Insert body text here ...

truth snippet the crowhouse Link button Global Targeting System

5G

Part 1 StateoftheNation Free Book Copy 1 the last kings of shangai Article Video B.O'Connell Las Vegas Massacre Doc The Shadow Empire eye New Documentary on Torture The Path to Immortality Post-Humanism

This is where the Globalist Oligarchs

are directing human evolution to:

Amazing Polly Article UK Column Crime Bodge Truthstream media Hocus Pocus Computing Forever

 

 

 

Matrix-Mania_1

The Surveillance State

The surveillance state is a government's surveillance of large numbers of citizens and visitors. Such widespread surveillance is most usually justified as being necessary to prevent crime or terrorism. The growth of state surveillance has led to concerns about the erosion of privacy and civil liberties, and also to worries that over-reliance on such measures may lead to complacency by law enforcement officers.

surv ss

Social Crediting

 

Examples of fully realised surveillance states are the Soviet Union, and the former East Germany, which had a large network of informers and an advanced technology base in computing & spy-camera technology. (Castells, M. The Rise of the Network Society, 2000).

 

 

 

But they did not have today's technologies for mass surveillance, such as the use of databases and pattern recognition software to cross-correlate information obtained by wire tapping, including speech recognition and telecommunications traffic analysis, monitoring of financial transactions, automatic number plate recognition, the tracking of the position of mobile telephones, and facial recognition systems and the like which recognise people by their appearance, gait, etc.

surv

More recently, the United Kingdom is seen as a pioneer of mass surveillance. At the end of 2006 it was described by the Surveillance Studies Network as being 'the most surveilled country' among the industrialized Western states.[1]

 

The ability to gather information about citizens is increased by mandating new checks on paper-based records, such as increased checking of employees' qualifications and CV's, and by the introduction of digitised biometric data in identity documents and their corresponding databases, and the cross-correlation of this data with DNA testing databases.

 

Some technological developments work in favour of the citizen rather than the state, especially communications software that uses strong encryption.

 

Many advanced nation-states have implemented laws that partially protect citizens from unwarranted intrusion - such as the Data Protection Act 1998 in the United Kingdom, and laws that require a formal warrant before invading someone's privacy.

sat

Echelon-Global Spy System

 

ECHELON is a name used in global media and in popular culture to describe a signals intelligence (SIGINT) collection and analysis network operated on behalf of the five signatory states to the UKUSA Security Agreement[1] (Australia, Canada, New Zealand, the United Kingdom, and the United States, referred to by a number of abbreviations, including AUSCANNZUKUS[1] and Five Eyes).[2][3] It has also been described as the only software system which controls the download and dissemination of the intercept of commercial satellite trunk communications.[4]

 

ECHELON was reportedly[by whom?] created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early 1960s.[citation needed]

 

 

The system has been reported in a number of public sources.[5] Its capabilities and political implications were investigated by a committee of the European Parliament during 2000 and 2001 with a report published in 2001,[6] and by author James Bamford in his books on the National Security Agency of the United States.[4] The European Parliament stated in its report that the term ECHELON is used in a number of contexts, but that the evidence presented indicates that it was the name for a signals intelligence collection system. The report concludes that, on the basis of information presented, ECHELON was capable of interception and content inspection of telephone calls, fax, e-mail and other data traffic globally through the interception of communication bearers including satellite transmission, public switched telephone networks (which once carried most Internet traffic) and microwave links.[6]

 

Bamford describes the system as the software controlling the collection and distribution of civilian telecommunications traffic conveyed using communication satellites, with the collection being undertaken by ground stations located in the footprint of the downlink leg.

