beastmark3

666 SINGULARITY PART 3 – FOREIGN AGENTS From Visa/MasterCard to UPC Bar Codes, Microchips and Beyond The True and Conce...

0 downloads 6 Views 1MB Size
666 SINGULARITY PART 3 – FOREIGN AGENTS

From Visa/MasterCard to UPC Bar Codes, Microchips and Beyond The True and Concealed Purpose of the Mark of the Beast

FOREIGN AGENTS (Part 3)

A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

666 SINGULARITY PART 3 – FOREIGN AGENTS

This report is the property of Rema Marketing and is considered to be strictly for reading only. With receipt of this report, the recipient acknowledges and agrees that written permissions must be secured from the publisher to use or reproduce any part of this report, except for brief quotations in critical reviews or articles. A publication of Rema Marketing. ©2014, All rights reserved.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

2

666 SINGULARITY PART 3 – FOREIGN AGENTS

666 SINGULARITY PART 3: FOREIGN AGENTS IBM has recently announced that its ploughing $3 billion into two R&D programs that will hopefully make it the authority on 7-nanometer-and-beyond chip technologies. One R&D project will look at pushing conventional silicon chips as far as they will go (around 7nm), and the other will be tasked with finding new materials and techniques that can take us even further (quantum computing, carbon nanotubes, graphene). IBM also took the opportunity to remind everyone that it’s already the biggest player in 7nanometer and beyond technology, with over 500 applicable patents (more than double the nearest competitor). How is nanotechnology changing the face of microchip technology?

1

TATOOS TO MICROCHIPS

5

2

RFID IMPLANTS – ARE WE READY

9

3

MICROCHIPPED POPULATION

12

4

HOW RFID TECHNOLOGY WORKS

14

5

THE VERICHIP LEGACY

19

6

IBM PATENT AGENDA

21

7

BIOMETRIC DATA AND NATIONAL IDENTIFICATION

23

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

3

666 SINGULARITY PART 3 – FOREIGN AGENTS 1.

TATOOS TO MICROCHIPS

We live in an age where people end up in various situations they never imagined possible such as getting a tattoo, and this includes the Christian and non-Christian communities. Tattoos are becoming more popular around the world and within our nation as appetites are aroused for people to want at least one. To get a tattoo is one of the hottest trends today, and it will be for many years to come. By no means is the tattoo a new work of art. The practice of tattooing has been around for centuries. There are so many different designs that come from various cultures around the world, and some markings hold great significance. Tattoo markings may indicate religious dedication or allegiance to a particular god; or serve as protection against evil or harm, including disease; or serve as an indicator of belonging to a certain group, such as a tribe or gang; or serve as evidence of one’s rank or status within a particular group.

Some Christians who claim there is nothing wrong with getting a tattoo will ingeniously point out that God himself put a mark on Cain after he murdered his own brother Abel, which is true. It is, however, important to understand that God is able to place a permanent mark on a person without cutting their flesh. Because God is the one responsible for Cain’s mark, it really does not matter how it was achieved. The mark was set upon Cain for his protection to allow him to move on with his life. Although Cain did a horrible act by murdering his brother, God extended mercy to him by sparing his life and his days on the earth. God assured Cain that if anyone killed him vengeance would be taken on them “sevenfold” (Genesis 4:15). The mark was one to be recognized as being done by God. One can assume that Cain experienced remorse and had a changed heart after committing such a gruesome act as murder. Still, he had to live with the consequences for his actions as a constant reminder of the seriousness of his sin, certainly God wanted him to always reflect on his mercy and to be humble and dependent upon him. Most likely, Cain replayed the scene of murdering his brother in his mind continuously whenever looking upon the mark and was grief stricken for his sin yet thankful to God for the mercy extended unto him. Cain’s predicament serves as a clear example to us today as to why we cannot trust in our flesh and as to why we must trust in God. Sin carries its own unique markings: pain, suffering, separation from God, and death. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

4

666 SINGULARITY PART 3 – FOREIGN AGENTS Today, there are still people around the world who tattoo themselves in an effort to scare away evil spirits or to be healed of their diseases. The tattoos for them are critical because they believe the markings serve as a link for survival and wellness; therefore, tattooing procedures are of great significance to them. Religious rituals may take place during tattooing procedures or afterwards. For them, it is a way of life. Although their reasons for tattooing may seem odd to others looking in from the outside, they continue to uphold certain beliefs or superstitions. In some instances, certain groups or sects may have a lot of tattoos covering their body. Another area of concern is the fact that there are so many inmates in the prison population with tattoos. Correctional institutions are constantly monitoring the activities of inmates for any possible gang affiliation. Because inmate tattoos may link to a particular gang, no tattoo is to be considered as innocent or benign but potentially lethal. A tattoo’s significance or meaning is to never be underestimated. With gang trafficking being so prevalent today, a tattoo of a rose or Rolls Royce could be the symbol used by a rival gang although its appearance may seem to be absolutely harmless. For this reason, correctional personnel often find themselves having to cope with extremely violent situations as a result of a tattoo being exposed on someone that may link them to a particular gang. Disturbances can erupt within moments in a prison environment and can be fatal. It is not unusual for Christians to cross-examine their own personal feelings about the tattoo in general. The reason for this is because some tattoos take on the appearance of being cute or harmless, and the designs are not hideous. Not everyone will have a tattoo running down the entire length of their arm, leg, or chest, nor streaming from one body part to the next. Although the tattoo may sometimes appear innocent, it does not necessarily mean that it is. Sometimes people inscribe hidden messages in some tattoos as an anagram. There is no doubt that Satan is actively orchestrating ways to convince people to accept the notion that tattooing is a harmless act since the Bible makes it very clear that Satan is going to use the false prophet to enforce his demonical mark worldwide. Some people will have no clue as to what is happening when the man of perdition rises up from among them. He will provide answers and solutions to world problems, and he will later require everyone to bear his identifying mark. People will be caught off guard when he reveals himself as a modern day messiah. Some of them will accept his claim, and some of them will realize that the dictator is a liar and a deceiver and is none other than the Antichrist. There is only a very short jump from tattoos to microchips and this is evidenced by some of the latest developments with microchip technology where in order to address the fears caused by the implantation of electronic devices within the human body, technology companies are also looking at concealing the implementation of electronic devices through tattoo type membranes since they believe this would be more socially acceptable. Electronic tattoos as they have come to be called have been around for a few years in one form or another. However they got a big boost at the end of 2013 when Google-owned Motorola Mobility filed for a patent, “that comprises an electronic skin tattoo capable of being applied to a throat region of a body.” The patent says the tattoo would communicate with smartphones, gaming devices, tablets and wearable tech like Google Glass via a Bluetooth-style connection and would include a microphone and power source. The idea is that wearers could communicate with their devices via voice commands without having to wear an earpiece or the Glass headset.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

