Codex Alimentarius, Control over the Food Supply and World Government

November 18, 2010 by admin  
Filed under Big Brother, Featured Stories, US News, World News

By Brandon Turbeville – Activist Post

Contrary to popular belief Codex Alimentarius is neither a law nor a policy. It is in fact a functioning body, a Commission, created by the Food and Agricultural Organization and the World Health Organization under the direction of the United Nations. The confusion in this regard is largely due to statements made by many critics referring to the “implementation” of Codex Alimentarius as if it were legislation waiting to come into effect. A more accurate phrase would be the “implementation of Codex Alimentarius guidelines,” as it would more adequately describe the situation.

Codex is merely another tool in the chest of an elite group of individuals whose goal is to create a one world government in which they wield complete control. Power over the food supply is essential in order to achieve this. As will be discussed later, Codex Alimentarius will be “implemented” whenever guidelines are established and national governments begin to arrange their domestic laws in accordance with the standards set by the organization.

The existence of Codex Alimentarius as a policy-making body has roots going back over a hundred years. The name itself, Codex Alimentarius, is Latin for “food code”[1] and directly descended from the Codex Alimentarius Austriacus, a set of standards and descriptions of a variety of foods in the Austria-Hungarian Empire between 1897 and 1911.[2] This set of standards was the brainchild of both the food industry and academia and was used by the courts in order to determine food identity in a legal fashion.

Even as far back as 1897, nations were being pushed toward harmonization of national laws into an international set of standards that would reduce the “barriers to trade” created by differences in national laws.[3] As the Codex Alimentarius Austriacus gained steam in its localized area, the idea of having a single set of standards for all of Europe began to pick up steam as well. From 1954-1958, Austria successfully pursued the creation of the Codex Alimentarius Europaeus (the European Codex Alimentarius). Almost immediately the UN directed FAO (Food and Agricultural Organization) sprang into action when the FAO Regional Conference for Europe expressed the desire for a global international set of standards for food. The FAO Regional Conference then sent a proposal up the chain of command to the FAO itself with the suggestion to create a joint FAO/WHO programme dealing with food standards.

The very next year, the Codex Alimentarius Europeaus adopted a resolution that its work on food standards be taken over by the FAO. In 1961, it was decided by the WHO, Codex Alimentarius Europaeus, Organization for Economic Co-operation and Development (OECD), and the FAO Conference to create an international food standards programme known as the Codex Alimentarius.[4] In 1963, as a result of the resolutions passed by these organizations two years earlier, Codex Alimentarius was officially created.[5]

Although created under the auspices of the FAO and the WHO, there is some controversy regarding individuals who may or may not have participated in the establishment of Codex. Many anti-Codex organizations have asserted that Nazi war criminals, Fritz Ter Meer[6] and Hermann Schmitz[7] in particular, were principal architects of the organization. Because many of these claims are made with only indirect evidence, or no evidence at all, one might be tempted to disregard them at first glance. However, as the allegations gain more and more adherents, Codex has attempted to refute them. In its Frequently Asked Questions section, Codex answers the question, “Is it true that Codex was created by a former war criminal to control the world food supply?”[8] It then goes on to answer the charges by stating:

No. It is a false claim. You just need to type the words “Codex Alimentarius” in any search engine and you will find lots of these rumors about Codex. Usually the people spreading them will give no proof but will ask you to send donations or to sign petitions against Codex.

Truthful information about Codex http://www.codexalimentarius.net is found on the Internet – there is nothing to hide from our side – we are a public institution working in public for the public – we are happy if people want to know more about our work and ask questions. There is anofficial Codex Contact Point in each member country who will be pleased to answer your questions on Codex.[9]

But, as one can see from the statement above, Codex’s response does very little to answer this question beyond simply disagreeing with it. While it is true that many individuals who make this claim provide little evidence for it, the presentation of the information does not necessarily negate its truthfulness. In fact, Codex offers its own website as a source for accurate information about the organization; yet, beyond the FAQ section, there is nothing to be found that is relevant to the “war criminal” allegations. Furthermore, the codexalimentarius.net http://www.codexalimentarius.net/web/index_en.jsp website is virtually indecipherable, almost to the point of being completely useless. In the end, this response raises more questions than it answers. This is because Codex, if it wanted, could put these rumors to rest by simply posting a list of the individuals and organizations that funded or played an integral role in its creation. However, it does nothing of the sort. Beyond mentioning the FAO and the WHO, we are completely unaware of who or how many other individuals and organizations participated in the creation of Codex Alimentarius.

