By Thomas R. Horn
November 15, 2013
The plan to build Beast Tech databases for monitoring human activity and to combine such Big Brother bureaucracy with a national ID system has been quietly under development for decades.
Consider how over twenty years ago Spotlight magazine (June 13, 1994) warned under the subtitle, “Danger in the Mail…Now that I Have Free Access to Your Bank Records…Your House Is Next. Nibbling Away Your Freedom Bit by Bit.”
Don’t look now, but Uncle Sam has some shiny new shackles with your name on them. Indeed, sources in the US Postal Service recently revealed that they’re all set to deliver your very own personalized federal ball and chain directly to your mailbox.
[The Postal Service] told several people that they were prepared to mail 100 million of the cards in a matter of months.…
The Clinton administration, which says it’s determined to “break the cycle of dependency” among welfare recipients, is preparing to reduce every American to total dependence—and near-total surveillance—through these infamous cards.…
The Postal Service’s proposal (which was echoed by the IRS—what a coincidence) calls for the card to “mediate” the information about you in every government database. It will be like a magic key, which opens every government database with information about you.
And here’s another troubling fact. If federal computer systems are already integrated to this extent—where one card can “unlock” every piece of information about you—then what makes you think you have the only key?
Of course you won’t have the only key. And potentially everything you own and all your assets, benefits and entitlements can be “withheld” from you with the push of a few buttons at the Treasury Department, IRS, or who-knows-where.…
The databases are ready to be integrated under the card.
The article above reminds of the way Big Brother (in George Orwell’s book, 1984) was able to successfully maintain control over the lives of the people by abolishing all personal privacy. They were under total surveillance, stripped not only of their privacy, but of their freedom, worth, and dignity, as well. Orwell describes the scene this way:
The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it; moreover, as long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was, of course, no way of knowing whether you were being watched at any given moment.
How often, or on what system, the Thought Police plugged in on any individual was just guesswork. It was even conceivable that they watched everybody all the time. But, at any rate, they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct, with the assumption that every sound you made was heard, and except in darkness, every move was scrutinized.
The Clinton administration consistently pushed for a number of new, high-tech systems to enhance their “people control and monitoring” activities. Among their favorites: the national ID card, the Information Superhighway, “and installation of a federal ‘Clipper chip’ in our telephones, computers, [and modems], fax machines, and other electronic devices,” to allow the government easy access for the purpose of tapping and monitoring all of our communications via those systems. Don McAlvany informs us that even though the clipper chip project was pushed hard by Clinton, Janet Reno, and former FBI director Louis Freeh, it actually was launched by George Bush in 1991 and developed by the National Security Agency (NSA), a supersecret organization. The August 1994 issue of The McAlvany Intelligence Advisor reports as follows:
Reno and Freeh are presently pushing Congress to enact requirements that telecommunications providers (i.e., local telephone services, cellular phone companies, wireless services, long distance networks, etc.) be mandated to develop and install software and equipment that allows the government to intercept and monitor all telecommunications in America. Freeh and Reno argue that “to stop terrorism and organized crime, the American people must give up some of their personal freedom and privacy.” [Note: You can see from the date of this newsletter that this plan was on their agenda long before the Oklahoma City bombing occurred. This just gave them the excuse they needed to push such legislation through the Congress. Kind of makes you wonder whose “plans” benefited most from that act of terrorism.]
The FBI has reintroduced its 1992 proposal to require that communications service providers redesign their equipment to facilitate electronic surveillance. The Digital Telephony and Communications Privacy Improvement Act of 1994 [Note: That title is Orwellian “doublespeak,” because the act will destroy all privacy.] mandates that phones, cable, and computer network companies modify their switches and computers to ensure that surveillance can be conducted concurrently from a remote government facility. All transactions and phone calls (in and out) will be monitored and recorded. Companies who refuse to comply will be fined $10,000 per day.
The Electronic Frontier Foundation has warned: “The FBI scheme would turn the data superhighway into a national surveillance network of staggering proportions.”
The Clintonistas have said that within a few years they plan to link every home, business, lab, classroom, and library via their high-tech computerized information superhighway. The Wall Street Journal warned in an editorial (7/10/94) that even if the Congress blocked the government-backed installation of the “Clipper Chip” that the bureaucracy would make an end run and install it anyway.
The Wall Street Journal pointed out that sophisticated terrorists and organized crime syndicates could easily evade the “Clipper Chip” surveillance, but that it would enable the Big Brother bureaucracy to monitor every phone call, every credit card purchase, every bank transaction, and every telecommunication of every private citizen in America. The Wall Street Journal concluded that: “The potential for government manipulation and intimidation of the citizenry is enormous.”
USA Today (7/20/94) carried a front-page story entitled “Privacy Abuse Confirms the Worst Fear,” which discussed how IRS officials had admitted at a Senate hearing that more than 1,300 IRS agents have been investigated over the past five years on suspicion of improperly snooping through taxpayers’ files. About 56,000 IRS employees (nearly half of the agency’s 115,000 work force) have access to the Integrated Data Retrieval System (IDRS), the computer system that handles collection and storage of taxpayer information.
Evidence of IRS privacy abuses was revealed by the Senate Governmental Affairs Committee in August 1993. Committee member Senator David Pryor (D–AR) said: “The IRS’ disregard of taxpayer (privacy) rights confirms the worst fears that the American people have about the IRS. This illegal and offensive activity must stop, and it’s clear that Congress must act.” But the major problem with the IRS violation of taxpayer privacy rights is not just IRS snooping of taxpayer returns. It is the sharing of that information with dozens of other government agencies—a practice which until recently was strictly forbidden.
