social networks

Trump Hysteria, Left Hypocrisy and the Four Drivers of the Deep-State / Overworld Part II

By M.K. Styllinski

Trump1© infrakshun

“That’s why we’ve witnessed such fury from her supporters – they had wrapped themselves so tightly in the Hillary flag that a rejection of her felt like a rejection of them. And when you consider that many American colleges gave their students Wednesday off  class because they were too ‘upset’ to study, you can see that this wasn’t a battle for the White House – this became a genuine battle for America’s future direction. And, indeed, for the West.”

‘Two Fingers to a Politically Correct Elite’ by Ian O’Doherty


Image is everything in America right?

Bill Clinton’s jazz-cool sax playing and predatory behaviour towards women; Barack Obama’s winning smile and languid nonchalance care of a marketing ploy of the first Black American fused with mythic qualities of JFK and Martin Luther King…. Who wouldn’t want such a man proclaiming “Hope and Change” after the Organ Grinder and Monkey of the Bush-Cheney years?

Well, that fell as flat as a week old soda. But not before havoc and mayhem was caused on behalf of Deep State movers.

cool-obama

In the heady days of Obamamania – so cool so fake.

 

Obama was a gargantuan disappointment failing to deliver on his stunningly hyped message of progressive change as an antidote to the Bush Junta. In particular, African-American supporters were thrown into tail-spins of disillusionment or a psychosis of denial because he gave the U.S. population the exact opposite of emancipation and liberal dreams of equality: he became the figurehead of the same regime change foreign policy strategy killing hundreds of thousands in the process. Our ex-human rights lawyer tipped this country into a full-blown police state and allowed the NSA to transform America into a surveillance society. Despite Edward Snowden, Bradley/Chelsea Manning and other whistle-blowers the dark maneuvers of the NSA  became public knowledge but didn’t change. If anything, it got worse.

Barack Obama’s presidency, (as was his diabolical Nobel Peace Prize) was a carefully managed stage show, the same shadow marketing which has shaped successive presidents to ensure a role designed to whittle away corporate accountability and dismantle the constitution;  to preempt and degauss a restless population and enforce compliance by stealth on behalf of their banking masters.

The same worship of authoritarianism is as relevant now as it was just after the Industrial Revolution and the outgrowth of elite institutional directives post World War II.  Accordingly, the same divide and rule formula in combination with the conditioned “normality” of statism had been used against a dumbed down populace for more than one hundred and fifty years. Yet, we live in the Information Age, an equivalent to an internal expansion of the mind in the same vain that the Industrial Revolution was an expansion of external control. And yet, still – STILL – you have terminally deluded individuals who feel duty-bound to support and defend this war criminal against all the bloody evidence. Such objective proof batters on the door of people with conscience up and down the country pleading to be recognised. Unfortunately, it seems denial and lies have been inculcated to such an extent that a collective Stockholm Syndrome is still holding sway.

(more…)

Police State Amerika I: Facebook Thought Police and CPS Blues

By M.K. Styllinski

“The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth becomes the greatest enemy of the State.”

– Dr. Joseph M. Goebbels


As a direct result of the Global War on Terror we are seeing the militarisation of law enforcement, the shocking rise of police brutality and an out of control US Army. The inevitable result is not merely the erosion of civil liberties but the very real danger of no civil liberties at all. America is at a crossroads with numerous symptoms of soft totalitarianism converging to meet its overt, classical form.  In other words, A Brave New World of social engineering and transhumanist-led SMART society converging with an Orwellian rule of martial law. This is getting more likely by the day and in Europe life is changing in more gradualist terms, but changing nonetheless.

Perhaps one of the clearest signs of psycho-pathogenic infection of the US government can be seen in who is deemed terrorist material. If entrapment doesn’t get you then considering yourself a “normal” citizen seems to be no protection either. The definition of the word “terrorist” has been stretched so far that anyone who doesn’t conform to the Establishment perception of reality is effectively a potential threat. As we know, Pre-Crime and mass surveillance is a much loved principle. The events of 9/11 seemed to open a a door to psychopathy and authoritarianism in a way that harks back to the both the building and collapse phases of historical Empires with each transition exhibiting a huge increase in pathology. It is my contention that we are transforming to toward a global consolidation arising from manipulated chaos, or we are going to see this attempt swing to the other polarity where the Pathocrats will lose control of their Grand Project and fall into their own entropic footprint.

Either way, Big Change is ‘a comin.

Since America is the primary source of Pathocracy at this time, the disintegration of which is required for the Establishment to extend its reach globally, it is little wonder that clear signs of a police state are not being reported in the MSM and if they are, it is with a broad strokes that exclude any historical perspective and analyses that could counter the official line. Only the most outrageous events are reported to give the impression that they are the exception to the rule when the opposite is the case. To that end, let’s explore thematically some of the police crimes taken at random from a variety of newspapers and online journals to illustrate the audacity of this emerging war against the people.

USApolicestate1© infrakshun

In early 2014, Pentagon directives advanced greater contingency powers for the war on terror on domestic soil. A particular focus of these new powers is the targeting of the civilian population and the enforcement of martial law through convenient loop-holes through the updating of the Insurrection Act of 1807 and the Posse Comitatus Act of 1878. In the new DoD Directive 3025.18: Defense Support of Civil Authorities (DSCA) the ill-defined, nebulous language allows “federal military commanders” these new powers, namely, anyone who happens to be in command can enforce military law against civilians according to their say so and without presidential authorisation. One section reads: “In these circumstances, those Federal military commanders have the authority, in extraordinary emergency circumstances where prior authorization by the President is impossible and duly constituted local authorities are unable to control the situation, to engage temporarily in activities that are necessary to quell large-scale, unexpected civil disturbances.”  Naturally, the severity of that scenario is not discussed nor why it is that presidential authority is suddenly “impossible.” Vague wording without legal meaning is a back door for emergency powers to arrive in favour of the military to do as they please, when and where they like.

Oddly enough, while the American public’s trust in the government and media is at record lows, the military fairs better. [1] This maybe due to the lack of psychological and financial support given to Iraq and Afghanistan veterans upon returning home and the sense of nationalistic pride that tends to surround them in the community. What this means when the military is not only employed on the streets but when they are an everyday presence, may change this perception.

Meanwhile, not content with performing invasive criminal background checks on passengers exercising their right to travel, the Transport and Security Administration (TSA) has expanded its duties beyond airports and is now armed and allowed to roam in public to conduct “suspicionless searches” on demand. They even carry out searches of cars at airport car-parks – without a warrant. (Oh, and make sure you have your papers i.e your biometric identity card otherwise you won’t be travelling anyway). Parallel with these inspection powers checkpoints have been popping up in various states used to “Dominate, Intimidate, & Control”. ‘Sneak & peek’ warrants allow police and FBI to secretly enter homes without notice; the IRS can seize entire bank accounts of unsuspecting citizens if there is sufficient reason for suspicion. There is no sign that these patterns of surveillance and intimidation have any intention of slowing. Indeed, it is getting worse very quickly. [2] [3] [4]

shocked emoji

Internet emoji used in social network messaging. Even this harmless symbol may get you into trouble with the thought police.

As we know, this trend has been allowed to target the internet, with federal and intelligence agencies monitoring and commandeering the freedom of expression on social networks in order to fine those – mostly young people – critical of the government. 

A 19 year old was jailed for leaving a sarcastic comment on Facebook regarding “shooting up a kindergarten”. He did so after being embroiled in a spat between other gamers who questioned his mental state. He responded: “I think Ima shoot up a kindergarten / And watch the blood of the innocent rain down/ And eat the beating heart of one of them.” He received 9 months in prison for the trouble. [5]

The ability to understand irony appears to be missing in the minds of police and judiciary.

Even posting rap lyrics on Facebook can get you branded as a “terrorist threat” it seems. When high school student Cameron D’Ambrosio, 18, posted this little missive on his account: “F— a boston bombinb [sic] wait til u see the sh– I do, I’ma be famous for rapping, and beat every murder charge that comes across me…” It was enough to land him front of a grand jury, though he was thankfully acquitted after members had the wit to reflect on the First amendment. [6]

Over in the United Kingdom the same level of insanity has also gripped the authorities. 19 year-old Matt Woods was sentenced to three months in jail for making sick jokes about missing children on Facebook. His comments focused on missing children April Jones and Madeline McCann including the following: “I woke up this morning in the back of a transit van with two beautiful little girls, I found April in a hopeless place.” and “Who in their right mind would abduct a ginger kid?” [7] He was apparently inspired to do so by a website called Sickipedia, where tasteless jokes are the norm. It seems his comments were enough to have a lynch mob at his door baying for blood which ultimately led to his arrest after the comments received a wider circulation. The judge called it: “ a disgusting and despicable crime,” sentencing him to 3 months in jail. [8]

Tasteless and silly, but a “despicable crime”? Hardly. What are becoming when we begin to send young people to jail for doing nothing more than exercising their right to free speech?

Then we mustn’t forget one of the most ridiculous attempts to drum up more cash for the Terror Industry when even using words – sick or otherwise – isn’t necessary for you to be handcuffed and led away.

After NYPD police were conducting a “routine Facebook monitoring” – and oxymoron in itself – Osiris Aristy, 17, was arrested at his home and charged: “with making ‘terrorist threats’ due to his use of emojis, posting photos of himself with a gun and therefore a criminal possession of a weapon, criminal use of drugs and criminal possession of marijuana” – all from the catalyst of using … emojis. The criminal complaint stated: “As a result of this conduct, the defendant has caused informant and other New York City police officers to fear for their safety, for public safety, and to suffer alarm and annoyance…” [9]

Aristy1

The FBI also likes to flex their muscles by tracking down Facebook users.  Within 24 hours of posting a comment about the “American Police State” Blaine Cooper, 33, was interviewed for 45 minutes by Prescott Valley Police Department based in Arizona with the FBI sitting in. Satisfied that he wasn’t a threat Cooper was Released. after Cooper contacted the website policestateusa.com and revealed further details:

“They had every Facebook post I had ever made in a huge file, along with all my wife’s information, and parent’s information…” Cooper said that he was told that without “defusing the situation” by complying with the interview, his house might have been raided. “The FBI made mention they came to question me so they didn’t have to kick in my door,” [10]

As legalisation of marijuana laws gains momentum, this hasn’t slowed down the Drug Enforcement Administration (DEA) in matching the FBI’s penchant for snooping, this time to support the tangential nonsense of the “War on Drugs.” Setting up fake Facebook accounts to impersonate and spy ona victim’s friends was a normal part of DEA work load it seems.

It was back in 2010, when Sondra Arquiett was arrested by the DEA and along with her boyfriend, charged for distributing drugs. Special Agent DEA Special Agent Timothy Sinnigen took it upon himself to purloin her cell phone (apparently with consent) in order to access the wealth of personal information. The phone was returned only after all her private photos, addresses, emails and records had been copied, a fact about which Arquiett was entirely unaware. The agent then created the online Facebook account and pretended to be Arquiett by contacting her friends, posting photos, sending messages and making friend requests. A high level of personal information was used to create the illusion that this was Sondra Arquiett – AKA Sondra Prince.

Arquiett only became aware of the false account when one of her friends alerted her to the fact. Since she had not even registered for a Facebook account this was doubly shocking. After the drug case had been concluded and she had served weekend jail terms for several months, she filed a lawsuit at a New York, Syracuse District Court in June 2013. Arquiett, now 28, cited emotional distress and the perceived cooperation with the DEA that might endanger her life and that of her child. 

What is perhaps more troubling is the clear breech of ethical guidelines where law enforcement not only mimics crime but once again sees no problem in actively creating it. The government, using the same para-logistical arguments to which we should now be well accustomed, defended the DEA and their methods by claiming that Arquiett “implicitly consented” by allowing agents and police access to her phone reinforcing their belief that these actions were carried out “for a legitimate law enforcement purpose.”  If such implicit consent and standardised legitimacy is now seen as normal, then American law has set the bar extremely low indeed. Many privacy experts agree.  Anita L. Allen, a professor at University of Pennsylvania Law School commenting on the case said: “It reeks of misrepresentation, fraud, and invasion of privacy.”  [11]

Sondra-Prince-Arquiett

The Facebook page set up by the DEA impersonating Sondra Arquiett AKA Sondra Prince. (Source: Associated Press)

Despite the obvious trashing of the principle of free speech anyone with a normal ability to discriminate between a terrorist threat, taking advantage of potential petty criminals and the ever-present noise of teenagers and their hormonal spats would have swiftly moved on, bored out of their minds. Such is the extreme paranoia coupled with profit margins the government prefers to waste billions of tax dollars on creating a climate of fear in the younger members of society. When the right to be silly and say inane and even controversial comments on the “privacy” of one’s social networking page is restricted and monitored then it is no distance at all to censorship, control of information and using the internet as a cynical opportunity to blur the lines between crime and prevention. Free speech then becomes a quaint afterthought.

Compliance becomes the norm.

CPS and DHS

The corruption of Law and the family Courts is now common place. It seems the Child Protection Services (CPS) and the Department of Human Services (DHS) appear to be working in tandem to make the lives of ordinary children, new born babies and their families an utter misery. That is not to say that these services do not offer protection and care for the young in many, perhaps still the majority of cases. However, there is a large body of evidence to suggest that this is changing – and changing fast. This is unsurprising given the fact that the CPS and DHS are tied to the hip with Big Pharma and the Medical Establishment which routinely enforce mandatory vaccination, orthodox medical procedures  and the growing seizure of children, despite and often due to the fact that parents have the temerity to call them out on their failures. The CPS in particular, shows itself to be a cartel with profits as the primary mover. It has come under the intense scrutiny of concerned citizens across America who have suffered a severe abuse of their human and civil rights. The reports are so alarming that it you’d be forgiven for harbouring doubts. Unless that is, you talk to those who have been on the sharp end of totalitarianism camouflaging itself as social care.  A few examples follow.

eroicamaycarey

Erica May Carey “escorted” away from her child by police

“The police literally ripped 14 month old Levi from his mother’s breast, reports Erica May Carey, as she was nursing him in the car at a California gas station. Her baby was screaming, and she says her breast was exposed as the officers dragged her from the car. As she recounted the events of last Thursday, Erica began weeping, saying that she was “hogtied like an animal, when moments before I was nursing my infant.” She was arrested and jailed for fighting to keep her children with her.

Erica and Cleave Rengo were the subject of national interest as reports of them fleeing Washington CPS [Child Protection Services] made the headlines. Last November, the holistic, devoutly Christian couple’s three breastfed babies were taken amidst accusations of neglect for choosing alternative remedies such as calendula and coconut oil for their older baby’s eczema and preferring not to take their newborn twins to the hospital after an unassisted homebirth, even though they were reportedly healthy.” (Source: Epic Times)


You might think you would have the freedom of choice to forgo vaccines for your new born baby but this wasn’t the case for Aliea Bidwell and Ben Gray, who became parents on March 14th, 2014. Unfortunately, the parents had the bad luck to come up against a doctor who took exception to the fact that they did not wish to inject drugs into their son. Despite this vaccine not even required by law in Alabama state, Dr. Terry M. Bierd, MD, staff pediatrician at St. Vincent’s Hospital in Birmingham, gave them an ultimatum: take the Hepatitis B vaccine or lose your baby to the Child Protection Services (CPS). The family is filing suit against the doctor and also set up a Web site to raise awareness of this medical blackmail and aggression. Donations are accepted to assist with legal costs.  [12] (A detailed account of their experience can be found at The INQUISITR).

It is completely understandable that parents do occasionally opt to refuse the Hepatitis B injection for their sons and daughters given the evidence of its toxicity and record of related deaths.  In June 2014, Lorie Blalock’s baby suffered an adverse reaction after being vaccinated with the drug against the mother’s wishes whereupon the infant was abruptly taken into medical foster care. They are still waiting to have their baby back. [13] [14] [15]

Then we must also mention Rebekah McClain was made a victim of the medical establishment after having her baby removed by the CPS despite demonstrable evidence that vaccinations were having adverse reactions. McClain was later accused of abuse. Her tale is an horrific one, detailing medical malpractice and vindictive behaviour that you would expect to find in a bizarre horror film. [16]

In a similar case which beggars belief, the Washington Department of Social and Health Services (DSHS) subjected a Tacoma foster mother and her baby to a bureaucratic attack on her civil rights to refuse influenza vaccinations. They gave her the same ultimatum so common in these cases by insisting that the entire family have the shots and if they refused, the baby would be seized by the state. In the end, Jamie Smith the boy’s foster mother, reluctantly complied stating: “I’ve done a lot of research on it and I don’t like some of the side effects that it has,” …. “I’ve thought about that a lot. Unfortunately, I have to think about our kids who are in the house first and to me they’re more important, their safety, than trying to fight to keep this little guy.”  [17]

She is not the first mother to be threatened with kidnap if the vaccinations are not accepted nor will she be the last. Not only babies are being snatched from their mothers to cover up malpractice and to fall in line with mandatory vaccinations, refusal to have chemotherapy treatment can also be considered abnormal, where the strong arm of the law must force you to comply.

An Amish family and their daughter suffering from leukaemia were initially forced to flee the United States, despite the ruling from an Ohio Judge supporting their right to halt all chemotherapy treatment. The parents of Sarah Hershberger believed that drug treatment would have produced more suffering and likely killed her rather than cure the disease.

According to one report:

“An appeals court issued a ruling granting an attorney for Akron Children’s Hospital, Maria Schimer, temporary guardianship over 11-year-old Sarah Hershberger after she begged her parents to discontinue the toxic drugs being administered to fight cancer. ‘Parental rights, even if based upon firm belief and honest convictions can be limited in order to protect the ‘best interests’ of the child,’ the court ruled.”  [18]

When sheriffs and CPS representatives came to take the child, the family had already left the country. Maurice Thompson the Hershberger’s attorney claimed: “It’s the constitutional right, but [there’s a] moral right to refuse conventional medical treatment,”. Thankfully, the family was able to return to the United States after grassroots protests and a successful legal battle. Sarah is now cancer-free. However, many are still not able to express their right to have a say in what happens to their own bodies in the event of a serious illness. Especially, it seems, where money is to be made.