The “war criminal” claims center around the chemical conglomerate known as I.G. Farben. I.G. Farben was made up of several German chemical firms including, BASF, Bayer, Hoechst and AGFA,[10] that merged together. It was essentially the manufacturing wing of the Third Reich and was the engine behind the Nazi war machine. The company provided the vast majority of explosives and synthetic gasoline used for the military conquest and murder of millions. It also manufactured the now infamous Zyklon-B gas used in the gas chambers. Not only that, but it was influential in the conducting of experiments on concentration camp victims. Indeed, camp victims were often purchased outright at the behest of the company for the express purposes of testing by several different branches of the company, particularly Bayer and Hoechst.

Without I.G. Farben, the German wars simply could not have been sustained. During the Nuremberg war trials, the tribunal convicted 24 board members and executives of the company and dissolved it into several different daughter companies. Namely, BASF, Hoechst (later to be known as Aventis), and Bayer. By 1951, virtually all 24 of these executives were released, including Fritz Ter Meer and Hermann Schmitz. Ter Meer had been a member of the I.G. Farben executive committee from 1926-1945 and also a member of the working committee and the technical committee as well as a director of the infamous Section II. He was also the ambassador to Italy given full power by the Reich Minister for armaments and war production and was the industrialist most responsible for Auschwitz. Schmitz was also a member of the I.G. Farben executive committee from 1926-1935, and was chairman of the board and “head of finances” from 1935-1945. He was also head of military economics and a member of the Nazi party. Both men were found guilty by the Nuremberg war tribunal in 1948, yet Schmitz was released in 1950 and Ter Meer in 1952.[11]

After all this, Schmitz was appointed board member of the German bank of Berlin West in 1952 and in 1956, the honorary chairman of the board of Rheinish steel plants. Ter Meer, however, was even more successful. Upon his release, he was appointed board member of Bayer in 1955 and, in 1956 was appointed chairman. In the years following, he would take on many additional roles such as chairman of the board of Theodore Goldschmidt AG, deputy chairman of the board of Commerzbank and Bank-Association AG, as well as a board member of the Waggonfabrik Uerdingen, Duesseldorger Waggonfabrik AG, the bank association of West Germany, and United Industrial Enterprises AG.[12] These are documented connections for both of these men. Indeed, Ter Meer’s’ connections to the pharmaceutical firm Bayer earned him a foundation named in his honor, the Fritz Ter-Meer Foundation.[13] Through all of this however, this writer could not confirm that either Ter Meer or Schmitz had direct connections to the creation of Codex Alimentarius.

However, Codex does nothing to dispel the allegations besides simply disagreeing with them and the connections are not at all implausible. Codex is very secretive about its beginnings, as evidenced on its website where it only states that it was created at the behest of the FAO and the WHO. It is highly unlikely that such an organization would be created without the assistance, input, and even funding of privately owned international corporations. Thanks to both the anti-Codex community and Codex Alimentarius itself, there is no evidence (again at least to this author) that documents which individuals or corporations were involved in its establishment. However, there are other ties that lend more credence to the belief that war criminals played a role in the creation of Codex.

Notes

[1] Tips, Scott C. “Codex Alimentarius: Global Food Imperialism.” FHR. 2007. P. ii.

[2] “Opening Statement by Dr. B.P. Dutia Assistant Director-General Economic and Social Policy Department, FAO to the Nineteenth Session of the Codex Alimentarius Commission.” Food and Agricultural Organization. July 1, 1991.
http://www.fao.org/docrep/meeting/005/t0490e/T0490E04.htm See also,

Taylor, Paul Anthony. “Codex Guidelines for Vitamins and Minerals – Optional or Mandatory?” Dr.Rath Health Foundation. http://www4.dr-rath-foundation.org/features/codex_wto.html

[3] “Codex Alimentarius: how it all began.” Food and Agricultural Organization.
http://www.fao.org/docrep/v7700t/v7700t09.htm Accessed April 23, 2010.

[4] “Understanding the Codex Alimentarius.” World Health Organization. Food and Agricultural Organization. 2006. P. 7
http://www.scribd.com/doc/25710873/WHO-Understanding-the-Codex-Alimentarius Accessed April 23, 2010.

