CCTV 2

EVERY PHONE CALL, EMAIL AND INTERNET CLICK STORED BY STATE SPYING DATABASES

computer Every phone call, text message, email and website visit will be stored for a year for monitoring by the state.

Ministers had originally wanted to store the information on a massive Government-run database, but chose not to because of privacy concerns Photo: GETTY IMAGES All telecoms companies and internet service providers will be required by law to keep a record of every customer's personal communications, showing who they are contacting, when, where and which websites they are visiting. Despite widespread opposition over Britain's growing surveillance society, 653 public bodies will be given access to the confidential information, including police, local councils, the Financial Services Authority, the Ambulance Service, fire authorities and even prison governors.

They will not require the permission of a judge or a magistrate to access the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. Ministers had originally wanted to store the information on a massive Government-run database, but chose not to because of privacy concerns. However the Government announced yesterday it was pressing ahead with privately-held "Big Brother" databases which opposition leaders said amount to "state-spying" and a form of "covert surveillance" on the public.

It is doing so despite its own consultation showing there is little public support for the plans. The Home Office admitted that only a third of respondents to its six-month consultation on the issue supported its proposals, with 50 per cent fearing that the scheme lacked sufficient safeguards to protect the highly personal data from abuse. The new law will increase the amount of personal data which can be accessed by officials through the controversial Regulation of Investigatory Powers Act (RIPA), which is supposed to be used for combatting terrorism.

Although most private firms already hold details of every customer's private calls and emails for their own business purposes, most only do so on an ad hoc basis and only for a period of several months. The new rules, known as the Intercept Modernisation Programme, will not only force communication companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit – effectively registering every click online. While public authorities will not be able to view the contents of these emails or phone calls – but they can see the internet addresses, dates, times and users of telephone numbers and texts.

The firms involved in keeping the data, such as as Orange, BT and Vodafone, will be reimbursed at a cost to the taxpayer of £2billion over 10 years. Chris Grayling, shadow home secretary, said he had fears about the abuse of the data.

"The big danger in all of this is 'mission creep'. This Government keeps on introducing new powers to tackle terrorism and organised crime which end up being used for completely different purposes. We have to stop that from happening". David Davis, the former shadow home secretary, added: "What is being proposed is a highly intrusive procedure which would allow Government authorities to maintain covert surveillance on public use of telephones, texts, emails and internet access." He added that the permission to access the data should be granted by judges or magistrates.

"Whilst this is no doubt necessary in pursuing terrorist suspects, the proposals are so intrusive that they should be subject to legal approval, and should not be available except in pursuit of the most serious crimes," he said. The Information Commissioner’s Office also opposed the moves.

"The Information Commissioner believes that the case has yet to be made for the collection and processing of additional communications data for the population as a whole being relevant and not excessive." Chris Huhne, the Liberal Democrat home affairs spokesman, has criticised the amount the scheme will cost for what is effectively "state spying". He said yesterday: "Any legislation requiring communications providers to keep data on who called whom and when will need strong safeguards on access.

"It is simply not that easy to separate the bare details of a call from its content. What if a leading business person is ringing Alcoholics Anonymous? "There has to be a careful balance between investigative powers and the right to privacy." Ministers said that they have still got to work with the communications industry to find the correct way of framing the proposals in law – meaning it will not come before Parliament until after the General Election. But the Home Office yesterday insisted it would push the legislation through.

Jacqui Smith, then Home Secretary, originally launched a paper in April for consultation called "Protecting the Public in a Changing Communications Environment". The responses, published yesterday, disclosed that more than 40 per cent of 221 respondents rejected it outright as the growth of the surveillance state. Of those whose repsonses were considered, exactly half said that the proposed safeguards for the information to be stored were not adequate.

Only 29 per cent third supported the Government approach, whereas 38 per cent were against it. Meanwhile the communications providers themselves questioned the cost of the scheme and whether it was even technically feasible. The latest figures on the use of the RIPA legislation by public bodies, show that state bodies including town halls made 519,260 requests last year - one every minute - to spy on the phone records and email accounts of members of the public.

The number of requests has risen by 44 per cent in two years to a rate of 1,422 new cases every day, leading to claims of an abuse of using the powers for trivial matters such as littering and dog fouling. Shami Chakrabarti, director of Liberty, said: "The Big Brother ambitions of a group of senior Whitehall technocrats are delayed but not diminished. "We need a bold alliance of phone companies who fear losing public trust and concerned citizens to come together in opposition to these plans.

"If the authorities need to build up an intimate picture of a suspect's communications, they should have to go to a judge for a warrant. "Law-abiding people have sustained too many blanket attacks on their privacy and they've had enough." Alex Deane, Director of Big Brother Watch, said it was an "enormous and unwarranted intrusion into every aspect of our private lives" and said that the laws are in effect an "illiberal snoopers' charter."

John Yates, Britain's head of anti-terrorism, has argued that the legislation is vital for his investigators. The Scotland Yard Assistant Commissioner said: "The availability of Communications Data to investogators is absolutely crucial. Its importance to investigating the threat of terrorism and serious crime cannot be ovetrstated". Home Office Minister David Hanson said: "The consultation showed widespread recognition of the importance of communications data in protecting the public and an appreciation of the challenges which rapidly changing technology poses. We will now work with communications service providers and others to develop these proposals, and aim to introduce necessary legislation as soon as possible."

  • SOURCE
  • Big Brother plan to log all texts and internet searches on hold... until after the election
  • BIG BROTHER AIN'T COMING TO THE UK IT'S BEEN HERE FOR CENTURIES

    big brother As long as Britain has had a shadow government in the guise of freemasonry the UK and its citizens have been spied on by the multitude of agencies set up primarily to keep a close eye on us all . The list is endless but lets take a look at the essential spying tools used by the masonic hierarchy who act for the monarchy to ensure any dissent is squashed and the ruling establishment and self appointed elite can continue to live in the mega rich lifestyles they think they deserve. All on the backs of the rape and pillage of the world through the British Empire.

    Slowly the British public are awakening from the masonic slumber the complicit media has put us under for so long. Information is now no longer the sole preserve of the monsters who have manipulated our minds using the most cunning and deceptive ploys . Psychologists and psychiatrists aiding and abetting the secretive and silent treatment any victim gets when they raise their head to far above the parapet. The monsters who would have hanged a poor beggar 100 years ago for stealing a loaf of bread are the same monstrous mindset today, except they have to be a lot more subtle and devious in how they torture and murder anyone who gets in the way of their plans. They have a massive network, that includes almost every key position of power across the UK , as if you dont sign your soul away to the devil and the monarchy you haven't a hope in hell of reaching the upper echelons of power and the lucrative salaries they create for themselves thanks to how they manipulate the wealth of the UK into their own hands. The recent MP's expenses scandal pales next to the real high flyers hiding in the background who control the puppet politicians hand picked to do the dirty on us all.

    If you are not part of their creepy network of power you can be sure you are a victim and if as a victim you decide to seek justice through what ever means you can , you can guarantee these evil bastards will come out of the woodwork not only to stifle your efforts but to literally destroy your life and your families using draconian measures and through a court system riddled with masonic judges all to happy to please their masters . Those who remain with their heads buried in the sand hoping this is just a nightmare and they will waken up and everything will be alright need to be aware of the evil forces that daily are destroying large swathes of the population who are left destitute and homeless due to a massive conspiracy of all the agencies supposedly charged with our welfare. These agencies are a front for the spy network who know your every move, where your money is kept if you have any and anything that when they do come to fleece you they will have knowledge of everything of value that can be stolen using a court process that is as fraudulent and corrupt as anything across the world.

    We are fighting back, educating those as yet to face the reality, that when one of us is attacked we are all at risk. Endlessly ignoring what is blatantly staring us in the face is NOT what will redress the massive imbalance in power they have given themselves. There are many legal and political activists uniting to defeat this evil empire and the human spirit has an amazing ability to comprehend,analyze and find solutions to a centuries old system of control that has finally been exposed throughout the internet, anyone looking for quick fixes may be disappointed . The media have been expert at hiding all of this and it will all take time for change to show itself.

    However if you believe in karma and that in time those who create evil will get their comeuppance we can offer one case that shows exactly how in time they destroy themselves. A long time campaigner who was part of our group George Farquhar regularly campaigned and protested across Scotland and the UK. The masonic mafia (Speculative club) used Sheriff Lothian(NO JURY) a thug and bully boy to incarcerate George in a psychiatric gulag in Scotland where they attempted to chemically lobotomize him. Fortunately due to exposures at the Scottish Parliament he was released and despite heavy chemical coshs he survived this extreme trauma and is now in Australia. A few years later Lothian was exposed for the true monster that he is as can be seen in the following article.

