2013-03-06

CONTROLLING THE MINDS OF A NATION

A Prison without Walls

by Michael Allen

19FEB13



PART 3

An Illusory Progression Towards an Incarcerated Society

 

For when they speak great swelling words of vanity, they allure through the lusts of the flesh, through much wantonness, those that were clean escaped from them who live in error. While they promise them liberty, they themselves are the servants of corruption: for of whom a man is overcome, of the same is he brought in bondage. For if after they have escaped the pollutions of the world through the knowledge of the Lord and Saviour Jesus Christ, they are again entangled therein, and overcome, the latter end is worse with them than the beginning.

— II Peter 2:18-20

You have all heard at one time or another during the past couple decades about how our nation is being transformed into what is being called a police state, and you may have recognized that our personal privacy and individual freedoms are now diminishing at a startling rate but are unable to put your finger directly on the cause of the problem. Well, if you are one of these individuals, it is not too late to open your eyes and become awakened to the facts and still be able to reach out and help wake up your friends and neighbors before it’s too late. Before running out and yelling that the red-coats are coming, although that’s not far from the truth, there is some basic information that must be attained so that you can come across to your associates as one being somewhat knowledgeable in what you are talking about; believe me, this isn’t always the easiest thing to do, as there are vast amounts of bullshit coming at us from all directions at the same time!

In my series of articles, from what you are now reading a part of, I am attempting to convey to you various aspects of a diabolically-orchestrated master plan that is unfolding upon us right now. I’m sure many of you may be convinced that it’s too late to change the course of these events, but might I remind you… when a point in time comes and you concede, in your own mind, to what your abilities may manifest, you have just lost the war and will inevitably become enslaved to yourself and to those that suppress you. You must remain steadfast in what your objectives are and to what your perceptions of the outcome will be. You must be able to visualize success in order to attain it. You must be willing to sacrifice everything in order to preserve freedom for our future generations. If we don’t make a stand together soon, we may never again find the opportunity. We are truly living in an age of deception, and without action to counter what is taking place you will be deceived. Your very soul may be lost forever as what we face is unequivocally of a diabolical nature and your very soul is found in the balance.

Know ye not that the unrighteous shall not inherit the kingdom of God? Be not deceived: neither fornicators, nor idolaters, nor adulterers, nor effeminate, nor abusers of themselves with mankind, Nor thieves, nor covetous, nor drunkards, nor revilers, nor extortioners, shall inherit the kingdom of God. And such were some of you: but ye are washed, but ye are sanctified, but ye are justified in the name of the Lord Jesus, and by the Spirit of our God.

— I Corinthians 6:9-11

Over the past couple decades the population at large is being indoctrinated or otherwise simply brainwashed into accepting draconian legislation designed to give the sense of providing a safer and more secure system to live by. Those who are willing to trade away some of our rights and freedoms deserve neither.  The masses of the population stay glued to their televisions and suck in all the bullshit as if they were vacuums. They believe the false statistics and lies portraying a consensus that believes certain individual rights and freedoms must be sacrificed to obtain protection; they follow along just to keep step with this falsely created majority just as the masters of this world have predicted. YOU ARE BEING LED TO THE SLAUGHTER.

This part of the series of articles will deal with various aspects of several surveillance technologies and control mechanisms that are being used against us – this includes everyone. What we can expect to see transpire in the near future is the total surveillance of all aspects of our lives. Transportation, communication, hospitalization, medication, and just about anything else you wish to add to the list will be monitored and processed for conformity to predefined profiles that have been established by a handful of power-hungry perverts that hide in shadows pulling the strings of the wannabe leaders. Nearly every thought will be monitored, kind of like George Orwell’s book 1984, except his book gravely underestimates the reality of what is transpiring today.

There are so many aspects of this surveillance scenario that are totally alarming on their own account, but in actuality they are merely components of a much greater diabolical orchestration of complete control, a depiction of total enslavement. The average person’s perception of what’s taking form around them is gravely underestimated and misconstrued; their understanding of reality has become warped and twisted by their own continuation of believing all the lies passed down from the government by counterfeit truths and ambiguous interpretations of news accounts, laws, and various other forms of propaganda being presented and canvassed through the controlled Main Stream Media.