Another instance of State coercion was visited upon 17 year old Cassandra from Connecticut State who was taken away from her mother and forced to receive chemotherapy that she vehemently opposed.

Diagnosed with Stage 3/4 Hodgkin’s lymphoma by Connecticut Children’s Medical Centre (CCMC)  doctors opted to remove some of Cassandra’s lymph node. This is where the chemotherapy drugs came in. Cassandra was opposed to this form of treatment, viewing the side effects as too dangerous, an opinion she had had for several years, according to her mother. As pressure from doctors mounted the family decided to seek a second opinion elsewhere. Meanwhile, the CCMC contacted Connecticut Department of Children and Families (DCF) alleging “parental medical neglect.” A Superior Court ruling swiftly followed, forcing Cassandra’s mother to return her daughter for chemotherapy treatment she had no wish to have.

After two chemotherapy treatments at the end of 2014, Cassandra was desperate and ran away from home to avoid any more interference. Upon her return she still refused treatment. Yet, at the conclusion of a CPS session and the CCMC doctors testimonies, the trial court subsequently ordered her “removed from her home and that she remain in DCF’s care and custody.” Which meant that Cassandra was hospitalised as a ward of the state with “all medical decisions made on her behalf.” She was then forced to endure further unwanted surgery and chemotherapy treatment.  [19]

To any normal person, having the choice as to whether or not you wish your kids to be vaccinated with toxic drugs, the chance to exercise your right to take care of your own children when it is self-evident that you are a responsible parent, or if your right to reject potentially dangerous treatment, is of supreme ethical and moral importance. Apparently, the CPS and similar social services and members of the medical Establishment disagree. What is more, should you have the audacity to question their Orwellian procedures you better make sure you have a lot of money and a suitable support system.

Cassandra and her mother committed the cardinal sin of seeking a second opinion which meant that the CPS/medical cartel went into overdrive. Since they have unlimited resources the sheer tripartite power of medical, judicial and law enforcement tag team is frightening to the ordinary family who ends up the object of their ire. For all the high profile cases that gain momentum on the internet or in local newspapers there are thousands of other cases that do not receive the headlines they sorely need. 

The Connecticut Children’s Medical Centre was in the news again in March 2015, this time for separating a 3 year-old cancer patient from his mother and accusing her of child abuse when it was nothing more than a diaper rash. Known to be a dedicated and loving mother by her friends and family, no charges were filed but Wendy Lamarre is still fighting to get her child back.  [20]

Here is a very brief round up of just some of the cases where people exercised their rights and dared to take a second opinion:

Teenager Isaiah Rider Speaks Out After Being Taken From His Mom In Medical Kidnapping Case

“Dissatisfied with her 16-year-old son’s medical care, Michelle Rider was preparing to transfer him from Lurie Children’s Hospital when a doctor delivered staggering news: The teen had been placed in temporary protective custody.

“They accused me of medical (child) abuse,” Rider said of that morning last month. “I said, ‘What is that?’ They told me to Google it. I was not allowed to have contact with my

Eight year old Jaxon Taken By Hospital When Parents Ask For Second Opinion

A Missouri doctor recently told a little boy that, if she had it her way, he would never see his mommy and daddy again. This was after 8 year old Jaxon was seized from his parents’ custody based solely on a statement from this single doctor. His parents, Tiffany and Jason Adams, are desperately trying to bring him home after what appears to be his doctor’s retaliation because they “dared to seek a second opinion.”

Teen indefinitely detained in psych ward after parents seek 2nd medical opinion

A judge has ruled that a Boston teen may continue to be held captive in a hospital and forcibly drugged… indefinitely.  The tragic series of events began when a doctor discarded an earlier medical diagnosis and declared another, prompting objections from her parents and threats to discharge her from Boston Children’s Hospital to take her to get a second opinion.  An epic battle of egos ensued, and the hospital decided that the parents’ insolence in challenging the doctor was tantamount to child abuse.  Without a trial or having broken a specific law, the girl was stripped from her parents’ custody and the state of Massachusetts has kept her indefinitely detained in a hospital since February 2013.  Based on the latest ruling, the girl may very well be locked in a psychiatric ward until she turns 18 years old.

The above  case of 15 year-old Justin Pelletier is a tragic summary of the authoritarian crimes of the CPS and Medical Establishment. Please visit the website http://justiceforjustina.com/ and donate to their cause.

Not only do we have these cartels gnashing their teeth at families who seek a second opinion in the face of their extreme behaviour but it seems smoking pot, drinking raw milk, perceived mental disability, hanging around with black kids, swearing on camera and even giving birth at home can land you in jail or facing the seizure of your children:

CPS snatched infant because of legal medical marijuana prescription

A man was placed into handcuffs, a woman sobbed uncontrollably, and their 11-month-old boy was seized by social workers and put into foster care — all because of legally prescribed medical marijuana.  It didn’t matter that no law had been broken; Child Protective Services has the power to split apart families in an instant without a trial, and regularly does across the country.

This heartbreaking situation happened to California couple Shawnee Anderson, 27, and Aaron Hillyer, 34.  After a nosy neighbor called the police because of a loud argument, cops arrived and found doctor-prescribed cannabis — legal for medicinal use in a total of 20 states. […]

The commonly-used cannabis plant is an easy target for child-snatching agencies — even if it is legal.  The agency can deem virtually anything “abusive” or “neglectful” at their discretion.  The targets of CPS are punished first, then attempt to prove their innocence later.  The American tradition of treating people as if they are “innocent until proven guilty” is lost on CPS.

“There are families out there … destroyed over a medicinal plant,” said Hillyer to CNN. “It’s baffling.”

Mom gets investigated by social workers after advocating marijuana reform and for in-depth: Fighting FIRES: Branden the Brave’s Battle for Medical Cannabis Access

“I feel like our family was targeted, just because I’m doing what our beautiful country is built on: Freedom of Speech.” […]

A child-abuse investigation has been launched on a Florida mom after she made some public statements in support of medical freedom. Social workers intruded into her life in order to look for excuses to seize her children.

This is the situation that Renee Petro is facing.  She is the mother of a boy with a terrible illness.  Branden, age 12, has been diagnosed with a rare form of epilepsy which results in uncontrolled seizures and can be fatal.  Her desperate quest to save him is also what has drawn the scornful eye of the state.

Healthy girl confiscated from parents who smoked pot, given to murderous foster mother

A little girl was confiscated from her loving parents because they smoked marijuana, and given away to a foster mother who put her into a coma and killed her. Alexandria “Alex” Hill, age 2, succumbed to her injuries after being “thrown to the ground.”

“We never hurt our daughter. She was never sick, she was never in the hospital, and she never had any issues until she went into state care,” said the girl’s father, Joshua Hill, to KVUE.

Alex was seized by the Texas Department of Family and Protective Service (TDFPS) after her parents were accused of smoking marijuana while the girl slept. She was taken into state custody in November 2012.

Mr. Hill said that she was put into more than one dangerous foster home.

Breastfeeding 2-day Old Newborn Seized From Parents Because Mother Has Disability :

“A Florida couple is devastated. Child Protective Services just took their breastfeeding newborn from her mother’s arms at the hospital. She was is not even two days old, but parents Tracey and Freddie Verzosa of Kissimmee, Florida will now only be able to visit their baby for feedings, under supervision. The accusations against them, according to the parents’ story, boil down to the facts that Tracey is a slow learner, they are poor, and the baby was born too quickly for them to make it to the hospital.”

DHHS accused of abusing authority with Brooklin teen who feeds baby goat milk formula

A young Brooklin mother who feeds her baby a goat milk-based formula, missed doctor appointments and refuses to have her child vaccinated is accusing the Maine Department of Health and Human Services of overreaching its authority by investigating her son’s well-being.

Family and supporters of Alorah Gellerson, 17, and her 4-month-old son, Carson, held a rally Thursday at Cascade Park in Bangor to make a statement against DHHS, which the young mother says has completed its investigation and given the baby a clean bill of health.

“We must send Maine DHHS a message that this overreach of authority is not acceptable,” the family wrote of the event on their farm’s Facebook page.

Many in the group who gathered at the park wore pins that read, “Goat milk formula is not a crime.”

CPS seizes toddler for saying naughty words on video

“A 2-year-old toddler has been seized by Child Protective Services when a clip surfaced of him using “inappropriate” language in a video posted on the internet.  The standard for breaking apart families has become so broad that it now covers politically incorrect speech.

The events began when the Omaha Police Department discovered a YouTube video of a diaper-wearing child using profanity at the encouragement of two adults.  OPD posted the video to its website, saying it was an example of the “cycle of violence and thuggery” in the community.”

CPS nabs teenager because she was hanging out with black people

A teenage dance student took a trip out of state with two fellow dancers to spend a weekend taking classes with some of the top professionals in the industry.  The weekend came to an abrupt end when she was seized by police and put into the hands of Child Protective Services because of the way her companions looked.

Young dancer Landry Thompson, 13, and her two companions departed from Tulsa, OK, and headed down to Houston for a weekend of professional dance instruction.  Her mother trusted Emmanuel Hurd, 29, and Josiah Kelly, 22, and had given her full consent to the trip.

The group spent all day Saturday in dance class.  Exhausted, they departed for their hotel.   But they struggled to find their destination. “We were on the GPS trying to figure out where the hotel was.  And we sat there and we dozed off,” said Hurd, her instructor.

The next thing the group knew, there were police surrounding the vehicle.  They apparently didn’t think Thompson had any business in a car with her companions, based on nothing but the way they looked.

[…] “‘Are you aware your daughter is with two Black men?’ When I said, Yes, I’m aware of that, he called into questioning [my] parenting,” the mother said. […]

A woman who wished to remain anonymous recounted her story of authoritarian abuse on a blog (now defunct) subsequently reported by Police State USA. After delivering her baby naturally at home she and her partner were surprised to find themselves putting up with a flood of visits from social workers checking to see that the baby was “healthy and “under government-approved medical supervision.” The mother was happy with the birth and both she and her husband were keen to avoid “unnecessary medical interventions”, hence the reason for a natural home birth. They had the baby checked out on the 6th day. It was then that things began to get disturbing:

Police State USA takes up the story:

The hospital experience, according to the mother, was infuriating. When doctors found out they had performed a home-birth, she and her husband were allegedly treated as if they were “crazy” and “incompetent fools.”

While at St. Joseph’s Hospital ER in Philadelphia, after some brief checks, the mother said that doctors rudely told her that her baby would be transferred — without permission — to another hospital. The supposed reasoning was that St. Joseph’s did not have a dedicated pediatric center. The mom says the decision was made behind their backs and an ambulance was already dispatched by the time she was informed.

Even though nothing was found wrong with her baby, the mother said that rejecting the transfer was not an option. A staff member named Dr. Elisa Evans allegedly “came in the room with a stern look and said, ‘If you refuse to transfer her, we WILL CONTACT DHS AND THE POLICE,’” she recalled.

The mom says that cops appeared and blocked the exit. “The officers stood in front of the emergency room doors — arms crossed and said you cannot leave with your child”.

The baby was involuntarily transported by ambulance to Children’s Hospital of Philadelphia (costing the parents $3,320.00). The mother said that doctors performed “test after test, hoping to find something.” For four hours this process went on, without the parents’ consent and under the threat of government compulsion. The parents had walked into St. Joseph’s at 10:00 a.m. and were not allowed to leave Children’s Hospital of Philadelphia until 9:30 p.m.

This is the same political correctness and paranoia gone mad that we explored in The Rule of Law , Sex, Lies and Society and The Politics of Entrapment. The confusion and mixed messages within such state departments and institutions is breath-taking. Real child abuse is covered up while the innocent are persecuted through a convergence of ineptitude, ignorance, bureaucracy and deception. They may even use these labels to cover their own tracks and maintain authority. Higher up the chain of command there are no doubt reasons to suspect elements of social engineering and ideology steering the DHS and CPS ships.

Now keep in mind Surveillance Society and All the Way Down to our DNA... and you may now have a better idea as to how ordinary people are being made to conform to Official Culture. Can you see how this plays an important part in a new form of technocratic centralisation? The Medical Establishment is no exception to this ideology.

Which brings us to this little item:

Secret list: Having your name on this secret Michigan list of 275,000 people could cost you your job (video included at source)

It’s a secret list that can cost you your family or your job.  Once you’re on it, it can be very hard to get off.   While some changes are being made to the law, many experts say it doesn’t go far enough.

The state maintains something called the Michigan Child Abuse and Neglect Central Registry and the sole power to label you an abuser lies not with a judge or a jury, but with child protective services workers.

And you may be surprised at how the state can define “abuse.”

Anita Belle says she’s never been convicted of a crime.  But Belle’s name has been put on the Central Registry as a child abuser.

“Where is the due process,” asked Belle.

The Central Registry is maintained by Child Protective Services workers inside Michigan’s Department of Human Services, or DHS.

Something to remember next time you consider placing efficiency before freedom – such as it is. Making false diagnoses, suppressing evidence, refusing to hear medical testimony and harassing families and their children appears to be business as usual for many members of the CPS and DHS departments fully mandated by the government. Independence and self-sufficiency covers all avenues. The more outside society you can be whilst cultivating a large network of like-minded friends, the better the potential for your future. 

In the next post we’ll look further at the rise of the police state after 9/11, with stories from those who have come under the baton and jackboot of the police and SWAT teams.

 

See also: Public School System Exposed for Reporting Parents to CPS for Homeschooling


Notes

[1] ‘I Can’t Breathe’: Eric Garner’s Last Words Symbolize Our Predicament’ By Rev. Jesse Jackson and Grace Ji-Sun Kim, Huffington Post,  12/18/2014| Updated: 02/17/2015.
[2] ‘Security Check Now Starts Long Before You Fly’ By SUSAN STELLIN, New York Times, OCT. 21, 2013.
[3] ‘T.S.A. Expands Duties Beyond Airport Security’ By RON NIXON, New York Times,  AUG. 5, 2013.
[4] ‘Sneak & peek’ warrants allow police to secretly enter homes without notice -Covert tactics have become legally accepted and increasingly popular. Police State USA, June 27, 2014.
[5] ’When A Teen’s ‘Sarcastic’ Facebook Message Goes Terribly Wrong’ Daily Mail, Jul. 8, 2013.
[6] ‘Grand Jury Rejects Indictment of Teen Arrested for Rap Lyrics’ Massachusetts student’s arrest for alleged ‘terroristic threats’ raised First Amendment concerns, By John Knefel, Rolling Stone, June 6, 2013.
[7] ‘Teenager jailed over offensive April Jones Facebook posts’ By Kim Pilling, The Independent,  08 October 2012.
[8 ]‘Unemployed teenager sent to prison for three months for vile Facebook posts about missing children April Jones and Maddie Mccann’ Daily Mail, By Emily Allen, 8 October 2012.
[9] ‘Teen Arrested for His Choice of Emojis in a Facebook Post, By Cassandra Rules, January 23, 2015. The Free Thought Project at www.freethoughtproject.com.
[10] ‘FBI interrogated man after comment about American ‘Police State’ on Facebook’ -Man’s fears are confirmed when the FBI wanted to interrogate him within hours of making an impassioned comment, www.policestateusa.com August 27, 2013.
[11] ‘Government Set Up A Fake Facebook Page In This Woman’s Name’ By Chris Hamby, http://www.buzzfeed.com/ October 7, 2014.
[12] ‘Parents Blackmailed By Doctor: Consent To Vaccine Or We Take Your Newborn’ The Inquistr, May 23 2014.
[13] ‘Grassroots Effort To Fight Medical Kidnapping Of Baby Kathryn By UMC Children’s Hospital And CPS In Texas’ The Inquitr, October 26, 2014.
[14] ‘Social Services To Family: ‘Get Flu Shots Or We’re Taking Your Baby’ By Mac Slavo, January 18th, 2015 | SHTFplan.com.
[15] ‘Vaccine-Injured Child Kidnapped from Family by Child Protective Services’ by Augustina Ursino,www.vactruth.com,  November 15 2014.
[16] ‘4 Month Old Texas Baby Seized from Parents in Medical Dispute’ By Terri LaPoint
Health Impact News, December 2014.
[17] ‘Amish family forced into hiding to avoid court-ordered chemotherapy treatment’  December 1, 2013. www.policestateusa.com
[18] ‘Connecticut Supreme Court Upholds Ruling That State Can Force Chemotherapy On Teen’ By Josh Kovner, www.courant.com/
[19] ‘No Charges Filed, But 3-year Old Cancer Child Taken from Mother over “Diaper Rash”  by Terri LaPoint, March 14, 2015, healthimpactnews.com/
[20] ‘Medical Kidnap: CPS Worker Makes False Medical Diagnosis to Seize 4 Year-old Child from Family’  Terri LaPoint, March 14, 2015.

Save

Save

Technocracy XIV: Psycho-Civilised

“Technological progress has merely provided us with more efficient means for going backwards”

Aldous Huxley


Note: A re-read of ‘Satan’s Little Helpers VII: Mind War’ might be in order before we continue with the emergence of SMART society and its place in mass mind programming.

monitors1

The SMART-Surveillance Grid allows improvements in telecommunications, electricity provision and home functionality. It offers an exciting integration of eco-economics and energy saving technology along with the “Internet of Things” (IoT) and “Network of Things” (NoT) which is offering to revolutionise transport, communications and urban infrastructure as a whole. With embedded surveillance it permits advertisers, marketeers to access human minds as never before. Authorities can also tap in and use this consumerist techtopia to trap criminals and would-be “terrorists”. It requires that the State and Official Culture become so integrated through technology that the line will be blurred. Security and collectivism will be encouraged to a degree that compliance will be seen as good citizenship insofar as it maintains the urban environment and social provision. A new social contract will be loaded in favour of the State through a form of satiated servitude. (The Illuminist-Enlightenment thinkers would be well pleased).

