NSA Creating Spy System To Monitor Domestic Infrastructure
The National Security Agency has begun work on an "expansive" spy system that will monitor critical infrastructure inside the United States for cyber-attacks, in a move that detractors say could end up violating privacy rights and expanding the NSA's domestic spying abilities.
The Wall Street Journal cites unnamed sources as saying that the NSA has issued a $100-million contract to defense contractor Raytheon to build a system dubbed "Perfect Citizen," which will involve placing "sensors" at critical points in the computer networks of private and public organizations that run infrastructure, organizations such as nuclear power plants and electric grid operators.
Read more »
The Government Can Use GPS to Track Your Moves
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway — and no reasonable expectation that the government isn't tracking your movements.That is the bizarre — and scary — rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants — with no need for a search warrant.
Read more »
RFID Tag System
(Wal-Mart RFID tags to Track Clothing. A Wal-Mart employee uses a handheld scanner to read EPC labels on men's denim jeans.)
Radio-frequency identification (RFID) tags are embedded in a growing number of personal items and identity documents. Because the tags were designed to be powerful tracking devices and they typically incorporate little security, people wearing or carrying them are vulnerable to surreptitious surveillance and profiling. Read more »
Iris Recognition
The iris offers a rich source of data for biometric measurement.
The patterns of the iris are unique and templates derived from the iris can yield identification performance which is better than DNA matching.
The iris is the only internal organ visible from the outside and is protected from environmental factors (such as dirt and abrasion) which can afflict other biometrics. Iris recognition offers advantages in accuracy, high speed of exhaustive search, non contact with sensors and passive collection methods.
In conclusion iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
Biometrics
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
Though the field is still in its infancy, many people believe that biometrics will play a critical role in future computers, and especially in electronic commerce. Access levels will include the ability to use credit card information to make electronic purchases.
In the future biometrics will be used to identify and then control and monitor individuals or people in groups that are under surveillance. (Such as: prisoners, terrorists, and people that are a known threat or suspicious of being involved in an illegal or dishonest activity and are at risk to the government or police, etc.)
Echelon (Signals Intelligence)
Trillions of bytes of textual archive and thousands of online users, or gigabytes of live data stream per day that are filtered against tens of thousands of complex interest profiles.
Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world’s telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world. The United States National Security Agency (NSA) uses Echelon to intercept and process international communications passing via communications satellites also. It is one part of a global surveillance systems that intercept messages from the Internet, from undersea cables, from radio transmissions, from secret equipment installed inside embassies, or use orbiting satellites to monitor signals anywhere on the earth's surface.
Read more »
The Knights Templar And The Illuminati
No one exploring the myriad myths and tales of secret societies can leave out the unbelievably popular Knights Templar. There are links between this medieval order of warrior monks and Muslims, Masons, and even heretics, so we need to get a grasp of their darker side.
Whether stars of the Disney film National Treasure or pawns of modern-day political and commercial propaganda, the Knights Templar have taken root as one of the world’s leading mystery groups. But what is the truth? Did they really have a great secret? Did they really hide treasure? Were they really guardians of the Holy Bloodline? Let’s take a look.
Supposedly a group of nine knights were taken from the ruling nobility in the region of France known as Champagne, collected themselves together in Jerusalem around 1118 A.D., and formed the now infamous Knights Templar.
Read more »
The National Security Agency has begun work on an "expansive" spy system that will monitor critical infrastructure inside the United States for cyber-attacks, in a move that detractors say could end up violating privacy rights and expanding the NSA's domestic spying abilities.
The Wall Street Journal cites unnamed sources as saying that the NSA has issued a $100-million contract to defense contractor Raytheon to build a system dubbed "Perfect Citizen," which will involve placing "sensors" at critical points in the computer networks of private and public organizations that run infrastructure, organizations such as nuclear power plants and electric grid operators.
Read more »
How America’s Police Became An Army: The 1033 Program
As many have noted, Ferguson, Missouri, looked like a war zone. And its police — kitted out with Marine - issue camouflage and military - grade body armor, toting short-barreled assault rifles, and rolling around in armored vehicles — are indistinguishable from soldiers.
