access/425877971.html?Dids=425877971:425877971&FMT=ABS&FM TS=ABS:FT&type=current&date=Jul+08%2C+2001&author=Eric+Shinn&pub=Tor onto+Star&desc=Part+man%2C+part+machine-+all+nerd+%3B+'Wearable+compu ter’ +pioneer+Steve+Mann+keeps+one+eye +locked+on+the+future&pqatl=google. 293 13. Fitzpatrick, Tony. “Teenager moves video icons just by imagination.” 10.09.2006. Washington University in St. Louis News. http://news.wustl.edu/news / pages/7800.aspx. 14. Potter, Ned. “Mind Over Matter: Braking Your Car With Brain Waves.” 7.29.2011. http://abcnews.go.com/Technology/mind-control-cars-brakes-bicycle-gear s-worked-brain/story?id=14182510. 15. Waibel, Markus. “BrainDriver: A Mind Controlled Car.” Spectrum. 2.17. 2011. http://spectrum.ieee.org/automaton/robotics/robotics-software/braindriver-a-mi nd-controlled-car. 16. Waugh, Rob. “IBM predicts it will be making 'mind-controlled' PCs within five years.” Daily Mail. 12.21.2011. www.dailymail.co.uk/sciencetech/article-2077 019/IBM-predicts-making-mind-controlled-PCs-years.html. 17. “A new Clockwork Orange? The marketing gadget that tracks brainwaves as you watch TV.” www.dailymail.co.uk/sciencetech/article-1377797/EmSense-comes- EmBand-device-track-brainwaves-watch-TV.html. 18. Science Daily. “Researchers Can Predict Future Actions from Human Brain Activity.” 6.30.2011. www.sciencedaily.com/releases/2011/06/110629171228. htm. 19. Lohr, Steve. “Computers That See You and Keep Watch Over You.” New York Times. 1.01.2011. www.nytimes.com/2011/01/02/science/02see.html?_r=1&pa gewanted=all. 20. “Military contracts for visual intel system.” UPI. 1.05.2011. www.upi.com/ Business_News/Security-Industry/2011/01/05/Military-contracts-for-visual-intel-syst em/UPI-65861294229967. 21. http://en.wikipedia.org/wiki/Mind%27s_Eye_%28US_Military%29 22. www.darpa.mil/not__found.aspx?aspxerrorpath=/news/2011/MindsEyeNewsr elease.pdf. 23. www.infowars.com/darpa-kicks-off-minds-eye-program 24. “Guess what? Military funds mind-reading science.” AP. 8.15.2008. www.las vegassun.com/news/2008/aug/15/guess-what-military-funds-mind-reading-science. 25. “Scientists Read Minds With Infrared Scan: Optical Brain Imaging Decodes Preference With 80 Percent Accuracy.” ScienceDaily.2.11.2009. www.sciencedaily. com/releases/2009/02/090210092730.htm. 26. Page, Lewis. “Northrop scoops DARPA mindreader-helmet threat visor cash. Register. 6.11.2008. www.theregister.co.uk/2008/06/11/darpa_mind_hat_visor_cont ract. 27. Edward, Lin. “Intel wants a chip implant in your brain.” Physorg. 11.23.2009. www.physorg.com/news178186859.html. 28. Huff, Ethan, A. “Animal microchips linked to causing cancer.” 10.20.2010, Ethan A. Huff, www.naturalnews.com/030108_microchips_animals.html. 29. WuDunn, Sheryl. “TV Cartoon’s Flashes Send 700 Japanese Into Seizures.” Reuters, 12.18.1997. http://query.nytimes.com/gst/fullpage.html?res=9E05E6D8103 FF93BA25751C1A961958260. 30. Rosen, Jill. “Epilepsy Foundation warning shows that television, movies can reprogram brain neurology.” Baltimore Sun, 12.01.2011. http://articles.baltimoresun. com/2011-12-01/entertainment/bs-ae-breaking-dawn-seizures-20111130_1_seizures- epilepsy-foundation-epilepsy-experts. 31. Shachtman, Noah. “A Spy Machine of DARPA’s Dreams.” 5.20.2003. www.wired.com/techbiz/media/news/2003/05/58909. 294 32. Derbyshire, David. “Pill to erase bad memories: Ethical furore over drugs ‘that threaten human identity’” Daily Mail, 2.16.2009. www.dailymail.co.uk/news/article- 1145777/Pill-erase-bad-memories-Ethical-furore-drugs-threaten-human-identity.html. 33. Gates, Bill. “Will Frankenfood Feed the World?” Time. 6.19.2000. www.time .com/time/reports/v21/tech/mag_food.html. 34. Gray, Richard. “Pigs could grow human organs in stem cell breakthrough.” Daily Telegraph, 6.19.2011. www.telegraph.co.uk/science/science-news/8584443/ pigs-could-grow-human-organs-in-stem-cell-breakthrough.html. 35. http://en.wikipedia.org/wiki/Geep. 36. Mott, Maryann. “Animal-Human Hybrids Spark Controversy.” National Geographic News. 1.25.2005. http://news.nationalgeographic.com/news/2005/01/012 5_050125_chimeras.html. 37. “Cow eggs fused with human DNA (11/8/2006).” www.cloningresources. com/research/Cow_eggs_fused_with_human_DNA.asp. 38. “Iranian scientist creates sheep with half-human organs.” Press TV. 3.27.2007. www.presstv.ir/detail.aspx?id=3995§ionid=3510208 & http://edition.presstv.ir/ detail/3995.html. 38. Saletan, William. “Will Scientists Create ‘Manimals’? Human-Animal Embryos Get Approval.” Washington Post. 6.24.2007. www.washingtonpost.com/ wp-dyn/content/article/2007/06/22/AR2007062201643.html. 39. Martin, Daniel Caldwell, Simon. “150 human animal hybrids grown in UK labs: Embryos have been produced secretively for the past three years.” 7.23.2011. www.dailymail.co.uk/news/article-2017818/Embryos-involving-genes-animals-mix ed-humans-produced-secretively-past-years.html. 40. Sato, Rebecca. “Will Scientists Create ‘Manimals’? Human-Animal Embryos Get Approval.” 5.21.2008. www.guardian.co.uk/science/2008/apr/02/medicalresearc h.ethicsofscience. 41. Firth, Niall. “Human race will ‘split into two different species.’” 10.26.2007. www.dailymail.co.uk/sciencetech/article-489653/Human-race-split-different-species. html. 42. Madrigal, Alexis. “Glowing Monkeys Make More Glowing Monkeys the Old- Fashioned Way.” 5.27.2009. www.wired.com/wiredscience/2009/05/glowing-mon keys-make-more-glowing-monkeys-the-old-fashioned-way.

Midnight-Emissary.com

PrisonPlanet.TV 295

PrisonPlanet.com

296

CONCLUSION

The easiest way for Big Brother to establish a “New World Order” is to make people believe there is no movement to create one. Eric Blair (a.k.a. George Orwell) understood this and noted it in his most famous novel, 1984 :

Until they become conscious they will never rebel, and until after they have rebelled they cannot become conscious. (p. 61)

The masses never revolt of their own accord, and they never revolt merely because they are oppressed. Indeed, so long as they are not permitted to have standards of comparison they never even become aware that they are oppressed. (p. 171)

Deception is the name of the game. Blair knew that there was a group of “New World Order” conspirators, and he wrote 1984 to warn mankind about them. His book was published on June 8, 1949, and he died on January 21, 1950. Many conspiriologists believe he was murdered for writing it. Below is Party member, O’Brien, lecturing Winston Smith who wanted to be free of the Party:

“The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power, pure power. What pure power means you will understand presently. We are different from all the oligarchies of the past in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just around the corner there lay a paradise where human beings would be free and equal. We are not like that. We know that no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end . One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship . The object of persecution is persecution. The object of is torture. The object of power is power .” (Ibid., p. 217, emphasis added)

297

Eric Blair (a.k.a. George Orwell)

298 Blair tossed in some clever slogans that showed how evil Big Brother was (and still is):

WAR IS PEACE FREEDOM IS SLAVERY IGNORANCE IS STRENGTH

The conspirators have placed slogans and symbols of their conspiracy in public view. Some of these symbols are the fasci bundle of sticks; the “all-seeing eye” over the pyramid; and the pyramid. Some slogans are “Novus Ordo Seclorum” and “Annuit Coeptis .” [See Book 2, Appendix I.] 299 Toward the end of his book Blair explained the significance of the middle slogan through the antagonist, O’Brien speaking to Smith:

“Has it ever occurred to you that it is reversible? Slavery is freedom . Alone–free–the human being is always defeated. It must be so, because every human being is doomed to die, which is the greatest of all failures. But if he can make complete, utter submission, if he can escape from his identity, if he can merge himself in the Party so that he is the Party, then he is all-powerful and immortal. The second thing for you to realize is that power is the power over human beings. Over the body–but, above all, over the mind. Power over matter–external reality, as you would call it–is not important.” (Ibid., p. 218, emphasis added)

“Obedience is not enough. Unless he is suffering, how can you be sure that he is obeying your will and not his own? Power is in inflicting pain and humiliation . Power is in tearing down human minds to pieces and putting them together again in new shapes of your own choosing . Do you begin to see, then, what kind of world we are creating? It is the exact opposite of the stupid hedonistic Utopias that the old reformers imagined. A world of fear, treachery, and torment, a world of trampling and being trampled upon, a world which will grow not less but more merciless as it refines itself. Progress in our world will be progress toward more pain . The old civilizations claimed that they were founded on love and justice. Ours is founded on hatred . In our world there will be no emotions except fear, rage, triumph, and self-abasement. Everything else we shall destroy–everything.” (Ibid., p. 220, emphasis added)

O’Brien went on to explain to Smith how the Party destroys civilization:

“We have cut the links between child and parent, and between man and man, and between man and woman. No one dares trust a wife or a child or a friend any longer. But in the future there will be no wives and no friends. Children will be taken from their mothers at birth , as one takes eggs from a hen.” (Ibid., emphasis added) “There will be no loyalty, except loyalty to the Party. There will be no love, except the love of Big Brother . There will be no laughter, except the laughter of triumph over a defeated enemy. There will be no art, no literature, no science. When we are omnipotent we will 300 have no need of science . There will be no distinction between beauty and ugliness. There will be no curiosity, no employment of the process of life. All competing pleasures will be destroyed. But always – do not forget this, Winston –always there will be the intoxication of power, constantly increasing and constantly growing subtler. Always, at every moment, there will be the thrill of victory, the sensation of trampling on an enemy who is helpless. If you want a picture of this future, imagine a boot stamping on a human face–forever . “And remember that it is forever. The face will always be there to be stamped upon. The heretic, the enemy of society, will always be there, so that he can be defeated and humiliated over again. Everything that you have undergone since you have been in our hands – all that will continue, and worse. The espionage, the betrayals, the arrests, the , the executions, the disappearances will never cease. It will be a world of terror as much as a world of triumph. The more the Party is powerful, the less it will be tolerant; the weaker the opposition, the tighter the despotism. Goldstein and his heresies will live forever. Every day, at every moment, they will be defeated, discredited, ridiculed, spat upon–and yet they will always survive.” (Ibid., pp. 220-221, emphasis added)

O’Brien continued to explain that progress was only made to further the tyrannical power of the Party:

“And even technological progress only happens when its products can in some way be used for the diminution of human liberty . In all the useful arts the world is either standing still or going backwards.” (Ibid., p. 159, emphasis added)

The two major goals of the Party was conquest and the elimination of independent thought:

The two aims of the Party are to conquer the whole surface of the earth and to extinguish once and for all the possibility of independent thought . (Ibid., emphasis added)

Party members were expected to have a war-like mentality and wicked behavior was encouraged in the negative utopia that Blair depicted:

