Privacy extinction

A Weekly Global Watch Media Publicaon (www.globalreport2010.com) June 21st, 2013 The Global Watch Weekly Report is a ...

0 downloads 133 Views 702KB Size
A Weekly Global Watch Media Publicaon (www.globalreport2010.com)

June 21st, 2013

The Global Watch Weekly Report is a publicaon of Rema Markeng (www.remamarkeng.com) and is published every Friday. For any queries regarding this service please contact us at admin@remamarkeng.com. ©Rema Markeng 20113. All Rights Reserved.

“The Number one weekly report which provides concrete evidence of a New World Order & One World Government agenda”

www.globalreport2010.com This is a FREE report. Please pass this on to others who you may feel would benefit from this information. Web site owners please feel free to give this away to your site visitors or email lists Not yet on our mailing list? Then visit the web site link below and sign up to ensure you don't miss out on these free weekly reports

www.globalreport2010.com

Welcome to the Global Watch Weekly Report The former CIA worker who leaked secret surveillance details to the Guardian is a hero according to two in five people polled. Edward Snowden, 29, who is currently on the run from the American authorities, sacrificed himself for the public good according to 41% of respondents. An Opinium/Observer poll further found that 43% also believe Snowden has done something "brave and should be heard, not prosecuted".

Last Saturday, in a sign of public support for the American, a demonstration took place outside the US consulate in Hong Kong. Snowden has not been seen since leaving a hotel there last Monday. Hundreds marched to the consulate where they delivered a letter addressed to consul general Steve Young. They also urged the city's government not to extradite Snowden who has admitted to leaking documents said to show how the US National Security Agency obtained direct access to the systems of Google, Facebook, Apple and other US internet giants. A PowerPoint presentation leaked to the Guardian by Snowden appears to show that the National Security Agency (NSA) access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats. The presentation claimed that the program is run with the assistance of social networking companies, however Facebook and Google have denied knowledge of Prism. Many of you probably will have some unease dealing with issues of security because inwardly you already are aware that your personal details are at risk when using social networking sites and cell phones with locational tracking functionality. Unfortunately feeling uneasy about such matters does nothing to detract away from the fact that George Orwell's vision of a big brother society is fully here. In this edition we take a closer look at the objectives of the NSA under the big brother agenda.

www.globalreport2010.com The Global Watch Weekly Report is a publicaon of Rema Markeng (www.remamarkeng.com) and is published every Friday. For any queries regarding this service please contact us at admin@remamarkeng.com. ©Rema Markeng 2011. All Rights Reserved.

D

PRIVACY EXTINCTION Blackberry Under the Spotlight Ed Snowden who is now on the run from Hong Kong due to the Hong Kong authorities making As you aware, former CIA contractor Edward statements that they would extradite him back to the Snowden has carried out one of the biggest leaks in United States, made the following statement US history, exposing a top-secret National Security regarding the PRISM program. Agency (NSA) surveillance program to the media. Leading tech companies were revealed to be “Because even if you’re not doing anything wrong, you’re being watched and recorded. And the storage capability of these systems involved in intelligence gathering through PRISM increases every year consistently by orders of magnitude to where spy tool. PRISM is a top-secret program that allows it’s getting to the point where you don’t have to have done anything the NSA to directly access the servers of numerous wrong, you simply have to eventually fall under suspicion from online services and to obtain all kinds of information somebody, even by a wrong call. And then they can use the system to go back in time and scrutinize every decision you’ve ever made. about its users. THE PRISM PROGRAM

Every friend you’ve ever discussed something with. And attack you on that basis, to derive suspicion from an innocent life, and paint anyone in the context of a wrongdoer.”

For those who understands Bible prophecy, there is nothing humorous about our government acting like Big Brother. The Bible warns that in that last days the Antichrist will have total control of the citizens of planet Earth. If the NSA PRISM program is not part of the Beast’s 666-mark system, it will at least be a prototype of the network he sets-up.

Since the story came out, some services such as Facebook denied any involvement with this program, stating that the NSA does not have access to their servers. The Guardian has however published leaked top-secret PowerPoint slides used to trained NSA agents that clearly state that 1- The

“And he causes all, the small and the great, and the rich and the poor, and the free men and slaves, to be given a mark on their right hand or on their forehead, and he provides that no one can buy or to sell, except the one who has the mark, either the name of the beast or the number of his name” (Revelation 13:16-17).