So-called terrorists, dissidents/activists, protestors and ordinary citizens will need to be very concerned indeed on the road to SMART society as true individual thinking outside the box will slowly become frowned upon since it will not be conforming to the precept of a “psycho-civilised” society. The path of access to this dystopian view starts with ubiquitous surveillance.

As one short example illustrates, Britain’s Leeds-based Metropolitan Police Force is using a surveillance system procured from Datong plc., past customers of which have been the US Secret Service, the Ministry of Defence and unsavory regimes in the Middle East. The system is disguised as a mobile phone network which transmits a signal allowing the police or any other authority: “… to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area,” … “Strictly classified under government protocol as “Listed X”, it can emit a signal over an area of up to an estimated 10 sq.km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person’s movements in real time.” [1]

This is just one regional police force.

While the online company Amazon will track you via your Kindle reader for targeted advertising pathway prediction, the authorities will do the same based on the accumulated data to which it has access. It will not be for what you might buy, rather it will access what you may be thinking and your likely course of action on the “threat assessment” scale. There is precious little happening to prevent Google and other information technology companies from rolling out the SMART Internet of Things infrastructure which has enormous implications for a privacy and collective freedoms. Wi-Fi is destined to play a huge role.

militarysmartcityUrban law enforcement and Telephone towers with technology which allows multiple receive-transmit capability 

The social benefits of providing free access to Wi-Fi hot spots for those in low-income brackets and incentives for business travellers are shielding plans by the U.S. Department of Defence: “… to build robots that configure themselves into ad hoc wireless networks within urban areas” which were already well underway in 2007. Seizing control of internet communications and tracking individuals in urban areas is a necessary by-product of the technocratic SMART society. If that fails, the military are well placed to set up these Wi-Fi networks in a matter of hours or less. The Department of Defence (DOD) Homeland Security, Canadian, Israeli and NATO forces regularly conduct war-game exercises with Wi-Fi networks at the heart of operations. A DOD announcement for contractors as described by journalist Mark Baard discloses operations whereby:

“… soldiers will be able to drop robots, called LANdroids … when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network…The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of individual computers and mobile phones…where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail. The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.” [2]

As people become more accustomed to SMART technology and RFID tagging this will lead to the acceptance of our “need” to ensure greater technological “freedom.” As well as the technological capabilities of HAARP lying in the background in some form or another and married to these advances in technology, is it such a huge leap of imagination to think that once we are fully enmeshed in this SMART society where everything is habitually integrated that it would not be easy to begin directly assessing, monitoring and “downloading” material directly into the mass mind? Television has already served this purpose well, albeit in a more indirect fashion. With this in mind, though some have since expired and at least one is no longer listed (as of 1990) the US patent office listed the following successful registrations dating back to 1992:

U.S. Patent 5159703: Silent Subliminal Presentation System. (issued 1992) U.S. Patent 5507291: Method and an associated apparatus for remotely determining information as to a person’s emotional state. (issued 1996) U.S. Patent 5629678: Implantable transceiver – apparatus for Tracking and Recovering Humans. (issued 1997) U.S. Patent 6014080: Body worn active and passive tracking device (issued 2000) U.S. Patent 5868100: Fenceless Animal control system using GPS (Global Positioning Satellite) Location information. (issued 1999) [3]

US patent No. 5507291 filed on April 5, 1994 shows the level advancement at the public level. What goes on beyond top secret levels of the National Security State is anyone’s guess. The patent’s “abstract” is described as follows:

“In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas.” [4] [Emphasis mine]

And US patent No. 5159703, filed on December 28, 1989:

“A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.” [5] [Emphasis mine]

In the late Lt. Colonel Michael Aquino’s book: Mind War he explores psychological operations in combination with emerging technologies such as EM waves, Silent Sound and ionospheric mind control. Let’s not underestimate the power inherent within the human body /mind complex. After all, the electrical energy that powers each cell in our bodies works out at 30 million volts per metre, the equivalent voltage of a bolt of lightning. [6]Power within can be, as it were, reverse-engineered. From a footnote in the same chapter if you didn’t catch the first time, read it again in this context:

“… the NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day. […]

“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture from electromagnetic waves and interference. According to one researcher amongst many, Dr. Armen Victoria’s  1998 essay regarding ‘The Military Use of Electromagnetic Microwave and Mind Control Technologystates the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ’emotion signature clusters’. Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. ‘They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [7]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the US. It is still conducting some of the most advanced research in the world which in turn, stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been researching ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilising electro-magnetic waves as a psychotronic weapon. We may then understand that the invasion of Iraq not only represented an opportunity to plunder a nation for resources and stake claim to a long held geopolitical prize, but to test out new developments in microwave weaponry and experiment with the latest PSYOPS.
As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the US samurai. No more rhesus monkeys or pigs but real, live Iraqis.” [8]

According to Dr. Oliver Lowry who has had the dubious honour of working for the US military on several classified projects, Iraqi soldiers were the latest unwitting guinea pigs to further such advances, one of those being Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD:

… According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds. [9]

Humans are highly sensitive and susceptible to a variety of electromagnetic frequencies – natural or artificial. The human body is a highly sensitive package of water, bio-chemicals, and electromagnetic energies. The introduction and exposure to various kinds of external micro or EM waves of any kind whether from mobile phones RFIDs or even wind-farm infra-sound does and will have an effect on the human being in ways we do not understand. Consider also that the geo-magnetic sensitivity in animals and other living organisms concentrations of ferromagnetic material – most notably magnetite. The same levels of magnetite conductor / receptor bio-mineralization were discovered to exist in the human brain in the early 1990s. The authors of one paper say that the presence of the particles may account … for a variety of biological effects of low-frequency magnetic fields.” [10]

0117x

Electric field of the heart on the surface of the thorax, recorded by Augustus Waller (1887).

Weapons which target the mind and nervous system of selected individuals also has a long tradition. Reports of systematic mind stalking, harassment of individuals, testing and deployment of electronic and electromagentic devices (EMF) by government/outsourced agencies have been surfacing in the United States, North/South Korea and various countries in Europe. This has eroded human rights comprehensively with the added bonus for the persecutors that it is almost impossible to confirm and verify that which is literally “all in the mind”.

Though information in electronic/electromagentic or “non lethal Weaponry” is largely classified there is sufficient evidence from modern history and individual reports to reach the conclusion in a court of law that the targeted, micro-social use of behaviour modification technology is being used against individuals and activist groupings.

Interest in a variety of EMF weaponry had already begun at the beginning of the 20th Century with the genuis of Nikola Tesla and his experiments with radar and electrical energy. Concentrating and directing a beam of electromagnetic energy over a certain distance took hold of Tesla’s mind until his death in 1943. It seems the military-industrial complex heavily saturated in Nazi philosophy and science simply subverted Tesla’s genius and extended his advances in the field.

DARPA have been on the case since the Cold War with their 1958 research into combating Soviet advances in electromagnetic weapons and defenses. The capability to disrupt human emotions, inflict pain and fragment the personality was already well underway during pre and post-war experimentation under Operation MK-ULTRA, Project MONARCH, Project PANDORA and the development of PSYOPS and CoIntelpro emerging against the background of the civil rights movement of the 60s and 70s; behaviour modification had a new platform to play with.

Since that time with the enormous advances in “new concept” warfare there is every likelihood that a fusion of this military-intel science is not only being used as form of macro-social engineering and a monopoly of media-led propaganda, but the use of mass mind, ionosphere technology (fomerly labelled HAARP) to influence whole regions, even countries. It is therefore not a huge leap of imagination to recognise that the precision use of psychotronic weaponry to target selected individuals by the National Security State apparatus is in existence and heavily funded by black budgets.

Well in advance of the war on terror hoopla, Neo-Conservative regime change and the sky-rocketing increase in human/drug trafficking, mind control technologies were telegraphed to the military-intelligence faithful as the tool of choice to keep the world in line. The Strategic Studies Institute of the U.S. Army War College, published in 1994: ‘The Revolution in Military Affairs and Conflict Short of War’ by LTC James Kievit, Dr. Steven Metz. In the paper, the authors state the following drawn from their “hypothetical future scenario”:

The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant. […] Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

Put this together with Synthetic Environments for Analysis and Simulation (SEAS), the SMART grid, MAIN CORE, biological and PSYOPS warfare and you begin to get the idea that the technology of assymetric warfare isn’t just about geostrategy to dis-empower traditional enemies such as Iran, Russia and China. It is about war against domestic population by stealth and in plain sight. According to Project Censored’s 2006 paper titled: ‘US Electromagnetic Weapons and Human Rights’ offers a broad brush synthesis of the field and confirms the black budget capabilities available since the Zio-Conservative false-flag coup of 9/11:

“Michael Vickers, senior adviser to the Secretary of Defensefor the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations: “US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white SpecialOperations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.” [11]

CongnitiveMappingSource: Petri Ticklen at http://alicefish.net/MindAttack.htm Original source: Against Electronic Mind-Control International /http://againstmindcontrol.tripod.com/liber.html

Since the war on terror propaganda has now made sure that activists, dissidents and indeed anyone overtly successful in criticising government policy is shut down, detained or harassed it is hardly shocking to discover that some of these covert programs have been targeting people for experimentation in CIA rendition centres, prisons, psychiatric wards and across the general public with immunity. Project Censored authors state:

“…Hundreds of people continue to assert that a person or persons, whom they do not know,have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution. These experiences involved a number of discrete phenomena:

  • Hearing voices when no one was present.
  • Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause.
  • Sleeplessness and anxiety as a result of “humming” or “buzzing”.
  • Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
  • Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises. [12]

And the industry of non-lethal weaponry (NLW) is steadily increasing playing a dominant role in asymmetric warfare abroad as well as crowd control closer to home. The market for NLW will apparently double by 2020. [13] That means big money. Almost ten years ago:

“…the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, ElectroMagnetic Applications, and SAIC among others. The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, ‘Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that ‘in the next conflict it is we who will control the spectrum. We know its value’. Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.’

In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology. There are also numerous conferences each year hosted by the Department of Defense, contractors and universities. The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non-Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000. [14]

By 2011, this had increased to $138 million, reaching $140 million in 2013. [15] If we read the US Department of Defence’s Annual Non-Lethal Weapons Program Annual reports, it would leave you feeling suitably humbled and sentimental, beaming with national pride that Uncle Sam and its numerous military bases are making the world a less lethal. Apart from such delusions, what is more interesting is how such NLW advances are leaking into law enforcement and perceived “National Security.” A passage from Project’s Censored’s report concerning one Eldon Byrd a medical engineer, underscores this point:

“After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holesin people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” He believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line.” [16]

It is this intentional compartmentalisation and factional nature of operations and directives within military and  intelligence agencies which allows pathological leadership to develop.

Back in 2006, Congress and George W. Bush signed the Military Commission Act of 2006. which allowed torture and suspension of due process as acceptable. Since that time, torture apologists from law, academia and the military have come out to justify such actions as necessary for the “greater good” once again, trashing the very concept of the Universal Declaration of Human Rights and basic notions of conscience. The Anglo-American-Zionist Establishment is perfectly happy to use all and everything in its means to achieve its ends including the use of technology that cannot be detected nor recognised by Official Culture.

The somewhat infamous Dr. José Delgado Director of Neuropsychiatry at Yale University Medical School in the 1960s and 70s, and later Professor of Neurobiology in Madrid, Spain, had gained quite an internet following of shock and revulsion based around his similar pathological view of the capabilities of psychosurgery. He urged the U.S. government to make “control of the mind” a national goal. [17] He cheerily – and perhaps ill-advisedly – voiced his opinion and those of his superiors regarding the future:

“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday, armies and generals will be controlled by electric stimulation of the brain”. [18]

Dr. José Delgado was nothing if not thorough in his research. In 1965, The New York Times reported on Delgado’s successful experiment in the use of electronic implants connected to the motor nervous system of a bull – the unfortunate animal was stopped from charging by remote radio-control. The bizarre capabilities of surveillance was demonstrated when he surgically implanted a cat with an electronic implant which transmitted everything the poor moggy was seeing and hearing to a TV monitor.

The Doctor’s foray into publishing produced Physical Control of the Mind: Toward a Psycho-civilized Society (1969) which helped to confirm his Dr. Evil status on the net – not without justification. The doc is messianic in his belief that humans will undergo “psycho-civilization” by uploading the contents of their brains directly to machines and vice versa. With statements like that it is unlikely that he limited his experiments to animals. According to a 2001 interview for Cabinet magazine conducted by artists and writers Magnus Bärtås and Fredrik Ekman there are still many of Delgado’s descriptions in his own articles and reports of how he moved from animals to humans in contemporary American medical libraries. The reporters relate how Delgado, Dr. Mark, and other colleagues: “describe what was the first clinical use of Intracerebral Radio Stimulation (IRS) on a human being. The stimoceiver itself only weighed 70 grams and was held fast by a bandage.”

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (1986)

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (Third Edition: 1986)

In an article called “Radio Control Behavior” in the February 1969 issue of The Journal of Nervous and Mental Disease there are descriptions of patients who had undergone procedures to attach the device to their brains.

Case studies include:

… A black fourteen-year-old girl on the border of developmental disability who grew up in a foster home suddenly goes into a fury that leads to the death of her two stepsisters. A thirty-five-year old white industrial designer who ends up killing his wife and children flies into a rage when other motorists try to overtake him and he chases them and tries to run them off the road. Their aggressive behavior is supposed to be registered by the stimoceiver in the way a seismograph registers the earth’s tremors and the same stimoceiver is then to “turn them off” via the FM transmitter. [19]

In the interview Delgado admits that as far as he was aware nothing came of the IRS device due to the complexity of the brain and the unreliability of the mapping: “We never knew which parts of the brain we were stimulating with the stimoceiver. We didn’t even manage to prevent epileptic attacks, which we thought would be the simplest of things. We never found the area where epilepsy attacks originate.” [20]

The authors reveal their surprise at his: “casual attitude towards the stimoceiver which was heralded as a great contribution to science.” Although Delgado’s attitude conforms to later developments regarding the brains plasticity and almost holographic nature, normal practice for radar experiments in psychological control were to appropriate and integrate into covert programs. After all, mind control operations were/are still continuing. It was at the congressional hearings on the CIA sponsored MK-ULTRA operations that Delgado made his famous declaration of psychosurgery. It seems highly improbable that such experiments were ignored especially when they often yielded startling results.

To illustrate the effectiveness of electro-stimulation Delgado and his colleagues: “… orchestrated violent scenes in the lab” descriptions of which were captured in the book: The Brain Changers: Scientists and the New Mind Control (1973) by Maya Pine who relates one incident typical of the research in question:

As the film opens, the patient, a rather attractive young woman, is seen playing the guitar and singing “Puff, the Magic Dragon.” A psychiatrist sits a few feet away. She seems undisturbed by the bandages that cover her head like a tight hood, from her forehead to the back of her neck. Then a mild electric current is sent from another room, stimulating one of the electrodes in her right amygdala. Immediately, she stops singing, the brainwave tracings from her amygdala begin to show spikes, a sign of seizure activity. She stares blankly ahead. Suddenly she grabs her guitar and smashes it against the wall, narrowly missing the psychiatrist’s head. [21]

As the authors delved deeper into the experiments on people Delgado became suspicious and tense. He terminated the interview not long after. Rather than regretting his time of psychosurgery innovation it is likely that Delgado was feeling petulant about being left out of the loop after his data was integrated into the continuing experimentation. He may have had considerable lack of success with the vagaries of brain plasticity but his work on animals was highly valued during the parallel mind control work of MK-ULTRA and other operations. Though unconfirmed, it is thought that Delgado worked on Project PANDORA as part of the CIA’s experiments into electromagnetic modulation with particular attention to scrambling the minds of soldiers on the battlefield. It was at exactly the same time that the CIA began to conduct radiation experiments on the US population, just prior to Delgado starting his research on electro-magnetic radiation and its capacity for influencing people’s consciousness.

After the 1974 congressional hearings the Doctor continued his animal research managing to link his brain implants with computers. This was documented in “Two-Way Transdermal Communication with the Brain” published in 1975 where he stated:

“The most interesting aspect of the transdermal stimoceivers is the ability to perform simultaneous recording and stimulation of brain functions, thereby permitting the establishment of feedbacks and ‘on-demand’ programs of excitation with the aid of the computer. With the increasing sophistication and miniaturization of electronics, it may be possible to compress the necessary circuitry for a small computer into a chip that is implantable subcutaneously. In this way, a new self-contained instrument could be devised, capable of receiving, analyzing, and sending back information to the brain, establishing artificial links between unrelated cerebral areas, functional feedbacks, and programs of stimulation contingent on the appearance of pre-determined patterns” [22]

In true “mad professor” fashion, Delgado continued his experimentation  on an island in Bermuda, where a group of gibbons were placed at his disposal. Naturally, the doctor had them all fixed with electronic brain implants which led him to discover how to build and destroy social orders using electrical brain boosts. [23] This would have been right up the technocratic street that was emerging in the warfare-ridden 1970s. So, this begs the question: after over thirty years of electronic implant tinkering what has the Pentagon, DARPA, NSA and unknown agencies come up with besides the RFID tagging systems? Our old friend the Nazi-tainted IBM needs to be brought in here.

Reflect on this confidential memo covertly obtained all the way back from October, 1995 from INTELLI-CONNECTION, a Security Division of IBM. In the form of an office memo, it reveals some interesting information. An edited extract follows:


 THE I.B.M. 2020 NEURAL IMPLANT

CONFIDENTIAL, LIMITED DISTRIBUTION ONLY, LEVEL 9 COMMUNICATION, 2020 NEURAL CHIP IMPLANT

   “Federal regulations do not yet permit testing of implants on prisoners, but we have entered into contractual testing of our product. We have also had major successes in privately owned sanitariums with implant technology… In California, several prisoners were identified as members of a security threat group, EME, or Mexican Mafia.