  • EX-WIFE TELLS OF SUFFERING AT HANDS OF LAW CHIEF
  • BIG BROTHER SAYS LET'S GET CHIPPED AND PARTY VIDEO

  • FULL SCREEN VERSION HERE
  • BRAZIL BECOMES FIRST COUNTRY TO TAG CARS WITH RFID SYSTEM VIDEO

  • FULL SCREEN VERSION HERE
  • MANCHESTER AIRPORT TRIALS NEW "NAKED" X-RAY MACHINE VIDEO

  • FULL SCREEN VERSION HERE
  • NEW SPEED CAMERA REMOVAL TECHNIQUE VIDEO

  • FULL SCREEN VERSION HERE
  • BIG BROTHER TRACKING DEVICES NOW FITTED TO SHOES

    gps shoe Like Will Smith in "Enemy of the State" the latest bug designed with dementia in mind?

    GPS-Equipped Shoes Keep Track of Wanderers

    Caring for a loved one with dementia is worrisome, especially if that person is prone to taking flight. Statistics suggest that 60 percent of people with Alzheimer's disease will get lost at least once, said Andrew Carle, director of George Mason University's senior housing administration program. To limit the chaos after an at-risk person walks away on his or her own, two companies have teamed up to produce a shoe embedded with Global Positioning System technology.

    Developed by GTX Corp. and Aetrex Worldwide, the shoe is dubbed the Ambulator, and it "tracks the location and movement history of its wearer, relaying the information to a monitoring center through cellular networks," GTX chief executive Patrick Bertagna wrote in an e-mail. Concerned family members and friends can log in to a Web site or receive alerts that will pinpoint the location of the person wearing the shoe, Bertagna added. There are other GPS gadgets aimed at the Alzheimer's market. The major advantage of the shoe, said Carle, who's also a GTX adviser, "is that we're hiding the . . . technology." The idea is that a person with dementia might have bouts of paranoia but would be unlikely to remember there's a tracking device in his shoe and try to rip it out. Also, Carle said, because people with dementia often retain their habitual memory, they'll be likely to put on their shoes before going out.

    The companies are planning to start selling the shoe next spring for $200 to $300, plus a monthly monitoring fee starting at about $18 per month. Some of the costs may be reimbursed by Medicare, Bertagna said.

  • SOURCE
  • THE CHIP AT THE END OF THE NEEDLE

    nano Yesterday, 27 August 2009, I was giving an introductory talk about German New Medicine (GNM) near Vienna, Austria. My wife was with me and about 40 listeners. At the end as part of the discussion the swine flu was mentioned and a lady got up and declared the following:

    A friend of hers works for a pharmaceutical company in Vienna and told her that the swine flu injection needles indeed contain nano particles in their very tip, which cannot be detected with the naked eye but are clearly visible with as little as a 12 times magnifying microscope like children’s toy microscopes. The staff of the pharmaceutical company was advised that these nano particles work in the human body like a motherboard in the computer and lots of data can be stored on it, which will make cash cards obsolete. This measure was also intended to do an accurate census and to protect babies, as many mothers would simply "discard" their newborn, without knowledge of the authorities. This lady further disclosed that she was working in the medical field. She had asked a lawyer who came to her as a patient, how it was possible to avoid being chipped. He told her that he was aware of the planned chipping of the population; in fact most upper class members of society were aware of this plan. For this year no forced vaccinations were planned but to rather encourage people through the media to volunteer for the jab.

    In case too few would come forward, forced vaccination was planned for next year. Exempt from those were certain professional groups like the police, medical personal, politicians etc. Being a lawyer, he knew ways for himself to avoid the jab, but for the majority of the population there was no escape.

    Interview with Dr Gert Hamer (GNM) by Helmut Pilhar (Engineer) ,Wednesday, 26. August 2009

    Hamer: Within a few days our worst fears were indeed superseded by this cruel reality.

    Pilhar: Geerd, are you talking about the $1000 fine and 30 day arrest threats for refusal to take the vaccination in the US?

    Hamer: Yes, but the objectors (death chip opposers are traitors) are not going to be put into normal prisons but in especially prepared concentration camps of which hundreds have been prepared all over the country. And you can leave those only by getting chipped. And once you are outside it is open season through the death chip. By chance these people are then going to drop dead like flies after their release.

    Pilhar: Are you talking about the beginning of the great population cull?

    Hamer: It can only mean that. Otherwise it does not make any sense to get the military and the police involved, threaten with such draconian penalties, all just to get the people to participate in a simple seasonal flu shot campaign. It just does not make any other sense. Apart from the fact that there cannot even be a vaccination like that. You vaccinate in October (northern autumn) for the next summer. That is totally laughable. With Tamiflu you can maybe suppress typical healing phase symptoms for 2-3 weeks and even that is totally brainless in the light of GNM.

    Pilhar: It is noteworthy that in the US there are literally many 500,000 plastic coffins stock piled. What for? And apart from that the population has been systematically stripped of weapons and protective dogs.

    Hamer: You can best understand what the intent is by what is NOT talked about. One may talk about the vaccination, but nobody mentions the chip implanting by name. That is really strange because the chipping is the obvious issue in the face of these massive governmental measures. And that the Hitachi chip works and can be combined with the death chip we already talked about during the last interview.

    The same can be seen in how my GNM (German New Medicine) fared. For 28 years one was only allowed to discuss Hamer, the "Unperson", but not whether GNM actually works and whether its claims are repeatable, and can be proven to work, in spite of 30 verified published results. The same applies to Tamuflu! There are endless discussions about Tamiflu causing harm but none about the chip. Of course Tamiflu is harmful, it is a poison. It is also very damaging in the healing process or in the vagotonic phase of a pregnancy (last trimester). But the death chip adds a whole new dimension. That this death chip is going to be used without concern can be seen in the fact that chemo and morphine have been used without concern in spite of final mortality rates of 98%, while 98% could have survived with GNM. Imagine the unscrupulousness of all oncologists, as they are fully aware that GNM adds up from a scientific perspective and works

    Pilhar: It is also very strange that the Americans have created this Marshall Law, under which critics can be easily removed by the thousands and millions. And once you have chipped the people they cannot run away from you anymore.

    Hamer: It is obvious that this chip battle has been under preparation for many years. The idiotic swine flu, that does not even really exist, was actually the wrong tool: 3 dead pigs and one child, dead from who knows what, with that they lied and constructed a worldwide pandemic into existence. But it goes to show what a well organised world press is able to achieve: They can turn a mole hill into a mountain.

    Pilhar: It started with the AIDS lie, then followed the BSE lie. After the 9/11 lie followed the Anthrax lie. Then it was the Bird Flu lie, now it is the Swine Flu lie. Next year we’ll have the Mice Flu lie. It all points to the "Endloesung", the final solution. When everybody has a chip then that will constitute the complete slavery, then everybody can be manipulated and assassinated arbitrarily.

    Hamer: First they jump on the babies and the pregnant women. They are first to be treated with chips and Tamiflu. Many of the pregnant women in their last trimester are going to lose their babies, because Tamiflu is totally toxic. But also the women themselves can die, as their bodies are vagotonic during the last trimester. It is a known fact that during vagotonia one flu shot or one morphine injection can be deadly.

    In the meantime there seems to be some panic in the US. Where in the world can you flee to, people are asking themselves, where will you not be forcibly injected with the death chip and have one free moment away from your enemies? One has to consider realistically what it would be like to carry this death chip and know that any day you can simply be switched off by the Centre in Tel Aviv. You are completely defenceless against that and complaining won’t do you any good: "If I only had known..." Therefore it is really important for the ruling class to keep the people in the dark about it as long as possible. Once the slaves have the death chip implanted they are allowed to know about it. Then they will be like trained poodles. Nobody will dare to speak up. It will be like among the Masonic brethren. Everybody knows that the moment he utters a word of dissent, he will be served poison in the coffee by the always Jewish Grand Master and won’t survive another day. The whole world is going to be a concentration camp full of slaves, except for the members of one religious group. To have the death chip implanted is the potential personal death sentence at any given time.

    How naive do you have to be to demand of Mossad and the CIA to disclose what their real intentions are, "to table the facts"? The mouse never believes the cat will come. In a company with several hundred staff, which produces, or better fills the injection needles for the chip vaccination, it will only need one or two "reliable" people to insert the chip at the end. Then all the other workers can confirm that they knew nothing. This is called "quality control" and "final check" and appears completely normal. Strange is too that every single chip vaccination needle has its own individual code number, which is added to the ID number. Why else would the silly "summer flu shot" needle have its own individual number and why should the passport accompany the supposed flu vaccination? And why do the Americans not want to let anybody into the country who does not have a chip?

    Pilhar: The "Club of Rome" declared in the 70s in one of their publications (possibly in Mankind at the Turning Point ) in effect that either the birth rate would have to be reduced or the death rate increased. The Max Planck Institute believes that the world population must be reduced to 2 billion people. In the US there is the so called "American Stonehenge", a message engraved in 100 ton granite blocks, that the world population has to be reduced to 500 million people, to reach an "Era of Reason". When you look at the supposed issue of "overpopulation" it is interesting to note that apparently the State of Texas alone could feed all 6 billion people. If one piled those 6 billion bodies with an average weight of 80kg and a volume of 80 liters on top and side by side of each other in a cube shape, the sides of this cube would be only 800 meters long. In Austria we could hide such a cube in the next valley. I don’t believe in the so called "overpopulation" but rather suppose that the globalisation fanatics don’t need 6 billion work slaves and therefore want to reduce the population to one tenth.

