(Reading Time: 5 - 9 minutes)

The Internet - DARPA and the Information Awareness Office

stars bar

Darpa-275

The Information Awareness System, to the left Has Their "All-Seeing-Eye" of Intelligence focused on: Biometric signatures of humans, Face, Fingerprints, Gait "Global Automated Identification Technology" aka RFID, Iris, Speech recognition, Transactional Spying, Financial, Transportation, Housing, Government and Communications.

 

DARPA, aka the Defense Advanced Research Projects Agency (Wikipedia), advanced research for the DoD, the Department of Defence is independent from other conventional military organizations and reports directly to senior Department of Defense management. DARPA has been in the data mining business since its conception in 1958.

 

In fact, the Origins of the Internet was a Military experiment propagated and funded by DARPA, beginning in 1962. The first recorded description of the social interactions that could be enabled through networking was a series of memos written by J.C.R. Licklider of MIT in August 1962 discussing his "Intergalactic Network" concept.

 

He envisioned a globally interconnected set of computers through which everyone could access data and programs from any site.  Licklider was the first head of the computer research program at DARPA, starting in October 1962. While at DARPA he convinced his successors at DARPA, Ivan Sutherland, Bob Taylor, and MIT researcher Lawrence G. Roberts of the importance of this networking concept.

 

stars bar

In Late 1966 Roberts Went to DARPA to Develop the Computer Network Concept

And quickly put together his plan for the ARPANET, aka Advanced Research Projects Agency Network, publishing it in 1967. In August 1968, after Roberts and the DARPA funded community had refined the overall structure and specifications for ARPANET, it was released by DARPA for development. During the Seventies and Eighties engineers worked on ways to connect ARPANET to other networks using phone lines and radio waves.

 

Tim Berners-Lee, a British scientist at CERN, invented the World Wide Web (WWW) concept in 1989 and in the early 90's the Internet was used by government and military employees, graduate students, computer scientists, Colleges and universities, the Internet went live to the world on 6 August 1991. In 1993 it was announced by CERN that the World Wide Web was free for everyone to use and develop, some 30 years after its humble beginnings at DARPA.

 

stars bar

Data Mining and Secret Military Projects are at the Very Heart of DARPA

And data mining personal information on American citizens has diversified into many channels, the perfect example is Facebook, launched in February 2004 Facebook is the CIA's dream come true, a social network where people volunteer who they are, where they live, email addresses, their daily activities and their friends. Thanks to DARPA there isn't a touch of the keyboard or mouse that is not being recorded, tracked and data-based while you are online.

 

Today, all software, including encryption, security and voting platforms have a back door, a data mining gold mine. The Information Awareness Office (IAO) was established in January 2002 after the attacks of September 11, 2001 to bring together several DARPA projects focused on applying information technology. Their mission was to "imagine, develop, apply, integrate, demonstrate, and transition information technologies, components and prototype, closed-loop, information systems that will achieving total information awareness."

 

stars bar

Their Goal was to Detect, ID, Classify and Track Potential Anti-Government Targets

Through multi-agencies and to acquire data through advanced technological applications for surveillance. Take a look at the All-Seeing-Eye in the logo above watching, listening, and tracking the whole globe and spying with Echelon technology. How's that for your tax dollars at work?

 

The Total Information Awareness Program Itself was the "Systems-Level" Program

Among the other programs was the Genisys Privacy Protection, Evidence Extraction, Link Discovery, and Scalable Social Network Analysis program. Utilizing the full capabilities of Echelon technology along with a sister organization called the Information Exploitation Office, the US foreign and domestic spying capabilities are all akin to an "All-Seeing-Eye".

 

The Information Awareness Office began funding research and development of the Total Information Awareness Program in February 2003 but renamed the program the Terrorism Information Awareness Program in May that year after an adverse reaction to the program's implications for public surveillance. Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system the Information Awareness Office was defunded by Congress in 2003.

 

stars bar

Several of the Projects Run Under IAO Have Continued Under Different Funding

The Guardian ran a story which said, "Think, Big Brother is Watching You. The Information Awareness Office will supply federal officials with 'instant' analysis on what is being written on email and said on phones and all over U.S. Domestic espionage. You want to test it? Just Text-Message any American friend, 'Bmb OK. Allah gr8'."

