National I.D. Cards
Big Brother is watching you

The United States of Greater Israel, Obedient to the Master Race under the Universal Noahide Laws, HJR 104, Public Law 102-14, controlled by the Noahide Supreme Court of Justice

Israel Sanhedrin Supreme court
September 11 was quickly followed by calls from some lawmakers
and business leaders for a more robust national identification system: ID cards
that possess sophisticated biometric data, making them harder to forge than
today's driver's licenses. Privacy advocates are strongly opposed, arguing that
such cards, while enabling the government to track individuals and access
personal data, would do little to separate the innocent citizen from the walking
security threat. For now, the Bush administration is cool to the idea, but it's
not hard to envision the Department of Homeland Security re-examining the
concept if further terrorist attacks occur. More than 30 countries, from Italy
to Malaysia, have already introduced "smart" ID cards. If you're
eventually issued a national card, it will likely incorporate several of the
technologies shown here, combined to make the card readable by both high- and
low-tech devices.
1. Your USID number
Most logically your Social Security number. Although the federal government has
rejected using the SS card as an ID card, the number is already used by the IRS.
If a card is introduced, it's a good guess the Department of Homeland Security
would manage it, possibly issuing different classes of cards for citizens, green
card holders, and others.
2. Optical Memory Strip
An optical memory data strip (like a small CD laminated onto the card) locks in
4MB of read-only data, which can be read by an optical scanner. The strip can
contain a digitized image of a fingerprint and a photo, along with essential
personal data such as previous addresses, mother's maiden name, and, optionally,
medical data such as allergies. Room remains for scanned documents, X rays, or
digital signatures. LaserCard of Mountain View, California, adds an embedded
hologram.
3. Photograph
Standard printing technology, which lays down ink on the card material, easily
succumbs to skilled forgers. One step up is laser engraving: Machines
permanently etch a photo into the card material, usually a polymer such as
polycarbonate. It's virtually impossible to erase or alter a laser-engraved
image without leaving telltale marks. But a trained person is still needed to
examine the card for sophisticated tampering. Another step up: Integrate a radio
frequency identification (RFID) device, which would automate the authentication
process. An RFID chip and antenna would be placed beneath the photo. If the
image is altered, the chip and antenna are disturbed, and a portable reader will
register a problem.
4. Smart card technology
With the addition of an integrated circuit microprocessor, the card can perform
data manipulation and run cryptographic algorithms. The processor makes it
possible to limit the amount of data any one official can access. For example,
an ER doctor could view medical information and enter data about treatment (if
the card's data storage device is read-write capable), but could not see
security-related data (such as a traveler's flight history, or a non-citizen's
visa status) that an airport or INS official might require. But how secure are
smart cards? Detailed instructional hacking sites can be found on the Web, many
focusing on European cards. And the more data on a card, the more valuable the
card becomes to an identity thief.
5. Internal Memory Strip
Currently manufactured only by UltraCard of Los Gatos, California, this
rewritable internal strip can store 20MB of data, roughly the capacity of 14
floppy disks—essentially giving the card a (tiny) hard drive. The capacity may
soon grow by a factor of 10, according to the manufacturer. A high-capacity
device could store rich biometric data such as several fingerprints, iris scans,
face scans, heartbeat characteristics, or DNA sequences. In a relatively simple
application, law enforcement officials access the card data using a portable
reader and match it to the biometrics of the person presenting the card. Or an
entry control system might be developed that automatically matches, for example,
the iris scan on the card with the cardholder's iris.
6. 2-D Bar Code
This low-tech info coding could be used by officials who don't have more
sophisticated optical reading devices. A big step up from the simple
20-byte-capacity bar code you see on cereal boxes, the 2-D bar code stores
information in vertical and horizontal lines—up to 2KB or more of data,
potentially including text, a photo, and a limited amount of biometrics. These
bar codes are already used on driver's licenses in several states, generally to
code the same information that's on the face of the card. The technology is
virtually tamperproof. The main problem: relatively small capacity per inch of
card real estate. Datastrip Inc. of Exton, Pennsylvania, says it can cram 2.8KB
of data into a space the size of a conventional thin magnetic strip. The company
also sells a portable reader with an integrated fingerprint identifier.
WHOSE DATABASE, ANYWAY?
The biggest challenge for a national ID system is ensuring the accuracy of the
information used to build a database of names, biometrics, and the like. There
are more than 200 million state driver's licenses in the country, representing
the largest collection of data of its kind. The most pressing question: How
accurate are these databases? How easy is it to obtain a license fraudulently?
As the American Association of Motor Vehicle Administrators points out, al Qaeda
terrorists used licenses to build U.S. identities. In January the AAMVA proposed
beefing up the system by establishing uniform standards for licenses,
coordinating data between states, and improving security and biometrics. A
national ID initiative could be a springboard for this effort.
![]()
"We
are on the verge of a global transformation. All we need is the right major
crisis and the
nations will accept the "New World Order."
David Rockefeller
Was the right crisis the staged World Trade Center Crashes?



In response to the tragic events of
Sept. 11, 2001 there has been renewed interest in the creation of national ID
cards. Larry Ellison, head of Oracle Corporation, the California based software
company, has called the development of a national identification system and
offered to donate the technology to make this possible. He proposed ID cards
with embedded digitized thumbprints and photographs of all legal residents in
the U.S. Proposals for a national ID card are also now being considered by the
UK Home Secretary, David Blunkett.
Fore runner of the Mark?


XXXXX DRUDGE REPORT XXXXX SUNDAY SEPT 23 2001 20:02:37
ET XXXXX
BUSH CONTEMPLATES NATIONAL ID CARD FOR ALL CITIZENS
**Exclusive**
A highly controversial option has emerged for use in fighting terrorism in the
United States: A national ID card which would be issued to every citizen.
A proposal for the creation of a national ID card was presented to President
Bush in recent days, top government sources tell the DRUDGE REPORT.
The ID card plan was included in a classified briefing outlining steps the
nation can take to limit exposure to terror attacks.
Bush briefly discussed the ID card option with British Prime Minister Tony
Blair, according to insiders.
MORE

George Bush: The Hitler Project (Pt. 1)
by ALEX CONSTANTINE
In October 1942, ten months after entering World War II, America was
preparing its first assault against Nazi military forces. Prescott Bush was
managing partner of Brown Brothers Harriman. His 18-year-old son George, the
future U.S. President, had just begun training to become a naval pilot.
On Oct. 20, 1942, the U.S. government ordered the seizure of Nazi German banking
operations in New York City which were being conducted by Prescott Bush. Under
the Trading with the Enemy Act, the government took over the Union Banking
Corporation, in which Bush was a director.
The U.S. Alien Property Custodian seized Union Banking Corp.'s stock shares, all
of which were owned by Prescott Bush, E. Roland `` Bunny '' Harriman, three Nazi
executives, and two other associates of Bush. The order seizing the bank ``
vests '' (seizes) `` all of the capital stock of Union Banking Corporation, a
New York corporation, '' and names the holders of its shares as:
E. Roland Harriman -- 3991 shares [chairman and director of Union Banking Corp.

January 30 Adolph Hitler becomes Chancellor of Germany. He is the leader of the National Socialist German Workers Party and commander of the SA, the Storm Troopers (founded in 1922).
February 27 The Reichstag building is set on fire by secret order of Hitler's Chief of Propaganda, Joseph Goebbels. A young Dutchman, identified as a Communist, is arrested and charged with setting the fire.
February 28 The very next day, Hitler persuades President Hindenburg to sign Article 48, an "emergency" decree authorizing Hitler to suspend all civil rights, arrest (and execute) any suspicious person. A reign of terror ensued in which thousands (communists, socialists, labor union leaders) were arrested and sent to prison. To maximize Nazi influence, the non-Nazi press was outlawed.
![]()
![]()
Constitutional infringements cited
Gov. Siegelman trying to 'manipulate news coverage,' says lawyer for Mobile Register
10/02/01
By JEFF AMY and JEB SCHRENKMONTGOMERY -- The Mobile Register accused Gov. Don Siegelman's administration Monday of violating its civil rights by refusing to answer questions from Eddie Curran, one of the newspaper's reporters.
"The Register considers this to be a serious infringement of its constitutional rights under the First and 14th Amendments of the Constitution of the United States," Ed Sledge, a Mobile lawyer for the Register wrote to two top administration officials. "Further, Governor Siegelman's attempt to choreograph and manipulate news coverage in this manner is causing irreparable harm to the Register."
Sledge also wrote that Siegelman should be more understanding because of a documented incident in which he lost his temper. Sledge cited a news article describing a 1989 episode when Siegelman was attorney general and members of Mothers Against Drunk Driving said he cursed at them during a meeting. Among the reasons cited by the administration for cutting off communication with Curran is because he cursed at a spokesman in the governor's office in July.
According to a news account of the 1989 incident, which quoted women at the meeting, Siegelman in his outburst uttered variations of the same two obscenities that Curran used. An attorney who served under Siegelman denied Monday that Siegelman uttered one of the words in the 1989 meeting.
Last week, Siegelman said Curran had "used the worst language, profane language, that has ever been used."
The First Amendment guarantees the right to a free press. Under the 14th Amendment, individual citizens can sue states for violating their civil rights. Gregg Leslie, the legal defense director of the Reporters Committee for Freedom of the Press said the Register might be able to claim the administration is violating parts of the 14th Amendment because it is denying equal protection and due process to Curran and the Register.
"The state must offer each citizen equal protection and yet the state has decided to deny Eddie Curran information that other citizens will be getting," said Mike Marshall, the Register's editor.
___________________________________________________________________________________________________
Back to Hitler's reign of Terror
March 5 Hitler receives the support of the German voters in Reichstag (Germany's Parliament) elections.
March 24 Now under Hitler's control, the Reichstag essentially grants Hitler total control by empowering him to make laws for the Reichstag.
March 20 The first Nazi concentration camp is opened at an old powder factory near Dachau. The camp is to be used to incarcerate thousands of political opponents of the regime. April 1 Hitler declares a one-day boycott of Jewish businesses. Signs are posted all over Germany saying, "German people, defend yourselves! Do not buy from Jews."
April 7 Forced retirement of all non-Aryan civil servants (with the exception of the military).
April 21 German law prohibits kosher butchering. At this time, there are approximately 500,000 Jews living in the Third Reich. This is less than 1 percent of the total population.
May 2 The Nazis seized control of the German labor unions, arrested their leaders, confiscated union property and established a Nazi-controlled labor union, The German Labor Front. German workers lost the right to strike.
May 10 Under orders from Goebbels, Hitler's Minister of Propaganda and Popular Enlightenment, Nazi gangs raided the Berlin Library and burned truckloads of Germany's very best literary works. June Hitler secured the cooperation of the Vatican by guaranteeing the liberties of the Catholic Church in Germany. In return, the Vatican promised to stay out of German politics.
June 22 The Social Democrat Party is outlawed, making Hitler's Nazi Party the only political party in Germany.
July 14 Hitler is empowered to revoke German citizenship for those considered a threat to the government or "undesirable" to the government.
August 29 Official confirmation that the Nazis are sending Jews to concentration camps on a variety of charges from "consorting with German girls," to "imitating the Nazi salute."
______________________
![]()
Compulsory ID cards 10-2-2001
Before Monday, Prime Minister Tony Blair and Home Secretary David Blunkett had confirmed they were looking at plans for mandatory ID cards.
_____________________________________________________
U.S. CONCENTRATION CAMPS
FEMA AND THE REX 84 PROGRAM
over 600 prison camps in the United States, all fully operational and ready to receive prisoners. They are all staffed and even surrounded by full-time guards, but they are all empty. These camps are to be operated by FEMA (Federal Emergency Management Agency) should Martial Law need to be implemented in the United States. The current foreseeable event which will see the implementation of the use of these camps is the coming of the New World Order, led by the Shadow Government.
The Rex 84 Program was established on the reasoning that if a mass exodus of illegal aliens crossed the Mexican/US border, they would be quickly rounded up and detained in detention centers by FEMA. Rex 84 allowed many military bases to be closed down and to be turned into prisons.
Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Garden Plot is the program to control the population. Cable Splicer is the program for an orderly takeover of the state and local governments by the federal government. FEMA is the executive arm of the coming police state and thus will head up all operations. The Presidential Executive Orders already listed on the Federal Register also are part of the legal framework for this operation.
The camps all have railroad facilities as well as roads leading to and from the detention facilities. Many also have an airport nearby. The majority of the camps can house a population of 20,000 prisoners. Currently, the largest of these facilities is just outside of Fairbanks, Alaska. The Alaskan facility is a massive mental health facility and can hold approximately 2 million people.



