pre-crime

Official Culture Reprise I: (Or… Don’t reach for the tranquilizers just yet)

 By M.K. Styllinski

“No matter how paranoid or conspiracy-minded you are, what the government is actually doing is worse than you imagine.”

William Blum, author and Former U.S. State Dept. Employee


 image

© infrakshun

“In 1984, the government continually changed its past by creating new historical fictions to justify its present. I wondered if we had already gone beyond 1984, where, as Orwell said, “truth is falsehood,” and “ignorance is strength.”

Walter Bowart, Operation Mind Control (1978)


As the Greek Philosopher Phaedrus wisely stated: “The only problem with seeing too much is that it makes you insane.”

Inducing insanity hasn’t been the aim of this blog, but after reading about many of these subjects (let alone experiencing them) it wouldn’t be too much of a surprise to succumb to a heavy heart after being confronted with so many entrenched iniquities. However, the Dark Night of the Soul should eventually liberate not imprison; providing a stepping stone to a richer, fuller appraisal of our world and ourselves. There are demons stalking the souls of our ancestors and the children of our modern world and it must cause concern, but not to the point it induces paranoia and paralysis. We cannot defend and then integrate the shadowlands if we are not aware that they exist and once we see them we do not understand their behaviour. We must become tacticians of the soul if we are to survive.

We have the chance to see evil for what it is – simply the natural expression of a dynamic which has been allowed to reach its extreme. Paradoxically, this also reaffirms the opportunity to reduce darkness and its destroyers and enhance the light with laser-like precision. Perhaps when we look at what is, we are in a better place to use the knowledge we have to imagine what could be. Having observed extreme negativity and its psychopathic stimulus, perhaps we are gradually becoming forewarned and forearmed, ready to break the chains of our psychological and spiritual slavery. This becomes a positive affirmation of the potential of humanity.

Yet, it is true to say that we have left it a little late…

You have to think positive. Things are never that bad.”

Despite this cliché being wheeled out in response to the fact that things ARE “that bad” and actually much worse for the majority of people, there is truth in the statement. The idea that balanced, positive thinking improves health and affects the lives of others in beneficial ways is now proven both clinically and experientially. It requires effort and persistence but it can be done. It’s just one of those essential ingredients in the cooking pot of emotional and mental defence which will decide whether we are victors in the face of evil, or its perpetual victims. Conversely, for that positivity to be worth anything at all it must lead to an application of knowledge that is based on as close approximation to objective reality as possible, otherwise, we are merely listening with our fingers in our ears.

As long as we are not blinded by the dazzle of our carefully cultivated inner suns, perhaps we can to do great things in the future. As Helen Keller once said: “All the world is full of suffering. It is also full of overcoming.” And as the cycle turns – so shall we. But first we must be able SEE how inured in this manufactured reality we have become.

Until then no escape is possible.

100_5003© infrakshun

It may seem as though I am vociferously anti-Western and see everything as shadow devoid of any light. This is not the case. What I do see is the enormous potential of humanity and just how suppressed, dumbed down, weakened, maligned and soul-destroyed it has been for tens of hundreds of years. No more so than in the last century, although the methods by which we are kept asleep have become more sophisticated. I’ve also seen myself as an exact replica of those very qualities from which I’m slowly extricating myself. Once we begin to dig deep and actually start to shed those layers that make up our false, conditioned selves, there is the potential to realise that we are so much more than we are led to believe. What is more, we have chosen to love our ignorance, servitude and the formation of societal structures which lock us into an exclusively materialist definition of what it means to be human. And this has meant untold suffering and misery for so many souls. Therefore, our responsibility for the choices we make in our lives have repercussions for ALL since we are inextricably connected to the elected or forsaken responsibilities of others.

We can never exist in isolation however much at times, we wish it were so.

This time, I think there is an opportunity in the face of coming global changes, not for some utopia re-cast in a different guise but to go to the heart of the problem and take back the gold that we have allowed to be stolen from us. Knowledge of how psychopathy and its tributaries of evil manifests in the collective mind and its external realities is something so important that the ancients made it an integral part of their oral traditions whether we focus on Sufism of Persia to Native Americans, the Celts of Britain or the German fairy tales of the 18th Century – the akido of the soul is an art that is slowly being rediscovered.

At this stage, even though it may seem that the global horse has long since bolted and everything seems inevitable, not only is pragmatic optimism required for a richer and more fulfilling life it may also be a scientific inevitability that the fruits of that hope will descend when we least expect it. The unpredictable is not part of a psychopathic blueprint but is part of the Creative Universe. Whether or not we all overcome what is a concerted effort of the few to co-opt and destroy the creativity and peaceable nature of the majority, will depend on whether we can all work together to address the shadow side of humanity and acknowledging our part in its ascendance – wherever and whomever we are.

At the same time, when we decide not to follow what has become Official Culture and not to believe the lies, we necessarily go against the accepted beliefs of the day. This brings us face to face with our own deception – the lies we have told ourselves perhaps over many years which initially helped us survive but have now proved toxic, dimming the light of the soul as each day goes by. As African-American novelist James Baldwin observes it is: “Precisely at the point when you begin to develop a conscience you must find yourself at war with your society.”

And with yourself.

This “war” should not be one of violence but a psychic battle between truth and lies which necessarily takes place through us, something I am belatedly discovering along my own path. Sometimes you cannot be shown, rather it must come from your self-inflicted lessons which are a natural “becoming.” A choice must then be made to allow such a process of inner change to proceed. Yet, strangely it is not something that can be initiated at will. To bring our accumulated shadows safely and effectively into conscious awareness must be carried out slowly and methodically over time and at different speeds for different people. We must acknowledge that we are far from whole, and to begin gathering in the scattered parts of our psyche so that we differentiate what is truly a part of our own experience and to thereby set some boundaries. Conscious and willed effort as part of a framework of sincerity to change is essential, even though the process is not actually under the control of the will. As Jungian psychologist M. Esther Harding mentions, to find a semblance of wholeness within oneself and therefore more resistance to forces that would turn one into bio-chemical play-thing, such a process: “… originates autonomously from a movement in the unconscious, and may be likened to physiological processes that go on without conscious control or assistance.” [1]

Nonetheless, understanding that our choices are, to a great degree, derived from the matrix of Official Culture, is our starting point. This can lead to the beginnings of an initial spark deep within our own being and will determine how our choices – therefore the quality of our awareness – will develop.We cannot hope to suitably address the external world with tangible results without having first addressed all manner of conflict within.

This is when the real journey begins.

 rainbow_landscape© infrakshun

The events of 9/11 represented a watershed in the fortunes of America and the world.

When faced with questions which are born from objective evidence from not just the few, but from the many, we may then ask ourselves what in all conscience, are we prepared to accept? This includes taking on board the possibility that what we assumed to be true was in fact false; that the trust we placed in those currently in power may be wholly unfounded. It requires that we face the high probability that we have been lied to, beyond the bounds of mere coincidences and “failures of intelligence,” but from a systematic, purposeful propaganda strategy designed to fulfil a set of long known ideological and geo-political objectives. We have an opportunity to discover how much of this proffered evidence impinges on lives. However, we may have to re-evaluate the way in which we have understood the workings of democracy, government, media and human nature – even our own place in society and the world.

While uncertainty, fear and conflict have increased significantly since 9/11, the individual and collective responses to this important event will reveal how creatively we can act for freedom and truth, or how deeply we have chosen to believe the Lie. Pull a thread hard enough and for long enough, it will eventually reveal more than we might care to know. Yet when our preconceived ideas are shattered it can also open our minds, shock us into realisations and more choices as to what we can do with this information. We have the opportunity to see things as they really are which in turn will offer a chance to understand who we are and what we choose to see.

In the context of 9/11 and geo-politics if a pathological perception exists at the highest level of government, the logical conclusion is that there are people drawn from all political and religious persuasions who are psychopaths first, and who will adopt whatever belief will serve their predatory behaviour best. In one sense it doesn’t matter who’s on first: the only underlying constant is age-old predatory behaviour of the psychopath and sub categories of psychological deviance that lie behind all the manifestations of evil we see today. Factions with the US government and its agencies consciously engineered of the 9/11 attacks with many low level US officials unknowingly assisting in its final climax, partly due to the belief that it was yet another military exercise. The primary architects have elements within the Israeli government and intelligence apparatus. There is evidence of both a circumstantial and deductive nature that places Israel firmly at the scene of the crime not least because they had everything to gain from such a tragic event.

The information explored on 9/11 hasn’t even come close to scratching the surface. At the very top of our psychic food chain lies an occult body who enacted a huge sacrifice or “Mega-Ritual” designed to appease and invoke the archetypal forces associated with a variety of Gods and Goddesses and in line with Illuminist traditions of the 3EM. We may never know exactly who were responsible for this attack against humanity, so vast is the net of converging interests. It is also likely that while those at the top of this Pyramid are few indeed, the psychological footprint of their effects can be likened to slow-motion release of a neutron bomb, spreading a psycho-spiritual toxicity as dangerous as any radioactive cloud.

Whether we believe in any of the religio-occult principles which have surfaced over the course of this series, they are taken seriously by many members of international governments and military who are currently deciding the fate of nations.  9/11 is the most potent expression of orchestrated evil for centuries. It represents a nexus of aligned interests with occultism at its core and surrounded by strategies which buffer the observer from the true ritualistic nature of the operation. Yet, it is only one phase in a long tradition of social engineering that is about to reach its apotheosis over the next decade.

So, let’s summarise, very simply some of the themes which have appeared so far.

image_thumb.pngofficial-culture

Spheres of Influence | © infrakshun


“The inability to grasp the pathology of our oligarchic rulers is one of our gravest faults. We have been blinded to the depravity of our ruling elite by the relentless propaganda of public relations firms that work on behalf of corporations and the rich.”