President Obama assured the American people that his security services are not listening to your online data and to a degree he is probably right. They are not actually listening physically, computer algorithms are doing that for them! However, there is a more sinister intention for PRISM and it is data collection for use in future predicative software! They are collecting huge amounts of social data to tap into the collective consciousness and see possible future events that may be a threat to the current power system.

There is now more than enough data, in the public domain, to prove that there is something we do not quite understand about the human consciousness and that it does react to certain situations. A perfect example is The Human Consciousness Project. This a global project created by hundreds of NSA can directly access these servers and 2- Most scientists and physicians who collect data, from major providers are directly involved in the program. random number generators located worldwide. The slide above actually show the date when some Their data clearly proves that when the human of the world leading communication and social consciousness reacts it has an effect on real digital networking companies joined the PRISM program. communications.

www.globalreport2010.com

4

D

PRIVACY EXTINCTION Blackberry Under the Spotlight The random number generators constantly churn out random numbers but appear to be affected by situations that have an effect on large groups of humans, for instance big disasters. The Human Consciousness Project data changed dramatically from random to non-random when 911 occurred and the Tsunami in the Philippines happened. We also have more data pointing to the potential use of data for monitoring the future with Clif High’s webbots. For years he has been using analyzed collected social data to help predict future events. The webbot results, although not 100% correct, have some amazing hits. The data from Clif’s webbots predicted the large Tsunami in the Philippines and even gave the exact number of fatalities prior to the event.

phones and email, governments around the world have struggled to maintain their ability to hunt down criminals and dissidents. As the world went wireless, intelligence gathering agencies have adapted and upgraded wiretapping skills, and major telecommunications companies have helped them do it. Nokia, Sprint, Ericsson, Facebook, Google – think of a business that helps people talk and exchange information and you’ll think of a company that has helped law enforcement agencies look through private data in search of the bad guys. Not such a big deal, right? I mean, we all want to hunt down the bad guys. Yet it’s becoming clear that not only is the loss of our privacy considered acceptable collateral damage, but giving backdoor access to governments make a business’ data more vulnerable to the bad guys as well. In many areas of the globe, such as the US, UK and EU, to name a few, governments may monitor a citizen’s communications when they are suspected of a crime. There are legal/judicial hurdles that must be cleared for such observations to be installed but once they are cleared governments are legally allowed to spy. Such wiretapping has been going on since before the phone was invented. Now, however, much of our communication doesn’t pass through telephone wires but through the servers of corporate giants like Google. This proved to be both a hindrance and a large opportunity to information gathering and law enforcement agencies. They didn’t have direct access to those lines of communication, but the new medium allowed for automated detection and recording. By requiring companies like Facebook, Google, Sprint, etc. to grant them automated backdoor access to their technologies, government agencies all around the world suddenly had the means to browse through billions of communications.

The point being made here is that an organization, like the NSA, with unlimited finances and resources could have possibly taken this research to the next level and to make use of their new found technology would require huge amounts of social media data to Email subject lines, mobile phone GPS locations, analyze. call histories – all this digital information could be scanned, sorted, and stored for future use. For INFORMATION HIGHWAY CONTROL instance, Sprint-Nextel provided US agencies with 8 million requests for cell phone GPS location Controlling information and spying on citizens were information in 2008-2009 alone – and that’s just one hallmarks of totalitarian regimes in the 20th century. mobile company. In an interview with Russia Today, Yet today, even moderate democracies are getting Julian Assange, head of WikiLeaks stated that other in on the action. In the last decade, as technology companies, such as Facebook, are so communication has shifted from traditional accessible to US intelligence agencies that they act landlines, phone calls, and postal service to cell as de facto information gathering sources.

www.globalreport2010.com

5

D

PRIVACY EXTINCTION Blackberry Under the Spotlight DANIELS REVELATION GATHERING PACE But thou, O Daniel, shut up the words, and seal the book, even to the time of the end: many shall run to and fro, and knowledge shall be increased. Daniel 12:4

According to these instructions to the Hebrew prophet Daniel, neither Daniel nor anyone else would be able to correctly interpret any time of the end time prophecies in Daniel 12 related to the end times until "the time of the end." This means a new message will mark the arrival of the time of the end; a message that will not only feature things never heard before, but one that could not have been determined by anyone prior to the time of the end up until now.