This shows the North Eastern section of the U.S., and shows a closer look, where U.N. troops are located in North Western Montana, and a few other states as well.







The Family Alliance
__________________________________________________
Back to Hitler
October 14 Hitler withdraws from the League of Nations and the Versailles disarmament pact. At the same time, Hitler announces the dissolution of the Reichstag.
June 30 In a massive "blood purge," known as "the Night of the Long Knives,"Hitler arranged for the Gestapo to murder Ernst Roehm, the leader of Germany's political left and head of the SA. At least 1,000 additional political enemies were included in this purge.
July 13 Heinrich Himmler, Chief of the SS, assumes command of all Nazi concentration camps. Himmler and his "black shirts" are now responsible for policing Germany.
August 2 President Paul von Hindenburg dies. And with his death the Weimar Republic is officially dead. August 3 Now completely in control of the reigns of power, Hitler declares himself both President and Chancellor of the Third Reich and Commander-in-Chief of the Military. Hitler now had totalitarian dictatorial power.

July 22
Effective January 1, 1939, all Jews must carry a special identification card.
November 23
Reich law requires Jews in Poland to wear the yellow Star of Chiun and Moloch (Baal) their god.
Amos:5:26:
But ye have borne the
tabernacle of your Moloch and Chiun your images, the star of your god, which ye
made to yourselves.

