(Reading Time: 5 - 9 minutes)

The Internet - DARPA and the Information Awareness Office

stars bar


The Information Awareness System, to the left Has Their "All-Seeing-Eye" of Intelligence focused on: Biometric signatures of humans, Face, Fingerprints, Gait "Global Automated Identification Technology" aka RFID, Iris, Speech recognition, Transactional Spying, Financial, Transportation, Housing, Government and Communications.


DARPA, aka the Defense Advanced Research Projects Agency (Wikipedia), advanced research for the DoD, the Department of Defence is independent from other conventional military organizations and reports directly to senior Department of Defense management. DARPA has been in the data mining business since its conception in 1958.


In fact, the Origins of the Internet was a Military experiment propagated and funded by DARPA, beginning in 1962. The first recorded description of the social interactions that could be enabled through networking was a series of memos written by J.C.R. Licklider of MIT in August 1962 discussing his "Intergalactic Network" concept.


He envisioned a globally interconnected set of computers through which everyone could access data and programs from any site.  Licklider was the first head of the computer research program at DARPA, starting in October 1962. While at DARPA he convinced his successors at DARPA, Ivan Sutherland, Bob Taylor, and MIT researcher Lawrence G. Roberts of the importance of this networking concept.


stars bar

In Late 1966 Roberts Went to DARPA to Develop the Computer Network Concept

And quickly put together his plan for the ARPANET, aka Advanced Research Projects Agency Network, publishing it in 1967. In August 1968, after Roberts and the DARPA funded community had refined the overall structure and specifications for ARPANET, it was released by DARPA for development. During the Seventies and Eighties engineers worked on ways to connect ARPANET to other networks using phone lines and radio waves.


Tim Berners-Lee, a British scientist at CERN, invented the World Wide Web (WWW) concept in 1989 and in the early 90's the Internet was used by government and military employees, graduate students, computer scientists, Colleges and universities, the Internet went live to the world on 6 August 1991. In 1993 it was announced by CERN that the World Wide Web was free for everyone to use and develop, some 30 years after its humble beginnings at DARPA.


stars bar

Data Mining and Secret Military Projects are at the Very Heart of DARPA

And data mining personal information on American citizens has diversified into many channels, the perfect example is Facebook, launched in February 2004 Facebook is the CIA's dream come true, a social network where people volunteer who they are, where they live, email addresses, their daily activities and their friends. Thanks to DARPA there isn't a touch of the keyboard or mouse that is not being recorded, tracked and data-based while you are online.


Today, all software, including encryption, security and voting platforms have a back door, a data mining gold mine. The Information Awareness Office (IAO) was established in January 2002 after the attacks of September 11, 2001 to bring together several DARPA projects focused on applying information technology. Their mission was to "imagine, develop, apply, integrate, demonstrate, and transition information technologies, components and prototype, closed-loop, information systems that will achieving total information awareness."


stars bar

Their Goal was to Detect, ID, Classify and Track Potential Anti-Government Targets

Through multi-agencies and to acquire data through advanced technological applications for surveillance. Take a look at the All-Seeing-Eye in the logo above watching, listening, and tracking the whole globe and spying with Echelon technology. How's that for your tax dollars at work?


The Total Information Awareness Program Itself was the "Systems-Level" Program

Among the other programs was the Genisys Privacy Protection, Evidence Extraction, Link Discovery, and Scalable Social Network Analysis program. Utilizing the full capabilities of Echelon technology along with a sister organization called the Information Exploitation Office, the US foreign and domestic spying capabilities are all akin to an "All-Seeing-Eye".


The Information Awareness Office began funding research and development of the Total Information Awareness Program in February 2003 but renamed the program the Terrorism Information Awareness Program in May that year after an adverse reaction to the program's implications for public surveillance. Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system the Information Awareness Office was defunded by Congress in 2003.


stars bar

Several of the Projects Run Under IAO Have Continued Under Different Funding

The Guardian ran a story which said, "Think, Big Brother is Watching You. The Information Awareness Office will supply federal officials with 'instant' analysis on what is being written on email and said on phones and all over U.S. Domestic espionage. You want to test it? Just Text-Message any American friend, 'Bmb OK. Allah gr8'."