The only item that remains a stumbling block for the NEW WORLD ORDER to totally take over our lives and abolish the Constitution is the fact that Americans are still in possession of firearms. These NWO control freaks are deathly afraid of the American people and believe that we must be placed under total surveillance; this has nothing to do with our safety, but is in reality to protect the NWO system from the people! Talk about paranoia! They know that we will stand up and resist their tyrannical takeover of this nation. Those who are in control have to disarm this nation in order to bring their Totalitarian Socialist Dictatorship into power. Without the 2nd Amendment, we will have lost all means of defense to protect ourselves against these bastards and will have to kiss our freedoms and our dreams good-bye; without our freedom there will be nothing left.

The bigger picture that we must take notice of and ADDRESS is one of having the total population placed into an arrangement of unprecedented social

confinement without actual incarcerations. Although actual incarcerations will continue to exist, this will act to galvanize the sensation that you are still free on the outside and to conceal the elimination of the undesirables. The once thought-of Prison-Industrial Complex is rapidly giving birth to a new societal interpretation, one that is fueled by the repulsive greed from bureaucratic control freaks in government; this I will dub as the Prison-National Complex, where the citizens become the prisoners and the prisons become our surroundings. This might sound quite absurd and even a bit like science fiction to those that still have their heads stuck in the sand, detached from reality, believing everything that is propagandized from their televisions as being normal and everything will be just fine.

Maybe if you take a closer look at some of the major components being set in place, you can begin to pull your heads out of the sand and begin to understand that the overall picture that I’m presenting is not just a figment of my imagination, but is indeed a vivid truth having many well verifiable facts. This BEAST system is here right now, and will undoubtedly become increasingly more draconian, antagonistically pervasive, and diabolically malevolent beyond your wildest nightmares. This is the system depicted in the Book of Revelation found in the Holy Bible and all those that refuse to become part of this system will inevitably be tracked down, imprisoned in Re- Education Centers (FEMA CAMPS) and undergo an indoctrination program, then re-introduced into society upon their total submission to the system, or be ELIMINATED. Many people will never reach the re-education centers as any form of resistance will be met with a high probability of lethal aggression imposed by the enforcers of this BEAST system: the police and military. This is indeed a dismal picture of the future and without understanding the nature of what is taking place, we would be doomed to be deceived and face eternal hell.

There are several major components that comprise this societal prison that we are facing. I will be examining only a couple that are extraordinary associated with this system. Although these items can be expanded far beyond my brief introductory association, what I present will have an uncanny controlling aspect on our abilities to express our individuality towards freedom and even to live our lives as we have grown accustomed. These items are extremely intertwined to great extents covering all conceivable levels.

Let’s take a look at the first of these components that is being sprawled out before us in the news lately, namely Drones (UAS’s – Unmanned Aerial Systems). For those that still are unsure what drones are, let me present to you a brief description:

DRONE: Drone or remotely piloted vehicle, a pilotless craft guided by remote control. Aircraft, ships, and land vehicles can be designed or outfitted as drones, although underwater vessels—both piloted and pilotless—are usually called submersibles. Small, relatively inexpensive military drones are used as targets in combat practice, while high- performance models may be used in hazardous reconnaissance missions and to carry and launch missiles against enemy targets without exposing pilots and their far more expensive aircraft-to-antiaircraft fire. Depending on the mission, drones can be equipped with armament, radar, video cameras, lasers, or sensors for chemical or biological weapons. Guidance of the drone can originate from an airplane, a ship, a ground station, or a satellite link. Building upon the successful use of drones in the Second Persian Gulf War, the Homeland Security Department is planning to use unmanned aircraft to track drug smugglers, illegal immigrants, and terrorists along the U.S. borders. Contemplated civilian uses include replacing stationary video cameras and sensors for traffic control, for monitoring crops, to help fight forest fires, and for atmospheric research. [1]



This should open your eyes as to what drones are and should also clue you in on some of their capabilities. These drones are not only going to be used for surveillance purposes, but assist in the apprehension of PATRIOTS and CHRISTIANS and also for assassinations of political dissidents along with anyone who is labeled as a terrorist. You may question my usage of the term “assassination,” so just for a reminder, all of the drone strikes that you hear about in the news taking place throughout the world are all considered assassinations. To further your learning experience, the following will prove the intent for the use of drones against Americans during actions such as civil unrest and anything else that the government deems appropriate, even things such as an outstanding traffic ticket. PAY ATTENTION.