[5] Tips, Scott C. “Codex Alimentarius: Global Food Imperialism.” FHR. 2007. P.ii

[6] “The History of the ‘Business With Disease.’” Dr. Rath Health Foundation.
http://www4.dr-rath-foundation.org/PHARMACEUTICAL_BUSINESS/history_of_the_pharmaceutical_industry.htm April 26
[7] Minton, Barbara. “Codex Threatens Health of Billions.” Naturalnews. July 30, 2009.
http://www.naturalnews.com/026731_CODEX_food_health.html

[8] “FAQs – Rumours” CodexAlimentarius.net http://www.codexalimentarius.net/web/faq_rum.jsp#R1 Accessed April 26, 2010.

[9] Ibid.

[10] Behreandt, Dennis. “The crimes of I.G. Farben: during WWII, I.G. Farben, a synthetic-fuels manufacturer for the German war machine, was a major supporter of the Nazi regime and a willing co-conspirator in the Holocaust.” The New American. November 27, 2006.

http://findarticles.com/p/articles/mi_m0JZS/is_24_22/ai_n24996865/

“The Documentation About ‘Codex Alimentarius.’” Dr. Rath Health Foundation.

http://www4.dr-rath-foundation.org/PHARMACEUTICAL_BUSINESS/health_movement_against_codex/health_movement24.htm

Accessed April 26, 2010.

[11] “The History of the ‘Business With Disease.’” Dr. Rath Health Foundation. http://www4.dr-rath-foundation.org/PHARMACEUTICAL_BUSINESS/history_of_the_pharmaceutical_industry.htm http://www4.dr-rath-foundation.org/PHARMACEUTICAL_BUSINESS/history_of_the_pharmaceutical_industry.htm> Accessed April 26
, 2010.

[12] Ibid.

[13] Weimbs Lab: Molecular, Cellular and Developmental Biology University of California, Santa Barbra.

http://www.lifesci.ucsb.edu/mcdb/labs/weimbs/people/weimbs/index.html

Accessed April 27, 2010. Dr. Thomas Weimbs received a scholarship from the Fritz ter Meer Foundation in 1988.

Brandon Turbeville is an author out of Mullins, South Carolina. He has a Bachelor’s Degree from Francis Marion University where he earned the Pee Dee Electric Scholar’s Award as an undergraduate. He has had numerous articles published dealing with a wide variety of subjects including health, economics, and civil liberties. He also the author of Codex Alimentarius – The End of Health Freedom

Military ready for war in cyberspace

Published on 11-03-2010

Source: Reuters

The military’s new Cyber Command, responsible for shielding 15,000 military computer networks from intruders, has become fully operational, the Defense Department said on Wednesday.

More than 100 foreign intelligence organizations are trying to break into U.S. networks, Deputy Defense Secretary William Lynn wrote in the September/October issue of the journal Foreign Affairs. Some already have the capacity to disrupt U.S. information infrastructure, he said.

Gates ordered the new unit’s creation in June 2009 to address the growing threat of cyber-attack.

It consolidates offensive and defensive operations under Army General Keith Alexander, who also heads the National Security Agency, the Defense Department’s intelligence arm that protects national security information and intercepts foreign communications.

“Cyberspace is essential to our way of life and U.S. Cyber Command synchronizes our efforts in the defense of (Defense Department) networks,” Alexander said in the Pentagon announcement.

Lynn declared the unit, based at Fort Meade, Maryland, fully up and running in a memorandum dated October 31, said Colonel Rivers Johnson, a Cyber Command spokesman.

The new unit began work in May, establishing a joint operations center and transitioning personnel and functions from the old structures.

It is part of the Offutt Air Force, Nebraska-based Strategic Command, the organization responsible for U.S. nuclear and space operations as well as information warfare and global military intelligence.

Police Begin “Guns Drawn” Raids on Organic Food Stores in California

October 28, 2010 by admin  
Filed under Big Brother, Featured Stories, US News

Wake Up Everyone.  Time to get up for the sleepy fog we are in.

Isn't it about time we start using RICO statutes and Anti-Trust laws to dismantle

these so called multi-national corporate monopolies?

The answer is isn't it about time.
It is time to end this tyrannical force that appears hellbent on destroying life

as we know it on our planet.

It is about time to end this nonsense and reestablish freedom.