301 In other words it is necessary that he should have the mentality appropriate to a state of war. (Ibid., p. 158)

There were bribery , favoritism , and racketeering of every kind, there were homosexuality and prostitution , there was even illicit alcohol distilled from potatoes. The positions of trust were given only to the common criminals, especially the gangsters and the murderers, who formed a sort of aristocracy. All the dirty jobs were done by the politicals . There was constant come-and-go of prisoners of every description; drug peddlers, thieves, bandits, black marketers, drunks, prostitutes. (Ibid., pp. 187-188, emphasis added)

Corruption in government is as old as government itself. There have been hundreds of corrupt politicians and bureaucrats through history, including America. For a very short list of some recent criminals in government see Book Four, Appendix J. The insidious evil of Big Brother’s “New World Order” that Blair described was prophesied by Jesus and Paul:

“Then shall they deliver you up unto tribulation, and shall kill you: and ye shall be hated of all the nations for my name’s sake. And then shall many stumble, and shall deliver up one another, and shall hate one another. And many false prophets shall arise, and shall lead many astray. And because iniquity shall be multiplied, the love of the many shall wax cold. ” (Matthew 24.9-12)

“And brother shall deliver up brother to death, and the father his child; and children shall rise up against parents, and cause them to be put to death. And ye shall be hated of all men for my name’s sake: but he that endureth to the end, the same shall be saved. ” (Mark 13.12-13)

But know this, that in the last days grievous times shall come. For men shall be lovers of self, lovers of money, boastful, haughty, railers, disobedient to parents, unthankful, unholy, without natural affection, implacable, slanderers, without self-control, fierce, no lovers of good, traitors, headstrong, puffed up, lovers of pleasure rather than lovers of God; holding a form of godliness, but having denied the power therefore. From these also turn away. (2 Timothy 3.1-5)

302 Some of the things that Blair described in his book are already being implemented. Scripture says the final world empire will be very evil, like that in 1984 . It will be Satan’s last stand, and he will pull out every stop. It will be more demonic, destructive, devious, evil, hateful, hideous, insidious, oppressive, sinful, tyrannical and uglier than all the world empires before it. This demonic empire will not arise overnight. It is being built brick- by-brick over centuries. The closer we come to the culmination of this satanic conspiracy, the worse things will be for Christians and everyone who cherishes freedom. They will be persecuted, imprisoned and killed. Once the Beast Kingdom is established, the reign of terror will be far greater than all the former reigns of terror. Christians, patriots and freedom lovers will be exterminated in large numbers (Revelation 6.9-11). As we noted previously the Bible teaches us that the devil is the god of this world (2 Corinthians 4.4), the prince (ruler) of this world (John 12.31; 14.30; 16.11), the prince of the powers of the air (Ephesians 2.2) and the evil one (1 John 5.19). The devil also has a host of fallen angels and demons that serve him. Christians do not fight “ against flesh and blood, but against the “principalities, against the powers, against the world-rulers of this darkness, against the spiritual hosts of wickedness in the heavenly places (Ephesians 6.12). These immortal beings rule over the nations of the world as Daniel was told by an angel:

Then said he, Knowest thou wherefore I am come unto thee? and now will I return to fight with the prince of Persia: and when I go forth, lo, the prince of Greece shall come. (Daniel 10.20)

The “ prince of Persia ” and the “ prince of Greece ” were high- ranking fallen angels that ruled over those kingdoms. Fallen angels still rule over nations and empires today. Now that we are getting close to the start of the Tribulation when the devil and his gang of evil angels will have absolute control over the world, Christians will face much more persecution from them. Christians must prepare for the worst period of persecution in the history of the Church. We can do this by putting on the full armor of God:

Finally, be strong in the Lord, and in the strength of his might. Put on the whole armor of God, that ye may be able to stand against the wiles of the devil. For our wrestling is not against flesh and blood, 303 but against the principalities, against the powers, against the world- rulers of this darkness, against the spiritual hosts of wickedness in the heavenly places. Wherefore take up the whole armor of God, that ye may be able to withstand in the evil day, and, having done all, to stand. Stand therefore, having girded your loins with truth, and having put on the breastplate of righteousness, and having shod your feet with the preparation of the gospel of peace; withal taking up the shield of faith, wherewith ye shall be able to quench all the fiery darts of the evil one. And take the helmet of salvation, and the sword of the Spirit, which is the word of God: with all prayer and supplication praying at all seasons in the Spirit, and watching thereunto in all perseverance and supplication for all the saints. (Ephesians 6.10-18)

A Christian girds his loins with the truth by daily studying the Bible (Acts 17.11); he puts on the breastplate of righteousness by living a holy life (1 Peter 1.15-16); he shods his feet with the gospel of peace by learning how to share his faith in a gentle and reverent manner (1 Peter 3.15); he takes up the shield of faith by trusting in God in all things (Proverbs 3.5-6); he wears the helmet of salvation by trusting in the blood of Jesus to cleanse him of his sins (Ephesians 1.7; Revelation 1.5; 5.9); he takes up the sword of the Spirit by memorizing Scripture so he can quote it to defeat the enemy (Deuteronomy 8.3; Matthew 4.1- 4). He also prays without ceasing (Ephesians 6.18; 1 Thessalonians 5.17). All Christians should prepare for the time of trouble ahead by fellowshipping with the brethren as often as possible (Hebrews 10.24- 25) and by making disciples (Matthew 28.19-20; 2 Timothy 2.2). Some pastors say there is nothing Christians can do or should do to oppose the efforts of the conspirators to create a “New World Order”:

Inasmuch as the Scriptures tell us that it’s going to come, how can you stave it off? I mean, it’s part of God’s plan… I think that we need to be wise to what’s happening, but only inasmuch as we need to be preparing for the Lord to come, and rescue us from this corrupt system. The New World Order is coming. We know that, Revelation 13. It seems to be happening at an exponential rate. Like we were talking yesterday with Gordon Brown, Barak Obama’s idea of a new world economy is to globalize the economy. Basically to save everything, save jobs, to invest in that, and so it’s here, you know, and just a matter of time before the final Antichrist takes over, but 304 there are many antichrists running around now doing their bit. So what can you really do? We try to vote at the ballot box, but that seems to have not a whole lot of effect. You know it’s common. So we just need to be aware of it… Let’s be aware of what’s going on, know the signs of the times in that way we won’t be caught unaware like the Bible encourages us to be. 1 (emphasis added)

I think as Christians we would be far better served to become biblically literate, to learn to read the Bible for all it’s worth. So rather than spending endless hours in conspiracy theories let’s do what we are called to do, and that is to change the hearts of individuals through the power of the Holy Spirit. And when we do that we affect our world in the way we are empowered to affect our world. But we cannot know what is coming tomorrow or the next day. Jesus said, “Do not worry about tomorrow. You do not know what a day will bring forth.” Don’t worry about tomorrow. Each day He said has enough trouble of its own. So let’s not worry on what can happen tomorrow, we don’t know. What we know is the God we serve holds tomorrow in His hands. In the meantime we’re called to be prudent, to be faithful, to live by biblical principles and not to engage in endless conspiracy theories about what might happen based on a paradigm, by the way, that has little basis in the text of Scripture. 2

Big Brother is building his “New World Order” and it is not a “conspiracy theory;” it is a conspiracy fact! Some secular talk show hosts say there is no conspiracy to create a “New World Order,” but due to the economic crisis of 2008-2009 and the ascension of Barak Obama, some have changed their minds:

Dick Morris : There is a big thing that’s going to happen at this thing in London, the G-20, and they’re hiding it, they’re camouflaging it, they’re not talking about it. Coordination of international regulation. What they are going to do is put our Fed and FCC under control, in effect, of the IMF.

Sean Hannity : Oh, come on. You believe they’re going to do this?

Morris : That’s what is in the draft agenda . They call it coordination of regulation. What it really is, is putting the American economy under international regulation . And those

305 people who’ve been yelling, oh, the UN is going to take over, global government .

Hannity : Conspiracy theorists .

Morris : They’ve been crazy, but now they are right .

Hannity : Well, what Geithner said he would be open to the idea of a global currency last week. Those conspiracy people had said, had suggested that for years.

Morris : They’re not wrong .

Hannity : They’re not wrong .

Morris : You know, what they always do at these conferences is they have the center show is here, and the side show they want you to pay attention to. The center show is the size of the stimulus package. The real show is international regulation for financial institutions , which is going to happen under the IMF control . And remember, the IMF is run by Europeans , the World Bank by Americans. 3 (Emphasis mine)

In a separate broadcast, Michael Savage had this to say about the possibility of the government creating a crisis for its benefit:

Very soon, Obama will create a crisis along the lines of the Reichstag fire , the Reichstag fire. I don’t know what form it will take, but I believe that once the minions are seen for what they are, Rahm Immanuel and his gang will set off a Reichstag fire in this country of some kind , and they will recall the military dictatorship of Lincoln and Stanton during the Civil War, when civilian suspects were arrested without warrant. I will tell you as I sit here I fear that every night as I go to sleep. I put nothing past these agitators who have suddenly seized control of the most powerful economy and the most powerful military on Earth. 4 (Emphasis mine)

As we get closer to the formation of Satan’s “New World Order,” the Big Brother behind Big Brother, it will become obvious that the prophecies in the Bible are being fulfilled. Christians need to be prepared to use fulfilled Bible prophecies as a springboard to share the gospel. They should also stand against the satanic “New World Order.” Scripture commands Christians to rebuke the wicked (Proverbs 24.24- 306 25), keep the law to strive against the wicked (Proverbs 28.4) and expose their evil deeds (Ephesians 5.11). Most Christians in America have not shed blood in resisting sin (Hebrews 12.3-4). A Christian who is unwilling to take a stand against the wicked is like “ a troubled fountain, and a corrupted spring ” (Proverbs 25.26). You can oppose it by warning others about it. Edmund Burke (1729-1797), the famous Anglo-Irish statesmen, philosopher, author, orator and political theorist said, “The only thing that is necessary for evil to triumph is for men of good will to do nothing.” Christians are people of good will, therefore we must oppose evil, including the Big Brother and his Old World Nightmare. General George Washington (1732-1799) made this comment about the American Christian, “He will die on his feet before he will live on his knees.” Many Christians have died for Jesus Christ, and many more will die for Him as we race toward the Rapture and the start of the Tribulation. Some may even be martyred for their faith in America in the coming years as millions have throughout history in other countries. General George Smith Patton, Jr. told his soldiers to “Live for something rather than die for nothing.” Christians should live for Christ. We ask what the psalmist asked, “ Who will rise up for me against the evil-doers? Who will stand up for me against the workers of iniquity? ” (Psalm 94.16).

Notes

1. Pastor’s Perspective radio show. 3.04.2009. 2. Bible Answer Man radio show. 3.23.2009. 3. “Hannity, Morris Agree with Conspiracy People About New World Order.” www.infowars.com/hannity-morris-agree-with-conspiracy-people-about-new-world- order & www.youtube.com/watch?v=A4T XGFJv1vk. 4. “Michael Savage Reichstag fire event warning.” www.youtube.com/watch?v= 7sU5hzx5gkI&feature=PlayList&p=F6AFA631B1605A3F&playnext=1&playnext_fr om=PL&index=32.