A shortlist of U.S. citizens specifically targeted for killing? That’s right. No arrest. No Miranda rights. No due process. No trial. Just a bullet. While the Obama administration continues its Bush-blaming for the economy, it is mega-morphing Bush policy in covert ops overseas, which was, according to the Post, “to kill U.S. citizens abroad if strong evidence existed that an American was involved in organizing or carrying out terrorist actions against the United States or U.S. interests.”

Well, in recent weeks, the Obama administration has taken this overseas killing op to a new low: stateside assassinations. A former director of national intelligence, Adm. Dennis Blair, confessed before Congress: “We take direct actions against terrorists in the intelligence community. If we think that direct action will involve killing an American, we get specific permission to do that.” If you are wondering who the “we” are to whom Adm. Blair refers, they are Smith, Wesson and the White House. [2]

AND furthermore, take into consideration that President Obama signed the 2012 NDAA that allows for indefinite military detention without charge or trial into law for the first time in American history. The NDAA’s dangerous detention provisions would authorize the president, and all future presidents, to order the military to pick up and indefinitely imprison people captured anywhere in the world.

On the contrary, the domestic use of drones has already begun, under the terms of the FAA Modernization and Reform Act, which Obama signed into law February 14. This requires the FAA to permit nationwide use of unmanned aerial vehicles (UAVs) by September 2015. Dozens of police departments and even private corporations have applied for permits to use drones.

The military use of drones has begun along the US-Mexico border, and it is only a matter of time before these are armed and used to fire missiles at targets who will be identified as “terrorists,” “people smugglers,” “drug cartels” and the like.

From there, it is a short step to the use of drone-fired missiles in domestic law enforcement operations, and then more widely against the growth of social and political opposition to the policies of the American ruling elite. [3]

Although there are legitimate uses for drones, the actual intended uses are to provide an automated surveillance and ARMED DETERRENT system. As always, the actual intended use will be kept in the shadows so the public can be continually misled into believing some bogus story about keeping them safer and more secure. So as NOT to alarm anyone, these portrayed uses will be presented to the American people to justify their legal use around the US. An article in The Washington Times, titled “FAA official: No armed drones in U.S.” [4], is a good example of the propaganda being used and clearly shows that this is the precise tactic. Just the article’s headline alone should raise eyebrows; it should be well known by now that the opposite of what our government agencies’ propagandists tell us, is actuality what is intended.

…opens U.S. airspace to thousands of these unmanned aircraft. The drones come in just about any size you want – as large as a passenger plane – or as small as a hummingbird. “There’s no stopping this technology,” said Peter Singer, a Senior Fellow at the Brookings Institution and perhaps the country’s foremost authority on drones. “Anybody who thinks they can put this genie back in the box – that’s silliness.” Singer watched them dramatically alter the American battlefield overseas, and says they’re about to become the next big thing at home. [5]

Although it is projected that by 2020 there will be 30,000 drones in the nation’s skies [6], I feel that this number is under-stated and the actual number will be much higher. The FAA has released a list of drone authorizations that have been mapped and includes law enforcement agencies and universities in the US, in both the public and private sectors. The following map insert shows the current listing; this is supposed to be updated as new applicants file their request. [7]

 

Click for Interactive Map

FAA Releases New Drone List—Is Your Town on the Map?

