| 
 by Adrian Salbuchi November 01, 2011 This article appeared in New Dawn No. 129 (November-December 2011) 
			from
			
			NewDawnMagazine Website 
 
 
			 
 
 
 
 
			 
 
			In the case of Information and 
			Communications Technologies, and their out-of-control problem child 
			the Internet that has so revolutionized the world, today we seem to 
			be at a key crossroads where all seems to hang on which path Mankind 
			finally treads. 
 How to resolve this dilemma? 
 We should certainly start by understanding three key issues: who really controls these technologies, what are their medium and long term objectives, why are they being used the way they are… 
 
 
 
			 
 
			If you cannot see a danger approaching, 
			it will hit you by surprise as the look-out on the Titanic so 
			painfully learned on that fateful night in April 1912. 
 There is always an "enemy" out there who either wants to have what we own, or wants to place us in his or her service, or may have a myriad of reasons for wanting to somehow weaken or get rid of us, mostly because they want to take for free something that is ours. 
 Some will say this is basic human nature; others that it's the Darwinian imperative of the survival of the fittest; still others will complain that it's man's criminal egotism. 
 
			Whatever your view, the truth is that in 
			one way or another we all live immersed in "self-protection or 
			defense mode" which begins every morning when we close and lock our 
			front door. 
 Here is where modern European languages play us a bad trick, because we use the word "enemy" with far too wide a scope. 
 In fact, we would do well to heed the recommendations of German Jurist Carl Schmitt (1888-1985) who, like the Romans, differentiated between 
 For example, two hundred years ago, it was easy for the thirteen original colonies of North America to identify as its Hostis the British Crown in London, or for the South American Viceroyalties to identify as their Hostis the Spanish Court in Madrid. 
 
			A common, visible, credible enemy makes 
			strategic planning that much simpler, for we know who he is, where 
			he is, what he wants, and how he achieves his objectives. 
 Today, Mankind's Hostis has become all too complex, often subtle and defying simple identification whether by nation, creed, race, geography, language, or any other easy-to-perceive characteristics. 
 
			Today's Hostis is everywhere and 
			nowhere; which requires we refine our search, identifying him more 
			by his tell-tale signs, fingerprints, "DNA" so-to-speak, than by 
			directly perceiving him (or her). 
 
			Perhaps "Global 
			Power Elite" is the closest we can come to describing 
			this veritable global enemy whose planetary interests and objectives 
			for the most part run counter to the common interests of "We the 
			People" everywhere, and yet that too is still quite abstract and 
			faceless. 
 An experienced, shrewd and watchful hunter does not need to actually see the tiger to know that he's close by, if he knows how to identify and understand specific tell-tale 'tiger marks': 
 A similar task faces us if we are to become free and independent: we must learn and understand who, where and what is the enemy and its weapons of war. 
 We can certainly say that technological research, development and control are among its array of armaments. 
 If we understand the enemy, it should not be all that hard to understand what he will do with the technology so "generously" given to Mankind. 
 
 
 
			 
 Well, not quite actually as it ended up being the other way around with communists hanging themselves with the invisible "ropes of capitalism," enthralled as they became at the end of the Bi-Polar world with the West's mass consumerism. 
 An eloquent snapshot of which right after the Berlin Wall fell in 1989 was a little ticky-tacky East German "Trabant" next to a powerful West German Mercedes-Benz. 
 
			Indeed, a picture that was worth 1,000 
			words! 
 
			 
 
			 
 
			Not that all of us are doing that yet, 
			but when you look around at the growing mass population control, the 
			noose is certainly being fitted snugly around our necks. 
 Today, however, with the explosive advent of information technologies, telecommunications and genetics to name but a few, we're all mesmerized and desirous to become part of the Info Cybersphere. 
 We've been persuaded that we really do need to have the latest cell phones, iPod, iPad, the Internet and cable/satellite TV, iPhone and Blackberry, which potentially is a good thing, but they must be approached with discriminating caution. 
 
			For they represent a two-edged sword 
			that can either help expand our consciousness and awareness of the 
			world around us in every sense of the word, or they can chain us 
			unwittingly into a macro-system that has grown into a Leviathan with 
			huge capacity to control every detail of our lives. 
 Not so...! 
 