The technological advances of the twentieth century, especially during its last quarter, and also the twenty first century are without historical precedent. Many technological instruments that were unknown just 100 years ago have become integral parts of our lives. The gap between the technology of the nineteenth century and of today has reached unimaginable dimensions. Current developments provide important signs regarding the technological advances from which people will benefit in the twenty first century.

In the twentieth century, internet technology opened a new era by making communication and information sharing almost instantaneous. Learning, reading an international organization's reports, researching in a library, getting news, learning about technological developments and relevant comments now takes only a few minutes. As a result, comprehensive information collection that used to take long years of research can now be done with a minimum of effort. Today, the explosion of information and technology has reached critical mass, doubling every 10 months, with many of the discoveries becoming the source of major debates about human ethics, the boundaries which man should abide by in terms of not playing “God” and also the impact that new technologies are having on personal privacy. A bird’s eye view of the world in 2013 shows that we are heading rapidly into a full blown surveillance society. The U.K. probably heads the world in this effort, but the U.S. is nipping at its heels. Newsmax online has reported the fact that Barack Obama is eyeing the Internet to ID all Americans. This was preceded by the Net Neutrality Act which was the first phase of the government monitoring the internet. White House Cybersecurity Coordinator Howard Schmidt says, "This is the perfect spot in the U.S. government to centralize efforts toward creating an 'identity ecosystem' for the Internet."

Privacy groups are alerting that this is an absolute infringement on Americans' rights. The Department of Homeland Security will also help implement this. The Obama administration has back up support from a United Nations office in Geneva where officials from 18 countries voted to staff a working group on the future of something called the “Internet Governance Forum”. Since it's a United Nations backed initiative, there is already reason to be concerned. The plan was supported by China and, not without surprise, Iran. So, it has global impact, not just Obama impact.

Great advances in communication have provided very rapid communication and information exchange among all people, regardless of location. Satellite-based telecommunication networking, in particular, will provide tremendously rapid communication, and holographic telephones will introduce a new dimension to communication by projecting a life size holographic image of the person being called. For good or bad, technology is taking center stage. It has for 25 years or more. Time magazine's man Today, computers are improving life quality in of the year for 2010 was Mark Zuckerberg, creator houses, workplaces, medicine, communication, the of Facebook. This communication tool has taken the arts, and so on. In the Golden Age, these world by storm. Zuckerberg is worth about $50 developments will accelerate in the socioeconomic billion as a result of a device that helps people domain on a global basis and bring more comfort to communicate with one another. humanity.

www.globalreport2010.com

6

D

PRIVACY EXTINCTION Blackberry Under the Spotlight People are eager to make friends even if some of them could be suspect. It helps them feel connected and not isolated, something essential in our 21st century impersonal world. With the avalanche of social networking tools such as Twitter, Linkedin, Myspace, Badoo etc the world has truly become a global village.

“The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.”

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

With globalism now at its peak is the Antichrist waiting in the wings? Perhaps. Technology will drive the final generation. In a sense, it already is. Everything in Revelation 13 depends on technology: The electronic money system, electronic control of the media, electronic control of commerce and even electronic control of the one-world religion. When he enters the scene, the technology infrastructure must first be in place.

One common form of surveillance is to create maps of social networks based on data from social networking sites as well as from traffic analysis information from phone call records such as those in the NSA call database, and internet traffic data gathered under the Communication Assistance for Law Enforcement (CALEA). These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities. Whether it's net neutrality, an effort to use the Internet to ID all Americans, Facebook, Twitter, or an all-new scheme to come down the pipe to use the magic of modern day technology to limit freedoms, stay on guard. We may not be able to stem the tide of intrusiveness. The Bible talks too much about such themes as privacy loss under the rule of Antichrist, but please don't fall under the spell of "it's predicted, we can't fight it, let's surrender." As Edmund Burke said, "All that is necessary for evil to prosper is for good people to do nothing."

But then there is a price to pay as we have seen with Edward Snowden. Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:

www.globalreport2010.com

7