National Security Agency (NSA)

Hello Israel I: Dancing Israelis and Artistic Pursuits

 By M.K. Styllinski

We are benefiting from one thing, and that is the attack on the Twin Towers and Pentagon, and the American struggle in Iraq. [The events] swung American public opinion in our favor.

– Benyamin Netanyahu, April 2008 

***

It’s very good.” … “Well, not very good, but it will generate immediate sympathy.

– Benyamin Netanyahu’s response after being asked what the attack meant for relations between the United States and Israel. [1] [2] 


Andrey Kosyakov, former assistant to the chairman of the Russian Congress and a specialist in International Security was in no doubt that only one state and one intelligence grouping could have the capability and knowledge to pull off the monumental false flag operation that was 9/11. With factions within the US administration and an extensive Israeli spy ring already ensconced within it, the logistical support and overall high level access was already present.

If you were told that a group of five “Middle Eastern men” had set up their video cameras prior to the attack and had been observed laughing, joking and video-taping themselves immediately after the two planes hit, you would be forgiven for being slightly sceptical, even bewildered by such a story. [3] According to many eye-witness reports this was no aberration or childish attempt to shock but a virtual celebration which continued against the backdrop of the smouldering Twin Towers for several hours.

New Jersey residents described their observations of the men who were : “… going to extreme lengths to photograph themselves in front of the wreckage,” and “… shouting in what was interpreted as cries of joy and mockery.” [4] Liberty State Park, a roof in Weehawken and later on in the day a Jersey City parking lot were all eye-witness scenes of laughter, “high fives” and general merriment. In particular, an eyewitness named “Maria” who had written down the license plate number of the van and called the police, later recalled: “They seemed to be taking a movie. They are taking video or photos of themselves with the WTC burning in the background.” Maria remembered their expressions which were: “… happy, you know… They didn’t look shocked to me. I thought it was very strange.” [5]

An anonymous phone-call also led police to be on the look-out for a white, 2000 Chevrolet van with “Urban Moving Systems” driven by “Arabs” acting suspiciously. Tunnels and Bridges in the New York area were closed and before the long the van was stopped on Route 3 in East Rutherford area and the eight occupants apprehended, minutes after the first plane hit. Rather than Muslims as one might expect, the five men first claimed to be Israeli tourists though later they admitted they worked for a moving company based in New Jersey. Sivan Kurzberg, the driver of the van told police officers: “We are Israelis. We are not your problem. Your problems are our problems. The Palestinians are your problem.” [6] Strange, in view of the fact that the Palestinian struggle was hardly a pressing concern to NYPD officers. Unless of course, it was a projected concern of the Israelis who had just been laughing their heads off at the WTC destruction.

The other passengers were Sivan’s brother Paul Kurzberg, Yaron Shmuel, Oded Ellner and Omer Marmari all of whom were in possession of maps, with certain places highlighted and box cutters (as the alleged hijackers were meant to have used) foreign passports, photos of the men standing in front of the smouldering WTC grinning and the presence of explosives as indicated by sniffer dogs. [7] A top-level investigator from Bergen County law stated in 2006, that: “There are maps of the city in the car with certain places highlighted … It looked like they’re hooked in with this [referring to the 9/11 attacks]. It looked like they knew what was going to happen…It looked like they knew what was going to happen when they were at Liberty State Park.” [8]

After weeks of interrogation the FBI concluded that at least two of the five were MOSSAD agents and all were on a MOSSAD surveillance mission with the Urban Moving Company providing cover for an Israeli intelligence operation:

After the five men were arrested, the FBI got a warrant and searched Urban Moving’s Weehawken, N.J., offices. The FBI searched Urban Moving’s offices for several hours, removing boxes of documents and a dozen computer hard drives. The FBI also questioned Urban Moving’s owner. His attorney insists that his client answered all of the FBI’s questions. But when FBI agents tried to interview him again a few days later, he was gone.

Three months later 2020’s cameras photographed the inside of Urban Moving, and it looked as if the business had been shut down in a big hurry. Cell phones were lying around; office phones were still connected; and the property of dozens of clients remained in the warehouse. The owner [Dominick Suter] had also cleared out of his New Jersey home, put it up for sale and returned with his family to Israel.” [9]

Recalling former MOSSAD agent Victor Ostrovsky’s observations, we see that this may not have been an isolated incident but rather a normal part of MOSSAD’s operating protocol from the Collections or “LAPS Dept.”where:  “Some business sayanim have a bank of 20 operators answering phones, typing letters, faxing messages, all a front for the MOSSAD. The joke is that 60 percent of the business of those telephone answering companies in Europe comes from the MOSSAD. They’d fold otherwise.” [10] One of the men later stated that: “our purpose was to document the event.” Although they were Initially held on immigration violation charges, they were released 71 days later and deported to Israel.

This should not be surprising either, since the FBI’s record on terrorism and CoIntelpro is widely known and best summed by a ridiculous statement from an FBI official who, after being asked to comment on the release of so many detained Israelis and the suggestion of foreknowledge told ABC News: “To date, this investigation has not identified anybody who in this country had pre-knowledge of the events of 9/11.” [11] It seems to have escaped the elite brains of the FBI as to how the Israelis would know there was an event to document without such foreknowledge. Since evidence abounds that this is clearly the case, the FBI proves yet again to exhibit stunning ignorance and naivety. More probable is that certain individuals were involved in a cover-up. Meanwhile, hundreds of MOSSAD agents appeared to be crawling all over the urban American landscape with moving companies and telecommunications serving as fronts.

The most widely referenced and oft quoted piece of reporting came from Carl Cameron’s December 2001, four-part news item which documented the existence of the largest spy ring ever to be uncovered in the history of US espionage. A total of 200 Israeli spies were arrested. [12] Ironically aired on Fox News, it was not long before the transcript was hurriedly removed from its own website closely followed by rapid attempts to purge the video and articles from all other media websites, with threats to prosecute should unauthorised use of the video and transcript be breached. Behind this panic attempt at erasing the report were the Anti-Defamation League (ADL) and various other Jewish groups intimidating free speech. Fox News was running scared. Obviously, Cameron had touched a nerve.

911-FOX-NEWS-ISRAELI-CONNECTIONS

Far more telling is the admission made by a US Official in part one of the report who said: “Evidence linking these Israelis to 9/11 is classified. I cannot tell you about evidence that has been gathered. It’s classified information.” Cameron carefully documents the presence of Israeli agents masquerading as art students just prior to the September 11th attacks which was part of an extensive intelligence operation designed to circumvent federal drug investigations. Parallel to these findings was the massive takeover of the telecommunications industry as cover for a network of eaves-dropping via companies such as Amdocs Ltd. [13]

It was in January 2000, that these Israeli “art students” began appearing at the offices of the US Drug Enforcement Agency (DEA) in teams of eight each with an assigned team leader. Their apparent goal was to sell their artwork but when teams began appearing in over 42 towns and cities across the US with claims that students were enrolled in non-existent Universities that suspicions became more pronounced. [14] Sightings of the students were also reported in and around 36 Department of Defence locations leading to over 140 arrests and detainments of Israelis from March 2001 up to the day of the 9/11 attacks. In one KHOU Channel 11 report, Dallas was also targeted where: “… so-called students hit early this year at the city’s FBI building, the Drug Enforcement Administration and at the Earle Cabell Federal building, where guards found one student wandering the halls with a floor plan of the building.” [15] A further 60 found working at shopping mall kiosks were also detained and deported. [16]

A detailed 2002, DEA report was subsequently leaked to media and the internet which revealed the vast majority of Israeli art students interviewed by US investigators not only had family and security connections to the Israeli Army but specialist military backgrounds which included expertise in intelligence, electronic surveillance and explosives. The report concluded: “That these people are now traveling in the U.S. selling art seems not to fit their background.” [17]

You don’t say?

All this begs the question why an obvious Israeli spy ring was examined at the highest levels of the Bush administration, and with Intelligence Online editor Guillaume Dasquié in March 10, 2002: “… was informed by a Justice Department official that the DEA report had been handed over to the Department’s Joint Terrorism Task Force, and that same day at a DEA press conference, Asa Hutchinson, the DEA head, said that he had passed the document along to ‘other agencies’ working on the matter.”

But nothing happened.

Investigative journalist Tom Flocco makes the inevitable conclusions:

“The evidence raises serious questions as to how the French government was able to report strong evidence of Israeli espionage in America, yet the FBI, CIA, NSA, Justice Department and the White House were unable to identify the spies while denying the existence of Israeli espionage despite a multi-billion dollar budget and the finest equipment and training.

Guillaume Dasquié reported that the Israeli operatives were living close to Arabs in San Diego, Little Rock, Irving, Texas and in South Florida where 10 of the 19 September 11 “hijackers” lived, speculating that the Israelis had advanced knowledge of the attacks but had not passed on the critical intelligence to the Bush administration who would likely spend blood and treasure to retaliate against Muslim terrorists—notwithstanding a little war profiteering on the side.

The independent AFP said “What is not clear is what the ring of more than 120 agents was up to and why some Israelis linked to the attacks in New York and Washington, DC were allowed to flee or were sent back to Israel after 9/11 on visa violations, rather than being charged and prosecuted.

According to other reports, alleged lead “hijacker” Mohammed Atta lived at 3389 Sheridan St. in Hollywood, Florida while a team of Israeli operatives lived a few blocks away at 4220 Sheridan.” [18] [Emphasis mine]

The classified military operation “Able Danger” created by the Joint Chief of Staff in 1999 and led by the U.S. Special Operations Command (SOCOM) and the Defense Intelligence Agency (DIA) was said to have uncovered various Al-Qaeda cells, including the 9/11 suspects in New Jersey. Yet, the key hijackers were allowed to move and around freely without interference from intelligence and US authorities. The fact that American intelligence operatives were routinely blocked and stone-walled has an enormous body of evidence, largely from intelligence whistle-blowers.  Lt. Col. Anthony Shaffer is one of many who has publicly expressed serious doubts about the government’s version of 9/11, suggesting that some within the FBI and CIA were facilitating the 9/11 plot. [19]

Why is it beyond the realms of possibility that Israeli Zionists not only had “advanced knowledge of the attacks” but had a hand in the operation? Why else would MOSSAD agents be carting around explosives and ordinance maps in more than one white van? [20] But this is still classified, and according to Carl Cameron: “Investigators within the DEA, INS, and FBI have all told Fox News that to pursue or even suggest Israeli spying is considered career suicide.” [21] It is little wonder that Zionist influence in the US is as strong as it has ever been and its relationship to the events of 9/11 remain unchallenged, the media judging it unimportant for public awareness.

mossad-sealAlthough many in the alternative media highlighted the presence of Israeli spies within the US pre and post-9/11 perhaps one of the most comprehensive and objective summaries given to the 9/11 Commission Report was the Shea Memorandum penned by Gerald Shea, a retired corporate lawyer. An alumnus of Phillips Academy, Yale and Columbia Law School, with many years experience working in the best Paris and New York law firms, Shea brought his considerable skills to bear on the subject of Israeli spies, offering a cogent and compelling evaluation of the facts. What follows is a lengthy extract from page 49 of the memorandum and which offers a 13-point summary of his findings:

Set forth below is a detailed summary of the tentative conclusions reached in this memorandum, which amply illustrate the urgent need for a public inquiry into the activities of the Israeli DEA Groups and the Israeli New Jersey Group. The inquiry must include, without limitation, the examination of members of the Israel Groups and related persons; officials of the Israeli government and certain of its agencies, including Mossad; FBI suspects, agents of the DEA, the INS and the FBI; certain local law enforcement officials; agents of the CIA (in camera to the extent required); other intelligence sources cited by the public press to the extent possible; the boxes of documents and computer hard drives (referred on page 29) seized by the FBI from the Israeli New Jersey Group; and of all other relevant documents, reports, communiqués and information.–

1. The Israeli DEA Groups were spying on the Drug Enforcement Agency and thus upon the United States. The DEA itself has concluded that they were probably engaged in organized intelligence gathering on our soil.

2. A highly regarded American journal knowledgeable about Israeli affairs, has concluded (a) based on its own sources, that the Israeli DEA Groups were spying on radical Islamic networks suspected of links to Middle East terrorism, and (b) based on the representations of a former American intelligence official regularly briefed on these matters by law enforcement officials, that (i) at least two members of the Israeli New Jersey Group were Mossad operatives, (ii) Urban Moving, the company used by the Israeli New Jersey Group, was a front for Mossad and its operatives, and (iii) the Israeli New Jersey Group was spying on local Arabs.

3. The intelligence sources of a substantial American television network report that the Israeli DEA Groups may have gathered information about the September 11 attacks in advance, and not shared it with the United States. One investigator said that evidence linking the Israeli DEA Groups to such intelligence gathering was classified and could not be disclosed.

4. The Israeli DEA Groups were comprised of 125 or more Israelis operating on our soil. Their leaders and apparent associates included military commanders and experts with military backgrounds in intelligence, electronic intercepts and telecommunications.

5. The wiretapping and intelligence expertise of members of both Israeli Groups, and the use of vans in local neighborhoods where the future hijackers were planning the attacks, and the extensive use by the hijackers of cell phones and land lines, made the Israeli Groups ideally suited to gather information regarding the hijackers’ plans.

6. The principal operation of the Israeli DEA Groups was located in and around Hollywood, Florida, the central training and staging ground for the hijacking of North and South Tower Planes and the Pennsylvania Plane. The addresses and places of residence of the members of the Israeli DEA Groups in Hollywood itself were within hundreds of yards those of the future hijackers.

7. The operations of both the Israeli New Jersey Group and the hijackers of the Pentagon Plane were centered in Hudson and Bergen Counties in New Jersey, within a common radius of about six miles.

8. All five celebrating members of the Israeli New Jersey Group arrested on September 11 were aware, when the North Tower Plane struck the World Trade Center, based on their immediate reaction to the attack and the information said to be contained in their van, that the attack had been planned and carried out by Arab terrorists.

9. After being questioned by the FBI on September 11, the leader of the Israeli New Jersey Group immediately fled the United States to Israel. His name and aliases appear, along with those of the hijackers and other FBI suspects, on the May 2002 FBI Suspect list.

10. Israeli intelligence officials have reported that two senior officials of Mossad warned the United States in August 2001 that as many as 200 terrorists on American soil were planning an imminent large-scale attack on high visibility targets on the American mainland. One press report states that in August Mossad provided the CIA with the names of future hijackers Khaled al Mihdhar and Nawaf al Hazmi.

11. The CIA’s explanation of how Mihdhar’s and Hazmi’s names were placed on the Watchlist through the spontaneous efforts of CIA and FBI agents is not only difficult to follow but, as the sole reason for the Watchlisting, hardly credible.

12. Mossad’s own information appears to have come from its sources inside the United States. All of the facts and circumstances set forth in this memorandum appear to show that Mossad’s two likely sources of information were: (a) the Israeli DEA Groups, comparable in number to that of the Arab suspects and who appear to have tracked the future hijackers in their central places of operation and in other states, and (b) the Israeli New Jersey Group, operating through their Mossad front in another principal locus of operations of the future hijackers, two of whom were Mossad agents, and five of whom appeared immediately aware of the origin of the attacks on September 11.

13. While little direct evidence supports the contention that the CIA was aware of or condoned the Israeli Groups’ tracking of Arab terrorist groups in the United States prior to September 11, the CIA’s pressing for the expulsion of members of the Israeli DEA Groups when they were detained before September 11, their failure to cooperate with the FBI, their circuitous explanation of how the above two hijackers were placed on the Watchlist, and other relevant considerations require that the issue be taken up as a part of the public inquiry into these painful events.

Unfortunately, Shea’s contribution to the 9/11 Commission missed the final report deadline, though it is doubtful the material would ever have been included should it have been submitted from the start.

What appears to be beyond doubt is that a very large Israeli spy ring with a specific remit regarding 9/11 was actively engaged within the United States several months prior to September 11th.  Moreover, Israeli agents were located in Hollywood, Fla., and in New Jersey, Bergen and Hudson – exactly the same areas where the alleged 9/11 hijackers lived and prepared their attacks.  None of this information was shared with US authorities, although some key officials were in the know.

If the Israeli spy ring was initially working with the CIA as an outsourced body whose task it was to monitor and collect data on Arab terrorism, there appears to have been a 5th column within American intelligence working with Israel on a huge entrapment/facilitation operation and/or the complete creation of the 9/11 false flag itself. Able Danger might have circumnavigated this large-scale black ops by converging with the covert planning of the attacks and therefore had to be reeled in. It was likely to be a very fine balance of “need-to-know” parried with downright obstruction of duty. This included willful ignorance of lead hijacker Mohammed Atta, who appeared to have  been given a free reign to do as he pleased.