From looking at the map above, it would be easy to make the assumption that metropolitan areas are being targeted first and this is NOT correct. Some of the places on the map are actually quite small and are not cities at all, but are universities and colleges, as such Cornell University located in the Village of Aurora, N.Y. There are other areas that are not even on the map and have been using UAS’s for at least 3-4 years as I have witnessed these flying along the Seneca River in Seneca and Cayuga Counties in New York State while fishing. These were being operated by the NYS Department of Environmental Conservation and the NYS Police and were looking for patches of marijuana growing near the river.

Another important aspect pertaining to drones is the imaging capabilities available for surveillance and tracking purposes. It has been previously published in many media outlets about the 1.8 gigapixel camera developed by DARPA and installed in the Boeing-built A160 Hummingbird Vertical-Take- Off-and-Landing Unmanned Aerial Systems, or VTOL-UAS. These crafts are flown at an altitude of 20,000 feet and have the ability to scan high-resolution video images covering 25 square miles of ground surface. ARGUS sensor suite software from DARPA will be able to capture the wide-area video surveillance and provide live video streaming at around 1 million terabytes per day (5,000 hours of HD footage). [8][9]

The Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System (ARGUS-IS) program is developing a real-time, high-resolution, wide-area video surveillance system that provides the warfighter a minimum of 65 VGA video windows across the field of view. Each video window is electronically steerable independent of the others, and can either provide continuous imagery of a fixed area on the ground or be designated to automatically keep a specified target (dismount or vehicle) in the window. [10]

Many airborne electro-optical sensor systems in the field today provide “soda straw” (i.e., narrow field-of-view) coverage on the ground at their highest resolution resulting in only a few thousand square meters visibility. Automated multi-target detection and tracking methods for those systems are often capable of tracking vehicles, but do not enable high performance tracking of all targets of interest, such as dismounted Soldiers. In addition, current sensor systems are typically controlled by one operator, with the rest of the military force “slaved” to that single operator’s perspective. TAILWIND will address these deficiencies by developing a persistent day/night surveillance capability and providing real-time image products to multiple users. The TAILWIND system will meet the rigorous size, weight, and power (SWaP) constraints of a small UAV. During a mission, operators on the ground will receive their own custom image products (alerts, tracks, 3D models, and video summarizations) with a handheld terminal that connects the user to the TAILWIND system. TAILWIND will enable the persistent surveillance mission for company level operations. [11]

It’s easy to see that the ability to watch over us day and night is upon us as a thief in the night! The imaging capabilities mentioned above are several years old as of this writing, but from the available information obtained through my research, this is still the best available… you agree, right? I really don’t think so; the rate that technology is going seems to be exponential and what is now known by the public has been around for years in secret projects. Just imagine combining this imaging technology with the ability to see through walls… or in this case, through rooftops. There are several projects currently being developed that have proven results utilizing the Through-The-Wall (TTW) technologies using WiFi [12], cellphones [13][14], and microwaves [15]. I have only scratched the surface here and might cover these in more depth in later articles as more factual data becomes available. ARE YOU STARTING TO GET IT?

While I’m still on the surveillance issues, let’s dig into another important component in our societal prison and look at the various surveillance aspects found within your personal pocket companion, your personal dilemma called the cellphone. Most of you are becoming so dependent upon the convenience of your cellphone that many of you probably even sleep with it, or know someone who does. When the time comes to go underground, what will you do? Are you able to discard the cellphone and resort to some other method of communication? Sneaking a cellphone into your Alice-pack will undoubtedly place you and whoever might be near you in a situation that should be avoided at all cost.

There are methods to intercept and track the locations of a cellphone, with or without GPS capabilities. One method used for non-GPS cellphones is called “Triggerfish” and utilizes scanning of the cellphone’s emissions by a mobile unit (Wireless Intercept and Tracking Team) [16]. Another method commonly used for GPS-capable cellphones is called “Stingray,” an IMSI catcher, and can get your cellphone’s GPS location even if your phone is NOT being used by mimicking a cell tower and tricks your cellphone device into connecting to it. This method tracks your cellphone in real time and can pinpoint your location within two meters and can also capture all communications including text messaging. [17]

A Stingray—which could potentially be beamed into all the houses in one neighborhood looking for a particular signal—is the digital version of the pre-Revolutionary war practice of British soldiers going door-to- door, searching Americans’ homes without rationale or suspicion, let alone judicial approval. The Fourth Amendment was enacted to prevent these general fishing expeditions. As the Supreme Court has explained, a warrant requires probable cause for all places searched, and is supposed to detail the scope of the search to ensure “nothing is left to the discretion of the officer executing the warrant.”