 

 

 

GAIT (Global Automated Identification Technology)

stars bar

Take a look at the Diagram above of the (official) Total Information Awareness system. Study the diagram carefully and notice the Biometric Data section. In it's continuing efforts to tighten surveillance and control in our country, our government has been reorganizing its resources in many ways and although the Information Awareness Office was defunded, it is not dead but rather it is running in the background, alive and doing very well.

 

Poly GAIT university in California is providing education and training to students and industrial partners, and fostering collaboration among industry, government, and the academia for the advancement of automatic identification technologies, aka RFID. Exploiting the new opportunities and challenges of RFID technologies. On the DARPA website the statement was made: The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define.

 

While at the same time they displayed the logo (at the top of this page) of the "All Seeing Eye" so often associated with the Illuminati. An organization which has ties with other "shadowy" groups such as the Freemasons, the Order of Jesuits and others. Besides Illuminati symbolism, another project with occult overtones in the Total Information Awareness program includes the Babylon program.

 

stars bar

Another is the Human Identification at a Distance Project (HumanID)

This project combines Fuse face and Gait recognition using visible imagery into a 24/7 human identification system, and the MATRIX project (Multistate Antiterrorism Information Exchange) and although defunded in 2005 all the dynamics are well established. The Human Identification at a Distance (HumanID) project developed automated biometric identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.

 

Algorithms for locating and acquiring subjects out to 150 meters (500 ft) in range. Evidence Extraction and Link Discovery (EELD) technologies use tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources such as phone call records, internet histories, bank financial records, text messages, social networking sites, and web pages. Genisys aimed at developing technologies which would enable ultra-large, all-source information repositories with vast amounts of information collected using database technology.

 

stars bar

At the Time it was Insufficient for Storing and Organizing

Such Enormous Quantities of Data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the CERN's World Wide Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data, such as a database containing criminal records, a phone call database, or a foreign intelligence database etc.

 

Another goal was to develop a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows the ultra-large all-source database to retain important data indefinitely."

 

stars bar

Scalable Social Network Analysis (SSNA)

Aimed at Developing Techniques Based on Analysis for modeling the key characteristics of various groups, discriminating these groups from other groups of society. In order to be successful SSNA requires information on the social interactions of the majority of people around the globe. The 2010 census (here in PDF format was designed and promoted by the United Nations to position you and your family by using today's satellite technology and you have been placed in preparation for location in this RFID database.

 

Since the Defense Department says they cannot easily distinguish between peaceful citizens and terrorists, they gather data on innocent civilians as well as on potential terrorists. Components of the Total Information Awareness program continues to be developed and despite the withdrawal of funding and the closing of the Information Awareness Office, the core of the project has survived and flourished.

 

Darpa 4

 

Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. Massive information aggregation and analysis technologies are a grave threat to our privacy and civil liberties.

 

Allowing our government to monitor all our communications, and to map all our social networks gives them the ability to target dissenters or political threats and such a system of surveillance is a necessary component of a strong totalitarian state. These technologies are now converging with many others into a single Global RFID database system, your entry into this database will not be accomplished by a vote of the people but rather by either conquest or consent, in either case the results will be the same.

 

stars bar

Global Government and the Control and Numbering of Everything on Earth.

 

Quick Links

Where to Begin Your Journey
Religion The Dividing Line
The Georgia Guide Stones
The Bilderberg Group Tool
The Iron Mountain Report
The Hegelian Dialectic Era
The Federal Reserve Bank
America's Billionaire Savior
The Age of Mass Deception
Lucifer's Empire Playground
The Global Trinity Empire
The Global Choice of Servitude
The Implant vs The Plastic Card
666 will be forced on Me Right?
1933, The Confiscation of Gold
Clinton the China-Gate Canidate
Lucis Trust the "Great Invocation"
The New Age Ascended Masters
Benjamin Creme and the Maitreya
Sanat Kumara ruler of Shambhala
The New Age Ten Commandments
The Bavarian Illuminati 1776 - 2017
An Improved System of Illuminism
Albert Pike and the Scottish Rite
Joseph Smith's Occult Connection
Rosicrucianism, The Golden Dawn
Esoteric Hoodwink, Isis and Osiris
Jesus Christ it's a Simple as ABC
Secret Luciferian Plans for America
Democracy vs the Constitution
Global Governments Spider Web
European Union, Tower of Babel
United Nations, World Government
United Nations vs US Constitution
United Nations and the New Age
The Baha'i Faith and the UN