    Hamer: Helmut, you were right when you said during our last interview on 13 August 2009: "Once they have accomplished that, they have won." Therefore the German New Medicine had to be suppressed, because if this awareness and knowledge had been common place they could not have done it. "Lewwer duad üs Slaav!" Rather dead than slave! (from Pidder Lueng, by Detler von Liliencron). Cheers to the GNM, the New Biological Medicine and a world view of freedom and truth for us all.

    By Dr Ryke Geerd Hamer (New German Medicine)
    Ing. Helmut Pilhar

    The original was in German and has been translated.

  • SOURCE
  • PENTAGON'S FLYING CYBORG BEETLE VIDEO

  • FULL SCREEN VERSION HERE
  • MET COPS NOW SPY ON MOBILE PHONE SIGNALS

    mobile Knowing how CORRUPT the MASONIC met cops are they wont be using this for what they say they are using it for. Carrying a mobile is like putting a portable tracker onto your clothing that the cops can track and trace.

    Met's portable scanner can spot stolen mobiles

    Police are using a hand-held scanner to detect stolen mobile phones in a campaign against street robbery. The devices, which can detect almost instantly if a phone has been lost or stolen, are being deployed around transport routes in Bromley to deter thefts among mainly young people. The scanner, called Apollo, is linked wirelessly to a national stolen phone database and can electronically read a mobile's serial number - known as an IMEI number - to tell if it has been reported lost or stolen. Officers in Ealing are also using the devices on a trial basis.

    Bromley Chief Superintendent Charles Griggs said: "I want to put the word around that we are out there on the buses and transport routes actively looking for stolen phones. "This is not the complete answer but it is another tool to help us identify stolen property. If we find people with stolen phones, they can be arrested." The scanner's makers claim it is also useful in the fight against more serious crime and terrorism. Andy Gill, managing director of Radio Tactics, said: "Phones are shipped en masse to countries such as Pakistan and Afghanistan where terrorist networks use them as a means of making money."

    Two years ago, mobile phones were involved in half of street robberies and fuelled a crimewave among children. The figures fell when the phone industry agreed to block stolen numbers within 24 hours. Criminals can unblock phones but face prosecution if caught. Industry chiefs say the initiative is working. There were 67,233 mobiles reported stolen in London last year - an 18.5 per cent fall on the previous year. However, police fear the recession and more sophisticated mobile phones will lead to a new surge in robberies.

  • SOURCE
  • ID CARDS - AN HISTORICAL VIEW

    ID CARD This is one of two Global Research articles exploring the reasons for the introduction of electronic ID cards, worldwide. Already, over 2.2 billion people, or 33% of the world’s population, have been issued with ‘smart’ ID cards. By 2012, the figure will be over 85%.

    These are incredibly powerful systems and their implementation represents a profound social change, yet the public explanations for this project do not seem to add up. Surprisingly, there seems to have been little debate or exploration of the real reasons. To find the answer, we need to dig for ourselves.

    The companion article, ID Cards - a World View, tried to assess this from the political and technological contexts of current ID schemes. This article sets out to find what we can learn from historical precedents. Does history tell us anything about the main purpose of ID schemes? History shows strong recurring themes. Surprisingly, again and again, the main function has been controlling labour and the workforce, to serve the objective of creating a command economy. Suppression of political dissent has been in second place, although often a ‘close second’.

    Napoleon

    The Napoleonic identity card was the main ancestor of all modern ID systems. Its main purpose was to hold down wages, by stopping workers moving around to find better jobs and higher wages. Napoleon transformed the free society of the French Republic into the Empire, a tightly controlled police state. The Republic had created a degree of freedom unheard of in Europe, allowing free speech and giving workers the right to change their job or go somewhere else. By contrast, in most of Europe at this time, including Britain, the majority of the population lived in various forms of bondage, such as indenture. Unfortunately, in France, a free market and mobility of labour were driving up wages.

    In response, the French authorities criminalised industrial action and introduced an ID card for workers, which aimed to do two things: -

    i) make it impossible to change jobs without an employer’s permission and
    ii) restrict movement, by requiring workers to get an impossible string of visas to move legally.

    In 1803, Napoleon’s police chief reinstated the livret or worker’s passbook, used by the Old Regime, updated with new identity features. To get a job, workers had to give the employer their livret ID card. To take a new job, workers had to get their card back, but this required getting their employer’s permission to leave (1). This is a similar situation to human trafficking and slavery in Russia, Eastern Europe or Kuwait today, where gangs control workers by holding their passports. The card also acted as an internal passport, making it very difficult to move to seek better work or better wages. Moving from one town to another required a set of visas in the livret card. Without these, employment was illegal. Napoleon’s ID scheme failed to be completely successful for two reasons: -

    Firstly, there was a labour shortage, due to the war, which made employers willing to take on workers without a card;

    Secondly, the workers had self-help groups, such as the compagnonnages, who helped their fellows find lodgings and employment (1).

    They helped each other get round the system. These networks also formed the basis of organising industrial action. The authorities tried to introduce state welfare schemes and employment agencies, to supplant the compagnonnages, but these were only partially successful. After the retreat of the French Empire, countries often retained the systems of census and control Napoleon had introduced - they were too useful and efficient to abolish.

    Nazi Germany

    By the 20th Century, Germany had become one of the most democratic, tolerant and liberal nations in Europe, with welfare, social insurance and a national health service. How did the Nazis manage to transform this into totalitarianism?

    “By establishing a people‘s registration (Volkskartei - ID card) we will achieve complete supervision of the entire German people” Herman Göring, 938, quoted in The Nazi Census (2)

    “German Jewry did not understand how, but the Reich seemed to be all-knowing as it identified and encircled them... Indeed it was clear to world that the Reich always knew the names even if no one quite understood how it knew the names.” IBM and the Holocaust (3)

    The murderous Nazi people’s register was hugely important in the evolution of ID schemes. It played an integral part not only in the genocide but in identifying and suppressing political opponents. Some of the main lessons from the Nazi scheme are listed below.

    1) Registration started first with employment, regulating workers. The Nazis were obsessed with the economic value of workers, with keeping down pay, eliminating strikers, weaklings and those unable to work. The ultimate aim was to identify productivity as part of Eugenics. One Nazi census organiser expressed this clearly, “The only value of a human being… is his economic value… the monetary worth of human labour productivity” (4) The Nazis created a Work Book, which in turn created files recording the entire course of each person’s life, including periods of unemployment and so-called breaches of work contracts, aiming to identify not only strikers, but also people who took too many days sick leave, changed their job to get better pay, or showed ‘disloyalty’ to their trained career, by working at something different (5). All of these traits were classified as ‘anti-social’ behaviour. There was a planned ‘final solution’ for Aryans, based on social behaviour, aimed at the sick, weak and ‘work-shy’ and also the sexually promiscuous, “clandestine prostitutes” and the ‘subproletariat‘ (6) (7). This was only abandoned in 1941-2 as the war turned against Germany. Murdering middle-class Jews produced an income for the Reich, from their assets, whereas murdering the underclass did not.

    2) The file and computer system were far more important than the ID card itself. The ID card created personal files in an organised, computerised system, designed to gather and classify information, identifying groups of particular interest. The majority of Germans refused to carry ID cards - Himmler continued to complain about this as late as1945. It didn’t matter - your ID card was part of a system that identified you, silently, even when you didn’t carry it.

    3) Census data was crucial to compiling the register. The organisation of the register was derived from census techniques. The computer technology used was developed for census use. Many of the key workers had come from the census. When Holland was invaded, its census records and census workers were put to use identifying the nation’s Jews, quickly and thoroughly. Many census workers showed professional commitment to identification and registration of the population, indifferent to the human consequences. Not just in Nazi Germany - in Holland, for example, the head of the national census, Jacobus Lentz, was crucial to its ‘success‘ of the identification and ‘deportation’ of Holland’s Jews, working with enthusiastic professional zeal (8). Census and statistical systems should not be regarded as something objective or neutral. The process of making statistics is not merely about gathering data, but mainly about analysing it - dividing the population into groups and segments. This means census statistics are by nature divisive, hence very political and potentially very dangerous.

    4) Information was also brought into the new identity register from other existing data registers, such as health, insurance and welfare records, parish records, records of births and deaths. Welfare and health schemes, originally for the workers’ benefit, fed into the Nazi scheme, providing identifying information and productivity data. The Nazis then reversed the original purpose, singling out the weak and unsuccessful for sterilisation and euthanasia. In the final version of the Nazi register, the ID number, or ‘Reich Personnel Number‘, became an index coordinating all other databases, to be able to gather and collate information from all government functions, with the aim of “Total Observation of Life” (9). Although initially, this was about gathering more complete data, hence making the system inescapable, it also grew into a larger process: - coupling all these other functions to the political agenda. When health records could mark a person for euthanasia or sterilisation (e.g. for a case of TB), all doctors found themselves part of the political system.

    5) Efficient division and classification of the population into sub-groups was essential to policies of ‘divide and rule’, to find necessary collaborators and to divide opposition. The census and registration systems made this possible, and the Nazi occupations and genocides utilised and depended upon this, as was clearly stated by Himmler himself (10). The occupations and genocide may have been brutal, but they were not crude exercises in brute force - they had to operate extremely efficiently, with very limited resources.