307

DeesIllustration.com

308

AFTERWORD

As you can see from reading this book that Big Brother is very powerful and he is growing stronger every day. The Bible makes it clear that he will continue to grow in power and when the Antichrist arises on the scene Big Brother will be firmly in control of the world. During the first half of the Tribulation the Antichrist will rule the world under the control of Big Brother (the bankers, billionaires, corporations, politicians, bureaucrats, world church, semi-secret/secret societies, think-tanks). Yet at the mid-point of the seven-year Tribulation the Antichrist will be indwelt by Satan (the Big Brother behind Big Brother) and he will become world dictator with no hidden hand up his back. He will unleash war on everyone who is saved during the Tribulation and non-believers who refuse to worship him. If you have not trusted in Jesus Christ before the start of the Tribulation you will be given a choice at the mid-point to worship the Antichrist and take his “mark.” If you refuse you will be hunted down and executed. If you worship him and take his “mark” you will condemn yourself to eternal punishment in the Lake of Fire. Before that day arrives every Christian and Patriot should oppose Big Brother in whatever way one can. Below are some ways you can oppose him:

1. Trust Jesus Christ as your Savior (see Appendix A). 2. Boycott companies that are using Big Brother technologies and are part of the Big Brother network (see Appendix A). 3. Do NOT buy products from Red China. 4. Do NOT use rewards cards. 5. Do NOT buy products on line. 6. Do NOT use credit/debit cards for daily purchases. Use them only for emergencies. 7. Do NOT use checks. Use money orders instead. 8. Educate yourself about Big Brother (see Appendix A). 9. Spread the word about Big Brother (see Appendix A). 10. Be prepared for a crisis and be self-sufficient (see Appendix A). 11. Do NOT use Google search. Try www.startpage.com instead. 12. Do NOT use Badoo, Bebo, Facebook, GoogleBuzz, MySpace, Twitter, Windows Live Spaces or any social networking site. 309 The intermediate goal of Big Brother

1. Establishment of a World Government where officials are immune from prosecution for crimes. 2. No elections. Administrators are appointed by previous administrators and they are not accountable for their actions. 3. The Elimination of all private property. (Big Brother will own everything.) 4. 100% taxation of all income. (Peasants will receive stipends.) 5. Arrest and indefinite detention with no habeas corpus. 6. Elimination of trial by jury. 7. Defendants are guilty until proven not guilty. 8. No counsel for defendants. 9. No juries – only secret trials by appointed judges. 10. Elimination of double jeopardy. 11. No currency. (All transactions will be electronic.) 12. One form of identification – an implanted computer chip. 13. Total control of all food production/distribution. (No organic food, herbs or vitamins.) 14. Government owned housing for everyone. (The lowest class will live in military style barracks with bunk beds and no possessions of any kind except clothing.) 15. Use of private vehicles only by permission of Big Brother. 16. Observation of the peasants 24-7 in their dwellings, in the factories, shops, businesses, on the streets and in vehicles, buses, trains, planes and ships. 17. Record what everyone hears, sees, does and thinks. 18. Reprogram everyone who does not conform. 19. Kill off 90% of the world’s population.

Big Brother cannot be stopped but he can be slowed. He may rise to power within a decade or two, but if WE THE PEOPLE resist it may be longer. Christians are commanded to resist evil men:

As a troubled fountain, and a corrupted spring, so is a righteous man that giveth way before the wicked. (Proverbs 25.26)

The wicked flee when no man pursueth; But the righteous are bold as a lion. (Proverbs 28.1)

R. W. Keller February 2011 310

FINAL THOUGHTS

Big Brother’s minions in the propaganda industry continuously beat the drums of Democracy and Freedom. Both the liberal loons and the neo-cons say America, which is the greatest and the freest Democracy on Earth must export Democracy and Freedom around the world. The recent wars in Afghanistan and Iraq were said to have been launched to exterminate dictatorships that sought to destroy America and Democracy and bring Democracy and Freedom to those countries. “Save the world for Democracy” was the war cry of World Wars I and II by the propagandists in the Western World. Virtually all history books say the Democratic Western powers opposed Germany in World War I to keep the world safe for Democracy. The democracy of the Soviet Union was birthed during that war. The Bolshevik relolutionaries were given more than $20 million to topple Czar Nicholas II in 1917. The Rothschild and Rockefeller crime families supplied the money. Instead of birthing a democratic nation the Rothschild/Rockefellers gave birth to a Frankenstein’s monster called a Communist dictatorship under Lenin and then Stalin. During the second World War the Democratic Western nations allied with the Communist Soviet Union to save the world from the Nazis. Since then the Western Democracies fought a decades long Cold War against the Communist Soviet Union (their own Frankenstein’s monster) to keep the world safe for Democracy and Freedom. Once their pet monster ( Union of Soviet Socialist Republics) allegedly died and the Cold War ended in 1991, a new pet monster emerged which threatened the Democratic Western World. This Democratic Western World’s monster, Islamo-fascism, was spearheaded by the Islamic terrorist groups Al-Qaeda and the Taliban. The U.S. channeled funds through Pakistan’s Inter-Services Intelligence agency to the Afghan Mujahideen fighting the Soviet occupation in a CIA program called Operation Cyclone.1-2 A key leader of the Mujahideen was Gulbuddin Hekmatyar who was given over $600 million by the U.S. Corp. and untold millions more from and Pakistan. Usama bin Laden was a key figure among the Mujahideen who established training camps and recruited fighters from around the Muslim world to fight the Soviets. 3

311 When the Soviets were driven out of Afghanistan in 1989 Hekmatyar continued to work with Usama bin Laden. The CIA supported Hekmatyar’s drug trade activities by giving him immunity for his opium trafficking that financed operation of his militant faction. 4 Bin Laden eventually created Al-Qaeda during a meeting on August 11, 1988 between “several senior leaders” of Egyptian Islamic Jihad and Abdullah Azzam. They agreed to join bin Laden’s money with the expertise of the Islamic Jihad organization and take up the jihadist cause elsewhere after the Soviets withdrew from Afghanistan. 5-6 Al-Qaeda, created by the U.S. Corp. (NSA and CIA), became an international terrorist group which threatens world Democracy and Freedom, allegedly being responsible for numerous terrorist acts with its most spectacular one the September 11, 2001 attack in America. The Taliban took control of Afghanistan in 1996 with support from Saudi Arabia, Pakistan and the . They were driven out of Afghanistan in December of 2001 by the U.S. Corp., but have continued to fight U.S. Corp. forces since then, allegedly working with Al-Qaeda. Throughout the 20th century the self-proclaimed “Democracies” of the Western World have fought numerous alleged “enemies of Democracy” to make the world safe for Democracy. Yet this endless war against “Tyranny” has caused the so-called great “Democracies” to become the leading police states. Here are the self-proclaimed leading “Democracies” on Earth and their ranking:

5. USA 19. Austria 6. England/Wales 21. Greece 7. France 22. Switzerland 8. Israel 23. Japan 10. Germany 24. Norway 11. Ireland 25. Canada 13. Netherlands 27. New Zealand 14. Italy 28. Portugal 16. Australia 29. Danmark 17. Belgium 32. Sweden 18. Spain 37. Finland

As you can see of the 37 worst police states on Earth, 22 of them are the self-proclaimed “Democracies” of the Western World. Of the worst 51 police states in the world (p. 14) only one (Malaysia) is an Islamic Republic. It is ranked number 12. 312 If the pompous politicians in Washington, D.C., London, Paris, Berlin, Rome, etc. truly want to bring Freedom to the Muslim World they would not start wars against Muslim nations. Instead they would start wars with non-Muslim nations (themselves) and force each other to adopt the Muslim form of government. This may sound bizarre, but the facts are clear that the Muslim nations are not police states. They are the freest nations on Earth. What does this mean? It means that “Democracy” does not guarantee Freedom . It also means the only obstacle to Big Brother establishing his New World Order are the Muslim nations and the unwashed masses (you and us). This is why a war will be fought against the Muslim nations in the next decade or two in which they will be subjugated. Once they are out of the way the New World Order Gangsters led by the Rothschild and Rockefeller crime families will make their final push for world government. They will establish their world government, world economic system and world religion and then they will bring to power their front man, the Antichrist. Look for the current trend of removing old Muslim dictators and replacing them with radical Muslims (Muslim Brotherhood and Al- Qaeda) to continue. The war drums will beat louder and louder during the next two decades until the final battle will end the Muslim conflict with the Western World. Once that battle is over the Tribulation will begin three and a half years later or more. 7

R.W. Keller November 2011

Notes

1. “How the CIA created Osama bin Laden.” Green Left Weekly. 9.19.2001. www.greenleft.org.au/2001/465/25199. 2. “1986–1992: CIA and British Recruit and Train Militants Worldwide to Help Fight Afghan War.” Cooperative Research History Commons. www.historycommons. org/context.jsp?item=a86operationcyclone. 3. Bergen, Peter L., Holy war, Inc.: Inside the Secret World of Osama bin Laden , New York: Free Press. 2001. p.69-71 4. Interview with Alfred McCoy, November 9, 1991 by Paul DeRienzo. www.bearcave.com/bookrev/nugan_hand.html. 5. The Usama bin Laden I Know. 1. 18.2006. http://web.archive.org/web/200701 01144608/http://www.tpmcafe.com/story/2006/1/18/13810/7770. 6. Wright, Lawrence. The Looming Tower: Al-Qaeda and the Road to 9/11 . New York: Knopf. 2006. 7. Beshore, F. Kenton. When? When Will the Rapture Take Place?” Costa Mesa, California: World Bible Society. 2009. Fifth edition 2010. pp. 44-45. 313

Midnight-Emissary.com

314

GLOSSARY

Antichrist – He will be the man who is designated world dictator after the world government, economic system and religion is established. He will be placed in power by the families that rule the world – Rothschild, Rockefeller, Windsor, etc. He will do their bidding for the first three and one-half years of the seven-year Tribulation. At the mid-point of the Tribulation he will be mortally wounded and then possessed by Satan. At that time he will turn on his masters and do what Satan wants. Satan will rule the world directly with an iron fist through the body of the Antichrist for the remainder of the Tribulation.

Area 51 – is a super-secret military research base established in 1941 that builds and tests numerous advanced aircraft, spacecraft and science-fiction style weapons. The more famous warcraft tested there were/are U-2, X-15, A-12, SR-71, D-21, XB-70 Valkyrie, F-117, B-2 and Aurora. It is located in the Nevada Test and Training Range near Nellis AFB, but it is run by the Air Force Flight Test Center (AFFTC) at Edwards Air Force Base Air Force Flight Test Center (Detachment 3). (Groomlake, NV – aka Watertown)

Big Brother – is a term that Eric Blair used in his monumental book, 1984 , to refer to the massive government bureaucracy. Today Big Brother goes beyond the bureaucracy of government. It includes the media, business, the educational and religious systems and the billionaire families and individuals of the world. Individuals in all of these fields have networked together to bring about a world government, a world economic system and a world religion. When the world dictatorship is established one man will be made world dictator. At that time Big Brother will refer to him, his masters and his minions. That man will be the Antichrist.

Bilderberger Group – is a NWOG think tank similar to the RIIA, CFR and TC. The first meeting was held in Hotel de Bilderberg in Oosterbeek, Netherlands (Holland) in 1954. The members and guests meet once a year over a weekend to determine what needs to be done in the following year in finance and politics. Their decisions affect most nations of the world. It was founded by the Rothschild crime family in association with the Rockefeller crime family. 315 Bohemian Club – is a private club founded in 1872 that is located in San Francisco, California. It admits men that the leaders believe they can use to bring about a New World Order. (624 Taylor Street, San Francisco CA)

Bohemian Grove – is a massive 2,700 acre retreat created in 1878, owned by the Bohemian Club. It is located in northern California along the Russian River. During the last two weeks of July each year a few hundred members and guests conspire to bring about a New World Order. They also engage in homosexual activities, bringing in male porn stars and prostitutes. (20601 Bohemian Avenue, Monte Rio, CA)

CIA – The Central Intelligence Agency, established in 1947, is a criminal organization created at the bequest of the Rockefeller crime family to carry out its goals. It is the intelligence and enforcement arm of the Rockefeller crime family. (George Bush Center for Intelligence, McLean, VA – https://www.cia.gov)

CFR – The Council on Foreign Relations was founded in 1921. It is an American NWOG think tank made up of about 5,000 men and women who are used by the leadership to brng about a New World Order. It publishes a bi-monthly journal “Foreign Affairs.” (58 East 68th Street, New York, NY – www.cfr.org)

Constitutional Republic – A form of government in which representatives of the people pass laws to regulate society, but they are bound by a Constitution written in stone. The United States of America was a Constitutional Republic until 1861 when the Republic was dissolved due to war. The Republic was never reinstituted according to the Constitution. Since then the United States of America has been run as a corporation with Congress being the board of directors. The Board does what the real rulers of America (Rockefeller crime family) want them to do. They rarely do what the people want them to do. Since 1861 virtually all Presidents of the United States Corporation have been figure heads. Those who refused to take orders were fired, some in a dramatic way such as with Lincoln, Garfield, McKinley and Kennedy.

