The New World Order
The New World Order
It's An Evil And Sinister Conspiracy That Involves Very Rich And Powerful People Who Mastermind Events And Control World Affairs Through Governments And Corporations And Are Plotting Mass Population Reduction And The Emergence Of A Totalitarian World Government!   By Using Occult Secret Societies Along With The Power Of LUCIFER The ILLUMINATI Will Bring All Of The Nations Of This World Together As One.
NSA Wants “EZ Pass” Control for Internet

Kurt Nimmo

July 30, 2012

General Keith Alexander, the NSA boss, wants the government to centralize the internet and force users to use a system analogous to EZ Pass.
EZ Pass is an RFID transponder system used for toll collection on roads, bridges, and tunnels in the United States.
“What we need for cybersecurity is something analogous to that,” Alexander told the annual Def Con computer hacking conference in Las Vegas.. “Think of us as the EZ Pass on the highway.”
“When you go down the highway, and you go down the EZ Pass lane, what you’re doing is sending that code. That system is not looking in your car, reading the e-mail, or intercepting anything, it’s just getting that code,” he said.
In other words, the government should vet all users with a checkpoint. “All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,” said Alexander.
The super secret cryptologic intelligence agency wouldn’t track and scrutinize your behavior on the internet, according to Alexander. The EZ Pass “system is not looking in your car, reading the e-mail, or intercepting anything, it’s just getting that code,” he insisted.
EZ Pass, however, does not simply “get the code” and allow access to the highway. It trades “a bit of privacy for a load of convenience,” the New York Times pointed out in 2005.
The NSA’s latest scheme to track and trace the online behavior of Americans – despite Alexander’s assertions to the contrary – is part of a long history of poking into the private affairs of Americans.
Following Truman’s executive order creating the super-secret intelligence agency in 1952 as an instrument of the national security state, the NSA launched Operation Shamrock. The secret operation illegally intercepted the telegrams of Americans without a search warrant and the telecoms of the day fully cooperated, according to L. Britt Snider, a congressional investigator who uncovered Shamrock.
A few months after the 9/11 attacks, then president Bush “secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials,” the New York Times reported in 2005.
NSA officialdom attempted to portray the warrantless searches as “a sea change” and new territory for the agency – insisting that all previous searches were conducted on overseas communications – despite Operation Shamrock and the distinct possibility the agency has engaged in likewise activity over its 60 year history.
In order to convert a decentralized internet into a massive centralized surveillance and tracking system, the government will have to sell us on the largely bogus threat of cyber attacks and the over-hyped prospect of “dirty numbers” shutting down power grids and the computer networks that run America’s infrastructure.
In fact critical infrastructure is not connected to the internet and the threat posed by hackers (who may or may not be government operatives) is largely an issue for under-protected government and corporate networks.
Alexander peddled his scripted propaganda line in February when he told the Wall Street Journal that the hacktavist collective Anonymous may soon have the capability to take down the power grid in the United States through a cyberattack. Techies up to speed on the technology, however, dismissed Alexander’s propaganda as absurd.
Jerry Brito, senior research fellow with the Mercatus Center at George Mason University, told SecurityNewsDaily that while Anonymous is capable of defacing websites and engaging in disruptive denial of service attacks, it would take the resources of government to knock out networks. As an example, consider the United States and Israel taking down Iran’s nuclear infrastructure with finely honed malware.
The government and its super-secret intelligence agencies will not rest until they convert the internet – in fact, the entire telecommunications system – into a real-time surveillance and tracking tool.
Unfortunately, we are but one manufactured false flag event away from that possibility becoming a reality.

New World Order
Fair Use Notice
A 'New World Order' - Blog - Lots Of Bible
Prophecy Charts, Pdf, Video, & Mp3 Links
Who Is Jesus Christ?
The salvation message.
Click here mp3
Free Prophecy Ebook
Complete Article Lists:
List 1,     List 2,     List 3
Social Media     Share Or Like This Blog     Link
To This Site,   Inform Others,   Let Others Know
RSS Feed

I love high technology,
running,   listening to
music,   and traveling.
Daily run in   S. Korea

Disclaimer: The information provided on this site is for entertainment and educational use only.   This website's sole purpose is to inform & enlighten with no other objective intended.   Freely distribute and share this information.   Full Disclaimer Statement:   Link
"God so loved the world that He gave His only Son, so that whoever believes in Him should not perish, but have everlasting life." John 3:16.   "For whosoever shall call upon the name of the Lord shall be saved." Romans 10:13