— Chris Hedges


9/11 Occult Mega-Ritual: orchestrated as a monumental ritual sacrifice in plain sight. The source of this atrocity was carried out by a conglomeration of members drawn from the upper echelons of the Three Establishment Model of Liberal, Conservative and Zionist members. These are in turn, are filtered through memberships of freemasonic branches of Rosicrucian Illuminism and occult Zionism under various names and lodges. In all probability there is a grouping entirely unknown and without any labels who oversee the whole Big Show. Their beliefs are a form of existential Satanism drawing from an archaic techno-sorcery: an intense and a sophisticated mastery of science, psychology and cosmology which effectively marks them out as the leaders of a breakaway society. They are essential psychopaths and the perfect embodiment of the dark side of humanity and its collective shadow. In one sense, they serve a spiritual purpose in the balancing of negative and positive poles. Hence the need to re-establish a level playing field where negative forces can be objectively SEEN and understood.

Military-Occult Intelligence groups: are the key players and intermediaries between governments, think tanks and the military. They are perhaps closet to the core, inner workings though highly compartmentalised and tightly controlled. The MI6-CIA/NSA-MOSSAD triangle is on first, linking hands with the Anglo-American banking families and US Zionist influences. They are the tools which enable mind control/PSYOPS operations, media propaganda, CoIntelpro, Eco-Intelpro, coloured revolutions and false flag terrorism whilst working through the economic architecture of the 4C’s and geostrategy. They are the key cogs on the vast turning wheel.

Organised Religion: Embedded in the 3EM. They are the strings which are attached to a complex system of puppetry which make up the beliefs and myths of religious indoctrination and scientific thought police. Most potent in this bunch are the religious fanatics on the Christian and Islamic divide which has been so carefully nurtured over the centuries. Chabad Lubavitch, Catholic Cults (Opus Dei) Christian Zionism; Neo-Conservatism, Christian Evangelism and various other sub-groupings of right wing authoritarianism are key in the development, disbursement and maintenance of anger, fear, suppressed emotion and thus a variety sexual pathologies. This sustains the negative clouds of emotion needed to prop up the many headed hydra of the “End Times” war. Aside from paid agents (spellbinders) such groupings are largely unconscious of the deeply rooted occult connections.

Corporatism: The 9/11 Mega-Ritual enabled the 4Cs of commercialisation, consolidation, centralisation and control to move ahead with unparalleled success employing a cross fertilisation of all the above groupings into food, oil, agribusiness, asymmetric warfare, weapons, bio and smart technology, banking, security and the tripartite consumption of human and narcotics trafficking which underpins them all.  Stimulated crisis and conflict through the “Shock Doctrine” is the route to further centralisation of all the above. Think tanks and private armies are both political and corporate tools, the presence of which is dictated by money and profits in a self-sustaining – but ultimately finite – feedback system; a symbiotic relationship between governments and big business. The State is the corporation and the corporation is the State. The Underworld has now fused with mainstream geopolitics to produce deep politics and the “Overworld.”


 “Everyone wants to live at the expense of the state. They forget that the state lives at the expense of everyone.”

— Frederic Bastiat


The terrorist threat is a vast and complex fabrication which has been entrenched in the collective consciousness through Hollywood programming and decades of largely British, American and Israeli psychological operations. The myth of an outside enemy is self-propagating. We tend to believe what the media and authoritative statements made by government officials and academics tell us until it becomes part of our own belief system. But if we look closely at history, it is a story of our governments fabricating, distorting and creating terrorist movements and the horrendous suffering they inflict on ordinary people. The  9/11 attacks and the spectre of Al-Qaeda (and now ISIL) have been the modern day tools of perception management used to justify all kinds of atrocities and anti-human actions at the local, national and international level.

If the knowledge that organised religion and global economics has been manipulated into a poker game that is loaded for the Establishment to win while everyone ultimately dies at the table, then the house of cards would begin to tumble very quickly. People would see through the media propaganda and learn the language of deceit, which would mean there would be no pretexts for waging war; no justification for the doctrine of pre-emption or the building and maintenance of vast network of bases around the world; no reason for mass surveillance or the hoax that is the War on Terror.

It would all be seen as a sham.

There are key beliefs promoted and created as a resource for World State ideologies. At there inception, they were benevolent and creative. With varying twists and turns in their evolution – some ancient, some more recent – they have all succumbed to forms of pathogenic infection by psychopaths otherwise known as “ponerisation.” The ideology of a World State is promoted primarily through the auspices of apparently benign, philanthropic and altruistic endeavours at both the local and international level. With advanced knowledge of crowd psychology, suppressed technology and occult directives, this minority of psychopaths have been allowed to initiate a phase by phase of extinction of the global population.

Global Strategy of Tension: A War against the People

The emerging Global Pathocracy has kept populations asleep, fearful, unthinking, addicted and poverty-stricken. Tribalism, religious extremism and a spiritually dead secularism has turned the family unit and the community ethos inside out. It has achieved this through a variety of tried and tested methods across the centuries and about which many artists, philosophers, and mystics have tried to warn us. A brief summary of some of the major components involved follows, and describes a national and international Hegelian formula for a “Strategy of Tension.” These various tools of social management and manipulation obviously interpenetrate and overlap.  They comprise:

Synthetic Terror“Strategy of Tension” the “Hegelian Dialectic” or “Problem-Reaction-Solution” and various false flag scenarios. This produces anger, fear, distrust, shock, grief, trauma and revenge. The net result is social dislocation and psychological weakness open to auto-suggestion and thus to ponerological influences. Religious fundamentalism is always waiting in the wings to invert conscience and morality toward the myopia of absolutism. Indeed, intel agencies have traditionally had many agents working within their ranks as part of the process of domestic entrapment. The Terror industry is lucrative, both financially and politically. Terrorism becomes an archetypal external threat which offers the public backing for the fulfillment of geopolitical goals lying behind coloured revolutions and regime changes. The extraction of negative human emotion is the most effective and potent means to justifying the unjustifiable. It is a tried and tested formula that the populace is slowly beginning to understand. That being so, bigger and better atrocities and greater distractions will be applied to keep pace with an increasingly aware public.

Social Engineering Culture, academia, social sciences, green issues, entertainment and education Includes: CoIntelpro and Eco-Intelpro. A subversion of normal development within societies – ethical, spiritual and civic movements; the elevation of belief and emotional reflex partnered with the lowest common denominator of human instincts. Sexuality is progressively ponerised so that there are no limits; where more extreme pathologies become mainstreamed disrupting natural development and causing loss of identity, psychological disorientation – in particular narcissism and addictive behaviour. The entertainment industries are awash with sophisticated psycho-subversion techniques and child abuse networks. Semiotics, psychic driving, Pavlovian conditioning, subliminals and Neuro-Lingusitic programming, Delphic technique – all hijack the sub-strata of instinctive symbolism and iconography as a form of double-think where words and images mean something entirely different to what is seen and heard. Destruction of religious/spiritual beliefs replaced with a materialist perception of reality and the promotion of “group-think” tribalism. Dispersal of memes such as “One world” “global governance” “global warming” etc. and a high level media propaganda. There is literally a social engineering program for everyone. There are key beliefs which are currently most suitable to promote One World philosophy and practice. These include:

  • Transhumanism / SMART society (SMART energy grid; infrastructure, etc.) and Sustainable Development – infiltrated by Eco-Intelpro so as to speed the delivery of technological mainframe for complete surveillance and containment under cover of “saving the world” through technology. The metaphor for this is akin to farming sheep – feeding, watering and making sure protection is given through biometric welfare so that they become not only docile but happy in their domestication. Meanwhile they “progressively” sheared of awareness.
  • Climate Change industry and environmental activism infiltrated by Eco-Intelpro and eco-fascistic principles where human beings are seen as viri and thus less important to the preservation of Nature. (The United Nations’ Agenda 21 and urban development is key in this regard – and no, while right wing patriots do embrace this reality it is not a conservative plot). This feeds into multiple vested interests on both sides of the divide.
  • New Age or Human Potential Movement infiltrated by agents of CoIntelpro to limit quality of consciousness and thus the potential for genuine expansion of awareness. This is achieved in much the same way as the subversion of the civil rights movements of the 1960s and 1970s. The exact same scenario as the transhumanist movement except through spiritual rituals.

State-Sanctioned Mind Control experiments / Ritual Sexual Abuse – Military use of mind control technology targeting populations worldwide (HAARP, MK ULTRA, MONARCH, biowarfare, etc.) Historical tradition of military families being used for mind control experimentation including assassinations and black operations on domestic targets. Child abuse networks are a source of Elite indulgence and fodder for future covert military training. (See Satan’s Little Helpers IV and read David McGowan’s Programmed to Kill ) Extensive internet-based propaganda serves to confuse and disorientate supporting both the “discourse of disbelief” and unsubstantiated conspiracies. Existence of intra-familial/generational Satanic Ritual Abuse (SRA) are extended and enhanced within the military-intelligence apparatus with crossovers between various religious and occult groupings from inherited “bloodlines”. Abuse in society is encouraged to provide cover for the Elite. The entertainment industries (popular music, movies) are awash with sophisticated psycho-subversion techniques which are both purposely designed and others which are symptomatic of the focus inherent in the medium. All indirectly encourage pathologies such as ADS, depression, narcissistic tendencies and dissociative disorders.

