Sympathetic Vibratory Physics - It's a Musical Universe!
 
 SVP Notes
 
  SVP Notes Index

SCIENCE, UNSPIRITUAL

Text: Rat Shenanigans Lee Adams Lee Adams, an expert on counter-surveillance, focuses on the technology of repression and reveals how the world's bureau-rats use it against you. You're about to lose something. It's already slipping from your grasp. Once it's gone, you'll never get it back. As a people, we are facing the most serious threat to humanity in recorded history the systematic stripping away of traditional freedoms by governments world-wide. That includes all governments. It is a situation far more serious than the plagues of the Middle Ages that nearly wiped us out as a species. It is a threat never before seen in ten thousand years of human history. You are about to become the property of the government. A Question Of Control A number of separate threats have recently converged. An extremely dangerous situation has been created. Governments have been given the opportunity, and the means, to permanently wrest control from their populations. Bureaucrats are about to realise their dream of absolute power. It is a nightmare far worse than anything George Orwell might have imagined. Technology is providing the tools to government. We are now at a point in human evolution where your government, if it so chooses, can control every aspect of your life from cradle to grave. We face three separate threats. Together these threats combine to give government a stranglehold on our civil liberties Ð a death grip on our traditional freedoms. Threat Number One Computers have taken over surveillance. Surveillance is now automated. Entire populations can be supervised and monitored in real time. Half your life, including your last credit card purchase, is already on a database. Computers eavesdrop on all electronic and telephone communications using word-recognition and voice-recognition software. Video cameras are everywhere inside and outside they can recognise vehicle license plates and even human faces. All this information, all these databases, are cross-referenced and tied together by computers. Taken together, it's called dataveillance. It make it easy to track certain classes of people. Like minorities. Or dissidents. Or grassroots political movements. Or anyone who dares think for himself. Threat Number Two Militarisation has taken over the police. The cops are now using some very nasty weapons. Half the stuff they use is prohibited by the Geneva Convention and the Hague Declaration. The government can't use it in war, but their own population is fair game. Modern police technology gives a whole new meaning to crowd control. They use sticky foam laced with chemical irritants; new mark-free interrogation tools; new friendlier, more humane weapons like plastic bullets, pepper gas, and stun guns that still maim, scalp, burn, mutilate, and kill. Threat Number Three Big business has taken over proliferation. Any government bureaucrat can buy this stuff. Most of these high-tech gadgets are dual-use. You can use them for benign things like traffic control Ð or nasty things like people control. Private companies are reaping huge profits manufacturing and exporting this nightmarish technology. Research and development has gone berserk. Who cares about trivial things like human rights when there's a buck to be made? Heck, if anyone complains just order the $100,000 mobile execution vehicle Ð it comes complete with a lethal injection machine, steel holding cell, and areas for "witnesses" and "staff". Wake-Up Call This is what our governments have been up to while we've been asleep at the wheel. They've been busy making choices. About technology and how to use it: Should technology serve the existing power structure or should it serve the population? Should technology be used to protect the government or should it be used to protect the people? Well, folks, they decided to protect themselves rather than us. Government for the people is bureaucrat old-think. Government against the people is bureaucrat new-think. Simply stated, it's hidden-control versus democratic accountability - and hidden-control is winning. What does all this mean for you and me? Well, it's becoming a lot easier for politicians to use force rather than fix social problems. It's becoming more tempting for them to choose coercion rather than co-operation. Negotiation and compromise are outdated concepts. Even worse, the new technology makes it easy for them to disguise the amount of coercive force they're using. Put yourself in their shoes. Why go to the trouble of consulting with the people? Why go to the trouble of negotiating with protesters? Why bother listening to dissenting points of view? Instead, all you need do is pick up the phone and arrange their destruction. A few words from the bureaucrat and the political control apparatus swings into gear - computerised nation-wide surveillance of potential troublemakers; militarised police SWAT teams for demonstrations and meetings; and at all times, a friendly salesrep standing by in case government needs more fiendish devices for controlling its citizens. How to make people say yes. When authority fails, repression begins. Eventually terror becomes official government policy. Look around you. Futuristic scenario? Sci-fi thriller? Hollywood's next blockbuster? Nope. Get real. It's already here. Stop and think. Waco. Vickie Weaver. No-knock search warrants. Property confiscation. National identity cards. A cashless society. Across the USA, more and more people worry that governing-by-authority has become ruling-through-repression. Governments today can arm themselves with ghoulish tool kits for political control over individuals Ð over entire populations. Most people are unaware of the nightmarish systems that technology has