But if uninformed courts approve the unregulated use of Stingrays, they are essentially allowing the government to enter into the home via a cellular signal at law enforcement’s discretion and rummage at will without any supervision. The government can’t simply use technology to upend centuries of Constitutional law to conduct a search they would be prevented from doing physically. [18]

Much of your cellphone data is readily available to all law enforcement agencies with minimal effort; just submit a request and your provider will PROVIDE the data and send the bill. Companies such as Verizon charge $50 for five days of text messages and various other fees according to their price list stated in a letter from Verizon to the Honorable Edward J. Markey, US House of Representatives. [19]

It doesn’t stop here. Cellphone surveillance software can also be purchased by virtually any person wishing to buy it from numerous software vendors to track and monitor your children, your employees, or even your spouse. It’s easy and pricing starts at about $.50 per day. Some companies claim that NO ONE will ever know they are being monitored. You can remotely activate the phone’s microphone to listen live to the phone surroundings. You can view data from anywhere by using the Internet. You can even view every call, text message, email, video, or picture on the phone. You can even activate the camera and view the phone’s surroundings. [20][21]

Did you know that every picture taken from your cellphone contains metadata; the “who,” “what,” “where,” “when,” and “how” that goes everywhere the picture goes! Unless you remove or change this metadata, anyone with basic knowledge of digital imagery can extract the data and retrieve such information as to the GPS location where the picture was taken, when the picture was taken, what type of camera was used, the date and time the picture was taken, and a whole lot more.

Abraham Lincoln always said that if he only had six hours to cut down a tree, he would spend his first four sharpening his axe. Those in the security community often relate this statement to the information gathering and reconnaissance phases of breaking into another system. In the reconnaissance phase a potential intruder will spend a great deal of time learning everything they can about their target before they attempt any sort of exploitation because the information gathered here is often crucial in order to find weaknesses in a system or its user. In this article I’m going to discuss the importance of metadata as it relates to reconnaissance. I’ll cover what it is, how it’s stored, and how attackers can extract it to find out more about you or your network. Finally, I’ll provide some defensive tips to help you ensure that you aren’t leaking the wrong kinds of information out to the world via file metadata. [22]

Another issue that needs to be noted is that an ultra-fast WiFi network is being considered nationwide by the government that will allow free access for everyone. There is much debate from various Internet sources whether or not this information is true. Looking at this a little closer, we can see that it’s actually already in place. Through a handful of the top cellular providers such as AT&T, Verizon, Sprint, and T-Mobile, it’s easy to connect to the Internet from just about any place in the country. I’ve noticed that while sitting at a red light near places like McDonalds, Staples, Office Depot, Lowes, Home Depot, Best Buy, and many others, that my cellphone tries to connect to their WiFi networks automatically. This gets really annoying and interferes with any Internet connection that is already established on my cellphone. I’m sure other people have experienced this as well. It’s just a matter of time that this problem will need to be addressed and will most likely usher in a predetermined solution: that being the free nationwide WiFi that was mentioned above. Doesn’t this sound like a PROBLEM-REACTION-SOLUTION scenario and the Introduction to INTERNET TWO?

Having a nationwide WiFi network doesn’t sound like such a bad idea up front, but as we know, there are two sides to every coin. The other side of this coin contains the mobility component of our BEAST system. Taking a look around, you can notice the use of traffic cameras up and down most all interstate highways, main thoroughfares near any metropolitan areas, and at most major intersections; don’t get these confused with typical red-light cameras that snap your picture during traffic infractions. These surveillance cameras not only monitor traffic conditions, but what you are not being told: they also provide surveillance of the selected motorist. Most of these surveillance cameras are connected to WiFi networks. With the national WiFi, the surveillance can be achieved continuously between adjacent geographical location zones. In addition to being able to visually track a subject, combine the GPS systems already installed in most cars and in most cellphones into this visual scenario and you get a very accurate real-time picture that can be virtually re-created, analyzed, and profiled very quickly. Do you see the potential for this ultra-fast national WiFi network to be integrated into the automated response from law enforcement agencies or even from UAS’s?

