(Reading Time: 4 - 7 minutes)

 

CC Large

Technology and the Controlling of Society

stars bar

The last half of the 20th century has seen a significant increase in the use of science and technology for purposes of social control. Examples include video and audio surveillance, heat, light, motion, sound and olfactory sensors, electronic tagging of consumer items, animals and humans, biometric access codes, drug testing, DNA analysis and the use of computer techniques such as expert systems, matching and profiling, data mining, mapping, network analysis, and simulation.

 

Control technologies have become available that previously existed only in the dystopic imaginations of science fiction writers. Many technologies developed for the military such as spy and global positioning satellites and night vision scopes have become commercially available. Six technology based strategies of control and some social and ethical issues they raise are discussed. Contemporary social control has become more extensive and casts a much wider net than at mid-twentieth century, continuing an expansionary trend that began with industrialization and the rise of the nation-state.

 

stars bar

Control Involves Ever More Integrated Information-Sharing Networks

Blurring many traditional institutional and organizational borders e.g., within and between agencies and levels of government, banks, insurance, health care, education, work, telecommunications and sales and marketing organizations. This data-sharing is taken further in the United States than in Canada or Europe. Technical controls are capital rather than labor intensive and hence the cost of control per unit of information has decreased.

 

More objects and areas are subjected to inspection and control and there is a broadening from the traditional targeting of a specific suspect, to categorical suspicion (e.g., the computer search, video camera, or metal detector capture information on all those within their province) and from individuals to networks and organizations. Control has also become more intensive, probing deeply beneath protective surfaces.

 

stars bar

Controls Transcend Boundaries of Distance, Darkness, Physical Barriers and Time.

Factors which traditionally protected liberty, as well as malfeasance. Data can be easily stored, retrieved, combined (from different places and in different forms such as visual, auditory, print and numerical), analyzed and communicated. Control may be remote and deterritorialized, with buffers between controllers and those controlled. Control and knowledge of other’s behavior are no longer restricted to what the senses directly reveal through interaction, nor to a bounded physical place.

 

The U.S. government and its corporate allies are looking out for Americans 'literally' with surveillance tools intended to identify you, track your whereabouts, monitor your activities and allow or restrict your access to people, places or things deemed suitable by the government. This is all the more true as another invasive technology, the iris scanner, is about to be unleashed on the American people. Iris scanning relies on biometrics, which uses physiological (fingerprint, face recognition, DNA, iris recognition, etc.) or behavioral (gait, voice) characteristics to uniquely identify a person.

 

stars bar

Iris Scanning Technology Works by Reading the Unique Pattern Found on the Iris

The colored part of the eyeball. This pattern is unique even among individuals with the exact same DNA. It is read by projecting infra-red light directly into the eye of the individual. The perceived benefits of iris scan technology, we are told, include a high level of accuracy, protection against identity theft and the ability to quickly search through a database of the digitized iris information. It also provides corporations and the government 'that is', the corporate state with a streamlined, uniform way to track and access all of the information amassed about us, from our financial and merchant records, to our medical history, activities, interests, travels and so on.

 

Iris Scans Can Become De Facto National ID Cards

Which can be implemented without our knowledge or consent. In fact, the latest generation of iris scanners can even capture scans on individuals who are in motion. And as these devices become more sophisticated, they will only become more powerfully invasive. The public is outraged with the Homeland Security and the TSA's (Transportation Security Admin.) anti-terrorism screening tactics. Much of the public considers their heavy handed tactics harmful and invasive.

 

Passenger are forced to choose a full-body scan image (body X-ray) or a probing pat-down (strip-search?). If refusing both choices, you will be denied entry, ejected and threatened with a fine and lawsuit. No doubt you will be placed on a Federal Governments Deviant Profile list. You were once an anonymous and law abiding citizen now you are considered a "Deviant law breaker" by the controlling arm of this Luciferian Conspiracy through technology.

 

references:               MIT Education         

 

Next UP: HEMP The Electromagnetic Nuclear Blanket Bomb
Or This: Today's Reality of 666, RFID and "The Database"