Let it begin upon each of your reading these words.  Let consciousness

be the spark to end this insanity.  So let it be.
For the record my friend James Stewart has owned and operated this private-members

only facility for many years. He and his members are great people who have made

the choice to eat the best food they possibly can get for themselves and their

families. He is a great guy who has devoted many years to bring choice to

discerning and educated people who prefer natural and organic food.
Bravo James. And thanks for all you have done and continue to do. I cannot

tell you how many are proud and appreciative of the committed friend you are.
Thank you.
(1) Police Begin "Guns Drawn" Raids on Organic Food Stores in California
http://www.youtube.com/watch?v=b27EFldZ17k

(2) Food police target organic foods in California!
http://www.youtube.com/watch?v=ifvp3Fxi7Uo

(3) Senate Bill S510 Makes it illegal to Grow, Share, Trade or Sell Homegrown Food -
Folks this is being proposed and engineered as we sleep.  Time to wake up.
Can anyone say "We are mad as hell and not going to take it anymore."
http://www.youtube.com/watch?v=gOups0dfdwM&NR=1

Blitz everyone you know with these outrageous acts of an out of control monopolistic

agriculture industry incorporated with mega food/grocery and a compliant police force.
Send to to everyone you know and create a cascade or domino effect.
2012 should be called 1984
Let's stop this nonsense.
The beginning of the end of this nonsense begins now.
Spread the word.

Start Slide Show with PicLens Lite PicLens

DHS Will Work with NSA and Military in Carrying Out Domestic Cyberwar Operations

Published on 10-21-2010

Source: New York Times

WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil.

The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.

Under the new rules, the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.

Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should the military take over such domestic operations.

Read Full Article Here…

‘Exterminator’ armored truck will watch Illinois neighborhoods

October 21, 2010 by Jack Blood
Filed under Police State

NICHOLAS J.C. PISTOR

Creative law enforcement isn’t new to St. Clair County Sheriff Mearl Justus.

Last year, the dean of the region’s chief cops sponsored a “haunted crack house” that used an old grange hall to depict the life of a young drug addict.

Before that, Justus publicized a “drug house of the week,” aimed at shaming dealers into leaving town.

On Tuesday, his deputies lifted a plastic tarp to unveil his newest idea: an armored truck to park in problem neighborhoods as a vandal-proof platform to transmit live pictures.

“I thought about a lot of names … I thought ‘The Cockroach’ would’ve probably been appropriate, but we settled on ‘The Exterminator,’” Justus told reporters.

The donated and rebuilt armored truck, once used to carry cash, is fitted with cameras, digital recorders and gear to stream live video. Deputies will park it in front of the “dwellings of troublemakers” — for days at a time, if necessary — to reduce nuisance crimes.

“It sends a message,” Justus said. “We will not tolerate drug trafficking, littered lawns, loud noise and other neighborhood nuisances.” He said the cameras should keep criminals on the run and give residents peace of mind.

Critics say such policing efforts are ineffectual, and just move crime down the road. Justus said the truck will address local problems one at a time. “It’s that house down the street. That is their concern in their neighborhood,” the longtime sheriff suggested.

Residents can request the truck by contacting the Sheriff’s Department online at www.theexterminator.us, or by phoning 618-277-3505      end_of_the_skype_highlighting end_of_the_skype_highlighting.

“I lay in bed at night dreaming this stuff up,” Justus joked.

In fact, he said he got the idea from the police in Peoria, Ill., who have used a similar truck, named “The Armadillo,” for several years.

“There’s an old saying about vaudeville … if it plays in Peoria, it will play anywhere,” Justus said. “I’m here to tell you, it plays well in Peoria.”

Peoria Police Chief Steve Settingsgaard, who attended the ceremony, said “The Armadillo” has ‘shut down” crime wherever it’s been used. “Once we parked it in place, everything shut down and was quiet,” he said. “We put it in front of drug houses and in high-crime areas and the ne’er-do-wells disappear from the area for a few days. It is almost too effective in that the video doesn’t catch anything because it is such a deterrent.”

Settingsgaard emphasized that the truck’s cameras can’t zoom or peer into windows, and that it is only parked on public property.

Peoria has since added a second vehicle.

Ed Yohnka, director of communications for the American Civil Liberties Union of Illinois, said the truck probably does not pose a civil rights problem, but he questioned whether it serves a useful purpose.

“Various empirical studies show this type of thing doesn’t decrease crime, it disperses it,” Yohnka said. He said it more than likely just moves criminal behavior to the next block.