made available to bureaucrats. It ain't pretty. And it ain't cheap. But, hey, it's your money they're spending to protect themselves from you. What is the real problem? The crux of the problem is bureaucrats who don't like people. They don't care about people the way you and I do. They only care about themselves Ð and power. Technology is about to give these social misfits the power to exercise absolute political control over entire populations. The scientists who are providing this technology refuse to accept blame for how their monstrous devices are used. These antisocial idiot-savants have created the ultimate Frankenstein's monster a juggernaut that will make world-wide slavery a reality. Background To provide some perspective, this expose is based on information from official sources. Recently the European Parliament commissioned a study about political control in today's world. What you are reading is based on that study. The study was intended as a guide for Members of the European Parliament. Its purpose to inform them about recent developments in technology useful for political control over people. The resulting document, released through the Directorate General for Research, was a political bombshell. The report first surfaced on 6 January 1998 in Luxembourg as a consultative version of a working document. The original document is a whopping 293 KB in size. It is available on the Web at http://www.jya.com/stoa-atpc.htm. A 112-page paper version is available from the European Parliament department responsible, at fax number 352-4300-22418. Twisted Science New technology for political control over people. The crisis has been about thirty years in the making. In 1972 the British Society for Social Responsibility in Science issued a warning about the emergence of a "new technology of repression". In 1977 a report called The Technology of Political Control further described the looming menace. Britain, with help from its allies, was using the conflict in Northern Ireland as a laboratory. The authorities tested new technologies of repression and control on a large population. They perfected watchtowers built over underground three-story bunkers. These filled with computers that used sonar and infrared technology to watch people through the walls of their homes. The arrogant British soldiers couldn't resist gloating; they routinely taunted and humiliated Irish women by describing the undergarments they were wearing. Keep this in mind the next time you see a snooty British prime minister on TV waxing eloquent about principles. The fact that the IRA was able to operate in such an environment is a testament to their counter surveillance and insurgency skills. The US, with help from its allies, further refined the technology during the Vietnam war and afterwards. Smart bombs. Surveillance satellites. Psychological profiling. Defoliants. Stealth aircraft. Stun guns. Motion sensors. Night vision. Human odour sensors. DNA fingerprinting. Kill fencing. Helicopter-based telephoto surveillance. Laser sights. Repellent electrified panels on crowd-control vehicles. Psychological-based torture techniques. There has been a dramatic change in the technology of socio-political control during the previous 25 years, especially in the USA, UK, Germany, and France. Yet there has been no control over the research, manufacture, deployment, and export of these new technologies. Outdated laws and regulations have simply not kept pace. Much of this new technology is dual-use, so it can be purchased under misleading pretences. The video surveillance cameras in Tiananmen Square were purchased from a US company as an advanced traffic control system. They enabled China's dreaded security service, the Guoanbu, to identify and arrest all of the activists who were demonstrating for democracy. A New Type Of Weaponry Simply stated, the technology of political control is a new type of weaponry. This technology is used to neutralise the state's internal enemies. In most cases this means the population. Most governments today see their own population as the major threat to their existence. The technology of political control is made up of three components Ð hardware, software, and liveware. Hardware is the apparatus. It consists of instruments, tools, machines, appliances, weapons, and gadgets. Software is the method. It consists of standard operating procedures, routines, skills techniques, and methods. Liveware is the implementation. It consists of the human element Ð rationalised human social organisations, arrangements, systems, and networks. This new technology has created a growing pattern of abuses. It threatens the rights of assembly, privacy, and due process. It smothers freedom of political and cultural expression. It weakens what little protection we have against arbitrary arrest, torture, and extra-judicial execution. What makes this new technology so scary is the people using it. Bureaucrats. Faceless people operating behind closed doors. Unaccountable. Uncaring. Unrelenting. Even in the so-called democracies, it is the bureaucrat who runs the show. A well-documented phenomenon called bureaucratic capture is the cause. Around the world, senior bureaucrats in government control their elected ministers, rather than the other way around. Elected politicians may come and go, but the bureaucrat remains Ð as a virtual dictator. If there is such a thing as a ghoul, surely it is the bureaucrat. The Police-Industrial Complex During the 1990s huge sums are being spent on the research, development, procurement, and deployment of new technology for police and internal security forces. A massive police-industrial complex has come into being. It is similar to the military-industrial complex. Many companies are doing business in this newly-emerging market. There are huge