__________________________________________
Bin
Laden's family link to Bush
by PETER ALLEN, Daily
Mail
In summer 1971, Osama and Salem Bin Laden enjoyed a holiday in Sweden with some of their 55 brothers and sisters.
Yet within a few years, the two teenagers' lives had taken stunningly different turns.
As the world knows to its cost, Osama embraced Islamic fundamentalism and 30 years later was named the world's most wanted man. He is prime suspect in the murder of nearly 7,000 in the worst ever terrorist atrocities in the U.S. earlier this month.
Incredibly, Salem went on to become a business partner of the man who is leading the hunt for his brother. In the 1970s, he and George W Bush were founders of the Arbusto Energy oil company in Mr Bush's home state of Texas.
Mr Bush was not long out of Business School when he started the company in 1978.
Salem watched it grow into a hugely successful business until his death in a microlight plane crash in Texas in 1983.
As he built his own business empire, Salem Bin Laden had an intriguing relationship with the president-to-be.
In 1978, he appointed James Bath, a close friend of Mr Bush who served with him in the Air National Guard, as his representative in Houston, Texas.
It was in that year that Mr Bath invested $50,000 (about £34,000) in Mr Bush's company, Arbusto. It was never revealed whether he was investing his own money or somebody else's.
There was even speculation that the money might have been from Salem. In the same year, Mr Bath bought Houston Gulf Airport on behalf of the Saudi Arabian multimillionaire. Three years ago, Mr Bush said the $50,000 investment in Arbusto was the only financial dealing he had with Mr Bath.
New
book on NSA sheds light on secrets
U.S. terror plan called Cuba invasion pretext
_________________________
But who is the leading Advocate pushing this I.D
Other than Bill & Hillary Clinton
Make ID cards compulsory
urges Oracle boss, by Andrew Orlowski, The Register, Sept. 24, 2001
Oracle Chief's Proposal Raises Constitutional, Feasibility Issues,
by Paul Rogers and Elise Ackerman, Mercury News, Sept. 24, 2001
National ID card idea prompts doubts
And despite polls showing the public supporting some type of national ID
card, civil liberties groups also called Ellison's proposal an unacceptable
intrusion into privacy.
Known as biometrics, the technology behind the idea already exists. Systems
digitally scan fingerprints or handprints, and are being used by security
officials at some casinos, courts and airports for employees to gain access to
restricted areas.
``It might be worth investigating more widely, but I'm not sure that kind of
a system would have prevented the tragedy,'' said Bill Rathburn, former Dallas
police chief and head of security at the 1996 Atlanta Olympic Games. ``There
are a lot of people who are potential terrorists who have never done anything
wrong. I just don't think that system would pick them all up.''
Wonder who is a lot of
people who are potential terrorist? He said adding sky marshals to planes, conducting better baggage searches and
building more-secure cockpits might be most effective.
Others worry it chips away at the Constitution.
``I'm not going to be critical of his good will in attempting it,'' said
former Republican Rep. Tom Campbell, now a Stanford University law professor.
``However, I strongly oppose a national ID card. If you have an ID card, it is
solely for the purpose of allowing the government to compel you to produce it.
This would essentially give to the government the power
to demand that we show our papers. It is a very dangerous thing.'' Could be abused
Other questions remained unanswered Monday.
Despite more than 150 requests for interviews from media outlets following a
story in the Mercury News on Sunday
outlining the idea, Ellison did not elaborate.
``We're putting together a response,'' said Jennifer Glass, an Oracle
spokeswoman.
Oracle, based in Redwood City, is the world's largest maker of database
software. The company's earliest customers included the CIA.
Ellison, Oracle's founder, is one of the world's richest people, worth an
estimated $15 billion.
The flamboyant tech leader made his proposal Friday night in an interview
about the economy with KPIX-TV, based in San Francisco.
``We need a national ID card with our photograph and thumbprint digitized and
embedded in the ID card,'' Ellison told KPIX anchor Hank Plante.
``When you're walking into an airport and you say that you are Larry Ellison,
you take that card and put it in a reader and you put your thumb down and that
system confirms that this is Larry Ellison,'' he said.
Asked about privacy concerns, Ellison said privacy was already lost in the
Internet age because so much information is available on the Internet and
corporate databases.
Americans have long debated the creation of a national ID card.
The debate began in 1935 when Social Security cards were first introduced.
Critics of President Franklin Roosevelt demanded that the cards be used only for
tracking employees' wages.
The issue extended through the Clinton administration's failed plan for
national healthcare cards in the mid-1990s with computer chips containing
medical records -- a plan that conservative groups such as the Cato Institute
blasted. More recently, some liberal groups have howled after Sen. Dianne
Feinstein and other lawmakers advocated ID cards to block illegal immigrants
from employment.
``Civil liberties groups would certainly oppose this, as would some
religious groups and gun rights groups,'' said David Sobel, general
counsel for the Electronic Privacy Information Center, non-profit group in
Washington, D.C.
Sobel said government officials could require anyone getting on a bus,
applying for a job or writing a check to show the card. The officials could save
the details in a database.
``You begin to create a technology and an infrastructure that allows for the
continual tracking of people's movements,'' he said. Public supports idea
Dell Computer and Compaq Computer sell notebook computers equipped with
thumbprint scanners used to sign on, to access different portions of a large
computer network or to sign on to secure Web sites.
Though a biometric keyboard costs about $100 more than a regular keyboard,
users benefit from additional security, said Sean Berg, a manager at Dell.
``There are hundreds, probably thousands, of small businesses that are using
this,'' said Damon Wright, director of investor relations at Identix, a Los
Gatos biometrics company.
Wright said the idea of a national ID card based on biometrics has a lot of
merit. He predicted the price of a card would drop below $5.
Yet others say the technology would encounter hurdles.
``The logistics are an issue,'' said Tom Oelsner, vice president of Banque
Technology Systems, a supplier of smart-card technology based in San Mateo.
``Are you going to do everybody or just resident aliens or people here on work
visas? That system wouldn't have caught Timothy McVeigh. It's not as easy as it
might appear.''
Oracle Boss Urges National
ID Cards Offers Free Software, by Paul Rogers and Elise Ackerman, Mercury News, Sept. 22,
2001 ``We're quite willing to provide the software for
this absolutely free,'' he said.
Sure he is Calls for national ID cards traditionally have been met with fierce
resistance from civil liberties groups, who say the cards would intrude on the
privacy of Americans and allow the government to track people's movements.
But Ellison said in the electronic age, little
privacy is left anyway.
``Well, this privacy you're concerned about is largely an illusion,''
he said. ``All you have to give up is your illusions, not any of your privacy.
Right now, you can go onto the Internet and get a credit report about your
neighbor and find out where your neighbor works, how much they earn and if they
had a late mortgage payment and tons of other information.''
Attempts by the Mercury News to reach Ellison for further comment Saturday
were unsuccessful. Many questions about the proposal remain unanswered, such as
whether foreign nationals would be required to have a card to enter the country.
The hijackers in the Sept. 11 attacks are not believed to have been U.S.
citizens.
In the TV interview with anchorman Hank Plante, Ellison said shoppers have to
disclose more information at malls to buy a watch than they do to get on an
airplane.
``Let me ask you. There are two different airlines. Airline A says before you
board that airplane you prove you are who you say you are. Airline B, no
problem. Anyone who wants the price of a ticket, they can go on that airline.
Which airplane do you get on?''
Oracle has a longstanding relationship with the federal government.
Indeed, the CIA was Ellison's first
customer, and the company's name stems from a CIA-funded
project launched in the mid-1970s that sought better ways of storing and
retrieving digital data.
Civil libertarians said caution is needed.
``It strikes me as a form of overreaction to the events that we have
experienced,'' said Robert Post, a constitutional law professor at the
University of California-Berkeley. ``If we allow a
terrorist attack to destroy forms of freedom that we have enjoyed, we will have
given the victory to them. This kind of recommendation does just
that.''
Post said while such a system may catch some criminals, it could be hacked or
faked or evaded by capable terrorists. Nor is it clear that such a system would
have foiled the Sept. 11 attacks, he said. Strong support Have you been polled? Have
you ever been polled? Are you sick and tired of these invisible polls? In a survey released Wednesday by the Pew Research Center for the People
& the Press, seven of 10 Americans favored a requirement that citizens carry
a national identity card at all times to show to a police officer upon request.
The proposal had particularly strong support from women. There was less support
for government monitoring of telephone calls, e-mails and credit card purchases.
The FBI already has an electronic fingerprint system for criminals.
Now all we have to do is get
a national finger printing for free men In July 1999, the FBI's Integrated Automated Fingerprint Identification
System became operational. That system keeps an electronic database of 41
million fingerprints, with prints from all 10 fingers of people who have been
convicted of crimes.
Faster response Paul Bresson, an FBI spokesman in Washington, said Saturday that he is
unaware of the details of Ellison's proposal and declined comment.
Howard Gantman, a spokesman for Sen. Dianne
Feinstein, D-Calif., said that she would be interested in discussing
the idea with Ellison.
``She does feel that we do need to make some important advances in terms of
increasing our security,'' Gantman said. ``A lot of people have brought up ideas
about how to create more security and she's interested in exploring them. She'd
like to find out more.''
One group certain to fight the proposal is the American Civil Liberties
Union.
A statement about ID cards posted on the ACLU's national Web site says: ``A
national ID card would essentially serve as an internal passport. It would
create an easy new tool for government surveillance and could be used
to target critics of the government, as has happened periodically throughout our
nation's history.'' Miriam Webster Main Entry: or·a·cle And, but of course Oracle
speaks for their god Chiun and Moloch the star of their god Rv:13:17: And that no man might buy
or sell, save he that had the mark, or the name of the beast, or the number of
his name. ``We are in the process of putting a proposal together and analyzing what it
would take to get to get something running in a matter of a small number of
months, like three months, 90 days,'' Ellison said. ``We think we could put up
this technology very, very quickly.'' But God said to obey the law
of the land That's correct, he did. Obey
the constitution of the United States of America. This constitution was based
upon God's laws. These laws are broken. The traitors to the constitution of the
United States of America include George W. Bush and almost his entire cabinet.
Almost all of the Congress. They have sold out your freedom to the "New
World Order". Obey them if you will,
but you will lose sight of your God, Jesus Christ. As for me and my house, we
shall serve only the Lord. Which one of these do you reckon we will get to stay
in? God and his father, I trust. Foreign Troops to patrol
United States skies! NATO sends planes to protect U.S ? CASTEAU, Belgium (CNN) -- NATO on Tuesday dispatched
the first of five AWACS surveillance planes to patrol the U.S. skies -- the
first time NATO assets have been used to help protect the continental United
States. Another breach of the Constitution of
the United States! IDG) -- The U.S. Secretary of Transportation's Rapid Response
Team on air travel security late Friday made public a set of recommendations
that build on President George W. Bush's Sept. 27 call to make commercial
airports and airliners more secure against terrorism The team's recommendations call for significant new uses of
information technology, including issuing "smart" credentials for
passengers and provisions for integrating intelligence agencies' data with
information in airport and airline databases Al Martin The Office of Homeland Security will initially be run by
former Pennsylvania According to an inside source, the 'Office of Homeland
Security' will operate The second division of the Office of Homeland Security will be
a smaller Ridge wants the uniforms of this State Political Police
division to The actual name of this agency, Office of Homeland Security,
is very This new agency will also operate 'with extralegal authority.'
They will then With this new agency, the seeds are being sown for a new
classification of law In order to take the concept of 'illegal' covert activity
away, they are laying The Office of Homeland Security will be a separate agency, not
under any other The new Office of Homeland Security helicopters will be
painted a matte black NEW YORK (CNN) -- As the U.S. investigation into the September 11
attacks continues, many civil libertarians said they are concerned about the
possible violation of fundamental U.S. civil rights for those who have been
arrested and detained. Lawyers also said that the government will not say which people are being
held or what the charges might be. In some cases, attorneys and legal analysts
said, the usual rules governing detentions have been altered or even suspended. Although the secret police in Italy during Mussolini's rule were notorious,
probably the most extreme and terrible example was that in Germany under Adolf
Hitler. Under National
Socialism, Germany became a police state, a state where the power of the
police, and especially the secret police, over security and justice was
tyrannically applied with virtually no procedural checks. The German secret police had its genesis in the SS, or Schutzstaffel
[defense echelon], created as Hitler's bodyguard under the SA (the military arm
of the Nazi party), and in the SD, or Sicherheitsdienst [security
service], organized in 1931 as the intelligence branch of the SS. From 1929,
Heinrich Himmler
controlled the SS. The Gestapo (secret state police) originated in 1933 under
Hermann Goering
and was ultimately merged with the SD. Just as the Gestapo had its secret
operatives among the mass of the population, the SD had agents, known only to
the chief SD officers, in every department of the German government, in the
armed forces, in the Nazi party, among chief industrial executives, and among
the Gestapo itself. While the Gestapo was known and feared, the existence of the
SD was known to few. The powers of the Gestapo, the SS, and the SD were vast; virtually any person
suspected of disloyalty to the regime or of social aberration could be summarily
arrested, executed, or interred in a concentration camp. The SS, literally a
separate army, was responsible to Himmler alone; thus, probably for the first
time in history, a secret police wielded virtually absolute power. The crimes
and atrocities of the Nazi authorities in Germany itself and throughout
German-occupied Europe during World War II were largely carried out by the SS
and the Gestapo, who controlled the concentration and extermination camps, and
who set up their subsidiary agencies in every conquered country November 15, 2001 Posted: 2:10 PM EST (1910 GMT) November 15, 2001 Posted: 2:10 PM EST (1910 GMT) By Daniel Sieberg LAS VEGAS, Nevada (CNN) -- One area of technology getting a lot of
attention at Comdex Fall 2001 is biometrics. This is the screening and measurement of any personal physical human feature
that might be used for identification. Airport security needs are an obvious
priority, of course. And dozens of companies specializing in biometrics are on
the massive Comdex showroom floor this year to show off what they're
researching, developing, testing, calibrating and selling. Facial recognition, fingerprinting, iris scanning and reading the features of
a hand are leading the industry's efforts at this point, but the intent -- and
possibility -- is to measure any unique trait on the body that can then be
recorded and act as a password or identifier Will these techniques invade personal privacy? Can they help make airports
and other places safer? Analysts say it largely depends on whether people are more willing to
trade some civil liberties for security since the terrorist attacks of September
11. ________________________________________________________________________________________ The Judas attitude of the Administration is symbolized in an article written
by Bill Clinton's very close friend, Deputy Secretary of State Strobe Talbott,
titled: "The Birth of the Global Nation." Talbott strongly attacked
American national sovereignty, stating: "NATIONAL AS WE KNOW IT WILL BE
OBSOLETE: ALL STATES WILL RECOGNIZE A SINGLE, GLOBAL" (666)
"AUTHORITY," (7\20/92 Time Magazine). ________________________________________________________________________________________ A number of citizens have already been illegally detained. The 10\14\94
WASHINGTON TIMES reported that U.S. Marines in California had to fill out a
"Combat Arms Survey" that asked 39 questions about attitude to
determine if AMERICAN MARINES WERE WILLING TO SERVE THE NEW WORLD ORDER TRAITORS
AND FIGHT AGAINST THEIR OWN FELLOW CITIZENS. Marines were asked to give their
attitudes on the treason statement: "I am a United Nations fighting person.
I serve in the forces which maintain world peace and EVERY Nation's way of life.
I am prepared to give my life in their service." The last item on the
survey asked the Marines' attitude about the statement: "I WOULD FIRE UPON
U.S. CITIZENS, WHO REFUSED OR RESIST CONFISCATION OF FIREARMS BANNED BY THE U.S.
GOVERNMENT." ________________________________________________________________________________________ Now why do you suppose God will Bless
America? Oh, but don't worry you will be mystically "Raptured" in that
secret coming of Jesus won't you? Driver's licenses could contain personal information on motorists, such as
fingerprints or retinal scans, under a proposal submitted yesterday by the
state's Motor Vehicle Administrator.
Licenses are "the de facto national I.D. card," Motor Vehicle
Administrator Anne Ferro said. "This would reduce fraud and ensure the
integrity of licenses after they are issued." legislation for the
2002 General Assembly session. UCC Rossettanet's symbology Will this be your UPC Bar Code 666 number universal with your
very own assigned international ID number? Does this bother you? See the very same markings now coming up
in US Treasury Bills below Are we all so stupidly blind
with this Hollywood drummed up Dime-Store Patriotism that we cannot seem to
understand that the U.K and much of the rest of the world are using New York's
so-called acts of bin Laden, terrorism to establish the Mark system of the
coming cosmic-christ, Moshiach who will become the King of the Jews? LONDON, England (IDG) -- Imagis Technologies Inc. and Serco Group PLC are
working with the UK's National Crime Squad (NCS) to develop a facial-recognition
application for use in crime fighting. The squad is working on a national database based on Imagis ID-2000