The truck was donated by Garda Cash Logistics, one of the nation’s largest armored car firms. Several other companies — including Interface Security Systems, Signs ‘N’ Such and Kelso Auto Body — donated labor and materials to equip it.

The Exterminator, sporting a rebuilt engine and flashy graphics, is built to withstand assault.

Its tires are filled with hard foam and won’t go flat. It has a locked hood and fuel cap and will get protective screens over its lights.

Video from the four cameras is streamed live to computers at the Sheriff’s Department and can be monitored by investigators on their smart phones.

The Exterminator is expected to begin service within the next few weeks, Justus said. “No criminal wants this thing parked in front of his house.”

Invisible DNA body spray technology may soon be installed at a business near you

October 22, 2010 by admin  
Filed under Big Brother, Featured Stories, Technology, World News

Published on 10-22-2010

Source: Natural News

A U.K. company has developed a technology that it says will help deter thieves from robbing local businesses. SelectaDNA Spray, as it is called, coats robbers with an invisible DNA mist that cannot be washed off and remains present on skin and hair for weeks, allowing authorities to better link culprits to the crimes they commit. The system is already used in nine other countries, and will soon be coming to the U.S., according to reports.

The SelectaDNA company says the mist “cling[s] to fib[er]s and sit[s] in creases of the skin” after being sprayed, which can then be scanned with special ultraviolet light. Proponents of the system say the mist provides the solid evidence needed to prove the guilt of criminals, but others wonder how effective and accurate the system actually is in practical terms.

When the mist is sprayed, there is no telling how many innocent bystanders will also get coated in the DNA and be potentially linked to crimes they did not commit. And if criminals are able to obtain cans of the DNA themselves, they may use it to frame other people for crimes.

Although the company claims the spray is “harmless”, it is said to penetrate both hair and skin, which may cause unknown damage to health. And when sprayed, the substance is likely inhaled by everyone within close proximity, implanting microscopic DNA and other substances in their lungs.

Thus far, no businesses that have installed SelectaDNA Spray have been robbed, which indicates that it may be effective at deterring crimes. But since the technology has yet to be used in a real-life situation, it is difficult to say whether or not it actually helps to solve crimes.

Overall crime rates have remained roughly the same in areas where SelectaDNA Spray systems have been installed, as criminals have simply resorted to robbing businesses that do not use the technology, say officials.

Sources for this story include:

http://abcnews.go.com/Technology/Th…

http://www.selectadna.co.uk/

Full article here

Cybershark Feeding Frenzy

The perverse coupling of surveillance and exhibitionism forms a cornerstone of American technocracy. Most Americans, be they liberals or libertarians, are unnerved by government agents, corporate data-miners, or high-tech Peeping Toms probing their personal details. And yet invasive, weirdly intimate technologies multiply like digital cockroaches, all but devouring the expectation of privacy taken for granted only a generation ago. Progress is simply too en vogue to resist.

Reality television brings a glamorous air to perpetual surveillance. The genre has enjoyed immense popularity over the last decade—comprising nearly a fifth of new broadcast programs this season—with cameramen poking into American life’s every facet. From moneyed luxury’s heights to the working-class struggle’s dregs, everyone’s in line for their 15 minutes of fame.

Consequently, the art of living on film is continually refined. But the recent success of TLC’s Sister Wives sounds an ominous warning as to who may be watching behind the camera’s prying eye. Immediately after the show’s premiere—which revealed a renegade Mormon polygamist’s fecund lifestyle—Utah authorities launched an investigation on Kody Brown and his four wives, with bigamy charges pending.

The risk of one’s private life going public is all-too-familiar to celebrities and politicians, but these days everyone gets their chance to shine in the searchlight. Social networks, YouTube, Twitter, and the blogosphere have captured and amplified a narcissistic culture of exhibition. Driven by Mark Zuckerberg’s philosophy that “a world that’s more open and connected is a better world,” Facebook now claims over 500 million users—making it the world’s third most-populous “nation.” In less than two decades, it became normal to display one’s personal details online—from romantic relationships and family photos to political affiliation and business activities. Even if you choose not to have your personality digitized, chances are that someone you know will do it for you. AVG Security estimates that 92% of American babies have their picture on the Internet. Anonymity is practically dead, with a Facebook memorial in the online graveyard.