 

Science Of Surveillance

 

whistle-blower-featured

Domestc Drones

Intelligence monitoring of citizens, and their communications, in the area covered by the AUSCANNZUKUS security agreement has caused concern. British journalist Duncan Campbell and New Zealand journalist Nicky Hager asserted in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes.[10] Examples alleged by the journalists include the gear-less wind turbine technology designed by the German firm Enercon[6][11] and the speech technology developed by the Belgian firm Lernout & Hauspie.[12] An article in the US newspaper Baltimore Sun reported in 1995 that European aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the US National Security Agency reported that Airbus officials had been bribing Saudi officials to secure the contract.[13][14]

 

In 2001 the Temporary Committee on the ECHELON Interception System recommended to the European Parliament that citizens of member states routinely use cryptography in their communications to protect their privacy, because economic espionage with ECHELON has been conducted by the US intelligence agencies.[6]

 

Bamford provides an alternative view, highlighting that legislation prohibits the use of intercepted communications for commercial purposes, although does not elaborate on how intercepted communications are used as part of an all-source intelligence process.

 

 

 

Unmanned aerial vehicles (UAVS), also known as drones, are aircraft either controlled by ‘pilots’ from the ground or increasingly, autonomously following a pre-programmed mission. (While there are dozens of different types of drones, they basically fall into two categories: those that are used for reconnaissance and surveillance purposes and those that are armed with missiles and bombs. The

 

use of drones has grown quickly in recent years because unlike manned aircraft they can stay aloft for many hours (Zephyr a British drone under development has just broken the world record by flying for over 82 hours nonstop); they are much cheaper than military aircraft and they are flown remotely so there is no danger to the flight crew.

 

 

 

police_drone-1324245818393

While the British and US Reaper and Predator drones are physically in Afghanistan and Iraq, control is via satellite from Nellis and Creech USAF base outside Las Vegas, Nevada. Ground crews launch drones from the conflict zone, then operation is handed over to controllers at video screens in specially designed trailers in the Nevada desert. One person ‘flies’ the drone, another operates and monitors the cameras and sensors, while a third person is in contact with the “customers”, ground troops and commanders in the war zone. While armed drones were first used in the Balkans war, their use has dramatically escalated in Afghanistan, Iraq and in the CIA’s undeclared war in Pakistan.

 

spy

Spy Satellites

Global Spy Network Satellites

 

Unknown to most of the world, satellites can perform astonishing and often menacing feats. This should come as no surprise when one reflects on the massive effort poured into satellite technology since the Soviet satellite Sputnik, launched in 1957, caused panic in the U.S. A spy satellite can monitor a person’s every movement, even when the “target” is indoors or deep in the interior of a building or traveling rapidly down the highway in a car, in any kind of weather (cloudy, rainy, stormy). There is no place to hide on the face of the earth. It takes just three satellites to blanket the world with detection capacity. Besides tracking a person’s every action and relaying the data to a computer screen on earth, amazing powers of satellites include reading a person’s mind, monitoring conversations, manipulating electronic instruments and physically assaulting someone with a laser beam. Remote reading of someone’s mind through satellite technology is quite bizarre, yet it is being done; it is a reality at present, not a chimera from a futuristic dystopia! To those who might disbelieve my description of satellite surveillance, I’d simply cite a tried-and-true Roman proverb: Time reveals all things (tempus omnia revelat).

As extraordinary as clandestine satellite powers are, nevertheless prosaic satellite technology is much evident in daily life. Satellite businesses reportedly earned $26 billion in 1998. We can watch transcontinental television broadcasts “via satellite,” make long-distance phone calls relayed by satellite, be informed of cloud cover and weather conditions through satellite images shown on television, and find our geographical bearings with the aid of satellites in the GPS (Global Positioning System). But behind the facade of useful satellite technology is a Pandora’s box of surreptitious technology. Spy satellites--as opposed to satellites for broadcasting and exploration of space--have little or no civilian use--except, perhaps, to subject one’s enemy or favorite malefactor to surveillance. With reference to detecting things from space, Ford Rowan, author of Techno Spies, wrote “some U.S. military satellites are equipped with infra-red sensors that can pick up the heat generated on earth by trucks, airplanes, missiles, and cars, so that even on cloudy days the sensors can penetrate beneath the clouds and reproduce the patterns of heat emission on a TV-type screen. During the Vietnam War sky high infra-red sensors were tested which detect individual enemy soldiers walking around on the ground.” Using this reference, we can establish 1970 as the approximate date of the beginning of satellite surveillance--and the end of the possibility of privacy for several people.