DARPA – Defense Advanced Research Project Agency is a research and development arm of the military that was created in 1958. It develops virtually all of the military’s science-fiction type weapons, including advanced aircraft and spaceships. Area 51 in Nevada is its most infamous research facility. (www.darpa.mil) 316 Democracy – A government of the masses. Authority is derived through mass meetings or any other form of “direct” expression. It always results in mobocracy. Attitude toward property is communistic – negating property rights. Attitude toward law is that the will of the majority shall regulate, whether is be based upon deliberation or governed by passion, prejudice, and impulse, without restraint or regard to consequences. The results are always demogogism, license, agitation, discontent and anarchy. (Training Manual No. 2000-25, War Department, Washington, D.C., November 30, 1928)

End Game – is a term used to refer to the final objective of the NWO Gang. Their ultimate goal is to establish a world dictatorship in which they have absolute control of every aspect of everyone’s life on Earth from conception to death.

False Flag – is a violent incident or terrorist attack that is planned and perpetrated by the government, military or assets working for the government/military. The incident is blamed on a lone nut terrorist, a terrorist group or an enemy country and used as a provocation to start a war or launch an attack on a group of terrorists or an single individual. False Flag incidents are also used by governments to take away the rights and freedoms of the people in the country that was targeted. Examples are the burning of the Reichstag building in Germany, the Oklahoma City bombing and the infamous 911 attacks. For a detailed description of the most infamous False Flag incidents in history see Book Four, Chapter 33.

FBI – The Federal Bureau of Investigation was founded in 1908. It is a government agency created to supercede the authority of the states. It has done some good, but its main purpose since World War II has been to capture or murder Patriots, dissidents and competitors of the New World Order Gang. (www.fbi.gov)

Georgia Guidestones – are large granite monuments in Elbert County, Georgia. A message comprising ten guides is inscribed on the stones in eight modern languages, and a shorter message is inscribed at the top of the structure in four ancient languages’ scripts: Babylonian, Classical Greek, Sanskrit, and Egyptian hieroglyphs. The structure sometimes referred to as the “American Stonehenge” is made from six granite slabs weighing more than 240,000 pounds in all. Its main message is that the world’s population must be reduced to 500 million people. (http://en.wikipedia.org/wiki/Georgia_Guidestones & www.wired.com 317 /images/multimedia/magazine/1705/Wired_May_2009_Georgia_Guide stones.pdf)

GPS – The Global Positioning System is a space-based global navigation satellite system (GNSS) created in 1973 that provides location and time information anywhere on Earth, where there is an unobstructed line of sight to four or more GPS satellites. It is maintained by the United States government and is freely accessible by anyone with a GPS receiver with some technical limitations which are only removed for military users.

Illuminati – This word means enlightened ones. The perverted meglomaniacs who desire to establish a world dictatorship believe they are enlightened and some call themselves the Illuminati. This is the name that Adam Weishaupt gave his secret organization, an off-shoot of the Freemasons, that was formed on May 1, 1776. His group was financed by the Rothschild crime family and it quickly infiltrated most of the Masonic lodges in Europa and America taking control of them. The two most infamous successors of Weishaupt were Giuseppi Mazzini of Italia (1805-1872) and Albert Pike of America (1809-1891). It is believed that when the Bavarian government discovered the Illuminati (Order of Perfectibilists) and outlawed it in 1784 that Weishaupt took his revolutionary group deep underground. It is from behind the scenes that this mysterious group of men rule the world. Some men who are believed to be high-ranking members of the Illuminati are the heads of the Rothschild and Rockefeller crime families, George H.W. Bush, Henry Kissinger, George Shultz, Maurice Strong, George Soros and Zbigniew Bzrezinski.

Inside job – is a term designating a false flag incident as being carried out by the authorities of the nation that was attacked.

Mark of the beast – is most likely a computer chip implanted under the skin on the right hand or the forehead (Revelation 13.16-17). In the future another technology may replace the implantable chip, but at this time it is the most likely candidate. The Antichrist will issue his “mark” at the mid-point of the seven year Tribulation. Those who refuse to take his “mark” will not be permitted to buy or sell anything or receive benefits of any kind from the government or a corporation. No one will be able to work a job or own a business with the “mark.”

318 NSA – The National Security Agency was created by the Rockefeller crime family in 1947 to run the government, all intelligence agencies and spy on all competitors foreign and domestic. (www.nsa.gov)

New World Order – is the term the “elitists” use to describe their end game of creating a world dictatorship consisting of a world government, a world economic system and a world religion (church).

New World Order Gang – is a large group of demented, perverse, meglomaniacs who believe they are destined to rule the unwashed masses due to their superior intelligence and abilities. For the most part they are the scum of mankind and the least qualified to rule.

Patriot – A person who defends his country from all enemies foreign and domestic.

RIIA – The Royal Institute of International Affairs, founded in 1920, is a British NWOG think tank similar to the CFR and TC which are the American copies of it. (www.chathamhouse.org)

Rockefeller crime family – The Rockefeller crime family, beginning with John D. Rockefeller, is the second richest and powerful known family on the planet. It is estimated to be worth $192 billion (N.Y. Times) and $392 billion to $663.4 billion (Wikipedia). (www.nytimes. com/ref/business/20070715_GILDED_GRAPHIC.html & http://en. wikipedia. org/wiki/List_of_wealthiest_historical_figures)

Rothschild crime family – The Rothschild crime family, beginning with Mayer Amschel Rothschild, is the richest and most powerful known family on the planet. Its wealth is estimated to be between $3 trillion to $600 trillion. (Ferguson, Niall. The House of Rothschild: Money’s prophets, 1798-1848 , Volume 1. 1999. pp. 481-85.) [Authors’ note : Mayer was funded by an ancient family that has ruled the world from behind the scenes for over 2,000 years. That unknown family today has used numerous families throughout its existence to do its dirty work.]

TC – The Trilateral Commission was founded in 1973 by David Rockefeller. It is an American, Euopean, Japanese NWOG think tank. (www.trilateral.org)

Unwashed masses – are the vast majority of people on Earth. This derogatory term is used by the NWO Gangsters to refer to the average 319 person. They call us unwashed because the average person did not bath as often as most of the perverted gangsters until shortly after World War II when the housing boom made cheap housing with indoor plumming available to most people in the Western World. Before the boom of the post WWII era most people in the Western world only took a bath or shower once a week, preferably on Saturday night. They bathed on Saturday night to be clean for Sunday church services. Before here was indoor plumming and water heaters taking a hot bath was a major chore. Water was heated on wood burning stoves and then taken to the tub. This took some time and hot water was continually added as the entire family bathed in one tub. The head of the house bathed first followed by mom and then the children with the oldest first. The baby was bathed last in the muddy water. Some bath tubs were located outside where the water could be dumped out by elevating the tub. This is where the phrase, “Don’t throw the baby out with the bath water” came from. If the tub was in a house or an apartment the dirty water had to be taken outside one bucket at a time. Many people living in high-rise apartments threw the water out of the windows. Few people walked on the sidewalk beneath apartment buildings on Saturday night. The practice of throwing bath or kitchen water out windows in high- rise apartment buildings is thousands of years old. It is still a common practice in Second and Third world countries.

InfoWarsShop.com 320

APPENDIX A

THE SOLUTION

Call upon the name of the Lord

The Bible says Big Brother will kill millions of people during the Tribulation. During that time the Antichrist will be Big Brother. Yet before the Antichrist comes to power Big Brother before him will also kill millions of people around the world with most being Christians. If you do not submit to Big Brother and obey his tyrannical commands you may be put to death. It is very noble to die for freedom and liberty, but you will wake up in Hell if you have not trusted in Jesus Christ to save you. Trust in Jesus Christ to save you and then oppose Big Brother. If you are put to death by him you will awake in the presence of Jesus in Heaven. If you have not trusted Jesus to save you, do it now! Read the following Scriptures:

For all have sinned, and fall short of the glory of God. (Rom. 3.23)

For the wages of sin is death, but the free gift of God is eternal life in Christ Jesus our Lord. (Romans 6.23)

But God commendeth his own love toward us, in that, while we were yet sinners, Christ died for us. (Romans 5.8)

For by grace have ye been saved through faith; and that not of yourselves, it is the gift of God; not of works, that no man should glory . (Ephesians 2.8-9)

In whom we have our redemption through His blood, the forgiveness of our trespasses, according to the riches of His grace. (Eph. 1.7)

For, whosoever shall call upon the name of the Lord shall be saved. (Romans 10.13)

If thou shalt confess with thy mouth Jesus as Lord, and shalt believe in thy heart that God raised Him from the dead, thou shalt be saved: for with the heart man believeth unto righteousness; and with the mouth confession is made unto salvation. (Romans 10.9-10)

321 But as many as received Him, to them gave He the right to become children of God, even to them that believe on His name . (John 1.12)

If you understand you are a sinner in need of salvation because there is a real Hell, ask Jesus to save you right now. Tell Him that you are trusting in Him to save you and cleanse your sins by the blood He shed on the cross. Once you have trusted in Jesus , and in Him alone to save you, find a good Bible teaching church to join. If you need help locating a church call Grace Mercy Ministries (928.237.5351).

Discipleship

Jesus commissioned His disciples to be His witnesses to His resurrection, and to make disciples of all nations:

Go ye therefore, and make disciples of all the nations, baptizing them into the name of the Father and of the Son and of the Holy Spirit: teaching them to observe all things whatsoever I commanded you: and lo, I am with you always, even unto the end of the world. (Matthew 28.19-20)

But ye shall receive power, when the Holy Spirit is come upon you: and ye shall be my witnesses both in Jerusalem, and in all Judaea and Samaria, and unto the uttermost part of the earth. (Acts 1.8)

That commission applies to all true believers. Once a person is saved by trusting in Jesus Christ alone, he is to become a disciple of Jesus . One does that by engaging in several spiritual activities on a daily and a regular basis:

1-Prayer throughout the day (Ephesians 6.18; 1 Thessalonians 5.17) 2-Hearing Scripture daily (Prov. 8.34; Luke 8.15, 21; 11.28; James 1.22; Revelation 1.3) 3-Reading Scripture daily (Deuteronomy 17.19; Revelation 1.3) 4-Bible study on a daily basis (John 5.39; Acts 17.11; 2 Tim. 2.15) 5-Memorization of Scripture (Deuteronomy 6.6; Psalm 37.31; 40.8; 119.11; Proverbs 2.1; 3.1, 3; 4.1). 6-Meditation on Scripture (Joshua 1.8; Psalm 1.2) 7-Fellowship with the brethren (Acts 2.42, 46-47; Hebrews 3.13; 10.24-25)

322 8-Evangelism through living a holy life, and sharing your testimony as the Holy Spirit leads (Psalm 96.2; Acts 2.47; 1 Peter 3.15). 9-Make disciples (Matthew 28.19-20; 2 Timothy 2.2)

If a Christian develops a discipline in these of holy living he will become a disciple of Jesus Christ . It does not happen overnight. It takes many years to become a mature disciple , but it starts with the daily discipline of being in prayer, in the Word and in regular fellowship with other Christians. Find a church and become an active member. Pray in the morning, throughout the day and before you go to sleep. Set up a daily Bible reading program. If you read three chapters a day you will read through the Bible in a year. Read two chapters in the Old Testament each day and one chapter in the New Testament. Buy an audio copy of the Bible, and listen to it at home and in the car. Buy DVDs of movies about the Bible and watch them often ( The Gospel of John, Peter and Paul, The Greatest Story Ever Told, King of Kings , etc.). Memorize Scripture. If you memorize one verse a week you will have 52 verses memorized in one year. Meditate on Scripture and let the Holy Spirit teach you. Learn how to share the gospel. Ask your pastor to train you, and then share your personal testimony, and the gospel as the Lord leads. For more help go to – www.GraceMercyMinistry.com

