(Reading Time: 3 - 5 minutes)


CC Large

Technology and the Controlling of Society

stars bar

The last half of the 20th century has seen a significant increase in the use of science and technology for purposes of social control. Examples include video and audio surveillance, heat, light, motion, sound and olfactory sensors, electronic tagging of consumer items, animals and humans, biometric access codes, drug testing, DNA analysis and the use of computer techniques such as expert systems, matching and profiling, data mining, mapping, network analysis, and simulation.


Control technologies have become available that previously existed only in the dystopic imaginations of science fiction writers. Many technologies developed for the military such as spy and global positioning satellites and night vision scopes have become commercially available. Six technology based strategies of control and some social and ethical issues they raise are discussed. Contemporary social control has become more extensive and casts a much wider net than at mid-twentieth century, continuing an expansionary trend that began with industrialization and the rise of the nation-state.


stars bar

Control Involves Ever More Integrated Information-Sharing Networks

Blurring many traditional institutional and organizational borders e.g., within and between agencies and levels of government, banks, insurance, health care, education, work, telecommunications and sales and marketing organizations. This data-sharing is taken further in the United States than in Canada or Europe. Technical controls are capital rather than labor intensive and hence the cost of control per unit of information has decreased.


More objects and areas are subjected to inspection and control and there is a broadening from the traditional targeting of a specific suspect, to categorical suspicion (e.g., the computer search, video camera, or metal detector capture information on all those within their province) and from individuals to networks and organizations. Control has also become more intensive, probing deeply beneath protective surfaces.


stars bar

Controls Transcend Boundaries of Distance, Darkness, Physical Barriers and Time.

Factors which traditionally protected liberty, as well as malfeasance. Data can be easily stored, retrieved, combined (from different places and in different forms such as visual, auditory, print and numerical), analyzed and communicated. Control may be remote and deterritorialized, with buffers between controllers and those controlled. Control and knowledge of other’s behavior are no longer restricted to what the senses directly reveal through interaction, nor to a bounded physical place.


The U.S. government and its corporate allies are looking out for Americans 'literally' with surveillance tools intended to identify you, track your whereabouts, monitor your activities and allow or restrict your access to people, places or things deemed suitable by the government. This is all the more true as another invasive technology, the iris scanner, is about to be unleashed on the American people. Iris scanning relies on biometrics, which uses physiological (fingerprint, face recognition, DNA, iris recognition, etc.) or behavioral (gait, voice) characteristics to uniquely identify a person.


stars bar

Iris Scanning Technology Works by Reading the Unique Pattern Found on the Iris

The colored part of the eyeball. This pattern is unique even among individuals with the exact same DNA. It is read by projecting infra-red light directly into the eye of the individual. The perceived benefits of iris scan technology, we are told, include a high level of accuracy, protection against identity theft and the ability to quickly search through a database of the digitized iris information. It also provides corporations and the government 'that is', the corporate state with a streamlined, uniform way to track and access all of the information amassed about us, from our financial and merchant records, to our medical history, activities, interests, travels and so on.


Iris Scans Can Become De Facto National ID Cards

Which can be implemented without our knowledge or consent. In fact, the latest generation of iris scanners can even capture scans on individuals who are in motion. And as these devices become more sophisticated, they will only become more powerfully invasive. The public is outraged with the Homeland Security and the TSA's (Transportation Security Admin.) anti-terrorism screening tactics. Much of the public considers their heavy handed tactics harmful and invasive.


Passenger are forced to choose a full-body scan image (body X-ray) or a probing pat-down (strip-search?). If refusing both choices, you will be denied entry, ejected and threatened with a fine and lawsuit. No doubt you will be placed on a Federal Governments Deviant Profile list. You were once an anonymous and law abiding citizen now you are considered a "Deviant law breaker" by the controlling arm of this Luciferian Conspiracy through technology.


references:               MIT Education         


Next UP: HEMP The Electromagnetic Nuclear Blanket Bomb
Or This: Today's Reality of 666, RFID and "The Database"


The UN Plot to Confiscate Civilian Weapons - Weapons Control, your Choices and your Responsibilities
FAIR USE NOTICE: Title 17 U.S.C. Section 107, this material is distributed without profit
for Research and Educational Purposes. Menu is at the Top, Sitemap is Below.
Front-line New World Order Whistle Blowers - Learn the Faces
Free Book in PDF - Steps Toward the Mark of the Beast




Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TwitterSubmit to LinkedIn


Informational Video's from Behind the New World Order