Were they fully paid up agents sacrificed at the eleventh hour?

Indeed, like Lt. Colonel Shaffer and others,  J.D. Smith, was a defense contractor who also worked on “Able Danger” helping to gather open source information, analysis of government spending and statistics for the unit. He claims that he was: “…absolutely positive that he [Atta] was on our chart among other pictures and ties that we were doing mainly based upon [terror] cells in New York City…”  [22] Yet, he was purposefully ignored – even protected – by Israelis and high-level directors within the CIA and FBI, much to the frustration of many operatives.

To see how and why such a lop-sided state of affairs could exist, we have to go deeper into the various Israeli players operating as a social, political and economic fifth column inside the United States.

 


Notes

[1] ‘Report: Netanyahu says 9/11 terror attacks good for Israel’ According to Ma’ariv, Netanyahu said Israel is ‘benefiting from attack’ as it ‘swung American public opinion.’ By Haaretz Service and Reuters | Apr. 16, 2008.
[2] ‘A DAY OF TERROR: THE ISRAELIS; Spilled Blood Is Seen as Bond That Draws 2 Nations Closer’ By JAMES BENNET, New York Times, September 12, 2001.
[3] ‘One Arrested, Others Detained at NY Airports,’ September 14, 2001, FoxNews.com | ‘After the Attacks: The Investigation; Bin Laden Tie Cited.’ By David Johnston and James Risen, The New York Times, September 13, 2001.
[4] ‘U.S. arrests of Israelis a mystery – Most charged with immigration violations either have been deported or will be’ By Doug Sanders, The Globe and Mail, With a report from Associated Press, December 17, 2001 – Print Edition, Page A7. | ‘Five Israelis detained for ‘puzzling behavior’ after WTC tragedy’ By Yossi Melman, Ha’aretz September 17, 2001.
[5] ‘Were Israelis Detained on Sept. 11 Spies?’ By ABC News ABC20/20, June 21, www. abcnews.go.com/2020/story?id=123885&page=1#.UI6e_2eItdo
[6] Ibid.
[7] ‘Dozens of Israeli Jews are being Kept in Federal Detention’ By Tamar Lewin and Alison Leigh Cowan, The New York Times, November 21, 2001. | ‘Spy Rumours Fly on Gusts of Truth: Americans probing reports of Israeli Espionage.’by Marc Perelman, Forward March 15, 2002.
[8] ‘Five men detained as suspected conspirators’ By Paulo Lima Staff Writer Bergen Record, (New Jersey), September 12, 2001.
[9] op.cit ABC News
[10] op.cit Ostrovsky.
[11] op.cit ABC News.
[12] Part 1: Carl Cameron Investigates FNC December 17, 2001. This partial transcript of Special Report with Brit Hume, Dec. 11, was provided by the Federal Document Clearing House. c/o http://whatreallyhappened.com/WRHARTICLES/Israeli-Spying-Part-1.htm
[13] ‘Congress hides Israeli telecom spying, permits ‘classified’ FISA evidence’ By Tom Flocco, October 4, 2012. www. councilforthenationalinterest.org/
[14] ‘Intelligence agents or art students?’ by Paul M. Rodriquez, Insight on the News, April 1, 2002.
[15] ‘Hundreds of MOSSAD Agents Caught Running Wild in America’ By Warren Royal, Originally posted at http://www.la.indymedia.org/news/2003/07/74953_comment.php?theme=1| ‘Israeli Caught up in Terror Sweep’ The Austin American-Statesman, November 25, 2001, pg. A-11.
[16] ‘The Israeli ‘Art Student’ Mystery,’ by Christopher Ketcham, Salon.com, May 8, 2002.
[17] ‘U.S. Deports Dozens of Israelis,’ by Ted Bridis, Associated Press, March 6, 2002.
[18] op. cit Flocco.
[19] See profile on http://patriotsquestion911.com/
[20] ‘Mossad Truck Bombs on Sept 11’ http://www.youtube.com/watch?v=3aKj6uJ5Mt4 | “Rare recording of Police radio from September 11th 2001. Police capture 2 Mossad agents caught delivering a Truck Bomb next to the WTC building in New York City. Even though they were caught by Police and arrested, they were then let go back to Israel by the Bus administration.”
[21] op. cit Cameron.
[22] ‘Third Source Backs ‘Able Danger’ Claims About Atta’ August 28, 2005, FoxNews.com

Advertisement

The Terror Industry (2)

“The FBI isn’t nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own”

– Trevor Aaronson: The Sting: How the FBI Created a Terrorist


US-FBI-ShadedSeal.svg

The Seal of the United States Federal Bureau of Investigation

The Politics of Entrapment explored US, British and European sting operations against sex offenders and would-be terrorists. We re-visit the subject from the standpoint of  global terrorism in order to take a more detailed look at the FBI’s role and the historical basis of a strategy of tension, a formula which has been a standard tactic for as long as the State has existed. Indeed, one cannot exist without the other it seems. The American public remains ill-informed about the billions of dollars taken from tax payers to keep the treadmill of the perpetual war on terror and security framework operational. Perhaps this is no surprise, since the censorship in the mainstream media reached No.4 on Project Censored’s most under-reported stories of 2012.

The Federal Bureau of Investigations (FBI) is sitting astride a network of 15,000 spies, most of whom are criminals who have infiltrated a cross-section of ethnic communities in an attempt to uncover terrorist plots. Rather than foiling potential terrorism  – most of which would have been as a direct result of American foreign policy in the first place i.e. “blowback” – these agents provocateurs are responsible for encouraging crimes against civilians and government with a substantial cash reward should they deliver. Since 9/11, over 150 men have been caught in FBI terrorism entrapment operations receiving a sentence of 25 years or more in prison. These unhappy young men had their lives ruined whilst providing essential PR for the FBI and substantial profits for security firms, law enforcement, weapons manufacturers and the US military, justifying the flow of tax dollars, funnelled from a treasury that continues to print money out of thin air.

Although there are many books that cover the complex history of state-sponsored terrorism today, award-winning journalist Trevor Aaronson was one of the first to fully document the FBI’s endeavours in fake terror plots in his 2013 book The Terror Factory: Inside the FBI’s Manufactured War on Terrorism. [1] Interviewing case officers and FBI Task Force leaders as well as informants themselves, he documents case after case of undercover agents groomed for entrapment operations. One of these was Quazi Nafis who received 30 years for planning to bomb the New York Stock Exchange in 2012. A fake Al-Qaeda operative and informant known as “Kareem,” was instrumental in his grooming and subsequent capture.

Nafis didn’t have any explosives nor the finances or contacts to acquire it, he was merely a disaffected youth of meagre intelligence, burning with understandable hatred for Western imperialism. Through Kareem, the FBI would provide him with all he needed to carry out the attack which included: “… not only the storage facility and supposed explosives, but also the detonator and the van that Nafis believed would deliver the bomb. …” But it was not to be: “On the morning of October 17, Nafis and Kareem drove the van to Lower Manhattan and parked it in front of the Federal Reserve Bank on Liberty Street. Then they walked to a nearby hotel room, where Nafis dialed on his cellphone the number he believed would trigger the bomb, but nothing happened. He dialed again, and again. The only result was Nafis’ apprehension by federal agents.” [2]

dreamstime_s_17720730

© Davidalary | Dreamstime.com – Fingerprint Photo

Some of the more high profile cases include the conviction of a group of young black men known as the Newburgh Four who were jailed in June of 2011 for an alleged 2009 terrorist plot to fire a Stinger missile at US military planes. Career FBI informant and petty criminal Shahed Hussain was responsible for putting them there, offering enormous financial inducements to carry out the plot. The sum of money amounted to $250,000 for one man, free holidays and top of the range cars. He cruised the mosques looking for likely men with radical chips on their shoulders and who could be groomed accordingly. Yet, the men that he managed to find were not radical Islamists bent on terrorist atrocities but, as Paul Harris described, writing for The Guardian, on December 12, 2011, these were: “… impoverished individuals struggling with Newburgh’s grim epidemic of crack, drug crime and poverty. One had mental issues so severe his apartment contained bottles of his own urine. He also believed Florida was a foreign country.” The report stated further: “As defence lawyers poured through the evidence, the Newburgh Four came to represent the most extreme form of a controversial FBI policy to use invented terrorist plots to lure targets.” Professor Karen Greenberg, a terrorism expert at Fordham University observed: ‘There has been no case as egregious as this. It is unique in the incentive the government provided…” [3]

Now, “unique” has become pedestrian.

The case of the Fort Dix Five also deserves a mention. Arrested in May of 2007, on charges of plotting to kill US soldiers at Fort Dix, New Jersey, a DOJ press report from June 5 read: “The five defendants are charged with conspiracy and other charges related to their plans to kill as many soldiers at the Army base as possible. A sixth man was indicted for aiding and abetting the illegal possession of firearms by three members of the group.” Mohamad Ibrahim Shnewer (an ethnic Jordanian) and Albanians Dritan Duka, and Eljvir Duka, Serdar Tatar (a Turk) and were charged with: “conspiracy to murder members of the uniformed services” along with the “unlawful possession of machine guns” and “illegal alien” status. The fifth member, Agron Abdullahu an ethnic Kosovar was charged with “aiding and abetting the Duka brothers’ illegal possession of weapons.”

The Jewish Anti Deformation League (ADL), the right-wing evangelist Pat Robertson and a coterie of authoritarian organisations displayed a vengeful glee at what were clearly trumped up charges. Referring to the ADL’s gloating of the defendants sentences of life imprisonment in 2008, geopolitical analyst Stephen Lendmen commented: “Imagine their comments if five Israeli Jews had been convicted on the same charges instead of Muslims: “No plot, No crime, so the FBI invents guilt with an entrapment sting operation – its usual modus operandi to ensnare the innocent.”

In his 2008 article on the Fort Dix Five he describes the entrapment narrative which trapped the men:

At a Cherry Hill, NJ Circuit City store in January 2006, Mohamad Shnewer innocently wanted a home video transfered to DVD. It showed men shooting weapons at a Pocono Mountains firing range, playing paintball (an innocent game in which opposing teams try to eliminate opponents by marking them with water-soluble dye shot in capsules from air guns), and repeating Arabic phrases like Allah Akbar (meaning God is Greatest). The store clerk called the police. They notified the FBI. They began investigating and recruited two dubious informants to help.

Each knew nothing about the other. One was Besnik Bakalli, an ethnic Albanian, who falsely told defendants he was a Kosovo Liberation Army (KLA) veteran – the US/Germany supported terrorist group recruited to destabilize Kosovo/Serbia in the 1990s. At trial, however, he testified that he fought for no group and knew nothing about Islam or extremists calling for jihad.

Mahmoud Omar was the other informant, an Egyptian-born used car salesman/mechanic on probation for bank fraud. He and Bakalli entered the US illegally and faced likely deportation or worse. They were easily recruited, so cooperated, and were well compensated for their efforts – thousands of dollars a month, and according to defense lawyers, Omar (from when recruited in March 2006) will have earned $238,000 for his efforts. NewJersey.com believes more – over $240,000 plus rent and other expenses, and, of course, leniency in handling their charges. Bakalli was used for a shorter period and reportedly was paid about $150,000. The FBI also relocated his parents to America as an added incentive to cooperate. [4]

Perusing the trial evidence it was clear that there was no plot except what the FBI could dig out of their bag of tricks to justify their entrapment program and the subsequent arrests. Though hostile to America’s wars against Iraq and Afghanistan and an obvious faith in the religion of Islam, all five maintained their innocence, a certainty that remained throughout their arrest and trial.

fbi-entrapment

It seems the FBI can disrupt service utilities to a house and pretend to be helpful technicians in order to gain entry and covertly search the premises in order to “find” evidence that might later justify a search warrant. [5]

Five black US citizens and two Haitian nationals from Liberty City one of the poorest sections of Miami were arrested in 2006 and accused by the FBI of attempting to blow up the Sears Tower and several federal buildings. Known as the Liberty City Seven, two mistrials from 2007 – 2008 was followed by a third trial which ended on May 12, 2009. Naudimar Herrera was acquitted but the five remaining defendants Narseal Batiste, Patrick Abraham, Stanley Grant Phanor, Burson, Augustin and Rothschild Augustine all received prison sentences between from 6-14 years and lengthy supervised release orders. Yet, it was perhaps one of the most blatant cases of corrupt entrapment practices yet seen.

Announced with the usual triumphant propaganda from government sponsored media lackeys and commentators, the foiled plot was hailed as a triumph against an attack which could have been “bigger than September 11th.” As the prime mover in the alleged cell was an FBI informant posing as an Al-Qaeda go-between, the “evidence” was likely concocted by FBI informants rather than the existence of any tangible threat.

According to the press release ‘Transcript of Press Conference Announcing Florida Terrorism Indictments’ from the Department of Justice on 23 June 2006, payments for services rendered by four informants amounted to over $160,000. Deputy Director John Pistole even admitted that the so-called plot was: “… more aspirational than operational.” The accused did not have any genuine contact with Al-Qaeda, nor did they have explosives or weapons since the only source would have been through the FBI’s informant. The director assured the press that the individuals posed no danger. After the indictments two local community activists were interviewed by Democracy Now! Online news and summarised the ludicrous nature of the charges:

“a lot of show has been made about the militaristic boots that they had… [I]t turns out… the FBI bought them the boots. If you look at the indictment, the biggest piece of evidence… is that the group ,may have taken pictures of a bunch of targets in South Florida. But the guys couldn’t afford their own cameras, so the federal government bought them the cameras… The federal government rented them the cars that they needed to get downtown in order to take the pictures. In addition… the men provided the FBI informant with a list of things they needed in order to blow up these buildings, but in the list they didn’t include any explosives or any materials which could be used to make explosives. So now everyone in Liberty City is joking that the guys were going to kick down the FBI building with their new boots, because they didn’t have any devices which could have been used to explode…” [6]

As many of the informants are illegal immigrants waiting on their entry status or criminals given immunity in return for working for the FBI, there is a ready and willing supply for identifying potential terrorists and as Trevor Aaronson explains: “… in some cases even planting specific ideas for attacks.” He also poses questions that politicians, many academics and the majority of mainstream journalists have not seen fit to ask, namely: “How many of these would-be terrorists would have acted were it not for an FBI agent provocateur helping them? Is it possible that the FBI is creating the very enemy we fear?” And most importantly: “Federal officials say they are protecting Americans with these operations—but from whom? Real terrorists, or dupes like Nafis, who appear unlikely to have the capacity for terrorism were it not for FBI agents providing the opportunity and means?” [7]

Occupy Wall Street© unknown

Even the Occupy Wall Street Movement has been embroiled in the same entrapment procedures. The FBI has blew its own its own trumpet all over the media and claimed it had once again foiled a terrorist plot, this time, to blow up a Cleveland bridge. Five members of Occupy Cleveland: Douglas Wright, 26, Brandon Baxter, 20, Connor Stevens, 20, Anthony Hayne, 35, and Joshua Skelly 24, were each sentenced to between 6-11 years charged with conspiracy and the use of explosive materials. Despite cooperating with plea deals given by three of the men, so-called “terrorism enhancements” were used by the presiding judge to increase sentences. Douglas, Brandon and Connor’s appeals were denied. Skelly rejected a plea bargain and chose to take it to trail. Consequently, he was found guilty on all counts and received a ten year sentence. As of early 2015, he is still waiting for his appeal.

As with so many similar “plots” the usual paid FBI informant featured heavily.  Shaquille Azir had a criminal history (leverage for bargaining) and was placed undercover within the Occupy Movement for several months. He eventually delivered the defendants to the FBI as ready-made “terrorists” all of whom had at one time been homeless or without work. Not only had the FBI provided alcohol, drugs and accommodation for the young men, through Azir, but they told the informant to create a sense of dependency within the group with various promises of assistance tailored to their individual needs. It seems Azir had his job cut out to get them interested.  According to the website:  www.cleveland4solidarity.org set up as a campaign to free the men: “They all continue to fight against the government’s attempt to brand them as terrorists and to expose the techniques of entrapment employed by the FBI and their informants.”  The case of one of many, all of which follow the same patterns. [8]

occupycleveland5L-R: Connor Stevens, Brandon Baxter, Douglas Wright, Anthony Hayne (now released) and Joshua Stafford

There are many other cases popping up in America and Europe. One of the most important was the April 2013 Boston Marathon Bombings which saw the entrapment and framing of Tamerlan and Dzhokhar Tsarnaev – a classic false flag operation designed to dupe the public and engender maximum reaction for domestic and geopolitical ends. [9]

So, how did it come to this? Like most ponerological symptoms they infect the body politik very quickly.