Educate yourself

Spend time reading news articles from real e-newspapers and web sites that archive articles on current events, history, politics, health and religion. Below are some of the best web sites:

www.prisonplanet.com & www.infowars.com www.freeworldfilmworks.com/narchive.htm

Read as many books about Big Brother and the New World Order as you can. Watch movies and DVDs that document the move to create a world government, world economic system and world religion. (See Appendix D, Recommended books, DVDs and movies.) Watch and listen to Patriot talk show programs. Here are some of the best:

Alex Jones – www.prisonplanet.com & www.prisonplanet.tv George Noory – www.coasttocoastam.com Mike Adams – www.naturalnews.com 323 Clayton Douglas – www.freeamerican.com Genesis Communications Network – www.gcnlive.com Jim Marrs – www.renseradio.com/listenlive.htm Texe Marrs – www.powerofprophecy.com Dr. Stan Monteith – www.radioliberty.com Jeff Rense – www.renseradio.com/listenlive.htm Syed Saboor – www.americainfocus.org Kevin Trudeau – www.ktradionetwork.com

Spread the word

Share the knowledge that you have about Big Brother with others. Share this book with others or buy copies for your friends and family. Buy DVDs that expose the machinations of Big Brother and then share them with others. Two web sites where you can buy numerous DVDs that expose Big Brother and his goal of creating a New World Order are:

www.infowarsshop.com www.freeworldfilmworks.com

Become self-sufficient

The best way of resisting Big Brother after trusting in Jesus Christ and boycotting Big Brother companies is to become self-sufficient. If you live in a big city, an apartment, condo or townhouse it is virtually impossible to be self-sufficient. Yet there are some things you can do to keep from being at the mercy of Big Brother during crisis situations:

1. Have several months of food and water stored up. 2. Have first aid supplies. 3. Have a back-up generator that runs on something you can store safely. Solar generators are excellent. 4. Have candles and flashlights. 5. Have an escape route laid out in case you must flee the city. Travel on side streets and do not use major streets, highways or freeways. If you cannot get out in a vehicle use motorcycles, bikes or walk out only in a life and death situation. 6. Have travel bags/suitecases and supplies handy for your getaway. 7. Have cash, gold and silver to make purchases with in the underground market. 324 8. Have weapons IF you know how to use them. IF you do not know how to use them do NOT buy them. 9. Have friends you can trust to work with in an emergency. 10. Do NOT let anyone know that you are self-sufficient except your most trusted friends. Keep a low profile.

For more help visit these web sites:

www.standeyo.com www.21st-century-goods.com www.thesurvivalzone.com www.purewaterfreedom.com www.efoodsdirect.com/Alex.aspx www.mysolarbackup.com www.midasresources.com/index.php www.ecoloblue.com www.permaculture.com www.bigberkeywaterfilters.com

Stay healthy

The key to having a healthy body is knowledge. Always get proper sleep and exercise. Drink pure water and replace unhealthy foods with healthy ones. Keep replacing junk foods with good foods until all you eat is healthy foods that will keep your body in tip-top condition. Whenever possible buy organic foods. Below is a chart of “healthy” and “unhealthy” foods. Try to eat as many of the “healthy” foods as you can and as few of the “unhealthy” foods as possible.

Healthy Foods Unhealthy Foods Fruits Alcohol Vegetables Sugar (raw/in processed foods) Raw cereals (no sugar/additives) Sodas Nuts Coffee Seeds Milk Eggs Ice cream Legumes (beans) Cheese Grains (rice, corn, millet, rye) Cottage cheese Stem tubers – potatoes Yogurt Root tubers sweet potatoes/yams Meat Peppers Fish Herbs Fowl Allium (onions, garlic, shallots, Processed foods (Most foods in scallions, leeks, chives) boxes, cans and packages.)

325 If you eat any of the unhealthy foods listed above buy organic only. To learn more about the dangers of the Standard American Diet that has killed millions of Americans watch the movie “Food, Inc.” watch the video “Food: The Ultimate Secret” (www.infowars.com/food-the- ultimate-secret-exposed), read the book by Eric Schlosser, Fast Food Nation , and also read the articles at www.naturalnews.com. There are other dangers not only in the food we eat, but the water we drink. To learn about the dangers of fluoridated water check these links: www.radioliberty.com/nldec04.html & www.naturalnews.com & www.makedisciplesofallthenations.com/hw-fluoride. When you go to the Natural News website type in fluoride in its search window to see a list of articles dealing with it. There is also a danger in vaccines. To learn about these dangers visit these web sites: www.naturalnews.com (Type in vaccines in the search window at the Natural News web site.) One last danger to consider is the cell phone. For articles concerning this type cell phone into the search window at www.naturalnews.com. For help on nutrition visit these websites:

www.infowarsteam.com www.johnrobbins.info www.brightsideben.com www.americanvegan.com www.naturalnews.com www.veganhealth.org www.naturalpedia.com www.vegetarian.org.uk www.nutrimedical.com Natural Health Clinic www.deaddoctorsdontlie.com (323.294.4372)

Alcohol, drugs, thrill seeking

And be not drunk with wine, wherein is excess; but be filled with the Spirit. (Ephesians 5.18)

Abuse of alcohol and drugs (legal and illegal) is one of the leading causes of crime, loss of work productivity and divorce. They will continue to be abused until the Second Advent of Jesus Christ. During the Tribulation drug addiction will be universal. Virtually everyone will be a drug addict of some kind whether it is a legal or illegal drug (Revelation 9.21; 18.23). No Christian should ever become intoxicated with alcohol or drugs. If you do not get “high” by studying the Bible there might be something wrong with you. Studying the Bible is the most exciting

326 thing any Christian can do. There is nothing a Christian can do in this life that is more exciting than studying the Bible. Alcoholics get “high” by drinking a few beers at the beginning, but eventually downing a six-pack is not enough. They have to move on to more powerful drinks to get “high.” Some end up drinking themselves drunk every night. Drug addicts start with a weak drug but the “high” they get is not that big so they take more of the drug or they move on to more potent drugs. Many drug addicts get to a point that no matter how powerful a dose they take they cannot get “higher.” The only way they can get “higher” is to over-dose themselves into Hell. There are also thrill-seekers who seek out all sorts exciting activities, but after they have done them a few dozen times the thrill is not the same. They seek something bigger, better, faster and scarier. Some of these thrill-seekers end up dying from pushing too hard. Thrill-seekers run out of things to do to give them a “rush.” Christians can get “high” and get a greater “rush” than anything natural man can experience by studying the Bible. Studying the infallible, holy Word of God is more thrilling than anything you can imagine. The Bible is God revealing Himself to you. The more we study His Word the more learn about Him and get to know Him.

Boycott Big Brother companies

Boycott the Big Brother corporations. Below is a short list of some Big Brother companies. Do not buy products from these companies or use their services:

Do NOT buy anything made in Red China!

Airlines Banking/Finance American American Express Continental Bank of America-Merrill Delta Lynch Evergreen Citicorp United Goldman Sachs Hongkong and Shanghai Amusement Parks Banking Corporation (HSBC)

Disneyland & Disney World JP Morgan Chase Six Flags Master Card 327 Books Morgan-Stanley Schearson Amazon Wells Fargo Barnes & Noble Visa

Charities Chemical Companies

American Red Cross BASF United Way Bayer

Clothing Dow Chemical Company DuPont Armani Eastman Chemical Company Calvin Klein ExxonMobil Guess Jeans Mitsubishi Levi’s Jeans Shell Van Huesen Computer Drugs/Medical AOL Bayer Apple Bristol/Meyers Squib Dell Baxter International Face Book Eli Lilly Google Johnson & Johnson Hewlett-Packard Pfizer IBM Proctor & Gamble Intel Microsoft Fast Death stops Myspace

Burger King Sony Carl’s Jr. Twitter

Dairy Queen Food producers Dunkin Donuts Del Taco Archer Daniels Midland McDonald’s (ADM) Sara Lee Campbell Soup Company Starbucks Coca Cola Taco Bell ConAgra Foods General Mills Food retail stores Heinz

7-Eleven Hillandale Farms Albertson’s Hormel 328 Costco Kellog H. E. Butt Grocery Company Kraft K-Mart Mars Ralphs Monsanto Safeway Pepsi Target Pillsbury Tesco Tyson Foods Vons United Fruit Company Walmart (Chiquita)

Hotels Newspapers/Magazines

Disney Los Angeles Times Harrah’s New York Times Hilton Newsweek Hyatt Time Magazine Marriot (Bulgari, Courtyard, U.S. News & World Report Fairfield, Renaissance, Washington Post Residence, Ritz-Carlton, Washington Times SpringHill, TownePLace) Planet Hollywood Retail

Sheraton Bloomingdale’s Trump Costco

Insurance JC Penny K-Mart/Sears Berkshire Hathaway Neiman Marcus Farmers Nordstrom Progressive Sak’s 5th Ave. Prudential Sam’s Club State Farm Target Transamerica Walmart Walgreens Media Oil crime syndicates ABC CBN British Petroleum (BP) CBS Chevron CNN ConocoPhillips Comcast Exxon/Mobil Disney Shell Fox (News Corp.) Sunoco 329 General Electric Phone Companies Hearst Corp. MSNBC AT&T NBC Sprint Nextel Sony T-Mobile & Verizon (GTE) TBN TimeWarner & Viacom

“The two enemies of the people are criminals and government , so let us tie the second down with the chains of the Constitution so the second will not become the legalized version of the first.” Thomas Jefferson

Resist!

ALL Christians are commanded to resist evil men by keeping the Constitutional laws of the land:

Those who forsake the law praise the wicked, but those who keep the law strive with them . (Proverbs 28.4)

When Christians resist wicked men they are blessed by YAHWEH:

But to those who rebuke the wicked will be delight, and a good blessing will come upon them . (Proverbs 24.25)

It is hard for most Christians to understand the truth that we are not to envy the wicked or admire them whether they are a sports figure, a rock idiot, an actor, a singer, a politician, etc.:

Do not let your heart envy sinners, but live in the reverence of YAHWEH always. (Proverbs 23.17)

Do not be envious of evil men, nor desire to be with them . (Proverbs 24.1)

Resist Big Brother and his evil minions in every legal way you can!

Notes

Some Big Brother researchers are convinced that Google and Facebook are Big Brother front organizations as well as other companies. Several articles to read are: 330 “Facebook & Google are CIA Fronts,” by Sandeep Parwaga, February 17, 2011, www.henrymakow.com/social_networking_dupes _the _ma.html. “Facebook - the CIA conspiracy” by Matt Greenop, August 8, 2007. “Facebook & Social Media: A Convenient Cover For Spying,” by Ralph Forbes, October 6, 2010. http://real-agenda.com/2010/10/06/facebook-social-media-a-conven ient-cover-for-spying. “US spies invest in internet monitoring technology,” by Toby Harnden, October 20, 2009. www.telegraph.co.uk/news/worldnews/northamerica/usa/6389669/US- spies-invest-in-internet-monitoring-technology.html. “Exclusive: U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets,” by Noah Shachtman, October 19, 2009. www.wired.com/dangerroom/2009/10/exclusive-us- spies-buy-stake-in-twitter-blog-monitoring-firm. “Group files request for details on Google, NSA partnership.” by John Letzing, February 5, 2010. www.marketwatch.com/story/group-requests-details-on-google-nsa -partnership-2010-02-05. “Google-NSA collaboration draws alarm,” by Byron Acohido, February 5, 2010. http://lastwatchdog.com/google-nsa-collaboration-draws-alarm. “The Google-NSA Alliance: Questions and Answers,” by JR Raphael, PCWorld.2.04.2010. www.pcworld.com/article/188581/the_googlensa_alliance_quest ions_and_answers.html.