The most ominous part of the USA Today article was the revelation that “the IRS is in the middle of an $8 billion computer systems upgrade. Eventually, optical character readers will be used to scan and direct tax returns into three main computers hooked together in a national network that links the ten IRS service centers, eight regional offices, and sixty-five district offices.” (emphasis added)
Because of grassroots pressure and their success in enlightening the populace as to the true meaning and end results of some of these measures, many of the “control” elements of the New World Order have not yet been passed by Congress. But that doesn’t seem to be hindering the progress of the current administration as it moves us forward into the New World Order. And if that becomes a problem, this administration will enact what it wants via an “executive order.” “Executive orders give a president the ability to declare a state of emergency and martial law. This suspends all constitutional rights, converting our democratic form of government into a [total] dictatorship [with merely the stroke of a pen]”. Congress can subsequently accept these executive orders, publish them in the Federal Register, and establish them as laws of the land. These can be implemented at the whim of the current president on a moment’s notice just by declaring a state of emergency.
For example, Clinton used this method to move US troops under UN command (PDD-25 signed May 5, 1994). Executive orders date back as far as Franklin Delano Roosevelt. President Carter signed No. 12148 delegating the power to run the entire country to FEMA (Federal Emergency Management Association), then on June 3, 1994, Clinton signed a new executive order transferring control of the country in an emergency from FEMA to the National Security Council and the national security advisor. Some of the executive orders that subsequently have made their way into the Federal Register are reported by McAlvany as follows:
10995—All communications media seized by the federal government. 10997—Seizure of all electrical power, fuels, including gasoline and minerals. 10998—Seizure of all food resources, farms and farm equipment. 10999—Seizure of all kinds of transportation, including your personal car, and control of all highways and seaports. 11000—Seizure of all civilians for work under federal supervision. 11001—Federal takeover of all health, education, and welfare. 11002—Postmaster General empowered to register every man, woman and child in the U.S.A. 11003—Seizure of all aircraft and airports by the federal government. 11004—Housing and Finance Authority may shift population from one locality to another. Complete integration. 11005—Seizure of railroads, inland waterways, and storage facilities. 11051—The director of the Office of Emergency Planning authorized to put Executive Orders into effect in “times of increased international tension or financial crisis.” He is also to perform such additional functions as the president may direct.
In short, if there should be nationwide riots (a la Los Angeles in ’92) for any reason; a national financial crisis; massive social upheaval (i.e., a huge quantum jump in crime); major resistance to national gun confiscation or to the installation of the New World Order or other socialist/police state measures; etc., [the president]… and his “comrades” have the power and machinery to instantly suspend the Constitution and declare a total dictatorship. (emphasis added)
On April 19, 1995, an article appeared in the Clifton, New Jersey, Herald & News. Writer Rich Calder titled the article, “Clifton Group OKs Listing of Residents; City Council Urged to Register Everyone.” This city called for a computer database with which it could track all residents.
A 26-member committee…recommended last night that the city council approve an ordinance requiring all residents to register with the city. This proposal would obligate all renters and homeowners to fill out a dwelling certificate…listing all occupants in their household. The certificate would require residents to list their names and ages, along with the names and ages of their children. This measure…may raise constitutional issues. Members of the ACLU have said that this procedure will threaten residents’ privacy. Committee members who support the proposal said that people with nothing to hide shouldn’t have anything to worry about.… Mayor James Anzaldi hailed the plan at last night’s meeting, saying the council should implement an ordinance right away.… The dwelling certificate would be supplied by several city agencies.… The proposal also calls for a centralized computer database to be created that would help track…violations.
Subscribe to NewsWithViews Daily E-Mail Alerts!
Are we set to lose our privacy? For sure. But as one lady put it earlier, “You ain’t seen nothin’ yet.” Are we in electronic bondage? You bet. And we are probably already too far into the system to ever get out. All we can do is sound the warning and get prepared for the battle cry, because for most of us, it’s too late to pull a “disappearing act” from the system, unless it’s the disappearing act described in the Bible when the Lord returns to snatch us away. However, we don’t know exactly when that will be, so we must be prepared to survive (victoriously, we hope) in the troubled times that lie ahead, as Scripture is emphatic about one thing: in the end times, things are going to get worse before they get better.
But we are not to despair—we have a blessed hope and lots of promises in the Word from our heavenly Father, such as He “will never leave us nor forsake us.” His instruction is to “comfort one another with these words” and “When you see these things begin to come to pass, look up for your redemption draweth nigh.”
In the next entry we will consider NWO Organizations—The Illuminati and Friends
WATCH THE BEAST TECH TRAILER
© 2013 Thomas Horn - All Rights Reserved
Thomas Horn is the CEO of RaidersNewsUpdate.com and SurvivorMall.com.
Over the last decade, he has authored three books, wrote dozens of published editorials, and had several feature magazine articles. In addition to past articles at NewsWithViews.com , his works have been referred to by writers of the LA Times Syndicate, MSNBC, Christianity Today, Coast to Coast, World Net Daily, White House Correspondents and dozens of newsmagazines and press agencies around the globe. Tom's latest book is "The Ahriman Gate," which fictionalizes the use of biotechnology to resurrect Biblical Nephilim.
Thomas is also a well known radio personality who has guest-hosted and appeared on dozens of radio and television shows over the last 30 years, including "The 700 Club" and "Coast to Coast AM." When looking for a spokesperson to promote their film "Deceived" staring Louis Gossett Jr. and Judd Nelson, "Cloud 10 Pictures" selected Thomas as their spokesperson to explain the Christian viewpoint on UFO-related demonology.