   They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge, Massachusetts laboratories.

   The implant procedure takes about 60-90 minutes depending on the experience of the technician. We are working on a device that will reduce that time by as much as 60 per cent. The results of implants on 8 prisoners yielded the following:

   Implants served as surveillance monitoring devices for threat group activity. Implants disabled two subjects during an assault on correctional staff. Universal side effects in all 8 test subjects revealed that when the implant was set to 116 Mhz all subjects became lethargic and slept an average of 18-22 hours per day. All subjects refused recreation periods for 14 days during the 116 Mhz test evaluation…”

   Each subject was monitored for aggressive activity during the test period and the findings are conclusive that 7 out of 8 test subjects exhibited no aggression, even when provoked. Each subject experienced only minor bleeding from the nose and ears 48 hours after the implant due to initial adjustment.

   Each subject had no knowledge of the implant for the test period and each implant was retrieved under the guise of medical treatment. The security windfall from the brief test period was tremendous. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities … In Massachusetts, the Department of Corrections had already entered into high level discussions about releasing certain offenders to the community with the 2020 neural chip implants.” [24]


What is the probability that such technology has been way in advance of anything we see from outsourced DOD departments which are overt and relatively open to public discourse? What of deep black projects far away from any oversight? Might we assume that method may be in development that could be used on the potential activist, dissident or “terrorist” when the SMART-Surveillance society (SSS) is fully integrated into a comfortable, consumerist paradise?

If we take the infestation of Satanic Ritual Abuse networks which appear to be seated in most centres of power and seeping into the waiting SSS managed by mind control technology both overt and covert, this is surely worse than any science-fiction novel we can imagine. If we are to give credence to Zbigniew Brzezinski’s visions, which in any case, may simply be explanatory notes to his fellow comrades signalling what will happen, the technology may already be in place and operational.

In his 1970 book Between Two Ages Brzezinski writes:

“… of a future at most only decades away,” upon which he related the opinion of an experimenter in intelligence control who asserted: ‘I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” [25]

This is the darker side of the transhumanism crowd and which permeates social network corporations, military-intelligence and the DARPA inspired National Surveillance state. The music emanating from SMART grid technology is that of the Pied Piper lulling his followers into a false dawn. Saturating ourselves in W-Fi and locking ourselves into a EMF grid; making our gadgets indispensable for our most basic daily needs is exactly what this mainframe seduction is all about. Part of being psycho-civilised is that we become seduced by the promise of more and more access, increasing efficiency and the ever smaller distance between “want” and “have.” The problem is, it appears to be an illusion, engineered with great precision, doffing it’s hat to ecological principles and economic alternatives whilst retaining a core-machine centralisation.

If we do not see the Magician behind these pretty lights and virtual enticements; these amenities offering a New Order of efficiency and ease, we will end up exactly as Henry David Thoreau wrote about his fellow man whom he believed had become : “… as tools of their tools.” When that happens and in combination with our illustrious pathocratic leaders, there may be very few choices to think freely, let alone act. We will be quite literally lost in the “simulation and simulacra”.

That is the antithesis of SMART.

 

See also: Satan’s Little Helpers VI: Sleepers and Electro-Shocks

 


Notes

[1] ‘Met police using surveillance system to monitor mobile phones’ The Guardian October 3, 2011.
[2] ‘Urban Wireless to Serve Intel and PSYOP forces’ by Mark Baard parallelnormal.com, July 19, 2007.
[3] http://www.patft.uspto.gov/
[4] ‘Method and an associated apparatus for remotely determining information as to person’s emotional state’ Inventors: Stirbl; Robert C. (New York, NY), Wilk; Peter J. (New York, NY) Appl. No.: 08/222,835 Filed: April 5, 1994 / 5,507,291 Stirbl et al. April 16, 1996. www. patft.uspto.gov/
[5] ‘Silent subliminal presentation system’ Inventors: Lowery; Oliver M. (Norcross, GA) Appl. No.: 07/458,339 Filed: December 28, 1989, issued as United States Patent 5,159,703, October 27, 1992. www. patft.uspto.gov/
[6] Utility Services in India’ | http://www.indiaonline.in/About/utilities/index.html
[7] The Military Use of Electromagnetic Microwave and Mind Control Technology’ by Dr Armen Victorian Lobster Magazine 1998. [8] ‘Horrifying US Secret Weapon Unleashed In Baghdad’ By Bill Dash, rense.com August 25, 2003.
[9] .‘Ariel Mind Control’ by Judy Wall, Editor/Publisher Resonance Newsletter of the MENSA Bioelectromagnetics Special Interest Group http://www.raven1.net/commsolo.htm
[10] ‘Magnetite Biomineralization in the Human Brain’ by Joseph L. Kirschvink, Atsuko Kobayashi-Kirschvink and Barbara J. Woodford, National Academy of Sciences. | Vol. 89. Biophysics, 1992.
[11]’US Electromagnetic Weapons and Human Rights’ By Peter Phillips, Lew Brown and Bridget Thornton, As Study of the History of US In telligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University, Project Censored Media Freedom Foundation.http://www.projectcensored.org/wp-content/uploads/2010/05/ElectromegnaticWeapons.pdf
[12] Ibid.
[13] ‘Non-Lethal Weapons (NLW): Industry, Technologies & Global Market’ 2014-2020 Aug 19, 2014 |http://www.marketwatch.com/story/non-lethal-weapons-nlw-industry-technologies-global-market-2014-2020-2014-08-19
[14] Ibid.
[15] http://jnlwp.defense.gov/Portals/50/Documents/Press_Room/Annual_Reviews_Reports/2013/DoD_Non-Lethal_Weapons_Program_Annual_Review_11.19.2012_HTML_format_v1.pdf
[16] Many accounts on psychotronic abuse are available to read in books and online. Some links: http://mindjustice.org/ | http://freedomfightersforamerica.com/victims_statements_pg1 [16] op.cit Philips, Brown, Thornton.
[17]The People Shapers by Vance Packard, published by Little, Brown & Co., 1977, (p.4).
[18] Joseph Delgado February 24, 1974 edition of the CONGRESSIONAL RECORD (MKULTRA hearings) No. 26, Vol.118.
[19] ‘Psychocivilization and Its Discontents: An Interview with José Delgado’ by Magnus Bärtås and Fredrik Ekman, Cabinet magazine, Issue 2 Mapping Conversations Spring 2001.
[20] Ibid.
[21] Ibid.
[22] ‘Two-Way Transdermal Communication with the Brain,’ Delgado, Lipponen, Weiss, del Pozo, Monteagudo, and McMahon, a co-operative publication of the Medical University of Madrid, Spain, and Yale University Medical School, 1975.
[23] Mass Control: Engineering Human Consciousness Jim Keith, IllumiNet Press, 1999. (p.99)
[24] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997. See also: (http://www.trufax.org/reports/2020.html)
[25] op. cit. Brzezinski (p.15) (Between Two Ages)

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

Technocracy XI: Social (SMART) Grid and “Cognitive Infiltration”

“A really efficient totalitarian state would be one in which the all-powerful executive of political bosses and their army of managers control a population of slaves who do not have to be coerced, because they love their servitude.”

Aldous Huxley, Brave New World


thSocial networking websites like Facebook, Twitter, Tumblr, Yahoo! and others have offered new ways to chat, make friends, speed-date and keep in touch with family wherever you are. It has revolutionized information in ways which we are only just beginning to understand. The networks have become such a normal part of our daily lives in such a short time that it is only recently that serious questions about privacy and surveillance have filtered through to the MSM. But ethical questions are being left behind as the Information Age surges ahead. Indeed, if you don’t have a Facebook account then you have already consigned yourself to the hinterlands of suspicion and abnormality. According to some, this may even be a red-flag for suspected terrorist or paedophile. Such is the power of social networking websites on society and the ridiculous assumptions now circulating. [1] $billion companies like Twitter and Facebook have become the largest database on the global population, representing a free and easy resource for intelligence agencies to data-mine. With over 900 million active users it is not difficult to see how useful data catchment could be.

Growing awareness that social networks are being used by intelligence agencies to monitor citizens’ activities prompted cyber-consumer advocate Electronic Frontier foundation (EFF) to file requests in October 2009 to provide records about federal guidelines on the use of social networking sites for investigative or data-gathering purposes. Among other issues related to surveillance as discussed previously, they sued the CIA, the US Department of Defence, Department of Justice and three other government agencies for allegedly refusing to release information on their involvement in social networks. The cases are on-going.

There are so many dubious aspects to Facebook aside from its intelligence connections and origins it is hard to know where to start. We will pinpoint a few however.

The company makes no secret of is its drive to know everything about its members. It wants to extract and mine as much the data from them as is humanely possible and then make it available to all kinds of interested parties. The implications of their drive to happily make your social life – including information you might not ordinarily reveal – fully integrated into the net experience is of course, never discussed. Facebook has been busily creating “Shadow Profiles” in a bid to extract even more information. Using various functions on the software interface which encourages users to share personal data of other users and non-users of Facebook such as mobile phone synchronization, search queries, friend invitations, email-provider imports and instant messaging means that even if you don’t use Facebook you may have a profile nonetheless. [2]

Since Facebook is such a fan of being “social by default” then it shouldn’t be concerned when the tables are turned. Since Facebook revealed in 2012 that more than 83 million Facebook accounts (8.7% of total users) were fake accounts, ongoing controversies with privacy issues, class action lawsuits and litigation as well as the virtual ownership of members’ profiles, it is hardly surprising this was reflected in the stock value which dropped below $20 in the same year. [3]


th“You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”

– Facebook Terms of Service. (It has since been updated yet protests groups claim little has changed).


When independent software developer Pete Warden crawled all the data that Facebook’s privacy settings changes had made public, the company sued him. This occurred before the Open Graph API system which means they were planning to make the data publicly available anyway. As Vice President of Engineering at Border Stylo Dan Yoder comments: “Their real agenda is pretty clear: they don’t want their membership to know how much data is really available,” stating further: “It’s one thing to talk to developers about how great all this sharing is going to be; quite another to actually see what that means in the form of files anyone can download and load into MatLab.” [4]

In 2010, a Canadian security researcher Ron Bowes created a specific crawler script which he then used to take information from Facebook’s open access directory. He managed to download 2.8Gb of personal details including credit card numbers, account names, profile URLs and contact details; names of those users’ friends, (even with hidden profiles) and more intimate photos of over 100 million Facebook users. This cache of private information gold was then dumped on P2P file-sharing service BitTorrent, which was subsequently downloaded by scores of major corporations many hundreds of times. The point was not the relative ease by which such data was “stolen,” though this is an important issue, it was the fact that the data is already publicly available, provided Facebook members have not chosen to hide their profile from search results. [5]

As of 2012, there are now a raft of members, celebrities, underwriters and advertisers all taking a cut of Facebook profits. On the management board is co-founder and CEO Mark Zuckerberg with the largest ownership percentage of an individual at 28% (he is worth $33.1Billion) with co-founders Eduardo Saverin, Dustin Moskovitz, Sean Parker taking between 6-4%.  Venture capital company Accel Partners, Russian internet firm Mail du Ru take 10% repsectively and former PayPal CEO and venture capitalist Peter Thiel 3%. Thiel sums up Facebook’s history of double-dealing and entrepreneurship very well.

mark-zuckerbergCEO Mark Zuckerberg

The first lump sum from his venture capital funding amounted to $500,000 – a tidy sum no doubt drawn from his £3bn hedge fund Clarium Capital Management and a venture capital fund called Founders Fund. Thiel is the Author of an anti-multicultural missive The Diversity Myth and on the board of VanguardPAC a radical internet-based Neo-Conservative pressure group that was apparently set up to attack MoveOn.org, a left-liberal pressure group website. VanguardPAC’s mission is to “reshape America and the globe” according to Neo-Conservative values – the type of values which are still carving up the Middle East. Thiel is certainly not the shy and retiring type and promotes a New World Technocracy laced with transhumanist and right-wing conservatism. The Guardian’s Tom Hodgkinson summarises Thiel’s curious mélange of fascist views: “… since the 17th century, certain enlightened thinkers have been taking the world away from the old-fashioned nature-bound life, and here he quotes Thomas Hobbes’ famous characterisation of life as ‘nasty, brutish and short’, and towards a new virtual world where we have conquered nature. Value now exists in imaginary things.” [6]

pthiel1

Peter Thiel: Technocratic Neo-Conservative

From where did Theil obtain his inspiration? Stanford’s University’s René Girard and his mimetic theory that states all cultures and ancient societies were built on the victimisation and an eventual sacrifice of the innocent, even though they believed they were guilty. Mythology was used to legitimise and rationalise the fact that society was founded on violence. If Girard believes that people are sheep and will follow the one strongest in the herd then according to Hodgkinson:

“The theory would also seem to be proved correct in the case of Thiel’s virtual worlds: the desired object is irrelevant; all you need to know is that human beings will tend to move in flocks. Hence financial bubbles. Hence the enormous popularity of Facebook. Girard is a regular at Thiel’s intellectual soirees. What you don’t hear about in Thiel’s philosophy, by the way, are old-fashioned real-world concepts such as art, beauty, love, pleasure and truth.” [7]

Perhaps this is something that may be said for much of the neo-feudalist collectives currently infiltrating our social systems?

Consider the other board member of Facebook, Jim Breyer a partner in the venture capital firm Accel Partners who put $12.7m into Facebook in April 2005:

“…. On the board of such US giants as Wal-Mart and Marvel Entertainment, he is also a former chairman of the National Venture Capital Association (NVCA). Now these are the people who are really making things happen in America, because they invest in the new young talent, the Zuckerbergs and the like. Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which “identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions”. [8] [Emphasis mine]

With significant lobbying costs totalling over $41,000 in just one quarter of 2010 the focus of their expenditure was primarily intelligence agencies such as the Office of the Director of National Intelligence (DNI) and the Defence Intelligence Agency (DIA). It was the only internet company to do so out of Google, Amazon, eBay, Microsoft, Yahoo and Apple. The DNI is an umbrella office founded in the wake of 9/11 synthesizing intelligence from 17 agencies (including the CIA) and advises the President on privacy and federal cyber-security policy.

Which begs the question: Is Facebook lobbying merely to keep their operations free from interference for their Intel handlers?

Meanwhile, Facebook, Blogs, newspapers, radio TV channels, and internet chat rooms are poured over and monitored by the Open Source Centre or “vengeful librarians” – even the constant “tweets” from the Twitter network reaching over 5 million per day. Information is gathered by an army of analysts to find the low-down on the emotional level of a certain city demographic or whether a country is ready to be invaded or …”Democratised.”

facebooklogin1


 “Facebook is not your friend, it is a surveillance engine.”

– Richard Stallman, software freedom activist


It is now common knowledge that The U.S. Department of Homeland Security’s command centre monitors blogs, forums newsgroups and message boards on a daily basis. Scores of popular websites, including Twitter, Facebook, WikiLeaks, Hulu, and many alternative and left-leaning news sites also come under the umbrella of US surveillance.

Among the many examples that the Obama Administration has provided and which go above and the beyond the Neo-Conservative crimes of the Bush-Cheney cabal is President Obama’s regulatory Czar and legal scholar Cass Sunstein. Just before his appointment as Administrator of the White House Office of Information and Regulatory Affairs, this gentleman managed to add to the grand façade that is American democracy by writing a 30-page academic paper co-authored with Adrian Vermule entitled: “Conspiracy Theories.” In the paper he suggested the government should “infiltrate” social network websites, chat rooms and message boards. This “cognitive infiltration,” according to Sunstein, should be used to enforce a U.S. government ban on “conspiracy theorizing.” This ban would be imposed on such heresies as anti-anthropocentric global warming; the World Trade Centre attacks on 911 were an inside job; Al-Qaeda is a US government-created mercenary unit for hire and a range of other proven conspiracy facts, most of which feature on this blog. By “conspiracy theory” Sunstein defines it as “an effort to explain some event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Heaven forbid we should try to expose that …

And of course, Sunstein implies that that there are no conspiracies operating in government, banking and corporate activities and if you are one of the mentally deranged few that believe so, then medical help and a good psychologist is the only path open to you. It seems everyone is a potential extremist if you are aren’t giving the government a virtual back-rub. He further suggests: ““… a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity.” [9]

Cass SunsteinCass Sunstein 2011, (AP Photo)

Sunstein’s objective is to raise: “… doubts about their factual premises, causal logic or implications for political action,” which places a whole new angle on some of many trolls and trouble-makers who periodically appear on website forums to sow seeds of discontent in ways which follow distinct patterns of emotional programming indicative of paid disinformation agents. Indeed, PSYOPS targeting the web have been in operation for several years, possibly since the internet’s inception in some form or another.  Sunstein’s suggestions are merely an updating of the US Dept. Defence’s Information Operations Road Map of the future. [10]

To make sure such a future – and the mass mind – is firmly where it should be DARPA means to keep biometrics and the internet connected to the same port (which, one day soon, may be located at the back of our skulls). Pentagon scientists are helpfully creating a program to use biometrics as a platform for creating a “cognitive fingerprint” which would dispense with all those passwords building up in our little black books. Which means, according to their website: “… validating any potential new biometrics with empirical tests to ensure they would be effective in large scale deployments.” Named the Active Authorisation Program (AAP) it offers deep analysis of the user’s cognitive processes and thus their online behaviour in the hope of inventing new forms of biometrics so that your identity can be ascertained.

Parallel to this grateful assistance in making our lives so much more efficient and safe, online tech journal Security Ledger reported in April 2013 on one time hacker and DARPA’s cyber chief Peiter “Mudge” Zatko heading to Google Inc. Joining Google’s Motorola Mobility’s Advanced Technology & Projects (ATAP) group, it has a mission to deliver “breakthrough innovations to the company’s product line on seemingly impossible short time-frames.” While Microsoft continues to track users of the Windows phones which have a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and really any of the big internet companies. Google knows the password of every Android device (phone or tablet) which has ever logged on to a particular Wi-Fi network. (Android accounts for 79 per cent of phones shipped worldwide).