This depicted WiFi surveillance network is now being used in many places across the nation. You probably already know about Facial Recognition software and License Plate Scanners and other such items as these have been around for a long time now so I will spare you from the redundant rhetoric by not including these here; I’m just noting that these are also already tied into this WiFi BEAST surveillance system. Here is an excerpt from an article about a surveillance system called “TrapWire” that you will undoubtedly find quite interesting as well as to present a much bigger view of the system.

TrapWire is a massive and technologically advanced surveillance system that has the capacity to keep nearly the entire population of this country under the watchful eye of government 24 hours a day. Using this network of cameras and other surveillance tools, the federal government is rapidly constructing an impenetrable, inescapable theater of surveillance, most of which is going unnoticed by Americans and unreported by the mainstream media.

Unlike other elements of the central government’s cybersurveillance program, word about TrapWire was not leaked by Obama administration insiders. The details of this nearly unbelievable surveillance scheme were made public by WikiLeaks, the anti-secrecy group founded by Julian Assange. The TrapWire story percolated from the millions of e-mails from the Austin, Texas-based private intelligence- gathering firm Stratfor, published this year by WikiLeaks. Covering correspondence from mid-2004 to 2011, these documents expose Stratfor’s “web of informers, pay-off structure, payment-laundering techniques and psychological methods.”

This coterie of Stratfor co-conspirators is apparently angry about the leaks, considering that the WikiLeaks servers have been under near- constant Distributed Denial of Service (DDoS) attacks since the TrapWire revelations began attracting the notice of alternative journalists. Some outlets report that the cyberattacks are being carried out by agents of the American intelligence community determined to prevent the full depth of this scandal from being explored by reporters.

Exactly what is TrapWire? According to one description of the program, from Russia Today:
                                                                                                                                                                                                                                                                                                         ”Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.”

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. [23]

All of this so far has presented to you an unmistakably grim picture of what is to be used against anyone that is determined by BIG BROTHER as being anti-New World Order: those of us that are steadfast in loving freedom, those maintaining their GOD-given rights, those that will undoubtedly refuse to be implanted with an RFID chip, and those that refuse to accept the NWO religion, Bahaism.

The tracking and monitoring system is nearly complete, much of what is now active. Even though I have only scratched the surface in presenting this control system to you, I have left out so many aspects that play as much a part to this system as any of the other parts and will include them in future articles. I do have ONE more very important component that will prove to be a keystone between you and your own abilities to survive in the impending diabolical melodrama soon to be played out between the forces of DARKNESS and that of LIGHT. This little component is known as RFID and will be found virtually everywhere… literally.

World’s Smallest RFID

 

At ISSCC 2007, Hitachi, Ltd. and Renesas Technology Corp. have delivered a lecture (lecture number 26.6) about their micro RFID tag (wireless tag) IC measuring only 0.05 x 0.05 x 0.005 mm. This is as small as 2/27 their “next-generation mu-chip” measuring 0.15 x 0.15 x 0.0075 mm announced at the preceding ISSCC in 2006. This IC was manufactured using 90-nm CMOS technology using SOI substrates. It features a three-layer metal wiring layer and a 21 x 32 μm memory chip capable of recording 128-bit data. It is attached to a separately- provided external antenna when used, and communicates with the RFID tag reader via the 2.45 GHz band. Maximum communication range is 300 mm. Mitsuo Usami, Senior Chief Researcher at Hitachi’s Central Research Laboratory who delivered the lecture, said its power when transmitting data is “slightly less than 1 mW.”