 

 

 

The government agency most heavily involved in satellite surveillance technology is the Advanced Research Projects Agency (ARPA), an arm of the Pentagon. NASA is concerned with civilian satellites, but there is no hard and fast line between civilian and military satellites. NASA launches all satellites, from either Cape Kennedy in Florida or Vandenberg Air Force Base in California, whether they are military-operated, CIA-operated, corporate-operated or NASA’s own. Blasting satellites into orbit is a major expense. It is also difficult to make a quick distinction between government and private satellites; research by NASA is often applicable to all types of satellites. Neither the ARPA nor NASA makes satellites; instead, they underwrite the technology while various corporations produce the hardware. Corporations involved in the satellite business include Lockheed, General Dynamics, RCA, General Electric, Westinghouse, Comsat, Boeing, Hughes Aircraft, Rockwell International, Grumman Corp., CAE Electronics, Trimble Navigation and TRW.

Coalition Surrenders Video Gamers

 

 

Drone Operator part 2 PRISM Edward Snowdon NSA

 

 

 

The World Satellite Directory, 14th edition (1992), lists about a thousand companies concerned with satellites in one way or another. Many are merely in the broadcasting business, but there are also product headings like “remote sensing imagery,” which includes Earth Observation Satellite Co. of Lanham, Maryland, Downl Inc. of Denver, and Spot Image Corp. of Reston, Virginia. There are five product categories referring to transponders. Other product categories include earth stations (14 types), “military products and systems,” “microwave equipment,” “video processors,” “spectrum analyzers.” The category “remote sensors” lists eight companies, including ITM Systems Inc., in Grants Pass, Oregon, Yool Engineering of Phoenix, and Satellite Technology Management of Costa Mesa, California. Sixty-five satellite associations are listed from all around the world, such as Aerospace Industries Association, American Astronautical Society, Amsat and several others in the U.S.

 

 

Spy satellites were already functioning and violating people’s right to privacy when President Reagan proposed his “Strategic Defense Initiative,” or Star Wars, in the early 80s, long after the Cuban Missile Crisis of 1962 had demonstrated the military usefulness of satellites. Star Wars was supposed to shield the U.S. from nuclear missiles, but shooting down missiles with satellite lasers proved infeasible, and many scientists and politicians criticized the massive program. Nevertheless, Star Wars gave an enormous boost to surveillance technology and to what may be called “black bag” technology, such as mind reading and lasers that can assault someone, even someone indoors. Aviation Week & Space Technology mentioned in 1984 that “facets of the project [in the Star Wars program] that are being hurried along include the awarding of contracts to study...a surveillance satellite network.” It was bound to be abused, yet no group is fighting to cut back or subject to democratic control this terrifying new technology. As one diplomat to the U.N. remarked, “‘Star Wars’ was not a means of creating heaven on earth, but it could result in hell on earth.”

NSA-Edward Snowden - Whistleblower

The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.

 

"I don't want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under."

 

 

 

 

In 1998, extrajudicial executions were carried out in 47 countries, 'disappearances' occurred in 37 countries, torture occurred in 125 countries, prisoners of conscience were held in 78 countries, unfair trials for political prisoners occurred in 35 countries, detentions without charge or trial occurred in 66 countries, executions were carried out in 36 countries, and human rights abuses were committed by armed opposition groups in 37 countries.

PRISM Global GCHQ Tempora surveillance 77 Drone Operator Video XKeyscore

This page was created in 2012, much has changed......Page due for update 2021