    6) Support from the US was crucial to the development of the Nazi system. This was multi-layered. Before the Nazi’s came to power, there was support for the German eugenics and genetics research from the Rockefeller Foundation (11), which enabled the development of statistical and census techniques, and sponsored key figures such as Siegfried Koller, who became central organisers in the registration and genocide. There was extensive cooperation and technical support from IBM, providing the computing systems without which the whole project would have failed (3).

    Finally there was Anglo-US support for Hitler and the Nazis’ rise to power, with money and arms, featuring prominent bankers and industrialists, and figures such as Prescott Bush (12), later US Secretary of State and grandfather of President George W. Bush. (The article Profits über Alles! American Corporations and Hitler, by Dr. Jacques R. Pauwels, is a good introduction to this subject)7) Development of ‘successful’ systems did not end with the war or the fall of the Nazis. The statisticians and bureaucrats who organised the genocide continued their work. For example, Siegfried Koller, became head of the German national census and department of population statistics, retiring in 1978. Post-war, he continued to develop the methods he had started under the Nazis, applying them to medical statistics and adapting them to new electronic computers (13).

    China

    Mao’s China implemented Napoleon’s two restrictions: - preventing workers from changing jobs without permission and preventing them from moving location. China operated two systems, one for each function. Mao expanded the identity workbook into a system called the Dang-an or dossier, and compiled lifetime personal files, from school. Employees could not start a new job without their Dang-an dossier being released by their former employer, hence without permission. (This new system should not be confused with an earlier historical system, also called Dang-an, which only monitored nobles.)

    The dossier made the employer and workplace the focus of state data-gathering, with the employer also gathering information about the worker’s views and attitudes.

    The practice of keeping worker and professional files was borrowed from the former Soviet Union's worker records. ..to meet and satisfy... labour discipline and quality control in factories and work units. The initial form of files, resembling the Soviet workbook system, included such components as work registration cards, work guarantee books, and other duty- or performance-related recording and scrutinizing devices.

    ...the early form was overhauled with political, ideological and moral details added to its main body of content. ... the practice demonstrates the extension and intensification of the discipline regime.

    Later years of politicisation under.. the Cultural revolution sent the political and ideological components to an even higher level ...for a better understanding of individual thoughts and acts... Individuals were given no escape from authority's scrutiny of their daily life and work activities. (14)

    People came to self-censor their thoughts and actions, concerned that a careless remark could put a black mark on their dossier which could blight their promotion and possibly their whole lives. A separate residential registration system also existed - so-called household registration - which prevented Chinese workers from moving to a different area, without permission. There had been systems of self-help and mutual welfare in China - Mao was careful to supplant these, as potential sources of resistance. Welfare and support were part of a matrix of control, designed to produce dependence. Interestingly, by the 90s, the state felt no need to maintain these any longer, abolishing them in the economic reforms.

    The Dang-an system started to break down in the 1990’s due to forces produced by globalisation. Foreign firms entering China did not keep Dang-an records and also employed workers without Dang-an dossiers. Large-scale migration from rural areas was required, to provide a labour force for new urban industries. It was decided to encourage illegal, rather than legal, migration. The rural migrants were employed without Dang-an dossiers, either illegally or as so-called ‘part-time‘ workers, exempt from Dang-an files. The Maoists never pursued equality, preferring instead to create an unequal system, where some workers, such as those in large state industries (the Danwei), enjoyed generous benefits and privileges, from which the majority of workers were excluded. This had produced frequent major disturbances from the early 1950s onwards. Giving workers extra privileges was sometimes necessary, to maintain stability, but did not produce dependable loyalty (15). It appears a decision had been made not to increase the privileged class more than necessary, but instead to create an excluded, disenfranchised underclass, living in furtive illegality. Illegal workers have no rights and no bargaining power. Just as the economy of California depended on large numbers of illegal Mexican immigrants, so China would exploit illegal immigrants from rural areas, only on a much larger scale, designing their economy around this.

    A new system was needed, that could track this mobile population, moving both geographically and between different employers, and could track people living illegally, trying to avoid attention from the authorities. The US offered China a technological solution, in the form of modern smart ID and database systems, just as it had helped the Nazis, 60 years earlier.

    The Present Day - World ID Schemes

    1) Employment is one of the spheres to be governed by ID schemes. This is happening under the guise of ‘controlling illegal migrant labour’. Workers will have to show an ID document to start work. In the USA, eligibility to work will be determined by a system called E-Verify, currently in phased implementation. In Britain, to start a job, workers already have to produce one of the ‘designated’ ID documents (e.g. passport), which will be linked to the ID registration scheme.

    2) Population registers are being complied from existing databases, such as tax, health and national assistance, much as happened in Germany. An example would be the Citizen Information Register in Britain : -
    It will include their name, address, date of birth, sex, and a unique personal number to form a "more accurate and transparent" database than existing national insurance, tax, medical, passport, voter and driving licence records. …

    The Home Office… admitted a national identity card scheme will have to be "underpinned by a database of all UK residents" and asked for views on whether the citizens information register should be used for this purpose … (16)

    3) The ID number will become a central index for accessing personal information from all other databases, much like the Reich Personnel Number in Germany.

    4) There is an intention to integrate and coordinate different services, such as health and education, to make them function together as part of one system, sharing data. This is clearly expressed in projects such as ‘Transformational Government’ in Britain, which place great emphasis on sharing data between different services, departments, national and local government.

    5) The new ID systems will compile lifetime dossiers on every individual, automatically.

    6) US population registration in Iraq, with biometric ID cards, has helped to divide the community into ethnic groups, now at war with each other, where no meaningful ethnic divisions existed before. US military anthropology programmes study community dynamics, classify and divide communities into sub-groups, assessed for usefulness, willingness to collaborate, to find allies, and to ‘divide and rule’.

    This is comparable to Nazi use of census and registration, to ’divide and rule’ in occupied territories.

    Resisting the Agenda

    It simply isn’t true there is nothing we can do, even though we have left it pretty late. A few hours before Adolf Eichmann was executed, a prison warden asked him, "What should the Jews have done? How could they have resisted?" Eichmann replied "...We would have been at a loss if they had disappeared before being registered... The number of our commandos was very small, and even if the police had helped us with all they had, their chances would have been at least fifty-fifty. ...A mass flight would have been disastrous for us." (17)

    A few thousand Jews survived in Germany through it all, to see the Nazis out. Predominantly, these were people who avoided identification by changing address and identity at the time of registration. Those who escaped identification and ‘isolation’ in ghettoes generally escaped altogether. The Census is an integral part of the identity registration system, something dangerous, to be avoided. Bureaucrats have killed people, just as surely as soldiers with guns. Another lesson from history is that identity systems require dependency to provide control. They have to be inescapable to work. Both Napoleon and Mao felt their authority undermined by workers’ self-help and welfare groups, where people helped each other out and disseminated information on how to get around the system. Effective organisations that were independent of state monitoring or control ran counter to the aims of identity controls.

    The Nazis didn’t have to overcome self-help groups, ironically because a previous liberal regime had supplanted them with effective state welfare. Is it a coincidence that the Nazis targeted groups with their own self-help and information networks, such as the Freemasons? In a situation today, where corporate and government power have fused in symbiosis, self-help would need to avoid dependence on either government or corporations, and perhaps even avoid dependence on money. However, the main lesson is that once modern systems of population registration are implemented, they become progressively more developed and secure, until they have an inescapable, vice-like control. It is essential to prevent them from being introduced at all.

  • SOURCE
  • RFID BRACELET ONCE YOU HAVE HAD THE US666 & EU666 VACCINATION VIDEO

  • FULL SCREEN VERSION HERE
  • CCTV SPY CAMERAS CAN'T EVEN CATCH THIEVES STEALING THE CAMERAS VIDEO

  • FULL SCREEN VERSION HERE

  • The distinctive criminal - minus most of his front teeth - climbed a ladder to steal a CCTV camera from the Trafford Retail Park. But he seemed oblivious that live footage of the crime was being beamed to a control room. The recording shows the man struggling to remove the £1,000 camera. He eventually managed to prise it away and escape. Police have been trying to track down the thief More.. since the raid about a year ago at the Trafford Retail Park near junction 10 of the M60, on the other side of the motorway from the Trafford Centre.

    Peel Holdings, which owns the retail park, has now released the footage in the hope that someone might recognise him. A Peel spokesman said: "The police have so far had no luck in tracing him. The camera itself was worth about £1,000, and the suspect got away with the equipment after breaking in through fencing and climbing a ladder. Someone must know this man. He's quite distinctive."

    LONDON SPY BUSES AND CAPSTONE CITY

    spy bus

    PRINCESS DIANA WAS RIGHT TO BE WORRIED

    diana The fears of Diana, Princess of Wales, for her safety and her preoccupation with surveillance were “entirely justified”, Michael Mansfield says today. The QC, the best-known brief at the Bar, says that the predictions of the late Princess “came to pass” and that Britain has slid seamlessly into George Orwell’s “Big Brother” society. In an extract from his autobiography published in The Times today, the QC says that it was “utterly reasonable for the Princess to suppose that Big Brother was looking over her shoulder, that her telephone communications were being tapped and her movements by car were being tracked”.