Like the preceding 0.15-mm square model, this RFID tag IC also features electrodes on both surfaces for antenna connection. It is because, considering the IC’s micro size, it will cost too much if manufacturers have to distinguish which side is which when they bond it to the antenna. Therefore, Hitachi and Renesas made the chip have electrodes on both sides, so manufacturers no longer need to adjust its direction and location when bonding it. It assumes to be mounted on antennas with around 6-cm length, like those used for current RFID tags. “ACF” (anisotropic conductive film) is used to bond an antenna and the IC. [24]

These micro RFID chips do have GPS capabilities!

 

What happens once you have been identified as being possibly a defiant individual possessing the characteristics that DHS sets forth as being a threat to the draconian regulators of the NWO? You will inevitably be rounded up of course. If you are one of the lucky ones that can manage to evade the system, you will be tracked down and targeted. Your bank accounts will probably be confiscated and the only means to purchase items such as ammo, food, fuel, water, etc. will have to be accomplished by means requiring an alternative method of transaction such as bartering, use of gold or silver coinage, or through a network of reliable friends and family members who are willing to help (this would make them chargeable of “AID and ABET” and may carry a very stiff sentence so don’t depend on anyone else for your own survival), and you will be on a future NO-TRAVEL-LIST.

 

If you use a credit or debit card for your purchases, every purchase you made with your handy plastic card has been recorded in your master-file. Items such as the date, amount, location, time, and much more data has already been accumulating under this master-file and can present a very accurate picture of your living and buying habits; this can also be recreated in real-time virtual 3D imagery along with your network of friends and family or other acquaintances that you may be associated with. It’s just a matter of time and you will be given the ultimatum: Get your RFID implant, go to a FEMA Re-education Camp, or be eliminated.

 

My choice is: God before everything. GIVE ME LIBERTY OR GIVE ME DEATH; a fair warning you are entitled, peace be with you.

 

And I beheld another beast coming up out of the earth; and he had two horns like a lamb, and he spake as a dragon. And he exerciseth all the power of the first beast before him, and causeth the earth and them which dwell therein to worship the first beast, whose deadly wound was healed. And he doeth great wonders, so that he maketh fire come down from heaven on the earth in the sight of men, And deceiveth them that dwell on the earth by the means of those miracles which he had power to do in the sight of the beast; saying to them that dwell on the earth, that they should make an image to the beast, which had the wound by a sword, and did live. And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed. And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six.

 

— Revelation 13:11-18

TIME TO WAKE UP SHEEPLE

TIME IS RUNNING OUT

God bless each and every one of you.

 __________________________________________________________________________________________________________________

Bibliography

1 TheFreeDictionary by Farlex. “Drone or remotely piloted vehicle.”
http://encyclopedia2.thefreedictionary.com/drone

2 Chuck Norris 2010. “Obama’s US Assassination Program? “A Shortlist of . U.S. Citizens specifically Targeted for Killing”?” Global Research, Centre for Research on Globalization.
http://www.globalresearch.ca/obama-s-us- assassination-program-a-shortlist-of-u-s-citizens-specifically-targeted-for-killing/20779

3 Patrick Martin 2013. “Obama Administration Pushes Ahead with Drone . Killings.” Global Research, Centre for Research on Globalization.
http://www.globalresearch.ca/obama-administration-pushes-ahead-with- drone-killings/5313056

4 Ben Wolfgang 2013. “FAA official: No armed drones in U.S.” The . Washington Time.
http://www.washingtontimes.com/news/2013/feb/13/faa-official-no-armed-drones-us/?page=all#pagebreak

5 CBS News.
http://www.cbsnews.com/8301-505263_162-57409759/drone-use-in-the-u.s-raises-privacy-concerns/

6 S. Smithson 2013. “Drones over U.S. get OK by Congress.” The Washington Times.
http://www.washingtontimes.com/news/2012/feb/7/coming-to-a-sky-near-you/print/

7 Electronic Frontier Foundation 2013.
https://www.eff.org/deeplinks/2013/02/faa-releases-new-list-drone-authorizations-your-local-law-enforcement-agency-map

View EFF’s updated Map of Domestic Drone Authorizations in a larger window. (Google Maps)