(Asymmetric) WarOrganised and facilitated by governments, corporations and the banking cartels in order to maximise and expand profits. A primary tool for ensuring the majority of the global population remains disempowered whislt extracting material and psychic capital. Culling and sterilisation of populations heads off cyclic disturbance in status quo such as group awareness, genuine revolutionary and social recovery leading to potentially dangerous levels of empowerment which would threaten the monopoly of the 0.01%. To ignite the need for war humanitarian pretexts and false flag atrocities are used. Methods of balkanisation and civil war are carried out along with heavy media and outsourced PSYOPS and PR companies on the ground. Obvious fallout from war is: Poverty, hunger, disease, individual and collective psycho-physiological trauma and a massive rise in pathologies; mass death, mass immigration and exodus of refugees; environmental destruction; opportunities to reconfigure tribal and political alliances and objectives; rape of societies and cultures and replacement with cartel capitalism and monoculture of the 4C’s. This proceeds to a critical breakdown resulting in social compliance to the new established order and eventually seen as normal. Through the creation and/or exacerbation of the division between rich and poor, a vacuum is always created where uncertainty and economic insecurity invites crime and social unrest which can then be manipulated according to elite directives.

Debt slavery – IMF/ World Bank/UN-International Banking cartels. Once war has broken the spirit, these organisations move in to create the conditions by which the newly “democractised” countries sign on to the neo-liberal model of economic slavery. Massive profits can be made from a corporate colonisation of virgin cultures. Multiple dividends for economic destabilisation through debt control by the Structural Adjustment Team of the World Bank, International Monetary Fund (IMF) World Health Organisation, (WHO) and the United Nations. (See: The Shock Doctrine By Naomi Klein (2010) and Confessions of an Economic Hit-man by John Perkins). High frequency trading and speculation driven by artificial intelligence technology maintains the “Boom-bust cycles” and debt bubbles which ensure dividends for the 0000.1%.  A comprehensive rigging of every market exists from currency to gold/silver so that during each bubble burst “austerity measures” can be introduced in order to obtain funds from the public purse to repair the excess of the banking industry and maintain the global financial architecture. This cartel capitalism is overseen by the Bank of England in the City of London and the Federal Reserve in the United States which operate under exceptional laws and rulings effectively allowing these bodies to exist as private entities which serve corporate and banking interests. They are two of the primary wheels upon which a legion of banks, hedge funds, financial brokers, think tanks and government agencies inexorably turn. The dynasties of the Rothschilds, Morgans,  Rockefellers, Oppenheimers, along with European royalty and many other wealthy families are the nodes in a circuit of wealth and power within Official Culture that ensures the fiat currency of credit and debt slavery, as well as a concurrent monopolisation of all resources that remain entrenched. Governments already operate as global entities and offer periodic elections to keep the illusion of working democracies. Members of the state are usually deluded by their own lies, ignorance and self-importance thus oiling the wheels of World State operations. Very few in power realise what part they play in the wider game. Government and their federal/civil service personnel ensure the age-old key objectives remain fixed i.e. to disempower the public through information dominance, consumerism and debt.

Food monopoly / Food Contamination – Fast-food society with agri-business, genetically modified foods, chemical industry, animal foodstuffs and factory farming defining its expansion. This has led to severe environmental degradation of soil and desertification; destruction of forests and river pollution which destabilises the balance of eco-systems and expose populations to natural disasters. Mass migration to cities and expansion of slums results. International immigration inevitably increases placing further pressure on other countries’ infrastructure. Severe health problems from agricultural practices (pesticides, herbicides and chemical fertilisers) chemical additives, irradiated and genetically modified food is visited on the economically disadvantaged which makes up most of world’s population. Supermarket culture displaces local businesses and increases total reliance on corporations who practice global trade divorced from socio-economic values. Self-sufficiency, autonomy are further eroded in favour of narrow dependence on exports. The nature of fast food causes dietary problems further exacerbating mental health issues. Endemic animal cruelty in factory farming is a reflection of a mechanistic and materialist view of animals as products. It also reinforces our disconnection from nature and ecologically responsible alternatives. The mind-body split is part of the formula for control as is the maxim of “Divide and Rule” and obviously has consequences for the healthy functioning of both. The food industry is to be integrated into SMART agrimatics utilising biotechnology and biometrics for maximum output and efficiency but yielding the minimum nutritional quality due to a purposeful exclusion of essential nutrients.

Depopulation through mass sterilisation, food as a weapon and indirect forms of reduction (economic disparities, debt slavery, war and GMOs) drawn from a resurgence in the support for genetic engineering and eugenics. The co-option of the well-intentioned with NGOs and the United Nations offers a platform of legitimacy. Such a worldview requires a reduction in specific racial types alongside colonisation and resource monopoly. Genocide, tribal warfare, gender imbalance, distortion of science by corporate interests, population anomalies, religious extremism, and profits for governmental agencies and the pharmaceutical industry are the net effects of such actions. The much promoted bad science of overpopulation is used to increase the pressure on scientists and environmentalists to push through predesignated “solutions”. In truth, with a radical return to just and equitable socio-cultural and economic principles much of the overpopulation propaganda would be overturned. The dysfunctional nature of our current economic and social infrastructures comprehensively limit truly creative solutions which would allow a natural return to balanced populations levels.

Big Pharma / Medical Establishment – medicalisation of health is drawn from the same formula for domination which can be seen in the banking industry and other sectors of society. The net result is an undue dependence on pharmaceutical corporations who, in combination with the insurance industry, have state health care and doctors inside their pocket. Greater privatisation and fake social benefits (such as Obamacare) ensure vulnerable sectors of society who are unable to pay, cannot access the health care they need. Just as arm manufacturers and financial institutions are intimately tied to global governments so too the huge profits are made by Big Pharma are accrued from their relationship to the medical establishment. Curing people is the last thing the medical cartels would like to see – quite the opposite. The marginalisation of complementary medicine continues with Big Pharma paying so called medical websites to indulge in propaganda and attacks on alternative healing modalities. Scientific reductionism and a serious abuse of the scientific method can be evidenced and used to support profit at the expense of healing and palliative care. Corruption in science is intimately linked to corruption throughout the corporatised medical establishment. Profit is obviously the overriding aim where natural and sometimes innovative methods of care have been overlooked. Campaigns of character assassination and disinformation are routinely used against those who go against this orthodoxy. This has resulted in a negative feedback loop between the mentally and physically ill who represent numbers on a spreadsheet for Big Pharma companies and state care. As society becomes more prone to infection by the dominating psychopathy then more symptoms will begin to appear in normal people thus increasing the profits of Big Pharma which, acting as a corporate predator in its perceptions will take out anything which threatens its monopoly. Dependence and over-reliance is secured if drugs and psychiatry are joined at the hip. An ill population is an essential revenue stream for Big Pharma. (A similar framework exists in vaccination programs whose overarching agenda is to lessen the integrity of DNA and resistance to specific viri as per psycho-social engineering for docility, sterility and depopulation agenda).

Technocracy – implementation of a “Smart Society” which integrates principles of sustainable development, state surveillance, invasive perception management and virtual reality leisure time. Economic parity and ultimate efficiency are the by-words for acceptance. It is a new form of materialist seduction with technology as the panacea for all ills. The glut of gadgets are showing highly negative effects on the neurology of the very young. Brain growth and the arc of developmental learning is suffering. Narcissism is enhanced in a push-button culture of synthetic networks divorced from the real. Great progress can be seen through internet-based journalism and information dissemination. This is one aspect of technology that for now permitted until it is possible that dissent of this kind can be eliminated. Firstly, the infrastructure and lifestyle must be tied to essential requirements such as income generation, energy in the home and health. Once these are inseparable from survival then if someone is not behaving, his ability to exist in such an etheric web of Wi-Fi relations will simply be switched off. A transposition of elite perception is set to move seamlessly into the new SMART societies.

Inducements of technological benefits will anaesthetise new generations into blindly accepting a total reconfiguration and restructuring of urban life. As a consequence, it will be increasingly difficult to opt out in favour of a genuinely self-sufficient and autonomous lifestyle. This will be equated with subversive and suspicious behaviour and thus citizens will be encouraged to alert the authorities for the good of the whole. Those who wish to opt out of this all encompassing bio-metric lifestyle will be seen as the new terrorists or “organics” strangely rejecting the post-human world of biogenetic integration with the digital world. Targeted through “Pre-Crime” software, they will be seen as the new bogeymen.

Paradoxically, by moving closer to a literal connection into a cybernetic machine of convenience we will be further disconnected from authenticity and the natural world. Objective reality will be replaced with subjective dream world  – a virtuality. This is exactly what the pathocrats would love to see. Transhumanism is the philosophy created to sell their group-think, collectivist dream. Once Artificial Intelligence (AI) has been allowed to proceed, innovation in the military and consumer worlds will tip the balance towards a redefinition of a host of principles and values attached to what it means to be human. You can be assured in such a scenario this will mean much, MUCH less freedom.

All the above listed strategies will be heightened and expanded under such a technocracy.


 “You never know how much you really believe anything until its truth or falsehood becomes a matter of life and death. It is easy to say you believe a rope is strong as long as you are merely using it to cord a box. But, suppose you had to hang by that rope over a precipice? Wouldn’t you then first discover how much you really trusted it?”

— C.S. Lewis


official-culture

Don those masks and look straight ahead…

One World?

Well, not at this level – not yet. But we might find the inversion of such a principle looming rather large in the near future.

All the above strategies are needed to promote the “One World” philosophy which appears so warm and fuzzy at first glance. But it requires the dissolution of national borders, self-determination and independence in favour of a homogenous, group consciousness which replicates across all societal domains. It demands an extreme deference to political correctness and liberalism while at the same time using conservative – even fascistic formulas – to enforce such directives. In truth, no political belief or philosophy is exempt from being used as a temporary tool to lever this One World Order into place. One World, One Humanity, One World Religion, One World Army are all euphemisms for a gradual, phase by phase implementation of a global, centralised control system across all sectors of human endeavour. Eventually, these people wish to see everything interlocking into a seamless, artificial World State of homeostatic, human management, where we will be literally cared for like pets: fed, watered and given our basic comforts. But only as long as we keep our place in this new techno-Feudalism. And keeping our place will mean allowing a Huxleyian slavery of docile “post-humans” to merge into the SMART framework with ultimate ease. If not, then you are “switched off” until you learn to be a good citizen. If the present American police state is anything to go by it will be a case of trading one Orwellian order for another.