    She had a “credible and understandable basis for her belief”, he says in Memoirs of a Radical Lawyer. There is now “CCTV on every corner”; traffic cameras track car numberplates; credit and debit cards reflect movement and use; satellites track mobile phones; and there are “vast databases”, he writes. “There is now the prospect of a cashless, chequeless society in which the mobile phone alone will be used as the mechanism of payment for goods, so every purchase will be monitored.

    “And then we have the ‘toolkit’ issued to teachers for the purpose of the ‘Prevent agenda’ by which pupils’ behaviour and thinking are to be reported to the authorities, should it disclose Islamic radicalisation. And don’t forget the ID card.” Mr Mansfield acted for Mohamed Al Fayed, the Harrods owner, whose son Dodi was killed in the Paris car crash with the Princess, at their inquests. In his book the QC, 67, who is stepping down from full-time work at the Bar, condemns the “surreal proposals” for a centralised database monitoring every call or e-mail. “That these surreal proposals should even be contemplated shows how far beyond Orwell’s worst fears we have travelled.

    “The whole idea of Big Brother is now part of mainstream cheap light entertainment . . . this is both sinister and symbolic.It’s Jim Carrey’s film The Truman Show for real.” Elsewhere in his book, which spans many highly publicised trials of recent decades, Mr Mansfield gives his views on his own profession; on the state of the criminal law; on how he became a hated lawyer facing death threats whose mission was to fight for the underdog and pursue miscarriages of justice. Writing about acting for suspected IRA terrorists, Mr Mansfield, who is from North London, states: “Although my own upbringing in suburban Whetstone was a world away from the experiences of the young people whose civil rights had been severely oppressed in Northern Ireland — bad housing, unemployment, prohibited protest marches, internment, and so on — I have always been fascinated by Irish history, and a new world opened up when I started representing Irish clients.”

    In 1973 Mr Mansfield’s own car was blown up in the Old Bailey bomb. A few days later he was asked to defend the Price sisters, two of those charged over the explosion, which was the first Irish bomb attack on the mainland since the 1890s. It was not easy to find a barrister to take the case. “I was filled with trepidation about taking on a case that had generated so much public hatred . . . but that didn’t stop me,” Mr Mansfield writes.

    He recalls visiting those accused, in prison, and then feeling a “tide of rising anger on hearing how their basic human rights were being denied as Catholics”. His mother had thought it “unthinkable” that he should represent Irish terrorists. “It was as if I had become Irish myself.”

  • SOURCE
  • Princess Diana: death 'was not an accident' says leading lawyer
  • CCTV GHETTO'S

    CCTV GHETTO CLICK ON IMAGE TO ENLARGE

    Here is a housing estate in London with SPY cameras so close to the windows that privacy is almost negligent for the tenants of this scheme. How long before every single inch of ground we walk on has these spy systems glaring at us?

    Clearly the LOWER orders that cannot afford to buy a house in an exclusive part of town will require priority to ensure they dont step out of the New World Order bubble.

  • Tenants fuming as flats turned into 'Big Brother house' with 112 CCTV cameras installed inside
  • MORE NWO SCAMS
  • WESTMINSTER'S PORTABLE PARKING SPY CAMERA FILMED ILLEGALLY PARKING VIDEO

  • FULL SCREEN VERSION HERE
  • THE MICROCHIP HIDDEN AGENDA

    chip3 One generation is all they need

    One day we will all happily be implanted with microchips, and our every move will be monitored. The technology exists; the only barrier is society's resistance to the loss of privacy. An expert on surveillance and society lays out how corporations and governments will use this technology.

    By the time my four-year-old son is swathed in the soft flesh of old age, he will likely find it unremarkable that he and almost everyone he knows will be permanently implanted with a microchip. Automatically tracking his location in real time, it will connect him with databases monitoring and recording his smallest behavioural traits. Most people anticipate such a prospect with a sense of horrified disbelief, dismissing it as a science-fiction fantasy. The technology, however, already exists. For years humane societies have implanted all the pets that leave their premises with a small identifying microchip. As well, millions of consumer goods are now traced with tiny radio frequency identification chips that allow satellites to reveal their exact location. A select group of people are already "chipped" with devices that automatically open doors, turn on lights, and perform other low-level miracles. Prominent among such individuals is researcher Kevin Warwick of Reading University in England; Warwick is a leading proponent of the almost limitless potential uses for such chips. Other users include the patrons of the Baja Beach Club in Barcelona, many of whom have paid about $150 (U.S.) for the privilege of being implanted with an identifying chip that allows them to bypass lengthy club queues and purchase drinks by being scanned. These individuals are the advance guard of an effort to expand the technology as widely as possible.

    From this point forward, microchips will become progressively smaller, less invasive, and easier to deploy. Thus, any realistic barrier to the wholesale "chipping" of Western citizens is not technological but cultural. It relies upon the visceral reaction against the prospect of being personally marked as one component in a massive human inventory. Today we might strongly hold such beliefs, but sensibilities can, and probably will, change. How this remarkable attitudinal transformation is likely to occur is clear to anyone who has paid attention to privacy issues over the past quarter-century. There will be no 3 a.m. knock on the door by storm troopers come to force implants into our bodies. The process will be more subtle and cumulative, couched in the unassailable language of progress and social betterment, and mimicking many of the processes that have contributed to the expansion of closed-circuit television cameras and the corporate market in personal data. A series of tried and tested strategies will be marshalled to familiarize citizens with the technology. These will be coupled with efforts to pressure tainted social groups and entice the remainder of the population into being chipped. This, then, is how the next generation will come to be microchipped.

    masonichip2 It starts in distant countries. Having tested the technology on guinea pigs, both human and animal, the first widespread use of human implanting will occur in nations at the periphery of the Western world. Such developments are important in their own right, but their international significance pertains to how they familiarize a global audience with the technology and habituate them to the idea that chipping represents a potential future. An increasing array of hypothetical chipping scenarios will also be depicted in entertainment media, furthering the familiarization process. In the West, chips will first be implanted in members of stigmatized groups. Pedophiles are the leading candidate for this distinction, although it could start with terrorists, drug dealers, or whatever happens to be that year's most vilified criminals. Short-lived promises will be made that the technology will only be used on the "worst of the worst." In fact, the wholesale chipping of incarcerated individuals will quickly ensue, encompassing people on probation and on parole.

    Even accused individuals will be tagged, a measure justified on the grounds that it would stop them from fleeing justice. Many prisoners will welcome this development, since only chipped inmates will be eligible for parole, weekend release, or community sentences. From the prison system will emerge an evocative vocabulary distinguishing chippers from non-chippers. Although the chips will be justified as a way to reduce fraud and other crimes, criminals will almost immediately develop techniques to simulate other people's chip codes and manipulate their data. The comparatively small size of the incarcerated population, however, means that prisons would be simply a brief stopover on a longer voyage. Commercial success is contingent on making serious inroads into tagging the larger population of law-abiding citizens. Other stigmatized groups will therefore be targeted. This will undoubtedly entail monitoring welfare recipients, a move justified to reduce fraud, enhance efficiency, and ensure that the poor do not receive "undeserved" benefits.

    Once e-commerce is sufficiently advanced, welfare recipients will receive their benefits as electronic vouchers stored on their microchips, a policy that will be tinged with a sense of righteousness, as it will help ensure that clients can only purchase government-approved goods from select merchants, reducing the always disconcerting prospect that poor people might use their limited funds to purchase alcohol or tobacco. Civil libertarians will try to foster a debate on these developments. Their attempts to prohibit chipping will be handicapped by the inherent difficulty in animating public sympathy for criminals and welfare recipients — groups that many citizens are only too happy to see subjected to tighter regulation. Indeed, the lesser public concern for such groups is an inherent part of the unarticulated rationale for why coerced chipping will be disproportionately directed at the stigmatized. The official privacy arm of the government will now take up the issue. Mandated to determine the legality of such initiatives, privacy commissioners and Senate Committees will produce a forest of reports presented at an archipelago of international conferences. Hampered by lengthy research and publication timelines, their findings will be delivered long after the widespread adoption of chipping is effectively a fait accompli. The research conclusions on the effectiveness of such technologies will be mixed and open to interpretation.

    Officials will vociferously reassure the chipping industry that they do not oppose chipping itself, which has fast become a growing commercial sector. Instead, they are simply seeking to ensure that the technology is used fairly and that data on the chips is not misused. New policies will be drafted. Employers will start to expect implants as a condition of getting a job. The U.S. military will lead the way, requiring chips for all soldiers as a means to enhance battlefield command and control — and to identify human remains. From cooks to commandos, every one of the more than one million U.S. military personnel will see microchips replace their dog tags. Following quickly behind will be the massive security sector. Security guards, police officers, and correctional workers will all be expected to have a chip. Individuals with sensitive jobs will find themselves in the same position.