5

666 SINGULARITY PART 3 – FOREIGN AGENTS

“Optionally, the electronic skin tattoo can further include a galvanic skin response detector to detect skin resistance of a user,” the 10-page document reads. “It is contemplated that a user that may be nervous or engaging in speaking falsehoods may exhibit different galvanic skin response than a more confident, truth telling individual.” “Galvanic” is a reference to the way some surfaces, even skin, conduct electricity. Other possible uses include making both incoming and outgoing audio clearer. That could mean anything from making smartphone conversations clearer in a crowded room to being able to listen to music without earphones. Now a company called VivaLnk is using the Google developed technology to bring a commercial electronic tattoo product to market. Worn on your wrist, it will communicate with your cell phone via near field communication and will become the ID used to access your mobile phone. The patches will only last a few days each. The will be sold in ten-packs that will cost about ten dollars. Back in 2013, Regina Dugan, the former Defense Advanced Research Projects Agency (DARPA) head, and leading special projects for the Google-owned Motorola, showed electronic tattoos as one password authentication sign of the future. The idea of a password authentication tool in the form of a wearable tattoo was quite novel but welcomed by a wider audience of techies and mobile phone users looking forward to better, more reliable and easier ways of logging into mobile devices. The idea has ripened considerably with the introduction by VivaLnk, a Santa Clara, California-based company, of Digital Tattoo, developed with Google's Advanced Technology and Projects (ATAP) group. Worn on the wrist, the tattoo is used to unlock the smartphone user's Moto X. The product is a disposable that can last for five days. The lifetime is approximately five days but may vary with skin type and activity level. Then the tattoo is replaced with another. The company described the item as a nickel-sized, thin adhesive device; they are using medical-grade adhesives from 3M, blending in on the wrist. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

6

666 SINGULARITY PART 3 – FOREIGN AGENTS The idea is to set up Moto X and the tattoo. The company site has a FAQ list that has a number of helpful guidelines for doing this, aiming for a spot about two inches up from the wrist. As for the sync, according to the announcement, "Simply tap the back of Moto X to your Digital Tattoo and follow the onscreen instructions. For the first activation, you will be prompted to re-enter your existing PIN and to set a master PIN. For the remaining activations of the same tattoo you pair the tattoo and tap to activate."

It added that "VivaLnk's technology has made it possible for us to create thin, flexible electronics that are adhesive, inexpensive, and disposable." Digital Tattoo designed to communicate with a phone is an application of the company's eSkin wearable technology but it is the first commercialized product of its kind. According to the company the VivaLnk team is looking to expand to other devices and future versions of Android. Also, VivaLnk anticipates other products utilizing eSkin technology in health care, security, entertainment, and numerous other fields. Thanks to some new developing technological innovations, it may well be possible to have an invisible tattoo printed into your skin. This tattoo would contain medical information such as your blood type, medical problems and history, prescriptions and prior surgeries. It would also be constantly updated with data about what prescriptions have been taken and what has been eaten that day. The tattoo would use a "RFID of sorts" and is said to be viewable only under black light. In a report published by Gizmag.com, the writer, Stu Robarts further explains that immediate access to all this information by medical professionals in case of, say, an accident or health problem would ensure that the best possible treatment could be provided and would minimize the risk of blood transfusions errors, allergic reactions to medication or dangerous reactions to drugs. This innovation (among others) was unveiled during a recent contest titled ‘Make It Wearable, Visionary Track’ being run by Intel. U.S based student, maker and DIY enthusiast Mael Flament, who proposed the invisible tattoo that contains health information, was announced the winner in the second round of the contest. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

7

666 SINGULARITY PART 3 – FOREIGN AGENTS Flament’s product, named ‘Med. History 2.0’ would be easily scanned and updated regularly. Flament was also reportedly a finalist in the first round of the competition with his Peltier Jacket. The jacket was proposed as a means of charging mobile devices using heat from the human body converted into electricity. Flament stresses that only identification and health information should be stored in the tattoo so as to ensure equal treatment for all. No information should be included that might provide a means by which individuals could get preferential treatment, such as insurance or financial details. Med. History 2.0 is however not the first tattoo-based medical innovation of its kind. Gizmag.com reported in early 2012 about the grapheme tooth sensor, which is effectively tattooed onto a tooth in order to detect bacteria and wirelessly monitor oral health. A Radio Frequency Identification (RFID) tag is built in, allowing the sensor to report back to additional monitoring equipment that perhaps cannot be shrunken to oral proportions. Later in 2012, Gizmag.com also reported on another innovative product: the ‘smiley-face tattoo’, in which a thin, flexible metabolic sensor is applied to the skin so as to detect changes in the pH levels of sweat on the skin, or to establish when an athlete is tired or dehydrated. But in view of the stated benefits of these new technologies and systems, one may wonder: “So what’s the big deal? It’s all being done in favor of helping mankind, isn’t it?” Yes, on the surface it’s all beneficial and helpful in various ways, but when it facilitates the breaking of God’s laws, the ‘red line’ must be drawn. In Leviticus 19:28 for example, God warns: You shall not make any cuttings in your flesh for the dead, nor tattoo any marks on you: I am the LORD. God clearly did not intend for His people to mark their bodies with tattoos and forbade them to do so.