It is the the noble aspiration of a world of interconnected and interrelated “Oneness” that serves as the platform for its inversion. It seems humanity has yet to grasp that such a concept is derived from ancient spiritual wisdom that describes what could be termed higher dimensions of consciousness rather than physical plane directives, where opposites collide and choices are known.

The above realities and possible futures describe our current reality but it need not necessarily continue.

Though the ideal of ultimate oneness may not be possible at this level of reality, that doesn’t mean to say that we cannot attain a more balanced civilisation – where even the word “unity” would exist in clusters. Before we can allow a hard-won pragmatism guided by an innate and natural guidance to take over, we must let go of our collective Messiah Complex where every charismatic leader is deified and seen as the next demi-God to lead us into a New Way. We must find our own path of access. And it is that process that will bind us to others searching for the Way, without beliefs which hinder and with a new socio-political and cultural imperative which leaves behind the dead-ends of Liberalism, Communism and Fascism and their various children. Maybe in that frightening void of acceptance and non-anticipation we will learn to find the balance between the sovereign rights of the individual married to the collective. That is, to become group conscious and to realise the value of networking as opposed to being submerged in group consciousness and our individuality squashed by instinct of the herd.

Before we can do this we perhaps we need to discover why it is that notions of authority have loomed so large in our minds and have given the illusion of free-will, from cradle to grave.

 


Notes

[1] (p.309) Harding, M.Esther; Psychic Energy (1962) Second Edition.

Technocracy XIII: All the way down to our DNA …

 “The year is 2025. The population is 325 million, and the FBI has the DNA profiles of all of them. Unlike fingerprints, these profiles reveal vital medical information. The universal database arrived surreptitiously. First, the Department of Defense’s repository of DNA samples from all military personnel, established to identify remains of soldiers missing from action, was given to the FBI. Then local police across the country shadowed individuals, collecting shed DNA for the databank. On the way, thousands of innocent people were imprisoned because they had the misfortune to have race-based crime genes in their DNA samples. Sadly, it did not have to be this way. If only we had passed laws against collecting and using shed DNA….”

—Professor David H. Kaye, ‘Science Fiction and Shed DNA’, 2006


ADN_animation

The structure of part of a DNA double helix (wikipedia)

If you are not quite into tattoos and are repulsed by the idea of implanting your body with anything, then this will probably tip you over the edge. It seems that tagging our bodies just doesn’t cut the mustard and something even deeper is required. Consumerism and crime prevention is to be the precursor.

Recalling our brief foray into Verichip and Positive ID marketing, work at the University of Aveiro in Portugal intends to add to that obsession. Researchers are busy developing DNA barcode tags that will soon be applied to a wide variety of products from foodstuffs to toiletries. Each tag in question has: “… a unique combination of DNA base pairs that attach to most surfaces, and can later be collected, amplified, and sequenced.”

So, how might these DNA tags might be used?

“… in some schemes a DNA “fog” might be used to spray violent protesters when there are not enough law enforcement personnel to immediately subdue the lot of them. That tag will be unique, and mark anyone who bears it, at least for a while. Over time however, the signal will spread and degrade. Multiple tags could be used to mark multiple events or increase reliability of a single event. Clearly though, finding a way to contain your marking agent at the outset is the cleanest option. [1]

Drawing our attention to the parallel practice of tracking animals and identifying species by biologists over the years, John Hewitt of Extreme Tech mentions the barcode of life, a project with: “… over 200,000 animals catalogued in a searchable database.” He makes the chilling analogy: “Since things like animals already come pre-barcoded, all one need do is find some region in their DNA that tends to mutate fast enough over time so that each species can be expected to show enough variation.”

In 2012, proposals were published by the UK government outlining the creation of a DNA database of the British population within the National Health System (NHS) complementing the Police National DNA Database which at 5,950,612 individuals, has more samples per head of population than any other country. [2]The European Court of Human Rights forced the British government to water down the reach of the Nationwide DNA data base. By way of response to the Strasbourg ruling, the government launched a “consultation exercise” in May of 2009 (which can be read as a PDF document online). The case that ruffled the feathers of the UK government so comprehensively was caused by two plaintiffs who had been arrested but proven innocent, and further, had been told police would be holding on to their DNA profiles indefinitely. The two individuals argued that this was a breach of their human rights. The court ruled in their favour and ordered the DNA profiles be removed and that the DNA samples have a cut off period.

The government have been doing their level best to justify the DNA database and the retention of DNA samples based on a similar position to the US Dept. of Homeland Security. Officials believe that even when people are arrested and cleared of any wrongdoing they are just as likely to commit future crimes as those who have been convicted. More Pre-Crime thinking? The basis for this conclusion came from the government’s own consultation paper which was heavily sourced from the work by criminologist Professor Ken Pease. Based largely on statistical evidence, the science in the paper was so shoddy that it caused The Guardian’s journalist and science writer Ben Goldacre to brand it: “… possibly the most unclear and badly presented piece of research I have ever seen in a professional environment”. [3]

Lancaster University Professors Brian Francis and Keith Soothill from their research carried out by the ESRC National Centre for Research Methods concluded that the six year retention of DNA data was based on “flawed evidence.” They launched a withering attack on the validity of the paper, stating:

The notion of ‘arrest’ is the main criterion used for action in the consultation document. While police arrests are not whimsical, they come at the beginning and not the end of the criminal justice process. Some people are disproportionately at risk of being taken into questioning by the police and being arrested. In contrast, a conviction is the outcome of evidence being tested in court. In fact, arrests are useful indicators of police action but not of guilt. Re-arrests are dangerous indicators and making arrests the pivotal criterion encourages the notion that we are moving towards becoming a police state. [4] [Emphasis mine]

The push to expand the DNA databases both in the UK and in the US is understandable since the logic appears to be sound. Similarly, it is very difficult to argue against victims’ family who have had their sons, daughters and loved ones murdered by criminals who may have been caught prior to the event had DNA profiling been more rigorous and well established. The Story of a State of Virginia mother and her fight to see the DNA database expanded to include people convicted of Class 1 misdemeanors stems from her sincere hope that it will save lives and produce some good from the murder and abduction of her 20 year-old daughter.

Many criminals will be arrested and duly placed on the database. No doubt persons will be trapped by DNA evidence and crimes solved. But the Home Office intends to keep all DNA profiles for at least six years with innocent persons still classed as criminals. Therefore, there will be no distinction between the guilty and the innocent where potentially important nuances in a case will be deemed immaterial. An innocent bystander? Too late, you’re on the DNA database as a criminal or even worse, sexual offender. What of activists, protesters and a whole host of extenuating circumstances that are difficult to address in a court of law? How would this affect the outcome of a case where the jury knows that the person accused is already listed? DNA science is in its infancy and there is still much to learn. The key change in the law meshes conveniently with terrorism and civil liberties in that everyone is now presumed guilty rather than presumed innocent before a trial. This is a significant change, both in terms of perception and profits.

Remember that the security complex in the USA is a huge business which the UK government intends to emulate. Therefore, for the Home Office everyone is a potential criminal and by extension, a source of revenue, though you obviously won’t find any civil servant admitting to such a heinous accusation. But that is the trajectory – a corporate push to privatize the prison industry where crime is profitable. For the authorities, just as soon as everyone is on the data base the better for society. And their stock options.

Over 70,000 under-16s have now had their genetic fingerprints recorded and as of writing, Police authorities have yet to delete more than 165,000 innocent people from their records. [5]As UK politician for the Liberal Democrat party Lynne Featherstone said: “There is no purpose or justification for keeping the DNA record of anyone who is not charged with an offence,” adding: “With the growing concern about racial profiling and disproportionality in criminal investigations, the need to keep innocent people on the DNA database is questionable.” [6]

The United States has the largest DNA database in the world, with 10.7 million offender profiles and 1.8 million arrestee profiles.[7]  The US has the highest number of prisoners in the world at over 2 million and thethird largest incarceration rate. This translates as 1 in every 31 adults or half the world’s prison population of about 9 million held in the US. The prison-security complex rakes in billions of dollars a year, with the corruption of the law enforcement and justice system at all time highs the question of DNA profiling becomes ever more problematic.

1024px-CBP_chemist_reads_a_DNA_profileU.S. Customs and Border Control chemist reads a DNA profile to determine the origin of a commodity. (wikipedia)

The FBI has been collecting one million DNA samples a year under a new program that allows federal agents to take cheek swabs from people arrested for any crime including non-US citizens. They can also take DNA from any arrestee or ‘detained’ non-citizen and upload it to the FBI’s CODIS database networked to law enforcement authorities in over 50 states. In June of 2013, the United States Supreme Court ruled it constitutional to take DNA samples from people who have been arrested for serious crimes without a warrant, let alone a conviction. The federal government and 28 states across America already collect genetic samples from people arrested for crimes (felonies, certain misdemeanors) with the remaining 22 states that only take samples from people convicted of those crimes.

DNA profiles and their genetic markers can provide excellent supporting material when there is scientifically valid evidence in a case overall, such as placing a suspect at the scene of the crime. It becomes problematic when a jury assumes that DNA evidence is incorruptible and scientifically unassailable. Mistakes continue to occur and the probability will increase as the database expands. When you search for a match in an ocean of profiles the likelihood of finding an innocent person along with the perpetrator of the crime also increases. And what if the perpetrator is not in the database, but you still find a sequence of markers that denote a match?