Business Insider’s article of August 14th, 2013 alerted us to the fact that if you are one of 400 million persons who chose Gmail then you can also expect no privacy at all. In a class action complaint of 2013 Google responded by claiming “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” So, be warned, even though it is unlikely you’ll be able to avoid Google even if you wanted to.

It seems Google and DARPA are courting each other for good reason.

 


Notes

[1] Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’ Daily Mail, 6 August 2012.
[2] ‘Facebook Is Building Shadow Profiles of Non-Users’ October 18 2011, http://www.slashdot.org
[3] “Facebook: About 83 million accounts are fake”. USA Today. August 3, 2012.
[4] ‘Top Ten Reasons You Should Quit Facebook’ by Dan Yoder http://www.gizmodo.com May 3 2010.
[5] ‘How 100 million Facebook users ended up in a list on BitTorrent’ Jemima Kiss, The Guardian, 29 July 2010.
[6] ‘With friends like these …’ by Tom Hodgkinson, The Guardian May 2010.
[7] Ibid.
[8] Ibid.
[9] ‘Conspiracy Theories’ by Cass R. Sunstein (Harvard Law School) and Adrian Vermeule (Harvard Law School) January 15, 2008, Harvard Public Law Working Paper No. 08-03, U of Chicago, Public Law Working Paper No. 199 U of Chicago Law & Economics, Olin Working Paper No. 387. [ During my own experience in working for several alternative news websites there was no question that persistent problems from site “trolls” on the relevant forums fell into this category. Some exhibited high knowledge on certain specialist subjects and exhibited a standard formula for contouring ideas and concepts which included the very same “cognitive infiltration” tactics cited by Sunstein and often in a highly elaborate form. Once “outed” they were gone but often the damage was already done].
[10] As part of the “Information Dominance” strategy of the Pentagon, ‘The Information Operation Road Map’ was a paper commissioned in 2003 and declassified in 2006. It was personally approved by the then Secretary of Defence Donald Rumsfeld. It included details of major PSYOPS disinformation campaigns to place false stories in newspapers and the internet as well as the kind of beginings of “cognitive infiltration” that Sunstein was so keen to see materialise.

Save

Technocracy II: Big Brother in your Bag and the Auto-Matrix

“Society is progressively moving towards a socio-technical ecosystem in which the physical and virtual dimensions of life are more and more intertwined and where people interaction, more often than not, takes place with or is mediated by machines.

Our goal is to move towards hybrid systems where people and machines tightly work together to build a smarter society. We envision a new generation of Collective Adaptive Systems where humans and machines synergically complement each other and operate collectively to achieve their, possibly conflicting, goals, but which also exhibit an emergent behaviour that is in line with their designers’ objectives.”

http://www.smart-society-project.eu/


Are you ready to “exhibit an emergent behaviour that is in line with their designers’ objectives”?

The more your behaviour mimics artificial intelligent systems the easier it will be for us all to conform to the required “synergy” needed for a “hybrid society.” Or if you prefer, our inevitable embrace of “hybrid and diversity-aware collective adaptive systems.”

This is where authoritarian geeks take over the world starting with endless SMART word-salad.

At this point something like this may be going through your mind:

Oh, stop being such a kill-joy, doom and gloom stick-in-the-mud and get with the SMART picture. Don’t you know it’s inevitable? What do you want us to do? Stop using technology? You’re just a Luddite afraid of change.

Well, let’s see how you feel as we proceed.

SMART society is not a dream but an inevitable symptom of the technocratic arm of the Establishment. A large proportion of the public consciousness and the purse-strings of business enterprise are behind the philosophy of SMART. The rest of us are following along just as we did with credit cards, mobile phones and every other technological innovation. The off-the-shelf opinion of frustration above is fairly standard and quite understandable given our circumstances. Why would anyone doubt the benefits of SMART visions, especially when the younger generation have pretty much known nothing else? Why would you want to pay attention to the dark underside of your i-pad sensibilities?

That sums up the whole trajectory of wilful blindness and hubris which has characterised the rise and fall of civilisations for millennia. There’s always a love affair with the God of the moment that leads to the crash and burn. But let’s continue observing a bit more of that underside since its actually rather … huge.

In 2012, the vulnerability of SMART TVs was brought into relief when it was proven that hackers could easily compromise, in this case, various parts of Samsung’s new TVs which would allow them to: “… remotely turn on the TVs’ built-in cameras without leaving any trace of it on the screen.” A hacker (government or otherwise) had the capability to watch you while you watched your favourite programme or internet web page. Hackers could also re-routed users to a convenient website in order to obtain their bank account data or other private information. The company apparently fixed the flaws with a worrying proviso: “We know that the way we were able to do this has been fixed; it doesn’t mean that there aren’t other ways that could be discovered in the future.”orwellsmarttvSMART TV c/o of Samsung | © infrakshun

Similarly, By 2015, nothing much has improved. Indeed, it’s got worse. Televisions can actively monitor what users say and transmit that information to third parties. Samsung attempted to put these grievances to rest by saying that the latest models are all encrypted, unlike earlier versions. Unfortunately, that was a lie. Reporters from online journal Extreme Tech contacted security researchers at Pentest Partners to retrieve information regarding the brand and model of the TV which had undergone these tests:

The initial model was a UE46ES8000, a top-end TV for its day, but now two years old. This time around, the team tested a UE55HU7500. This screen currently retails for £1,569.86 in the UK according to Amazon. Reviews date from June 2014 through Jan 2015 and the unit is widely available — it is, in other words, a “current” Samsung TV by any reasonable sense of the word.

The team tested the new television in the same manner as the old and found that data is still being transferred in plaintext.

Since SMART technology means that most home-based gadgets and business networks are connected to the internet in some way, technology experts and hackers have cautioned that it is highly likely that the idea of network security is fast becoming a misnomer as the principle of the flaws in the Samsung TVs can be replicated across a broad spectrum of internet-connected platforms. In summary: Devices are unsecured.

Moreover, as one researcher observes:

Many of these unsecured devices can be found with a simple search. In fact, there’s a search engine devoted just to scouring the so-called “Internet of things” called Shadon Playing around with it is an eye-opener. For example, in late July a writer for Forbes discovered an entire home automation product line with Internet-connected features that could be set up without a default password, and were visible to search engines. This would enable a hacker to search and find these systems on the Net, then access them at will. To prove her point, Kashmir Hill breached the home automation systems of random strangers, called them on the phone and demonstrated the vulnerability by turning their lights on and off. [1]

Before we get on to how far the rabbit hole of integration between SMART enthusiasm, monitoring and surveillance goes, it may be worthwhile considering how corporate UK and US are data-mining the minds of Joe and Jeanette public.

Remember your useful supermarket “loyalty” card lurking in your wallet or at the bottom of your handbag? This little critter provides enormous amounts of information about your shopping habits which is retained in a large marketing database and shared by a multitude of interested parties – from advertisers to law enforcement. Your transactions, the frequency of purchases and your preferences are all used to create a customer profile that is mapped into various demographic and psychological analyses very useful for sales and marketing strategies. You are walking psychological real estate for the corporate world and they just love to extract as much as they can from your sub prime mind.

Take another British wallet-hugger – the Nectar card. This is a ubiquitous piece of plastic which is used by over 10 million people in the United Kingdom. Information is compiled from a range of shops visited and offers a nice readout along with a pretty graph of a cardholder’s shopping habits. Though Nectar insists the information is strictly for customers only, data is increasingly flying about the consumer and corporate world, regardless.

loyalty-cards

Intrusion is a very profitable business. As we saw in the first posts about Official Culture, the constant and pervasive presence of advertising seeks to colonise any and all of the latest advances in information technology, from the internet to bill-board hoardings with literally no place to hide. For instance, CAT, PET, MRI brain imaging scanners have fast made the transition from clinical tools to advertisers and marketing weaponry. When it was known that certain regions of the brain “light up” when a person thinks of a pleasurable experience or the solving of a puzzle this means that such knowledge could be applied to advertising. The new jargon speaks of “neuromarketing” or “neuroeconomics” as the next field of mind colonisation. SMART eh?

According to Technology Advice magazine from October 15th 2013, Japan was taking the lead in so called “SMART shelves,” which began appearing in some US grocery stores at the start of 2015. Run by Mondelez International, the shelves operate at the checkout line using various tech tools to identify the sex and age of the shoppers. From the information stored a custom made advert is then  displayed according to that particular person’s demographic. Marketing data will also be collected from how long the advert was watched. If a shopper picks up the item information will be relayed from weight sensors to indicate a potential purchase. Coupons and store discounts can be displayed in order to encourage a sale.

If you want to get the public used to something then the usual mode of “softening” for the future comes via Hollywood and glamour. Otherwise known as “predictive programming” this was used to great effect by butchering Philip K. Dick’s book and making it into Minority Report (2002) starring Tom Cruise and directed by Steven Spielberg. It was here that concept of “Pre-Crime” and biometric surveillance was given a thorough airing.  In the shopping mall scene Cruise’s character is stopped in his tracks by an interactive advert which had been scanned by iris recognition technology. A voice shouts: “John Anderton, you could use a Guinness!” If that sounds too nightmarish to contemplate, most of that futuristic, pop-corn-munching entertainment has become reality in just under ten years. And now it’s all so … passé. The algorithmic software isolates the face, measures the features and extracts it from the scene. Once a match has been found data is flooded in to complete the profile. Think CSI and various other glamorous TV shows that feature all kinds of whizz-bang gadgetry in the hunt for criminals.

Facial recognition and Iris scanning technology is already present at airports and passport control in the UK. Advanced versions are being rolled out at a terminal in Love Field, Dallas, Texas consisting of “… 500 high-definition security cameras sharp enough to read an auto license plate or a logo on a shirt. The International Air Transport Association, or IATA, which represents airlines globally, calls it “the checkpoint of the future,” with the PR for the initiative going for the speed angle where passengers will move almost “non-stop” through security. Meanwhile, they “… would identify themselves not with driver’s licenses and paper boarding passes, but by scanning fingerprints or irises to prove they have an electronic ticket.” [2]

(Even Homeland Security has been beavering way since at least 2011 to apply this technology in defending the Fatherland. It seems logical that this is where the real action lies, namely, in bolstering law enforcement and the military-intelligence apparatus).

Along side “Intelligent” transport systems we have Intelligent digital billboards which have been the first in line for this advertising gold-rush, being fitted with cameras that can discern the gender and age group of passers-by who look at them. The idea is to tailor the messages to the onlooker in real time. Toyko has road tested a collection of billboards of varying size and at different locations. A spokesman for the project said: “The camera can distinguish a person’s sex and approximate age, even if the person only walks by in front of the display, at least if he or she looks at the screen for a second.” And the data stored will obviously stay in responsible hands, advertisers being extremely responsible people, as we know… [3]

Germany has also been getting in on the act with a intelligent billboard designed for dog owners using “hot technology of location-based social networking,” to sell Granata Pet brand dog food. “As owners pass by with their dogs they can stop in front of it, use their mobile phones to check in on Foursquare and as soon as they do, a dog treat will pop out of the billboard and the dog – or I guess owner – can sample the product before deciding to buy it.” [4]

Or course, targeting your bemused pooch is small fry.

Ad agency BBDO (also from Germany) and broadcaster Sky Deutschland have joined forces to target work weary passengers on commuter trains. When they rest their heads against a window instead of the promise of pleasant dreams they will hear messages beamed into the brains. The advertising platform uses a small box attached to the surface of the window which sends out vibrations which the brain translates into sound. Called “bone conduction” technology, it promises to be used across a range of info-tainment services.

Less invasive is the introduction of “Smell-vertising” which had its first test run by food company McCain and its frozen jacket potatoes. A display of 3D fibreglass models of baked potatoes were installed at bus stops in London, York, Glasgow, Manchester and Nottingham which released an aroma of oven-baked potato when a button is pressed.

According to a report published in 2011 by the Centre for Future Studies, 3D outdoor ads that can recognise people’s moods and were tested on the streets in 2012. Called “gladadvertising,” the software picks up on facial expressions associated with certain moods and once it has analysed what the victim is feeling, advertisers move in for the kill, delivering the programmed advert straight into the frontal lobe. The study also concluded that the accessing of personal data from social networks through your mobile phone could be combined with “holograms, mood lighting and smells.” [5] This form of “targeted marketing or “dynamic advertising” has some of us – though clearly not enough – concerned.

personalisedlipsThe Washington-based privacy advocate organisation the Electronic Privacy Information Centre (EPIC) warned that: “… this type of surveillance encroaches on civil liberties,” adding that: “Such face, voice and behaviour technology could be a means of tracking individuals on a mass level across their entire lives.” The organisation believes that the demands from advertisers and security-minded governments have made technologies: “… so increasingly SMART and intrusive that they now resemble something out of science fiction.”

As we become assaulted by smells, images and voices in our heads, these will be increasingly tailored towards the particular demographic in which we reside. And depending how much of our individual data has become available – probably without our consent. Accordingly, even the gender focus can become another marketing dollar. Initially however, it was a charity which was chosen to launch a face recognition billboard in London’s Oxford St. to highlight gender discrimination. (Nothing like blending social conscience and marketing – everyone’s a winner.) On February 23rd 2012, The Independent  newspaper reported on an advert that “plays only to women.” The first of its kind, the technology: “… works by scanning faces before measuring the distance between the viewer’s eyes, width of the nose, length of jaw line and shape of cheekbone to compare the data and estimate their gender.”

Back in November 12, 2008, an Agence France Press ran the report: ‘Firms scan brain waves to improve ads in Japan.’ US Market research company Neilsen and its partner Neurofocus obligingly offered a brain-scanning “service” for the Japanese marketing industry. The technology scans brains waves and the physical features of potential customers in order to accurately study the effects of advertising messages and their products. Attention level, message retention level and emotional involvement of customers is measured the data of which is collected and analysed.

Meanwhile, Londoners can’t even take out their rubbish without being targeted by the ad-men and their SMART toys. Before the Olympics of 2012, Renew, a company who manufactures recycling bins installed over 100, 12 of which had digital tracking devices so that customers were effectively stalked in order to roll out personal advertising in the “real world.” As ludicrous as it may sound – yet perhaps fitting given the product – the little digital screens display Youtube updates, news and of course, targeted ads. According to Sam Shead of online magazine Techworld,an experiment to place tracking devices in recycling bins in order to spy on Londoner’s smartphones was well underway. The report explained how it worked: The 12 bins with the technology record a unique identification number, known as a MAC address, for mobile devices in the vicinity that have Wi-Fi switched on. This enables the Renew bins to monitor data including the ‘movement, type, direction, and speed of unique devices’”. The experiment was terminated by early 2013. Don’t worry there are still the London SMART bins.[6] (See below)

Smart Cities: BinsDan Kitwood/Getty Images Europe

“In London’s Square Mile there are already more than 100 “smart bins”. As well as being a receptacle for recycling, they feature digital screens broadcasting a live channel of breaking headline news and live traffic information. They can also communicate directly with mobile devices through Wi-Fi and Bluetooth technology.” Source: ‘Cities get smart: urban innovation.


 “Identity will become embedded in devices” and “propagated into all applications.”


The appetite for data from advertisers and marketers is as insatiable as the NSA’s. The objective is to create a rich data base for “predictive analytics” where a precise knowledge of each individual’s “event” (places they have dined, visited etc.) and who has purchased online in the past can be targeted with advertising which knows your behaviour and personal preferences inside out. The report goes on to say: “In tests occurring between 21-24 May and 2-9 June, over four million events were observed, with over 530,000 unique devices monitored.”

Advertisers may enjoy the innovation but the SMART technology they are riding and driving serves another purpose above and beyond selling products. The software and the desires behind it will always advance and so too the more macro-social SMART planning that is on the pathocratic excel sheet; something advertisers will obviously not have considered and even if the awareness was present, probably wouldn’t care. As Bruce Schneier, chief security technology officer of BT points out: “Once the cameras are installed and operational, once they’re networked to central computers, then it’s a simple matter of upgrading the software,” … “And if they can do more — if they can provide more ‘value’ to the advertisers — then of course they will. To think otherwise is simply naïve.” [7]

The Centre for Future Studies produced a recent summary of key trends in social media that showed how advertising and marketing will dove-tail perfectly into the Technocrats’ dream of an automated society or, as the report states, thanks to Facebook, Twitter etc.: “Identity will become embedded in devices” and “propagated into all applications.” The SMART systems will allow us to bypass these sites and will “seamlessly access your profile.” They further suggest that once social identity has become embedded in our devices, online sharing will become fused to media life, where DVDs TV, i-Pod music and internet “sync preferences to preferred identity.”

Back to The Internet of Things (IOT) and uploading and integrating our identity with SMART world until they are fully synonymous.

As the embedding continues and the reliance and surveillance that goes with it, our location will be omnipresent and available: “Location aware devices will employ pre-emptive use of location to alert the user to things or people nearby that may be of interest.” – Along with those listening in and observing. Marketers will start salivating here when they can offer a discount at a nearby MacDonald’s store: Hey Dude! There’s a Double Royale Burger with extra fries half price deal on 5th Avenue if you hurry! Just Lovin’ it!

mcdonaldspersonalisedThis “dual use” technology allows a double agenda to come into play. Once again, we have the Brave New (SMART) world lurking in perceived innocence and purity just behind the scenes approaching full integration with satellite and terrestrial appliances:

“SMART devices and web apps will automatically check-in and post updates: Identity aware devices, empowered by embeddable RFID tags, (Radio Frequency Identification Chip) will allow this type of technology to spread beyond the mobile phone. A SMART coffee thermos, for example, could enable auto-check ins and send coupons to your phone as you enter your favourite coffee shop.” [8]

And entering our favourite coffee shop with your favourite thermos may be the least of our worries if Radio-Frequency Identification (RFID) does indeed spread beyond the mobile phone. Like your arm, for example. In the technocratic future, entering the shop by choice would fast become a luxury. It is at precisely this juncture, where SMART technologies and consumerism suggest how to live your life and where true choices becomes somewhat progressively ill-defined. It’s already too much. And such a level of invasive consumerism blended with the surveillance state can only work if one’s brain has been suitably primed to function in a similar fashion to a small bucket of silica.