America has been quietly arming its police for battle since the early 1990s.
Faced with a bloated military and what it perceived as a worsening drug crisis, the 101st Congress in 1990 enacted the National Defense Authorization Act.
Section 1208 of the NDAA allowed the Secretary of Defense to "transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is — (A) suitable for use by such agencies in counter-drug activities; and (B) excess to the needs of the Department of Defense." It was called the 1208 Program. In 1996, Congress replaced Section 1208 with Section 1033.
The idea was that if the U.S. wanted its police to act like drug warriors, it should equip them like warriors, which it has—to the tune of around $4.3 billion in equipment, according to a report by the American Civil Liberties Union. The St. Louis County Police Department’s annual budget is around $160 million. By providing law enforcement agencies with surplus military equipment free of charge, the NDAA encourages police to employ military weapons and military tactics.
Read more »
Full Body Scanners
(A TSA Agent working for Homeland Security views naked full-body images.)
What are full-body scanners? Remember the X-ray specs of science fiction comics that would let people see through walls and clothing? Full-body scanners are a bit like them. The scanners take advantage of the fact that at certain wavelengths,
electromagnetic waves can pass through clothes but not through the skin, metal or substances such as drugs and explosives. If your eyes were sensitive to these wavelengths like the scanners, every person you meet would appear naked, with pens, coins, belt buckles and the like magically festooned about their person.
You would also be able to see if they were carrying a knife, gun or explosives.
What are the health concerns surrounding them? There are two main types of full-body scanner. One uses X-rays while the other uses lower-energy millimetre wavelengths.
Read more »
Read New rules for those who refuse patdowns.
The Coming False Prophet
A LAMB WITH TWO HORNS!
(Many believe that a pope will be the false prophet of Revelation 13: 11, and that this pope will unite the world's many faiths and then compel/force the masses to worship the antichrist. The time frame for this will be in the middle of the final seven year period.)
Pope Francis celebrated his inaugural mass among political and religious leaders from around the world. Delegations from 33 Christian Churches and 132 national governments or international organizations, as well as Jewish, Muslim and Buddhist leaders, came to Rome for Pope Francis' inauguration mass. The Patriarch of Constantinople, Bartholomew I, was among them. It was the first time that the top representative of the Orthodox Church had attended a papal inauguration since the split with Rome in 1054.
'And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH'. (Revelation 17:5) What will be the final form of Babylon the Great? We can be sure that the Whore:
(1) Will be personified as 'the False Prophet' (Revelation 16:13). Since Babylon the Great only rides the Beast, i.e., 'I saw a woman sit upon a scarlet coloured beast [the Antichrist]' (17:3), she is not to be confused with the Beast himself.
Read more »
As many have noted, Ferguson, Missouri, looked like a war zone. And its police — kitted out with Marine - issue camouflage and military - grade body armor, toting short-barreled assault rifles, and rolling around in armored vehicles — are indistinguishable from soldiers.
America has been quietly arming its police for battle since the early 1990s.
Faced with a bloated military and what it perceived as a worsening drug crisis, the 101st Congress in 1990 enacted the National Defense Authorization Act.
Section 1208 of the NDAA allowed the Secretary of Defense to "transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is — (A) suitable for use by such agencies in counter-drug activities; and (B) excess to the needs of the Department of Defense." It was called the 1208 Program. In 1996, Congress replaced Section 1208 with Section 1033.
The idea was that if the U.S. wanted its police to act like drug warriors, it should equip them like warriors, which it has—to the tune of around $4.3 billion in equipment, according to a report by the American Civil Liberties Union. The St. Louis County Police Department’s annual budget is around $160 million. By providing law enforcement agencies with surplus military equipment free of charge, the NDAA encourages police to employ military weapons and military tactics.
Read more »
(A TSA Agent working for Homeland Security views naked full-body images.)