This has been dubbed the “CSI Effect” when a jury places too much emphasis on DNA evidence. In one case, a 22-year old Farrah Jama, a Somali immigrant was sent to prison for 16 months for the rape of a 48-year-old woman – a rape that didn’t happen. A report in The Australian described how the prison sentence was quashed: “… after it was discovered the DNA sample that incriminated him was contaminated.” Although a cultural bias of the jury was also probably operating “… the Somali migrant was successfully prosecuted based solely on his DNA being found on the victim, despite the fact he had an alibi and there was no other evidence to connect him to the alleged crime.” [8]

A study from the New Scientist magazine in 2010 found DNA fingerprinting to be “highly subjective and prone to error,” which due to: ” incredibly small amounts of DNA in samples and pressure to gain a conviction can lead to bias…” The study involved DNA from a real crime scene which was sent to 17 experienced analysts in an U.S. laboratory. The results were a resounding failure since all the scientists conclusions were different:

The sample, from a gang rape, had already been used to convict a man  –  but only one of the 17 scientists came to the same conclusion. Four said the evidence was inconclusive and 12 said he could be excluded.

Itiel Dror, a University College London scientist who helped set up the investigation, said: ‘It is time DNA analysts accept that under certain conditions, subjectivity may affect their work.’

Christine Funk, a defence lawyer in the U.S., said: ‘The difference between prison and freedom rests in the hands of the scientist assigned the case.’ [9]

Jeremy Gruber, as President of the Council for Responsible Genetics is in no doubt that miscarriages of justice will occur more often as symptomatic of a system predicated on the very core problems that give rise to serious crimes in the first place.

He states:

We are not only building bigger and bigger databases, but expanding collection practices as well. Police are now using DNA dragnets, where DNA is taken from a selected population without individualized suspicion or of individuals who happen to live near a crime scene or who happen to match a certain physical profile. Some police departments are operating their own “off grid” DNA databases with little oversight and police and prosecutors in some cities and counties (such as Orange County, CA) are taking DNA “voluntarily” from individuals arrested for petty crimes in exchange for dropping charges against them.

Familial searching, a deliberate search of a DNA database conducted for the intended purpose of potentially identifying close biological relatives to the unknown forensic profile obtained from crime scene evidence, is becoming more widespread. Such searches virtually guarantee that DNA databases will create suspects out of innocent people, and because of the composition of DNA databases, those innocent suspects will disproportionately be people of color. Crime scene DNA has also been used to predict physical characteristics, such as certain shades of hair color, and to draw broad conclusions about genetic ancestry. Concerns have been raised about these predictions being used for crude profiling, potentially racially tinged, which have led Germany and several U.S. states to bar their use by police. Even so, new research on “molecular photofitting” (producing a crude image of a suspect’s face from DNA left at the crime scene) suggests that such reconstructions may soon be possible, giving police another investigative tool that could result in wrongful arrests and unjustified searches. [10]

Andrew Pollack writing in the New York Times was already sounding the alarm on DNA profiling back in 2009. Indeed, scientists “fabricated blood and saliva samples containing DNA from a person other than the donor of the blood and saliva,” and with access to: “…a DNA profile in a database, they could construct a sample of DNA to match that profile without obtaining any tissue from that person.” In effect, the danger of being framed and set up via a fabricated crime scene is very real. [11]This is precisely what happened to David Butler who was wrongfully jailed by UK courts for murder, spending eight months in prison on remand whilst facing murder charges: “after his DNA was allegedly found on the victim.”  He was accused of murdering Anne-Marie Foy in 2005 and arrested by Merseyside Police with “poor quality” DNA evidence and sourced from his DNA sample, already on record. According to a BBC report: “… he remained in prison – despite other CCTV evidence allegedly placing Mr Butler in the area where the murder took place being disproved.” [12] 

At the same time, exoneration of those who were thought to have committed crimes is an undeniable outcome of DNA profiling. The Innocent Project is a case in point, with over 325 post-conviction DNA exonerations in the United States in the last several years. So, DNA profiling is overturning convictions and setting people free on the one hand, and on the other, it is putting innocent people away based on faulty science and a corrupt intelligence apparatus, the latter of which is not decreasing but naturally increasing as a consequence of the push to profit and ubiquitous surveillance.

The FBI, who are the biggest supporters and sellers of the terror industry, are also a major force behind the expansion of DNA databases. Indeed, it seems the Bureau is still updating its whole retrieval and storage protocols under a CODIS Core Loci Working Group operational since May 2010. Ostensibly, this is an exercise in improving the system though in effect, it is an expansion until international data-sharing efforts are optimised. This is also about where massive amounts of data can be stored about the population and stored indefinitely. Once again, the State has all your information and the public has nothing. Given the current condition of government this is far from reassuring.

DNA

Clearly, this isn’t about throwing DNA analysis out of the window, nor any form of technology. What is needed is to see it in the context of what has gone before and to forestall a certain trajectory that falls straight into the hands of those overseeing societies and for whom long-term objective of social control is the prime directive. The justification for creating this huge database of samples is to combat crime and prevent terrorist acts.  Overall, crime is decreasing however and we know all about the nature of the Terror industry as a manufactured strategy of tension … When macro-social imperatives are still firmly inside Official Culture, discrimination and utmost caution is needed to keep such Establishment directives from ensnaring those most vulnerable. As we saw in The Politics of Entrapment despite safeguards in place, the wider awareness of ponerological forces is missing.

In general, the DNA database will probably lower crime as well as decreasing privacy. Yet, since the root causes of crime are not addressed the very need for a DNA database will inevitably morph overtime into a repressive tool of the state. Minimising risk by destroying DNA samples after cases have finished and even reducing the storage of sensitive information only needs a suitably horrific set of crimes and a large-scale terror attack for such measures to be repealed. This would follow the NDAA and Patriot Act rationalisations which have nothing to do with protection or civil liberties and everything to do with state control of the population.

This is why humans must become “pre-barcoded” as part of sequential phase of identifying, cataloging, tagging and monitoring. A global neo-feudal State requires a distinct species, separate from the Establishment Elite who consider themselves genetically superior. It may well be that the various strains of psychopathy currently jostling for supremacy in the corridors of power are merely seeking to expand their numbers. Surveillance is part of the armoury of technocratic science which gathers data and seduces the populace to regard this intrusion as normal and more importantly, something that is desired. The terror industry and national crime augment this propaganda.

As Jeremy Gruber summarises:

“We are at a critical juncture in the United States, as law and policy are rapidly allowing law enforcement greater access to Americans’ DNA with limited public discussion and debate. Continued expansion of the power of law enforcement to collect and store DNA must be guided by a transparent debate that balances legitimate public safety concerns with human rights and privacy interests and that is honest about the value of forensic DNA, recognizing the limited benefits of expansion beyond likely re-offenders.” [13]

There is a huge momentum currently behind new technology and the speed of its arrival in so many avenues of our lives. Networked databases present clear advantages in the hands of a benevolent culture – something that is however, only a working hypothesis.  Time is getting short for ethical safeguards and preventative measures to be implemented that could ensure this forensic tool is kept out of the hands of Pathocratic ideology.

 


Notes

[1] ‘Scientists create DNA tracking tags, might soon be used to track protesters as well as animals’ By John Hewitt, http://www.extremetech.com, on September 30, 2013.
[2] ‘Government revives plan for greater data-sharing between agencies’ The Guardian, by Alan Travis, 24 April 2012 | ‘The UK Police National DNA Database’ Gene Watch, http://www.genewatch.org.
[3] ‘DNA database plans based on ‘flawed science’, warn experts’ The Guardian, July 19, 2009.
[4] ‘Reviewing the DNA database’Impact Case Study by Professors Brian Francis and Keith Soothill Lancaster University, ESCR Economics and Social Research Council. 2009.
[5] ‘Details of innocent people are still being held on DNA database’ The Independent, June 5 2012 | ‘Another 165,000 innocent people put on DNA database despite Coalition vow to wipe details’ By Rebecca Camber, The Daily Mail, 4 June 2012.
[6] ‘DNA database continues to swell’ BBC News, 4 January 2006.
[7]See FBI, CODIS-NDIS Statistics, http://www.fbi.gov/about-us/lab/biometric-analysis/codis/ndis-statistics
[8] Networked Knowledge, Media Report by Dr. Robert N Moles http://www.netk.net.au
[9] ‘DNA fingerprinting techniques ‘can sometimes give the wrong results’,By Fiona Macrae for the Daily Mail
18 August 2010.
[10]THE POLICE WANT YOUR DNA By Jeremy Gruber, GeneWatch 27-1 | Jan-Apr 2014.

[11] ‘DNA Evidence Can Be Fabricated, Scientists Show’ By Andrew Pollack, August 17, 2009.
[12] ‘DNA test jailed innocent man for murder’by Hannah Barnes, 31 August 2012,BBC News
[13] op.cit Gruber.