What of the workforce in the face of these rapid advances?

A recent report from the Oxford Martin Programme on the Impacts of Future Technology based at Oxford University suggests that 45 per cent of the jobs in the United States will be automated within the next twenty years. Using a standard statistical modelling method, data was accrued from more than 700 jobs on ONet, an online career network. The skills, education and many other variables were all taken into account. With already massive unemployment problems and part-time workers scratching around for jobs automation will force more and more people into the mega-cities and into a managed system – for their own welfare.

Echoing Jeremy Rifikin’s seminal book: The End of Work: The Decline of the Global Labor Force and the Dawn of the Post-Market Era (1995) the professor explored the clear delineation between a disenfranchised global workforce and an Information Elite. The results yielded a change that would likely happen in two stages:

1) Computers replacing people. Vulnerable fields like transportation/logistics, production, construction, services, sales and administration will all be affected causing a massive increase in the unemployed. The pace of change will then slow and progress in fits and starts according to the particular field.

2) Artificial Intelligence. As the sophistication of computerisation continues to grow, a second tier of work will be under threat including the sciences, management, engineering, and the arts.

Obvious maybe, but in 1995 it was hard to imagine. Manufacturing is in a bad way having shed 6 million jobs since 2000 and as production soars ahead despite trillions of debt in both the US and Europe. The robot revolution and the SMART visions will only continue the erosion of mass employment. The speed at which this will happen, especially regarding stage two depends on access to cheap labour, resources and social, geo-political and environmental instability. It could be much quicker or considerably longer but the direction is clear.

factoryautomation© infrakshun


“The new law of the economic jungle is this: either write the software that eats the world, or be eaten.”


Professor Erik Brynjolfsson from MIT Sloan School of Management, and his co-author Andrew McAfee have come to much the same conclusions. They believe most of the unemployment stagnation is due to the inexorable rise of robotics and factory automation. According to their research the future is very bleak for a much wider range of jobs, from law, financial services, education, and medicine. More controversially for some, they show that there has been a divergence or “great decoupling” beginning in 2000 – 2011 where economic growth is indicated but with no parallel increase in job creation. Productivity continues to rise as does the long-term unemployed. While Brynjolfsson believes technology does make nations wealthier overall, there is an undeniable paradox at work. He observes: “Productivity is at record levels, innovation has never been faster, and yet at the same time, we have a falling median income and we have fewer jobs. People are falling behind because technology is advancing so fast and our skills and organizations aren’t keeping up.” [9]

Earlier in 2013 Israeli company Rethink Robotics illustrated what will surely become the norm before very long. “Baxter” a foot high service robot retailing at $22,000 can take on most menial tasks from serving coffee, to fetching the post. Software applications are swiftly being developed to make sure that such robots will be able to take ever more sophisticated jobs from assembly line work in factories to flipping burgers in McDonalds. According to a Fiscal Times report Baxter is being overtaken: “MIT already has a BakeBot that can read recipes, whip together cookie dough and place it in the oven. The University of California at Berkeley has a robot that can do laundry and fold T-shirts. Robot servers have started waiting tables at restaurants in Japan, South Korea, China and Thailand …” [10]  Indeed, US agriculture which has already undergone massive monopolisation by five major agribusiness companies is taking the next step in the robotics revolution in keeping with a future collective herding of humanity. Over in California the Lettuce Bot is one such example, where the machines  “… can ‘thin’ a field of lettuce in the time it takes about 20 workers to do the job by hand.” [11]

Though a new sector of employment is emerging comprising Robot IT and maintenance personnel, security developers, designers and salespeople for robot accessories, software, and apps, it will not ameliorate the millions of blue collar workers whose talents and working wage is outside specialist technology. (This does not even include the rising immigration problem from nations ransacked by western backed regime change).  As automated vehicles begin to replace truck drivers and better software obviates the need for lawyers, bartenders and burger flippers and even some medical care workers then the divide between the rich and the poor will become a case of who has access to technology and who does not; who is living on the edges of society and who lives at its core. As one tech journalist Jon Evans commented: “The new law of the economic jungle is this: either write the software that eats the world, or be eaten.”

Author and technology journalist Nicolas Carr has written about the dark side of the approaching revolution in automation. Carr opines that in putting our knowledge in the hands of machines, we are inadvertently – and ironically – signing away our greatest potential.  In his 2010 book: The Shallows: How the internet is changing the way we think, read and remember he provides an overview of what automation is doing to a number of sectors in society and how they are altering the nature of work. For instance, air accidents are revealed to be have been caused by pilot error, which in turn, was caused by overly-sophisticated software which has by-passed normal human reaction and good old fashioned intuition working in unison with years of experience. Now they are essentially computer operators.

Aviation and automation experts have found that what the accidents had in common (when human error was a factor) was that: “Overuse of automation erodes pilots’ expertise and dulls their reflexes,” which leads “a de-skilling of the crew.” And since pilots hold the controls on a typical flight for only three minutes such is the state of software sophistication it means that the problem isn’t likely to get better. Unless that is, you get rid of pilots all together. What will this do to the knowledge of flying? Will flying be yet another skill that becomes the province of the computer and will go much the same way as the art of hand-writing? The stakes are a little higher with the former however… 

The overuse of automation may be putting lives at risk. Faith in such technology could be misplaced if we compare it to the beliefs of the Industrial Revolution from which most of these ideas derive. The scope and magnitude of automated tasks has taken on an entirely different mandate. Software is increasingly rendering the presence of humans unnecessary even for intellectual tasks which until recently were considered strictly human-based. As our focus narrows, we are moving into a technocratic army of workers who do nothing more than monitor and input data rather than truly engage in creative activities which require the friction of challenge and stimulation. Routine will inevitably supplant the nourishing of talent even more than the mechanical assembly line.

Automation2

Automation: the future of manufacturing. Where do all the people go?

The cause of this drive to automate our lives is based on a trenchant fallacy of a machine-based future that will naturally provide for us all and cater for our every mental, emotional and even spiritual needs. As Carr suggests, this is merely another “substitution myth” which fails to address core issues at the heart of change and adaptation. He further states: “A labor-saving device doesn’t just provide a substitute for some isolated component of a job or other activity. It alters the character of the entire task, including the roles, attitudes, and skills of the people taking part.” It is this mass alteration combined with power-hungry individuals presently infesting our social systems which will spell disaster for the human condition if we don’t – somehow – apply the brakes.

Meantime, this will inevitably lead to what psychologists have called complacency and bias leading to poor performance. A false sense of security will descend which over time, leads to an erosion of our levels of attention and awareness. As our trust and faith in automated systems increases so too our hard talents and instincts atrophy, where other informational sources become secondary. This does not absolve us from ignoring incorrect or subtle mistakes in computational data however and a vicious circle is enacted.

But there is also a deeper problem as Carr explains:

Automation turns us from actors into observers. Instead of manipulating the yoke, we watch the screen. That shift may make our lives easier, but it can also inhibit the development of expertise. Since the late 1970s, psychologists have been documenting a phenomenon called the “generation effect.” It was first observed in studies of vocabulary, which revealed that people remember words much better when they actively call them to mind—when they generate them—than when they simply read them. The effect, it has since become clear, influences learning in many different circumstances. When you engage actively in a task, you set off intricate mental processes that allow you to retain more knowledge. You learn more and remember more. When you repeat the same task over a long period, your brain constructs specialized neural circuits dedicated to the activity. It assembles a rich store of information and organizes that knowledge in a way that allows you to tap into it instantaneously. Whether it’s Serena Williams on a tennis court or Magnus Carlsen at a chessboard, an expert can spot patterns, evaluate signals, and react to changing circumstances with speed and precision that can seem uncanny. What looks like instinct is hard-won skill, skill that requires exactly the kind of struggle that modern software seeks to alleviate.

Translating information into applied knowledge is fast becoming an obstacle to achieving not only a place in society but a deeper sense of fulfilment. With an already growing malaise of narcissism afflicting our present generations this does not bode well for the coming technocratic age. In our enthusiasm to replace pilots with programs and suitable algorithms so that diagnoses can take doctors out of the equation entirely the vacuum to which we are all being drawn is based on a cure that is nothing more than total automation which is by definition a technocracy. How on earth do we prevent our distinctly unique talents disappearing as rapidly as technology has arisen? As a consequence, it has comes down to a question of existential meaning. Carr asks: “Does our essence still lie in what we know, or are we now content to be defined by what we want? If we don’t grapple with that question ourselves, our gadgets will be happy to answer it for us.” It doesn’t matter from what cultural origins we derive our sense of meaning and place in the world, the eternal constant is that “knowing demands doing.” [12]

If we embrace the riptide of total automation where the notion of personal vocation is becoming refined and narrowed into software programs in the name of efficiency and ease, then our definition of who we are will be dangerously tied up with the instantaneous result – at the expense of the journey. What we may be losing in return for this new Official Culture and its addictive race for results will only be known when we begin to wonder what it was like to live without the screen. Creativity, meaning and a real world connection may be difficult to claw back when we have become a mirror of the machines we seem to covet.

But the blind drive to a SMART society and automation isn’t the only change that is pressing down on human consciousness. The urge to actually merge our bodies with machines by allowing incremental integration is already taking place.

 


Notes
[1] ‘In 21st century America, Samsung TV watches YOU!’ chron.com, August 5, 2013.
[2] ”Checkpoint of the future’ takes shape at Texas airport’ USA Today June 21, 2012.
[3] ‘Tokyo’s intelligent digital billboards can tell gender, age of passerby’ by Andrew Nusca, http://www.smartplanet.com, 15 Jul 2010.
[4] ‘Intelligent Billboard gives you dog treats: truly the future is here.’ By Anna Leach, March 30 2011. http://www.shinyshiny.tv.com.
[5] ‘Emotion Recognition Software Will Tailor Digital Out-of-Home Advertising Messages to a Person’s Mood’ March 3 2011, http://www.screenmediadaily.com
[6] ‘Tracking devices in recycling bins spy on Londoner’s smartphones’ By Sam Shead Tech World | Aug 10, 2013.
[7] ‘Big Brother is watching you shop’ By Michael Fitzpatrick, BBC News, October 2, 2009.
[8] Insights – centreforfuturestudies strategic futures consultancy, 21 September 2010, http://www.futurestudies.co.uk/files/Centrepercent20forpercent20Futurepercent20Studies/INSIGHTpercent20Socialpercent20Media.pdf

[9] ‘How Technology Is Destroying Jobs’ By David Rotman MIT Tech Review June 2013.
[10]’The Robot Reality: Service Jobs are Next to Go’ By Blaire Briody, Fiscal Times March 26, 2013.
[11]‘Robots revolutionize farming ease labor’ Phys.org July 2013.
[12] ‘All Can Be Lost: The Risk of Putting Our Knowledge in the Hands of Machines’ By Nicolas Carr, The Atlantic Monthly, Oct.23rd 2013.

Technocracy I

By M.K. Styllinski

“Technopoly is a state of culture. It is also a state of mind. It consists in the deification of technology, which means that the culture seeks its authorization in technology, finds its satisfactions in technology, and takes its orders from technology. This requires the development of a new kind of social order, and of necessity leads to the rapid dissolution of much that is associated with traditional beliefs.”

– Neil Postman


Under the International Rice Research Institute (IRRI) heavily funded by the Rockefeller Foundation we see the centralisation of food under agribusiness merging with SMART society. Technology is the key to delivering a world of plenty according to these scientists and financial backers. On the website we read: “The Rockefeller Foundation envisions a world with SMART Globalisation – a world in which globalisation’s benefits are more widely shared and social, economic, health, and environmental challenges are more easily weathered.” Recall too, our exploration into the scare-tactics of global warming, the implementation of UN Agenda 21 and Sustainable Development (SD) all of which is hijacking genuine concern for our planet in order to use it to advance a New World Control System, by stealth. On the one hand, we have overt geo-political deception forcing chaos into being upon which a Hegelian solution for that post-war (post-catastrophe?) world can be laid. On the other hand, the requisite, centralised “New International Order” is delivered as a “benign” ecological, socio-cultural and economic template incorporating urban, energy efficient and sustainable “human habitat” zones requiring a high-level population density.

2012-07-21 18.22.48© infrakshun

After great disasters, there are always great opportunities to create new institutions and infrastructure predicated on elite ideologies.  World War I and II were prime examples, and indeed partly initiated for this very purpose. Humanity’s spirit must be broken in order that such phases of a New Order are welcomed, albeit with inclusive-sounding labels for peace and prosperity. The aftermath of intense Earth changes and asymmetric warfare will provide the same opportunities for another phase in the Pathocratic encroachment over normal human beings. And what might we expect?

Think of it this way:

If the Pathocrats have their way, we will be carefully managed into SMART operated high-rises with uniform amenities and leisure parks, where metered energy consumption, automation and a digitisation will be encased in an overarching surveillance – for your own “protection.” Only the new technocratic gentry will inhabit lands deep in the countryside. For the rest of us it will be off limits, our movements strictly monitored. In accordance with New World Religion protocols and the New World Civil Servant Resolutions Nature will be protected as “sacred” and barred from the mass of humanity. These Mega-cities will provide for our every need … Provided that is, conformity and compliance remains paramount for the New Collective and the maintenance of a group consciousness duly cultivated, as envisoned by Zone Council Resolutions. This will ensure the efficiency of our SMART society, the most important precept in the New Age. Break consensus and community cracks. Serve the individual and promote the Self, SMART grid dysfunction and the potential for overall system failure is inevitable and thus a return to fragmentation and dissociation of the past. This cannot be permitted – for the good of the whole. Resistance is like an infection, before you know it, the whole grid would be infected.  As such, we must be treated like the historical virus that we are and protected from ourselves by the guiding hand of the priesthood. Otherwise, the potential despoiling of Mother Earth will occur. Accordingly, a vast number of protective measures have been put in place to maintain efficiency and inner happiness. We will want for nothing. To maintain optimum levels of sensate satisfaction, human habitats will have their own integrated “Malware” and “anti-virus” enforcement systems in place as envisioned and voted for by Neighbourhood, Zone Councils and Regional Elects – for the good of all. Community is all, group consciousness is all … Love live the New SMART Consensus.

You can probably continue the narrative with all kinds of creative allusions inspired by various books and Hollywood flicks. This is the real inverted totalitarianism that both Orwell and Huxley warned about and countless myths and oral traditions.

So, are the checks and balances in place to prevent such a future? Or is it just a silly Dystopian fantasy?

When SD and SMART systems are set against the strangle-hold that our power brokers still maintain currently manifesting as ubiquitous surveillance and the erosion of civil liberties, then questioning the direction this form of technology is taking  becomes an absolute imperative. For once we have passed a certain point in technological know-how, artificial intelligence will offer us no way to turn back without wholesale destruction.

Society is rapidly changing thorough technological innovation advancing in ways that challenge the imagination. The horizon is limitless as to how technology will be used. The important question to ask is: do we have any say in how technological knowledge is being applied in the present and thus how it will shape our future? As with most things in life, there are always positives and negatives to any new innovation on a mass scale,  but it remains to be seen which one will gain ascendance. As always, this is dependent on who holds the overall power of technology and its uses. So far, we have an appalling track record. As it stands, the advantages are set to provide unquestionable benefits in the medical field communications sectors. But what are the dangers of an over reliance on digital technology applied to all other sectors of society? Will it augment the path to true freedom or be its demise? Already there are serious questions being asked on a number of issues from health to civil liberties, artificial intelligence to cyber warfare, all of which we will explore.

chicagoillinoiswifi

As this silicon revolution continues to submerge us in an ocean of Wi-Fi waves there are signs that our intense reliance on SMART networks may not be the most expedient way to take humanity forward. Nonetheless, selling the idea of convenience and efficiency is proving extremely seductive. It also offers untold benefits to intelligence agencies, in particular the National Security Agency (NSA) to complete its mission to own information and predict behaviour of every individual in America and the globe.

The acronym “SMART” is the new mnemonic buzzword which is being used to describe a network of gadgets, utilities, services, weapons, energy systems and new forms of governance bound together in a sea of digital and Wi-Fi-based technology. Each letter in the acronym stands for a particular objective which can be loosely interpreted. They are typically defined as follows:

S = Specific / Significant

M = Measurable / Motivational

A = Attainable / Assignable

R = Relevant / Realistic

T = Time-bound / Time-Related

The technology promises a broad range of practical and philosophical ideas which are already re-shaping the very concept of communication, travel, agriculture, medicine and city infrastructure. SMART uses computerised systems which incorporate digital metering to monitor and control energy from power plants to appliances within the home.  Another acronym used to describe this technological structure of Web-connected appliances and in-home devices is the “Internet of things” (IOT). Although domestic appliances such as fridges, freezers, lighting and televisions fall under the IOT, it is the energy companies and infrastructure –  including transportation, health, oil, gas and alternative energy systems – which are being incorporated into a vast SMART grid awash with Wi-Fi technology that will connect to the internet and allow devices to “speak to each other.”

Many corporations such as AT&T, General Electric, are changing their present system of distribution, storage, administration and the very core of their manufacturing towards the IOT and SMART philosophy. For software companies such as Cisco, IBM, Siemens, Microsoft and Intel, this is a lucrative time. As a September 2013 article by online magazine Standard Digital entitled: ‘Tomorrow’s smart cities’ explained: “In Singapore, Stockholm and California, IBM is gathering traffic data and running it via algorithms to predict where a traffic jam will occur an hour before it has happened. Meanwhile in Rio (Brazil), it has built a NASA-style control room where banks of screens suck up data from sensors and cameras located around the city.” IBM has 2,500 smarter cities projects worldwide and is confident in financial future of redesigning cities. To that end it has trademarked the term “smarter cities”.