facial-recognition technology to use as a tool for keeping track of convicted
pedophiles and other criminals, Imagis announced at the Biometrics 2001
Conference here on Thursday. "We are working with both Imagis and Serco on the technology," an
NCS spokesman confirmed. UK-based Serco is a management and consulting company that has
been providing IT support to the U.K. government and the NCS, a government
agency, for a number of years. The Canadian Imagis Technologies is a developer
of image-identification software with a focus on biometric facial recognition,
according to the company's Web site. Of course their logo is the
Illuminated cosmic Light with the three slashes of the Luciferic Trinity symbol Financial terms of the deal were not disclosed. The Imagis' ID-2000 was picked for further development by the UK government
for its ability to identify an individual within very large databases of images
in seconds, its ability to search for common background scenes as well as faces,
its use imagery from any source, including live video as well as digital and
analog photos and the security built into the program that allows for the secure
transmission of data even from remote databases, Imagis said in a statement that
was vetted and approved by the NCS. The software will aid law-enforcement agencies in identifying victims and
perpetrators as well as background imagery for criminal investigation and case
preparation, Imagis said. Already being used by the NCS, the
facial-recognition technology is playing a part in the ongoing investigation
into an online pedophile group which on Wednesday led to the arrest of 130
people worldwide, 10 in the UK, Imagis said. The software is also being looked into as a tool for
the fight against international terrorism, an NCS spokesman said. If you believe that, I've got some
ocean front property in Afghanistan In October, a U.S. Senate subcommittee began looking into the possible future
use of cutting-edge devices such as facial-recognition monitors and retinal
scanners as a way to combat terrorism
following the attacks in New York and Washington D.C. on September 11. The Imagis ID-2000 facial-recognition technology is also currently being used
by the Oakland Police Department (OPD), in
Oakland, California throughout Alameda County, including the Oakland
International Airport, the OPD and Imagis announced in October. ____________________ Goodmorning computer. Gooooooood morning Mr. X. Computer I need you to get throught to NSA immediately, lock
into security system 2X-2L Mr. X, you must first do a retina scanning, you know that,
silly. Oh, sorry computer! Is this science fiction or will this
be the system in which you will not be able to buy or sale? Will you purchase
food? Will you pay tax on your property? Will you feed your children? Will you
have electricity and water services? Will you accept it? Have you already been
deceived by everything mentioned in this entire web-site? Will you stand firm and give
testimony and witness for the real Jesus? Will the real Satan please stand-up? But of course this company which
sports the Mark, knows that this Illuminated coming Moshiach's system is ready
and waiting for him This company, of course sports the
coming falsechrist logo, but am I surprised any more? Like the Apostle Paul, I know I
prosper in the name of my Lord Jesus Christ the son of God in Heaven the Most
High God. All the world will hate me because of my Lord's name. Keyware - Internet Solutions Group Europe, Excelsiorlaan
32-34, B-1930 Zaventem, Belgium Until recently, computer security systems relied on what the user knew
(password or PIN) to identify him/herself or what they had (a token or smart
card). Lately, biometrics has added another dimension to the authentication
puzzle by offering the choice of who the user is (fingerprints, voice, face,
etc.). According to industry analyst firm, Frost & Sullivan, the market for
authentication technologies, including biometrics, will reach $2.6 billion by
2006. In a response to this ever-growing variety of authentication methods,
Keyware has created the Centralized Authentication Server (CAS), which allows
organizations to manage all their authentication methods (PKI, biometrics, smart
cards, PINs, passwords, etc.) from one server. CAS also allows organizations to
manage security in a variety of areas from the network to the call center to
building entry. With CAS, any authentication method can be deployed at any point
of security. _____________ Have you got caught up in the Casino
schemes? Enhance the integrity of your existing surveillance
equipment with our state-of-the-art biometric facial recognition technology.
Casino-ID will capture, store and match surveillance photography quickly and
easily. Catalog intelligence data to identify suspects and potential risks
protecting your staff, clients and property. Casino-ID is an advanced software application for tracking incident-based
information and photography including suspect's MO, behaviors, characteristics
and activities such as card counting, slugs, capping and more. _________________________ When the Iluuminated Angels system is
in place, have you found an area to hide? Uh Oh, not so fast! Don't get caught Trespassing. Trespass-ID is a biometric software application designed specifically for
security professionals who need a better way to identify and track
undesirables, their associates and specific behaviors, before
they commit crimes and do damage. Digital images are taken from the
security room and compared to a local and centralized repository of known
offender images for positive identification and apprehension. ___________________________ Radian has great uses for its Biometrics surveilances for the
future. One of its best products will be, Oh no don't tell me Yes Isis - Semiramis-Like in Queen of
Heaven Isis, the wife of Osiris Ra ___________________ And another who will have your number
and "His" 666 And "He" will have his eye
on you And the Germans are ready for the
cosmic-eye too? ________________________ December 13, 2001 Posted: 10:11 AM EST (1511 GMT) December 13, 2001 Posted: 10:11 AM EST (1511 GMT)
SAN FRANCISCO, California (Reuters) -- An FBI spokesman confirmed
Wednesday that the United States government is working on a controversial
Internet spying technology, code-named "Magic Lantern," which could be
used to eavesdrop on computer communications by suspected criminals. (Christians- any who oppose-any who
know the truth?) "It is a workbench project" that has not yet been deployed, said
FBI spokesman Paul Bresson. "We can't discuss it because it's under
development." The FBI has already acknowledged that it
uses software that records keystrokes typed into a computer to obtain passwords
that can be used to read encrypted e-mail and
other documents as part of criminal (Christian)
investigations. Magic Lantern reportedly would allow the agency to plant the a
Trojan horse keystroke logger on a target's
PC by sending a computer virus over the Internet,
rather than require physical access to the computer as is now the case. Should be indicted for criminal
hacking Malicious hackers have been known to use e-mail or other
remote methods for installing spying technology, security experts said. Oh, But the Government is not
malicious? When word of Magic Lantern leaked out in published reports in November, civil
libertarians said the program could easily be abused by overzealous law
enforcement agencies. Already has been abused When asked if Magic Lantern would require a court order for
the FBI to use it, as existing keystroke logger technology does, Bresson said:
"Like all technology projects or tools deployed by the FBI it would be used
pursuant to the appropriate legal process." You are guilty until proven innocent Major antivirus vendors this week said they would not
voluntarily cooperate with the FBI and said their products would continue to be
updated to detect and prevent viruses, regardless of their origin, unless there
was a legal order otherwise. Bravo! Doing so would anger customers and alienate non-U.S. customers and
governments, they said, adding that there had been no requests by the FBI to
ignore any viruses. The FBI set a precedent in a similar case by asking Internet service
providers to install technology in their networks that allows officials to
secretly read e-mails of criminal investigation targets. While the FBI requires a court order to install its technology, formerly
called "Carnivore," some service providers reportedly comply
voluntarily, while court orders are relatively easy to
get, civil libertarians argue. Remember Basement Court, secret
Judges set up just to give court orders? Given the hijacking attacks of September 11, it is also conceivable that the
U.S. government would enlist the aid of private companies to combat terrorism
and help its war effort, said Michael Erbschloe, vice president of research at
Computer Economics, which analyzes the impact of viruses. "In previous wars, including World War II, the government had the power
to call on companies to help; to commandeer the
technology," said Erbschloe, author of "Information
Warfare: How to Survive Cyber Attacks." The people are to dumb to see
themselves being herded into a despotic rule? "If we were at war, the government would be able to require technology
companies to cooperate, I believe, in a number of ways, including getting
backdoor access to information and computer systems." We are not at war, you said it
yourself! ___________________________________ and what about? This seems to be an
ocultic date, hopefully someday soon I will pen it down or Button it up
The National ID Card That Isn't, Yet JIM McKNIGHT/AP A driver's license bar code reading
device that reveals the age of the owner Tuesday, Jan.
08, 2002 So it's more of a national ID system, a linking of Departments of
Motor Vehicles — and the records they keep on you — across state lines, with
some extra on-card security measures thrown in. For terrorists on the run (and
other criminals, too, but nobody worries about them any more) the plan means
that a state trooper in California would be able to pull the records of a driver
from Georgia — and be certain that those records were the driver's, and not an
innocent lookalike he stole the card from.
For the rest of us, this wouldn't be so different than what's already in
place. The standardized databases would save the California state trooper a
phone call to Atlanta; he'd be able to run a nationwide check from his car. And
the smarter cards, "hardened" with biometric data, would make identity
theft much trickier, at least in person. (Georgia, incidentally, already uses
thumbprints on its drivers' licenses.)
The plan, Congress hopes, will be cheaper and easier to implement, and less
likely to incur the talk-show ire of civil libertarians and states' rights
purists (the same type who squawked in 1908 when the FBI was born). But the
approach is mere stealth — 50 different state ID cards all linked together is
pretty much the same as one national ID card, just as all those new quarters are
still worth 25 cents each, no matter which state is on the back.
Big Brotherly love?
For some, the real problem with smarter, more centralized ID cards is that
they give bureaucrats a better chance to screw up more of your life when you
accidentally get put into the Big Computer as, say, a serial flasher. For
others, it's that the federal government can punch a few keys and trace your
steps. But they can do that already. (Remember when Ken Starr subpoenaed the
list of books Monica Lewinsky bought at a D.C. bookstore with an ordinary credit
card?) With a nationalized driver's license/ID card — whether it says
"New York State" or "United States" — it'll just be
easier.
The great leap forward from a longer arm for the law to "1984" will
have to be made by the private sector. How well a watchful federal government
will actually be able to track its citizens will depend on how many places
demand to see your driver's license. Airports already do. So do some
supermarkets, if you're buying beer. But what about malls? Movie theaters?
Sports stadiums? Banks and their ATMs? If all the places you go demand a swipe
to weed out terrorists — and are willing to pay for the technology to do the
swiping — then yes, Big Brother could know where you go and what you do while
you're there.
Of course, that could make life easier for you too. What if your
state/national ID card was your passport as well as your drivers' license? What
if you could do your taxes at an ATM — and then withdraw your refund? Or what
if your national ID card was your ATM card, and your credit card, and
your HMO card and your work ID and the passkey to your maximum-security
apartment, all at once? There's the freedom to continue to come and go as you
please, in (relative) anonymity, and there's the freedom to carry a dozen
different cards and identifications around with you wherever you go.
The real concern
The national ID-card issue to really fight about may be when and whether
citizens will be required to carry them. The average American driver's license
gets a pretty good workout these days — certainly far more than traffic laws
themselves would seem to warrant — but you can only get arrested for driving
without one. If the U.S. domestic response to terrorism starts to resemble
Zimbabwe's, which passed a law in November making it compulsory to carry ID on
pain of fine or imprisonment, well, that's something to worry about.
But until Congress passes a law like that — and until you can't enter a
movie theater without the usher checking you for priors — there isn't all that
much to get exercised about. Most of the privacy rights — if there really are
such things — vulnerable to a nationalized ID card have already been trampled
under the wheels of increased security, more efficient law enforcement and
better business long ago. Most of them can be regained simply by paying cash —
and keeping your fingerprints off the murder weapon. Time, Just another "One
World Order" Propagandist, giving the go ahead to "Please Show Your
Papers Sir" [Forwarded message]
FROM MOUNTAIN MEDIA EDITORS: A version of this feature first appeared in the October edition
of An Internet press release (how trendy) from the folks
at MasterCard "MasterCard International hosted today an online forum with
thought "Representatives from IBM, Hitachi, British Telecommunications
plc, the "'Five years from now, multi-application smart cards will be
an "Smart cards will deliver increased consumer value and utility
to today's When mentioning those ominous-sounding "loyalty
programs," I should point Of course, the store gets something back in return for that
discount. In The initial commercial applications may be innocent enough --
"Let's save It's all stored in the computer, you know. And how long do you think
Jack, The cheerful little MasterCard press release doesn't take long to
broach "The panel also addressed the use of smart cards for
identification # # #
The process of accustoming Americans to carrying around cards which
can be There's an old folk warning that if you throw a frog in boiling
water he Likewise, some mighty high-powered public relations types are
figuring The goal? To cook the frog, without any ruckus.
Convenience, convenience, convenience, was the happy spin Time
magazine "Your ID cards. PRESENT: You lug various bits of your legal
identity. Get that? If you don't want the government tax man to see your bank Also note that "could" ... as though we'll still have any
choice.
But why worry? Digital cash will be great, argues Joshua Cooper
Ramo in "Think about the $2,000 check you send to your daughter at
college for "Your daughter can store the money any way she wants -- on her
laptop, on Ha ha. Kind of cute, isn't it? But look again. Isn't the underlying
theme If the purpose of government retirement insurance is to make sure
old For that matter, what if your boss started earmarking parts of your # # #
Donald S. McAlvany, editor of the economic and geopolitical
newsletter "The global socialists who dominate America and most of the
governments Citing George Orwell's classic novel "1984," Mr. McAlvany
reminds us: "But the greatest privacy-destroying system of all, one which
would have Since one of the main problems banks may have during the
anticipated "Remember that during the financial crisis of the 1930s, when
Franklin # # #
The removal of cash, of course, will be advertised as having many Expect a public relations campaign to expose the "health
hazard" of all Yep, it's all for your health, safety, and convenience. And why
would # # #
A full transcript of the "smart card online forum" session
referred to at Subscriptions to The McAlvany Intelligence Advisor ("in no way
involved in Vin Suprynowicz is the assistant editorial page editor of the Las Vegas ***
Vin Suprynowicz, vin@lvrj.com
Education rears disciples, imitators, and routinists, not pioneers of The most difficult struggle of all is the one within ourselves. Let us not * * * "A great industrial Nation is
controlled by its system of credit. Our system of credit is concentrated. The
growth of the Nation and all our activities are in the hands of a few men. We
have come to be one of the worst ruled, one of the most completely controlled
and dominated Governments in the world-no longer a Government of free opinion,
no longer a Government by conviction and vote of the majority, but a Government
by the opinion and duress of small groups of dominant men." "I have
been deceived." "I have betrayed my country." October 31, 2001 Posted: 3:45 PM EST (2045 GMT) October 31, 2001 Posted: 3:45 PM EST (2045 GMT) From Steve Young NEW YORK (CNN) -- National identification cards have long been
considered an abridgment of freedom in the United States. But public support may
be building for them since the September 11 terrorist attacks. Some 70 percent of the U.S. public supported a system of national ID cards,
saying they might help prevent terrorist acts, in a Pew Research Center for the
People & the Press survey of 1,200 adults in late September soon after the
attacks. The issue has convinced some liberals to support the idea, including famous
lawyer and author Alan Dershowitz. "A limited national ID card, which would have the name, the address, the
Social Security number, the photograph and a print fingerprint or retinal print,
matchable to a computer chip, would simply make identity theft impossible. It
would eliminate the need for any kind of racial or ethnic profiling," said
Dershowitz, a Harvard law professor. But one well-known libertarian think tank, Washington's Cato Institute, does
not support the concept. "The national ID card system is really sort of the ultimate dragnet
device," said Tim Lynch, the institute's director of criminal justice
studies. "It would require over 250 million Americans to surrender some of
their privacy, some of their freedom for a system that I do not think will stop
the terrorists from committing acts of violence here against the United
States." The program would not work, Lynch said, because terrorists could bribe card
issuers and card inspectors, or they could recruit young people with spotless
records. Such drawbacks have not stopped a host of European countries, including
Germany, France and Spain, from adopting ID systems. In the United States, a massive database would be required for such a system.
One computer program company said it would give the software to the government
for free. "We have to give them the tools, databases, cards and the latitude to
protect us, and if we do, our liberties and our lives will be saved
together," said Larry Ellison, chief executive officer of the
California-based Oracle Corp. Advocates said it would be important to guard against too much information
being required or shared. Critics said they predict ID cards would be required
at airports first and then additional places in what they call "function
creep." ____________ From www.bibleplus.org It's a well known fact that when a dictator takes over nation,
profiling of a nation's citizens are done. This is done to determine who
are opposed to going along with the new dictator or his philosophies.