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Technocracy VIII: DARPA’s Technophilia (2)

“Twenty-five years from now, we may be to the point where the sensors are embedded in the skin and the person becomes the processor …

– Tod Lovell, a technology director at Raytheon


It is no secret that DARPA was at the forefront of electronically tagging US combat soldiers parallel to the initiative of tagging criminals in the prison industry currently making huge profits. The chipping project is called “Individual Force Protection System”, the manufacture of which was gleefully taken on by US defence contractor Science Applications International Corporation (SAIC). In January 2007, a presentation was delivered outlining IFPS details later found in a PDF document freely available on the internet. It described a 3-inch tag “without GPS” attached to a soldiers uniform with a “LOS range = 113 miles.” The wholesale cost is “$100 per tag.” [1]

As we have seen, Verichip and RIFD technology has its physical drawbacks aside from its ethical and civil liberty implications. From creating a “sixth sense” brain implant through which infrared light can be detected to implanting a chip that controls the brain; allowing thoughts, memory and behaviour to be transferred from one brain to another, these DARPA teamsters are riding high with possibilities. However, in the latter case it was scientists working at the University of Southern California, home of the Department of Homeland Security’s National Centre for Risk and Economic Analysis of Terrorism Events which came up with that little gem. Working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems,” chips which have been implanted into rats’ brains can be used as a storage device for long-term memories. Attempts to record, download and transfer memories into other rats with the same chip implanted.

A microchip implanted into a rat’s brain can take on the role of the hippocampus—the area responsible for long-term memories—encoding memory brain wave patterns and then sending that same electrical pattern of signals through the brain. Back in 2008, Berger told Scientific American, that if the brain patterns for the sentence, “See Spot Run,” or even an entire book could be deciphered, then we might make uploading instructions to the brain a reality.

In one study the scientists had rats learn a task, pressing one of two levers to receive a sip of water. Scientists inserted a microchip into the rat’s brain, with wires threaded into their hippocampus. The chip recorded electrical patterns from two specific areas labeled CA1 and CA3 that work together to learn and store the new information regarding which lever to press to obtain water. Scientists then shut down CA1 with a drug and built an artificial hippocampal part that could duplicate such electrical patterns between CA1 and CA3, and wihch was inserted it into the rat’s brain. With this artificial part, rats whose CA1 had been pharmacologically blocked, could still encode long-term memories. And in those rats who had normally functioning CA1, the new implant extended the length of time a memory could be held.

In terms of the new cyborg, it opens up huge potentials for brains training and entrainment. It also gives an extremely updated version of an Orwellian “thought Police” as an adjunct Pre-Crime technology, the fine tuning and enhancements of which are in parallel development.

According to a Los Angeles Times report in 2002, when Donald Rumsfeld was Secretary for Defence in the Bush-Cheney Administration he made it his priority to “… redesign the U.S. military to make ‘information warfare’ central to its functions.” [2] The strategy of “information dominance,” according to American military experts, consists of 1) Building up and protecting friendly information and degrading information received by your adversary. 2) The ability to deny, degrade, destroy and/or effectively blind enemy capabilities. [3]

ghost-recon-soldier

‘DARPA’s Squad X initiative seeks ‘innovative’ tech to enhance troops’ real-time situational awareness’ – DARPA’s Squad X initiative is inviting bright minds to submit their ideas for an integrated digital system to enhance situational awareness on the squad level. Squad X hopes to combine the cornucopia of different technologies into one grand “system of systems” to “organically extend squad awareness and influence” on the battlefield.”

PSYOPS and Information Dominance was ex-U.S. Secretary of Defence Donald Rumsfeld’s favourite playground. His enthusiasm gave rise to Revolution in Military Affairs (RMA) which encompasses everything from unmanned aerial vehicles (UAVs), to nanotechnology, robotics, and biotechnology. RMA is full of wild beliefs about the future of warfare, modern information, communications, and space technology. “Transformation” and “total systems integration” are keywords that make the military technophiles shudder with delight. The defeat of US foreign or domestic adversaries through surveillance technologies, advanced weaponry and the suppression and degradation of communications networks is all part of the RMA and DARPA vision of technological supremacy.

The project which has caught RMA and DARPA’s attention is the “network-centric warfare” designed to turn cities, any city, into a limitless “battlespace.” And the evolution of ID alongside information warfare:

As urbanization has changed the demographic landscape, potential enemies recognize the inherent danger and complexity of this environment to the attacker, and may view it as their best chance to negate the technological and firepower advantages of modernized opponents. Given the global population trends and the likely strategies and tactics of future threats, Army forces will likely conduct operations in, around, and over urban areas–not as a matter of fate, but as a deliberate choice linked to national security objectives and strategy, and at a time, place, and method of the commander’s choosing.  [4]

From DARPA’s own website at http://www.darpa.gov these include various programs and projects supported by millions of dollars of tax-payers money. We have the Information Processing Techniques Office (IPTO); Cognitive Systems Office working on a project called “Learning Applied to Ground Robots” and the Command & Control brief described as “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of a mission.” This comprises of “Deep Green” an “innovative approach to using simulation to support on-going military operations while they are being conducted.”

real-iron-man-suit-technologymilitary-plans-to-build-real-life-liquid-armor----iron-man----suit-yhcdfiso

Promotional still from Elysium (2013) in which the film’s protagonist is fused with cybernetic “enhancements” to carry out an important mission. DARPA’s dream on celluloid.

Then there is the Heterogeneous Airborne Reconnaissance Team (HART) which is due to:

“… the complexity of counter-insurgency operations especially in the urban combat environment demands multiple sensing modes for agility and for persistent, ubiquitous coverage. The HART system implements collaborative control of reconnaissance, surveillance and target acquisition (RSTA) assets, so that the information can be made available to warfighters at every echelon.”

Alongside this program are Persistent Operational Surface Surveillance and Engagement (POSSE), which involves:

“… building a real-time, all-source exploitation system to provide Indications and warnings of insurgent activity derived from airborne and ground-based sensors. Envisioning a day when our sensors can be integrated into a cohesive ‘ISR Force’, it’s building an integrated suite of signal processing, pattern analysis, and collection management software that will increase reliability, reduces manpower, and speed up responses.”

Ready to track those pesky dissidents fully integrated into SMART society?

UrbanScape offers the capability to “provide the warfighters patrolling an urban environment with an up-to-date, high resolution model of the urban terrain that can be viewed, manipulated and analyzed.” Whereas the Strategic Technology Office (STO) will “… focus on technologies that have a global or theater-wide impact and that involve multiple Services.”

Other programs well underway with funding from Lockheed Martin, Raytheon and Northrop Grumman include: Integrated Sensor Is Structure (ISIS) whose goal is to develop and deploy a “stratospheric airship based autonomous unmanned sensor with years of persistence in surveillance and tracking of air and ground targets;” and VisiBuilding, which will cater for “a pressing need in urban warfare [by] seeing inside buildings.” [5]

One of the main programs which DARPA provided for the TIAO was called “Combat Zones That See” (CTS). Journalist and author on police state surveillance Tom Burghardt reveals the details:

The plan was to install thousands of digital CCTV networks across occupied cities in the belief that once the system was deployed they would provide ‘warfighters’ with ‘motion-pattern analysis across whole city scales.’ CTS would create a nexus for mass tracking of individual cars and people through algorithms linked to the numeric recognition of license plate numbers and scanned-in human profiles.

The program was denounced by privacy and civil liberties advocates’ for its potential use as a mass surveillance system that could just as easily be deployed on the streets of American cities. In theory CTS, or a similar program could be further ‘enhanced’ by Scaleable Network Social Analysis (SSNA)… SSNA’s aim is ‘to model networks of connections like social interactions, financial transactions, telephone calls, and organizational memberships,’ according to the Electronic Frontier Foundation’s 2003 analysis. Once license plate numbers are ‘mined’ from raw CCTV footage, investigators could: a) identify a car’s owner; b) examine her/his web-surfing habits; c) scan e-mail accounts for traces of ‘inflammatory rhetoric;’ d) monitor recent purchases for ‘suspicious’ items. [6]

A check-point police state is hardly something that comes to the ordinary person’s mind as they go about their daily life but the end of privacy is fast approaching if governments continue to have their way. Location analysis, DNA, retinal scans, fingerprints and tagging and now chemical profiling of subject.

A laser-based “molecular strip-search” was the latest bright idea to be rolled out by the US government’s Homeland Security Agency and implemented across airports, check-points, large-scale venues and anyway that government sought an opportunity for surveillance. The technology has the capacity to instantly scan the bio-molecular structure of your body which includes the prescription drugs in your bag; cocaine residue on your dollar bills and any trace substance that we have come into contact with such as marijuana or gun powder. Ten million times faster and one million times more sensitive than any other system currently available, it can do all this invisibly and from a range of up to 50 metres.

tsascanner1The technology is a “scanner … called the Picosecond Programmable Laser. The device works by blasting its target with lasers which vibrate molecules that are then read by the machine that determine what substances a person has been exposed to. This could be Semtex explosives to the bacon and egg sandwich they had for breakfast that morning.” [7]

So, what will happen if you’ve been smoking pot that day or been down at the firing range? You will be tagged and “detained.” And in a climate of social unrest and false flag terrorism it is likely to be promoted as an unfortunate but necessary part of the world in which we live. We will have to be willing to give up some of our freedoms if the government is to protect us and retain the integrity of the greater good… And so the media will sell it …

By 2015 however there had been such a backlash against the privacy and health concerns that many of the x-ray scanners were taken out of airports and the hands of the The Transportation Security Administration (TSA). This is likely to be only a minor setback before the re-introduction of scanners which have been suitably modified.

As the government document: ‘Strengthening Federal Capacity for Behavioral Insights’ attests, the technocrats are losing no time in finding ways to merge technology and social engineering. Looking to make society much more “efficient,” we can add the latest bright idea by the federal government to hire a “Behavioural Insights Team” (BIT) to change US behaviour, taking its lead from the UK who spearheaded the initiative. Its own Behavioural Insight Team has been up and running for several years.

