by Adrian Salbuchi
November 01, 2011
This article appeared in New Dawn No. 129
In the case of Information and
Communications Technologies, and their out-of-control problem child
the Internet that has so revolutionized the world, today we seem to
be at a key crossroads where all seems to hang on which path Mankind
How to resolve this dilemma?
We should certainly start by understanding three key issues: who really controls these technologies, what are their medium and long term objectives, why are they being used the way they are…
If you cannot see a danger approaching,
it will hit you by surprise as the look-out on the Titanic so
painfully learned on that fateful night in April 1912.
There is always an "enemy" out there who either wants to have what we own, or wants to place us in his or her service, or may have a myriad of reasons for wanting to somehow weaken or get rid of us, mostly because they want to take for free something that is ours.
Some will say this is basic human nature; others that it's the Darwinian imperative of the survival of the fittest; still others will complain that it's man's criminal egotism.
Whatever your view, the truth is that in
one way or another we all live immersed in "self-protection or
defense mode" which begins every morning when we close and lock our
Here is where modern European languages play us a bad trick, because we use the word "enemy" with far too wide a scope.
In fact, we would do well to heed the recommendations of German Jurist Carl Schmitt (1888-1985) who, like the Romans, differentiated between
For example, two hundred years ago, it was easy for the thirteen original colonies of North America to identify as its Hostis the British Crown in London, or for the South American Viceroyalties to identify as their Hostis the Spanish Court in Madrid.
A common, visible, credible enemy makes
strategic planning that much simpler, for we know who he is, where
he is, what he wants, and how he achieves his objectives.
Today, Mankind's Hostis has become all too complex, often subtle and defying simple identification whether by nation, creed, race, geography, language, or any other easy-to-perceive characteristics.
Today's Hostis is everywhere and
nowhere; which requires we refine our search, identifying him more
by his tell-tale signs, fingerprints, "DNA" so-to-speak, than by
directly perceiving him (or her).
Power Elite" is the closest we can come to describing
this veritable global enemy whose planetary interests and objectives
for the most part run counter to the common interests of "We the
People" everywhere, and yet that too is still quite abstract and
An experienced, shrewd and watchful hunter does not need to actually see the tiger to know that he's close by, if he knows how to identify and understand specific tell-tale 'tiger marks':
A similar task faces us if we are to become free and independent: we must learn and understand who, where and what is the enemy and its weapons of war.
We can certainly say that technological research, development and control are among its array of armaments.
If we understand the enemy, it should not be all that hard to understand what he will do with the technology so "generously" given to Mankind.
Well, not quite actually as it ended up being the other way around with communists hanging themselves with the invisible "ropes of capitalism," enthralled as they became at the end of the Bi-Polar world with the West's mass consumerism.
An eloquent snapshot of which right after the Berlin Wall fell in 1989 was a little ticky-tacky East German "Trabant" next to a powerful West German Mercedes-Benz.
Indeed, a picture that was worth 1,000
Not that all of us are doing that yet,
but when you look around at the growing mass population control, the
noose is certainly being fitted snugly around our necks.
Today, however, with the explosive advent of information technologies, telecommunications and genetics to name but a few, we're all mesmerized and desirous to become part of the Info Cybersphere.
We've been persuaded that we really do need to have the latest cell phones, iPod, iPad, the Internet and cable/satellite TV, iPhone and Blackberry, which potentially is a good thing, but they must be approached with discriminating caution.
For they represent a two-edged sword
that can either help expand our consciousness and awareness of the
world around us in every sense of the word, or they can chain us
unwittingly into a macro-system that has grown into a Leviathan with
huge capacity to control every detail of our lives.
These technologies must be approached
with at least as much caution, prevention and awe as we do when we
drive our car, knowing that just as it can safely take as wherever
we want to go, if we thoughtlessly rev the engine up to 250 kmph, it
can also get us and others killed.
Where does the difference lie? In our
Here, then, are two global armies pitted against each other.
It is today so embedded into society that, increasingly, every aspect of our lives are controlled by it:
It's a coin of which we are systematically shown only the "heads" side, i.e., all the benefits, magic, comfort and advantages of being hooked-in and on-line.
However, we're not shown the "tail" side that poses a dark and lurking danger: Total Control.
The Info Cybersphere represents a
super-structure for total control against which individuals can do
little to escape from, unless awareness dawns on them.
The rest of Mankind - the other 3 or 4 billion are "useless eaters" as David Rockefeller once called them - just don't count because they're too abjectly poor and are not part of any "market"; there's literally nothing the Corporate Overworld can sell to them.
Thus, they are implicitly earmarked for controlled extermination over the next generation through,
...or by just plain letting them waste
"Romas/COIN" is a super hi-tech military civilian mass surveillance and data gathering project supported by US private defense contractors (Northrop Gruman, notably), think tanks, and the US military and civilian intelligence community, with electronic capabilities to monitor and analyze millions and millions of conversations, sort key data and then re-build it to reflect specific behavior patterns amongst individuals and groups of people, which enables projecting their future plans, whereabouts, goals and actions.
This will make "preventive war" and
"preventive arrests" that much easier. For now, much of this mass
surveillance and data mining targets Arab speaking peoples, not just
in the Middle East/North Africa but the world over, which ties in
nicely with the endless "global war on terrorism."
Now however, we have "friendly" household names like,
...doing all the spying for the Elite.
This private corporate network is part of the invisible noose we are putting around our necks.
...are prime examples of mass surveillance.
Take a stroll through London and a vast and ubiquitous network of several million CCTV cameras will be watching your every move 24/7 in airports, underground and railway stations, street crossings, stores, bus stops, shopping malls, motorways, parks, bridges, condos, public buildings, private offices, utilities, public toilets, toll booths…
Wherever you are in London, someone is watching you… very closely.