The article also quotes Anthony Townsend, director of the Institute of the Future and author of Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia. Townsend puts his finger on the pulse when he states: “Some people want to fine tune a city like you do a race car but they are leaving citizens out of the process…” And in relation to a China’s massive new city building projects and huge central control rooms, one of which is already operational in Rio, Brazil: “The control room in Rio was created by a progressive mayor but what if the bad guys get in? Are we creating capabilities that can be misused?” Constant attempts to try and get the UK public to adopt a bio-metric, National ID card have failed, though a foreign ID card for immigrants was unveiled in 2008 as a possible “softening up” exercise for a re-introduction of the scheme. This seems to be one branch in the creation of database state in the UK and abroad. When all the databases are indexed by what is known in the UK as the National Identity Register (NIR) it is then that our lives will be defined by our NIR number and a host of invasive surveillance which may come into play.

The UK organization NO2ID which campaigns against the Database State sees “Transformational Government” as not just a threat to our civil liberties but a whole way of life. Indeed they state: “… what is being transformed is not government but its power over you.” The reason for this increasing disquiet over State interference in the lives of British people is drawn from broad range of measures integral to the emerging SMART society.

NO2ID outlines just some of the UK government’s plans currently evolving:

  • ID interrogation centres, for passports and ID cards
  • ePassports that help collect data about your travel
  • International eBorders schemes that exchange Passenger Name Record information with foreign countries as well as collecting them
  • Recording of all car journeys, using Automatic Number Plate Recognition (ANPR)
  • ‘Entitlement cards’ as part of, or linked to the ID scheme, logging use of public services
  • Centralised medical records without privacy
  • Biometrics in schools — fingerprinting children as young as 4 or 5
  • ‘ContactPoint’, a database collecting sensitive information on every child
  • Fingerprinting in pubs and bars — landlords forced to monitor their patrons
  • A greatly expanded National DNA Database (NDNAD)
  • New police powers to check identity
  • Increasing Criminal Records Bureau (CRB) checks for employees and volunteers
  • Businesses under pressure to verify ID of staff and customers with the government  [1]

Neil Postman’s reference to a “Technopoly” as a state of culture is another consolidation of Official Culture. It is a description of an emerging Pathocracy with emphasis on the scientific technique underpinning the dominance of technology and its applications. When combining the  Surveillance State, and SMART society we fuse Technopoly and Pathocracy to form: Technocracy. a system of society according to which government is controlled by scientists, engineers, and other experts. It is a scientific dictatorship as discussed in ‘World State Policies III: The Scientific Technique’ and to which UN Agenda 21 and Sustainable Development is integrated.

city-metropolis-buildings-skyscrapers-city-road-lights

Howard Scott and M. King Hubbert founded the Technocracy movement in 1932 during the Great Depression and produced what is seen by many as the Bible of the movement: The Technocracy Study Course. Rather than the “price system” the design was based on the metrics of energy and considered apolitical. It was primarily a technological panacea for global economic problems based on energy production and distribution together with precise monitoring and measuring as the pillars of its potential success.

It was a techno-Marxist plan which included nationalising public utilities abandoning the gold standard (which the financial oligarchs loved) and suspending the stock exchange. Why would you need one when the new currency was mainframe of automation and “digital” currency?

The Technocracy Study Course reads like a strange amalgamation of bureaucratic fundamentalism grafted on to a engineer/mathematician/accountant’s world view of humans as binary energy units. (Perfect for the Lucis Trust’s New World [Civil] Servants). They outline their meter reading diagnosis for society in typically precise fashion:

  • “Register on a continuous 24 hour per day basis the total net conversion of energy.
  • “By means of the registration of energy converted and consumed, make possible a balanced load.
  • “Provide a continuous inven­tory of all production and consumption
  • “Provide a specific registration of the type, kind, etc., of all goods and services, where produced and where used.
  • “Provide specific registration of the consumption of each individual, plus a record and description of the individual.” [2]

Many younger online users attracted to hacktivism, spirituality and social networking have been taken in by the recent manifestation of technocracy in the very slickly produced and marketed Zeitgeist films and the affiliated Venus Project founded by Jasque Fresco. The first film included some excellent truths regarding the nature of the economic world in which we live, as well as an incisive deconstruction of government influence and false flag operations. But the second film entitled: “Addendum” revealed that it had some fatal flaws. Zeitgeist was designed to grab our attention and prime the not so discerning members of the public to accept another version of Elite control this time through systemic technology as saviour, where computers make key decisions. It is the same techno-Marxism that assumes everyone will be thoroughly happy with such a Brave New World of regimented, rule-based precision; where individuals become numbers integrated into a game theory mainframe of “efficiency.”

smart-city-concept

Source: DefenseForumIndia.com

Naturally, no mention is made of authoritarians and social dominators pre-disposed to the distortion and co-option of well-intentioned technocrats. To say that such a scenario is unrealistic and naïve seems obvious, not least the undesirability of such a sterile future. It is the same old approach to people management with the blessing of the Rockefeller class, all of whom have been extremely active in the “information dominance” brand of social engineering. When you know the awareness is changing the mass mind then you offer the World State scenario under a different guise and adapt good intentions accordingly.

The Zeitgeist Mission Statement gives us all we need to know:

“This ‘Resource-Based Economic Model’ is about taking a direct technical approach to social management as opposed to a monetary or even political one. It is about updating the workings of society to the most advanced and proven methods Science has to offer, leaving behind the damaging consequences and limiting inhibitions which are generated by our current system of monetary exchange, profits, corporations and other structural and motivational components.”

The term “Technocracy” in Zeitgeist terms, is really another way of referring to the “scientific technique” dipped in coating of trans-humanist fervour. Think eco-aware, engineering geek meets bank manager, meets human resource chief. Throw in a goatee and there you have it. It’s the same story different wardrobe.

In America, appealing to the new generations born in the digital world is a vital part of the social engineering project reaching its apotheosis of the Rockefeller Foundation. The GMO/agriculture research arm of IRRI calls it: “SMART Globalisation”, a corporatist-collectivist vision that sounds wonderfully benign on the face of it. It is the latest meme designed to channel human activity into local, national and global SMART systems from which our finances, health and autonomy would be under complete and automatic control. In other words, a Global SMART Grid. It is here that we see technocracy and neo-feudalism come together in virtual “harmony,” developed with the best of intentions at the lower end of awareness but guided by the worst from the top. The current crisis in the capitalist economic order is all part of the phase to replace the old world with this new vision. Let’s just recall that David Rockefeller has been a long-time admirer of communist China and the hybrid vision of the capitalist-collectivist philosophy.

a61paj5smao7

David Rockefeller and Mao’s deputy Zhou Enlai 1973.| The Rockefellers have been hard at work engineering this World State based on the Chinese model for many decades. For more information see Rockefeller Internationalism by William Banyan

Author Naomi Klein alerted us to the fact that Chinese authorities have taken SMART society to their hearts and created a “model city” of the future re-affirming the Rockefeller and Elite vision for the world. It only took 30 years, for Shenzen to be transformed from a barren wasteland to a SMART city of 21.4 million occupants who are living the “dream” and where 200,000 cameras currently monitor and survey the populace with over 2 million more planned. What this SMART Society provides is a police State testing ground comprising of “central planning, merciless repression and constant surveillance.” Fortune 500 technology companies are watching very closely indeed. So closely, in fact, that high-tech surveillance and censorship programs were provided by IBM, Honeywell, and GE people under the generic name of “Golden Shield,” and used as a test run for what will is envisaged for the US population (once it has been thoroughly broken by social and economic chaos that is…) [3]

Recall former US National Security State advisor under Carter and Obama head hunter Zbigniew Brzezinski and his 1968 book Between Two Ages: America’s Role in the Technetronic Era. It was a call to re-envision the technetronic era after a few abortive attempts during the 1930s depression. It was to be the inspiration and backbone to the formation of the Trilateral Commission and its support of the Tiger economies of Asia. It was no coincidence that the book was extraordinarily prescient. Brzezinski, like so many geo-political establishment intellectuals often broadcasts Elite visions under a predictive and softly critical narrative. The intent is to broadcast formulas to the faithful and engage a populist understanding of the principles and their future objectives. And by “populist” we mean not just the public but those who may be termed the worker bees in the hive mind of the global Establishment.  Between Two Ages served to ignite the fuse of a Technocracy, the seeds of which were planted in another era of economic depression and ready to download directly into our minds. Brzezinski writes: “In the technetronic society the trend would seem to be towards the aggregation of the individual support of millions of uncoordinated citizens, easily within the reach of magnetic and attractive personalities effectively exploiting the latest communications techniques to manipulate emotions and control reason.” [4]

between two agesWe are already immersed in the “ether” of radio, micro and now Wi-Fi waves * indicating that not only is this foundation for a Technocracy present, it is accelerating exponentially. For this growth to continue unabated, Brzezinski posits another future scenario that has come to pass, involving: “… the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values (of Liberty). Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.” [5]

He warns us with apparent gravitas:

“Another threat, less overt but no less basic, confronts liberal democracy. More directly linked to the impact of technology, it involves the gradual appearance of a more controlled and directed society. Such a society would be dominated by an elite whose claim to political power would rest on allegedly superior scientific knowhow. Unhindered by the restraints of traditional liberal values, this elite would not hesitate to achieve its political ends by using the latest modern techniques for influencing public behavior and keeping society under close surveillance and control. Under such circumstances, the scientific and technological momentum of the country would not be reversed but would actually feed on the situation it exploits.” [6]

There are two ways in which this Technocracy is being implemented both of which naturally intersect:

1) Economics and energy

2) Surveillance and state controls.

In the first instance, the energy issue is being promoted and reorganized via the digital automation of SMART technologies. The US Department of Energy defines these technologies as: “… an electrical grid that uses computers and other technology to gather and act on information, such as information about the behaviours of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity.” [7]A similar grid is underway in Europe under “SMART Grids European Technology Platform.” [8]

America’s old and out-dated power grid is ready for an overhaul and the SMART Grid technology will mean the installation of digital meters in each home and business and 24hr monitoring of energy consumption that goes with it. What SMART means in this context is that there can be communication with other related devices within the home to relay support data information without any contact with the customer. Rather like Homeland Security and its agencies, The SMART Grid Task Force “… is responsible for coordinating standards development, guiding research and development projects, and reconciling the agendas of a wide range of stakeholders.” [9]

SMART Grid technology is big money and represents a revolution, particularly in telecommunications and energy. In 2010, the countries investing the most in SMART grid systems were China at $7.32 billion, closely followed by the United States $7.09 billion, Japan at $807 million with Spain, South Korea, France, United Kingdom, Germany, Australia and Brazil all spending millions on transforming their societies’ infrastructure. [10]

Like so much of the post-911, military-corporate infrastructure outsourced both home and abroad, the Department of Energy’s mandate to push ahead with this overhaul did not get Congressional hearing. From October 2009 – January 2010 SMART grid project funding ear-marked for 183 projects in 43 states totalled $3.4 billion thanks to the Obama Administration picking up where the Bush Administration left off with the creation of The Office of Electricity Delivery in 2003. The Department of Energy’s press release gives details of what this will mean for the average electricity consumer:

  • More than 850 sensors called “Phasor Measurement Units” to monitor the overall power grid nationwide
  • 200,000 SMART transformers
  • 700 auto­mated sub­stations (about 5 per cent of the nation’s total)
  • 1,000,000 in-home displays
  • 345,000 load control devices in homes [11]

smartgridvillageThe SmartHouse/SmartGrid Vision c/o The 7th Framework Programme funded European Research and Technological Development from 2007 until 2013 Link: http://www.smarthouse-smartgrid.eu/index.php?id=245


Systems theory and cybernetics had always been attractive to technocrats as a web of relationships that facilitate economic and social control. “The Web of Life” concept of interdependence and interrelatedness of all things within ecological systems was taken on by a number of ecologists and New Age seers. The concept of equilibrium and balance was in fact, determined by vastly unpredictable and creative confluence of non-linear principles, which is why attempts to bottle such non-linear systems into a means of socio-economic control can never work. However, this is where the World Wide Web (WWW) and the Network of Things (NOT) comes in. It is essential to the mind-set who see people as numbers and assigned values to be moved around on a computer screen like a game of SIMS.

Sims3UnivLife

Ready to become part of a virtuality and SIMS-SMART?

With NOT, technocrats wish to bathe us in a sea of Wi-Fi waves, with cities and homes awash with wireless networks where automation rules. From your dimmer switch to powering your juicer; the garage door to the security code on the residential gates. No human intervention is necessary. With strict guidelines as to what they will be programming, the new armies of programmers will be told to download exactly what they want you to see and hear, changing it as they see fit and without your knowledge. If you refuse and wish to take it to an ombudsman or even a civil action, how are you going to watch your T.V. or eat your food if your utilities are switched off? Look at the nature of banking. When did you last see your bank manager or get a problem resolved whilst speaking to some low-wage slave in India you cannot understand? Distance is designed.

The SMART Grid is married to the Wi-Fi Alliance which is readying itself to implement Wi-Fi circuitry in every conceivable device in the home and business sector. It will operate in exactly the same way as Wi-Fi-enabled network modems and routers for personal computers to mobile phones currently being used by homes and businesses globally. Telecommunications electricity, and renewable energy resources will be functionally integrated into a system automatic provision, payment and monitoring. Gmail, i-Pod applications, your fridge and T.V. and the Wi-Fi “ether” that will activate them are ready to be absorbed into the SMART Grid where literally everything communicates with each other in a fully-automated, seamlessly connected world of man and machine.

And now, it means you can literally become part of the very fabric of SMART willingly and forever with electronic senors printed directly onto your skin… Oh, the convenience! Mike Orcutt of MIT’s Technology Review comments: “Such systems could be used to track health and monitor healing …” Sure. And if you fall on the wrong side of your friendly SMART government tracking and monitoring takes on a whole different meaning. But having your i-pad on your wrist as opposed to freedom of movement is clearly more important… More on this later. [12]

printable.skin_.electronics.2x299Now, you too can become SMART!

Another aspect of the Wi-Fi revolution that is not being talked about is the health effects of living our daily immersed in this type of constant radiation. There is a glut scientific, peer-reviewed papers out there which are unsurprisingly, barely receiving a whiff of recognition that they sorely deserve. Adverse biological effects from Wi-Fi signals, Wi-Fi enabled devices or Wi-Fi frequencies (2.4 or 5 GHz) have been complied by the UK campaign group Wi-Fi in Schools (You can visit them at http://www.wifiinschools.org.uk and print out as many as you like). The many examples of extensive research undertaken by University and independent scientific research institutes provides disturbing evidence across a broad range of experiments carried out on mice, rats and tadpoles.

Some of the findings included:

  • Immunohistopathologic demonstration of deleterious effects on growing rat testes of radiofrequency waves emitted from conventional Wi-Fi devices.
  • Decreases in human sperm motility and increases sperm DNA fragmentation from the use of laptop computers connected to internet through Wi-Fi.
  • Oxidative injury in rat testis and on oxidative stress in blood induced by 2.45-GHz radiation from wireless devices.WI-FI_ZONE_01
  • A provocation study using heart rate variability shows Negative effects on autonomic nervous system from microwave radiation from 2.4GHz cordless phone.
  • Wi-Fi electromagnetic fields exert gender related alterations on EEG
  • 2.45-Gz wireless devices induce oxidative stress and proliferation through cytosolic Ca2+ influx in human leukemia cancer cells.
  • Microwave Irradiation-Induced Oxidative Stress Affects Implantation or Pregnancy in Mice
  • Cognitive impairment in rats was shown after long-term exposure to GSM-900 mobile phone radiation.
  • Stimulation of production of tumor necrosis when exposed in vivo and in vitro to weak electromagnetic waves in the centimeter range
  • Nerve cell damage in mammalian brain after exposure to microwaves from GSM mobile phones. [Source: wifiinschools.org.uk]

Bearing in mind that 16v/m is the average level of exposure for these experiments and that when using a Wi-Fi-enabled tablet computer we can be exposed to electromagnetic fields up to 16V/m. This is only the beginning of research into these areas but the evidence for serious problems on the subtle layers of our biological and neurological make-up is already overwhelming. If we don’t put the brakes on for the health issues alone, then we will be looking at generations with behavioural difficulties, infertility, impaired cognitive ability and an epidemic of endemic brain tumours.

As smartphones begin to rain down from the technocratic ether, the most convincing evidence that mobile phones are causing brains tumours in the young has arrived from Dr. Boian Alexandrov from the Centre for Nonlinear Studies at Los Alamos National Laboratory in New Mexico. His team have shown that terahertz (THz) waves gradually destroy human DNA which is fairly terminal for the human race. Since chips broadcasting THz waves are being considered for use in mobile phones as imaging systems tool across this SMART society and THZ scanner technology is already being used by the TSA at most of our airports, the question as to whether there are any health issues concerning terahertz technologies seems unimportant as the great wave of innovation roars ahead.

The medical establishment is encouraging the use for operations in which scanning will prove highly useful for otherwise invasive procedures while “exciting” innovations in consumer freedom will allow us all to see through objects and walls to find our lost car keys should we choose to buy into the gadget craze. Dr. Alexandrov and his team’s ground-breaking study (among others)  is lurking in the background as a minor impediment to the euphoria of “progress.” His team discovered that exposure to THz radiation builds cumulatively and affects human and animal tissue DNA, effectively “unzipping” the DNA molecule. In their paper ‘DNA Breathing Dynamics in the Presence of a Terahertz Field,’ Alexandrov et al conclude:

“We consider the influence of a terahertz field on the breathing dynamics of double-stranded DNA. We model the spontaneous formation of spatially localized openings of a damped and driven DNA chain, and find that linear instabilities lead to dynamic dimerization, while true local strand separations require a threshold amplitude mechanism. Based on our results we argue that a specific terahertz radiation exposure may significantly affect the natural dynamics of DNA, and thereby influence intricate molecular processes involved in gene expression and DNA replication.” [13]

So, if we continue to breathe in the SMART hype, we’ll soon see where the real growth lies.