Quick Links

Where to Begin Your Journey
Religion The Dividing Line
The Georgia Guide Stones
The Bilderberg Group Tool
The Iron Mountain Report
The Hegelian Dialectic Era
The Federal Reserve Bank
America's Billionaire Savior
The Age of Mass Deception
Lucifer's Empire Playground
The Global Trinity Empire
The Global Choice of Servitude
The Implant vs The Plastic Card
666 will be forced on Me Right?
1933, The Confiscation of Gold
Clinton the China-Gate Canidate
Lucis Trust the "Great Invocation"
The New Age Ascended Masters
Benjamin Creme and the Maitreya
Sanat Kumara ruler of Shambhala
The New Age Ten Commandments
The Bavarian Illuminati 1776 - 2017
An Improved System of Illuminism
Albert Pike and the Scottish Rite
Joseph Smith's Occult Connection
Rosicrucianism, The Golden Dawn
Esoteric Hoodwink, Isis and Osiris
Jesus Christ it's a Simple as ABC
Secret Luciferian Plans for America
Democracy vs the Constitution
Global Governments Spider Web
European Union, Tower of Babel
United Nations, World Government
United Nations vs US Constitution
United Nations and the New Age
The Baha'i Faith and the UN

Victory Over America without Firing a Shot
Deception, America Played like a Fiddle
Donald John Trump, the Savior Politician
The Rise of the Phoenix Cashless Currency
Radio Frequency Identification Device
RFID Implementation, Implant Scenarios
Technology and the Controlling of Society
DARPA, the Information Awareness Office
Your RFID Journey, Your RFID Number
Project H.A.A.R.P Weather Modification
The Communist Manifesto Conspiracy
The Hegelian Dialectic Paradigm of ISIS
Lucifer's Illuminati Empire Conspiracy
The World Finiancial System, Fiat Currency
The Central Bank, A New Beginning 1913
The Great Depression, The Fleecing Begins
The International Monetary Fund, the IMF
George W. Bush, the Terrorism Politician
William Bill Clinton, the China Gate Politician
China Gate and the Rising State Power
National Security For Campaign Contributions
George H. W. Bush, the CIA, NWO Politician
Ronald Reagan, the Hollywood Politician
Gerald Ford, the JFK Assassination Politician
Richard Nixon, the 10 UN Regions Politician
Harry S. Truman, the Socialism Politician
Herbert Hoover, the Crash of 1929 Politician
Warren G. Harding, the Party Gal Politician
The New Age, Occult and Secret Societies
James Earl Carter, the Pedestal Politician
High Priestess Helena Petrovna Blavatsky
New Age Faith Healers and Televangelists
Freemasonry the Global Level Illumination
Freemasonry and King Solomon's Temple
A Picture of Illuminism, Esoteric/Exoteric
The Bible Warnings of the Beast System

The History of the Antichrist Beast System
Gun Control, Your Choices and Responsibilities
The United States of America, the New Atlantis
All Pre-Tribulationalist, Please Click Here
The Reality of 666, RFID and "The Database"
The Biometric ID Grid: A Country-by-Country List
A Implantable Microchip, How difficult to remove?
Corrie Ten Boom's witness to Endtime Christians
Cashless Monetary System is Absolute Control!
Free PDF, Steps Toward the Mark of the Beast
HEMP The Electromagnetic Nuclear Bomb
Controlled Media the Ultimate Box to Control You
Military Crisis Intervention, the Hegelian Dialectic
A Socialist review, Politicians of the System
Deception in Government, Played like a Fiddle
Barack Hussain Obama, the Marxist Politician
Lyndon B. Johnson, the 501c3 exempt Politician
John F. Kennedy, the EO Dictatorship Politician
Dwight D. Eisenhower, the NASA NATO Politician
Franklin Roosevelt, the All Seeing Eye Politician
Calvin Coolidge, a Peace and Prosperity Politician
Woodrow Wilson, the Sold His Nation Politician
The Jörmungandr Ouroboros and the Phoenix
Manly Hall, The Philosophical Research Society
Alice Bailey, Pantheist, Mystic, and Occultist
Aleister Crowley and The Ordo Templi Orientis
Theosophy and Mysticism, Nephilim of Genesis 6
Some Scriptures to Help You on Your Journey
Creator of the Universe, Visit the Trinity Test Site
The Missouri Documents, Linking Freedom to Militia
FEMA and the Department of Homeland Security
Homeland Security and the Executive Orders
Globalist Footprint Declaration, a Foundational Plan
IBM, The United Nations and the US Census
A Strict Literalist View of Today
About the Website Author

 

The UN Plot to Confiscate Civilian Weapons - Weapons Control, your Choices and your Responsibilities
FAIR USE NOTICE: Title 17 U.S.C. Section 107, this material is distributed without profit
for Research and Educational Purposes. Menu is at the Top, Sitemap is Below.
Front-line New World Order Whistle Blowers - Learn the Faces
Free Book in PDF - Steps Toward the Mark of the Beast

 

technology-800-80

sitemap-nwo

Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TwitterSubmit to LinkedIn

readmore-information

Informational Video's from Behind the New World Order