In addition, a RFID-based tattoo that can hold your medical history, insurance and financial information is certainly something to be especially wary about: the Bible prophesies that in the last days, everyone will be required to wear a mark on their right hand or forehead, in order to be able to buy or sell. This “mark of the beast” will not be voluntary and will be permanent. The mark will be a sign of allegiance and worship to Satan, through the anti-Christ. All who take this mark will be doomed to an eternity in hell. The Med. History 2.0 tattoo may not be that exact mark but like many other similar RFID products linked to body tattoos and implants, it’s clear that the inherent capabilities required to fulfill the ‘mark of the beast’ prophecies are now already available – awaiting to be enforced at the appointed time.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

8

666 SINGULARITY PART 3 – FOREIGN AGENTS 2. RFID IMPLANTS: ARE WE READY? When considering advancements in technology, prophecy scholars and students alike understand that data collection technologies will be critical to the implementation of the mark of the beast, which could be applied by a laser tattoo using permanent invisible RFID ink. RFID (Radio Frequency Identification) ink can be read through the hairs of animals for tracking and other purposes. In 2007 the ink was first made available in the marketplace with a tattoo made up of numbers separated by markers like bar codes. The application process was developed by Somark Innovations, and is applied by a geometric array of micro-needles and an ink capsule, used to tattoo animals in a matter of seconds. A spokesman said the company had created a synthetic biometric fake fingerprint with bio-compatible chipless RFID ink, that could also be used to track and rescue soldiers. Future applications of the ink could be with laser-etch machines which apply tattoos on the surface of the skin. The use of infrared light, bar code readers and various wireless communications are other rapidly developing technologies. Experts in the field of nanotechnology consider RFID ink groundbreaking. Research on neural interfaces that provide a two-way connection between the human nervous system and computers is rapidly expanding. Merging technologies such as "ambient intelligent environments" open the way for the use of nano-scale devices placed on the human body. This "molecular computing" allows biological and artificial components to communicate physical and psychological information received by scanners and sensors which are rapidly decoded and acted on.

Many more companies have now entered the RFID manufacturing field, and biochip usage now has surpassed the “personal pet” stage and is being used in many different areas of farming, ranching (no need for oldfashioned branding irons), racing, and wildlife identification and monitoring. In conjunction with computer technology, RFID biochips are used to track and monitor the health histories, bloodlines, etc., of various farm animals, race horses, breeding stock, prize-breeding stock, and more. In the modern dairy business, good ol’ Bessie can come into the barn, pass under a scanner, be directed to her stall, and find her own specially prepared diet in place, just awaiting her arrival, all based upon her identification combined with the computer-stored information about what the handlers want her to eat. Her health records, milk production, and other pertinent factors are all considered, and the optimum diet is assigned to her. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

9

666 SINGULARITY PART 3 – FOREIGN AGENTS Wildlife has been tagged and tracked manually/visually for many years, but now it is possible to track life as small as a honeybee by attaching an RFID to its back. Of course, this is a real stroke of genius, according to the ecologists, for monitoring all types of wildlife, especially the endangered species. According to Destron director Jim Seiler, implantable RFID biochips are even being used to track fish. In some fishery applications, salmon are injected with these biochips, then scanned and tracked as they pass through specially equipped dam sites “to assure environmentalists that they are not being chewed up in the dam’s power turbines,” Seiler said. Following that, reports were coming out of europe that poachers were being caught and fined because the biochip implants in the fish led the authorities to the poacher. The implications of this announcement were staggering. It meant that the biochip no longer had to be scanned at a close distance of three to twelve inches. It would indicate that technology has been developed and actually put into service that could scan for detection of biochips at great distances, possibly even by satellite. This was, in fact, the ultimate direction biochip technology was heading at the time, as surveillance and control of humans is of far more importance to the leaders of the New World Order than the tracking of animals. Biochips being manufactured now can send and receive data about location and personal information from anywhere in the world, and this technology not only exists in biochips, but a similar technology exists within the digital devices in every purse and back pocket in the country. Take, for example, your smart phone or laptop (or any other portable convenience like electronic pads, notebooks, etc.). If your phone was purchased within the last couple of years from any major carrier, it likely came with a preinstalled GPS that keeps constant tabs on your travels. And, of course, that’s handy when you need it for navigational purposes. What you may or may not know about this feature is that unless you go out of your way to turn the GPS in your phone off (it stays on perpetually otherwise), it attaches personal information to all other data-share occurrences on your phone. Remember that picture you took of Aunt Suzie at the barbecue last weekend? Remember when you uploaded that picture to Facebook and tagged all your friends in it? You left your GPS on in your phone at the moment the picture was taken, and now you, Aunt Suzie, and all others tagged in the photograph are shown as “present” at that barbecue event last weekend. The address and map directions to that exact location are provided at no extra cost by the click of a mouse (again, available to anyone with Internet access, not just “Big Brother”). Not only did you unknowingly report the address where you were last weekend, but you reported the location of Aunt Suzie and your friends. If you chose to leave your personal home address where your spouse and children live omitted from the personal information tab on your Facebook account to ensure privacy, you just negated that safety step by taking a picture of Billy in his highchair and posting it online, forgetting of course to disconnect your phone’s camera from the ever-present GPS. Now Billy can be tracked to his highchair, map and directions to your home included, by anyone online, and it does not stop simply with your phone’s camera. Whereas nobody may be referring to this cellular phone feature as a biochip implant, it’s essentially a chip you voluntarily carry with you everywhere, reporting everything that you do and everywhere you’ve been. If or when a mandatory, government-issued or world-government-issued implantable chip does become the new deal, the leap from your smart phone to the new chip in your hand will not be a long one.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