Stemming from the 1970’s and 80’s sting operations of the US Drug Enforcement Administration (DEA) the FBI gradually came under its jurisdiction in the face of increasing trade in illicit drugs. The terrorist sting is based on these drug raids with certain differences that make the practice highly controversial. Briefcases full of cocaine or heroin were substituted with empty ones in front of hidden surveillance cameras after which the agents would pounce on their unsuspecting criminals. This defined raids for decades and which were faithfully reproduced in Hollywood cinemas. Now, the terrorist sting generally involves faulty guns and dud bombs. Aaronson points out the fundamental flaw in terrorist stings compared to drugs raids and that which leads to a progressive corruption of the already faulty principles on which they are based:

“In drug stings, federal law enforcement officials assume that any buyer caught in a sting would have been able to buy or sell drugs elsewhere had they not fallen into the FBI trap. The numbers support this assumption. In 2010, the most recent year for which data is available, the DEA seized 29,179 kilograms, or 64,328 pounds, of cocaine in the United States.

In terrorism stings, however, federal law enforcement officials assume that any would-be terrorists caught would have been able to acquire the means elsewhere to carry out their violent plans had they not been ensnared by the FBI. The problem with this assumption is that no data exists to support it—and in fact what data is available often suggests the opposite.

Few of the more than 150 defendants indicted and convicted this way since 9/11 had any connection to terrorists, evidence showed, and those that did have connections, however tangential, lacked the capacity to launch attacks on their own. Of the more that 150 defendants, an FBI informant not only led one of every three terrorist plots, but also provided all the necessary weapons, money, and transportation.

The informant goaded them on the whole time, encouraging the pair with lines like: ‘We will teach these bastards a good lesson.” For his work on the case, he received $100,000 from the FBI.’ ” [10]

Indeed, with an annual budget of $3 billion the FBI has both an ideological and financial incentive for keeping the war on terror mythology entrenched in the American public’s psyche. In order to find out how many of these “terrorists” would have acted without the entrapment ruse, Aaronson, with the help of a research assistant: “… built a database of more than 500 terrorism prosecutions since 9/11, looking closely and critically at every terrorism case brought into federal courts during the past decade.” Thousands of pages of court records were carefully analysed until a coherent pattern emerged. They found that: “… nearly half of all terrorism cases since 9/11 involved informants, many of them paid as much as $100,000 per assignment by the FBI.” The research team also found that: “… 49 defendants had participated in plots led by an FBI agent provocateur, and that number has continued to rise since.” What is more, as Muslim targets held particular personality types so too the informants. A typical pattern and profile of each were matched together.

The following typifies the patterns and personality profiles involved:

The Gold digger: Pattern: Target is broke and thinks he can make big money by catering to informant’s suggestions.

The Convert: Pattern: Target is a newcomer to Islam with only a rudimentary understanding of the religion; often also broke and/or homeless.

The Oath Taker: Pattern: Target swears a fictitious Al Qaeda oath made up by informant; is charged and convicted based on that oath

The Car Bomber: Pattern: Target and informant hatch plot together; FBI supplies vehicle, “explosives,” and phone to trigger the supposed bomb.

The Trainee: Pattern: FBI agent or informant offers to train target as a jihadist, most often via weapons instruction and bodybuilding.

The Subway Bomber: Pattern: With the exception of one attempt to bomb the New York City subway, all the headline-grabbing subway “plots” you’ve heard of were FBI-led nonstarters. [11]

The New York Times in 2012 reiterated the suspicion that it is highly unlikely that these young men would have had the means to execute terrorist plots “… without substantial assistance from the government.” [12] 

Just like the sexual predators in society, from occult ritual abuse to inter-generational abuse the idea promoted is that the lone paedophile and child rapist generally act alone. So too with the “lone wolf” terrorist as a useful asset to keep the cogs turning. Dupes or patsies need to found and groomed which is why the FBI uses its vast network of spies and the NSA’s surveillance to identify locate and monitor tomorrow’s disenfranchised Muslims with chips on their shoulders. Spies are embedded in every Mosque in the US are paid to profile those young men with anti-American views and ripe for radicalisation, thus suitable for sting operations. This is also occurring online across the breadth of social networks (See: Police State Amerika I: Facebook Thought Police…)

Under President Barack Obama’s National Security and Surveillance State, entrapment continues to grow, with a very wide definition as to who exactly is a terrorist. During the tail-end of the George W. Bush’s tenure the number of operations markedly decreased but since Obama’s presidency in January 2009, sting operations have not only resumed but increased in frequency. During Obama’s first term in office, the Justice Department prosecuted more than 75 targets of terrorism stings. Trevor Aaronson discovered that as an adjunct to Obama’s extrajudicial assassination teams, arrests from terrorism stings occur: “… at a rate of about one every 60 days, suggesting either that there are a lot of ineffective terrorists in the United States, or that the FBI has become effective at creating the very enemy it is hunting.”

worldmap1

Global Terrorism 2013. Red hotspots are combinations of incidents, fatalities and injuries. Yemen, Iraq, Pakistan and Afghanistan are the primary countries exhibiting terrorism hotspots. | Source: National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2013). Global Terrorism Database [Data file]. Retrieved from http://www.start.umd.edu/gtd

Even if we were to believe that somehow the history of terrorism is defined purely in terms of religious extremism seeking to enforce its will, we’d be barking up the wrong tree on this one too. Religious fundamentalism does not spontaneously arrive. In the vast majority of historical cases a vacuum emerges out of the chaos of economic depression, famine and most frequently from the influence of invading forces. In the last forty years British and American invasions have increased the likelihood of religious fundamentalism and the rise of terrorist groups simply through their neo-colonial ambitions. Consequently. these terrorist groups have been indirectly or directly created and further encouraged by Western powers.

It is foreign occupation which fuels terrorism not the perceived spectre of Islamism or any other extremist grouping; they are secondary results of policies which destabilise, balkanise and create collective trauma. These conclusions have been stated by researchers across the political divide for some years but only recently has it been shown beyond any doubt, that engaging in drone strikes and so-called interventionist polices in the Middle East weakens national security and increases terrorism, without exception. At higher levels of Pathocracy this is fully understood and required while at the lower levels of their followers’ greed and ignorance is enough to maintain these destructive dynamics. Factor in geopolitical plans stretching back many decades to claim the Middle East for ideological aims, to exploit resources such as natural gas, oil and minerals and you have all the reasons you need for the continuance of civilian atrocities, year after year.

Taking into account the presence of intelligence operatives and informants responsible for encouraging suicide attacks and those which occur “spontaneously”, extensive research published by the University of Chicago prove that over 95 percent of all attacks are in response to foreign occupation. [13]  The National Consortium for the Study of Terrorism and Responses to Terrorism (START) the Global Terrorism Database hosted at the University of Maryland has precise statistical data which supports the University of Chicago’s own findings. It is the most comprehensive open source terrorism database available to journalists and civilians alike. The results are a clear indictment of US and NATO foreign policy, all of which show a massive increase in terrorism since the Global War on Terror began 14 years ago. These charts below show the number of terrorist attacks recorded in the following countries:

alqaedaincidentsovertime_iraqIraq

terrorism_in_Afghanistan_since_2004Afghanistan

terrorism_in_the_Middle-EastMiddle East

terrorism_in_SouthAsiaAsia

su_saharanAfrica_terrorismovertimeAfrica

terrorism_worldwideSharp rise in Global terrorism since 2004

Notice the sharp peak in each region. For the Middle East and predominantly Iraq, so-called terrorism shot up during 2002-2003, the year of the Invasion by US and coalition forces. Afghanistan saw a sharp ascent from 2001 and another rapid incline in 2010 following the large-scale increases in military operations against the Taliban by the Afghan and US coalition forces. Obama sent a further 30,000 troops in that year. Asia and Africa in 2004 both saw massive geo-strategic grab for resources by US-NATO under cover of humanitarian pretexts and false flag events. United States Africa Command, (U.S. AFRICOM) was operational by 2007 and established as cover for strategic control of the Continent. It is in this year we see a huge spike lasting until 2013. This has obviously excluded the horror of ISIL – the latest creation of Western Intelligence black operations. Judging by the events of 2014 we can only summise that we will see a huge corresponding spike when the new data is in.

All the charts show a parallel increase in terrorism and / or insurgency. Have a look at the following chart which illustrates just how false flag terrorism and grassroots insurgency follows the US and NATO forces around and directly related to power plays for their resources. Cause and effect?

terrorism_iraq_afgh_1974_2013

Source: National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2013). Global Terrorism Database [Data file]. Retrieved from http://www.start.umd.edu/gtd

alqaeda_incidentsovertimeGlobal Al-Qaeda attacks since 1990s – 2012

isis attacks2007_2013ISIS/ISIL attacks in Iraq 2006 -2012

alqaedaincidentsovertime_iraqAl-Qaeda attacks in Iraq from September 2001-2013

privatecitizensAttacks on Private Citizens & Property  (Most attacks in Pakistan and Iraq)

In these set of charts we can see a similar trajectory. As Al-Qaeda has outlived its usefulness in the region, covert funding by Western governments’ military intelligence and private outsourcing were stepped up for Islamic State of Iraq and the Levant (ISIS/ISIL) taking over the mantle of the Global Terror demon. Just as Al-Qaeda begins to wane, ISIL begins its rapid ascent with billions of dollars seemingly arriving from nowhere in 2006, to reach a peak in 2009 with the subsequent tales of horror and atrocity, all of which is entirely authentic, though not the methods of media propagation. This is designed to ramp up the emotional response which military powers can use to ride their imperial desires. The sharp dip in incidents was merely a re-fuelling prior to another sharp increase in terror across the Middle East and Africa in 2014-2015. Through all this, carefully designed civilian attacks and the loss of property has suffered an exponential rise for several decades. Once again, this took off in 2004 as the West and its banks launched their quest for perpetual war.The Global population bears the brunt of these crimes. | Source: National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2013). Global Terrorism Database [Data file]. Retrieved from http://www.start.umd.edu/gtd


Now that Al-Qaeda, as America’s primary outsourced terror collective has been transferred to ISIL it seems the war hawks at the Council on Foreign Relations want to let bygones be bygones and make the terrorist organisation a firm friend so that things aren’t too complicated for us all. Barek Mendelsohn writing in CFR’s journal Foreign Affairs that due understanding should be exercised since Al-Qaeda is after all the “enemy of our enemy” and that:

“… the instability in the Middle East following the Arab revolutions and the meteoric rise of the Islamic State of Iraq and al-Sham (ISIS) require that Washington rethink its policy toward al Qaeda, particularly its targeting of Zawahiri. Destabilizing al Qaeda at this time may in fact work against U.S. efforts to defeat ISIS … [America’s] interests would be better served by keeping the terrorist organization afloat and Zawahiri alive.” [14]

The irony is so pathological you just couldn’t make it up.

Foreign occupation is the main cause of terrorism. It is expedient for invading powers to keep populations back home locked in fear and seeking revenge while the youth of both domestic and foreign populations become open to radicalisation, similarly encouraged by entrapment plots by the FBI and world intelligence agencies. Regimes with suitably strategic dividends are destabilised and plunged into civil war so that resources can be extracted. Selling these invasions under humanitarian interventions or seeking retribution for a perceived atrocity against “democracy” are the usual pretexts.

This is the state of the world we live in. It is a direct result of the Grand-Daddy of false-flag attacks which took place on September 11th, 2001 and which re-ordered the world according to pathocratic principles of paranoia, greed, separation and asymmetric warfare. Thanks to the Israel and its Bush-Cheney and Obama-Biden administrations, the constitution and Bill of Rights have been shredded, where inverted totalitarianism is becoming normalised.

The next post will see, in graphic detail, how the United States of America is sliding into a full-blown police state.

 


Notes

[1]Terror Factory, The: Inside the FBI’s Manufactured War on Terrorism By Trevor Aaronson, IG Publishing (2015 edition)| ISBN-10: 1935439960.
[2] ‘Inside the Terror Factory’ By Trevor Aaronson, January 11, 2013, Mother Jones| http://www.motherjones.com/politics/2013/01/terror-factory-fbi-trevor-aaronson-book
[3] ‘Newburgh Four: poor, black, and jailed under FBI ‘entrapment’ tactics’ By Paul Harris, The Guardian, December 12, 20013. | http://www.theguardian.com/world/2011/dec/12/newburgh-four-fbi-entrapment-terror
[4] ‘It’s the Wrong Time to be a Muslim in America – The Troubling Case of the Fort Dix Five’ by Stephen Lendman, Counterpunch, December 31 2008.
[5]’Can Authorities Cut Off Utilities And Pose As Repairmen To Search A Home?’ October 29, 2014. NPR News. http://www.npr.org/
[6]‘Aspirational Rather than Operational’ – 7 Arrested in Miami Terror Plot. Democracy Now! 2007.
[7]op.cit. Aaronson.
[8]’Did the FBI Use Occupy Cleveland Case to Equate Activism with Terrorism?’ By Kris Hermes, Alternet, September 12, 2012.]
[9]The event demands a book in itself and due to brevity, it will not be covered in this present series. Suffice to say, if you wish follow up and research this subject yourself the following books and articles are recommended: Manufactured Terror: The Boston Marathon Bombings, Sandy Hook, Aurora Shooting and Other False Flag Terror Attacks by Joe Quinn and Niall Bradley; ‘False flag theater: Boston bombing involves clearly staged carnage’ By Shelia Casey, May 8, 2013| ‘Boston Bombings ‘set-up’: Mother of patsies says sons groomed by FBI ‘Russia Today, 20 Apr 2013. | “False-flag” meme goes mainstream with Boston Marathon bombing, Kevin Barrett, Veteran’s Today/Press TV, 17 Apr 2013 | ‘Boston Bombings: The most obvious staged event since 9/11’, The Caterpillar Flys, 29 Apr 2013. | ‘Were The Boston Marathon Bombers ‘Mind Controlled’?’ By Joe Quinn, Sott.net, 11 Jan 2014.
[10] p.32; Aaronson; The Terror Factory.
[11] ‘The Best Terrorists Money Can Buy’ – Broke-ass losers. Big talkers. Ninja wannabes. How dangerous are the FBI’s sting targets?’ By Trevor Aaronson, Mother Jones, September/October 2011 Issue.
[12] ‘Man Is Charged With Plotting to Bomb Federal Reserve Bank in Manhattan’ By MOSI SECRET and WILLIAM K. RASHBAUMOCT.The New York Times 2012. October 17, 2012.
[13]Cutting the Fuse: The Explosion of Global Suicide Terrorism and How to Stop It (2010) by Robert A. Pape and James K. Feldman, Chicago University press.
[14] ‘Accepting Al Qaeda’ The Enemy of the United States’ Enemy’ By Barak Mendelsohn, Foreign Affairs, March 9, 2015.

The Terror Industry (1)

By M.K. Styllinski

 If you’re submitting budget proposals for a law enforcement agency, for an intelligence agency, you’re not going to submit the proposal that ‘We won the war on terror and everything’s great,’ cuz the first thing that’s gonna happen is your budget’s gonna be cut in half. You know, it’s my opposite of Jesse Jackson’s ‘Keep Hope Alive’—it’s ‘Keep Fear Alive.’ Keep it alive.”

former FBI assistant director Thomas Fuentes


twin-towersIt took over 35 years for the majority of Americans to realise that factions within their own government assassinated John F. Kennedy. Not exactly a hopeful premise from which to start. It was at this juncture that the ground was laid for a more serious threat to the freedoms of not just the American Republic but to the stability of the whole world. More than 14 years have passed since the September 11 attacks and more people than ever are studying the official story and coming away with many more questions than answers.