Then, those opposed to the regime are systematically tracked down and imprisoned
or "exterminated". This took place within our century by Adolph Hitler in
Germany, as well as Stalin in Russia. Pol Pot's regime attempted to
exterminate all intellectuals, trying to return to an agrarian society of slaves
to the leaders. The Germans maintained accurate lists of those they wanted
to destroy and when laws were passed "outlawing" Jews, Christians and
varous "undesireables", the roundup quickly began. There is a relentless movement afoot at the moment to
identify, categorize and profile the people of the world. Much of this
effort stems from "financial" and government entities. The
various forms this can take include: Recent proposed regulations provides a more active framework where your
finances can be siezed upon suspicion rather than due process of law: Financial
Profiling Makes Your Bank a Snoop Let's review these for those not familiar with them. Remember that once a government issues you a card or ID, it
has the right to stop you at any time to verify the contents of that card or ID. National Health ID
Card - Hillary Clinton and
Company first proposed a National ID Card scheme to insure that everyone
could have access to medical care. Wisely the legislators voted this
down as it would be far to expensive. Privacy issues were raised as
well. Legislation aside, a trial was rolled out in three cities, Bismarck,
North Dakota; Cheyenne, Wyoming; and Reno, Nevada. For
more details, click here. The Driver's
License/ID Card concept is commonly used in much of the rest of the
world. Recently an effort by the National Traffice and Safety
Administration to implement a such new card was inundated by feedback from
concerned citizens, causing Congress to defund that portion of its budget.
However, as with the Heatlh ID Card, efforts will continue to move forward with
this card. Click
here for more details. Retinal Scans -
The Retina of the Eye contains many unique features to an individual, similar to
a fingerprint. Work is being done to identify users at points of
transaction such as an ATM or grocery store check out stand via retinal scans. Facial Feature Scans -
Systems are now being installed and given a trial run at computers being able to
pick out a face belonging to a "wanted criminal" from a crowd of
people. Useful for identifying people as they pass through a doorway, they
commonly look at the features directly surrounding the eyes as being the most
consistent. Click
here for more details. Fingerprint Scans - These
are becoming more prevalent as security measures for companies and areas where
security is desired. In some IRS offices, a person cannot enter
without first giving up his or her thumbprint as an ID. That ID is then
compared vs. a national database. The use of a fingerprint, generally a
thumbprint on Driver's Licenses and other forms of ID is rapidly growing.
Naturally, it is the hope of regulators to have thumbprints of all its citizens
in a national database for law enforcement usage. In many banks, if you
are not a customer, you cannot cash a check without giving up your thumbprint.
Refusing to give a thumbprint may be grounds for a bank to refuse to cash a
check and call the police, even if you have provided other ID such as a driver's
license. Invisible Bar Codes - Bar
codes of this nature have been used for years to identify fingerling salmon and
other fish. In short, a quick burst of laser light tatoos a bar code
onto the surface of the item or person to be identified. Invisible under
normal lighting, the bar code is easily read by scanners. On Oct. 18, 1998
while this author was teaching a class on the mark of the beast, a student
related that a friend who worked at a grocery store had served a customer
several weeks earlier who after she gave him the total, ran his hand over the
scanner, entering his identification information and completing the transaction.
He smiled and said it was "experimental". An Implanted ID Chip -
While unfamiliar to many, the ID Chip has been used for several years for
animals, especially dog and cats. Usage of chips in people for tracking
purposes and potentially for financial purposes is going through experimental
and developmental phases. In New York City in October 2000
at an invitation-only event, a diminutive, high-tech microchip device will be
available commercially. The tiny mechanism slightly smaller than a dime could be
implanted under the skin. It is actually a transmitter powered by the host’s
muscle and can be followed by global positioning satellites. Click
here to learn more. Financial
Profiling Makes Your Bank a Snoop - Ominously for privacy and
freedom advocates, recently (~ December 8, 1998) the Federal Reserve Board
(FRB), the Federal Depositors Insurance Corporation (FDIC) and the Office of
Comptroller of Currency (OCC), published similar but slightly different notices
of proposed rule-making, requiring banks to profile their customers. Each
customer would be profiled electronically and then transactions that would be
deemed out of the ordinary would be flagged for further investigation.
Errant accounts could be frozen or seized until innocence was proven. The
public outcry has been loud on this one (over 6500 e-mails to the FDIC alone the
first week), but the attitude of the Federal Reserve Board has been to downplay
public opposition. It should be noted that the Federal Reserve Bank
(governed by the FRB) is NOT a Federal entity, but rather owned by a number of
banking conglomerates. Click
here to learn more. ___________________ Detainee? Miriam Webster One entry found for detainee.
Main Entry: de·tain·ee January 11, 2002 Posted: 11:34 a.m. EST (1634 GMT) January 11, 2002 Posted: 11:34 a.m. EST (1634 GMT)
(CNN) -- The first group of detainees are expected to arrive Friday at the
U.S. naval base in Guantanamo Bay, Cuba. Security was tight at the base as troops awaited the 20 detainees' arrival.
On Thursday, the detainees - sedated, hooded and
chained to their seats - were flown out of Afghanistan aboard a C-17
transport plane. They were flown to an undisclosed location and then transferred
to a C-141 transport for the flight to Cuba. Sedated? Hooded? When will the Bush Iron
Triangle sedate and hood the domestic political opposition? The sedated, hooded and chained "detainees" are to be held at a
makeshift prison at Guantanamo while U.S. officials determine what to do with
them. The humanitarian group Amnesty International issued a statement Thursday
afternoon objecting to the heavy restraints used on the prisoners during the
flight. All the detainees are being treated as if they were prisoners of war,
although the Pentagon has not declared them as POWs under the Geneva Convention.
Some of the prisoners taken to Guantanamo likely will face a military tribunal,
a prospect that has generated criticism from civil rights advocates. The detainees were chained to their seats for the 8,000-mile
trip and even barred from using the toilets, with special provisions being made
so they would not have to get up. They were shaved from head to toe for hygiene
considerations Like animals, Oh but.....God
bless Amerika! The Guantanamo base can currently house 100 prisoners but soon will
accommodate 2,000. Former U.S. Attorney Kendall Coffey said federal courts have ruled that
anyone held at Guantanamo has no constitutional rights, such as the right to
legal counsel and others given to criminal defendants. That correct folks, God Bless
Amerika, they can be DETAINED, sedated, hooded, shackled, inhumanely kept from
toilets, shaved from head to toe, held on a communist island with Communist/US
cooperation But they have no constitutional
rights. ``Neither slavery nor involuntary servitude, except as a
punishment for crime whereof the party shall have been duly convicted, shall
exist within the United States, or any place subject to their jurisdiction.'' WASHINGTON,
Feb. 26 — WASHINGTON — A company plans to begin
selling a computer ID chip that can be embedded beneath people's skin, now that
the Food and Drug Administration has said it will not regulate the implant as
long as it contains no medical data. Applied Digital Solutions Inc. designed the VeriChip —
about the size of a grain of rice — to hold information that could be read
with special electronic scanners. The company has touted the chip as a potential
way to hold a person's medical records or security codes. Applied Digital had heical device chief, Dr. David Feigal,
who made clear that the agency could step in at that point. If someone is unconscious in an emergency room and
implanted medical records are outdated, that could be more dangerous than if
doctors had no information, he said. Feigal urged companies considering such
health-related implants to consult with the FDA. For now, the VeriChip will bear only an identification
number, said David Hughes of Technology Sourcing International, a consulting
firm helping Applied Digital in its discussions with the FDA. But that ID code
could be cross-referenced with a database to detail any kind of information. The company said production would begin immediately. VeriChip emits a radio signal and has been derided by some
for its "Big Brother" implications. Applied Digital has said it could
prove invaluable in emergency situations when someone is either unconscious or
cannot otherwise give information. VeriChip is expected to sell for about $200. A scanner used
to read information contained in the chip would cost between $1,000 and $3,000.
A doctor would insert the chip with a large needle-like device. ___________________
PALM BEACH, Florida - The Food and Drug Administration has cleared the
way for Applied Digital Solutions Inc. to begin selling an implantable chip that
would contain personal identification and medical data, the company said
Thursday.
VeriChip, a small device about the size of a grain of rice, emits a radio
signal and has been derided by some for its "Big Brother"
implications. Applied Digital has said it could prove invaluable in emergency
situations when a patient is either unconscious or can't otherwise reveal
information. VeriChip is expected to sell for about dlrs 200. A scanner used to read
information contained in the chip would cost between dlrs 1,000 and dlrs 3,000.
____________________________________________________________________________________ Family Gets Computer Chips Implanted for
Medical Information
FNC
Friday, May 10, 2002 BOCA RATON, Fla. — A Florida family on
Friday became the first to be implanted with computer chips that researchers
hope will someday become an easy way to provide emergency room staffers with
patients' medical information. Jeff and Leslie Jacobs, along with their 14-year-old son,
Derek, had the tiny chips implanted in their arms. Each chip is about the size
of a grain of rice, and insertion takes about a minute under local anesthesia. The chips, called the VeriChip, were designed by Palm
Beach-based Applied Digital Solutions Inc. They are similar to chips implanted
in pets to identify them if they are lost. The family wanted the implants in case of future medical
emergencies. "We're doing this as a security for us, because we've
worked so hard to save my husband's life," said Leslie Jacobs, 46. Her 48-year-old husband has suffered through cancer, a car
crash, a degenerative spinal condition, chronic eye disease and abdominal
operations. His injuries have forced him to quit his dental practice. "It's been really easy and I feel a lot better that I
have it," he said after the implant. The chips used by the Jacobs family contain only telephone
numbers and information about previous medications. The data can be read by a
hand-held computer and printed out. The Food and Drug Administration said in April that it
would not regulate the implant as long as it contains no medical data. Company
officials said they were free to proceed because the implant contains
identification numbers that correspond to personal medical information in a
separate database. The FDA did not consider the implant to be a medical
device, company officials said. An FDA spokeswoman in Miami did not immediately
return a phone call. The FDA had said regulation would be needed if medical
records were stored to guard against storage of outdated records. Company officials hope to eventually include more extensive
information. The company says it would be particularly valuable for those who
suffer from Alzheimer's disease or others with difficulty providing medical
information on their own. VeriChip is expected to sell for about $200. A scanner used
to read information contained in the chip would cost between $1,000 and $3,000. The chip, which could also be used as a security tool, has
stirred debate over its potential use as a "Big Brother" device to
track people or invade the privacy of their homes or workplaces. Jacobs and his family brush aside those arguments. Anyone
can be tracked through the Internet and e-mail, credit cards and cellular
phones, they say. ___________________________________________________________________________________ A
closed-circuit television camera monitors a pedestrian crosswalk in Tampa where
police use face-recognition software called FaceIt to compare images of visitors
to a mug-shot data base of criminals and suspects. Jan.
3 -- The Mayo Clinic and Honeywell Laboratories have developed a lie detector
based on facial thermal imaging technology. FBI
confirms ‘Magic Lantern’ exists Spokesman
says program being developed but not yet in use MSNBC
STAFF AND WIRE REPORTS ____________________ British News All a child had to do to borrow Topsy & Tim for the week was flick
a thumb through an unobtrusive fingerprint scanner, so sensitive it could even
recognise a pattern from under layers of sticky chocolate.
There was only one snag: in many cases, parents were not told that schools
were storing their children’s fingerprints.
Parental outrage followed and, by last night, the school thumb-scanner being
used by 1,000 British primary schools was being internationally condemned as a
blatant breach of children’s human rights.
The trouble began when the mother of an 11-year-old attending the Sacred
Heart Roman Catholic School in Ruislip, West London, discovered that her son had
been fingerprinted without her consent.
Furious, the woman, who refused to be named, contacted civil liberties groups
such as Privacy International and a child’s advocacy group, Action on Rights
for Children in Education (Arch).
Privacy International called for the banning of the library-management
software, sold by a Stockport company called Micro Librarian Systems. “This is
unethical and disproportionate,” Simon Davies, Privacy International’s
director, said.
The assistant information commissioner Phil Boyd said that there had been no
breaches of the Data Protection Act, as the thumbprints were reduced to a
numerical code. ___________________________________________________________________________________ Under the plan, all telecommunications firms, including mobile phone
operators and internet service providers, will have to keep the numbers and
addresses of calls and emails sent and received by EU citizens. The information,
known as traffic data, would be held in central computer systems and made
available to all EU governments.
The move could lead to a further extension in the powers of European security
and intelligence agencies, allowing them to see the contents of emails and
intercepted calls and faxes, civil liberty groups fear.
The plan, drafted in Brussels, has been leaked to Statewatch, an independent
group monitoring threats to privacy and civil liberties in the EU.
"The traffic data of the whole population of the EU - and the countries
joining - is to be held on record. It is a move from targeted to potentially
universal surveillance," Tony Bunyan, Statewatch editor, warned yesterday.
"EU governments claimed that changes to the 1997 privacy directive would
not be binding on member states - each national parliament would have to decide.
Now we know that all along they were intending to make it compulsory across
Europe."
Although the move was initially explained by the need to fight terrorism, EU
officials now argue it is necessary to fight all serious crime, including
paedophilia and racism.
A "draft framework decision" for the European council states that
it is essential for all member states to apply the same rules. It said that the
purpose was to harmonise the retention of traffic data to allow criminal
investigation.
The decision is a victory for the UK which, encouraged by Washington, has
been pushing for a compulsory EU-wide data retention regime.
But civil liberties campaigners claim that compelling communications
companies to retain the records of all their customers for long periods amounts
to blanket surveillance on the entire EU population and will lead to law
enforcement agencies conducting "fishing expeditions" against innocent
citizens.
The EU admits the plan involves an invasion of privacy but says the periods
for which it must be retained - a minimum of 12 months and a maximum of 24
months - is "not disproportionate".
The data would include information identifying the source, destination, and
time of a communication, as well as the personal details of the subscriber to
any "communication device".
For law enforcement agencies to access the data, the draft EU decision gives
a minimum list of offences, including "participation in a criminal
organisation, terrorism, trafficking in human beings, sexual exploitation of
children", drug trafficking, money-laundering, fraud, racism, hijacking and
"motor vehicle crime".
It states that the "confidentiality and integrity" of retained
traffic data must be "ensured" but does not say how. Individuals have
no right to check whether the information held about their personal
communications is accurate or legally challenge decisions about its use by EU
authorities.
A member state will not be able to refuse a request for information from
another member state on human rights or privacy grounds. There is also no common
EU list of crimes caught by the plan or of public agencies which could demand
the information.
But there is one element in the EU plan that the Britain will not welcome. It
says that personal data could be handed to security services and law enforcement
authorities only with judicial approval.
In Britain, the regulation of investigatory powers act allows law enforcement
and intelligence agencies to access personal communications data covering a wide
range of purposes, including public health and tax collection, without any court
or executive warrant.
In June, the Guardian revealed plans to extend the powers to access data to
all local councils, seven ministries and 11 quangos. David Blunkett, the home
secretary, bowing to intense public and political pressure, admitted the
government had "blundered" into the issue and that further
consultation was needed.
But the legality of the entire data retention framework in this country has
been cast into doubt. The information commissioner, Elizabeth France, has warned
the Home Office that the new powers could be illegal because another law - the
Anti-Terrorism Act rushed through parliament after the September 11 attacks -
allows such data to be retained and accessed only on national security grounds.
According to legal advice from an eminent QC, this would be illegal under human
rights law. ________________________________________________________________________________________________ Why the News Media's shark frenzy on
child abductions, all of a sudden.....Oracle chief's proposal raises constitutional, feasibility issues
Pronunciation: 'or-&-k&l, 'är-
Function: noun
Etymology: Middle English, from Middle French, from Latin oraculum, from orare
to speak
Date: 15th century
1 a : a person (as a priestess of ancient Greece) through whom a
deity is believed to speak b : a shrine in which a deity reveals hidden
knowledge or the divine purpose through such a person c :
an answer or decision given by an oracle
2 a : a person giving wise or authoritative decisions or opinions b
: an authoritative or wise expression or answer
Support grows for Ellison's national ID card proposal