10

666 SINGULARITY PART 3 – FOREIGN AGENTS Tim Willard, managing editor of the World Future Society’s bimonthly magazine, Futurists, said the technology behind such a human microchip is “fairly uncomplicated and with a little refinement, could be used in a variety of human applications.… Conceivably, a number could be assigned at birth and go with a person throughout life”. He added, “it would be implanted in the back of the right or left hand for convenience, so that it would be easy to scan at stores.… It could be used as a universal identification card that would replace credit cards, passports, that sort of thing.… At the supermarket checkout stand, you would simply pass your hand over the scanner and your bank account would be automatically debited.… It could be programmed to replace a medical alert bracelet. For example, at the scene of an accident, a medic could scan the victim’s hand to find out his recent medical history, allergies, a relative to contact, etc. This would be especially valuable if the person were unconscious” In another very logical application, such microchips could replace the need for keys to home, car, and workplace locks, since the chip in one’s hand would serve as a universal key for all such locks. One would simply scan the back of his or her right hand over a high-tech microreader device designed into future locks to gain access. Security would be enhanced tremendously, since, allegedly, no one would be able to “pick” the locks, make a wax copy, or obtain a spare key found under a doormat. Doesn’t that make you feel really safe? Not if you understand that any burglar worth his salt has always found a way around locks and security devices, no matter how complex. It might serve as a deterrent to an inept thief, but a serious crook would manage to get in somehow. The bigger the target, the cagier the crooks. Just think of any major malicious virus caused by such minds in the past ten years online…most designed by brilliant computer-degree-bearing hackers no more intimidated by a futuristic door lock than someone’s email account. Some of the simple biochips of yesterday are now new biochips partially made of or with living proteins. According to Willard, “A powerful biochip…once surgically implanted in the brain, could make it possible to program or upload an unlimited amount of information into the mind, without ever having cracked a book…it will be infinitely smaller and have the capacity to carry much more information. It will have a wide range of functions that will simply boggle our minds.” After hearing more and more news of hybrid brain-machine interfaces (HMBIs), mind-machine interfaces (MMIs), and brain-computer interfaces (BCIs), Willard’s comment seems almost tame. As far back as the 1970s, there has been a significant amount of focus put upon neuroprosthetics (artificial sensory intervention via prosthetics placed directly in the brain, essentially rerouting and/or repairing the brain’s communication with a body part due to birth defects, injury, or disease). After our country has observed the repeated miracles of such evolution between man and machine (literally observing the lame man walk, the blind man see, and the deaf man hear, among hundreds of other marvels of science), the fusion of a biochip with living proteins taking its podium in current labs is not hard to believe.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

11

666 SINGULARITY PART 3 – FOREIGN AGENTS 3. MICROCHIPPED POPULATION Our loss of privacy, rights, and freedoms is of concern on two levels. The first, of course, is that democratic societies are founded on the principle of rule by the people, the rights of individuals, and the requirement that government be accountable to the citizens. The globalist elite are doing everything they can to overturn these foundations of democracy. But there is a second, more important reason that we need to be concerned about the move toward a centralized global government. Students of prophecy know that such a move is not merely the work of idealistic leaders who are misled about the best way to prevent future world wars. The push for a one-world government is an early development that sets the stage for global rule by the Antichrist. In addition, accelerated technological developments in the surveillance and tracking of individuals, and the pervasive governmental invasion of our lives, reveals many of the tools that could be used by the Antichrist’s regime.

The Antichrist’s totalitarian police control leading to Armageddon will involve “the mark, or the name of the beast, or the number of his name” (Revelation 13:17). These three identifying marks will be used, either simultaneously or separately, to identify the followers of the Antichrist and those who indicate they are willing to worship him as “god.” The mark will be required for anyone to conduct business, make purchases, and acquire food and other necessities, in other words, to survive on earth. Those who reject the Antichrist’s false claim to be god by rejecting the mark will either flee to the hills or will be martyred. Those who remain faithful to the one true God will refuse the Mark of the Beast. The mark itself will be applied to the right hand or forehead of any adult who worships the Antichrist. The mark would be applied to the forehead for a variety of reasons, including that many individuals don’t have a right hand due to an accident or congenital condition. It is also possible that the location of the mark, either right hand or forehead, could designate the person’s relative status as a follower of the Antichrist. The Bible mentions the Mark of the Beast, his name, and the number of his name, which is 666. The mark is different from but related to the name and also differs from the number 666. In John’s prophecy recorded in Revelation 13:16—18, we are not told the exact nature of the mark. It might be a physical brand visible on the surface of the skin, including either the actual name of the Antichrist or the number 666. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

12

666 SINGULARITY PART 3 – FOREIGN AGENTS However, using existing technology, the mark or number 666 can be implanted under the skin of every person using an RFID (radio frequency identification) microchip. A powerful electronic scanner could detect the chip from a distance and reveal all your personal information, far more than your name, address, age, and marital status. While the implanted microchip and its information would be readable by a radio frequency scanner, a person would not know when or where his private information was being accessed or who was accessing the information. Automated-teller machines, RFID chips beneath the skin, and laser scanning technology illustrate the ease with which every person on earth could be located and identified, at anytime, anyplace. Scanning devices, including high-speed, long-distance optical readers and iris scanners, as well as radio-frequency ID scanners, are used at government buildings, universities, industrial plants, airports, and border stations to read your identity or the license plate of your car from hundreds of yards away. New technology is making it feasible for RFID microchips to be painlessly implanted beneath the skin. A person can use the subcutaneous chip to complete secure financial transactions or communicate wirelessly with a computer or other digital device. But having had the chip implanted, the person also can be identified and tracked continuously. Kevin Warwick, professor of cybernetics at Reading University in England, claimed to be the first person in the world to be voluntarily implanted. Warwick experimented on himself by implanting a sophisticated computer chip that enabled him to transmit signals to the university’s communications system. The implanted device was twenty three millimetres long and three millimetres wide and emitted its unique signal only in the presence of radio frequency waves from transmitters in an intelligent building. Warwick stated, “The potential for this technology is enormous. It is quite possible for an implant to replace an Access or Visa card,” Warwick stated. “Individuals with implants could be clocked in and out of their business automatically.” Despite their commercial advantages, the professor warns, “An individual might not even be able to visit the toilet without a machine knowing about it.” New surveillance technologies are rapidly creating a permanent surveillance society controlled by the shadow government. Unseen watchers can track your location and activities twenty four hours a day. The new totalitarian surveillance systems exceed anything conceived by the Nazi Gestapo or the Russian KGB. In recent years, RFID technology has been expanding within public and private firms as a method for verifying and tracking people as well. We first became aware of this trend a while back when a chief of police—Jack Schmidig of Bergen County, New Jersey, a member of the police force for more than thirty years—received a VeriChip (RFID chip) implant as part of Applied Digital Solution’s strategy of enlisting key regional leaders to accelerate adoption of its product. As a result, PositiveID (renamed from VeriChip) has been offering the company’s current incarnation of implantable RFID as “a tamper-proof means of identification for enhanced e-business security…tracking, locating lost or missing individuals, tracking the location of valuable property [this includes humans], and monitoring the medical conditions of at-risk patients.” While PositiveID offers testimony that safeguards have been implemented to ensure privacy in connection with its implantable microchips, some believe privacy is the last thing internal radio transmitters will protect—that, in fact, the plan to microchip humanity smacks of the biblical Mark of the Beast. Has an end-times spirit indeed been pushing for adoption of this technology this generation? 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

13

666 SINGULARITY PART 3 – FOREIGN AGENTS 4. HOW RFID TECHNOLOGY WORKS While its past use for surreptitious audio eavesdropping is troubling, RFID’s modern incarnation is downright bone-chilling. Radio frequency identification could put us and our information at the mercy of global corporations and government bureaucracies and strip away the last shreds of privacy we have left. Ultimately, its power to reveal, track, and transmit could enslave us.