What are full-body scanners? Remember the X-ray specs of science fiction comics that would let people see through walls and clothing? Full-body scanners are a bit like them. The scanners take advantage of the fact that at certain wavelengths,
electromagnetic waves can pass through clothes but not through the skin, metal or substances such as drugs and explosives. If your eyes were sensitive to these wavelengths like the scanners, every person you meet would appear naked, with pens, coins, belt buckles and the like magically festooned about their person.
You would also be able to see if they were carrying a knife, gun or explosives.
What are the health concerns surrounding them? There are two main types of full-body scanner. One uses X-rays while the other uses lower-energy millimetre wavelengths.
Read more »
Read New rules for those who refuse patdowns.
A LAMB WITH TWO HORNS!
(Many believe that a pope will be the false prophet of Revelation 13: 11, and that this pope will unite the world's many faiths and then compel/force the masses to worship the antichrist. The time frame for this will be in the middle of the final seven year period.)
Pope Francis celebrated his inaugural mass among political and religious leaders from around the world. Delegations from 33 Christian Churches and 132 national governments or international organizations, as well as Jewish, Muslim and Buddhist leaders, came to Rome for Pope Francis' inauguration mass. The Patriarch of Constantinople, Bartholomew I, was among them. It was the first time that the top representative of the Orthodox Church had attended a papal inauguration since the split with Rome in 1054.
'And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH'. (Revelation 17:5) What will be the final form of Babylon the Great? We can be sure that the Whore:
(1) Will be personified as 'the False Prophet' (Revelation 16:13). Since Babylon the Great only rides the Beast, i.e., 'I saw a woman sit upon a scarlet coloured beast [the Antichrist]' (17:3), she is not to be confused with the Beast himself.
Read more »
Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway — and no reasonable expectation that the government isn't tracking your movements.That is the bizarre — and scary — rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants — with no need for a search warrant.
Read more »
(Wal-Mart RFID tags to Track Clothing. A Wal-Mart employee uses a handheld scanner to read EPC labels on men's denim jeans.)
Radio-frequency identification (RFID) tags are embedded in a growing number of personal items and identity documents. Because the tags were designed to be powerful tracking devices and they typically incorporate little security, people wearing or carrying them are vulnerable to surreptitious surveillance and profiling. Read more »
The iris offers a rich source of data for biometric measurement.
The patterns of the iris are unique and templates derived from the iris can yield identification performance which is better than DNA matching.
The iris is the only internal organ visible from the outside and is protected from environmental factors (such as dirt and abrasion) which can afflict other biometrics. Iris recognition offers advantages in accuracy, high speed of exhaustive search, non contact with sensors and passive collection methods.
In conclusion iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
Though the field is still in its infancy, many people believe that biometrics will play a critical role in future computers, and especially in electronic commerce. Access levels will include the ability to use credit card information to make electronic purchases.
In the future biometrics will be used to identify and then control and monitor individuals or people in groups that are under surveillance. (Such as: prisoners, terrorists, and people that are a known threat or suspicious of being involved in an illegal or dishonest activity and are at risk to the government or police, etc.)
Trillions of bytes of textual archive and thousands of online users, or gigabytes of live data stream per day that are filtered against tens of thousands of complex interest profiles.
Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world’s telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world. The United States National Security Agency (NSA) uses Echelon to intercept and process international communications passing via communications satellites also. It is one part of a global surveillance systems that intercept messages from the Internet, from undersea cables, from radio transmissions, from secret equipment installed inside embassies, or use orbiting satellites to monitor signals anywhere on the earth's surface.
Read more »
No one exploring the myriad myths and tales of secret societies can leave out the unbelievably popular Knights Templar. There are links between this medieval order of warrior monks and Muslims, Masons, and even heretics, so we need to get a grasp of their darker side.
Whether stars of the Disney film National Treasure or pawns of modern-day political and commercial propaganda, the Knights Templar have taken root as one of the world’s leading mystery groups. But what is the truth? Did they really have a great secret? Did they really hide treasure? Were they really guardians of the Holy Bloodline? Let’s take a look.
Supposedly a group of nine knights were taken from the ruling nobility in the region of France known as Champagne, collected themselves together in Jerusalem around 1118 A.D., and formed the now infamous Knights Templar.
Read more »