 


* “Wi-Fi is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections.


Notes

[1] http://www.no2id.net/
[2] p.232; The Technocracy Study Source, by Howard Scott and M.King Hubbard, published by Technocracy Inc. 1940 edition.
[3] ‘China’s All-Seeing Eye’ By Naomi Klein, Rolling Stone, May 14, 2008.
[4] Between Two Ages: America’s Role in the Technetronic Era by Zbigniew Brzezinski 1970 / ISBN-10 0313234981 (p.11)
[5] Ibid.(p.97)
[6] Ibid. (p252-253).
[7] U.S. Department of Energy. ‘Smart Grid / Department of Energy’ http://energy.gov/oe/technology-development/smart-grid.
[8] http://www.smartgrids.eu”. smartgrids.eu. 2011.
[9] Smart grid: an introduction US State Department.
[10] http://www.zprymeconsulting.com
[11] ‘Smart Grid: The Implementation of Technocracy?’ By Patrick Wood, August Review 03 March 2010.
[12] ‘Electronic Sensors Printed Directly on the Skin’ MIT Tech, Mike Orcutt, March 11, 2013.
[13] ‘DNA Breathing Dynamics in the Presence of a Terahertz Field’ by B. S. Alexandrov, V. Gelev, A. R. Bishop, A. Usheva, K. O. Rasmussen. (Submitted on 28 Oct 2009) Biological Physics (physics.bio-ph); Computational Physics (physics.comp-ph) Journal reference: Physics Letters A, Volume 374, Issue 10, 2010. Abstract: We consider the influence of a terahertz field on the breathing dynamics of double-stranded DNA. We model the spontaneous formation of spatially localized openings of a damped and driven DNA chain, and find that linear instabilities lead to dynamic dimerization, while true local strand separations require a threshold amplitude mechanism. Based on our results we argue that a specific terahertz radiation exposure may significantly affect the natural dynamics of DNA, and thereby influence intricate molecular processes involved in gene expression and DNA replication.

Amerikan Beauty I

By M.K. Styllinski

“Off goes the head of the king, and tyranny gives way to freedom. The change seems abysmal. Then, bit by bit, the face of freedom hardens, and by and by it is the old face of tyranny. Then another cycle, and another. But under the play of all these opposites there is something fundamental and permanent — the basic delusion that men may be governed and yet be free.”

H.L. Mencken, The American Credo: A Contribution Toward the Interpretation of the National Mind


sofL

© infraksun

Before we continue exploring the proliferating child rape networks which are STILL operating across our rapidly ponerised world, we’ll take a brief tour into the subject of the missing.

It may come as a surprise for most of us to learn that procedures and protocols for missing persons are either absent or woefully inadequate from the majority of local and state governments. The Doe Network, an American, internet-based resource was set up by an amateur group of concerned individuals in response to the serious lack of law enforcement record keeping. Unsolved homicides, runaways, abductions and death from natural causes are some of the primary reasons for disappearances of children and adults every day. The daily drum roll of missing persons is a silent crisis of global proportions with causes that are both multifaceted and highly complex. When it comes to finding accurate statistics on the level of missing children when such investigations are given a low priority due to the sheer magnitude of the problem, then studies can become rather misleading and outdated as is the case today.

The FBI’s National Crime Information Centre (NCIC) is the only mandatory reporting system in the United States which gives us a good idea as to how seriously the epidemic of missing persons is taken by law enforcement. Although it is federal law that all children reported missing or abducted must be entered into NCIC at the time a police report is taken, there is evidence to suggest that this is not taking place, quite apart from the lack of reporting in itself. It is also apparent that child agencies, advocates and non-profit charities and organizations are not receiving this information in order to provide a partially accurate picture of the issue. As a backdrop to this, missing person experts estimate that the bodies of 40,000 to 50,000 unidentified men, women and children have been found by police in the US during the past 50 years, [1] though once again, this could be a conservative estimate judging from the scale of the problem and the lack of resources devoted to it.


  1.  Alan John Westerfield aged 5 Missing since September 12, 1964 from North Carolina. Classification: Endangered Missing
  2.  Jie Zhao Li aged 12  Missing since February 11, 1988 from Honolulu, Hawaii.  Classification: Endangered Missing
  3.  David Michael Borer aged 8  Missing since April 26, 1989 from Matanuska-Susitna Borough, Alaska.  Classification: Non Family Abduction
  4. Christine Green aged 16  Missing since April 23, 1985 from Philadelphia, Philadelphia County, Pennsylvania. Classification: Endangered Missing
  5. Tania Marie Murrell aged 6 Missing since January 20, 1983 from Edmonton, Alberta Canada Classification: Non-Family Abduction
  6. Tanja Afra Maria Groen aged 18 Missing since August 31, 1993 from Maastricht, Netherlands, Classification: Missing
  7. Ana Maria Luviano Cabrera aged 17 Missing since August 16, 1996 from Izcalli Piramides,  Tlalnepantla, Mexico. Classification: Missing
  8. Beatriz A. Cervantes Barrera aged 7 – Missing since February 23, 1992 from Mexico. Classification: Endangered Missing
  9. Jonathan Ivan Esquivel Negrete aged one month – Missing since July 4, 1995 from Colonia Loma Linda, Naucalpan, Estado de Mexico, Mexico, Classification: Endangered Missing
  10. Revelle Balmain  aged 24 – Missing since November 5, 1994 from Kingsford, Sydney, New South Wales, Australia. Classification: Endangered Missing
  11. Melissa Ann Schmidt aged 15 – Missing since September 5, 1995 from Lincoln, Lancaster County, Nebraska Classification: Endangered Missing

Looking at those photos of children and adults alike is a poignant experience. There seems to be an everyday underworld of the forgotten. Once beyond the media radar they are quite literally, out of sight and out of mind. Although nationwide crime was said to be going down in the US rape is still on the increase with the frequency of murders rising. Even though Europe is a more dangerous and violent place than a generation ago (between 1975 and 2000, crime rose 97 percent in France, 145 percent in England, 410 percent in Spain) crime overall is falling. While quoting statistics is not the most fascinating arena of information, it is worth exploring what is available in this context.

According to a Scripps Howard News Service study of confidential FBI records, the vast majority of unidentified bodies go unreported to state or federal authorities because here is no requirement from local authorities to register cases to outside agencies. The lack of authority from state coroners and under-funding is also a significant factor. Missing persons are by far the most extensive in the US. The Interstate Association for Stolen Children (IASC) in Sacramento, California has one of the highest rates of missing children in America and believes that drugs, pornography and prostitution comprise the typical tripartite pursuits of crime organizations. IASC Executive Director Greg Mengell described a case in which “three small drug cartels were competing for business in the same area. After one ring burned down the headquarters of another, a child was kidnapped in retaliation. In this case, one of the cartels also had connections to a pornography ring and a “Satanic cult.”

Although over 2000 – 3,600 children go missing in the country every day,[2] which includes an estimate of unreported cases, law enforcement officials say the sector of missing persons is hugely under-reported as a whole, where the actual number could be more than four to five times higher. As it stands, the statistics from 1997-1999 within the USA alone has estimated 797,500 children reported missing which equates to an average of 91 children disappearing every hour. With 58,200 children abducted by non-family, where children are taken by force or threat of bodily harm, the total works out to more than 159 per day at 6 children per hour.

In percentage terms, the study concluded that nearly 50 percent were assaulted by their abductor. When the child is told to leave home or leaves home without permission, otherwise called “runaway or thrownaway” children these cases totalled more than 682, 900 equating to 1870 per day. 115 children were the victims of the most serious, long-term non-family abductions called “stereotypical kidnappings,” and where court orders were violated resulting in the victims of family abductions, the number reached 203,900. [3]

By the year 2000 the NCIC recorded a significant rise to 876,213, where 85 percent – 90 percent were listed as juveniles reported missing. 152,265 of the persons reported missing in 2000 was categorized as either endangered or involuntary. The number of missing persons reported to law enforcement has increased from 154, 341 in 1982 to 876,213 in 2000. That is an increase of 468 percent.[4]

If we are to believe the FBI, 99 percent of the nearly 800,000 reports of missing persons each year are solved, leaving a manageable 8,000 – to 10,000. (Far be it for me to level scurrilous accusations of statistical bias here, but it seems to be a slightly excessive success rate). The vast majority of abuse and exploitation cases are perpetrated by people they know, or from acquaintances. However, when we look at the ratio of children who are abducted and murdered then the story changes dramatically in that 57 percent of these murders are committed by someone unknown to the victim where the family involvement drops to 9 percent. [5] Psychiatric disability, diminished mental capacity, a physical disability, a need for medication, issues with substance abuse, domestic violence, financial difficulties and many other factors can contribute to disappearances which are often much more complex than they first appear.

According to the National Institute of Mental Health an estimated 22.1 percent of Americans ages 18 and older – 1 in 5 adults – suffer from a diagnosable mental disorder in a given year. This figure translates to 44.3 million people.[6] There is a high probability that depressive disorders are appearing earlier in life from people born in recent decades compared to the past.  The figure of 20 percent attributed to children in the US estimated to have mental disorders with at least mild functional impairment, may be another major factor that places children in vulnerable situations attracting abductions and other criminal cross-overs.[7] Though the suicide rate amongst children has declined since 1992 it remains the third leading cause of death among young people ages 15 to 24. In 2001, 3,971 suicides were reported in this group.[8]

The average victim of abduction and murder is an 11-year-old girl with a stable family relationship. First contact with her abductor usually occurs within a quarter-mile of her own home.[9] Parental kidnapping can no longer be viewed as a domestic issue and buried under the cultural carpet. Statistics show that there are many children taken from their spouse and once beyond national boarders are seldom seen again. This is a common problem in USA and Europe, in turn connected in particular to the Middle East where interracial marriages go sour. Children are on the run, in a cultural limbo and the roots that they may have had established in their formative years have been lost leading to a greater propensity for maladjustment and psychological damage in later life. There is also a clear pattern between male and female victims. The murder by strangers of young/infant male victims from the 1-5 age groups, teenage males 13-15 years and 16-17 years are all roughly around 60 – 64 percent. [10] While the young/infant females are usually killed by friends and acquaintances the older females in the 16-17 age bracket are murdered by strangers both at 64 percent. [11] Yet after a decline in murder rates in 2004 by 5.7 percent, the first time in five years there had been a decrease in the nationwide murder rate, it however rose again in 2005 by 2.1 percent and has continued to climb. Murder by those unknown clearly comes out on top. So, who are these “unknowns”?

“When it bleeds it leads” is one crude maxim from the media which most of us heard at one time or another yet it could also be said that “if she’s white, blond and sexy then she’s on the front page.”

Kym Pasqualini, President for The National Center for Missing Adults, and Missing Persons Advocacy Network based in Phoenix said the media tends to focus on “damsels in distress”—typically, affluent young white women and teenagers. “We’d like to see a little more diversity in reporting because we have cases that never make the front page of the local newspaper, let alone the national media,”… “All parents are going through the same thing, no matter how much attention their case gets.” [12] Hispanic, black and mixed race kids are way down on the list of media coverage.

The National Centre for Missing & Exploited Children reported 1,159 African American children Missing in 2000 the highest figures ever recorded for the organization. Although figures dropped by 2002 this had little to do with an upturn in media awareness of black children. More recently, in June of 2005 a report surfaced of boys from Africa being murdered in England’s London Churches with cultural links to West Africa where “aggressive” forms of exorcism are practiced. Scotland Yard “traced only two of 300 black boys aged four to seven reported missing from London schools in a three month period. The true figure for missing boys and girls is feared to be several thousand a year.” The report revealed that:

“… there is a wide gulf between these [ethnic] communities and social services and protection agencies with many people in ethnic communities scared to speak out. The report concludes police face a ‘wall of silence’ when dealing with such cases. Experts differ on the merits of the Scotland Yard report. […] ‘It is people in positions of power and money that are manipulating poor people.’” [13]

No change there.

Though there is clearly merit and truth in the report it will also provide more fuel for those who see this as an immigration problem. One wonders why thousands of ethnic children go missing and where “cultural links” have no connection whatsoever. Even media advocacy that may take up the reins of an apathetic police force can have repercussions as Brian Maitland discovered, whose daughter Brianna disappeared in March 2004, near Montgomery, Vermont: ‘As the parents, we receive many tips that we forward to police,’ Maitland wrote, ‘Are they acted on? Who knows? Police tell you nothing about what they are doing with your case and tips, but we know the results. NOTHING.’”

The National Crime Information Centre itself is under serious strain with 17 separate databases under its umbrella. Over 94, 000 law enforcement agencies have access with more than 39 million records. Critics call it a deeply flawed system where: ‘… a lack of knowledge, indifference or poor training, police officers in Washington state –  and around the nation – routinely fail to take even the most obvious steps, conduct routine follow-ups or comply with the law when handling missing-persons cases,…” [14] Moreover, it has been dawning on several child advocate agencies and families desperate for news of their missing loved ones, that it is not only bureaucracy and police apathy that is causing frustration – but the FBI itself. The bureau obsessively protects a wall of confidentiality over NCIC data, arguing that the database is the private property of local police departments. It is the police that steps up to increase the misery by preventing the public’s right to accountability regarding whether or not local police departments and medical examiners are doing their jobs.

Seattle Police ignored a law that required them to follow up on reports, which in this case, resulted in the rape and murder of a 14 year-old girl. This routine procedure “… would have identified her remains nearly 17 months sooner” and “I’m sure police would’ve caught him, or at least found some clues or evidence, if they would’ve linked this up sooner,” said Michelle’s mother, Tish Curry. “They didn’t really seem to care that much. My daughter was just another runaway to them.”  According to the same extensive report by the Seattle Post Intelligencer they found that police routinely mishandled and lost cases, ignored the law, failed to use tracking systems in an age of ubiquitous surveillance and closed cases with little or no investigation.

If sexual predators do indeed commit crimes against children 50-60 times more before they get caught, it is doubly frustrating for families of victims to learn how easily psychopaths use the system against itself. They naturally prey on those from dysfunctional families or with a prior record of running away or petty crime. Police are even less likely to follow up on such cases.

Journalist Lewis Camb:

“Criminologist Steven Egger calls the victims of serial killers ‘the less dead’ because they are usually people who have been marginalized — prostitutes, drug users, homosexuals, farm workers, hospital patients and the elderly.

‘We don’t spend a lot of time dealing with missing people who aren’t particularly important; who don’t have a lot of prestige,’ said Egger, a University of Houston-Clear Lake professor and former police officer. It’s a public failing as well as a police failing, a common belief being that such people take big risks and get what they deserve. [15]

The defining characteristic that all these missing children and adults have in common is that they are largely forgotten by the media and the world in general. It is poignant to look at the photos of so many unsolved cases of those for whom the pathology of our social systems serve as a death sentence. While society becomes ever more devalued and artificial, the “defective” goods are literally “throwaway” children and adults, descending further down the chain of “used goods.”

There is some good news however. Since 2011, a generally greater awareness of the issue with the rise of technology such as Facebook along with the Amber Alerts initiative spear-headed by the National Centre for Missing & Exploited Children (NCMEC) a change has occurred. The recovery rate for missing children involved in the most dangerous cases in America has shot up to 97 percent in 2011 from 62 percent in 1990, according to the centre’s statistics which, if the stats are correct, is cause for celebration. This is modified by the 115 children abducted each year in the US where an average of 57 percent are found alive, 40 percent are killed and the rest listed as open cases.

By 2012, 94 percent of recovered children are found within 72 hours and 47 percent found within three hours shows how important a part the new social network technologies are playing in the search for missing children. [16]


N.B. For an added dimension of high strangeness to the study of missing persons please read the series of books by David Paulides starting with  Missing 411- Eastern United States: Unexplained disappearances of North Americans that have never been solved and visit his website at www.canammissing.com 

 


Notes

[1] ‘Americas forgotten dead: Unidentified bodies go unreported’ by Thomas Hargrove – Scripps Howard News Service October 4, 2005. Alaska Site News.
[2] National Center for Missing & Exploited Children (NCMC) http://www.ncmec.org
[3] National Incidence Studies of Missing, Abducted, Runaway, and Thrownaway Children (NISMART-2) US Department of Justice’s Office of Juvenile Justice and Delinquency Prevention. Released 2002.
[4] http://www.fbi.gov/hq/cjisd/ncic.htm
[5] National Incidence Studies of Missing, Abducted, Runaway, and Thrownaway Children (NISMART-2) US Department of Justice’s Office of Juvenile Justice and Delinquency Prevention. Released 2002.
[6] National Institute of Mental Health NIH Publication No. 01-4584 Updated: January 1, 2001.
[7] National Center for Injury Prevention and Control (NCIPC) factsheets.
[8] Ibid.
[9] Missing Children Myths: Connect For Kids by Daniel D. Broughton Published September 18, 2000.
[10] Ibid.
[11] Ibid.
[12] Quoted in ‘America’s Missing’ 2005, The Crime Library, Typical Crimes and Methods http://www.crimelibrary.com/
[13] ‘Child sacrifices in London’ By Richard Edwards Crime Reporter, Evening Standard 16 June 2005.
[14] A Seattle Post-Intelligencer special report on how police in [Seattle and around the US] fumble missing-person reports, originally published in 10 parts. Monday, February 17, 2003 Part 1: People go missing, killers go free ‘I still worry. I guess I always will’ By Lewis Kamb.
[15] Ibid.
[16] ‘Missing children in U.S. nearly always make it home alive’ By Barabara Goldberg, Reuters, April 26, 2012.