Governor Tom Ridge. It should be noted that Ridge himself got in trouble a few
years ago for praising the efficiency of the Third Reich's civilian
administration. Ridge also spoke highly of Mussolini's ability to keep the
Italian trains running on time. Now Ridge will be the guy running the Office of
Homeland Security.

Although it hasn't been made public yet, there is a proposal being prepared.
The Bush administration, however is playing it smart. They're being cautious by
whipping up public support first. Later they will announce some of the more
sinister activities of this agency.
three divisions. One will be a plain-clothes division similar to the FBI, which
will be called the State Security Division (SSD). Ironically SSD is the same
acronym as the former East German Secret Police.

uniformed division, which currently remains nameless. It will act as a defacto
State Political Police.
be modeled on existing state trooper uniforms - except done in black.
reminiscent of 20th century era German/Fascist and Russian/Communist secret
police agencies. In America, 'Homeland' is a neuter word. In German, however,
the word is translated as 'Vaterland' (Fatherland), while in Russian, the word
is 'Rodina' (Motherland). In both cases, these words can be translated into the
English neuter word -- 'homeland.'
There is no precedent for the use of this word 'homeland' in the United States
Government.
be able to act under suspension of habeus corpus and under suspension of the
right against self- incrimination, the Fifth Amendment privilege, and also the
Fourth Amendment privilege.
that will most likely be called 'Homeland Security Law.' Nobody knows what it
will be called yet. But this is obviously what they're doing. Anyone, who knows
the Bushes for what they are, can see that this will be the groundwork for a
new, more powerful, more sinister agency, wherein all sorts of covert activity,
illegal and not, will be extant.
the foundation for a whole new separate body of law that will be parallel to,
but above, the National Security Acts.
agency, not even under the Department of Justice. It will be the most senior
agency in the Cabinet. It will probably fall somewhere between the Department
of State and the Department of Defense, or somewhere between Treasury and
Defense. In terms of authority, it will be called a 'Super Agency,' which
implies it will not be under anyone. It will act as a coordinating agency, but
will be above the FBI, CIA, NSA, and DIA. This will, of course, create a whole
new set of turf war battles. But no agency head -- in this post-WTC
environment -- will dare say anything against it because they'd lose their job.

and have digitized red lettering that says State Security, dark tinted windows,
and numerous aerials and dishes with a big searchlight on the front. Bell
Helicopters is supposed to get the new contract to produce this new super-
surveillance helicopter. Supposedly they'll have the most sophisticated
surveillance electronics ever made. This equipment will include gear that
people don't even know has been invented yet.HONG KONG POLICE
THESE ARE PART OF 20,000,000 TROOPS TO SOON COME INTO USA TO
"PACIFY" USA
rom: clarence napier

Focusing on biometrics at Comdex
Body of data: Eyeballing security
CNN Sci-Tech
By THE ASSOCIATED PRESS
News that some of the terrorists involved in the Sept. 11 attacks had
fraudulently obtained driver's licenses focused attention on the need to tighten
the licensing system.
The Anti-terrorism Workgroup -- established by Gov. Parris N. Glendening
and legislative leaders -- included driver's licenses among the issues it is
considering as it prepares
Ms. Ferro said biometric technology exists to include a
bar code on licenses that could identify drivers by fingerprint,
scans of the iris or retina, facial characteristics and signatures.



"Maryland doesn't have any authority that would allow us to use
biometrics. We should have it," she told members of the group during a
meeting in Annapolis.
State law now requires that licenses issued to people who are not U.S.
citizens cover the same five-year period as regular licenses. The Motor Vehicle
Administration proposed that licenses of non-citizens expire when their visa or
passports expire, if that is less than five years.
New Jersey already has such a limit, and California and Florida are now
issuing 30-day licenses while their agencies confirm with the Immigration and
Naturalization Service that a person is in the country legally, Ms. Ferro said.
________________________________

![]()
Keyware specializes in biometrics—the technology of measuring an
individual’s unique personal characteristics such as voice, face, and
fingerprints. With its advancements of this core technology, Keyware now
delivers biometric authentication with the highest levels of security,
efficiency, and convenience for today’s environments.