			These technologies must be approached 
			with at least as much caution, prevention and awe as we do when we 
			drive our car, knowing that just as it can safely take as wherever 
			we want to go, if we thoughtlessly rev the engine up to 250 kmph, it 
			can also get us and others killed. 
 Objectively, 
 
			Where does the difference lie? In our 
			awareness... 
 Here, then, are two global armies pitted against each other. 
 It is today so embedded into society that, increasingly, every aspect of our lives are controlled by it: 
 It's a coin of which we are systematically shown only the "heads" side, i.e., all the benefits, magic, comfort and advantages of being hooked-in and on-line. 
 However, we're not shown the "tail" side that poses a dark and lurking danger: Total Control. 
 
			The Info Cybersphere represents a 
			super-structure for total control against which individuals can do 
			little to escape from, unless awareness dawns on them. 
 The rest of Mankind - the other 3 or 4 billion are "useless eaters" as David Rockefeller once called them - just don't count because they're too abjectly poor and are not part of any "market"; there's literally nothing the Corporate Overworld can sell to them. 
 Thus, they are implicitly earmarked for controlled extermination over the next generation through, 
 
			...or by just plain letting them waste 
			away. 
 "Romas/COIN" is a super hi-tech military civilian mass surveillance and data gathering project supported by US private defense contractors (Northrop Gruman, notably), think tanks, and the US military and civilian intelligence community, with electronic capabilities to monitor and analyze millions and millions of conversations, sort key data and then re-build it to reflect specific behavior patterns amongst individuals and groups of people, which enables projecting their future plans, whereabouts, goals and actions. 
 
			This will make "preventive war" and 
			"preventive arrests" that much easier. For now, much of this mass 
			surveillance and data mining targets Arab speaking peoples, not just 
			in the Middle East/North Africa but the world over, which ties in 
			nicely with the endless "global war on terrorism." Now however, we have "friendly" household names like, ...doing all the spying for the Elite. 
 This private corporate network is part of the invisible noose we are putting around our necks. 
 
 
 
			 
 ...are prime examples of mass surveillance. 
 Take a stroll through London and a vast and ubiquitous network of several million CCTV cameras will be watching your every move 24/7 in airports, underground and railway stations, street crossings, stores, bus stops, shopping malls, motorways, parks, bridges, condos, public buildings, private offices, utilities, public toilets, toll booths… 
 Wherever you are in London, someone is watching you… very closely. 
 
			Naturally, all this is done in the name 
			of "national security" which has become a smokescreen for the 
			political and corporate elites' perception that growing public 
			awareness does pose a real threat to their interests. 
 
			In the ensuing decade, Australia's 
			Federal Parliament enacted 54 pieces of anti-terrorism legislation; 
			48 of which were passed under the Howard government, an average of 
			one new anti-terrorism law every seven weeks. 
 
			All brought to you by the Australian 
			Security Intelligence Organization (ASIO). 
 
 
 
			 
 Vein recognition represents a far more precise method to identify you than traditional fingerprint scanners because of its low .001% false acceptance rate. 
 
			Using light to penetrate a users' finger 
			to read vein patterns which are unique and thought to be impossible 
			to replicate, this method is fully fool proof as vein structures 
			change after death, which means severed fingers cannot be used to 
			fool the readers. 
 Next time you're surfing the Internet or speaking on Skype, hmmm… 
 
 
 
			 
 Next time an Avian or Swine Flu "crisis" breaks, don't let yourself be coaxed into mass vaccinating your family. 
 Michael G. Michael (University of Wollongong's School of Information Systems and Technology, Australia), has coined the term "uberveillance" to describe the emerging trend of all-encompassing surveillance, explaining that, 
 The US's private hi-tech company VeriChip (psidcorp.com) widely markets implantable nano-chips which store a 16-digit unique ID number on humans, 
 To allay any fears they also explain they do not know when or if someone will develop an implantable microchip with GPS technology, but that, 
 Michael explains that such implantable chips will become like a, 
 He also predicts microchip implants and their infrastructure could eliminate the need for e-passports, e-tags, and secure ID cards, adding that, 
 For now, your mobile phone acts as a passive transponder for radio frequency identification (RFID) readers. 
 