Opinion polls on 911 vary greatly, both in terms of the questions asked and the size of the number of respondents. Back in 2006 more than a third of the American public suspected that federal officials assisted in the 9/11 terrorist attacks or took no action to stop them so the United States could go to war in the Middle East. [1] One in seven people in the UK believe the US government staged 9/11 and a recent poll sponsored by the German magazine Welt der Wunder resulted in 89 percent of the respondents saying they don’t believe the US government has told the whole truth about 9/11. [2] Interestingly, for the purveyors of State protection, a 2012 online poll by The Franklin Centre Library revealed that 77 percent thought 11 years after 9/11 that we were all less safe than before. [3]

With 75 top professors and leading scientists claiming  9/11 was ‘inside job’ in 2014, it appears academia is catching up with the public, though at a snails space. A more respectable 2,322 architects and structural engineers have also expressed their disbelief in all or some of the aspects of the official story over at Architects & Engineers for 9/11 truth (ae911truth.org/). There are hundreds of other 9/11 website organisations and non-profit educational charities who take issue with the governments version ranging from grassroots to academic.

The online encyclopedia of Wikipedia, (censored and guarded by suitable official story gatekeepers) provides the best summary of the US government and media-led “conspiracy theory” which has lodged itself in the public mind. The following represents the standard synopsis which is constantly wheeled out from media outlets and taken as the consensus.

Once upon a time…

“The September 11 attacks (also referred to as September 11, September 11th, or 9/11) were a series of four coordinated suicide attacks upon the United States in New York City and the Washington, D.C. areas on September 11, 2001. On that Tuesday morning, 19 terrorists from the Islamist militant group Al-Qaeda hijacked four passenger jets. The hijackers intentionally flew two of those planes, American Airlines Flight 11 and United Airlines Flight 175, into the North and South towers of the World Trade Center complex in New York City; both towers collapsed within two hours. The hijackers also intentionally crashed American Airlines Flight 77 into the Pentagon in Arlington, Virginia, and intended to pilot the fourth hijacked jet, United Airlines Flight 93, into the United States Capitol Building in Washington, D.C.; however, the plane crashed into a field near Shanksville, Pennsylvania, after its passengers attempted to take control of the jet from the hijackers. Nearly 3,000 people died in the attacks, including all 227 civilians and 19 hijackers aboard the four planes. At the time of the attacks, media reports suggested that perhaps tens of thousands might have been killed, and the total number of casualties remained unclear for several days.

Suspicion quickly fell on Al-Qaeda, and in 2004, the group’s leader, Osama bin Laden, who had initially denied involvement, claimed responsibility for the attacks. Al-Qaeda and bin Laden cited U.S. support of Israel, the presence of U.S. troops in Saudi Arabia, and sanctions against Iraq as motives for the attacks. The United States responded to the attacks by launching the War on Terror and invading Afghanistan to depose the Taliban, which had harbored Al-Qaeda. Many countries strengthened their anti-terrorism legislation and expanded law enforcement powers. In May 2011, after years at large, bin Laden was located and killed.” [4]

So, let’s get this straight…

… What we are being told is that a handful of mostly Saudi Arabians without military or intelligence training, acting independently of government or Intel agencies, managed to outsmart the whole Anglo-American Intelligence network, Israel’s MOSSAD and NATO; as well as the National Security Agency with its massive surveillance of connected networks spanning the globe. Let’s add to this the so-called “failures” from the National Security Council; US Airport security; NORAD, Air Traffic Control and the US Air Force. Let’s not forget the world’s most powerful defence system overseen by the world’s greatest superpower which just happened to allow a handful of Arabs with minimal pilot’s training, armed with box-cutters fly two jumbo jet airliners into the financial heart of downtown New York exploding into the most famous icons of world trade, whilst another employed an impossible flight manoeuvre in order to crash into the military defence centre of the most powerful nation on earth. Then, just before Obama’s election time, Osama Bin Laden, a known CIA asset and a former close business associate of the Bush family is conveniently found after over a decade of being “on the run”. Despite being the most wanted terrorist on earth, he is not questioned – like so many in Guantanamo Bay who appear to be mostly innocent yet tortured nonetheless – he is assassinated and promptly dumped at sea. Mission accomplished.

dreamstime_s_21682504

© Rkaphotography | Dreamstime.com – US Wars Are State Sponsored Terrorism Photo

That has to be the worst conspiracy theory ever to insult the intelligence of a sixth grader.

Yet, that is the official story we are expected to accept – without question. Most shocking of all, that’s exactly what so many people do: accept a story that simply cannot be true. Moreover, to add insult to injury and the memory of the dead, no proposal for an independent investigation into why the most monumental “failure” in National Security could have happened has arisen from the President, Congress, the Joint Chiefs of Staff or the MSM; nor has anyone been reprimanded, let alone prosecuted. The reality has been constant resistance, stone-walling, disinformation, propaganda, threats, suicides, and murders. Add to the mix are the corrupted commissions and inquiries whose only remit is to push the official story that must be made to fit into official culture. Of course, such a coup d’état could never have been accomplished if societies hadn’t been suitably tenderized by decades of social engineering. Part of that success has been due to the global War on Terror, or “overseas contingency operations” as Obama likes to call it.

Al-Qaeda and the global war on terror is the continuance of a “Strategy of Tension,” which refers to a period in Italy from 1969 to 1974, which suffered a series of terrorist attacks with heavy civilian casualties. It was an offshoot of what has been called Operation Gladio and their state-sponsored terror teams in Europe. [5] The strategy had its roots in fascist beliefs of Synarchism within government, military and intelligence networks. Their objective was to ruthlessly exploit underlying fears and grievances in European nations so that people would believe that the attacks were carried out by a communist insurgency within Europe. Many of these terrorist organisations went underground and resurfaced to be periodically stimulated by their masters for bespoke objectives. They do not just arise out of the blue. Much like the ebb and flow of paedophile and sex abuse networks, terrorist atrocities are given the required camouflage so that the perpetrators and their handlers remain in the shadows.

There are many populist and academic sources that will prove the phoney nature of Al-Qaeda and Osama Bin Laden. Of particular note is the acclaimed UK documentary The Power of Nightmares by Adam Curtis Top where CIA officials openly admit that the creation and history of Al-Qaeda as a terrorist network is a fabrication. [6] As former French intelligence officer Major Pierre-Henry Bunel confirms:

“The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.” [7]

The CIA has used this ghost to buttress the fantasy that is Al-Qaeda (and the new proxy private army called ISIL), employing fake media reports and video appearances clearly from persons other than bin Laden himself which have fed into the aftermath of the new pearl harbour that was 9/11. [8] Even the name of “Al-Qaeda/Al-Qaida” has produced confusion, even dark amusement in Arab circles as one commentator wryly observed: “You have heard before that ‘Al-Qaeda’ roughly translates into ‘the base,’ but were you aware that ‘Ana raicha Al Qaeda’ is Arabic colloquial for ‘I’m going to the toilet’? Would hardened terrorists hell bent on the destruction of the west name their organization after a euphemism for taking a shit?” [9]

A fair point.

The common tactic that has been referred to before is known as the Hegelian Dialectic, though in truth Hegel described social changes rather than pointed manipulation in this context. However, it serves a suitable framework for the thinking behind state-sponsored terrorism which goes something like this:

1. The government creates or exploits a problem then attributes blame to others.

2. The populace react by asking the government for protection and help.

3. The government offers the solution that was planned long before the crisis.

4. Outcome: Rights and liberties are exchanged for the illusion of protection and help.

This is the geopolitical paradigm of our times largely unknown by the public, though thanks to the internet this is gradually changing. Government and military agencies at the mid to lower levels are equally unaware of this old formula which writer G. Edward Griffin described as: “… not a war on terrorism to defend freedom, but a war on freedom that requires the defense of terrorism.” [10] Meantime, the PR from the MSM and academia is still pushing the idea that America and Europe are overrun with teeth-gnashing terrorists hell-bent in renting asunder the fabric of our Western way of life. Since what is left of any civil rights in Europe and the US constitution has been eviscerated by the very same authorities who peddle these myths then might there be some mileage in the idea that they have something to gain from it all? For anyone who has taken the time to research the genesis of terrorism and the present-day nonsense passing for terrorist laws in the United States it is beyond doubt that the only thing American and European people need to fear is their governments.

According to a basic statistical analysis from 2013 the actual percentage of the US population who may be classified as a terrorist is around 0.00016%, or about 1 in 624,297 people. In this context, the writer Marc Salvo makes a pertinent observation about this topsy-turvy terror game when he said just a few months ago: “We’re not suggesting that terrorism doesn’t exist, but considering that 1 in 1000 Americans in 2010 were the subject of police misconduct ranging from excessive force beatings and murder to sexual assault and false arrest, perhaps the government should turn its surveillance on itself, rather than the 99.9% of Americans who want nothing more than to be left alone.” [11]

That is not to say there are not genuine terrorist plots, but the key issue here is what prevents terrorism from occurring and what actively encourages it? We know that invading Syria or Iraq has provided a massive surge of terrorist cells in those countries as a result and a bleed-through must have occurred in America and Europe. However, like some police trawling and entrapment operations in the UK, the lines between what is a genuine terrorist plot and creating home grown fanatics is more than blurred, it continues to stoke the needed fear and high profits necessary to sustain a terror industry.

As Al-Qaeda is wound down, ISIS takes over, funded with billions of dollars: a new brand with new bloody atrocities to market …

 


Notes

[1] ‘New National Poll: 36percent of Americans Believe 9/11 Was an Inside Job’ By Thomas Hargrove, Scripps Howard News Service Seattle. August 2, 2006.
[2] ‘One in seven believe U.S. government staged the 9/11 attacks in conspiracy’- The belief is more common among younger people, with a quarter of 16 to 24-year-olds subscribing to the theory By Alanah Eriksen, Daily Mail, 29 August 2011 | ‘German Poll: 89percent Question 9/11’ Welt-der-Wunder, January 24, 2011, 9/11 Truth News.
[3] ‘9/11 Online Poll’ The Franklin Center, September 11, 2012. http://www.franklincenterblog.wordpress.com
[4] ‘September 11th Attacks’www.wikipedia.com ( A far better starting point for an alternative “wikipedia” version of 9/11 can be found at wikispooks.)
[5] “Operation Gladio is undisputed historical fact. Gladio was part of a post-World War II program set up by the CIA and NATO supposedly to thwart future Soviet/communist invasions or influence in Italy and Western Europe. In fact, it became a state-sponsored right-wing terrorist network, involved in false flag operations and the subversion of democracy.
The existence of Gladio was confirmed and admitted by the Italian government in 1990, after a judge, Felice Casson, discovered the network in the course of his investigations into right-wing terrorism. Italian Prime Minister Giulio Andreotti admitted Gladio’s existence but tried to minimize its significance.
The main function of the Gladio-style groups, in the absence of Soviet invasion, seems to have been to discredit left-wing groups and politicians through the use of “the strategy of tension,” including false-flag terrorism. … The aim was to instill fear into the populace while framing communist and left-wing political opponents for terrorist atrocities.” – Operation GladioNATO/CIA “Stay-Behind” Secret Armies/ Truth Move / International Truth Movement, http://www.truthmove.org/content/operation-gladio/
[6] A partial listing for your own research follows: The Power of Nightmares BBC documentary by Adam Curtis. This is freely available to watch from various sources on the internet. ‘Al Qaeda and the ‘War on Terrorism’’ By Michel Chossudovsky, January 20, 2008. The Centre for Global Research: http://www.globalresearch.ca/PrintArticle.php?articleId=7718 and read the updated version of his 2005 book: America’s War on Terrorism by Michel Chossudovsky,| ISBN 0-9737147-1-9 2005. wwwglobalresearch.ca.: “…new chapters focuses on the use of 9/11 as a pretext for the invasion and illegal occupation of Iraq, the militarisation of justice and law enforcement and the repeal of democracy. According to Chossudovsky, the ‘war on terrorism’ is a complete fabrication based on the illusion that one man, Osama bin Laden, outwitted the $40 billion-a-year American intelligence apparatus. The “war on terrorism” is a war of conquest. Globalisation is the final march to the “New World Order”, dominated by Wall Street and the U.S. military-industrial complex. September 11, 2001 provides a justification for waging a war without borders. Washington’s agenda consists in extending the frontiers of the American Empire to facilitate complete U.S. corporate control, while installing within America the institutions of the Homeland Security State.” | See also: ‘Divide and Conquer: The Anglo-American Imperial Project’ by Andrew G. Marshall, Global Research, July 10, 2008 and ‘The Myth Of The Palestinian Suicide Bomber’ By Joe Quinn, Sott.net, 29 Jan 2007.
[7] ‘Al Qaeda: The Database’ by Pierre-Henry Bunel, Wayne Masden report November 18 2005. “In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith.”
[8] ‘Researcher: Bin Laden’s beard is real, video is not’ – Digital evidence supports the theory that Al-Qaida is recycling old footage to create new messages. Cnet.com September 12, 2007.
[9] ‘Existence of ‘Al-Qaeda’ Is Crap; Quite Literally’ – Did Osama really choose to name his terror network after potty humor or was it a computer database he used to chat with his CIA handlers? By Paul Joseph Watson, PrisonPlanet.com| October 6 2006: “The origins of the name “Al-Qaeda,” and its real arabic connotations prove that every time the Bush administration, Fox News, or any individual who cites the threat of ‘Al-Qaeda,’ as a mandate for war and domestic authoritarianism, they are propagating the myth that such a group ever existed.
An organization by the name of “Al-Qaeda” does not exist and has never existed outside a falsely coined collective term for offshoot loose knit terror cells, the majority of which are guided by the Pakistani ISI, Mossad, the Saudis, MI6 and the CIA, that were created in response to America’s actions after 9/11 – as the recent NIE report shows. According to the BBC documentary The Power of Nightmares, the infamous footage of Bin Laden marching around with armed soldiers was a ruse on the part of Osama himself, graciously propagated by the lapdog press, in which actors were hired off the streets, given uniforms and guns and told to look aggressive.” […]
[10] ‘The Chasm: The Future Is Calling’ (Part One) by G. Edward Griffin 2003, Revised March 17, 2011.
[11] ‘Odds That You Are a Terrorist: 1 in 624,297’ By Mac Slavo, SHTFplan.com, October 18th, 2013.

Save

Technocracy XIV: Psycho-Civilised

“Technological progress has merely provided us with more efficient means for going backwards”

Aldous Huxley


Note: A re-read of ‘Satan’s Little Helpers VII: Mind War’ is advised.

monitors1

The SMART-Surveillance Grid allows improvements in telecommunications, electricity provision and home functionality. It offers an exciting integration of eco-economics and energy saving technology along with the “Internet of Things” (IoT) and “Network of Things” (NoT) which is offering to revolutionise transport, communications and urban infrastructure as a whole. With embedded surveillance it permits advertisers, marketeers to access human minds as never before. Authorities can also tap in and use this consumerist techtopia to trap criminals and would-be “terrorists”. It requires that the State and Official Culture become so integrated through technology that the line will be blurred. Security and collectivism will be encouraged to a degree that compliance will be seen as good citizenship insofar as it maintains the urban environment and social provision. A new social contract will be loaded in favour of the State through a form of satiated servitude. (The Illuminist-Enlightenment thinkers would be well pleased).

So-called terrorists, dissidents/activists, protestors and ordinary citizens will need to be very concerned indeed on the road to SMART society as true individual thinking outside the box will slowly become frowned upon since it will not be conforming to the precept of a “psycho-civilised” society. The path of access to this dystopian view starts with ubiquitous surveillance.

As one short example illustrates, Britain’s Leeds-based Metropolitan Police Force is using a surveillance system procured from Datong plc., past customers of which have been the US Secret Service, the Ministry of Defence and unsavory regimes in the Middle East. The system is disguised as a mobile phone network which transmits a signal allowing the police or any other authority: “… to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area,” … “Strictly classified under government protocol as “Listed X”, it can emit a signal over an area of up to an estimated 10 sq.km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person’s movements in real time.” [1]

This is just one regional police force.