InfoWars.com 331

InfoWarsShop.com

332

APPENDIX B

TEN COMMANDMENTS

1. You shall have no other gods before me.

2. You shall not make unto you a graven image and you shall not bow down unto them nor serve them.

3. You shall not take the name of YAHWEH your God in vain.

4. Remember the sabbath day to keep it holy.

5. Honor your father and your mother.

6. You shall not commit murder.

7. You shall not commit adultery.

8. You shall not steal.

9. You shall not bear false witness against thy neighbor.

10. You shall not covet your neighbor’s possessions.

YAHWEH

333

APPENDIX C

TEN COMMANDMENTS OF PATRIOTS

1. Love God with all of your soul, heart, mind and body (Mark 12.30).

2. Love your family (Deuteronomy 6.6-7).

3. Love your neighbor as yourself (Mark 12.31).

4. Love your country.

5. Defend and support the Constitution.

6. Exercise your rights – freedom of religion, speech, bearing arms, peaceful protests, redress of grievances, etc.

7. Vote out of office all politicians who do not defend/support the Constitution.

8. Oppose all enemies of the Constitution foreign and domestic.

9. Oppose abuses of the Constitution and laws by politicians, bureaucrats, etc.

10. Oppose all wars of aggression and empire expansion.

General Freedom

334

APPENDIX D

TEN COMMANDMENTS OF THE STATE

1. You shall love the Almighty STATE and the Guardians of the STATE with all of your non-existent soul, with all of your heart, with all of your mind and with all of your body. 2. You shall worship the STATE and Her Guardians who rule over you, and bow down before Them. 3. You shall worship the image of the STATE and the images of Her Guardians, and you shall worship no other gods or obey them. 4. You shall obey the STATE and her Guardians at all times without questioning Them. 5. You shall not think bad thoughts or say bad things about the STATE and Her Guardians, nor shall you violate any Law of the State or any Command of Her Guardians. 6. You shall work twelve hours a day, seven days each week for the STATE, and accept Her undeserved gift of daily sustenance without complaint – eating the preservative laden food She gives you, drinking the fluoridated water She gives you, and taking all of the life sustaining vaccines She gives you. 7. You shall honor the STATE and all of Her Guardians with all of your work, all of your words, all of your thoughts and all of your motives. 8. You shall commit murder, adultery and theft at the will of the STATE and Her Guardians. 9. You shall bear false witness at the Command of the STATE and Her Guardians. 10. You shall covet everything your neighbor has and take it at the Command of the STATE and Her Guardians.

Big Brother

335

1984

www.imdb.com/title/tt0048918

336

APPENDIX E

RECOMMENDED BOOKS, DVDs & FILMS

Books

Eric Blair (George Orwell)

1984 Animal Farm

Ray Bradbury

Fahrenheit 451

Aldous Huxley

Brave New World

Herbert George Wells

The Open Conspiracy The New World Order The Time Machine The Island of Doctor Moreau When the Sleeper Wakes The Food of the Gods and How It Came to Earth A Modern Utopia The New Machiavelli Men Like Gods Little Wars New Worlds for Old

Larry Abraham

Call it Conspiracy The Greening: The Globalists’ Drive for Global Power

337 Gary Allen

Federal Reserve: The Trillion Dollar Conspiracy None Dare Call it Conspiracy The Rockefeller File Say “No!” to the New World Order

George Armstrong

The Rothschild Money Trust

James Bamford

A Pretext for War: 9/11, Iraq, and the Abuse of America’s Intelligence Agencies. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. The Puzzle Palace: a Report on America's Most Secret Agency. The Puzzle Palace: Inside the National Security Agency, America’s Most Secret Intelligence Organization. The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America.

Augustin Barruel

Memoirs Illustrating the History of Jacobinism

John Beaty

Iron Curtain Over America

Michael Benson

Inside Secret Societies: What They Don’t Want You To Know

Lenn Bracken The Shadow Government

William Guy Carr

Pawns in the Game Red Fog Over America Satan: Prince of This World 338 Count Cherep-Spiridovich

The Secret World Government

John Coleman

Apocalypse Waiting to Happen Beyond the Conspiracy: Unmasking the World Government – the Committee of 300 The Club of Rome The Conspirators Hierarchy: The Committee of Three Hundred Diplomacy by Deception Drug War Against America Illuminati in America: 1776-2008 One World Order Socialist Dictatorship Pearl Harbor and Beyond The Rothschild Dynasty The Tavistock Institute of Human Relations http://coleman300.com

Jerome Corsi

America for Sale The Obama Nation Where’s the Birth Certificate?

Dennis Cuddy

Education Memtal Health and Social Control The Globalists Mental Health Screening New World Order Now is the Dawning of the New Age New World Order The Power Elite and the Secret Nazi Plan The Road to Socialism and the New World Order Secret Records Revealed September 11 Prior Knowledge

Stan Deyo

The Cosmic Conspiracy The Vindicator Scrolls http://standeyo.com/Our_Books/Our_Books.html 339 Mark Dice

The Illuminati: Facts & Fiction The New World Order: Facts & Fiction Big Brother: The Orwellian Nightmare Come True www.markdice.com

James Drummey

The Establishment’s Man (Expose of G.H.W. Bush)

Robert Eringer

The Global Manipulators: The Bilderberg Group

Daniel Estulin

Bloodlines of the Illuminati www.danielestulin.com

Myron Fagan

Red Stars Over Hollywood (audio) The Illuminati and the Council on Foreign Relations (audio)

Niall Ferguson

The House of Rothschild: Money’s prophets

John Gatto

Dumbing Us Down

Matvei Vasilyevich Golovinski

The Protocols of the Learned Elders of Zion

David Ray Griffin

The New Pearl Harbor: Disturbing Questions About the Bush Administration and 9-11 The New Pearl Harbor Revisited: 9/11, the Cover-up and the Exposé The 9/11 Commission Report: Omissions and Distortions 9/11 Ten Years Later: When State Crimes Against Democracy Succeed 340 9/11 and American Empire: Intellectuals Speak Out, Vol. 1, editor, with Peter Dale Scott 9/11 Contradictions: An Open Letter to Congress and the Press American Empire and the Commonwealth of God: A Political Economic, Religious Statement, with John B. Cobb, Richard A. Falk and Catherine Keller Christian Faith and the Truth Behind 9/11: A Call to Reflection and Action Cognitive Infiltration: An Obama Appointee's Plan to Undermine the 9/11 Conspiracy Theory Debunking 9/11 Debunking: An Answer to Popular Mechanics and Other Defenders of the Official Conspiracy Theory The Mysterious Collapse of World Trade Center 7: Why the Final Official Report About 9/11 Is Unscientific and False Osama Bin Laden: Dead or Alive? http://davidraygriffin.com

Des Griffin

Descent Into Slavery Fourth Reich of the Rich www.midnight-emissary.com

John Hankey

Dark Legacy: George Bush & the Murder of John Kennedy

George Hansen

To Harrass Our People

Harry Helms

Inside the Shadow Government: National Emergencies and the Cult of Secrecy

Robert Hieronimus

The United Symbolism of America: Deciphering Hidden Meanings in America’s Most Familiar Art, Architecture, and Logos

Michael A. Hoffman

Secret Societies & Psychological Warfare 341 David Icke

Tales from the Time Loop The David Icke Guide to the Global Conspiracy www.davidicke.com

Maurice Joly

The Dialogue in Hell Between Machiavelli and Montesquieu

Alex Jones

911 Descent into Tyranny

Gary Kah

En Route to Global Occupation The New World Religion

Jim Keith

Biowarfare In America Black Helicopters over America: Strikeforce for the New World Order Black Helicopters II: The End Game Strategy Casebook on Alternative 3: UFO’s, Secret Societies and World Control Casebook on the Men in Black Gemstone File Mass Control: Engineering Human Consciousness Mind Control, World Control: The Encyclopedia of Mind Control The Octopus: Secret Government and the Death of Danny Casolaro (with Kenn Thomas) Okbomb! Conspiracy and Cover-Up Saucers of the Illuminati (under pseudonym Jay Katz) Secret and Suppressed: Banned Ideas and Hidden History

George Knupffer

The Struggle for World Power

E.C. Knuth

The Empire of the City

Daniel Mannix The Hell-Fire Club 342 Jim Marrs

Inside Job: Unmasking the 9/11 Conspiracies The Terror Conspiracy Revisited The Trillion Dollar Conspiracy The Rise of the Fourth Reich Rule by Secrecy www.jimmarrs.com/books

Texe Marrs

America Shattered: Unmasking the Plot to Destroy Our Families and Our Country Circle of Intrigue: The Hidden Inner Circle of the Global Illuminati Conspiracy Codex Magica: Secret Signs, Mysterious Symbols, and Hidden Codes of the Illuminati Conspiracy World Dark Majesty: The Secret Brotherhood and the Magic of a Thousand Points of Light Dark Secrets of the New Age Days of Hunger, Days of Chaos Millennium: Peace, Promises, the Day They Take Our Money Away Mysterious Monuments: Encyclopedia of Secret Illuminati Designs, Masonic Architecture, and Occult... Project L.U.C.I.D.—The Beast 666 Universal Human Control System www.texemarrs.com

Dr. Stan Monteith

Brotherhood of Darkness Aids. the Unnecessary Epidemic Hidden Agenda: The Fluoride Deception IRAQ: The Untold Story www.radioliberty.com/bbro.htm

Eustace Mullins

The Curse of Canaan: A Demonology of History The Federal Reserve Conspiracy Murder by Injection: The Medical Conspiracy Against America The Rape of Justice: America’s Tribunals Exposed Secrets of the Federal Reserve, 1952. 343 The World Order: A Study the Hegemony of Parasitism The World Order: Our Secret Rulers

Carroll Quigley

The Anglo-American Establishment Tragedy and Hope

James Pool

Hitler and His Secret Partners Who Financed Hitler

Robert L. Preston

Wake-Up America

L. Fletcher Prouty

JFK: The CIA, Vietnam, and the Plot to Assassinate John F. Kennedy with Oliver Stone and Jesse Ventura The Secret Team

John Robbins

The China Study (with T. Colin Campbell, Thomas Campbell II, Howard Lyman) Diet for a New America The Food Revolution Healthy at 100 May All be Fed Whitewash

John Robison

Proofs of a Conspiracy

John Stockwell

The Praetorian Guard: The U.S. Role in the New World Order In Search of Enemies

Anthony C. Sutton

America’s Secret Establishment The Best Enemy Money Can Buy 344 Energy: The Created Crisis The Federal Reserve Conspiracy National Suicide: Military Aid to the Soviet Union How the Order Creates War and Revolution How the Order Controls Education Technological Treason: A catalog of U.S. firms with Soviet contracts, 1917–1982 Trilaterals Over America Trilaterals Over Washington – Volume I (with Patrick M. Wood) Trilaterals Over Washington – Volume II (with Patrick M. Wood) The Two Faces of George Bush Wall Street and the Bolshevik Revolution Wall Street and the Rise of Hitler Wall Street and FDR www.antonysutton.com

Webster Tarpley

9/11 Synthetic Terror: Made in USA - Myth of the 21st Century Against Oligarchy Barack H. Obama: The Unauthorized Biography George Bush: The Unauthorized Biography (with Anton Chaitkin) Obama - The Postmodern Coup: Making of a Manchurian Candidate

Victor Thorn

911 On Trial 9-11 Evil America Before the Fall Anarchy Rising Frontman: Obama’s Darkest Secrets Revealed Hillary (and Bill) the Drugs Volume Hillary (and Bill) the Murder Volume Hillary (and Bill) the Sex Volume New World Order Assassins The New World Illusion (with Lisa Guliani) www.wingtv.net

Kevin Trudeau Natural Cures “They” Don't Want You to Know about More Natural Cures Revealed www.naturalcures.com 345 Jim Tucker