 
 
			 
 We now have drones as tiny as bugs. 
 In a recent piece published in The New York Times 2 we learn that the US military's Wright-Patterson Air Force Base in Ohio runs a flight lab dubbed a "microaviary" where drones designed to replicate flight mechanics of moths, hawks and other creatures are being developed. 
 Today, the Pentagon has some 7,000 aerial drones explained Ashton B. Carter, the Pentagon's chief weapons buyer and a member of the New York-based Council on Foreign Relations (CFR). 
 Then we have new "Gorgon Stare" technology that can capture live videos of an entire city, but requires 2,000 analysts to process the data feeds from a single drone compared with 19 analysts per drone today. 
 We can also expect massive growth of armies of military surveillance analysts representing "wonderful new job careers in national defense." 
 
 
 
			 
 This ties in with the Powell Doctrine, drafted by Gen. Colin Powell (CFR) after the First Gulf War which states, amongst other concepts, that the US should only engage in military conflict where its overwhelming military clout guarantees complete victory over carefully chosen weaker enemies. 
 That explains why the US (and its staunch ally Britain) will unilaterally attack Afghanistan and Iraq, but not China or Russia; or why the US (and NATO) imposed "regime change" on Libya but not on North Korea (so intimate with China) or Iran (so close to Russia). 
 
			This explains why America's "heroic 
			exploits" included invading tiny Grenada under the Reagan 
			Administration in 1984, and unarmed Panama under Bush Senior in 
			1991, as well as its unflinching support of 
			nuclear-armed-to-the-teeth Israel against rock-throwing 
			Palestinians. 
 There, no doubt, lie the seeds of America's coming demise and that of its key allies: 
 
 
 
			 
 
			How fast they begin taking defensive 
			measures from inside the Cybersphere, especially by identifying and 
			taking advantage of its myriad weak points. 
 Each of us must become such a "microscopic pin." 
 
			As I write, the surveillance and control 
			infrastructure can read this article, plot my location from their 
			satellites using the cell phone in my pocket as a GPS transponder, 
			spy on what I read, write and navigate on my laptop, and God knows 
			what more. 
 
			Whatever it is they can do today surely 
			exceeds our wildest imagination. 
 ...and their counterparts in other countries. 
 This now spans private corporations that gather data, organize it, seek and find specific patterns (behaviors, contacts, interests, intents, geographies and infinite others) through which they hope to eventually exert their long-sought dream of total control over populations forming part of their Global System (the rest are as good as dead). 
 
			...and a vast array of intelligence, 
			security, IT, data gathering companies are all linking into 
			increasingly large networks that pool data, findings and 
			capabilities into complex arrays of self-sustaining and evolving 
			structures, that lie outside the visual scope even of governments, 
			for the simple reason that governments cannot even begin to fathom 
			those capabilities, powers and future projections. 
 ...have a real clue as to what, 
 
			...are really developing? 
 
 
 
			 
 We see "elected leaders" accessing top government posts using 19th century "democratic" voting mechanisms, that are all controlled by a highly complex 21st century technocratic Over-world, embedded inside the US, UK, EU and most every other country. 
 It operates from inside these countries - even using the military might of the US and NATO countries - but in no way does it heed, support or respond to the interests of these peoples. 
 Was it really the US, Britain and France that invaded and destroyed Iraq, Afghanistan and now Libya? 
 
			Or is it something far more elusive and 
			powerful embedded inside them but controlled from way above today's 
			completely outdated, eroded, fatally weakened and - at this rate - 
			soon to disappear "sovereign Nation-State"? 
 We need to move away from silo mentality paradigms, and towards a much more holistic Weltanschauung. We have become too "specialized," which leads to narrow-mindedness. 
 
			We talk about finance but never join the 
			dots on its geopolitical overtones. We talk about politics but are 
			blind to underlying social forces. We think Hollywood is only about 
			"entertainment," not realizing how
			
			they implant ideas and behavior patterns 
			into our collective psyche. 
 A healthy tip: 
 
			Only then can we move down to the finer 
			detail, because the forest is far, far more important than the tree… 
			at least in this stage where we all need to come to grips with a 
			question that should be growing louder and louder in your mind no 
			matter where you live or who you are: what on Earth is going on!? 
 
			We either climb up the high road leading 
			to human evolution which will necessarily entail the painful but 
			necessary destruction of the Global Power Elite and all who support, 
			consolidate, empower and fuel its growth, or… we slip down the low 
			road into a dark abyss of death, destruction, mass hypnosis and the 
			end of the human spirit; a vision pretty close to what men 
			throughout the ages have described as Hell… 
 
			There is not, however, much time left... 
 
 
			 
 
 
 |