Technology and the Controlling of SocietyThe last half of the 20th century has seen a significant increase in the use of science and technology for purposes of social control. Examples include video and audio surveillance, heat, light, motion, sound and olfactory sensors, electronic tagging of consumer items, animals and humans, biometric access codes, drug testing, DNA analysis and the use of computer techniques such as expert systems, matching and profiling, data mining, mapping, network analysis, and simulation.
Control technologies have become available that previously existed only in the dystopic imaginations of science fiction writers. Many technologies developed for the military such as spy and global positioning satellites and night vision scopes have become commercially available. Six technology based strategies of control and some social and ethical issues they raise are discussed. Contemporary social control has become more extensive and casts a much wider net than at mid-twentieth century, continuing an expansionary trend that began with industrialization and the rise of the nation-state.
Control Involves Ever More Integrated Information-Sharing NetworksBlurring many traditional institutional and organizational borders e.g., within and between agencies and levels of government, banks, insurance, health care, education, work, telecommunications and sales and marketing organizations. This data-sharing is taken further in the United States than in Canada or Europe. Technical controls are capital rather than labor intensive and hence the cost of control per unit of information has decreased.
More objects and areas are subjected to inspection and control and there is a broadening from the traditional targeting of a specific suspect, to categorical suspicion (e.g., the computer search, video camera, or metal detector capture information on all those within their province) and from individuals to networks and organizations. Control has also become more intensive, probing deeply beneath protective surfaces.
Controls Transcend Boundaries of Distance, Darkness, Physical Barriers and Time.Factors which traditionally protected liberty, as well as malfeasance. Data can be easily stored, retrieved, combined (from different places and in different forms such as visual, auditory, print and numerical), analyzed and communicated. Control may be remote and deterritorialized, with buffers between controllers and those controlled. Control and knowledge of other’s behavior are no longer restricted to what the senses directly reveal through interaction, nor to a bounded physical place.
The U.S. government and its corporate allies are looking out for Americans 'literally' with surveillance tools intended to identify you, track your whereabouts, monitor your activities and allow or restrict your access to people, places or things deemed suitable by the government. This is all the more true as another invasive technology, the iris scanner, is about to be unleashed on the American people. Iris scanning relies on biometrics, which uses physiological (fingerprint, face recognition, DNA, iris recognition, etc.) or behavioral (gait, voice) characteristics to uniquely identify a person.
Iris Scanning Technology Works by Reading the Unique Pattern Found on the IrisThe colored part of the eyeball. This pattern is unique even among individuals with the exact same DNA. It is read by projecting infra-red light directly into the eye of the individual. The perceived benefits of iris scan technology, we are told, include a high level of accuracy, protection against identity theft and the ability to quickly search through a database of the digitized iris information. It also provides corporations and the government 'that is', the corporate state with a streamlined, uniform way to track and access all of the information amassed about us, from our financial and merchant records, to our medical history, activities, interests, travels and so on.
Iris Scans Can Become De Facto National ID CardsWhich can be implemented without our knowledge or consent. In fact, the latest generation of iris scanners can even capture scans on individuals who are in motion. And as these devices become more sophisticated, they will only become more powerfully invasive. The public is outraged with the Homeland Security and the TSA's (Transportation Security Admin.) anti-terrorism screening tactics. Much of the public considers their heavy handed tactics harmful and invasive.
Passenger are forced to choose a full-body scan image (body X-ray) or a probing pat-down (strip-search?). If refusing both choices, you will be denied entry, ejected and threatened with a fine and lawsuit. No doubt you will be placed on a Federal Governments Deviant Profile list. You were once an anonymous and law abiding citizen now you are considered a "Deviant law breaker" by the controlling arm of this Luciferian Conspiracy through technology.
references: MIT Education
Next UP: HEMP The Electromagnetic Nuclear Blanket Bomb
The UN Plot to Confiscate Civilian Weapons - Weapons Control, your Choices and your Responsibilities
|
Informational Video's from Behind the New World Order