Aside from being a smorgasbord for typical stalkers—and be honest, who hasn’t gone profile-trolling?—social networking also has market analysts and government agents licking their chops. It has become a common practice for law-enforcement agencies—from the Boston PD to the Department of Homeland Security—to “friend” suspect individuals and monitor their posts. If investigators want to dig deeper, our electronic communications’ trusted stewards—AT&T, Google, Yahoo!, Verizon, etc.—regularly provide access to private communications under the Patriot Act. On the corporate end, The Wall Street Journal recently examined the unethical activities of Web-based “listening services” that scrape forums for biographical information—including sensitive medical issues such as HIV, depression, and impotence—to craft more effective marketing techniques apparently geared toward human frailties. Illicit scraping aside, the practice of selling a client’s “anonymized” personal information is now routine. Inquiring minds want to know, and they know whom to ask.
“Just as the religious man learns to accept the fact that God watches his every move, so may the child of technocracy consider the Electric Eye to be a normal aspect of modern life.”

And who could blame them? For entities that depend on psychological profiling to investigate and manipulate an otherwise inscrutable population—authority figures whose sympathies rarely lie with nonconformity or dissent—the human soul’s digitization is a dream come true. Whether we pour our deepest selves into public profiles or private emails, our personal lives have become fodder for cybersharks.

Wired magazine covers a vast array of disturbing digital-surveillance projects. For instance, In-Q-Tel—the CIA’s investment arm—recently teamed up with Google to fund Recorded Futures. Like Visible Technologies before it, Recorded Futures crawls “open source” Web information—sites, blogs, news outlets, Twitter accounts, etc.—for patterns of interest. Along with monitoring current activities, Recorded Futures has the ambitious goal of predicting future behaviors based on “invisible links” between individuals and organizations. Though presumably directed toward noble goals such as combating terrorism and organized crime, the overarching scale of the analysis allows for more questionable directions. For an agency that has historically sought to infiltrate disruptive political movements and initiate disinformation campaigns, the possibilities are phenomenal. But why would Google, whose support of Obama’s tech-savvy campaign is a matter of public record, be involved? Their candid CEO, Eric Schmidt, says of his search users: “They want Google to tell them what they should be doing next.”

While it is hardly surprising that intelligence agencies would want to gather intelligence, a conscientious citizen can only be as comfortable with corporate surveillance and government’s growing powers as his or her good faith will allow. Not that anyone is asking permission.

The Google “WiSpy” scandal that came to light last May hardly inspires confidence. Apparently, their Street View vehicles gathered more than uninvited photographs as they patrolled the Western world’s every inch. Since 2007, they’ve been scooping up “payload data,” including web-surfing activity and private emails, from open Wi-Fi networks. When the German government pressed them for an explanation, Google claimed it was all a big “mistake” and insisted they will delete the data—unlike their Gmail account holders’ detailed profiles.

When Eric “Don’t Be Evil” Schmidt says, “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about,” you can be sure that he means it. Given the ambiguous (at best) motives of history’s most powerful individuals, I find these developments quite chilling.

Add to this surveillance cameras’ proliferation in public areas—tens of thousands in New York City, half a million in London’s “ring of steel,” cameras on traffic lights nationwide, in shopping malls, in nightclubs, in schools, in nurseries—and you get the funny feeling that you’re being watched.

Of course, it is practically impossible for all of these cameras to be monitored effectively. Unless you could somehow entice private citizens to assist in the process…

On October 4, Internet Eyes went live in the UK. The program’s participants—13,000 so far—are given access to CCTV feeds of retail outlets nationwide. Their mission is to spot shoplifters and antisocial behavior. A £1,000 prize is offered for the snoop with the most busts. If the program is successful, perhaps average citizens could be enlisted for other mass-surveillance projects. Of course, high-tech surveillance equipment has been marketed to the general public for years. Aside from office security cameras, popular Internet monitoring software—with clever names such as SpyAgent, SpecterPro, and IamBigBrother—enables any corporate manager to sift through his employees’ emails and Web searches.

For the average Joe, companies such as BrickHouse Security offer a wide range of equipment for DIY spook operations. Anyone can order high-resolution cameras disguised as common electrical outlets, air filters, smoke detectors, or sunglasses—all for $200. You can watch your kids, your spouse, or the guy next door. Every week a new perv gets caught installing recording devices in a women’s bathroom. So what are the chances that some weirdo has filmed your bodily functions in action—picking your nose, having sex, or vigorously masturbating in a hotel room? Think of it this way: How many people have a burning curiosity and 200 bucks to blow?