While the online company Amazon will track you via your Kindle reader for targeted advertising pathway prediction, the authorities will do the same based on the accumulated data to which it has access. It will not be for what you might buy, rather it will access what you may be thinking and your likely course of action on the “threat assessment” scale. There is precious little happening to prevent Google and other information technology companies from rolling out the SMART Internet of Things infrastructure which has enormous implications for a privacy and collective freedoms. Wi-Fi is destined to play a huge role.

militarysmartcityUrban law enforcement and Telephone towers with technology which allows multiple receive-transmit capability 

The social benefits of providing free access to Wi-Fi hot spots for those in low-income brackets and incentives for business travellers are shielding plans by the U.S. Department of Defence: “… to build robots that configure themselves into ad hoc wireless networks within urban areas” which were already well underway in 2007. Seizing control of internet communications and tracking individuals in urban areas is a necessary by-product of the technocratic SMART society. If that fails, the military are well placed to set up these Wi-Fi networks in a matter of hours or less. The Department of Defence (DOD) Homeland Security, Canadian, Israeli and NATO forces regularly conduct war-game exercises with Wi-Fi networks at the heart of operations. A DOD announcement for contractors as described by journalist Mark Baard discloses operations whereby:

“… soldiers will be able to drop robots, called LANdroids … when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network…The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of individual computers and mobile phones…where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail. The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.” [2]

As people become more accustomed to SMART technology and RFID tagging this will lead to the acceptance of our “need” to ensure greater technological “freedom.” As well as the technological capabilities of HAARP lying in the background in some form or another and married to these advances in technology, is it such a huge leap of imagination to think that once we are fully enmeshed in this SMART society where everything is habitually integrated that it would not be easy to begin directly assessing, monitoring and “downloading” material directly into the mass mind? Television has already served this purpose well, albeit in a more indirect fashion. With this in mind, though some have since expired and at least one is no longer listed (as of 1990) the US patent office listed the following successful registrations dating back to 1992:

U.S. Patent 5159703: Silent Subliminal Presentation System. (issued 1992) U.S. Patent 5507291: Method and an associated apparatus for remotely determining information as to a person’s emotional state. (issued 1996) U.S. Patent 5629678: Implantable transceiver – apparatus for Tracking and Recovering Humans. (issued 1997) U.S. Patent 6014080: Body worn active and passive tracking device (issued 2000) U.S. Patent 5868100: Fenceless Animal control system using GPS (Global Positioning Satellite) Location information. (issued 1999) [3]

US patent No. 5507291 filed on April 5, 1994 shows the level advancement at the public level. What goes on beyond top secret levels of the National Security State is anyone’s guess. The patent’s “abstract” is described as follows:

“In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas.” [4] [Emphasis mine]

And US patent No. 5159703, filed on December 28, 1989:

“A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.” [5] [Emphasis mine]

In the late Lt. Colonel Michael Aquino’s book: Mind War he explores psychological operations in combination with emerging technologies such as EM waves, Silent Sound and ionospheric mind control. Let’s not underestimate the power inherent within the human body /mind complex. After all, the electrical energy that powers each cell in our bodies works out at 30 million volts per metre, the equivalent voltage of a bolt of lightning. [6]Power within can be, as it were, reverse-engineered. From a footnote in the same chapter if you didn’t catch the first time, read it again in this context:

“… the NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day. […]

“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture from electromagnetic waves and interference. According to one researcher amongst many, Dr. Armen Victoria’s  1998 essay regarding ‘The Military Use of Electromagnetic Microwave and Mind Control Technologystates the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ’emotion signature clusters’. Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. ‘They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [7]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the US. It is still conducting some of the most advanced research in the world which in turn, stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been researching ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilising electro-magnetic waves as a psychotronic weapon. We may then understand that the invasion of Iraq not only represented an opportunity to plunder a nation for resources and stake claim to a long held geopolitical prize, but to test out new developments in microwave weaponry and experiment with the latest PSYOPS.
As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the US samurai. No more rhesus monkeys or pigs but real, live Iraqis.” [8]

According to Dr. Oliver Lowry who has had the dubious honour of working for the US military on several classified projects, Iraqi soldiers were the latest unwitting guinea pigs to further such advances, one of those being Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD:

… According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds. [9]

Humans are highly sensitive and susceptible to a variety of electromagnetic frequencies – natural or artificial. The human body is a highly sensitive package of water, bio-chemicals, and electromagnetic energies. The introduction and exposure to various kinds of external micro or EM waves of any kind whether from mobile phones RFIDs or even wind-farm infra-sound does and will have an effect on the human being in ways we do not understand. Consider also that the geo-magnetic sensitivity in animals and other living organisms concentrations of ferromagnetic material – most notably magnetite. The same levels of magnetite conductor / receptor bio-mineralization were discovered to exist in the human brain in the early 1990s. The authors of one paper say that the presence of the particles may account … for a variety of biological effects of low-frequency magnetic fields.” [10]

0117x

Electric field of the heart on the surface of the thorax, recorded by Augustus Waller (1887).

Weapons which target the mind and nervous system of selected individuals also has a long tradition. Reports of systematic mind stalking, harassment of individuals, testing and deployment of electronic and electromagentic devices (EMF) by government/outsourced agencies have been surfacing in the United States, North/South Korea and various countries in Europe. This has eroded human rights comprehensively with the added bonus for the persecutors that it is almost impossible to confirm and verify that which is literally “all in the mind”.

Though information in electronic/electromagentic or “non lethal Weaponry” is largely classified there is sufficient evidence from modern history and individual reports to reach the conclusion in a court of law that the targeted, micro-social use of behaviour modification technology is being used against individuals and activist groupings.

Interest in a variety of EMF weaponry had already begun at the beginning of the 20th Century with the genuis of Nikola Tesla and his experiments with radar and electrical energy. Concentrating and directing a beam of electromagnetic energy over a certain distance took hold of Tesla’s mind until his death in 1943. It seems the military-industrial complex heavily saturated in Nazi philosophy and science simply subverted Tesla’s genius and extended his advances in the field.

DARPA have been on the case since the Cold War with their 1958 research into combating Soviet advances in electromagnetic weapons and defenses. The capability to disrupt human emotions, inflict pain and fragment the personality was already well underway during pre and post-war experimentation under Operation MK-ULTRA, Project MONARCH, Project PANDORA and the development of PSYOPS and CoIntelpro emerging against the background of the civil rights movement of the 60s and 70s; behaviour modification had a new platform to play with.

Since that time with the enormous advances in “new concept” warfare there is every likelihood that a fusion of this military-intel science is not only being used as form of macro-social engineering and a monopoly of media-led propaganda, but the use of mass mind, ionosphere technology (fomerly labelled HAARP) to influence whole regions, even countries. It is therefore not a huge leap of imagination to recognise that the precision use of psychotronic weaponry to target selected individuals by the National Security State apparatus is in existence and heavily funded by black budgets.

Well in advance of the war on terror hoopla, Neo-Conservative regime change and the sky-rocketing increase in human/drug trafficking, mind control technologies were telegraphed to the military-intelligence faithful as the tool of choice to keep the world in line. The Strategic Studies Institute of the U.S. Army War College, published in 1994: ‘The Revolution in Military Affairs and Conflict Short of War’ by LTC James Kievit, Dr. Steven Metz. In the paper, the authors state the following drawn from their “hypothetical future scenario”:

The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant. […] Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

Put this together with Synthetic Environments for Analysis and Simulation (SEAS), the SMART grid, MAIN CORE, biological and PSYOPS warfare and you begin to get the idea that the technology of assymetric warfare isn’t just about geostrategy to dis-empower traditional enemies such as Iran, Russia and China. It is about war against domestic population by stealth and in plain sight. According to Project Censored’s 2006 paper titled: ‘US Electromagnetic Weapons and Human Rights’ offers a broad brush synthesis of the field and confirms the black budget capabilities available since the Zio-Conservative false-flag coup of 9/11:

“Michael Vickers, senior adviser to the Secretary of Defensefor the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations: “US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white SpecialOperations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.” [11]

CongnitiveMappingSource: Petri Ticklen at http://alicefish.net/MindAttack.htm Original source: Against Electronic Mind-Control International /http://againstmindcontrol.tripod.com/liber.html

Since the war on terror propaganda has now made sure that activists, dissidents and indeed anyone overtly successful in criticising government policy is shut down, detained or harassed it is hardly shocking to discover that some of these covert programs have been targeting people for experimentation in CIA rendition centres, prisons, psychiatric wards and across the general public with immunity. Project Censored authors state:

“…Hundreds of people continue to assert that a person or persons, whom they do not know,have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution. These experiences involved a number of discrete phenomena:

  • Hearing voices when no one was present.
  • Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause.
  • Sleeplessness and anxiety as a result of “humming” or “buzzing”.
  • Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
  • Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises. [12]

And the industry of non-lethal weaponry (NLW) is steadily increasing playing a dominant role in asymmetric warfare abroad as well as crowd control closer to home. The market for NLW will apparently double by 2020. [13] That means big money. Almost ten years ago:

“…the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, ElectroMagnetic Applications, and SAIC among others. The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, ‘Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that ‘in the next conflict it is we who will control the spectrum. We know its value’. Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.’

In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology. There are also numerous conferences each year hosted by the Department of Defense, contractors and universities. The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non-Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000. [14]

By 2011, this had increased to $138 million, reaching $140 million in 2013. [15] If we read the US Department of Defence’s Annual Non-Lethal Weapons Program Annual reports, it would leave you feeling suitably humbled and sentimental, beaming with national pride that Uncle Sam and its numerous military bases are making the world a less lethal. Apart from such delusions, what is more interesting is how such NLW advances are leaking into law enforcement and perceived “National Security.” A passage from Project’s Censored’s report concerning one Eldon Byrd a medical engineer, underscores this point:

“After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holesin people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” He believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line.” [16]

It is this intentional compartmentalisation and factional nature of operations and directives within military and  intelligence agencies which allows pathological leadership to develop.

Back in 2006, Congress and George W. Bush signed the Military Commission Act of 2006. which allowed torture and suspension of due process as acceptable. Since that time, torture apologists from law, academia and the military have come out to justify such actions as necessary for the “greater good” once again, trashing the very concept of the Universal Declaration of Human Rights and basic notions of conscience. The Anglo-American-Zionist Establishment is perfectly happy to use all and everything in its means to achieve its ends including the use of technology that cannot be detected nor recognised by Official Culture.

The somewhat infamous Dr. José Delgado Director of Neuropsychiatry at Yale University Medical School in the 1960s and 70s, and later Professor of Neurobiology in Madrid, Spain, had gained quite an internet following of shock and revulsion based around his similar pathological view of the capabilities of psychosurgery. He urged the U.S. government to make “control of the mind” a national goal. [17] He cheerily – and perhaps ill-advisedly – voiced his opinion and those of his superiors regarding the future:

“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday, armies and generals will be controlled by electric stimulation of the brain”. [18]

Dr. José Delgado was nothing if not thorough in his research. In 1965, The New York Times reported on Delgado’s successful experiment in the use of electronic implants connected to the motor nervous system of a bull – the unfortunate animal was stopped from charging by remote radio-control. The bizarre capabilities of surveillance was demonstrated when he surgically implanted a cat with an electronic implant which transmitted everything the poor moggy was seeing and hearing to a TV monitor.

The Doctor’s foray into publishing produced Physical Control of the Mind: Toward a Psycho-civilized Society (1969) which helped to confirm his Dr. Evil status on the net – not without justification. The doc is messianic in his belief that humans will undergo “psycho-civilization” by uploading the contents of their brains directly to machines and vice versa. With statements like that it is unlikely that he limited his experiments to animals. According to a 2001 interview for Cabinet magazine conducted by artists and writers Magnus Bärtås and Fredrik Ekman there are still many of Delgado’s descriptions in his own articles and reports of how he moved from animals to humans in contemporary American medical libraries. The reporters relate how Delgado, Dr. Mark, and other colleagues: “describe what was the first clinical use of Intracerebral Radio Stimulation (IRS) on a human being. The stimoceiver itself only weighed 70 grams and was held fast by a bandage.”

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (1986)

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (Third Edition: 1986)

In an article called “Radio Control Behavior” in the February 1969 issue of The Journal of Nervous and Mental Disease there are descriptions of patients who had undergone procedures to attach the device to their brains.

Case studies include:

… A black fourteen-year-old girl on the border of developmental disability who grew up in a foster home suddenly goes into a fury that leads to the death of her two stepsisters. A thirty-five-year old white industrial designer who ends up killing his wife and children flies into a rage when other motorists try to overtake him and he chases them and tries to run them off the road. Their aggressive behavior is supposed to be registered by the stimoceiver in the way a seismograph registers the earth’s tremors and the same stimoceiver is then to “turn them off” via the FM transmitter. [19]

In the interview Delgado admits that as far as he was aware nothing came of the IRS device due to the complexity of the brain and the unreliability of the mapping: “We never knew which parts of the brain we were stimulating with the stimoceiver. We didn’t even manage to prevent epileptic attacks, which we thought would be the simplest of things. We never found the area where epilepsy attacks originate.” [20]

The authors reveal their surprise at his: “casual attitude towards the stimoceiver which was heralded as a great contribution to science.” Although Delgado’s attitude conforms to later developments regarding the brains plasticity and almost holographic nature, normal practice for radar experiments in psychological control were to appropriate and integrate into covert programs. After all, mind control operations were/are still continuing. It was at the congressional hearings on the CIA sponsored MK-ULTRA operations that Delgado made his famous declaration of psychosurgery. It seems highly improbable that such experiments were ignored especially when they often yielded startling results.

To illustrate the effectiveness of electro-stimulation Delgado and his colleagues: “… orchestrated violent scenes in the lab” descriptions of which were captured in the book: The Brain Changers: Scientists and the New Mind Control (1973) by Maya Pine who relates one incident typical of the research in question:

As the film opens, the patient, a rather attractive young woman, is seen playing the guitar and singing “Puff, the Magic Dragon.” A psychiatrist sits a few feet away. She seems undisturbed by the bandages that cover her head like a tight hood, from her forehead to the back of her neck. Then a mild electric current is sent from another room, stimulating one of the electrodes in her right amygdala. Immediately, she stops singing, the brainwave tracings from her amygdala begin to show spikes, a sign of seizure activity. She stares blankly ahead. Suddenly she grabs her guitar and smashes it against the wall, narrowly missing the psychiatrist’s head. [21]

As the authors delved deeper into the experiments on people Delgado became suspicious and tense. He terminated the interview not long after. Rather than regretting his time of psychosurgery innovation it is likely that Delgado was feeling petulant about being left out of the loop after his data was integrated into the continuing experimentation. He may have had considerable lack of success with the vagaries of brain plasticity but his work on animals was highly valued during the parallel mind control work of MK-ULTRA and other operations. Though unconfirmed, it is thought that Delgado worked on Project PANDORA as part of the CIA’s experiments into electromagnetic modulation with particular attention to scrambling the minds of soldiers on the battlefield. It was at exactly the same time that the CIA began to conduct radiation experiments on the US population, just prior to Delgado starting his research on electro-magnetic radiation and its capacity for influencing people’s consciousness.

After the 1974 congressional hearings the Doctor continued his animal research managing to link his brain implants with computers. This was documented in “Two-Way Transdermal Communication with the Brain” published in 1975 where he stated:

“The most interesting aspect of the transdermal stimoceivers is the ability to perform simultaneous recording and stimulation of brain functions, thereby permitting the establishment of feedbacks and ‘on-demand’ programs of excitation with the aid of the computer. With the increasing sophistication and miniaturization of electronics, it may be possible to compress the necessary circuitry for a small computer into a chip that is implantable subcutaneously. In this way, a new self-contained instrument could be devised, capable of receiving, analyzing, and sending back information to the brain, establishing artificial links between unrelated cerebral areas, functional feedbacks, and programs of stimulation contingent on the appearance of pre-determined patterns” [22]

In true “mad professor” fashion, Delgado continued his experimentation  on an island in Bermuda, where a group of gibbons were placed at his disposal. Naturally, the doctor had them all fixed with electronic brain implants which led him to discover how to build and destroy social orders using electrical brain boosts. [23] This would have been right up the technocratic street that was emerging in the warfare-ridden 1970s. So, this begs the question: after over thirty years of electronic implant tinkering what has the Pentagon, DARPA, NSA and unknown agencies come up with besides the RFID tagging systems? Our old friend the Nazi-tainted IBM needs to be brought in here.

Reflect on this confidential memo covertly obtained all the way back from October, 1995 from INTELLI-CONNECTION, a Security Division of IBM. In the form of an office memo, it reveals some interesting information. An edited extract follows:


 THE I.B.M. 2020 NEURAL IMPLANT

CONFIDENTIAL, LIMITED DISTRIBUTION ONLY, LEVEL 9 COMMUNICATION, 2020 NEURAL CHIP IMPLANT

   “Federal regulations do not yet permit testing of implants on prisoners, but we have entered into contractual testing of our product. We have also had major successes in privately owned sanitariums with implant technology… In California, several prisoners were identified as members of a security threat group, EME, or Mexican Mafia.

   They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge, Massachusetts laboratories.