These are bold statements to make about a technology that’s been promoted as merely a cost-efficient way to keep track of items in retail stores like Wal-Mart. Could modern-day RFID really be a wolf in sheep’s clothing? RFID makes it possible to identify and track just about any physical object you can think of—books, car tires, shoes, medicine bottles, clothing, pets, and even human beings. The “RF” part of RFID stands for “radio frequency” and explains how RFID does its tracking: It uses electromagnetic energy in the form of radio waves to communicate information at a distance. These silent, invisible waves are similar to the radio waves that allow you to listen to your favorite FM radio station. And like other radio waves, they can travel right through windows, wood, and even walls. Of course, radio waves that can go through walls have no problem passing through other items we consider private—like our purses, wallets, backpacks, and clothing. One industry insider defines RFID as “any device that can be sensed at a distance by radio frequencies with few problems of obstruction or misorientation.” This ability to transmit information through solid objects makes RFID far more invasive than the now-familiar bar code with its vertical black and white stripes. Bar code technology uses a laser beam to convey information, so an unobstructed path known as an “optical line of sight” is needed between the bar code and its reader. Since the bar code must be visible to the reader and its pattern must be clean and clear, it’s hard to read a bar code someone’s carrying without the person knowing about it. In contrast, items equipped with RFID can be located and identified even when other things—like locked doors or sealed envelopes—are in the way.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

14

666 SINGULARITY PART 3 – FOREIGN AGENTS RFID technology can take many forms. It can be incorporated into nails, beads, wires, fibers, or even painted pictures or words. But for the sake of simplicity, let’s look at the typical RFID tag that companies want to put on consumer products within the next few years. There are two main components to an RFID tag. The first component is the tiny silicon computer chip that contains a unique identification number. This chip is often referred to as an “integrated circuit” in scientific circles. The chip can be as small as a speck of dust. In fact, one of the smallest RFID chips in the world is just 0.25 mm square, which is smaller than the period at the end of this sentence. The second component of the RFID tag is an antenna that’s hooked up to the miniature chip. But it’s not like the obvious protruding antenna on a transistor radio. An RFID antenna is typically a flat, metallic coil that looks very much like a miniature maze or a tiny racetrack. The antenna coil radiates out from the chip and goes around it in a flat, rectangular configuration, or it may form a long strip, a circle, or an X-shape. The chip and antenna combination, called a “tag” or “transponder,” is typically affixed to a plastic surface like an adhesive label or a credit card blank.

Today’s RFID tags are generally the size of a thumbnail or larger. The largest ones encountered are a little bigger than an index card, and the smallest are about the size of a dime. However, there is a commercially available RFID tag, the Hitachi “mu chip,” that measures just 0.4 mm square—antenna and all. This is half the size of a grain of sand. Though the read range on such tiny tags is quite limited today, as technology progresses, we expect tags will get even smaller and gain new functionality. They are likely to follow the same trend as computers, which have packed more functionality into smaller and smaller footprints over time. To put this in perspective, consider that the computing power that used to take an entire room in an office building can now fit into a hand-held programmable calculator. Main components of an RFID system include a tag, reader, and database. RFID proponents plan to share data via the Internet. When an RFID tag gets within range of a reader, the tag’s antenna picks up the reader’s energy, amplifies it, and directs it to the chip. This energy stimulates the chip to beam back its unique

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

15

666 SINGULARITY PART 3 – FOREIGN AGENTS identification number, say 345678, along with whatever other information it was programmed to relay. The reader device captures this information and processes it. What we just described is called a “passive” RFID system, where the tags contain no internal power source of their own. You can think of a passive tag as one that lies around all day doing nothing except waiting for a reader to come along and energize it. A passive tag can’t communicate anything unless a reader solicits a signal from it. But don’t let the name fool you; since it doesn’t need batteries, a passive tag can operate indefinitely. What’s more, you can never tell when someone or something will power it up. The fact that you only have to power up a single reader device to activate countless little tags makes passive RFID very appealing to RFID engineers, since they can invest in a few readers and buy lots of cheap, disposable tags for the multitude of items they want to track around the planet. Because passive tags are small and lightweight, they can be woven into our clothing labels, sewn into the seams of our undergarments, and even embedded in products inserted into our bodies, like dentures. While the passive RFID tag is entirely dependent upon an RFID reader device as a power source, it’s also possible to attach a battery to an RFID tag, changing it from “passive” to “active.” An active tag, containing its own source of energy, can thereby actively transmit its information payload rather than just lie dormant waiting for a reader. It can also transmit its information further and can transmit more data than the typical passive tag. Electronic toll collection systems like FasTrack, EZ-Pass, and others use active RFID tags to identify your car as you drive through a tollbooth and automatically charge your account. Keyless remote systems for cars and garage door openers also use active RFID tags. Libraries are some of the earliest adopters of RFID, which is troubling because those institutions have helped to preserve the right of all Americans to learn and think freely. Given that library records have already been targeted by overly zealous USA PATRIOT Act Provisions which give FBI agents the ability to seize records of “suspicious” patrons, the library would seem a particularly risky place to open the door to RFID. While some libraries like Warren Newport have adopted RFID without public input, there is a growing chorus of dissent. Privacy advocates like Peter Warfield of the Library Users Association and Lee Tien of the Electronic Frontier Foundation are working to point out not only the privacy threats but also the faulty statistics administrators use to justify spending millions of tax dollars on new library systems. Typically, having a battery on board an RFID tag makes it bigger, heavier, and more costly, restricting its use to places where bulk and price are not issues. Active RFID tags are popular for use on reusable warehouse pallets and shipping containers, for example, but probably wouldn’t work so well on ladies’ lingerie. Read range for a passive RFID tag can be anywhere from a couple of centimetres to twenty or thirty feet, depending on the frequency used, the size of the antenna, the amount of power transmitted by the reader, and the environmental conditions. An active tag with a battery can send a signal up to a mile or more. Some very highpowered active tags, like those used to track creatures in the world’s oceans, can even transmit information to low orbiting satellites. As you might expect, passive RFID tags are much cheaper than active tags, so, for the moment, they are the technology of choice for tracking inexpensive items. But engineers are working around the clock to develop inexpensive disposable batteries. The latest breakthrough in battery technology is a flat, printed battery less than a millimetre thick that can be used to power RFID tags. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