Jim Tucker’s Bilderberg Diary http://shop.americanfreepress.net

Jesse Ventura

63 Documents The Government Doesn’t Want You To Read American Conspiracies http://weaintgottimetobleed.com/vault

Nesta Webster

Secret Societies and Submersive Movements World Revolution

Rene A. Wormser

Foundations: Their Power and Influence

DVDs

Alex Jones

End Game: Blueprint for Global Enslavement The Fall of the Republic: The Presidency Of Barack H. Obama The Obama Deception Terror Storm: A History of Government Sponsored Terrorism Police State 2000 Police State II: The Takeover Police State III: Total Enslavement Police State IV: The Rise of FEMA Martial Law 9-11: Rise of the Police State 9/11: The Road to Tyranny 9/11 Chronicles Part One: Truth Rising The Order of Death & Dark Secrets: Inside Bohemian Grove Matrix of Evil The Masters of Terror America: Destroyed by Design Comprehensive Financial Reports Exposed! Reflections and Warnings: An Interview with Aaron Russo www.infowarsshop.com

346 Anthony J. Hilder

666 Mark of the Beast 911: Greatest Lie Ever Sold 911 IllumiNazi Beast of the Bible Belt Frankenfed Alien 51 Panic Project New World Odor None Dare Call it Murder Reichstag ‘95 Oklahoma Atrocity www.freeworldfilmworks.com/dvd_catalog.html

David Bay & Chris Pinto

America’s Secret Beginnings: The New Atlantis America’s Secret Beginnings: Riddles in Stone www.adullamfilms.com/secretmysteries.html

Philip Gardiner Angels, Demons & Freemasonry

David Ray Griffin

9/11: The Myth & The Reality http://davidraygriffin.com

David Icke

David Icke: Big Brother, the Big Picture, Freedom or Fascism: The Time to Choose Speaking Out: Who Really Controls the World and What We Can Do About It ( www.davidicke.com)

Jim Marrs

Unmasking the 9/11 Conspiracies The War on Freedom, The 9/11 Conspiracies Marrs on 9/11 – Thinking the Unthinkable www.jimmarrs.com/dvds

347 Texe Marrs

Bloodstained Hands of Big Brother Government Die America Die—The Illuminati Plan to Murder America, Confiscate Its Wealth, and Make Red... Monuments and Magic of the Illuminati Nightstalkers Over America—Urban Warrior Exercises and Our Gestapo Police State Secret Societies and the Illuminati Rothschild’s Choice: Barack Obama and the Hidden Cabal Behind the Plot to Murder America www.texemarrs.com

Dr. Stan Monteith

12 Biggest Lies 911 Contrived! Brotherhood of Darkness Financial Armageddon Forbidden Secret Iraq Road to World Government None Dare Call It Genocide One Nation Under Siege Planned Police State Population Control Rape of the Soul Secret Knowledge: The Legacy of the Mystery Religions Secret Mysteries of America’s Beginnings Volumes 1-3 The Specter Haunting America Sustainable Development: Road to Tyranny The Truth is Out There WAR: The Untold Story www.radioliberty.com/video.htm

Eustace Mullins

The Magical Money Machine (with Bobby Lee) Murder by Injection The New World Order

This list is not a comprehensive list of books and DVDs dealing with Big Brother and the New World Order. It is designed as a starting 348 point. Thousands of books and films have been written and made on this subject and thousands more are yet to come. Read as many books and watch as many films as you can.

Radio shows

X Minus One

Appointment in Tomorrow Nightfall The Defenders Sea Legs The Man in the Moon Skulking Permit Man’s Best Friend Tsylana Mr. Costello Hero http://ia700301.us.archive.org/26/items/OTRR_X_Minus_One_Singles

Mysterious Traveler

Most Famous Man in the World http://otr.net/?p=mtrv

Television shows

Conspiracy Theory (All episodes) www.trutv.com/shows/conspiracy_theory/index.html Conspiracy (History Channel) (All episodes) Brad Meltzer’s Decoded (Statue of Liberty & Secret Societies) Declassified (Taliban & John Lennon) Decoding the Past (Mysteries of the Freemasons, Secrets of the Dollar Bill, The Templar Code) History’s Mysteries (Secret Societies, Secret Brotherhood Freemasons) Max Headroom (All Episodes) SG-1 (The Road Not Taken) That’s Impossible (All episodes) Twilight Zone (The Librarian)

Movies

Film Date Description In 1984, Big Brother sees a nd hears all. The 1956 1984 proles live in squalid poverty and endless war 1984 while the past is systematically erased.

349 A Clockwork A teenage gang leader is rehabilitated using 1971 Orange drugs, torture and silent movies. The power of the media is illustrated when a A Face in the 1957 producer turns a drunk into a media superstar Crowd who becomes a cynical phony. Above the A Chicago vice unit cop stumbles on a CIA 1988 Law plot to finance black ops with crack cocaine. Absolute A burglar goes on the run after witnessing the 1997 Power President murdering his mistress. Pilots in Laos discover that they are patsies Air America 1990 for a CIA heroin-smuggling plot. All the Two young reporters uncover the Watergate President’s 1976 scandal. Men A former FBI agent, grieving for his Arlington 1999 deceased wife, suspects his next-door Road neighbors are terrorists. The An international anarchist organization Assassination 1969 performs political assassinations of the Bureau “socially undesirable” for pay. The U.S. Corp. plunders an inhabited moon Avatar 2009 of the Alpha Centauri system and murders the natives. A dimwitted gardener becomes an advisor to Being There 1979 a wealthy man who buys presidents. A sound effects man goes on the run after Blow Out 1981 recording the Chappaquiddick incident-style assassination of a politician. A right-wing politician, embroil ed in the Bob Roberts 1991 Iran-Contra affair, is targeted for death. An amnesiac CIA assassin goes on the run The Bourne 2002 from his superiors, who want to cover up Identity their illegal activities. Rogue U.S. Army officers plot to assassinate Brass Target 1978 Gen. Patton to cover up theft of Nazi gold.

350 A world dictatorship bans families and Brave New 1998 natural reproduction, has a caste system, World drugs the masses, sex is a recreational sport, and death, which is not feared, comes at 60. A bureaucrat tries to correct an administrative Brazil 1985 error and becomes an enemy of the state. Canadian The White House occupier boosts his ratings 1995 Bacon by fabricating a cold war with Canada. A Texas congressman illegally funnels Charlie 2007 money to the Afghan Mujahideen via a rogue Wilson’s War CIA agent. Management covers up safety flaws at a The China 1979 nuclear power plant; foreshadowed the Three Syndrome Mile Island accident. A private eye stumbles onto murder and Chinatown 1974 political corruption involving real estate interests in Southern California. Clonus Clones are bred to be used as repla cement 1979 Horror parts for the elite. In the near-future cities are heavily controlled Code 46 2003 and only accessible through checkpoints. A big hospital illegally harvests organs from Coma 1978 comatose patients. Two former spies, one CIA and one KGB , go Company 1991 on the run in Berlin after stumbling onto a Business plot to trade drug money for hostages. A conspiracy theorist cabbie goes on the run Conspiracy 1997 after stumbling onto a real conspiracy Theory involving brainwashing. The Constant Big pharmaceutical companies pull the levers 2005 Gardener of power. The A surveillance expert thinks he has overheard 1974 Conversation a murder plot and is being spied on. An amnesiac discovers he is accused o f murder, and that a group of men who possess Dark City 1998 the power to stop time and change reality are involved. 351 The Day of OAS leaders plot to assassinate President 1973 the Jackal Charles de Gaulle. Death of a Bureaucrats cover up the truth of Bush’s ass- 2006 President assination to push an anti-terrorism agenda. A reporter investigating an MP’s sex scandal Defence of the 1985 stumbles onto a web of MI5 cover-up s Realm involving murder and nuclear weapons. A dictator takes over Southern California and turns it into his utopian paradise in which sex Demolition 1993 and other immoral act s are outlawed. Man Everyone has a chip impanted in them so the dictator can track their every move. The Domino A mysterious organization busts a Vietnam 1977 Principle War vet out of prison for an assassination. An investment banker goes on the run from Double Take 2001 the CIA and a Mexican drug cartel after stumbling onto a money laundering scheme. A War Dept. computer tries to take over the Eagle Eye 2008 government by assass inating everyone above the Secretary of War making him president. An attorney goes on the run from rogue NSA Enemy of the 1998 operatives after he is passed a videotape of State them assassinating a congressman. Rogue Pentagon officials sell high-tech arms Eraser 1996 under the table and eliminate the witnesses with the help of rogue U.S. Marshals. A religious lunatic becomes president for life Escape from 1996 in America creating a theocratic dictatorship Los Angeles imposing myriad moral laws. A group of right-wing business magnates and Executive 1973 mercenary covert ops specialists plot and Action carry out the John F. Kennedy assassination. Extreme A secretive hospital attempts to covers up 1996 Measures medical experiments done on the homeless. In the near future the “ Freedom of Eyeborgs 2009 Observation Act” and the implementation of ODIN (Optical Defense Intelligence

352 Network), enables Dept. of Homeland Security bureaucrats to watch everyone. One of their new spy toys is the “eyeborg.” Fahrenheit Firemen burn all books which are illegal to 1966 451 own. Spies masquerading as peace movement Foreign 1940 leaders arrange a conference and a phony Correspondent assassination in order to kidnap a diplomat. An innocent librarian stumbles onto a bizarre Foul Play 1978 plot to assassinate the Pope. A rogue KGB chief wants to prolon the Cold The Fourth 1987 War & sends a spy to detonate an a-bomb at a Protocol U.S. nuclear airbase in Great Britain. A genetically inferior man assumes the Gattaca 1997 identity of a superior one. A CID detective investigates the shooting of a human rights lawyer in Belfast and Hidden 1990 discovers evidence of an RUC murder/cover- Agenda up of a CIA/MI5 plot to destroy the govern- ments of Harold Wilson and Edward Heath. A r enegade CIA agent threatens to write a Hopscotch 1980 memoir revealing agency conspiracies and is pursued by both the CIA and the KGB. A cat burglar is ensnared in an international Hudson Hawk 1991 conspiracy with a billionaire , corrupt CIA agents, a Vatican secret society, and alchemy. I Am Legend 2007 They deal with a biological weapon that The Last Man 1964 “accidentally” kills a vast number of people on Earth on Earth. One man discovers a vaccine and Omega Man 1971 tries to give it to others not infected. A human rights investigator and an honest cop investigating the massacre of 23 I Witness 2003 campesinos in Mexico find links to drug cartels, dirty cops, and a multinational corporation embroiled in a union election. A soldier and a civilian awake 500 years in Idiocracy 2006 the future from a top-secret military hibernation experiment that goes bad . 353 America has devolved into a dystopian society where everyone is intellectual ly challenged and void of morals. An Italian cop investigating the Illustrious 1976 assassinations of several judges finds they are Corpses part of a neo-fascist “strategy of tension.” Big tobacco covers up the health effects of The Insider 1999 tobacco and silence a whistle-blower. Interpol agent investigates a banking cartel to The 2009 discover money laundering, political corrupt- International tion, war profiteering and assassination plots. A U.N. interpreter stumbles onto a plot to The 2005 assassinate a controversial African head of Interpreter state on the floor of the General Assembly. A critically ill ex-Marine sniper admits to his Interview with 2002 next-door neighbor that he assassinated the Assassin President Kennedy. Jacob’s The government performs chemical experi- 1990 Ladder ments on unwitting Vietnam soldiers. The DA of New Orleans prosecutes a co- JFK 1991 conspirator of the Kennedy assassination. The justice system has been replaced by a Judge Dredd 1995 corps of Judges whose role combines those of police officer, judge, jury, and executioner. A private eye and a football player learn the The Last Boy 1991 team owner is planning to assassinate a Sena- Scout tor who is blocking legalized sports betting. Lincoln’s assassination was a vast conspirac y involving Secretary Of War Edwin Stanton, Chief of National Police Colonel Lafayette The Lincoln 1977 Baker and some Northern politicians who Conspiracy wanted to stop Lincoln’s Reconstruction plan. The man killed at Garret’s farm was not John Wilkes Booth but James William Boyd. In the future the population and consumption

of resources are managed and maintained in Logan’s Run 1976 equilibrium by killing everyone who reaches