Even if you don’t mind Big Brother watching you, the swarms of Little Brothers in His shadow ought to ring your alarm bells. Or maybe you don’t care. Maybe you’ve been told to smile for the camera since you were knee-high to a tripod. Group photos mean friendship, and sex tapes make you famous. Just as the religious man learns to accept the fact that God watches his every move, so may the child of technocracy consider the Electric Eye to be a normal aspect of modern life.

I would never be so paranoid as to insist that every watcher behind the camera is purely evil. To the extent that technology is neutral, a surveillance state’s rise is only as insidious as the uses to which it is put. After all, who would argue against identifying criminals, improving products, or securing personal property?

And yet, as I contemplate undesirable citizens’ fate during the 20th century’s herd-culling upheavals—Hitler’s Germany, Stalin’s Russia, Mao’s China, or Pol Pot’s Cambodia—the unprecedented ability to cultivate public opinion in real time, while tracking otherwise anonymous individuals, lifts my neck hairs. Big Brother is a silent observer in an era of tolerance and open discourse. But if the national mood is consumed by distrust and volatility, the All-Seeing Eye may burn right through you.

10.10.10 Illusionati the new documentary by Matthew Kazee is ON SALE NOW

Illusionati the powerful new documentary film by Matthew Kazee begins to look beyond the veil of control. Detailing the evolution of the Illuminati controlling the first printing press to the modern day version of Mainstream Media. False Flag Terrorism, Mind Control, Mass Media Propaganda, Secrets of Hollywood and the Anti War Movement are just a few of the subjects that the movie showcases.

Modern graphics and animation stand out as the “Hive Mind” is disabled to bring you a “Pirate Transmission” from within the media matrix. A stand out cast of speakers which include Ed Asner, Jordan Maxwell, Jack Blood, Jason Bermas, Eben Rey, Mark Dice, Matt Conner, Doug Owen, Cindy Sheenhan and many more.

The first in a “Trilogy of Truth” which will look beyond the veil and expose the world wide mind. Independently made by Matthew Kazee, Illusionati is a roller coaster ride of information and shocking realities.

Start Slide Show with PicLens Lite PicLens

10.06.10 Google CEO: “We Know Where You Are. We Know Where You’ve Been. We Can More Or Less Know What You’re Thinking About.”

Published on 10-06-2010

Source: Business Insider

Google CEO Eric Schmidt really has a knack for expressing relatively benign ideas in a way that makes him and his company look incredibly creepy.

The Atlantic has posted video of the full interview in which Eric talked about ‘the creepy line’, and it is chock full of unsettling sound bytes. In particular, he had the following to say on privacy:

With your permission, you give us more information about you, about your friends, and we can improve the quality of our searches. We don’t need you to type at all. We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.

That sounds absolutely terrifying. And it’s too bad. Eric is clearly extremely bright and has a lot of interesting things to say in this interview about technology, the rise of China, the role of lobbyists in crafting legislation, and more. He’s just not very good at choosing his words.

10.04.10 One Program to Watch Them All: DARPA’s ‘INSIGHT’

Published on 10-04-2010

Source: Cryptogon

Yet again, it’s the Information Awareness Office by another name.

Via: Wired:

No surprise that Darpa, the military’s blue-sky research arm, is the agency behind the lofty five-year program, called Insight. The agency’s goal is to replace “largely manual exploitation and…chat-based operator interactions” with a system that mines different inputs, including drone footage and on-the-ground intel, and quickly stitches together the data to identify potential threats.

What Darpa’s calling “a next generation ISR [intelligence surveillance and reconnaissance] exploitation and resource management system” would be faster than human analysts, but it’d still rely on their input. Darpa wants an interface that’s adaptable, letting users provide context and pick the best surveillance combo for a given situation.

The Pentagon’s been investing in super-powered surveillance for years now, and Darpa wants Insight to capitalize on the rapid growth in the recon field. The program will incorporate brand new spy cams, like ARGUS-IS, a 1.8 Gigapixel camera that tracks over 100 square miles in real time. And ongoing Darpa projects might be rolled into the Insight system too. The agency’s solicitation cites a handful, including the recently-launched PerSEAS, a program to design complex algorithms that can somehow spot threats based on little more than “weak evidence.”

« Previous PageNext Page »