    The first signs of this stage are already apparent. In 2004, the Mexican attorney general's office started implanting employees to restrict access to secure areas. The category of "sensitive occupation" will be expansive to the point that anyone with a job that requires keys, a password, security clearance, or identification badge will have those replaced by a chip. Judges hearing cases on the constitutionality of these measures will conclude that chipping policies are within legal limits. The thin veneer of "voluntariness" coating many of these programs will allow the judiciary to maintain that individuals are not being coerced into using the technology. In situations where the chips are clearly forced on people, the judgments will deem them to be undeniable infringements of the right to privacy. However, they will then invoke the nebulous and historically shifting standard of "reasonableness" to pronounce coerced chipping a reasonable infringement on privacy rights in a context of demands for governmental efficiency and the pressing need to enhance security in light of the still ongoing wars on terror, drugs, and crime.

    At this juncture, an unfortunately common tragedy of modern life will occur: A small child, likely a photogenic toddler, will be murdered or horrifically abused. It will happen in one of the media capitals of the Western world, thereby ensuring non-stop breathless coverage. Chip manufactures will recognize this as the opportunity they have been anticipating for years. With their technology now largely bug-free, familiar to most citizens and comparatively inexpensive, manufacturers will partner with the police to launch a high-profile campaign encouraging parents to implant their children "to ensure your own peace of mind." Special deals will be offered. Implants will be free, providing the family registers for monitoring services. Loving but unnerved parents will be reassured by the ability to integrate tagging with other functions on their PDA so they can see their child any time from any place. Paralleling these developments will be initiatives that employ the logic of convenience to entice the increasingly small group of holdouts to embrace the now common practice of being tagged. At first, such convenience tagging will be reserved for the highest echelon of Western society, allowing the elite to move unencumbered through the physical and informational corridors of power. Such practices will spread more widely as the benefits of being chipped become more prosaic. Chipped individuals will, for example, move more rapidly through customs.

    Indeed, it will ultimately become a condition of using mass-transit systems that officials be allowed to monitor your chip. Companies will offer discounts to individuals who pay by using funds stored on their embedded chip, on the small-print condition that the merchant can access large swaths of their personal data. These "discounts" are effectively punitive pricing schemes, charging unchipped individuals more as a way to encourage them to submit to monitoring. Corporations will seek out the personal data in hopes of producing ever more fine-grained customer profiles for marketing purposes, and to sell to other institutions. By this point all major organizations will be looking for opportunities to capitalize on the possibilities inherent in an almost universally chipped population. The uses of chips proliferate, as do the types of discounts. Each new generation of household technology becomes configured to operate by interacting with a person's chip. Finding a computer or appliance that will run though old-fashioned "hands-on"' interactions becomes progressively more difficult and costly. Patients in hospitals and community care will be routinely chipped, allowing medical staff — or, more accurately, remote computers — to monitor their biological systems in real time.

    Eager to reduce the health costs associated with a largely docile citizenry, authorities will provide tax incentives to individuals who exercise regularly. Personal chips will be remotely monitored to ensure that their heart rate is consistent with an exercise regime. By now, the actual process of "chipping" for many individuals will simply involve activating certain functions of their existing chip. Any prospect of removing the chip will become increasingly untenable, as having a chip will be a precondition for engaging in the main dynamics of modern life, such as shopping, voting, and driving. The remaining holdouts will grow increasingly weary of Luddite jokes and subtle accusations that they have something to hide. Exasperated at repeatedly watching neighbours bypass them in "chipped" lines while they remain subject to the delays, inconveniences, and costs reserved for the unchipped, they too will choose the path of least resistance and get an implant.

    In one generation, then, the cultural distaste many might see as an innate reaction to the prospect of having our bodies marked like those of an inmate in a concentration camp will likely fade. In the coming years some of the most powerful institutional actors in society will start to align themselves to entice, coerce, and occasionally compel the next generation to get an implant.

    Now, therefore, is the time to contemplate the unprecedented dangers of this scenario. The most serious of these concern how even comparatively stable modern societies will, in times of fear, embrace treacherous promises. How would the prejudices of a Joe McCarthy, J. Edgar Hoover, or of southern Klansmen — all of whom were deeply integrated into the American political establishment — have manifest themselves in such a world? What might Hitler, Mao or Milosevic have accomplished if their citizens were chipped, coded, and remotely monitored? Choirs of testimonials will soon start to sing the virtues of implants. Calm reassurances will be forthcoming about democratic traditions, the rule of law, and privacy rights. History, unfortunately, shows that things can go disastrously wrong, and that this happens with disconcerting regularity. Little in the way of international agreements, legality, or democratic sensibilities has proved capable of thwarting single-minded ruthlessness. "It can't happen here" has become the whispered swan song of the disappeared. Best to contemplate these dystopian potentials before we proffer the tender forearms of our sons and daughters. While we cannot anticipate all of the positive advantages that might be derived from this technology, the negative prospects are almost too terrifying to contemplate.

  • SOURCE
  • MASONS BEHIND CHIPPING
  • MasoniCHIP and Implants
  • National Masonichip in Canada
  • BIG BROTHER BRITAIN HAS MORE CCTV CAMERAS THAN CHINA

    cctv Big Brother: It has been revealed that there are 4.2million closed circuit TV cameras in the UK

    Britain has one and a half times as many surveillance cameras as communist China, despite having a fraction of its population, shocking figures revealed yesterday. There are 4.2million closed circuit TV cameras here, one per every 14 people. But in police state China, which has a population of 1.3billion, there are just 2.75million cameras, the equivalent of one for every 472,000 of its citizens.

    Simon Davies from pressure group Privacy International said the astonishing statistic highlighted Britain's 'worrying obsession' with surveillance. 'Britain has established itself as the model state that the Chinese authorities would love to have,' he said. 'As far as surveillance goes, Britain has created the blueprint for the 21st century non-democratic regime. 'It was not intended but it has certainly been the consequence.'

    It is estimated that Britain has 20 per cent of cameras globally and that each person in the country is caught on camera an average of 300 times daily. The Chinese Government revealed the number of cameras it has as it announced plans to expand CCTV surveillance.

    It began widespread installation of cameras in 2003 to bolster its system of extreme state control which hails back to the dark days of Chairman Mao Zedong’s Cultural Revolution. A Chinese worker installs a security camera near a new subway station in Beijing The government also deploys millions of security personnel, which include uniformed, official security guards who work along side police, patrolling the streets and others who bug phones, scour the internet for sensitive material and block international TV news bulletins.

    China's Public Security Ministry said in the news release that its cameras are the most visible components of police surveillance and notification systems installed around the country. Most of the cameras are in urban areas, with 265,000 in the capital Beijing alone, but the government said it plans to expand the use of security cameras in the countryside. It said the increase would 'put the safety of the broad masses of the people first and foremost.'

    It also intends to combine surveillance cameras with new face recognition software, which has raised concerns about how the equipment will be used. It is not clear how many surveillance cameras in China use such software. Figures released today showed that in Britain the number of Big Brother snooping missions by police, town halls and other public bodies has soared by 44 per cent in two years. One request is made every minute for officials to spy on someone's phone records or email accounts.

    Last year there were 504,073 new cases - an average of 1,381 a day. It is the equivalent of one adult in 78 coming under state-sanctioned surveillance under the Regulation of Investigatory Powers Act 2000.

  • SOURCE
  • A REQUEST TO SNOOP ON THE PUBLIC EVERY 60 SECONDS

    cctv Councils, police and other public bodies are seeking access to people’s private telephone and email records almost 1,400 times a day, new figures have disclosed.
    The authorities made more than 500,000 requests for confidential communications data last year, equivalent to spying on one in every 78 adults, leading to claims that Britain had “sleepwalked into a surveillance society”. An official report also disclosed that hundreds of errors had been made in these “interception” operations, with the wrong phone numbers or emails being monitored. The figures will fuel concerns over the use of the Regulation of Investigatory Powers Act by public bodies.

    The Act gives authorities – including councils, the police and intelligence agencies – the power to request access to confidential communications data, including lists of telephone numbers dialled and email addresses to which messages have been sent. Councils have been accused of using the powers, which were originally intended to tackle terrorism and organised crime, for trivial matters such as littering and dog fouling. Only last month, it emerged that councils and other official bodies had used hidden tracking devices to spy on members of the public. The latest figures were compiled by Sir Paul Kennedy, the interception of communications commissioner, who reviews requests made under the Act. They relate to monitoring communication “traffic” – such as who is contacting whom, when and where and which websites are visited, but not the content of conversations or messages themselves.

    Sir Paul found that last year a total of 504,073 such requests were made. The vast majority were made by the police and security services but 123 local councils made a total of 1,553 requests for communications data. Some councils sought lists of the telephone numbers that people had dialled. Amid growing unease about surveillance powers, ministers issued new guidelines last year about their use. Despite the promised crackdown, the 2008 figure is only slightly lower than 2007’s 519,260 requests. In April, the Home Office said it would go ahead with plans to track every phone call, email, text message and website visit made by the public, in order to combat terrorists and other criminals.

    Chris Huhne, Liberal Democrat home affairs spokesman, said: “It cannot be a justified response to the problems we face in this country that the state is spying on half a million people a year. “We have sleepwalked into a surveillance state but without adequate safeguards.”