Victory Over America without Firing a Shot
Donald John Trump, the Savior Politician
The Rise of the Phoenix Cashless Currency
Radio Frequency Identification Device
RFID Implementation, Implant Scenarios
Technology and the Controlling of Society
DARPA, the Information Awareness Office
Your RFID Journey, Your RFID Number
Project H.A.A.R.P Weather Modification
The Communist Manifesto Conspiracy
The Hegelian Dialectic Paradigm of ISIS
Lucifer's Illuminati Empire Conspiracy
The World Finiancial System, Fiat Currency
The Central Bank, A New Beginning 1913
The Great Depression, The Fleecing Begins
The International Monetary Fund, the IMF
George W. Bush, the Terrorism Politician
William Bill Clinton, the China Gate Politician
China Gate and the Rising State Power
National Security For Campaign Contributions
George H. W. Bush, the CIA, NWO Politician
Ronald Reagan, the Hollywood Politician
Gerald Ford, the JFK Assassination Politician
Richard Nixon, the 10 UN Regions Politician
Harry S. Truman, the Socialism Politician
Herbert Hoover, the Crash of 1929 Politician
Warren G. Harding, the Party Gal Politician
The New Age, Occult and Secret Societies
James Earl Carter, the Pedestal Politician
High Priestess Helena Petrovna Blavatsky
New Age Faith Healers and Televangelists
Freemasonry the Global Level Illumination
Freemasonry and King Solomon's Temple
A Picture of Illuminism, Esoteric/Exoteric
The Bible Warnings of the Beast System

Gun Control, Your Choices and Responsibilities
The United States of America, the New Atlantis
All Pre-Tribulationalist, Please Click Here
The Reality of 666, RFID and "The Database"
The Biometric ID Grid: A Country-by-Country List
A Implantable Microchip, How difficult to remove?
Corrie Ten Boom's witness to Endtime Christians
Cashless Monetary System is Absolute Control!
Free PDF, Steps Toward the Mark of the Beast
HEMP The Electromagnetic Nuclear Bomb
Controlled Media the Ultimate Box to Control You
Military Crisis Intervention, the Hegelian Dialectic
A Socialist review, Politicians of the System
Deception in Government, Played like a Fiddle
Barack Hussain Obama, the Marxist Politician
Lyndon B. Johnson, the 501c3 exempt Politician
John F. Kennedy, the EO Dictatorship Politician
Dwight D. Eisenhower, the NASA NATO Politician
Franklin Roosevelt, the All Seeing Eye Politician
Calvin Coolidge, a Peace and Prosperity Politician
Woodrow Wilson, the Sold His Nation Politician
The Jörmungandr Ouroboros and the Phoenix
Manly Hall, The Philosophical Research Society
Alice Bailey, Pantheist, Mystic, and Occultist
Aleister Crowley and The Ordo Templi Orientis
Theosophy and Mysticism, Nephilim of Genesis 6
Some Scriptures to Help You on Your Journey
Creator of the Universe, Visit the Trinity Test Site
The Missouri Documents, Linking Freedom to Militia
FEMA and the Department of Homeland Security
Homeland Security and the Executive Orders
Globalist Footprint Declaration, a Foundational Plan
IBM, The United Nations and the US Census
A Strict Literalist View of Today
About the Website Author

 

The UN Plot to Confiscate Civilian Weapons - Weapons Control, your Choices and your Responsibilities
FAIR USE NOTICE: Title 17 U.S.C. Section 107, this material is distributed without profit
for Research and Educational Purposes. Menu is at the Top, Sitemap is Below.
Front-line New World Order Whistle Blowers - Learn the Faces
Free Book in PDF - Steps Toward the Mark of the Beast

darpa-800-80-new

sitemap-nwo

Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TwitterSubmit to LinkedIn

readmore-information

Informational Video's from Behind the New World Order