FBI confirms 'Magic Lantern' spy project
Step beyond 'Carnivore'?
The Department of Transportation takes the back door and
starts linking state driver's licenses. Are 50 national ID cards any better than
one? 
It wouldn't be a national ID card — not really. The Department of
Transportation, acting on instructions from Congress, has begun work with states
to develop electronically smarter drivers' licenses that can be checked for
validity across the country, and that have more than just than that always-awful
picture — like a fingerprint or retinal-scan imprint — to match the card to
its holder.
10/11/98
FOR IMMEDIATE RELEASE DATED OCT. 4, 1998
THE LIBERTARIAN, By Vin Suprynowicz
Boiling the frog: Much will depend on the new 'electronic
money'
Las Vegas Magazine.
International, datelined "Purchase, N.Y., July 22, 1998," informs
us:
leaders from global business, government and research organizations to
discuss lifestyle changes that will occur as smart card technology gains
acceptance over the next five years.
U.S. federal government's General Services Administration, The Tower Group
and Emerge Online participated in the roundtable, which was moderated by
Richard Phillimore, Senior Vice President of MasterCard's Chip Card
Business unit.
established technology in the payments business,' Phillimore said. 'As the
benefits of multi-application smart cards are proven in the marketplace,
the conversion from magnetic stripe to chip-based payment cards will be
very rapid. By the year 2010, we expect all of MasterCard's credit and
debit cards and terminals will be chip-based.'
credit cards, Phillimore added. 'Chip technology will enable cardholders to
use their cards for many more purposes, such as electronic ticketing,
loyalty programs, and secure remote shopping -- a true Lifestyle Card that
can be tailored to meet the unique needs and preferences of a single
individual.'"
out, the online MasterCard gang are referring not to government loyalty
oaths of the "am not now and never have been a member of the Communist
Party" variety, but rather a system in which cardholders receive
discounts
for "loyally" shopping through one company -- the system probably
familiar
to most consumers today via those "discount club cards" issued by
your
supermarket, offering you 30 cents off a package of toilet paper if you let
the teller scan your card at the checkout stand.
addition to the obvious hope that you'll keep going back to the store whose
discount card you carry (essentially, a surcharge is being applied to
"hoppers" who show no store loyalty), the management can now easily
track
how many of its outlets you visit, and what you buy there.
postage by only sending coupons for this new brand of breakfast cereal to
the home addresses of our shoppers who already buy the more expensive
competitor." But you don't have to be the kind who walks stooped over to
avoid the black helicopters to foresee the day when the government
inspectors may arrive, asking to see the electronic profiles of all
customers in a given geographic area who have used the fast-spreading cards
to buy anything from home AIDS test kits to hydroponic "grow
lights" to
"High Times" magazine to pistol ammunition.
your friendly local produce manager, is really going to refuse to let the
FBI access his computer without a court order? About as long as it takes
them to ask for his Social Security number and threaten to call their
friends at the IRS, suggesting Jack may be in need of an immediate tax
audit?
the subject of "expanded uses" for the new cards with their
embedded memory
chips:
purposes. Many agreed that identification was the 'killer application' that
would encourage adoption of smart card programs. Kotaro Yamashita, COO of
Financial Services at Hitachi, Ltd. said, 'We see identification
applications issued by governments as being big in many places outside of
Asia, for example Central America.' However, Marty Wagner, Associate
Administrator of the Office of Government wide Policy at the U.S. General
Services Administration (GSA) cautioned that 'National identity card
programs could run into trouble in the U.S. due to privacy concerns.' "
used to buy anything from a candy car to a soda pop to a round-trip airline
ticket to London -- but whose embedded chips will also relay to corporate
and government snoops the social security number and other personal
information (and resultant tax obligations) of anyone making that purchase
-- is well underway.
will quickly jump out. But if you put a frog in a pan of cold water and
raise the temperature ever so slowly, the gradual warming will make the
frog doze happily, triggering the soporific response he instinctively
displays when the sun shines on his lily pad ... In fact, the frog will
eventually cook to death, without ever waking up.
ways to emphasize the convenience of "electronic cash" - and
downplay the
effect it may have in removing any remaining privacy from the way you spend
your pay.
put on a new "single electronic card that may replace everything in your
wallet," in their issue of April 27, 1998. As the magazine was listing
all
the bothersome stuff you now have to lug around - cash, ATM cards, credit
cards, proof of insurance - it made a not-so-subtle swipe at anyone who
would resist the happy consolidation of such burdens:
FUTURE: Non-conspiracists could consolidate pertinent info in one
place."
balance and a record of how many times you've flown to Zurich or the Cayman
Islands, if you don't want the theater manager to see your alimony payments
or your concealed-carry handgun permit, if you don't want your boss to see
your prescription for post-cancer-surgery drugs, if you don't want EVERYONE
to gain a precise accounting of how much you spent last month at
Frederick's of Hollywood, or renting X-rated videos, or shacked up in a
motel room across town, or purchasing alcoholic beverages, or buying
vaginal contraceptive foam (including which brand you prefer), why, you're
just some loony "conspiracist."
the big "Future of Money" piece in the April 27 Time:
expenses. How is that money really spent? Books ... or beer? Electronic
cash takes that relatively simple transaction -- passing an allowance --
and makes it into a much more intelligent process. ...
a debit card, even (in the not too distant future) on a chip implanted
under her skin. And, perhaps best of all, you can program the money to be
spent only in specific ways. You might instruct some of the digits to go
for books, some for food and some for movies. Unless you pass along a few
digits that can be cashed at the local pub, she'll have to find someone
else to buy the drinks."
one of "control"? Try substituting a different scenario for Mr.
Ramo's. How
about: "Think about the $1,000 Social Security check your agency sends a
retiree in Las Vegas. How is that money really spent? Food and lodging ...
or blackjack, roulette, and Margaritas?"
folks have food and a roof over their head, doesn't the government have an
OBLIGATION to "earmark" portions of those checks so they can only
be used
to buy certain things, once the new e-cash technology gives them that
capability? Couldn't we set e-cards to freeze a recipient's account if she
tried to use any of the "money" to pay for a second prescription of
pain
pills written by a doctor other than her ASSIGNED doctor, or to buy a
naughty book about how to evade taxes, or how to move money into offshore
accounts?
electronic paycheck for rent or groceries -- at certain stores that pay for
the consideration -- all "for your own good," you understand? After
all,
the kind of soccer moms who elected Bill Clinton can be counted on to favor
almost (start ital)any(end ital) additional Big Brother controls over those
irresponsible men in their lives, frittering away their paychecks on bar
tabs, dirty magazines, power tools, and fancy chrome doo-dads for their
pickup trucks.
"The McAlvany Intelligence Advisor," is a fellow who has been
looking into
the move toward trackable "electronic cash" for some time. The lead
article
in the July, 1998 edition of his 16-page newsletter is headlined "Toward
a
Cashless Society: Implementing an Electronic Currency in America," and
spells out a very different view of these developing trends from the one
embraced by the jovial publicists at Time:
of the western world today (especially Western Europe) have long had a goal
of moving the world away from the use of cash and into an electronic funds
currency system, wherein virtually all cash in use is 'electronic
currency,' " writes Mr. McAlvany. "If all financial transactions
are forced
through an electronic banking system ... the ultimate 'people control'
system could be established. ..."
"Privacy is a major element of freedom, without which people and nations
cannot remain free. Today, we have dozens of privacy-destroying systems
being put in place by governments all over the world. They include video
camera surveillance in public places; electronic eavesdropping on
computers, phones and faxes; dozens of computerized files on each adult
American - compiled from credit card, banking, and tax records; physical
surveillance of homes, in whole areas via satellite, helicopters, and other
aircraft; the growing use of Social Security numbers to extract all kinds
of information on Americans from business, banking, and government data
cases; photo IDs required at airports; and the push by the Clinton
Administration for a computerized (smart card) national identification card
for all U.S. citizens.
made Big Brother's, Adolf Hitler's, Mao's, Lenin's or Stalin's mouths water
is the elimination of cash and the forcing of all citizens into the
computerized banking system for (start ital)all(end ital) transactions.
Ultimately these transactions can be monitored, recorded, profiled, and
used in 'people control.' If all of your personal transactions can be so
tracked, a socialist government bent on identifying, profiling and
controlling its 'politically incorrect' citizens or 'religious fanatics' or
Bible-believing Christians; gun owners; critics of the government; non-tax
compliers, can easily scrutinize and build a profile on such individuals.
It can also, in the absence of a cash-spending alternative, deny the
privilege to buy and sell to those who are politically or religiously
incorrect."
computer crisis brought about by the turning of the century is clearing
checks written on other banks -- banks whose computers may not agree with
the home bank's "fix" for the transition from year date 99 to year
date 00
-- Mr. McAlvany suggests that crisis might present a perfect opportunity to
effectively require bank customers to change over from paper checks to
"electronic cash."
Roosevelt presented the American people with the alternative of a bank
holiday/gold confiscation/Draconian financial controls (start ital)or(end
ital) financial destruction, they willingly chose the former and gave up a
major portion of their financial freedom."
benefits. Since drug dealers buy and sell their product with suitcases full
of hundred-dollar bills, it will be alleged that the switch will end the
drug trade (as though a multi-billion-dollar industry won't promptly hire
both fancy accountants and computer geniuses to figure out how to "go
electronic" without throwing blips on the IRS radar screens -- or as
though
they won't just add newly "illegal" hundred-dollar bills to the
list of
contraband they now freely move outside official channels.)
those dirty pennies and nickels you have lying around the house. Passed
from hand to hand among AIDS patients and tuberculosis-ridden junkies, how
can you let your children handle such stuff? Instead, buy Sean and Alysson
a new pair of color-coordinated, his-and-hers Kiddie Smart Cards, which
neatly deduct exactly $1.77 from their accounts when they buy lunch at
school, without burdening them down with filthy, wasteful, inconvenient
(and expensive to produce) coins ... coins they might otherwise save up,
after all, to buy dirty magazines, or reefer, or who knows what else?
anyone object ... unless, of course, they had something to (start
ital)hide(end ital). What was your name again? And could I have your
18-digit bank tracking number, please? You (start ital)are(end ital) in
this country legally, aren't you? Not some kind of a federal
fugitive/deadbeat dad? There, that's better. See how easy things are when
you cooperate? Just slide your card through the security/debit slot. Now
pass your wrist over the scanner to make sure your embedded personal chip
has the matching security code. Thank you; you may now move along. We know
you have a choice when you dine out; thank you for patronizing Burger
World.
the beginning of this essay, as well as a biography and smart card white
paper from each chat participant, can be accessed at
http://www.golinharris.com/mastercard.
the tax resistance, militia, or sovereign citizens movements in the
U.S.")
run a substantial $115 per year. Send subscription info to P.O. Box 84904,
Phoenix, Ariz. 85071, or telephone 800-528-0559.
Review-Journal. Readers may contact him via e-mail at vin@lvrj.com. Vin's
twice-weekly newspaper column, "The Libertarian," is syndicated in
the
United States and Canada via Mountain Media Syndications, P.O. Box 4422,
Las Vegas Nev. 89127. Watch for Vin's book, "Send in the Waco
Killers,"
coming from Huntington Press in early 1999.
new ideas and creative geniuses. The schools are not nurseries of
progress and improvement, but conservatories of tradition and unvarying
modes of thought. -- Ludwig von Mises
get accustomed and adjusted to these conditions. The one who adjusts ceases
to discriminate between good and evil. He becomes a slave in body and
soul. Whatever may happen to you, remember always: Don't adjust! Revolt
against the reality! -- Mordechai Anielewicz, Warsaw, 1943
Americans mull national ID cards
CNNfnVarious
Identification Schemes
Ironically, the most common bar codes, known as UPC
symbols and commonly found on most grocery store items, are constructed around a
trio of 6 sets of elements (666). When Colonol Bo Gritz (a U.S.
Presidential contender) was investigating why this was, the developers stated
that they could have used any trio of numbers, but chose the trio of 6.
This conceivably could fulfill part of the prophecy for a mark of 666 on the
hand or forehead (i.e. areas that are not generally covered).
Pronunciation: di-"tA-'nE, "dE-
Function: noun
Date: circa 1928
: a person held in custody especially for political reasons
Afghan detainees expected in Cuba

-The constitution of the United States, amendment 13, ratified 1865-Dec-6

Just a computer chip — about the size of
a grain of rice — that would be difficult to remove and tough to mimic.
Other uses of the technology on the
horizon, from an added device that would allow satellite tracking of an
individual’s every movement to the storage of sensitive data like medical
records, are already attracting interest across the globe for tasks like foiling
kidnappings or assisting paramedics.
Applied Digital Solutions’ new
“VeriChip” is another sign that Sept. 11 has catapulted the science of
security into a realm with uncharted possibilities — and also new fears for
privacy.
“The problem is that you always have to
think about what the device will be used for tomorrow,” said Lee Tien, a
senior attorney for the Electronic Frontier Foundation, a privacy advocacy
group.
“It’s what we call function creep. At
first a device is used for applications we all agree are good, but then it
slowly is used for more than it was intended,” he said.
SEEKING FDA APPROVAL
Applied Digital, based in Palm Beach, Fla.,
says it will soon begin the process of getting Food and Drug Administration
approval for the device, and intends to limit its marketing to companies that
ensure its human use is voluntary.
“The line in the sand that we draw is
that the use of the VeriChip would always be voluntarily,” said Keith Bolton,
chief technology officer and a vice president at Applied Digital. “We would
never provide it to a company that intended to coerce people to use it.”![]()
![]()
![]()
Thu Apr 4, 2:22 PM ET
Applied Digital, Palm Beach, said it had received a letter indicating that the
FDA does not consider the chip a medical device under its jurisdiction.
![]()