profits being made. From the bureaucrat's viewpoint, all this is good. It increases efficiency and cost-effectiveness. After all, only those with something to hide resist, right? To the bureaucrat's way of thinking, the use of so-called minimum force is always justifiable. Existing regulations and controls are satisfactory. After all, technology upholds democracy, they assert. That's just polite talk for what's really happening. Social conflicts and their participants are either reconciled, managed, repressed, lost, or efficiently destroyed. This ruthless application of cold logic is made possible by the new technology of political control Ð and by a class of bureaucrats who simply don't like people except for the rich and powerful for whom they act. Privacy Forbidden. New surveillance capabilities. Life was a lot simpler 40 years ago at the peak of the Cold War. In 1963 the East German security service (the notorious Stasi) used 500,000 informants to monitor and intimidate the population. The Stasi needed a staff of 10,000 agents just to eavesdrop on telephone calls throughout East Germany. That was then. This is now. Today an entire population can be automatically monitored. The trick is to use computers running word-recognition software. Every telephone conversation is scanned for suspicious words. If any are found the conversation is stored on disk for a human agent to review at a later time. Today's computers also feature voice-recognition software. The security service can tell who is making the call, even if it's from a public pay telephone. More unsettling is the newest generation of mapping software. It creates a graphic display. A city map showing locations of who-called-who. It makes police roundups a lot easier. (Alas, the more things change, the more they stay the same. 40 years ago the East German security service rounded up dissidents during a so-called ratissage a rat hunt. Today the FBI calls it a no-knock entry.) This computer hardware and software may seem impressive, but in the USA the National Security Agency continues to push the envelope with self-learning neural network software that uses human-like artificial intelligence. Technology that gives the government tremendous power over us. Looking For Trouble Today's surveillance apparatus is routinely used by both the government security service and the police. They go on fishing expeditions; looking for trouble that doesn't yet exist. Or creating trouble where none exists. The security service uses surveillance to track dissidents, journalists, human rights activists, student leaders, political opponents, and union leaders. This is illegal, of course. The police use surveillance for pre-emptive policing. They track certain classes of people. This surveillance, identification, and networking results in mass routine surveillance of large segments of the population without the need for warrants and formal investigations. This too is illegal, of course. Huge amounts of low-grade intelligence are created. It is used by the government to monitor certain social classes of people and certain races of people living in so-called red-lined areas before any crime is committed. Hey, in the eyes of the government, you're automatically presumed to be guilty and deserving of surveillance. The Curse Of Dataveillance When computers are employed to tie together unrelated databases for use by the security service or police, it is called dataveillance. In the USA, 700 databases can be monitored simultaneously. A surveillance team has instant access to your driver's license, your marital status, your last credit card purchase, the mortgage on your house, your health records, your employment history, your tax return, political contributions, and a potpourri of other personal information. Combine this information with a network of closed-circuit television cameras (CCTV) and you've got an impressive apparatus for population control. So-called traffic-control cameras can recognise vehicle license plates Ð and track your movement around the city. Cameras in shopping malls, retail stores, fast food outlets, parking lots, and other public places can track you on foot. When this network of surveillance devices is tied together by computer networks, it results in pre-emptive policing. The system targets certain classes of people rather than specific types of criminal activity. Much of the surveillance apparatus is automatic. It runs on artificial intelligence. Now it starts to get scary. Here's why. This massive apparatus of surveillance and repression can easily be refocused and retargeted if the political environment changes. Even in the world's so-called democracies. All it takes is a word from the nation's leader to declare a national emergency and implement special measures (polite talk for setting up a dictatorship). Imagine living under a dictator equipped with such enormous capabilities of surveillance, repression, and control over the general population. Hitler and Stalin were a couple of milquetoasts compared to what's coming next. What we're talking about here are huge police databases and widespread abuse of civil liberties. Systems like this are usually first forced on groups with little political power like welfare recipients, the unemployed, and minorities. If they complain about invasion of privacy, no one listens. Then, as the oppression begins to be accepted, the dataveillance system is expanded up the socio-economic system. The potential for abuse is so great that legislators in Denmark have banned CCTV systems. It's the only country in the world to do so. Some legislators in Europe were so alarmed that they passed Article 15 of the 1995 European Directive on the Protection of Individuals, which grants everyone the right "not to be subject to a decision which produces legal effects