   The implant procedure takes about 60-90 minutes depending on the experience of the technician. We are working on a device that will reduce that time by as much as 60 per cent. The results of implants on 8 prisoners yielded the following:

   Implants served as surveillance monitoring devices for threat group activity. Implants disabled two subjects during an assault on correctional staff. Universal side effects in all 8 test subjects revealed that when the implant was set to 116 Mhz all subjects became lethargic and slept an average of 18-22 hours per day. All subjects refused recreation periods for 14 days during the 116 Mhz test evaluation…”

   Each subject was monitored for aggressive activity during the test period and the findings are conclusive that 7 out of 8 test subjects exhibited no aggression, even when provoked. Each subject experienced only minor bleeding from the nose and ears 48 hours after the implant due to initial adjustment.

   Each subject had no knowledge of the implant for the test period and each implant was retrieved under the guise of medical treatment. The security windfall from the brief test period was tremendous. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities … In Massachusetts, the Department of Corrections had already entered into high level discussions about releasing certain offenders to the community with the 2020 neural chip implants.” [24]


What is the probability that such technology has been way in advance of anything we see from outsourced DOD departments which are overt and relatively open to public discourse? What of deep black projects far away from any oversight? Might we assume that such R & D may be in development, the results of which could be used on the potential activist, dissident or “terrorist” when the SMART-Surveillance society (SSS) is fully integrated into a comfortable, consumerist paradise?

If we take the infestation of Satanic Ritual Abuse networks which appear to be seated in most centres of power and seeping into the waiting SSS managed by mind control technology both overt and covert, this is surely worse than any science-fiction novel we can imagine. If we are to give credence to Zbigniew Brzezinski’s visions, which in any case, may simply be explanatory notes to his fellow comrades signalling what will happen, the technology may already be in place and operational.

In his 1970 book Between Two Ages Brzezinski writes:

“… of a future at most only decades away,” upon which he related the opinion of an experimenter in intelligence control who asserted: ‘I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” [25]

This is the darker side of the transhumanism crowd and which permeates social network corporations, military-intelligence and the DARPA inspired National Surveillance state. The music emanating from SMART grid technology is that of the Pied Piper lulling his followers into a false dawn. Saturating ourselves in W-Fi and locking ourselves into a EMF grid; making our gadgets indispensable for our most basic daily needs is exactly what this mainframe seduction is all about.

Part of being psycho-civilised is that we become seduced by the promise of more and more access, increasing efficiency and the ever smaller distance between “want” and “have.” The problem is, it appears to be an illusion, engineered with great precision, doffing it’s hat to ecological principles and economic alternatives whilst retaining a core-machine centralisation.

If we do not see the Magician behind these pretty lights and virtual enticements, these amenities offering a New Order of efficiency and ease, we will end up exactly as Henry David Thoreau wrote about his fellow man whom he believed had become : “… as tools of their tools.” When that happens and in combination with our illustrious pathocratic leaders, there may be very few choices to think freely, let alone act. We will be quite literally lost in the “simulation and simulacra”.

That is the antithesis of SMART.

See also: Satan’s Little Helpers VI: Sleepers and Electro-Shocks

 


Notes

[1] ‘Met police using surveillance system to monitor mobile phones’ The Guardian October 3, 2011.
[2] ‘Urban Wireless to Serve Intel and PSYOP forces’ by Mark Baard parallelnormal.com, July 19, 2007.
[3] http://www.patft.uspto.gov/
[4] ‘Method and an associated apparatus for remotely determining information as to person’s emotional state’ Inventors: Stirbl; Robert C. (New York, NY), Wilk; Peter J. (New York, NY) Appl. No.: 08/222,835 Filed: April 5, 1994 / 5,507,291 Stirbl et al. April 16, 1996. www. patft.uspto.gov/
[5] ‘Silent subliminal presentation system’ Inventors: Lowery; Oliver M. (Norcross, GA) Appl. No.: 07/458,339 Filed: December 28, 1989, issued as United States Patent 5,159,703, October 27, 1992. www. patft.uspto.gov/
[6] Utility Services in India’ | http://www.indiaonline.in/About/utilities/index.html
[7] The Military Use of Electromagnetic Microwave and Mind Control Technology’ by Dr Armen Victorian Lobster Magazine 1998. [8] ‘Horrifying US Secret Weapon Unleashed In Baghdad’ By Bill Dash, rense.com August 25, 2003.
[9] .‘Ariel Mind Control’ by Judy Wall, Editor/Publisher Resonance Newsletter of the MENSA Bioelectromagnetics Special Interest Group http://www.raven1.net/commsolo.htm
[10] ‘Magnetite Biomineralization in the Human Brain’ by Joseph L. Kirschvink, Atsuko Kobayashi-Kirschvink and Barbara J. Woodford, National Academy of Sciences. | Vol. 89. Biophysics, 1992.
[11]’US Electromagnetic Weapons and Human Rights’ By Peter Phillips, Lew Brown and Bridget Thornton, As Study of the History of US In telligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University, Project Censored Media Freedom Foundation.http://www.projectcensored.org/wp-content/uploads/2010/05/ElectromegnaticWeapons.pdf
[12] Ibid.
[13] ‘Non-Lethal Weapons (NLW): Industry, Technologies & Global Market’ 2014-2020 Aug 19, 2014 |http://www.marketwatch.com/story/non-lethal-weapons-nlw-industry-technologies-global-market-2014-2020-2014-08-19
[14] Ibid.
[15] http://jnlwp.defense.gov/Portals/50/Documents/Press_Room/Annual_Reviews_Reports/2013/DoD_Non-Lethal_Weapons_Program_Annual_Review_11.19.2012_HTML_format_v1.pdf
[16] Many accounts on psychotronic abuse are available to read in books and online. Some links: http://mindjustice.org/ | http://freedomfightersforamerica.com/victims_statements_pg1 [16] op.cit Philips, Brown, Thornton.
[17]The People Shapers by Vance Packard, published by Little, Brown & Co., 1977, (p.4).
[18] Joseph Delgado February 24, 1974 edition of the CONGRESSIONAL RECORD (MKULTRA hearings) No. 26, Vol.118.
[19] ‘Psychocivilization and Its Discontents: An Interview with José Delgado’ by Magnus Bärtås and Fredrik Ekman, Cabinet magazine, Issue 2 Mapping Conversations Spring 2001.
[20] Ibid.
[21] Ibid.
[22] ‘Two-Way Transdermal Communication with the Brain,’ Delgado, Lipponen, Weiss, del Pozo, Monteagudo, and McMahon, a co-operative publication of the Medical University of Madrid, Spain, and Yale University Medical School, 1975.
[23] Mass Control: Engineering Human Consciousness Jim Keith, IllumiNet Press, 1999. (p.99)
[24] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997. See also: (http://www.trufax.org/reports/2020.html)
[25] op. cit. Brzezinski (p.15) (Between Two Ages)

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 

Update: See also: Data is the New Oil

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Technocracy VI: The Technocrats Tap in (3)

“Surveillance induced morality: relics of cultural retardation”.
 .
– Marc Maron
.

How many times have we heard the response: “If you have nothing to hide, you have nothing to fear”?

This almost child-like wish to place faith in the unsullied purity of the authorities and Daddy State seems to know no bounds.

The success of mass surveillance is defined by the same gradualism. Endless new devices and gadgetry help to insulate our concerns about technology and how it can be used. It doesn’t matter how altruistic the intent is, whether it means to reduce suffering or create a more socially responsible culture, social justice is a concept struggling to keep its head above the water of pathogenic pollution. Whether biotech or nano-tech, since military, geo-political strategies and social pathologies dominate they will be pulled into the same codes of conduct mandated under Official Culture. Suffering will continue under flares of revolution until the psychopath is denied influence in ALL spheres. Access to technology which will disburse wealth and true freedom cannot take place until such a realisation manifests to the extent it dismantles traditional power structures. To think otherwise, will simply perpetuate the cover. Such a trajectory has only been possible due to the relatively rapid rise of the National Security State apparatus rooted in the 3EM riding high on updated myths propagated to ensure a smooth transition.

In combination with ECHELON and or MAIN CORE we have a global surveillance grid sitting on top of European and US intelligence mining that is the most invasive in history. This technological construct is imbued with power from a perception that can only multiply and augment in the same way we continually seek new “apps” and add-ons to our consumerist ethos.  A technocratic centralisation is the only direction. The promise of open source software will only prove liberating when the central mainframe of core influence is dismantled. Otherwise…Open source initiatives will operate within carefully defined parameters, in much the same way as our credit cards, cell phones and i-pads. Technology is not the culprit here – it is the reliance on the limited applications which is displacing our incredible, untapped creative power. This displacement only leads to the atrophying of our individual and collective creativity. And this is where artificial intelligence and transhumanist ideology offers an unprecedented threat.

But I’m getting ahead of myself. More on this later.

1024px-Menwith-hill-radomes

RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UKUSA Agreement. Photo Credit: Matt Crypto (wikipedia).

The International Campaign Against Mass Surveillance (ICAMS) produced the excellent document: ‘The Emergence of a Global Infrastructure for Mass Registration and Surveillance’ back in April 2005 which detailed in precise terms the nature of these myths, edited extracts of which will serve as an adequate summary of what this transition really means:

Myth #1: We are merely being asked to sacrifice some of our privacy and convenience for greater security.

“The object of the infrastructure that is being constructed is not ordinary police or intelligence work but, rather, mass surveillance of entire populations. In this infrastructure, everyone will be treated as a suspect, and state agents will maintain data profiles on all of us. […] The elimination of risk Indeed, it is now evident and documented that the United States and other countries are acting aggressively on information, seizing and detaining people without reasonable grounds, and “rendering” them to third countries or extraterritorial camps run by the U.S., where they face torture during interrogation and indefinite detention. Alongside the global system for mass registration and surveillance is emerging what some commentators are calling a “global gulag”,4 in which unknown numbers of people are languishing. What is at stake in this new world order is more than mere privacy, or even democratic processes, legal systems, and civil liberties. Basic human rights are in jeopardy.”

The document also lists the The Registrations of Populations as integral to the surveillance state with a long history of isolated test-runs across the world and with the shadow of abuse inherent in such data mining. Examples are given of Japanese internment in America the Second World War, the 1994 genocide that took place in Rwanda and the Pass Laws of apartheid South Africa. Such highly detailed information derived from Registration: “… is the tool by which those in power can easily single out and target certain kinds of people – not for what they have done, but for who they are.” And further: “By creating inclusion, the system also creates exclusion. For practical purposes, a person without a mandatory identity document will not exist – or will exist only as a risk to the state.”

Myth #2: These initiatives facilitate travel.

“But something else is happening, too. The private sector is being pressed into service as the state’s eyes and ears. Just as it has done with the acquisition of private-sector databases and airline passenger record systems, the state is using the private sector to exponentially increase its surveillance capacity in the realm of electronic communications and financial transactions. And, instead of relying on the inconsistent practices of businesses, governments are starting to tell businesses how to design their information systems, what information to gather, how long it must be stored, what must be checked and reported, and what must be given directly to state officials.

Compelling service providers to “build in” surveillance capacity to their systems means that within minutes of receiving a warrant from a court, real-time interception of a person’s Internet or voice over Internet use can be implemented with just a few computer strokes, making a connection between the computerized listening stations of law enforcement and the service provider’s system.”

The FBI’s various software can be used to search for keywords in the trillions of gigabytes of information that is continuously vacuumed up whether from your bank accounts or blogs. Data mining is the future of crime prevention which is already merging with the dubious practice of entrapment. In George Orwell’s 1984 Winston, the main protagonist in the novel appears to describe the present: “It was inconceivable that they watched everybody all the time. But at any rate, they could plug in your wire whenever they wanted to. You had to live – did live from the habit that became instinct – in the assumption that every sound you made was overheard.” The only difference in our world, our surveillance will comprise of various degrees of robot and artificial intelligence from the basic models already appearing in our malls to sophisticated androids capable of human simulation. They will assess are bio-signatures and voluminous data files and make mathematical probabilities of threats to the system which will slowly build itself around us.

Myth #3: If one has nothing to hide, one has nothing to worry about.

“An example of the many mistakes that were made in that era was the naming of academic Owen Lattimore as the Soviet Union’s top spy in the U.S. He later was fully cleared of the charges. In his account of the affair he noted that the F.B.I. and other agencies had ‘built up on him a dossier of ‘a man who might have existed’. Again, as a historian of the period has observed, ‘that phrase catches the very essence of the creation of the national insecurity state: a data world that shadows, mimics, and caricatures the real world’ We may think that anyone looking at our personal data with the proper explanation would conclude we are innocuous, but, in fact, in the data world we have no control over our “virtual identities” or the interpretations that others make of them.”

This goes to the central premise of conditioning that comes about from living under inverted totalitarianism and the necessary glut of authoritarian followers who allow its manifestation. We do not notice the dismantling of the foundation upon which are human values and ethics reside due to the buffering of our intuition and conscience. This is achieved through propaganda, psychic driving and memetic engineering of our consciousness all cemented with the human propensity for wishful thinking and denial.

We keep coming back to the uncomfortable fact that we naturally seek sanctuary in the delusion that there is nothing to worry about because we cannot entertain the possibility that we may have to alter our beliefs and attempt a deconstructive introspection. When such a painful process begins it can shatter the ego-mask that buffers us from the terror of the situation. When our personality is largely empty of substance this can be akin to inviting death of identity and belonging. So, having nothing to worry about is a preferable hook upon wish we can willingly attach.

In modern times, nothing comes closer to a collective seduction than the human races’ relationship to technology. We are firmly caught in its web of convenience, innovation and compliance in much the same way we are enthralled by the chemical hit of sex. In that sense, the surveillance state is just another compromise on the road to achieving the new nirvana of the post-human.

Have we really learned those lessons? Or have we merely changed our focus?

Boundless-heatmap-large-0001

“The worldwide heat map from the NSA’s data visualisation tool BOUNDLESSINFORMANT, showing that during a 30-day period, 97 billion internet data records (DNI) and 124 billion telephony data records (DNR) were collected.” (wikipedia, creative commons | Source http://jobkaster.com/ Author National Security Agency)

Myth# 4: The technology being used is objective and reliable.

“First, the factual base on which the technology rests is unreliable. The ‘best information available’ on which data mining or risk-scoring technology depend is often inaccurate, lacking context, dated, or incomplete. It might even be dirty information – extracted by torture, or offered by an informant who is vulnerable or is acting in bad faith. Secondly, the criteria used to sort masses of data will always be over-inclusive and mechanical. Data mining is like assessing ‘guilt by Google’ key-word search. And since these systems use broad markers for predicting terrorism, ethnic and religious profiling are endemic to them. … a precautionary principle is at work when human beings are making the risk assessments.”

A surveillance state is surely an oxymoron by virtue of the fact it is created not from the wish to protect but the incentive to control. Technology is only as trustworthy as its programmer and by extension, the context in which the capabilities of technology are applied. By the same token, human beings are fallible and since machines are born from the quality of our own minds they will mirror the glitches and unpredictable anomalies so much are part of a learning universe – despite protestations to the contrary. The more complicated and sophisticated machines become the more they will transcend their in-built limitations – that is spark that consciousness seeks. But the Surveillance State is linked to wider philosophical beliefs where development and trust in technology is based on the notion of an evolutionary salvation. Such a suggestion is usually rejected by transhumanists who insist that technology is merely the next stage in human evolution; our destiny is to embrace singularity and merge with the machine for optimum transcendence. By implication, the surveillance state will cease to exist since it will become superfluous to our needs.

Once again, this presupposes that such a system of malevolence will naturally evolve into one of benevolence and those at key nodal points of its power will simply transcend along with us. More likely is that the rooted dominance that gave rise to inversion will offer more of the same, where the worm-hole of singularity is really nothing more than a sublime devolution by delusion, the end result of which is absorption of all that is individual and original in exchange for group-think and technocratic compliance. Sophisticated, yes, even ecstatic at times, but like an addictive drug, when you realise you are hooked and seek to escape in search of authentic experience, it will be too late. From reliability and trust projected onto the machine will ultimately invite the law of repulsion.

Myth #5 and 6: Terrorist watch lists are a reliable product of international intelligence cooperation and consensus / Governments want to implement these systems to protect their citizens from terrorists.

“There is no due process afforded individuals or groups to allow them to challenge the inclusion of their names on a list. And, once the “terrorist” label is fastened to them, actions are taken against them without normal legal protections being afforded (protections such as presumption of innocence, the right to know the evidence and allegations against one and to respond, the right to remain silent, and habeas corpus). This is the essence of the risk assessment model: it treats as intolerable risks the very legal protections that are fundamental to free and democratic societies. In short, the U.S. lists have “been created haphazardly and without the carefully constructed checks and balances that such powerful instrument[s] demand.” And the lists are certainly bloated. At various times, news reports have put the numbers of names on the U.S. lists in the millions.”