16

666 SINGULARITY PART 3 – FOREIGN AGENTS Precisia, the North American company that is developing the conductive ink for these batteries, characterizes them as “ideal for smart labels, radio frequency identification (RFID) tags and active packaging applications that require an external power source. They serve as an affordable replacement for button batteries in such diverse applications as greetings cards, cereal box giveaways, printed board games, point-of-purchase displays and credit cards.” While you can spot many of today’s RFID tags if they are sitting in plain sight, RFID tags are easy to hide. Because the tags are usually paper-thin, they can be sandwiched between the layers of cardboard in boxes so they are visually undetectable. Manufacturers can embed the tags into everyday items during manufacturing by heat-sealing them into plastic, incorporating them into rubber, or even embedding them in a shirt label. Amazingly, the industry has even invented flexible RFID tags for clothing. Fine metallic threads sewn into the fabric act as the antenna. RFID readers operate on the same principle you use to tune your radio dial to intercept a particular radio station. For an RFID reader to detect a tag, it must be operating at the same frequency as the tag—and there are a lot of frequencies to choose from. Here are some of the more common RFID frequencies in use today: •

Low: 30 to 300 kHz, primarily 125 kHz band and 134.2 kHz. Typically used on animals, including humans, where water content of the body must be taken into account.



High: 13.56 MHz. Mainly used for manufacturing, warehouse and retail store applications.



Ultra High: 300 MHz to 1GHz, primarily 915 MHz. Provides a longer read range, but performs poorly around water and metal. Used in Wal-Mart’s warehouses and other “supply chain” applications.



Microwave: above 1 GHz, primarily 2.45 and 5.8 GHz bands. Easily obstructed, works best with line of sight. The 2.45 GHz tags were used in a hospital trial we will discuss later.

Even when their frequencies are compatible, tags and readers cannot talk unless they have the right protocol or standard. This means they must share the same language in order to understand each other. RFID tags could appear on the surface of products, yet still be visually undetectable. While most RFID antennas use a metallic coil or strip, a company called Flint Ink has developed a spray-on conductive ink that can serve as an RFID antenna. They can put the tiny chip on top of this grey matte-looking surface, then cover it with regular packaging ink so the consumer would never see it. Even the RFID chip itself could be printed one day. Scientists have discovered conductive organic polymers that can be dissolved in ink. Siemens, the global technology giant, hopes this will open the door to printed electronic circuits that will replace today’s silicon circuits. Not only would these spychips be far less expensive, they would be flexible. According to Siemens, a futuristic chip “woven into a sweater could, for example, inform the washing machine of the water temperature it needs to provide.” Tags can even be “chipless.” Currently, they don’t perform as well as their chipped counterparts, but time and research are narrowing that divide. Even without a chip, these tags can still be read through a brick wall. Just as tags can be well hidden, so can the reader devices that interrogate them. In fact, readers can be even harder to find because they don’t have to fit in small packages or conform to various product designs. Since optical line of sight isn’t needed for radio wave transmission, RFID readers can be embedded in doorways, woven into carpeting and floor mats, hidden under floor tiles, embedded in ceiling tiles, incorporated into shelves, and placed behind store displays. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

17

666 SINGULARITY PART 3 – FOREIGN AGENTS The RFID “smart shelf” reader device made infamous by Gillette looks a lot like a medium-sized pager. While early versions had rigged the reader under existing shelving, leaving evidence of wiring exposed, the newer versions incorporate the reader directly into the shelf itself, as part of the shelf design. More conventional RFID readers designed for use in retail stores and supermarkets can look very much like the current equipment that reads bar codes, so a transition to RFID might not be apparent at the cash register. In fact, the handheld bar code price verifiers that retail employees carry around while completing inventory and the bar code scanners (handheld and stationary) at the point of sale could read both bar codes and RFID tags if upgraded. Outside the store, the location of reader devices would only be limited by the imagination. Why not incorporate readers in vending machines or benches just outside the store? Readers could be blended into the landscape, perhaps hidden in artificial landscape boulders or signs. RFID tags can be read from a distance by anyone with the right reader device, right through people’s clothes, wallets, backpacks, or purses without their knowledge or consent. It creates a form of x-ray vision that could enable strangers to identify people and the things they’re wearing and carrying. In the future, readers could be hidden in stores, public buildings, homes, and even outdoor spaces like parks to electronically frisk you as you pass by, taking notes on everything in your possession.

Unlike the optical readers associated with bar codes, RFID readers emit electromagnetic energy over wide swaths. Since global corporations hope to embed RFID readers into walls, floors, doorways, shelving, even in the refrigerators and medicine cabinets of our homes, we and our children would be continually bombarded with the energy emanating from these devices. Medical researchers have begun to raise questions about the long-term health effects of this type of chronic exposure to low levels of electromagnetic radiation.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

18

666 SINGULARITY PART 3 – FOREIGN AGENTS 5. THE VERICHIP LEGACY In September 2007 shares in Applied Digital Solutions and its publicly traded subsidiary VeriChip, which at the time was making an implanted microchip for identifying people, fell sharply as investors reacted to a report linking the tiny radio device to cancer. The radio identification device for which VeriChip is named was a glassencased chip the size of a grain of rice. The device, which carried an encrypted number, was injected in the upper arm. In medical applications, the chip was linked to medical records stored at hospitals or with a primary-care physician. A low-powered transmitter in the chip emitted the identification number when queried at close range by a VeriChip scanner.