8 Nicole Lee 2013. “DARPA’s 1.8-gigapixel cam touts surveillance from . 20,000 feet (video)”. Engadget.
http://www.engadget.com/2013/01/28/darpa-argus-is-surveillance/

9 Fred Schnarre DARPA Program Manager. “AUTONOMOUS REAL-TIME . GROUND UBIQUITOUS SURVEILLANCE-IMAGING SYSTEM (ARGUS- IS)”
http://www.darpa.mil/Our_Work/I2O/Programs/Autonomous_Real-time_Ground_Ubiquitous_Surveillance-Imaging_System_(ARGUS-IS).aspx

10 Neal Gompa 2011. “New spy drone has 1.8 gigapixel camera.” EXTREME TECH.
http://www.extremetech.com/extreme/110873-new-spy-drone-has-1-8-gigapixel-camera

11. Fred Schnarre DARPA Program Manager. “TACTICAL AIRCRAFT TO INCREASE LONG WAVE INFRARED NIGHTTIME DETECTION (TAILWIND)” http://www.darpa.mil/Our_Work/I2O/Programs/Tactical_Aircraft_to_Increase_Long_Wave_Infrared_Nighttime_Detection_(TAILWIND).aspx

12. Elinor Mills 2012. “Surveillance device uses Wi-Fi to see through walls” Cnet.
http://news.cnet.com/8301-1009_3-57496724-83/surveillance-device- uses-wi-fi-to-see-through-walls/

13. Sonia Paul 2012. “Will Cellphones Be Able to See Through Walls? New Research Says Yes [VIDEO]” Mashable.
http://mashable.com/2012/04/18/cell-phones-see-through-walls/

14. Kimm Fesenmaier 2012. “Can Your Smartphone See Through Walls? Engineers Make Tiny, Low-Cost, Terahertz Imager Chip”. Science Daily. http://www.sciencedaily.com/releases/2012/12/121210120408.htm

15. FOX News 2011. “MIT Tech Helps U.S. Soldiers See Through Concrete Walls.” FOX News.
http://www.foxnews.com/tech/2011/10/19/mit-tech-helps-us-soldiers-see-through-concrete-walls/

16. Wikipedia. “Triggerfish (surveillance).”
http://en.wikipedia.org/wiki/Triggerfish_(surveillance)

17. Darlene Storm 2012. “Fighting unconstitutional stingray phone surveillance that tracks innocent people.” ComputerWorld.
http://blogs.computerworld.com/privacy/21204/fighting-unconstitutional-stingray-phone-surveillance-tracks-innocent-people

18. Hanni Fakhoury 2012. “Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About.” Electronic Frontier Foundation. https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown- technological-threat-cell-phone-privacy

19. A Letter from William B Patersen, General Counsel for Verizon to Representative Edward Markey. http://markey.house.gov/sites/markey.house.gov/files/documents/Verizon%20Wireless%20Response%20to%20Rep.%20Markey.pdf

20. Mobistealth 2013.
http://www.mobistealth.com/index.php?ref=1925454548773

21. mSpy 2013.
http://www.stop-a-cheater.com/?aff=387

22. Chris Sanders 2011. “Enumerating Metadata.” WindowsSecurity.com
http://www.windowsecurity.com/articles-tutorials/misc_network_security/Enumerating-Metadata.html

23. Joe Wolverton, II, J.D. 2012. “TrapWire Training Courses Reveal Possible Purpose for its Creation.” The New American.
http://www.thenewamerican.com/tech/item/13084-trapwire-training-courses-reveal-possible-purpose-for-its-creation
For more information on TrapWire, visit their website: https://trapwire.com/

24. Tetsuo Nozawa, Nikkei Electronics 2007. “Hitachi Achieves 0.05-mm Square Super Micro RFID Tag, ‘Further Size Reductions in Mind.’” Tech-On Tech & Industry Analysis from Asia.
http://techon.nikkeibp.co.jp/english/NEWS_EN/20070220/127959/

 

Copyright © 2013 Michael Allen. All rights reserved.

 

Show more