the age of thirty, except for the elite. 354 An amnesiac housewife learns that she is The Long Kiss 1996 actually a CIA assassin when her form er Goodnight colleagues come to eliminate her. Magnum Vigilante police murder criminals, their 1973 Force friends and other police. An innocent American touri st in England The Man Who stumbles on a plot by the heads of MI6 and Knew Too 1997 the KGB to bomb a treaty signing ceremony Little and reignite the Cold War. The 1962 Communist spies use mind control for a Manchurian 2004 political assassination. Candidate An innocent student finds his CIA agent Marathon 1976 brother murdered and is ensnared in an Man international Nazi money laundering plot. The corruption and intrigue surrounding a Michael major client of a law firm being sued in a 1998 Clayton class action case over the effects of tox ic agrochem-icals is explored. A billionaire industrialist steals space shuttles and uses his own to establish a space colony. He intends to kill everyone on Earth with a Moonraker 1979 toxin from a rare orchid. Once everyone is dead his space colonists would return and repopulate the planet. A former special forces officer goes on the Most Wanted 1997 run after being recruited into a murder squad and framed for the killing of the First Lady. A young man is picked to replace a fallen Mr. Smith Senator and he soon learns that a power Goes to 1939 millionaire from his state controls some Washington senators and congressmen. It reveals how corrupt and amoral the media Network 1976 is and how it manipulates its audience. An American soldier stumbles onto an assassination plot by ro gue American and The Package 1989 Soviet military officials who wish to prevent the signing of a nuclear disarmament treaty. 355 A journalist re-investigates the assassination The Parallax 1974 of a presidential cand idate and discovers an View organization that recruits assassins. The A psychotherapist becomes analyst to the President’s 1967 President and goes on the run from operatives Analyst of every intelligence agency on Earth. The A Senator is spirited away to a secret New Resurrection Mexico medical lab after a serious car crash. 1971 of Zachary His injuries are completely healed by a secret Wheeler organization that uses organs from clones. Revenge of A TV reporter goes to Stepford to learn why the Stepford 1980 it has the lowest crime and divorce rates in Wives America and the tightest real-estate market. 1975 Multinational corporations openly run the Rollerball 2002 world. In future people are constantly under Scanner 2006 intrusive high-technology police surveillance Darkly in the midst of a drug addiction epidemic. A veteran Secret Service agent is framed as a The Sentinel 2006 traitor, but stops an assassination attempt by the SS director of the president. An honest cop works to expose police Serpico 1973 corruption in the NYPD. Seven Days in A colonel discovers that rogue generals are 1964 May plotting a coup d’état against the President. Shadow The White House Chief of Staff conspires to 1997 Conspiracy assassinate the President. An ex-Marine sniper is framed for the murder The Shooter 2007 of an Ethiopian archbishop by a rogue secret private military company unit. The Sigma Multinational corporations conspire to 2010 Protocol manipulate the global economy. Silkwood 1983 A whistleblower at a nuclear plant is killed. A journalist hired to investigate a dead body at a gubernatorial campaign event stumbles Silver City 2004 onto a web of corruption involving the election and a mysterious copper mine. 356 The owner of Replacement Technologies makes pet clones and clones of people which Sixth Day 2000 is illegal. He seeks to have the “6th Day” laws repealed so he can sell people clones. A corrupt Atlantic City pol ice detective Snake Eyes 1998 investigates the murder of the Secretary of Defense while ringside at a boxing event. A team of industrial espionage experts are recruited by NS A agents to steal a mysterious Sneakers 1992 “black box,” only to discover too late that their employers are not really with the NSA. Soylent The world is on the verge of total collapse 1973 Green corpses are used as a key ingredient in food. This comedy depicts the fact that the Spies Like Us 1985 Mujahideen was an ally of the U.S. Corp. Genetic engineers achieve fame by splicing Splice 2009 together the DNA of different animals to create new hybrid animals for medical use. They are corny satirical flicks that depict a 1997 Starship warli ke dictatorship that begs people to 2004 Troopers I-III become citizens by joining the military and 2008 dying for the dictatorship. It shows how political expendiency trumps Spy Game 2001 loyalty and duty when a CIA agent is left to be executed when caught by the Chinese. The Stepford The rebellious children of Stepford and 1987 Children turned into obedient androids. The Stepford 1996 The Stepford men are replaced by androids. Husbands The Stepford A hou sewife suspects that the women of 1975 Wives Stepford are being replaced by androids. The Stepford A post-feminist suspects that the women of 2004 Wives Stepford are being replaced by androids. Remotely-controlled androids allow people to live through androids from the saf ety of their Surrogates 2009 homes. People are protected from harm and feel no pain when their surrogate is damaged.

357 A CIA agent, energy analyst, and an antitrust Syriana 2005 lawyer are embroiled in a web of corruption and assassination involving Big Oil. A CIA researcher goes on the run from the Three Days of 1975 agency after coming back from lunch to find the Condor all of his coworkers murdered. In this a dystopian future the populace is controlled through android police officers and THX 1138 1969 mandatory use of drugs that suppress emotion, including sexual desire. A CIA agent discovers a KGB spy ring with Topaz 1969 moles in every Western intelligence agency. A Diplomatic Security Service agent is U.S. 1998 framed for murder and treason and goes on Marshals the run to uncover the conspiracy. The attempted assassination of the White Vantage Point 2008 House occupier at an anti-terrorism treaty signing ceremony is more than meets the eye. A sex scandal prompts the president to have Wag the Dog 1997 minions and a film producer fabricate a war with Albania to distract the public. It depicts the savage greed of the corporate Wall Street 1987 raiders who believe “greed, for lack of a better word, is good.” Wall Street: This continues in its depiction of the savage Money Never 2010 greed of the corporate raiders , but also Sleeps focuses on the Federal Reserve Corp. FBI agents Mulder and Scully investigate the bombing of a federal building and stumble on The X-Files 1998 evidence of a conspiracy between aliens and a shadow government. xXx: State of The Secretary of War plots a coup d’'état 2005 the Union against the president. In an unnamed European country, a Z 1969 prominent opposition leader is assassinated by elements within the government.

358 Mankind splits into the Eternals and the Zardoz 1974 Brutals. The Eternals are sadistic maniacs who mistreat the Brutals and each other. Overpopulation and pollut ion forces a world

government to impose a 30-year ban on Z.P.G. 1972 procreation. Those who violate the ban are

executed. “Z.P.G.” (Zero population growth).

www.imdb.com/title/tt0986263

Watch this movie. It depicts the kind of world Big Brother wants for the masses until he decides to eliminate us. It is extremely dehumanizing and demented. It is a nightmare for real people and an utopian dream for insane megalomaniacs. 359

InfoWarsShop.com

360

APPENDIX F

COMPARISONS BETWEEN 1984 & TODAY

The comparisons between the fictional world of Eric Blair depicted in his 1949 book 1984 and today are fascinating. Blair wrote his book to warn the peoples of the world what the future would look like if they did not stand up to Big Brother and say NO!

1984 Today Usama bin Laden/ Emmanuel Goldstein/Brotherhood Al Qaeda/Muslim terrorists World Wars I, II, Korea, Vietnam, Perpetual war Afghanistan, Iraq Constant surveillance of people Chapter One Constant eavesdropping Chapter Six Watching people via TV Watching via Cable box pp. 58-60 Bushes, Cheney, Gingrich, Barney Criminals in government Frank, Helms, Rostenkowski 1 Fox, ABC, CBS, CNN, CNBC, Propaganda NBC, newspapers, magazines, etc. Playboy, Penthouse, Hustler, Pornography DVDs, Internet, etc. Lusitania, Maine, Pearl Harbor, Waco, Oklahoma City, 911, Altering history assassinations of Lincoln, Garfield, McKinley, Kennedys. Torture of dissidents Bradley Manning 2 rendition 3 Murder of dissidents Danny Casolaro 4 Gary Webb 5

Notes

1. http://wiki.answers.com/Q/How_many_US_senators_and_congressmen_are_c onvicted_felons & http://www.foxnews.com/story/0,2933,59146,00.html. 2. http://www.bradleymanning.org/learn-more/bradley-manning. 3. http://en.wikipedia.org/wiki/Extraordinary_rendition_by_the_United_States. 4. http://en.wikipedia.org/wiki/Danny_Casolaro. 5. http://en.wikipedia.org/wiki/Gary_Webb. 361

Read your Bible, study It, memorize It and meditate on It daily.

362

APPENDIX G

DUTY OF ALL CHRISTIAN PATRIOTS

The conspiracy to create a “New World Order” is a Satanic conspiracy. The Bible commands Christians to resist the devil (James 4.7; 1 Peter 5.8-9), rebuke the wicked (Proverbs 24.24-25), keep the law to strive against the wicked (Proverbs 28.4) and expose their evil deeds (Ephesians 5.11). The resistance of Satan and his minions can take many forms. Each Christian Patriot must decide how he will resist the devil and the forces of darkness (Ephesians 6.12). Most Christians in America have not shed blood in resisting sin (Hebrews 12.3-4), yet the time will come when millions of Christians around the world will be martyred for their faith by the Antichrist and his minions. Here are some ways you can resist Satan’s New World Order:

Read, study, memorize and meditate on Scripture and pray daily. Become self-sufficient. Boycott Big Brother companies (Appendix A). Do not buy products made in Red China. Do not submit to illegal practices (TSA groping, unlawful searches). Do not give up your biometric data. Do not sign up for rewards cards. Do not buy things over the Internet. Do not use checks. Use money orders which are anonymous. Do not go into debt. Destroy your credit cards. Do not use illegal drugs. Do not break any lawful laws. Keep informed of what Big Brother is doing. Warn others about the conspiracy to establish a New World Order. Attend city council meetings. Attend meetings of your congresscritters. Write, email and call your congresscritters demanding they abolish the Federal Reserve Corporation and the federal income tax. Attend protests. Stay healthy. Eat a proper diet and get daily exercise. Be a PrisonPlanet.tv member (www.prisonplanet.tv). 363 A Christian who is unwilling to take a stand against the wicked is like “ a troubled fountain, and a corrupted spring ” (Proverbs 25.26).

InfoWarsShop.com

364

APPENDIX H

BILL OF RIGHTS

Amendment I

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

Amendment II

A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms , shall not be infringed .

Amendment III

No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.

Amendment IV

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated , and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Amendment V

No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor 365 shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.

Amendment VI

In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence.

Amendment VII

In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.

Amendment VIII

Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.

Amendment IX

The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.

Amendment X

The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.

366

BIBLIOGRAPHY

Bergen, Peter L., Holy war, Inc.: Inside the Secret World of Osama bin Laden . New York, N.Y.: Free Press. 2001.

Friedman, John S. The Secret Histories: Hidden Truths That Challenged the Past and Changed the World . London: Macmillan. 2005.

Goldstein, Robert Justin. Political Repression in Modern America: From 1870 to 1976 . Champaign, Illinois: University of Illinois Press. 2001.

Hixson, Walter L. Military Aspects of the Vietnam Conflict . London: Routledge. 2000.

Loftus, John; Aarons, Mark. The Secret War Against the Jews: How Western Espionage Betrayed The Jewish People . New York, N.Y.: St. Martin’s Griffin. 1997.

Napoli, Russell P. Intelligence Identities Protection Act and Its Interpretation . Hauppauge, N.Y.: Nova Publishers. 2005.

Orwell, George. 1984 . New York, N.Y.: New American Library of World Literature, Inc. 1961.

Orwell, George. “Politics and the English Language” December 11, 1945. Published independently as a Payments Book, later printed in Horizon , April 1946.

Quigley, Carroll. Tragedy and Hope . New York, NY.: MacMillan Company. 1966.

Theoharis, Athan G. and Immerman, Richard H. The Central Intelligence Agency: Security Under Scrutiny . Greenwood Publishing Group. 2006.

Wright, Lawrence. The Looming Tower: Al-Qaeda and the Road to 9/11 . New York: Knopf. 2006.

367

NOW THAT YOU HAVE READ THIS BOOK

YOU ARE THE RESISTANCE!

368