When the U.S. Food and Drug Administration (FDA) approved implanting microchips in humans, VeriChip said it would save lives, letting doctors scan the tiny transponders to access patients' medical records almost instantly. The FDA found "reasonable assurance" the device was safe, and a sub-agency even called it one of 2005's top "innovative technologies." But neither the company nor the regulators publicly mentioned that a series of veterinary and toxicology studies, dating to the mid-1990s, stated that chip implants had "induced" malignant tumors in some lab mice and rats as part of the clinical trial process. In September 2007 The Associated Press finally issued a breaking story revealing that VeriChip microchip implants had induced cancer in laboratory animals and dogs. The series of research articles spanning more than a decade found that mice and rats injected with glass-encapsulated RFID transponders developed malignant, fast-growing, lethal cancers in up to 1% to 10% of cases. The tumors originated in the tissue surrounding the microchips and often grew to completely surround the devices, the researchers said. A four-month Associated Press investigation turned up additional documents, several of which had been published before VeriChip's parent company, Applied Digital Solutions, sought FDA approval to market the implant for humans. The VeriChip received FDA approval in 2004 under the watch of then Health and Human Services Secretary Tommy Thompson who later joined the company's board.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

19

666 SINGULARITY PART 3 – FOREIGN AGENTS The report, by The Associated Press, suggested that VeriChip and federal regulators had ignored or overlooked animal studies raising questions about whether the chip or the process of injecting it might cause cancer in dogs and laboratory rodents. VeriChip said that it had not been aware of the studies cited in the report, according to the article, but both the company and federal regulators said that animal data had been considered in the review of the application to implant the chips in humans. They said that there were no controlled scientific studies linking the chips to cancer in dogs or cats and that lab rodents were more prone than humans or other animals to developing tumors from all types of injections. Scott Silverman the, CEO of VeriChip at the time, denied any knowledge of such tests, stating: “(the VeriChip company) was not aware of any studies that have resulted in malignant tumors in mice or rats, and certainly not cats or dogs.” Later, however, Silverman admitted certain studies were "omitted from the sheaf of studies included in the FDA application (for approval),” Since the reports came out, Mr. Silverman had been caught in a tangle of misstatements and VeriChip went down hard and fast. On July 21 2008, VeriChip sold its Xmark division of the company that comprised its main enterprise to Stanley Canada Company for $47.9 million. Xmark's product line provides external RFID active tags for the healthcare market. Though this may seem like a lot, with over $24 million going to pay off debt and another $15 million allotted as dividends for shareholders, the company has made a minimal profit in comparison with its hopes. Mr. Silverman has stepped down as CEO, and the parent corporation, Digital Angel, had taken over what was left of the company before changing its name to VeriTeq in July 2013 in a share exchange agreement with VeriTeq.

The PositiveID Corporation was then formed on November 10, 2009, through the merger of VeriChip Corporation and Steel Vault Corporation. The company now operates in two main divisions: HealthID and ID Security. The company's HealthID business is further differentiated into its Human Health division and its Animal Health division. HealthID focuses on bringing health solutions to consumers, animals and businesses based on the company's intellectual property. Through its ID Security segment, the company offers a webbased personal health record (PHR), and identity theft protection and related services (including credit monitoring and reporting) through National Credit Report.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

20

666 SINGULARITY PART 3 – FOREIGN AGENTS 6. IBM PATENTS AGENDA Big companies like IBM, Procter & Gamble, NCR, and other visionaries have all filed patent documents that provide scandolous snapshots of how they’re proposing to spy on consumers with RFID technology. The patent process is a serious legal undertaking. Inventors filing an application must take an oath swearing that the information they present is truthful and that the invention meets the requirements to be patentable. To qualify for a patent, an invention must be shown to be both “useful” and “operative.” In other words, it has to work. Any machine or process which cannot perform its intended purpose cannot be called useful, and therefore should not be granted a patent. While not all patent filings are approved, and many never pan out financially for their inventors, they can still provide rich insights into how a company operates, its ethical standards, and its long-term thinking, goals, and priorities. For instance IBM, the technology giant is one of the most heavily invested companies in RFID projects. So when it files for a patent involving the technology, we pay attention. On May 3, 2001, IBM inventors filed patent application #20020165758, IDENTIFICATION AND TRACKING OF PERSONS USING RFID-TAGGED ITEMS. That patent application spells out one of the key problems with RFID: It can all too easily be used to track people. How? IBM details a way to collect RFID numbers at the cash register and store the numbers in a database. Then, later on, “the exact identity of the person” can be determined from the tags and “used to monitor the movements of the person through the store or other areas.”

IBM explains: “Previous purchase records for each person who shops at a retail store are collected by [cash register] terminals and stored in a transaction database. When a person carrying or wearing items having RFID tags enters the store or other designated area, a RFID tag scanner located therein scans the RFID tags on that person and reads the RFID tag information. The RFID tag information collected from the person is correlated with transaction records stored in the transaction database according to known correlation algorithms. Based on the results of the correlation, the exact identity of the person or certain characteristics about the person can be determined. This information is used to monitor the movement of the person through the store or other areas.”

The patent application goes on to describe how RFID tags could be used to identify a person’s age, race, gender, and income bracket: “. . . instead of determining the exact identity of the person, some characteristics such as demographics (e.g., age, race, sex, etc.) about the person may be determined based on certain predetermined statistical information. For example, if items that are carried on the person are highly expensive name brands, e.g., Rolex watch, then the person may be

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

21

666 SINGULARITY PART 3 – FOREIGN AGENTS classified in the upper-middle class income bracket. In another example, if the items that are carried on the person are “female” items typically associated with women, e.g., a purse, scarf, pantyhose, then the gender of the person can be determined as a female.”

Once IBM has the information, they could even use it to see if you’re from out of town or how long you’ve owned that pair of underwear: “When the system is configured to identify the general demographical information about the person, information such as the gender, age, social economic status, geographic location where they probably purchased the products, how long the products have been in service, etc., may be determined.”

IBM has even developed a device actually named the “person tracking unit” that can zero in on your RFID tagged products and use them to watch you like a hawk: “Once the exact identity or some demographics or other characteristics of the person have been determined, the person tracking unit relies on this information to track the person as the person moves through the roaming areas. The person tracking unit may assign a tracking number to each identified person and store the tracking number in association with the collection of RFID tagged product information.”

So why would IBM suggest obtaining all this information? Well, here’s one reason: “Once the movement of the person can be monitored based on the RFID tags carried on the person, the tracking information can be used in a number of different ways. For example, it can be used to provide targeted advertising to the person as the person roams. . . .”