    Sir Paul found 595 errors in interception requests last year, including mistakes by MI5 and MI6, the intelligence agencies. However, he defended councils over their use of the Act, concluding: “It is evident that good use is being made of communications data to investigate the types of offences that cause harm to the public.”

    His report even encourages councils to acquire more communications data, saying that “local authorities could often make more use of this powerful tool to investigate crimes”. A Home Office spokesman said: “It’s vital that we strike the right balance between individual privacy and collective security and that is why the Home Office is clear these powers should only be used when they are proportionate.”

  • SOURCE
  • CYBER ATTACK TAKES TWITTER OFFLINE VIDEO

  • FULL SCREEN VERSION HERE
  • 100 SPY CAMERAS INSTALLED IN SCHOOL AS BIG BROTHER WATCHES PUPILS EVERYWHERE

    cctv Big Brother: Stockwell Park High has installed nearly 100 security cameras

    A school has installed nearly 100 security cameras to monitor classrooms, corridors and play areas, it emerged yesterday. The £60,000-a-year surveillance system at Stockwell Park High is believed to be the most extensive in a school. Cameras also film lessons to help staff improve their technique and may be used to expose poor teaching.

    The comprehensive intends to kit out every classroom with the technology because staff say it helps tackle truancy, indiscipline and false allegations against them. Teachers' leaders last night warned against using the 'Big Brotherish' system. Almost 100 schools have introduced similar in- class cameras while a quarter use some kind of CCTV, mainly for security reasons. But the average number of classrooms fitted with the technology is five, while Stockwell Park High, in South London, has two cameras in 28 classrooms - 56 in total.

  • SOURCE
  • BIG BROTHER BINCOPS

    bincops Council snoopers sifting through rubbish bins to find out if you're wealthy or poor

    Nearly 100 town halls ordered secret searches of their residents' rubbish bins last year. The official aim was to find out who was throwing out what to help councils encourage recycling. But some staff examining the contents of bins also classified residents as well-off or poor.

    In one area householders were divided into categories on the basis of their rubbish, ranging from Level One Wealthy Achiever to Level Five Hard Pressed. The bin trawls, uncovered through Freedom of Information requests, have been criticised as an invasion of privacy and a waste of effort. One council chief said he strongly objected to the examination of waste unless specific permission is obtained from the householder.

  • FULL ARTICLE HERE
  • EX-IBM'ER REVEALS ANALOG TV BANDS ABANDONED TO MAKE ROOM FOR RFID CHIPS

    rfid2 According to a former 31-year IBM employee, the highly-publicized, mandatory switch from analog to digital television is mainly being done to free up analog frequencies and make room for scanners used to read implantable RFID microchips and track people and products throughout the world.

    So while the American people, especially those in Texas and other busy border states, have been inundated lately with news reports advising them to hurry and get their expensive passports, “enhanced driver’s licenses,” passport cards and other “chipped” or otherwise trackable identification devices that they are being forced to own, this digital television/RFID connection has been hidden, according to Patrick Redmond. Redmond, a Canadian, held a variety of jobs at IBM before retiring, including working in the company’s Toronto lab from 1992 to 2007, then in sales support. He has given talks, written a book and produced a DVD on the aggressive, growing use of passive, semi-passive and active RFID chips (Radio Frequency Identification Devices) implanted in new clothing, in items such as Gillette Fusion blades, and in countless other products that become one’s personal belongings. These RFID chips, many of which are as small, or smaller, than the tip of a sharp pencil, also are embedded in all new U.S. passports, some medical cards, a growing number of credit and debit cards and so on. More than two billion of them were sold in 2007.

    Whether active, semi-passive or passive, these “transponder chips,” as they’re sometimes called, can be accessed or activated with “readers” that can pick up the unique signal given off by each chip and glean information from it on the identity and whereabouts of the product or person, depending on design and circumstances, as Redmond explained in a little-publicized lecture in Canada last year. AFP just obtained a DVD of his talk.

  • FULL ARTICLE HERE
  • LONDON JUST AIN'T GOT ENOUGH SPY CAMERAS

    spyvan

    TWO DEBT AGENCY PRIVATE EYES FINED FOR BREACH OF PRIVACY

    privateye Gumshoes fined for debt collection pretexting blag

    Two private investigators have been slapped with fines for unlawfully obtaining and selling personal information by a court in south London today. Christopher Hackett, trading as Swift Investigations, and Darren Whalley of Managed Credit Services Ltd were prosecuted by the Information Commissioner's Office (ICO) at Wimbledon Magistrate's Court under section 55 of the Data Protection Act. Hackett was given a fine of £400 and Whalley a fine of £500. Both were ordered to pay £400 costs.

    The pair were working on behalf of Blackhorse Finance Limited. Another private investigator subcontracted Whalley to track down a woman whose partner owed money. The ICO said today that Blackhorse believed any information would be obtained legally. But it wasn't. Whalley passed the case to Hackett, who rang BT and convinced the operator he was a fellow employee. He was given the woman's home address which led to Blackhorse debt collectors paying her a visit. Assistant Information Commissioner Mike Gorrill said in a statement: "Illegally obtaining and selling personal information is a serious offence which can be highly damaging to the individuals concerned. This prosecution is the result of a thorough investigation by the Information Commissioner’s Office and is part of our ongoing work to stop the illegal trade in personal information." It's not known how much Hackett and Whalley were paid for their service

  • SOURCE
  • ID CARDS TO STAY VOLUNTARY IN UK SAYS NEW HOME SECRETARY ALAN JOHNSON

    brownid BROWNS NEW WORLD ORDER PLANS BACKFIRE

    British citizens will never be forced to carry ID cards, Home Secretary Alan Johnson has said. Skip related content In his first major policy announcement on the post, Mr Johnson ditched a trial scheme which would have required some airport staff and pilots to carry the controversial cards.

    The schemes, at Manchester Airport and London City Airport, will instead be voluntary. He also ruled out ever requiring the public to own a card. Previously, ministers said ID cards could become compulsory once 80% of the population was covered. The cards will still be compulsory for foreign workers, Mr Johnson said. Mr Johnson said: "Holding an identity card should be a personal choice for British citizens - just as it is now to obtain a passport. Accordingly I want the introduction of identity cards for all British citizens to be voluntary and I have therefore decided that identity cards issued to airside workers, planned initially at Manchester and London City airports later this year, should also be voluntary." Asked if the cards would ever be made compulsory he said: "No". "If a future Government wanted to make them compulsory it would require primary legislation," he added.

    Shadow home secretary Chris Grayling accused the Government of an "absurd fudge". "This decision is symbolic of a Government in chaos," he said. "They have spent millions on the scheme so far - the Home Secretary thinks it has been a waste and wants to scrap it, but the prime minister won't let him. "So we end up with an absurd fudge instead. This is no way to run the country."

  • SOURCE
  • CYBER WARS AND THWARTING INTERNET ATTACKS

    internetattack We have known for a long time that our group actions have been a thorn in the side of the establishment. We have fought for years to keep a presence on the internet despite repeated interruptions by the mobsters we attack. We found out one of mob is called Spamhaus who operate secret censorship on the internet .

    Recently and for the first time we used a dedicated webhoster and connected it with one of our domain names. Within 24 hours it was the top search on Google. It can take years normally to reach that position but due to the huge amount of info that we put out it immediately took first position. However within one month of obtaining this domain the webhoster used a ploy to justify suspending the domain. Due to not being able to use forwarding on this occasion it was impossible to reroute and has been off the air for over 24 hours.

    That is a long time for a domain to be down. We have struggled to remove this domain from the control of the original webhoster but after over 40 emails and much technical issues we have finally prized this back under our control. We should feel complimented that the mobsters spend so much time and effort to disrupt what we are pushing out across the globe . The most recent being our own David Emslie and another activist not part of our group Maurice Kirk ,who we have previously interviewed and video'd at the G20, also called the flying vet, who got worldwide attention when he landed on George Bush's lawn. Both of these men are major thorns in the side of the establishment. David's case has been well documented on our website and NOT by coincidence both men have been charged under the firearms act and could both face lengthy prison sentences. These men have been smeared by the UK's corrupt cops,lawyers and judges , with the corporate media in tow and for David and Maurice having the audacity to stand up to their persecution tactics.

    No other corporate media or group have covered this most serious of issues which connects the masonic thugs use of British laws to undermine two of this countries biggest activists. There are other issues that show that the agendas the corporate media pump out relating to Zionists and gay rights are being transferred onto policies of those who provide web hosting to suppress freedom of speech and that contain any dissent against those agendas especially if they impact on heterosexual families and their children. This is especially true of Britain and the United States. We have no doubt we will face more attacks in the future but will use any means possible to counter those who have controlled the corporate media for so long trying to seize and control the internet from the victims of their crimes.

    666 RFID CHIP !! HOW IT WORKS AND HOW IT WILL BE IMPLEMENTED

  • FULL SCREEN VERSION HERE
  • OPPOSE THE NATIONAL ID !!! THE MARK !!!