Despite the fact that 99.9 per cent of those listed are largely innocent of any crimes at all, the Terrorist Watch List is drawn directly from the idea that al-Qaeda/ISIL and most terrorist atrocities are representative of a real, external threat. Such a disastrous policy has shown to be a cynical manipulation of the mass mind and comprehensively debunked if one reads the research from authors and experts in the field alongside the current geo-strategy and its outcomes in the last one hundred years.

The official story of global terrorism is a monumental fabrication – a product of a compartmentalised mutation of myth used to promote the economic and socio-cultural status quo. It is a cleverly disguised tool of opportunism for social control with the rise of police states and war without end as the norm. Indeed, such an inversion is truly insidious as the pathology begins to make inroads into the psyche of normal human beings. As the ICAMS authors state: “As people begin to realize that every transaction in their personal lives is potentially being watched – and that their innocent actions and beliefs can be easily misconstrued by risk assessors in their own and other countries, they will begin to internalize the social control that is being exerted by governments, watching what they say, what they criticize, who they associate with, and what they profess to believe in.”

DigiGes_PRISM_Yes_we_scan_-_Demo_am_Checkpoint_Charlie_June_2013

Germans protesting against the NSA surveillance program PRISM at Checkpoint Charlie in Berlin. (wikipedia,)

This is happening fast. The official culture of psychopathy requires these myths not only to keep populations in a state of fear and disempowerment but more importantly, so that the banking architecture and profits from the arms race, weapons manufacturing, narcotics, human and organ trafficking continues until nothing more can be squeezed out of the husk. Implosion is the only avenue left. Yet, from this breakdown, will we have a true community template of freedom which encourages a free-flowing exchange or will we walk as somnambulists into a mainframe of control from which comfort and efficiency is a high-resolution mask? This set of technocratic controls represent both the future safeguards against this implosion and the ultimate resource of future exploitation when machine-based society dominates over a depopulated world.

Other myths include that of “Western Democracies defending democracy and human rights around the world”; “such initiatives make us safer”; “Guaranteeing security is the paramount responsibility of governments” and the platitude that “at least, these initiatives are better than doing nothing.” All of which are much propagated lies within the MSM, think-tanks and PR outfits which prey on the naive and ill-informed. As ICAMS asserts:

“Careful examination shows that the global, mass registration and surveillance initiatives that have been described in this document are not “better than doing nothing”. They divert resources away from activities that would provide us with better security, they are not effective, and the harm they do to democracies, individuals, the rule of law, and global security is not proportional to their utility, or even to the risk they are supposedly addressing.”

Biotechnology and transhumanist discourse in general, is wholly identified with the idea of accelerating human design and manipulating the rate of perceived evolution. This is in accordance with a one-dimensional philosophy that discards the idea of natural rhythms and cycles that may have their own rates of change and which may not be immediately accessible to the fallible and very subjective human mind. This is hardly surprising due to the movement’s secular roots. However, what if – as a very rich tradition of often suppressed ancient wisdom suggests – there is indeed a precise symmetry and purpose in the way the planet, cosmos and Universe functions and organises itself? Most transhumanists appear to reject this possibility and assume that a “genetic designer label” can be stamped onto biology based on what they consider to be a sacred evolutionary direction. As with most strictly materialist perceptions, in true Baconian tradition the control of matter, mind and Nature is the objective divorced from the idea of consciousness existing outside the constraints of matter. A Masters-of-the-Universe mentality seeks to upstage Nature and the planet itself, bending it to their “post-human” will.

That is not to say there are not some great minds in the transhumanist movement and that there is nothing of value to be found there. But when there is no real discernment between what is considered to be pathology and normalcy and where beliefs are already predisposed to psychological corruption, then it just becomes yet another hijacked ideology. There is also the opportunity to ask questions as to whether we base our future on the lessons of the past or presume to forge ahead and base our decisions on a technological train of wishful thinking. Will we be downloading and uploading a reality that is sacrificing authenticity for artifice?

Can we say that the Elite families of the West have changed; that all is in the past and they have comprehensively turned over a new leaf? Evidence so far suggests that this particular mind-set has merely adapted and refined its methods. Depopulating the world, identifying, logging, tagging and micro-chipping the remaining populace and herding them into tightly controlled mega-cities via economic hardship is one future the Pathocrats envision. Meanwhile, buying up vast tracts of land under the banner of environmentalism will provide them with suitable means to live with the benefits of advanced bio-genetic/cyber technology at their fingertips – most likely with the view to extending their life-spans. Far-fetched or not, psychopaths and those drunk on power seldom think of failure. Vast amounts of money has been channelled for decades into massive underground bunkers presently dotted around the US and Europe some of which can house over 2 million people. To bring “Order out of Chaos” one must first introduce the Chaos to the extent that all manner of alternatives are wiped clean, leaving only one Singularity. They intend to be safe and warm away from all their created carnage and for as long as it takes.

The same vision that has hijacked the normal expressions of creativity for the last two hundred years or more has embraced the Information Age. If a virus goes unnoticed within all societal domains and even begins to define the nature of society, then any future innovations and apparent evolutionary surges will be made under the impetus of the same macro-social pathogen and thus subverted towards anti-human goals until such time it begins to lose its grip. The internet provides us with an immense opportunity to access massive amounts of information and turn it into knowledge through clusters of networks. We have the opportunity to develop and apply that knowledge/awareness in ways undreamt of. Consequently, a real battle for freedom is already taking place in various fields of technology between what we might call the entropic /machine consciousness which seeks to dominate and coerce reality into its tiny perceptions and the human / creative consciousness that seeks to co-create, disburse and expand alongside the Earth and Universe. As a very real human global brain awakens it remains to be seen how it will be wired up and if those “synapses” will be able to make unbreakable bonds based on freedom, truth, responsibility and love.

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

Technocracy I

By M.K. Styllinski

“Technopoly is a state of culture. It is also a state of mind. It consists in the deification of technology, which means that the culture seeks its authorization in technology, finds its satisfactions in technology, and takes its orders from technology. This requires the development of a new kind of social order, and of necessity leads to the rapid dissolution of much that is associated with traditional beliefs.”

– Neil Postman


Under the International Rice Research Institute (IRRI) heavily funded by the Rockefeller Foundation we see the centralisation of food under agribusiness merging with SMART society. Technology is the key to delivering a world of plenty according to these scientists and financial backers. On the website we read: “The Rockefeller Foundation envisions a world with SMART Globalisation – a world in which globalisation’s benefits are more widely shared and social, economic, health, and environmental challenges are more easily weathered.” Recall too, our exploration into the scare-tactics of global warming, the implementation of UN Agenda 21 and Sustainable Development (SD) all of which is hijacking genuine concern for our planet in order to use it to advance a New World Control System, by stealth. On the one hand, we have overt geo-political deception forcing chaos into being upon which a Hegelian solution for that post-war (post-catastrophe?) world can be laid. On the other hand, the requisite, centralised “New International Order” is delivered as a “benign” ecological, socio-cultural and economic template incorporating urban, energy efficient and sustainable “human habitat” zones requiring a high-level population density.

2012-07-21 18.22.48© infrakshun

After great disasters, there are always great opportunities to create new institutions and infrastructure predicated on elite ideologies.  World War I and II were prime examples, and indeed partly initiated for this very purpose. Humanity’s spirit must be broken in order that such phases of a New Order are welcomed, albeit with inclusive-sounding labels for peace and prosperity. The aftermath of intense Earth changes and asymmetric warfare will provide the same opportunities for another phase in the Pathocratic encroachment over normal human beings. And what might we expect?

Think of it this way:

If the Pathocrats have their way, we will be carefully managed into SMART operated high-rises with uniform amenities and leisure parks, where metered energy consumption, automation and hyper-digitisation will be encased in an overarching surveillance – for your own “protection.” Only the new technocratic gentry will inhabit lands deep in the countryside. For the rest of us it will be off limits, our movements strictly monitored. In accordance with New World Religion protocols and the New World Civil Servant Resolutions Nature will be protected as “sacred” and barred from the mass of humanity. These Mega-cities will provide for our every need … Provided that is, conformity and compliance remains paramount for the New Collective and the maintenance of a group consciousness duly cultivated, as envisoned by Zone Council Resolutions. This will ensure the efficiency of our SMART society, the most important precept in the New Age.

Break consensus and community cracks. Serve the individual and promote the Self, SMART grid dysfunction and the potential for overall system failure is inevitable and thus a return to fragmentation and dissociation of the past. This cannot be permitted – for the good of the whole. Resistance is like an infection, before you know it, the whole grid would be infected.  As such, we must be treated like the historical virus that we are and protected from ourselves by the guiding hand of the Priesthood, otherwise, the potential despoiling of Mother Earth will occur. Accordingly, a vast number of protective measures have been put in place to maintain efficiency and inner happiness. We will want for nothing. To maintain optimum levels of sensate satisfaction, human habitats will have their own integrated “Malware” and “anti-virus” enforcement systems in place as envisioned and voted for by Neighbourhood, Zone Councils and Regional Elects – for the good of all. Community is all, group consciousness is all … Love life, the New SMART Consensus.

You can probably continue the narrative with all kinds of creative allusions inspired by various books and Hollywood flicks. This is the real inverted totalitarianism that both Orwell and Huxley warned about and countless myths and oral traditions.

So, are the checks and balances in place to prevent such a future? Or is it just a silly Dystopian fantasy?

When SD and SMART systems are set against the strangle-hold that our power brokers still maintain currently manifesting as ubiquitous surveillance and the erosion of civil liberties, then questioning the direction this form of technology is taking  becomes an absolute imperative. For once we have passed a certain point in technological know-how, artificial intelligence will offer us no way to turn back without wholesale destruction.

Society is rapidly changing thorough technological innovation advancing in ways that challenge the imagination. The horizon is limitless as to how technology will be used. The important question to ask is: do we have any say in how technological knowledge is being applied in the present and thus how it will shape our future? As with most things in life, there are always positives and negatives to any new innovation on a mass scale,  but it remains to be seen which one will gain ascendance. As always, this is dependent on who holds the overall power of technology and its uses. So far, we have an appalling track record. As it stands, the advantages are set to provide unquestionable benefits in the medical field communications sectors. But what are the dangers of an over reliance on digital technology applied to all other sectors of society? Will it augment the path to true freedom or be its demise? Already there are serious questions being asked on a number of issues from health to civil liberties, artificial intelligence to cyber warfare, all of which we will explore.

chicagoillinoiswifi

As this silicon revolution continues to submerge us in an ocean of Wi-Fi waves there are signs that our intense reliance on SMART networks may not be the most expedient way to take humanity forward. Nonetheless, selling the idea of convenience and efficiency is proving extremely seductive. It also offers untold benefits to intelligence agencies, in particular the National Security Agency (NSA) to complete its mission to own information and predict behaviour of every individual in America and the globe.

The acronym “SMART” is the new mnemonic buzzword which is being used to describe a network of gadgets, utilities, services, weapons, energy systems and new forms of governance bound together in a sea of digital and Wi-Fi-based technology. Each letter in the acronym stands for a particular objective which can be loosely interpreted. They are typically defined as follows:

S = Specific / Significant

M = Measurable / Motivational

A = Attainable / Assignable

R = Relevant / Realistic

T = Time-bound / Time-Related

The technology promises a broad range of practical and philosophical ideas which are already re-shaping the very concept of communication, travel, agriculture, medicine and city infrastructure. SMART uses computerised systems which incorporate digital metering to monitor and control energy from power plants to appliances within the home.  Another acronym used to describe this technological structure of Web-connected appliances and in-home devices is the “Internet of things” (IOT). Although domestic appliances such as fridges, freezers, lighting and televisions fall under the IOT, it is the energy companies and infrastructure –  including transportation, health, oil, gas and alternative energy systems – which are being incorporated into a vast SMART grid awash with Wi-Fi technology that will connect to the internet and allow devices to “speak to each other.”

Many corporations such as AT&T, General Electric, are changing their present system of distribution, storage, administration and the very core of their manufacturing towards the IOT and SMART philosophy. For software companies such as Cisco, IBM, Siemens, Microsoft and Intel, this is a lucrative time. As a September 2013 article by online magazine Standard Digital entitled: ‘Tomorrow’s smart cities’ explained: “In Singapore, Stockholm and California, IBM is gathering traffic data and running it via algorithms to predict where a traffic jam will occur an hour before it has happened. Meanwhile in Rio (Brazil), it has built a NASA-style control room where banks of screens suck up data from sensors and cameras located around the city.” IBM has 2,500 smarter cities projects worldwide and is confident in financial future of redesigning cities. To that end it has trademarked the term “smarter cities”.

The article also quotes Anthony Townsend, director of the Institute of the Future and author of Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia. Townsend puts his finger on the pulse when he states: “Some people want to fine tune a city like you do a race car but they are leaving citizens out of the process…” And in relation to a China’s massive new city building projects and huge central control rooms, one of which is already operational in Rio, Brazil: “The control room in Rio was created by a progressive mayor but what if the bad guys get in? Are we creating capabilities that can be misused?” Constant attempts to try and get the UK public to adopt a bio-metric, National ID card have failed, though a foreign ID card for immigrants was unveiled in 2008 as a possible “softening up” exercise for a re-introduction of the scheme. This seems to be one branch in the creation of database state in the UK and abroad. When all the databases are indexed by what is known in the UK as the National Identity Register (NIR) it is then that our lives will be defined by our NIR number and a host of invasive surveillance which may come into play.


The UK organization NO2ID which campaigns against the Database State sees “Transformational Government” as not just a threat to our civil liberties but a whole way of life. Indeed they state: “… what is being transformed is not government but its power over you.” The reason for this increasing disquiet over State interference in the lives of British people is drawn from broad range of measures integral to the emerging SMART society.

NO2ID outlines just some of the UK government’s plans currently evolving:

  • ID interrogation centres, for passports and ID cards
  • ePassports that help collect data about your travel
  • International eBorders schemes that exchange Passenger Name Record information with foreign countries as well as collecting them
  • Recording of all car journeys, using Automatic Number Plate Recognition (ANPR)
  • ‘Entitlement cards’ as part of, or linked to the ID scheme, logging use of public services
  • Centralised medical records without privacy
  • Biometrics in schools — fingerprinting children as young as 4 or 5
  • ‘ContactPoint’, a database collecting sensitive information on every child
  • Fingerprinting in pubs and bars — landlords forced to monitor their patrons
  • A greatly expanded National DNA Database (NDNAD)
  • New police powers to check identity
  • Increasing Criminal Records Bureau (CRB) checks for employees and volunteers
  • Businesses under pressure to verify ID of staff and customers with the government  [1]

Neil Postman’s reference to a “Technopoly” as a state of culture is another consolidation of Official Culture. It is a description of an emerging Pathocracy with emphasis on the scientific technique underpinning the dominance of technology and its applications. When combining the  Surveillance State, and SMART society we fuse Technopoly and Pathocracy to form: Technocracy. a system of society according to which government is controlled by scientists, engineers, and other experts. It is a scientific dictatorship as discussed in ‘World State Policies III: The Scientific Technique’ and to which UN Agenda 21 and Sustainable Development is integrated.

city-metropolis-buildings-skyscrapers-city-road-lights

Howard Scott and M. King Hubbert founded the Technocracy movement in 1932 during the Great Depression and produced what is seen by many as the Bible of the movement: The Technocracy Study Course. Rather than the “price system” the design was based on the metrics of energy and considered apolitical. It was primarily a technological panacea for global economic problems based on energy production and distribution together with precise monitoring and measuring as the pillars of its potential success.

It was a techno-Marxist plan which included nationalising public utilities abandoning the gold standard (which the financial oligarchs loved) and suspending the stock exchange. Why would you need one when the new currency was mainframe of automation and “digital” currency?