concerning him which is based solely on the automatic processing of data". Automatic video-camera speed-traps are making a mockery of that legislation. (I am embarrassed to admit that a key manufacturer of this new radar-trap technology is actually located in the city where I live.) The core issue. As few as 20 years ago, personal information about each of us was fragmented. It was stored in many separate, unrelated locations. It was extremely difficult to acquire and collate. That's where the safety factor was. It's gone now. In today's world, networked computers make retrieval easy. Cross-referencing and collating is a snap. It is A bureaucratic heaven for the unelected, sociopathic, control-freaks that run the system. Biometric Systems The spread of computer-driven biometric systems promises even greater loss of individual privacy. These devices include automatic fingerprint readers and human identity recognition systems that analyse individual human characteristics: genes, odour, signatures, and the pattern of capillaries at the back of the retina. For example, databases of DNA fingerprints are popular with police in Britain. The data is already being used to justify pre-dawn raids on large groups of suspects in the UK. Even more disturbing, face recognition systems are being tested in the USA, France, and Germany. In a few short years, you can expect FBI SWAT teams to be kicking in doors at 5 am - simply because some computer program has concluded that your facial characteristics may match the description given under duress by some sleazy informant. Other Goodies For Bureaucrats Bureaucrats and their toadies can choose from a well-stocked tool kit of surveillance and oppression gadgets. Night vision systems. Recognition and tracking of human heat signatures in total darkness. Helicopter-based telephoto surveillance. Passive millimeter wave imaging that can see through clothing Ð this will add a new dimension to airport pre-flight screening areas. In today's world, electronic bugs are disguised as light fixtures, telephone packages, telephones, clocks, cable-TV decoders, even cockroaches. Multi-room monitoring systems are becoming popular with both the police and the government security service. Low-intensity magnetic pulse tools can be used to momentarily disrupt your thinking and confuse you. A number of companies are currently selling converted notebook computers that can eavesdrop on all cellular telephone conversations in a given area. The software is compatible with Windows 95. Simply scroll down the menu and click on the number(s) you want to listen to. The Interception Networks The scope of the system is mind-boggling. For example, all email, telephone, and fax communication is routinely intercepted by the NSA in Europe, USA, Central America, South America, Canada, and Mexico. Project Echelon taps into the system of Intelsat satellites and the world's long-distance telephone calls, Internet communications, email transmission, faxes, and telexes. This is a billion dollar intelligence-gathering network. It is used by NSA to monitor everything from dissidents to the activities of international banks. Data processing sites are located at Yakima (USA), Wailhopai (New Zealand), Geralton (Australia), Hong Kong, and Morwenstow (UK). Other countries, Canada and Germany. for instance, are also key participants in the data-gathering scheme. Whistle-blowers inside Project Echelon are claiming widespread abuse, including malpractice and negligence. Even Amnesty International is routinely under surveillance by the spooks. Not to be outdone, the European Union (EU) is in the process of setting up its own massive eavesdropping network. A Call To Action A hundred years ago, privacy was taken for granted. It took a lot of time and effort for the authorities to invade your privacy. Today the situation is reversed. Surveillance is the norm. The technology of political control has made it very easy for the authorities to watch you. It takes deliberate effort by you to enforce your right to be left alone. In today's world, you must earn the right to privacy. By doing nothing, you forfeit your privacy. Your life becomes an open book. Any bureaucrat can watch you. What can you do? Be aware of what's really going on. Quietly resist. In your own way, work against the dehumanising political control that government is trying to implement. Learn counter-surveillance skills. Protect what is left of your freedom. Learn activist tactics and go underground if you feel you have to. But act soon. About The Author Lee Adams founded Lee Adams Seminars in 1994. His purpose is to provide business skills training in the methods of personal persuasion he had learned during a decade of encounters with some of the world's most sophisticated intelligence agencies and security services. ===== FREE WORLD ORDER: ==== Please use the following topic codes in the subject field: PRAC = Practical Freedom FPHL = Freedom Philosophy BBAL = Big Brother Alerts FPSY = Freedom Psychology PRIV = Privacy & Protection CURE = Cure from Religious Superstition XIRS = Tax Freedom (IRS) NUDE = At Ease with Nudity XTAX = Tax Freedom (Elesewhere) POLY = At Ease with Polygamy EXSS = Exiting "social security" ESEX = At Ease with Sexuality ECON = Economic Means to Freedom HUMR = Humor NETW = Freedom Business Networking PPIN = Personal Power & Influence ACUR = Alternative Currency MARK = Freedom Marketing PHYT = Physical Freedom Technology FRAD = Freedom Advantages SOLU = Expert Solutions Support GENL = General LANG = Language of Freedom META = List Operation HEAL = Health/Life Extension WEBS = Website Suggestions TO UNSUBSCRIBE, mailto: fwo-list-request@free-market.net In message body: unsubscribe More list information:

See Also:

Source:

Top of Page | Master Index | Home | What's New | FAQ | Catalog