Commensurate with Common Core education the Obama administration took the opportunity to implement a new executive order in October 2011, after the Bradley/Chelsea Manning whistleblowing scandal. This Orwellian initiative aims to target future whistle-blowers, leaks and security violations by ordering federal employees to report suspicious actions of their colleagues, all of which is based on the very shaky science of BIT. It is part of what is called the “Insider Threat Program”, which covers every federal department and agency and where: “millions of federal officials, bureaucrats and contractors must keep their eyes peeled for watch “high-risk persons or behaviors” among co-workers. Failure to report could result in “penalties” or “criminal charges.” Such reports are bolstered by an integrated computer network monitoring system which detects “suspicious user behaviour” linked to Insider Threat personnel.

Seeing people as numbers in a Game Theory algorithm is bound to cause problems, not least the obvious flaws in trying to predict the future with unproven psychological techniques. Wide open to the usual privacy and civil liberty violations a National Research Council Report highlighted by McClatchy News on July 9 20013, was just one of many science bodies which saw no value in such initiatives stating in 2008: “There is no consensus in the relevant scientific community nor on the committee regarding whether any behavioral surveillance or physiological monitoring techniques are ready for use at all.” Quite apart from the fact that this executive order is on top of some of the most draconian legislation ever enacted in law and which continues to be rolled out in the face of continuing State violations against civil rights.

policestate2The marketing of the Obama myth has permitted the enactment of the National Defence Authorization Act (NDAA) which destroys due process and the Bill of Rights. Since your profile indicates dissension and disagreement with government policy then you will be labelled a “terrorist-sympathiser,” “terrorist enabler,” or prone to “incitement” or any other nonsense deemed subversive in order to detain you much longer, without any rights to a phone-call or access to a lawyer. Even if you are not a drug-user the laser will reveal what prescription drugs you are currently using to what stage you at in your ovulation cycle to the presence of cancer. A comprehensive bio-psychological profile will be created ready to be used against you should you become a non-compliant citizen able to think for him or herself. Used cocaine in the past? Then your civil action against the government for abuse of civil liberties is dead in the water. Since traces of cocaine exist on all forms of paper currency so theoretically anybody can be detained and charged with possession should it deemed expedient to do so. This technology will become a useful political tool with almost endless “Big Brother” applications.

As Noel Sharkey, professor of artificial intelligence and robotics at the University of Sheffield said of the new military “Cheetah” robot which can run faster than a human: “an incredible technical achievement, but it’s unfortunate that it’s going to be used to kill people”. [8]  The same could be said for the intention behind all the above technology. Put it all together with a rising Police State, social engineering and a SMART growth society, the outlook doesn’t look good for the ordinary citizen. It is however, a perfect direction for the technocratic psychopath to take and his intent to centralise and consolidate power through technology.


See also: Cyborgs 2030: The Military’s Vision of Remote Controlled Soldiers


Notes

[1] Individual Force Protection System (IFPS)Overview2007 Worldwide Personnel Recovery Conference. | http://proceedings.ndia.org/7040/11percent20IFPSpercent20bypercent20Marshall.pdf
[2] ‘The Office of Strategic Influence Is Gone, But Are Its Programs In Place?’ fair.org, November 27 2002.
[3] ‘Information dominance,’ by David Miller, The Guardian, January 8, 2004
[4] Urban Operations, Field Manual No. 3-06, Headquarters, Department of the Army, Washington, D.C.,October 26, 2006.
[5] http://www.darpra.gov
[6] ‘America’s Cyborg Warriors’ by Tom Burghardt, Global Research, July 23, 2008.
[7] ‘New Homeland Security Laser Scanner “Reads People At Molecular Level” declares a CBS News headline’ CBS local, via GIZMODO July 11, 2012.
[8] ‘Cheetah robot “’runs faster than Usain Bolt”’BBC News, September 6 2012.

Technocracy VI: The Technocrats Tap in (3)

“Surveillance induced morality: relics of cultural retardation”.
 .
– Marc Maron
.

How many times have we heard the response: “If you have nothing to hide, you have nothing to fear”?

This almost child-like wish to place faith in the unsullied purity of the authorities and Daddy State seems to know no bounds.

The success of mass surveillance is defined by the same gradualism. Endless new devices and gadgetry help to insulate our concerns about technology and how it can be used. It doesn’t matter how altruistic the intent is, whether it means to reduce suffering or create a more socially responsible culture, social justice is a concept struggling to keep its head above the water of pathogenic pollution. Whether biotech or nano-tech, since military, geo-political strategies and social pathologies dominate they will be pulled into the same codes of conduct mandated under Official Culture. Suffering will continue under flares of revolution until the psychopath is denied influence in ALL spheres. Access to technology which will disburse wealth and true freedom cannot take place until such a realisation manifests to the extent it dismantles traditional power structures. To think otherwise, will simply perpetuate the cover. Such a trajectory has only been possible due to the relatively rapid rise of the National Security State apparatus rooted in the 3EM riding high on updated myths propagated to ensure a smooth transition.

In combination with ECHELON and or MAIN CORE we have a global surveillance grid sitting on top of European and US intelligence mining that is the most invasive in history. This technological construct is imbued with power from a perception that can only multiply and augment in the same way we continually seek new “apps” and add-ons to our consumerist ethos.  A technocratic centralisation is the only direction. The promise of open source software will only prove liberating when the central mainframe of core influence is dismantled. Otherwise…Open source initiatives will operate within carefully defined parameters, in much the same way as our credit cards, cell phones and i-pads. Technology is not the culprit here – it is the reliance on the limited applications which is displacing our incredible, untapped creative power. This displacement only leads to the atrophying of our individual and collective creativity. And this is where artificial intelligence and transhumanist ideology offers an unprecedented threat.

But I’m getting ahead of myself. More on this later.

1024px-Menwith-hill-radomes

RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UKUSA Agreement. Photo Credit: Matt Crypto (wikipedia).

The International Campaign Against Mass Surveillance (ICAMS) produced the excellent document: ‘The Emergence of a Global Infrastructure for Mass Registration and Surveillance’ back in April 2005 which detailed in precise terms the nature of these myths, edited extracts of which will serve as an adequate summary of what this transition really means:

Myth #1: We are merely being asked to sacrifice some of our privacy and convenience for greater security.

“The object of the infrastructure that is being constructed is not ordinary police or intelligence work but, rather, mass surveillance of entire populations. In this infrastructure, everyone will be treated as a suspect, and state agents will maintain data profiles on all of us. […] The elimination of risk Indeed, it is now evident and documented that the United States and other countries are acting aggressively on information, seizing and detaining people without reasonable grounds, and “rendering” them to third countries or extraterritorial camps run by the U.S., where they face torture during interrogation and indefinite detention. Alongside the global system for mass registration and surveillance is emerging what some commentators are calling a “global gulag”,4 in which unknown numbers of people are languishing. What is at stake in this new world order is more than mere privacy, or even democratic processes, legal systems, and civil liberties. Basic human rights are in jeopardy.”

The document also lists the The Registrations of Populations as integral to the surveillance state with a long history of isolated test-runs across the world and with the shadow of abuse inherent in such data mining. Examples are given of Japanese internment in America the Second World War, the 1994 genocide that took place in Rwanda and the Pass Laws of apartheid South Africa. Such highly detailed information derived from Registration: “… is the tool by which those in power can easily single out and target certain kinds of people – not for what they have done, but for who they are.” And further: “By creating inclusion, the system also creates exclusion. For practical purposes, a person without a mandatory identity document will not exist – or will exist only as a risk to the state.”

Myth #2: These initiatives facilitate travel.

“But something else is happening, too. The private sector is being pressed into service as the state’s eyes and ears. Just as it has done with the acquisition of private-sector databases and airline passenger record systems, the state is using the private sector to exponentially increase its surveillance capacity in the realm of electronic communications and financial transactions. And, instead of relying on the inconsistent practices of businesses, governments are starting to tell businesses how to design their information systems, what information to gather, how long it must be stored, what must be checked and reported, and what must be given directly to state officials.

Compelling service providers to “build in” surveillance capacity to their systems means that within minutes of receiving a warrant from a court, real-time interception of a person’s Internet or voice over Internet use can be implemented with just a few computer strokes, making a connection between the computerized listening stations of law enforcement and the service provider’s system.”

The FBI’s various software can be used to search for keywords in the trillions of gigabytes of information that is continuously vacuumed up whether from your bank accounts or blogs. Data mining is the future of crime prevention which is already merging with the dubious practice of entrapment. In George Orwell’s 1984 Winston, the main protagonist in the novel appears to describe the present: “It was inconceivable that they watched everybody all the time. But at any rate, they could plug in your wire whenever they wanted to. You had to live – did live from the habit that became instinct – in the assumption that every sound you made was overheard.” The only difference in our world, our surveillance will comprise of various degrees of robot and artificial intelligence from the basic models already appearing in our malls to sophisticated androids capable of human simulation. They will assess are bio-signatures and voluminous data files and make mathematical probabilities of threats to the system which will slowly build itself around us.

Myth #3: If one has nothing to hide, one has nothing to worry about.

“An example of the many mistakes that were made in that era was the naming of academic Owen Lattimore as the Soviet Union’s top spy in the U.S. He later was fully cleared of the charges. In his account of the affair he noted that the F.B.I. and other agencies had ‘built up on him a dossier of ‘a man who might have existed’. Again, as a historian of the period has observed, ‘that phrase catches the very essence of the creation of the national insecurity state: a data world that shadows, mimics, and caricatures the real world’ We may think that anyone looking at our personal data with the proper explanation would conclude we are innocuous, but, in fact, in the data world we have no control over our “virtual identities” or the interpretations that others make of them.”

This goes to the central premise of conditioning that comes about from living under inverted totalitarianism and the necessary glut of authoritarian followers who allow its manifestation. We do not notice the dismantling of the foundation upon which are human values and ethics reside due to the buffering of our intuition and conscience. This is achieved through propaganda, psychic driving and memetic engineering of our consciousness all cemented with the human propensity for wishful thinking and denial.