  • FULL SCREEN VERSION HERE
  • JOURNALIST HARASSED, TAILED AND SURVEYED AT BILDERBERG

      
                          FULL SCREEN PART1 HERE                               FULL SCREEN PART2 HERE

    FORBIDDEN TO TAKE PHOTOS IN LONDON

  • FULL SCREEN VERSION HERE
  • THE MAN WHO BEAT BIG BROTHER BRITAIN

    andrewwood The man who beat Big Brother Britain: Police told they can't keep pictures of arms trade activist

    Police could be forced to destroy huge archives of surveillance photographs taken at protests, riots and football matches following a landmark judgment. Appeal Court judges ruled yesterday that a law-abiding arms trade activist had his human rights breached when police took photos of him at a protest and kept them on file. In a judgment that could change the way all UK police forces monitor protesters, the Metropolitan Police was told to destroy all pictures of Andrew Wood.

    It could mean police will have to sift through hundreds of thousands of stored surveillance photos and destroy pictures of any innocent subject who complains. However, a one-month delay was granted yesterday to allow an appeal to the House of Lords. The ground-breaking case marks another blow to 'Big Brother' surveillance tactics increasingly favoured by police.

    It follows last month's European Court ruling forcing the Home Office to stop indefinitely storing DNA profiles of people who are arrested but never charged. Forces across the UK have spent years amassing huge numbers of 'overt surveillance' pictures, and police photographers are a familiar sight at major gatherings.

    Police photographers had become a common sight at public events

    Senior officers claim the tactic helps identify extremist activists, violent football thugs and anarchists trying to hijack mainstream events. It also provides vital evidence for later prosecutions. Yesterday's decision centred on Mr Wood, a leading member of the UK-based Campaign Against Arms Trade. Mr Wood, who has never been arrested, attended the AGM of Reed Elsevier PLC, parent company of Spearhead Exhibitions, which runs arms trade fairs. Mr Wood, of Oxford, was entitled to be at the meeting at a Central London hotel having bought a share in the company.

    But an intelligence unit of Scotland Yard, which was policing a protest outside, photographed him, later claiming he had been seen talking to violent activists. Mr Wood, backed by rights group Liberty, complained that taking and keeping photographs of him breached his right to privacy under European law. He lost his initial case last year but yesterday two out of three Appeal Court judges ruled in his favour, declaring the police tactics a 'disproportionate interference'.

    Lord Justice Dyson said it was legitimate for police to take the photographs, but it should have been clear within days Mr Wood was of good character and there was no need to keep his pictures. Lord Dyson added the justification police offered in court - that Mr Wood might commit an offence at an upcoming arms trade protest - was not enough to justify interference with his rights. Lord Collins of Mapesbury said he was 'struck by the chilling effect on the exercise of lawful rights' being followed by a police photographer has.

    But Lord Justice Laws disagreed, saying he believed the police acted within 'the margin of operational discretion' in keeping the photographs. A Metropolitan Police spokesman last night defended the force's conduct, saying overt photography was 'truly valuable'.

    Chief Superintendent Ian Thomas, who runs the Met's public order branch, said: 'Overt photography helps us build a picture of who is involved in organising any potential disorder or crime. 'It may also provide us with evidence for legal proceedings. 'There is nothing secretive or covert about the way we do this, and this practice is very well understood in protester circles.' It is understood Scotland Yard is considering whether to appeal.

  • SOURCE
  • CHEMISTS AND POST OFFICES WILL TAKE FINGERPRINTS FOR ID SCHEME

    fingerprints The move came as it emerged the estimated cost of the controversial scheme has risen by another £213 million. Post offices, high street pharmacies and photo shops are in talks with the Home Office to offer facilities for customers to have their biometric details taken for when they apply for an ID card or new passport.

    But the move fuelled fresh concerns over the ability to securely record and keep personal data, which would now be in the hands of private companies. And it could mean shops charging £30 to collect the data on top of the £30 for the card itself. In separate move, Greater Manchester has been chosen as the launch area for the £5 billion scheme with thousands of cards likely to be printed from this autumn. Jacqui Smith, the Home Secretary, will announce today that she is in talks with the Post Office, National Pharmacy Association, whose members include Boots, and the Photo Marketing Association International, to provide enrolment centres for the ID card scheme. It would mean anyone who wants an identity card or biometric passport will go to their local post office or pharmacy to have their fingerprints read and stored along with a face scan. Ms Smith said: "While private companies will clearly benefit from the increased footfall from offering this service, their customers will benefit from being able to quickly provide their biometrics while they are out doing the shopping. "

    But Phil Booth, of privacy campaign group No2ID, said: "We are talking about a Government that cannot even look after the data of millions of people now asking your local camera shop to process sensitive personal data, including fingerprints." A revised cost document estimated ID card will cost £5.324 billion over the next ten years - £213 million higher than the decade estimate given this time last year.

    And costs could be revised up further as the programme is rolled out, it warned. Chris Grayling, the shadow home secretary, said: "It's obvious that the cost of this scheme is rising fast – the harsh reality is neither the taxpayer nor the citizens who'll have to buy these cards can afford this. It's a white elephant and it should be scrapped. "It's irresponsible for the government to be pressing ahead with contracts for ID cards when Britain simply can't afford it. It smacks of Labour creating poison kill to make it more difficult for any future government to scrap the scheme."

  • SOURCE
  • JACKBOOT SMITH'S SECRET PLAN TO CARRY ON SPYING ON UK PUBLIC

    jackboot smith The home secretary has vowed to scrap a ‘big brother’ database, but a bid to spy on us all continues.

    SPY chiefs are pressing ahead with secret plans to monitor all internet use and telephone calls in Britain despite an announcement by Jacqui Smith, the home secretary, of a ministerial climbdown over public surveillance. GCHQ, the government’s eavesdropping centre, is developing classified technology to intercept and monitor all e-mails, website visits and social networking sessions in Britain. The agency will also be able to track telephone calls made over the internet, as well as all phone calls to land lines and mobiles. The £1 billion snooping project — called Mastering the Internet (MTI) — will rely on thousands of “black box” probes being covertly inserted across online infrastructure.

    The top-secret programme began to be implemented last year, but its existence has been inadvertently disclosed through a GCHQ job advertisement carried in the computer trade press. Last week, in what appeared to be a concession to privacy campaigners, Smith announced that she was ditching controversial plans for a single “big brother” database to store centrally all communications data in Britain. “The government recognised the privacy implications of the move [and] therefore does not propose to pursue this move,” she said.

    Grabbing favourable headlines, Smith announced that up to £2 billion of public money would instead be spent helping private internet and telephone companies to retain information for up to 12 months in separate databases. However, she failed to mention that substantial additional sums — amounting to more than £1 billion over three years — had already been allocated to GCHQ for its MTI programme. Shami Chakrabarti, director of Liberty, said Smith’s announcement appeared to be a “smokescreen”.

    “We opposed the big brother database because it gave the state direct access to everybody’s communications. But this network of black boxes achieves the same thing via the back door,” Chakrabarti said. Informed sources have revealed that a £200m contract has been awarded to Lockheed Martin, the American defence giant. A second contract has been given to Detica, the British IT firm which has close ties to the intelligence agencies.

    The sources said Iain Lobban, the GCHQ director, is overseeing the construction of a massive new complex inside the agency’s “doughnut” headquarters on the outskirts of Cheltenham, Gloucestershire. A huge room of super-computers will help the agency to monitor — and record — data passing through black-box probes placed at critical traffic junctions with internet service providers and telephone companies, allowing GCHQ to spy at will. An industry insider, who has been briefed on GCHQ’s plans, said he could not discuss the programme because he had signed the Official Secrets Act. However, he admitted that the project would mark a step change in the agency’s powers of surveillance.

    At the moment the agency is able to use probes to monitor the content of calls and e-mails sent by specific individuals who are the subject of police or security service investigations. Every interception must be authorised by a warrant signed by the home secretary or a minister of equivalent rank. The new GCHQ internet-monitoring network will shift the focus of the surveillance state away from a few hundred targeted people to everyone in the UK.

    “Although the paper [work] does not say it, its clear implication is that those kinds of probes should be extended to cover the entire population for the purposes of monitoring communications data,” said the industry source. GCHQ placed an advertisement in the specialist IT press for a head of major contracts to be given “operational responsibility for the ‘Mastering the Internet’ (MTI) contract”. The senior official, to be paid an annual salary of up to £100,000, would lead the procurement of the hardware and the analysis tools needed to build and run the system. Ministers have said they do not intend to snoop on the actual content of e-mails or telephone calls. The monitoring will instead focus on who an individual is communicating with or which websites and chat rooms they are visiting.

    Advocates of the black-box system say it is essential if the authorities are to keep pace with the communications revolution. They say terrorists are stateless, highly mobile and their communications are difficult to detect among the billions of pieces of data passing through the internet. Last year about 14% of telephone calls were made using voice over internet protocol (Voip) systems such as Skype. A report by a group of privy counsellors predicts that most calls will be made via the internet within five years. GCHQ said it did not want to discuss how the data it gathered would be used.

  • SOURCE
  • Web and calls monitoring denied by GCHQ