GAIT (Global Automated Identification Technology)

stars bar

Take a look at the Diagram above of the (official) Total Information Awareness system. Study the diagram carefully and notice the Biometric Data section. In it's continuing efforts to tighten surveillance and control in our country, our government has been reorganizing its resources in many ways and although the Information Awareness Office was defunded, it is not dead but rather it is running in the background, alive and doing very well.


Poly GAIT university in California is providing education and training to students and industrial partners, and fostering collaboration among industry, government, and the academia for the advancement of automatic identification technologies, aka RFID. Exploiting the new opportunities and challenges of RFID technologies. On the DARPA website the statement was made: The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define.


While at the same time they displayed the logo (at the top of this page) of the "All Seeing Eye" so often associated with the Illuminati. An organization which has ties with other "shadowy" groups such as the Freemasons, the Order of Jesuits and others. Besides Illuminati symbolism, another project with occult overtones in the Total Information Awareness program includes the Babylon program.


stars bar

Another is the Human Identification at a Distance Project (HumanID)

This project combines Fuse face and Gait recognition using visible imagery into a 24/7 human identification system, and the MATRIX project (Multistate Antiterrorism Information Exchange) and although defunded in 2005 all the dynamics are well established. The Human Identification at a Distance (HumanID) project developed automated biometric identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.


Algorithms for locating and acquiring subjects out to 150 meters (500 ft) in range. Evidence Extraction and Link Discovery (EELD) technologies use tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources such as phone call records, internet histories, bank financial records, text messages, social networking sites, and web pages. Genisys aimed at developing technologies which would enable ultra-large, all-source information repositories with vast amounts of information collected using database technology.


stars bar

At the Time it was Insufficient for Storing and Organizing

Such Enormous Quantities of Data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the CERN's World Wide Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data, such as a database containing criminal records, a phone call database, or a foreign intelligence database etc.


Another goal was to develop a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows the ultra-large all-source database to retain important data indefinitely."


stars bar

Scalable Social Network Analysis (SSNA)

Aimed at Developing Techniques Based on Analysis for modeling the key characteristics of various groups, discriminating these groups from other groups of society. In order to be successful SSNA requires information on the social interactions of the majority of people around the globe. The 2010 census (here in PDF format was designed and promoted by the United Nations to position you and your family by using today's satellite technology and you have been placed in preparation for location in this RFID database.


Since the Defense Department says they cannot easily distinguish between peaceful citizens and terrorists, they gather data on innocent civilians as well as on potential terrorists. Components of the Total Information Awareness program continues to be developed and despite the withdrawal of funding and the closing of the Information Awareness Office, the core of the project has survived and flourished.


Darpa 4


Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. Massive information aggregation and analysis technologies are a grave threat to our privacy and civil liberties.


Allowing our government to monitor all our communications, and to map all our social networks gives them the ability to target dissenters or political threats and such a system of surveillance is a necessary component of a strong totalitarian state. These technologies are now converging with many others into a single Global RFID database system, your entry into this database will not be accomplished by a vote of the people but rather by either conquest or consent, in either case the results will be the same.


stars bar

Global Government and the Control and Numbering of Everything on Earth.



The UN Plot to Confiscate Civilian Weapons - Weapons Control, your Choices and your Responsibilities
FAIR USE NOTICE: Title 17 U.S.C. Section 107, this material is distributed without profit
for Research and Educational Purposes. Menu is at the Top, Sitemap is Here.
Front-line New World Order Whistle Blowers - Learn the Faces
Free Book in PDF - Steps Toward the Mark of the Beast



Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TwitterSubmit to LinkedIn


Informational Video's from Behind the New World Order