IBM inventors also suggest that the government could track suspicious persons in public places via the RFID tags in the things they are wearing and carrying. “Although the systems . . . of the present invention . . . have been described in context of a retail store, it can be applied to other locations having roaming areas, such as shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, restrooms, sports arenas, libraries, theaters, museums, etc.”

IBM has also announced that it’s plowing $3 billion into two R&D programs that will hopefully make it the authority on 7-nanometer-and-beyond chip technologies. One R&D project will look at pushing conventional silicon chips as far as they will go (around 7nm), and the other will be tasked with finding new materials and techniques that can take us even further (quantum computing, carbon nanotubes, graphene, III-V). IBM also took the opportunity to remind everyone that it’s already the biggest player in 7nm-and-beyond technology, with over 500 applicable patents (more than double the nearest competitor). While most major chip makers (Intel, TSMC, GloFo, IBM) seem confident that they can take standard silicon CMOS chips down to 10nm, they are a little bit nervous about the prospect of 7nm and beyond. At around 7nm, the current building blocks of silicon transistors just won’t behave in the same way; when the gate is just a few atoms across, classical physics goes out the door and quantum physics (which behaves rather differently) takes over. While different transistor designs (such as 3D) allow us to take silicon a little further, the laws of physics will eventually catch up.

666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

22

666 SINGULARITY PART 3 – FOREIGN AGENTS 7. BIOMETRIC DATA AND NATIONAL IDENTIFICATION The inclusion of biometric information in national identification is something we have already seen where in 2012 the largest undertaking of a national ID began taking place in the country of India, having the world's second largest population after China. Called the "Unique ID Project" which falls under the "Unique Identification Authority of India," every citizen was to have one unique identification (UID) number. An identification card or "Multipurpose National Identity Card" or MNIC (biometric ID) which would be issued to each citizen, containing a photo and biometric information. Each citizen would be required to complete a fingerprint scan of all fingers, plus an optical scan which records the unique iris patterns in the eye, and a photograph. The government intention was to issue the identification cards to more than 600 million citizens by the end of 2013. Biometric IDs (national ID cards) are another example of simplifying the process of keeping track of billions of people. The U.S. (and a number of other countries) are planning the implementation of a "National Worker ID Card" (biometric Social Security card), in hopes of fixing the immigration (undocumented worker) problem in the U.S. and other countries. With a goal of full implementation by 2015, it would require all workers in the United States to carry an ID card complete with identifying biometric information, such as their fingerprints. Every person who seeks a job in the U.S. (citizens and non-citizens) would be required to present a biometric ID card to potential employers verifying one's eligibility to work. Some states are calling this an "e-verify" system. This technology can also be used to store an individual's personal health information, which some suggest could be used as a means of identifying, segregating and controlling populations. The technology is being developed by a number of companies, including Direct E-Secure Inc., a leading developer of biometric facial recognition and biometric RFID security systems The failure of the REAL ID Act in 2009 was a similar attempt to force a national ID card on American citizens by using the war on terrorism as an excuse to monitor everyone. Not missing a beat, the government modified the REAL ID act and renamed it the PASS ID Act ("Providing for Additional Security in States' Identification Act of 2009") which contained a provision requiring proof of lawful status to get an approved ID. The Act is still in the proposal stage.

Civil and privacy rights advocates, as well as liberal-, conservative-, and libertarian-leaning organizations, have long raised concerns that a national ID card would enable the government to track citizens and, thus, 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

23

666 SINGULARITY PART 3 – FOREIGN AGENTS jeopardize the privacy rights of Americans. President Reagan likened a 1981 proposal to the biblical "mark of the beast," and President Clinton dismissed a similar plan because it smacked of Big Brother. Most recently, The Rutherford Institute and the American Civil Liberties Union, along with a host of other organizations, voiced their opposition to the biometric ID card. In a letter to both the U.S. House of Representatives and Senate Judiciary Committees, Senate Finance Committee, House Ways and Means Committee and the White House, this coalition of groups declared that such a national ID card would "not only violate privacy by helping to consolidate data and facilitate tracking of individuals, it would bring government into the very center of our lives by serving as a government permission slip needed by everyone in order to work. As happened with Social Security cards decades ago, use of such ID cards would quickly spread and be used for other purposes – from travel to voting to gun ownership." And the national biometric ID card would "require the creation of a bureaucracy that combines the worst elements of the Transportation Security Administration and state Motor Vehicle Departments." At a minimum, these proposed cards will contain a memory device that stores distinct – and highly personal – physical or biological information unique to the cardholder such as fingerprints, retina scan information, a mapping of the veins on the top of your hand, and so on. Eventually, other information, such as personal business and financial data, will probably also be stored on these cards. For the cards to be effective, an information storage system and central database, which will be managed by the government and its corporate handlers, will be required. That means a lot of taxpayer dollars will be used to create the ultimate tracking device to be used against American citizens. As journalist Megan Carpentier reports, "The federal government wants to spend hundreds of millions of dollars, and force employees and employers still suffering from a recession to do the same, to create and make accessible to every employer a national database of the fingerprints of all Americans from the time they are 14 years old. And they want to do it in order to keep an estimated 11.9 million unauthorized immigrants – less than 4 percent of the total population of the United States – from accessing the job market."

Under threat of substantial fines by the government and in what promises to be a cumbersome, bureaucratic process, employers will have to purchase ID card scanning devices (or visit their local DMV) in order to scan the cards of every individual they wish to hire before that individual can be employed. What this amounts to, essentially, is a troubling system in which all Americans would have to get clearance from the federal government in order to get a job. Furthermore, the law’s requirement that machine-readable technology be incorporated into the card opens the door for radio frequency identification (RFID) tags to be placed on the cards. RFID is a tiny, automatic identification system that enables data – in this case the private information of American citizens – to be transmitted by a portable device. This will provide the government with unprecedented access to American citizens’ personal information. In addition, RFID tags emit radio frequency signals that allow the government to track the movement of the cards, as well as the cardholders. In other words, wherever your card goes, so do the government monitors. When all is said and done, the adoption of a national biometric ID card serves one purpose only: to provide the government with the ultimate control over the American people. 666 SINGULARITY A PRODUCTION OF REMA MARKETING AND WWW.GLOBALREPORT2010.COM ©2014, All rights reserved

24