Naturally, all this is done in the name
of "national security" which has become a smokescreen for the
political and corporate elites' perception that growing public
awareness does pose a real threat to their interests.
In the ensuing decade, Australia's
Federal Parliament enacted 54 pieces of anti-terrorism legislation;
48 of which were passed under the Howard government, an average of
one new anti-terrorism law every seven weeks.
All brought to you by the Australian
Security Intelligence Organization (ASIO).
Vein recognition represents a far more precise method to identify you than traditional fingerprint scanners because of its low .001% false acceptance rate.
Using light to penetrate a users' finger
to read vein patterns which are unique and thought to be impossible
to replicate, this method is fully fool proof as vein structures
change after death, which means severed fingers cannot be used to
fool the readers.
Next time you're surfing the Internet or speaking on Skype, hmmm…
Next time an Avian or Swine Flu "crisis" breaks, don't let yourself be coaxed into mass vaccinating your family.
Michael G. Michael (University of Wollongong's School of Information Systems and Technology, Australia), has coined the term "uberveillance" to describe the emerging trend of all-encompassing surveillance, explaining that,
The US's private hi-tech company VeriChip (psidcorp.com) widely markets implantable nano-chips which store a 16-digit unique ID number on humans,
To allay any fears they also explain they do not know when or if someone will develop an implantable microchip with GPS technology, but that,
Michael explains that such implantable chips will become like a,
He also predicts microchip implants and their infrastructure could eliminate the need for e-passports, e-tags, and secure ID cards, adding that,
For now, your mobile phone acts as a passive transponder for radio frequency identification (RFID) readers.
We now have drones as tiny as bugs.
In a recent piece published in The New York Times 2 we learn that the US military's Wright-Patterson Air Force Base in Ohio runs a flight lab dubbed a "microaviary" where drones designed to replicate flight mechanics of moths, hawks and other creatures are being developed.
Today, the Pentagon has some 7,000 aerial drones explained Ashton B. Carter, the Pentagon's chief weapons buyer and a member of the New York-based Council on Foreign Relations (CFR).
Then we have new "Gorgon Stare" technology that can capture live videos of an entire city, but requires 2,000 analysts to process the data feeds from a single drone compared with 19 analysts per drone today.
We can also expect massive growth of armies of military surveillance analysts representing "wonderful new job careers in national defense."
This ties in with the Powell Doctrine, drafted by Gen. Colin Powell (CFR) after the First Gulf War which states, amongst other concepts, that the US should only engage in military conflict where its overwhelming military clout guarantees complete victory over carefully chosen weaker enemies.
That explains why the US (and its staunch ally Britain) will unilaterally attack Afghanistan and Iraq, but not China or Russia; or why the US (and NATO) imposed "regime change" on Libya but not on North Korea (so intimate with China) or Iran (so close to Russia).
This explains why America's "heroic
exploits" included invading tiny Grenada under the Reagan
Administration in 1984, and unarmed Panama under Bush Senior in
1991, as well as its unflinching support of
nuclear-armed-to-the-teeth Israel against rock-throwing
There, no doubt, lie the seeds of America's coming demise and that of its key allies:
How fast they begin taking defensive
measures from inside the Cybersphere, especially by identifying and
taking advantage of its myriad weak points.
Each of us must become such a "microscopic pin."
As I write, the surveillance and control
infrastructure can read this article, plot my location from their
satellites using the cell phone in my pocket as a GPS transponder,
spy on what I read, write and navigate on my laptop, and God knows
Whatever it is they can do today surely
exceeds our wildest imagination.
...and their counterparts in other countries.
This now spans private corporations that gather data, organize it, seek and find specific patterns (behaviors, contacts, interests, intents, geographies and infinite others) through which they hope to eventually exert their long-sought dream of total control over populations forming part of their Global System (the rest are as good as dead).
...and a vast array of intelligence,
security, IT, data gathering companies are all linking into
increasingly large networks that pool data, findings and
capabilities into complex arrays of self-sustaining and evolving
structures, that lie outside the visual scope even of governments,
for the simple reason that governments cannot even begin to fathom
those capabilities, powers and future projections.
...have a real clue as to what,
...are really developing?
We see "elected leaders" accessing top government posts using 19th century "democratic" voting mechanisms, that are all controlled by a highly complex 21st century technocratic Over-world, embedded inside the US, UK, EU and most every other country.
It operates from inside these countries - even using the military might of the US and NATO countries - but in no way does it heed, support or respond to the interests of these peoples.
Was it really the US, Britain and France that invaded and destroyed Iraq, Afghanistan and now Libya?
Or is it something far more elusive and
powerful embedded inside them but controlled from way above today's
completely outdated, eroded, fatally weakened and - at this rate -
soon to disappear "sovereign Nation-State"?
We need to move away from silo mentality paradigms, and towards a much more holistic Weltanschauung. We have become too "specialized," which leads to narrow-mindedness.
We talk about finance but never join the
dots on its geopolitical overtones. We talk about politics but are
blind to underlying social forces. We think Hollywood is only about
"entertainment," not realizing how
they implant ideas and behavior patterns
into our collective psyche.
A healthy tip:
Only then can we move down to the finer
detail, because the forest is far, far more important than the tree…
at least in this stage where we all need to come to grips with a
question that should be growing louder and louder in your mind no
matter where you live or who you are: what on Earth is going on!?
We either climb up the high road leading
to human evolution which will necessarily entail the painful but
necessary destruction of the Global Power Elite and all who support,
consolidate, empower and fuel its growth, or… we slip down the low
road into a dark abyss of death, destruction, mass hypnosis and the
end of the human spirit; a vision pretty close to what men
throughout the ages have described as Hell…
There is not, however, much time left...