We keep coming back to the uncomfortable fact that we naturally seek sanctuary in the delusion that there is nothing to worry about because we cannot entertain the possibility that we may have to alter our beliefs and attempt a deconstructive introspection. When such a painful process begins it can shatter the ego-mask that buffers us from the terror of the situation. When our personality is largely empty of substance this can be akin to inviting death of identity and belonging. So, having nothing to worry about is a preferable hook upon wish we can willingly attach.

In modern times, nothing comes closer to a collective seduction than the human races’ relationship to technology. We are firmly caught in its web of convenience, innovation and compliance in much the same way we are enthralled by the chemical hit of sex. In that sense, the surveillance state is just another compromise on the road to achieving the new nirvana of the post-human.

Have we really learned those lessons? Or have we merely changed our focus?

Boundless-heatmap-large-0001

“The worldwide heat map from the NSA’s data visualisation tool BOUNDLESSINFORMANT, showing that during a 30-day period, 97 billion internet data records (DNI) and 124 billion telephony data records (DNR) were collected.” (wikipedia, creative commons | Source http://jobkaster.com/ Author National Security Agency)

Myth# 4: The technology being used is objective and reliable.

“First, the factual base on which the technology rests is unreliable. The ‘best information available’ on which data mining or risk-scoring technology depend is often inaccurate, lacking context, dated, or incomplete. It might even be dirty information – extracted by torture, or offered by an informant who is vulnerable or is acting in bad faith. Secondly, the criteria used to sort masses of data will always be over-inclusive and mechanical. Data mining is like assessing ‘guilt by Google’ key-word search. And since these systems use broad markers for predicting terrorism, ethnic and religious profiling are endemic to them. … a precautionary principle is at work when human beings are making the risk assessments.”

A surveillance state is surely an oxymoron by virtue of the fact it is created not from the wish to protect but the incentive to control. Technology is only as trustworthy as its programmer and by extension, the context in which the capabilities of technology are applied. By the same token, human beings are fallible and since machines are born from the quality of our own minds they will mirror the glitches and unpredictable anomalies so much are part of a learning universe – despite protestations to the contrary. The more complicated and sophisticated machines become the more they will transcend their in-built limitations – that is spark that consciousness seeks. But the Surveillance State is linked to wider philosophical beliefs where development and trust in technology is based on the notion of an evolutionary salvation. Such a suggestion is usually rejected by transhumanists who insist that technology is merely the next stage in human evolution; our destiny is to embrace singularity and merge with the machine for optimum transcendence. By implication, the surveillance state will cease to exist since it will become superfluous to our needs.

Once again, this presupposes that such a system of malevolence will naturally evolve into one of benevolence and those at key nodal points of its power will simply transcend along with us. More likely is that the rooted dominance that gave rise to inversion will offer more of the same, where the worm-hole of singularity is really nothing more than a sublime devolution by delusion, the end result of which is absorption of all that is individual and original in exchange for group-think and technocratic compliance. Sophisticated, yes, even ecstatic at times, but like an addictive drug, when you realise you are hooked and seek to escape in search of authentic experience, it will be too late. From reliability and trust projected onto the machine will ultimately invite the law of repulsion.

Myth #5 and 6: Terrorist watch lists are a reliable product of international intelligence cooperation and consensus / Governments want to implement these systems to protect their citizens from terrorists.

“There is no due process afforded individuals or groups to allow them to challenge the inclusion of their names on a list. And, once the “terrorist” label is fastened to them, actions are taken against them without normal legal protections being afforded (protections such as presumption of innocence, the right to know the evidence and allegations against one and to respond, the right to remain silent, and habeas corpus). This is the essence of the risk assessment model: it treats as intolerable risks the very legal protections that are fundamental to free and democratic societies. In short, the U.S. lists have “been created haphazardly and without the carefully constructed checks and balances that such powerful instrument[s] demand.” And the lists are certainly bloated. At various times, news reports have put the numbers of names on the U.S. lists in the millions.”

Despite the fact that 99.9 per cent of those listed are largely innocent of any crimes at all, the Terrorist Watch List is drawn directly from the idea that al-Qaeda/ISIL and most terrorist atrocities are representative of a real, external threat. Such a disastrous policy has shown to be a cynical manipulation of the mass mind and comprehensively debunked if one reads the research from authors and experts in the field alongside the current geo-strategy and its outcomes in the last one hundred years.

The official story of global terrorism is a monumental fabrication – a product of a compartmentalised mutation of myth used to promote the economic and socio-cultural status quo. It is a cleverly disguised tool of opportunism for social control with the rise of police states and war without end as the norm. Indeed, such an inversion is truly insidious as the pathology begins to make inroads into the psyche of normal human beings. As the ICAMS authors state: “As people begin to realize that every transaction in their personal lives is potentially being watched – and that their innocent actions and beliefs can be easily misconstrued by risk assessors in their own and other countries, they will begin to internalize the social control that is being exerted by governments, watching what they say, what they criticize, who they associate with, and what they profess to believe in.”

DigiGes_PRISM_Yes_we_scan_-_Demo_am_Checkpoint_Charlie_June_2013

Germans protesting against the NSA surveillance program PRISM at Checkpoint Charlie in Berlin. (wikipedia,)

This is happening fast. The official culture of psychopathy requires these myths not only to keep populations in a state of fear and disempowerment but more importantly, so that the banking architecture and profits from the arms race, weapons manufacturing, narcotics, human and organ trafficking continues until nothing more can be squeezed out of the husk. Implosion is the only avenue left. Yet, from this breakdown, will we have a true community template of freedom which encourages a free-flowing exchange or will we walk as somnambulists into a mainframe of control from which comfort and efficiency is a high-resolution mask? This set of technocratic controls represent both the future safeguards against this implosion and the ultimate resource of future exploitation when machine-based society dominates over a depopulated world.

Other myths include that of “Western Democracies defending democracy and human rights around the world”; “such initiatives make us safer”; “Guaranteeing security is the paramount responsibility of governments” and the platitude that “at least, these initiatives are better than doing nothing.” All of which are much propagated lies within the MSM, think-tanks and PR outfits which prey on the naive and ill-informed. As ICAMS asserts:

“Careful examination shows that the global, mass registration and surveillance initiatives that have been described in this document are not “better than doing nothing”. They divert resources away from activities that would provide us with better security, they are not effective, and the harm they do to democracies, individuals, the rule of law, and global security is not proportional to their utility, or even to the risk they are supposedly addressing.”

Biotechnology and transhumanist discourse in general, is wholly identified with the idea of accelerating human design and manipulating the rate of perceived evolution. This is in accordance with a one-dimensional philosophy that discards the idea of natural rhythms and cycles that may have their own rates of change and which may not be immediately accessible to the fallible and very subjective human mind. This is hardly surprising due to the movement’s secular roots. However, what if – as a very rich tradition of often suppressed ancient wisdom suggests – there is indeed a precise symmetry and purpose in the way the planet, cosmos and Universe functions and organises itself? Most transhumanists appear to reject this possibility and assume that a “genetic designer label” can be stamped onto biology based on what they consider to be a sacred evolutionary direction. As with most strictly materialist perceptions, in true Baconian tradition the control of matter, mind and Nature is the objective divorced from the idea of consciousness existing outside the constraints of matter. A Masters-of-the-Universe mentality seeks to upstage Nature and the planet itself, bending it to their “post-human” will.

That is not to say there are not some great minds in the transhumanist movement and that there is nothing of value to be found there. But when there is no real discernment between what is considered to be pathology and normalcy and where beliefs are already predisposed to psychological corruption, then it just becomes yet another hijacked ideology. There is also the opportunity to ask questions as to whether we base our future on the lessons of the past or presume to forge ahead and base our decisions on a technological train of wishful thinking. Will we be downloading and uploading a reality that is sacrificing authenticity for artifice?

Can we say that the Elite families of the West have changed; that all is in the past and they have comprehensively turned over a new leaf? Evidence so far suggests that this particular mind-set has merely adapted and refined its methods. Depopulating the world, identifying, logging, tagging and micro-chipping the remaining populace and herding them into tightly controlled mega-cities via economic hardship is one future the Pathocrats envision. Meanwhile, buying up vast tracts of land under the banner of environmentalism will provide them with suitable means to live with the benefits of advanced bio-genetic/cyber technology at their fingertips – most likely with the view to extending their life-spans. Far-fetched or not, psychopaths and those drunk on power seldom think of failure. Vast amounts of money has been channelled for decades into massive underground bunkers presently dotted around the US and Europe some of which can house over 2 million people. To bring “Order out of Chaos” one must first introduce the Chaos to the extent that all manner of alternatives are wiped clean, leaving only one Singularity. They intend to be safe and warm away from all their created carnage and for as long as it takes.

The same vision that has hijacked the normal expressions of creativity for the last two hundred years or more has embraced the Information Age. If a virus goes unnoticed within all societal domains and even begins to define the nature of society, then any future innovations and apparent evolutionary surges will be made under the impetus of the same macro-social pathogen and thus subverted towards anti-human goals until such time it begins to lose its grip. The internet provides us with an immense opportunity to access massive amounts of information and turn it into knowledge through clusters of networks. We have the opportunity to develop and apply that knowledge/awareness in ways undreamt of. Consequently, a real battle for freedom is already taking place in various fields of technology between what we might call the entropic /machine consciousness which seeks to dominate and coerce reality into its tiny perceptions and the human / creative consciousness that seeks to co-create, disburse and expand alongside the Earth and Universe. As a very real human global brain awakens it remains to be seen how it will be wired up and if those “synapses” will be able to make unbreakable bonds based on freedom, truth, responsibility and love.

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/