The Technocracy Study Course reads like a strange amalgamation of bureaucratic fundamentalism grafted on to a engineer/mathematician/accountant’s world view of humans as binary energy units. (Perfect for the Lucis Trust’s New World [Civil] Servants). They outline their meter reading diagnosis for society in typically precise fashion:

  • “Register on a continuous 24 hour per day basis the total net conversion of energy.
  • “By means of the registration of energy converted and consumed, make possible a balanced load.
  • “Provide a continuous inven­tory of all production and consumption
  • “Provide a specific registration of the type, kind, etc., of all goods and services, where produced and where used.
  • “Provide specific registration of the consumption of each individual, plus a record and description of the individual.” [2]


Many younger online users attracted to hacktivism, spirituality and social networking have been taken in by the recent manifestation of technocracy in the very slickly produced and marketed Zeitgeist films and the affiliated Venus Project founded by Jasque Fresco. The first film included some excellent truths regarding the nature of the economic world in which we live, as well as an incisive deconstruction of government influence and false flag operations. But the second film entitled: “Addendum” revealed that it had some fatal flaws. Zeitgeist was designed to grab our attention and prime the not so discerning members of the public to accept another version of Elite control this time through systemic technology as saviour, where computers make key decisions. It is the same techno-Marxism that assumes everyone will be thoroughly happy with such a Brave New World of regimented, rule-based precision; where individuals become numbers integrated into a game theory mainframe of “efficiency.”

smart-city-concept

Source: DefenseForumIndia.com

Naturally, no mention is made of authoritarians and social dominators pre-disposed to the distortion and co-option of well-intentioned technocrats. To say that such a scenario is unrealistic and naïve seems obvious, not least the undesirability of such a sterile future. It is the same old approach to people management with the blessing of the Rockefeller class, all of whom have been extremely active in the “information dominance” brand of social engineering. When you know the awareness is changing the mass mind then you offer the World State scenario under a different guise and adapt good intentions accordingly.

The Zeitgeist Mission Statement gives us all we need to know:

“This ‘Resource-Based Economic Model’ is about taking a direct technical approach to social management as opposed to a monetary or even political one. It is about updating the workings of society to the most advanced and proven methods Science has to offer, leaving behind the damaging consequences and limiting inhibitions which are generated by our current system of monetary exchange, profits, corporations and other structural and motivational components.”

The term “Technocracy” in Zeitgeist terms, is really another way of referring to the “scientific technique” dipped in coating of trans-humanist fervour. Think eco-aware, engineering geek meets bank manager, meets human resource chief. Throw in a goatee and there you have it. It’s the same story different wardrobe.

In America, appealing to the new generations born in the digital world is a vital part of the social engineering project reaching its apotheosis of the Rockefeller Foundation. The GMO/agriculture research arm of IRRI calls it: “SMART Globalisation”, a corporatist-collectivist vision that sounds wonderfully benign on the face of it. It is the latest meme designed to channel human activity into local, national and global SMART systems from which our finances, health and autonomy would be under complete and automatic control. In other words, a Global SMART Grid. It is here that we see technocracy and neo-feudalism come together in virtual “harmony,” developed with the best of intentions at the lower end of awareness but guided by the worst from the top. The current crisis in the capitalist economic order is all part of the phase to replace the old world with this new vision. Let’s just recall that David Rockefeller has been a long-time admirer of communist China and the hybrid vision of the capitalist-collectivist philosophy.

a61paj5smao7

David Rockefeller and Mao’s deputy Zhou Enlai 1973.| The Rockefellers have been hard at work engineering this World State based on the Chinese model for many decades. For more information see Rockefeller Internationalism by William Banyan

Author Naomi Klein alerted us to the fact that Chinese authorities have taken SMART society to their hearts and created a “model city” of the future re-affirming the Rockefeller and Elite vision for the world. It only took 30 years, for Shenzen to be transformed from a barren wasteland to a SMART city of 21.4 million occupants who are living the “dream” and where 200,000 cameras currently monitor and survey the populace with over 2 million more planned. What this SMART Society provides is a police State testing ground comprising of “central planning, merciless repression and constant surveillance.” Fortune 500 technology companies are watching very closely indeed. So closely, in fact, that high-tech surveillance and censorship programs were provided by IBM, Honeywell, and GE people under the generic name of “Golden Shield,” and used as a test run for what will is envisaged for the US population (once it has been thoroughly broken by social and economic chaos that is…) [3]

Recall former US National Security State advisor under Carter and Obama head hunter Zbigniew Brzezinski and his 1968 book Between Two Ages: America’s Role in the Technetronic Era. It was a call to re-envision the technetronic era after a few abortive attempts during the 1930s depression. It was to be the inspiration and backbone to the formation of the Trilateral Commission and its support of the Tiger economies of Asia. It was no coincidence that the book was extraordinarily prescient. Brzezinski, like so many geo-political establishment intellectuals often broadcasts Elite visions under a predictive and softly critical narrative. The intent is to broadcast formulas to the faithful and engage a populist understanding of the principles and their future objectives. And by “populist” we mean not just the public but those who may be termed the worker bees in the hive mind of the global Establishment.  Between Two Ages served to ignite the fuse of a Technocracy, the seeds of which were planted in another era of economic depression and ready to download directly into our minds. Brzezinski writes: “In the technetronic society the trend would seem to be towards the aggregation of the individual support of millions of uncoordinated citizens, easily within the reach of magnetic and attractive personalities effectively exploiting the latest communications techniques to manipulate emotions and control reason.” [4]

between two agesWe are already immersed in the “ether” of radio, micro and now Wi-Fi waves * indicating that not only is this foundation for a Technocracy present, it is accelerating exponentially. For this growth to continue unabated, Brzezinski posits another future scenario that has come to pass, involving: “… the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values (of Liberty). Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.” [5]

He warns us with apparent gravitas:

“Another threat, less overt but no less basic, confronts liberal democracy. More directly linked to the impact of technology, it involves the gradual appearance of a more controlled and directed society. Such a society would be dominated by an elite whose claim to political power would rest on allegedly superior scientific knowhow. Unhindered by the restraints of traditional liberal values, this elite would not hesitate to achieve its political ends by using the latest modern techniques for influencing public behavior and keeping society under close surveillance and control. Under such circumstances, the scientific and technological momentum of the country would not be reversed but would actually feed on the situation it exploits.” [6]

There are two ways in which this Technocracy is being implemented both of which naturally intersect:

1) Economics and energy

2) Surveillance and state controls.

In the first instance, the energy issue is being promoted and reorganized via the digital automation of SMART technologies. The US Department of Energy defines these technologies as: “… an electrical grid that uses computers and other technology to gather and act on information, such as information about the behaviours of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity.” [7]A similar grid is underway in Europe under “SMART Grids European Technology Platform.” [8]

America’s old and out-dated power grid is ready for an overhaul and the SMART Grid technology will mean the installation of digital meters in each home and business and 24hr monitoring of energy consumption that goes with it. What SMART means in this context is that there can be communication with other related devices within the home to relay support data information without any contact with the customer. Rather like Homeland Security and its agencies, The SMART Grid Task Force “… is responsible for coordinating standards development, guiding research and development projects, and reconciling the agendas of a wide range of stakeholders.” [9]

SMART Grid technology is big money and represents a revolution, particularly in telecommunications and energy. In 2010, the countries investing the most in SMART grid systems were China at $7.32 billion, closely followed by the United States $7.09 billion, Japan at $807 million with Spain, South Korea, France, United Kingdom, Germany, Australia and Brazil all spending millions on transforming their societies’ infrastructure. [10]

Like so much of the post-911, military-corporate infrastructure outsourced both home and abroad, the Department of Energy’s mandate to push ahead with this overhaul did not get Congressional hearing. From October 2009 – January 2010 SMART grid project funding ear-marked for 183 projects in 43 states totalled $3.4 billion thanks to the Obama Administration picking up where the Bush Administration left off with the creation of The Office of Electricity Delivery in 2003. The Department of Energy’s press release gives details of what this will mean for the average electricity consumer:

  • More than 850 sensors called “Phasor Measurement Units” to monitor the overall power grid nationwide
  • 200,000 SMART transformers
  • 700 auto­mated sub­stations (about 5 per cent of the nation’s total)
  • 1,000,000 in-home displays
  • 345,000 load control devices in homes [11]

smartgridvillageThe SmartHouse/SmartGrid Vision c/o The 7th Framework Programme funded European Research and Technological Development from 2007 until 2013 Link: http://www.smarthouse-smartgrid.eu/index.php?id=245


Systems theory and cybernetics had always been attractive to technocrats as a web of relationships that facilitate economic and social control. “The Web of Life” concept of interdependence and interrelatedness of all things within ecological systems was taken on by a number of ecologists and New Age seers. The concept of equilibrium and balance was in fact, determined by vastly unpredictable and creative confluence of non-linear principles, which is why attempts to bottle such non-linear systems into a means of socio-economic control can never work. However, this is where the World Wide Web (WWW) and the Network of Things (NOT) comes in. It is essential to the mind-set who see people as numbers and assigned values to be moved around on a computer screen like a game of SIMS.

Sims3UnivLife

Ready to become part of a virtuality and SIMS-SMART?

With NOT, technocrats wish to bathe us in a sea of Wi-Fi waves, with cities and homes awash with wireless networks where automation rules. From your dimmer switch to powering your juicer; the garage door to the security code on the residential gates. No human intervention is necessary. With strict guidelines as to what they will be programming, the new armies of programmers will be told to download exactly what they want you to see and hear, changing it as they see fit and without your knowledge. If you refuse and wish to take it to an ombudsman or even a civil action, how are you going to watch your T.V. or eat your food if your utilities are switched off? Look at the nature of banking. When did you last see your bank manager or get a problem resolved whilst speaking to some low-wage slave in India you cannot understand? Distance is designed.

The SMART Grid is married to the Wi-Fi Alliance which is readying itself to implement Wi-Fi circuitry in every conceivable device in the home and business sector. It will operate in exactly the same way as Wi-Fi-enabled network modems and routers for personal computers to mobile phones currently being used by homes and businesses globally. Telecommunications electricity, and renewable energy resources will be functionally integrated into a system automatic provision, payment and monitoring. Gmail, i-Pod applications, your fridge and T.V. and the Wi-Fi “ether” that will activate them are ready to be absorbed into the SMART Grid where literally everything communicates with each other in a fully-automated, seamlessly connected world of man and machine.

And now, it means you can literally become part of the very fabric of SMART willingly and forever with electronic senors printed directly onto your skin… Oh, the convenience! Mike Orcutt of MIT’s Technology Review comments: “Such systems could be used to track health and monitor healing …” Sure. And if you fall on the wrong side of your friendly SMART government tracking and monitoring takes on a whole different meaning. But having your i-pad on your wrist as opposed to freedom of movement is clearly more important… More on this later. [12]

printable.skin_.electronics.2x299Now, you too can become SMART!

Another aspect of the Wi-Fi revolution that is not being talked about is the health effects of living our daily immersed in this type of constant radiation. There is a glut scientific, peer-reviewed papers out there which are unsurprisingly, barely receiving a whiff of recognition that they sorely deserve. Adverse biological effects from Wi-Fi signals, Wi-Fi enabled devices or Wi-Fi frequencies (2.4 or 5 GHz) have been complied by the UK campaign group Wi-Fi in Schools (You can visit them at http://www.wifiinschools.org.uk and print out as many as you like). The many examples of extensive research undertaken by University and independent scientific research institutes provides disturbing evidence across a broad range of experiments carried out on mice, rats and tadpoles.

Some of the findings included:

  • Immunohistopathologic demonstration of deleterious effects on growing rat testes of radiofrequency waves emitted from conventional Wi-Fi devices.
  • Decreases in human sperm motility and increases sperm DNA fragmentation from the use of laptop computers connected to internet through Wi-Fi.
  • Oxidative injury in rat testis and on oxidative stress in blood induced by 2.45-GHz radiation from wireless devices.WI-FI_ZONE_01
  • A provocation study using heart rate variability shows Negative effects on autonomic nervous system from microwave radiation from 2.4GHz cordless phone.
  • Wi-Fi electromagnetic fields exert gender related alterations on EEG
  • 2.45-Gz wireless devices induce oxidative stress and proliferation through cytosolic Ca2+ influx in human leukemia cancer cells.
  • Microwave Irradiation-Induced Oxidative Stress Affects Implantation or Pregnancy in Mice
  • Cognitive impairment in rats was shown after long-term exposure to GSM-900 mobile phone radiation.
  • Stimulation of production of tumor necrosis when exposed in vivo and in vitro to weak electromagnetic waves in the centimeter range
  • Nerve cell damage in mammalian brain after exposure to microwaves from GSM mobile phones. [Source: wifiinschools.org.uk]


Bearing in mind that 16v/m is the average level of exposure for these experiments and that when using a Wi-Fi-enabled tablet computer we can be exposed to electromagnetic fields up to 16V/m. This is only the beginning of research into these areas but the evidence for serious problems on the subtle layers of our biological and neurological make-up is already overwhelming. If we don’t put the brakes on for the health issues alone, then we will be looking at generations with behavioural difficulties, infertility, impaired cognitive ability and an epidemic of endemic brain tumours.

As smartphones begin to rain down from the technocratic ether, the most convincing evidence that mobile phones are causing brains tumours in the young has arrived from Dr. Boian Alexandrov from the Centre for Nonlinear Studies at Los Alamos National Laboratory in New Mexico. His team have shown that terahertz (THz) waves gradually destroy human DNA which is fairly terminal for the human race. Since chips broadcasting THz waves are being considered for use in mobile phones as imaging systems tool across this SMART society and THZ scanner technology is already being used by the TSA at most of our airports, the question as to whether there are any health issues concerning terahertz technologies seems unimportant as the great wave of innovation roars ahead.

The medical establishment is encouraging the use for operations in which scanning will prove highly useful for otherwise invasive procedures while “exciting” innovations in consumer freedom will allow us all to see through objects and walls to find our lost car keys should we choose to buy into the gadget craze. Dr. Alexandrov and his team’s ground-breaking study (among others)  is lurking in the background as a minor impediment to the euphoria of “progress.” His team discovered that exposure to THz radiation builds cumulatively and affects human and animal tissue DNA, effectively “unzipping” the DNA molecule. In their paper ‘DNA Breathing Dynamics in the Presence of a Terahertz Field,’ Alexandrov et al conclude:

“We consider the influence of a terahertz field on the breathing dynamics of double-stranded DNA. We model the spontaneous formation of spatially localized openings of a damped and driven DNA chain, and find that linear instabilities lead to dynamic dimerization, while true local strand separations require a threshold amplitude mechanism. Based on our results we argue that a specific terahertz radiation exposure may significantly affect the natural dynamics of DNA, and thereby influence intricate molecular processes involved in gene expression and DNA replication.” [13]

So, if we continue to breathe in the SMART hype, we’ll soon see where the real growth lies.

 


* “Wi-Fi is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections.

See also:

TruthStream’s  Forcing a Total, Saturated 5G Future… Without Safety Checks

5 Ways Smart Phones Are Dumbing People Down


Notes

[1] http://www.no2id.net/
[2] p.232; The Technocracy Study Source, by Howard Scott and M.King Hubbard, published by Technocracy Inc. 1940 edition.
[3] ‘China’s All-Seeing Eye’ By Naomi Klein, Rolling Stone, May 14, 2008.
[4] Between Two Ages: America’s Role in the Technetronic Era by Zbigniew Brzezinski 1970 / ISBN-10 0313234981 (p.11)
[5] Ibid.(p.97)
[6] Ibid. (p252-253).
[7] U.S. Department of Energy. ‘Smart Grid / Department of Energy’ http://energy.gov/oe/technology-development/smart-grid.
[8] http://www.smartgrids.eu”. smartgrids.eu. 2011.
[9] Smart grid: an introduction US State Department.
[10] http://www.zprymeconsulting.com
[11] ‘Smart Grid: The Implementation of Technocracy?’ By Patrick Wood, August Review 03 March 2010.
[12] ‘Electronic Sensors Printed Directly on the Skin’ MIT Tech, Mike Orcutt, March 11, 2013.
[13] ‘DNA Breathing Dynamics in the Presence of a Terahertz Field’ by B. S. Alexandrov, V. Gelev, A. R. Bishop, A. Usheva, K. O. Rasmussen. (Submitted on 28 Oct 2009) Biological Physics (physics.bio-ph); Computational Physics (physics.comp-ph) Journal reference: Physics Letters A, Volume 374, Issue 10, 2010. Abstract: We consider the influence of a terahertz field on the breathing dynamics of double-stranded DNA. We model the spontaneous formation of spatially localized openings of a damped and driven DNA chain, and find that linear instabilities lead to dynamic dimerization, while true local strand separations require a threshold amplitude mechanism. Based on our results we argue that a specific terahertz radiation exposure may significantly affect the natural dynamics of DNA, and thereby influence intricate molecular processes involved in gene expression and DNA replication.