Little Brother's fingerprints all over the library
![]()
EU wants data retained to help
fight against crime
Richard Norton-Taylor and
Stuart Millar
Tuesday August 20, 2002
The Guardian
Records of personal communications, including all emails and telephone calls,
will be stored for at least a year under a proposal to be decided by EU
governments next month.
Danielle Duval will have the device implanted in her arm in the next few months, the scientist assisting the plan claimed yesterday. The miniature chip will apparently send a signal via a mobile phone network to a computer, which will be able to pinpoint her location on an electronic map.
The parents, Wendy and Paul Duval from Reading in Berkshire, said they had decided on the step after the abduction and murder of the schoolgirls Holly Wells and Jessica Chapman.
"After the news of Holly and Jessica , we sat down as a family and discussed what we could do," Mrs Duval said. "Like us, Danielle needs to feel that she's safe at all times and could be located in a real emergency. I know nothing is ever 100% or foolproof, but we believe the microchip will go a long way towards protecting her."
Mrs Duval did not accept that the family were panicking or overreacting, saying it was only sensible for a parent to use technology when it was available. "If a car is stolen, it can be fitted with a computer to enable it to be tracked - so why not apply the same principle to finding missing children?" she said.
Yesterday several children's charities said they were unsure about the implant.
A spokesman for Kidscape, the charity aimed at stopping children from being bullied and sexually abused, said: "We do not think this is a good idea. Children should be taught about the possible dangers, rather than having something stuck on them that can maybe track them, and perhaps then only when it is too late."
A spokesman for the NSPCC said: "Parents and guardians must remember child abductions are extremely rare, and that the vast majority of abuse happens within the home."
The designer of the chip, Kevin Warwick of the cybernetics department at Reading University, conceded that some parents might abuse the system or overreact if their children were late home, but maintained that tagging was the correct course of action in the light of recent events.
He said: "The implant won't prevent abductions: nothing will.
"However, if the worst happens, parents will at least be in with a chance of finding their children alive."
He has called for an urgent government debate on the issue, and believes ministers should consider implants for all children.
Professor Warwick said there were a few technological problems to be ironed out, including exactly how to recharge the chip's battery, but he expected Danielle to be fitted with the device, under local anaesthetic by a doctor, in the next few months. "Her parents want me to proceed as quickly as possible, and I wouldn't waste their time if I thought it wasn't capable of working," he said.
Among the technical questions to be addressed is whether the chip should remain dormant in the limb until an emergency arose, or whether it should emit a signal 24 hours a day.
"This is why we need the debate to take place," he said. "In future it may be that only the police have the authority to allow the system to be activated. But, as things stand, parents can have that right themselves."
Danielle, who met the professor with her parents last week, said she had no concerns about being fitted with the chip. "I will feel so much safer knowing that mum and dad could find me in an emergency. The professor said the chip won't hurt, so that's OK."
Mrs Duval, 33, a school catering controller, and her husband, Paul, 34, a driving instructor, want their other daughter, Amy, seven, to undergo the treatment.
"We'll wait until Amy's a bit older, so that she fully understands what's happening," they said.
And you have been lied to once again
And better yet Heil Burning Bush-ka will make certain that his lackeys will so conveniently detain up to two thousand of these human animals in their New concentration camps.
Jeffco stores soon to require fingerprints for all check and credit card purchases
October 02, 2002 - 7:59 AM
JEFFERSON COUNTY - You'll soon have to provide
a fingerprint to go shopping in Jefferson County. Consumers using checks or
credit cards will have to give their prints to merchants.
It's a new tactic aimed at cracking down on identity theft and catching crooks
who use fake IDs. Already, people cashing payroll checks at King Soopers have to
give a fingerprint
The touch pads are easy to use and don't leave residue on your finger. Police
agencies say the policy has resulted in less check fraud. They are now asking
all merchants in the county to require fingerprints.
"The important thing about this to remember is that it doesn't put an
honest customer's fingerprint into a database somewhere,” said Sgt. George
Hinkle. “The only people that are actually going to have their fingerprints
processed are the crooks."
The fingerprints will be kept on file until the transactions clear. If there's a
problem, the prints will be passed along to investigators. The new policy will
take effect throughout Jefferson County in the next few weeks.
________________________
NEW YORK (Reuters Health) - Sales of an identification chip intended to be implanted in a person's body will resume immediately now that the US Food and Drug Administration (FDA) has completed its review of the device, the chip's maker Applied Digital Solutions Inc. announced Tuesday.
The company made headlines this spring after a Florida family became the first ever to be implanted with VeriChip. The device, about the size of a grain of rice, is implanted under the skin and works by emitting a radio frequency that transmits a unique verification number.
The company says the chips could eventually replace medical alert bracelets and cards of the sort that alert emergency medical personnel to conditions such as allergies.
Palm Beach, Florida-based Applied Digital Solutions said it received a letter from the FDA ruling that VeriChip is not a regulated medical device "for security, financial and personal identification/safety applications." The decision clears the way for the company to market and distribute VeriChip for those purposes.
Applied Digital said it voluntarily suspended its marketing of the device in the US 5 months ago pending FDA review.
_______________________
New twist on Big Brother Moshiach ben David in the UK
http://www.met.police.uk/appeals/mayday/mayday2002.htm
The Metropolitan Police are seeking
your help to identify and trace the suspects pictured here.
During the past three years, major anti-capitalist demonstrations have taken
place in Central London on May Day.
A determined minority in these protests have set out to cause major disruption
and commit criminal offences including violent disorder and substantial criminal
damage.
Members of the public and police officers have also been injured in these
disturbances.
Despite extensive inquiries, which have resulted in a number of successful
prosecutions, the Metropolitan Police has still to identify and trace a number
of individuals believed to be involved in committing these offences and is
seeking your help to do so.
Anyone with information about the identity or whereabouts of any of the people
pictured here is asked to call the Public Order Team on 020 7239 7329 or
Crimestoppers on 0800 555111.
__________
1-10-2003
Diversion
`
http://www.afaga.org/GI-5-99.htm
School Vision Screening
Picture of Eye may be used as I.D. - Gives more Information than Retina Scan
The eyes are categorized as sense organs and are specialized parts of the nervous system. As distance receptors, they show us what’s happening at a distance from our bodies. The retina, containing thousands of special cells called rods and cones, is the part of the eye that receives light. There have been rumblings that retina scans* may be used for identification purposes.
While many Georgians have fought vigorously and unsuccessfully to overturn the current requirement for fingerprints on drivers’ licenses, perhaps they have not noticed that the law also allows government to require any other identifying information not listed in the fingerprint law, such as the retina scan and DNA analysis.
Bank United in Texas** has an automatic teller that requires customers to simply look into a specific place on the machine and, eureka, the customer is identified and the machine promptly emits the cash.
But, retina scans aren’t the most comprehensive or the latest method of using eyes for identification purposes. NASA developed a vision screening process that takes a picture of the inner eye by using the state-of-the-art technique of color photorefraction, a spin-off from the Hubbell Telescope technology.
Georgia Connection: 150,000 Students to get New Vision Screening with I.D. capability
The State Board of Education has contracted with Vision Research Corporation in Birmingham, Alabama to use this technology for 150,000 students at a cost of $7.00 each. To pay for it, the legislature appropriated $1,407,729 for 1999 for first and second graders and $591,408 for FY2000. The contract reveals that federal funding covers 50 percent or $525,000 of the $1,050,000. That fact alone reveals the federal interest in photographing student eyes. You may ask, "Why would they do that?"
Consider this . . .
(1) A fingerprint has only 35 identifying factors. The eye has 266. (b) At least one bank is already using the eye as identification for banking transactions. (c) Georgia law allows unlimited requirement for I.D. information on drivers’ licenses. (d) The possibility of a national I.D. card looms closer and closer. (e) A picture of the inner eye is intensely individualistic and may be used for identification purposes.
Who gets the picture of the child’s eye?
The contract requires them to keep records for five years. The only restriction on dissemination of information is that they must comply with federal and state confidentiality requirements or get permission from the state DOE to sell or otherwise disseminate it.
A call to Vision Research revealed that pictures are sent to schools to be kept in each child’s record.
The contract states, "That all reports, graphs, drawings, computer disks, specification, estimates, and other data prepared by the Contractor under the terms of this Agreement shall be delivered to, become and remain the property of the Department [of Education] upon termination or completion of the work."
ALSO, "The Department shall have the right to use the same without restriction or limitation and without compensation to the Contractor other than that provided for in this Agreement. The Contractor shall not have the right to use same for sale or other benefit without express written permission from the Department."
NOTE: (1) The State Department of Education (DOE) receives information obtained by Vision Research.
(2) The DOE has unrestricted use of the information.
(3) The DOE may give Vision Research permission to sell the information.
*Retina scans measure retina and optic nerve topography but this technology uses color photorefraction, a by-product of the Hubbell Telescope technology. This new process gives far more information of the entire eye than retina scans do.
**In reporting the Bank United story in his May 14 radio commentary, Paul Harvey pointed out that the human eye has 266 distinguishable characteristics compared to a fingerprint’s mere 35 identifiable points.
Georgia Insight 3 May 1999
Yes they will have that Identification Data Base whether the United States wants it or not. The Bush-ka Administration may be the last presidency of the Republic of Freedom.
Response from Vision Research Corporation 1-10-2003
Robert --
Thank you for bringing the "Georgia Insight" May 1999 article to our
attention. Please be aware that the insinuations of that article and the
general premise of your email are incorrect, as are various key
"facts" cited there.
People are free to believe what they want, but if you're looking for the truth,
this isn't it.
The program you are referring to has no other purpose than to identify vision
problems that can adversely affect children. It has found tens of
thousands of children with vision problems, and it has made a difference that
will benefit them for a lifetime.
Jim Kennemer
_______________
Response from avoice@mtangel.net
STEP UP TO THE BEAST - LOOK INTO ITS FACE - GET FED
Couldn't be a more direct mind control/pavlovian dog effect on children than
this to condition them to compromise their bodies and personal information
to the state. These are GLOBAL programs. In the schools they are already
using retina biometrics for the children to get their lunches and library
materials at school.
Bushs "No Child Left Behind" also is demanding school database
information
for draft purposes, as well as all the other "human managment"
programs they
have planned for us - the schools don't get the federal money unless they
comply
ALL information gathered now is shared - there is NO private database)
________
RFID tags: Big Brother in small packages
I'm not talking about having a microchip surgically implanted beneath your skin, which is what Applied Digital Systems of Palm Beach, Fla., would like to do. Nor am I talking about John Poindexter's creepy Total Information Awareness spy-veillance system, which I wrote about last week.
Instead, in the future, we could be tracked because we'll be wearing, eating and carrying objects that are carefully designed to do so.
The generic name for this technology is RFID, which stands for radio frequency identification. RFID tags are miniscule microchips, which already have shrunk to half the size of a grain of sand. They listen for a radio query and respond by transmitting their unique ID code. Most RFID tags have no batteries: They use the power from the initial radio signal to transmit their response.
You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, Calif.

Alien Technology won't reveal how it charges for each tag, but industry estimates hover around 25 cents. The company does predict that in quantities of 1 billion, RFID tags will approach 10 cents each, and in lots of 10 billion, the industry's holy grail of 5 cents a tag.
It becomes unnervingly easy to imagine a scenario where everything you buy that's more expensive than a Snickers will sport RFID tags, which typically include a 64-bit unique identifier yielding about 18 thousand trillion possible values. KSW-Microtec, a German company, has invented washable RFID tags designed to be sewn into clothing. And according to EE Times, the European central bank is considering embedding RFID tags into banknotes by 2005.
It becomes unnervingly
easy to imagine a scenario where everything you buy that's more
expensive than a Snickers will sport RFID tags.
You can imagine nightmare legal scenarios that don't involve the cops. Future divorce cases could involve one party seeking a subpoena for RFID logs--to prove that a spouse was in a certain location at a certain time. Future burglars could canvass alleys with RFID detectors, looking for RFID tags on discarded packaging that indicates expensive electronic gear is nearby. In all of these scenarios, the ability to remain anonymous is eroded.
Don't get me wrong. RFID tags are, on the whole, a useful development and a compelling technology. They permit retailers to slim inventory levels and reduce theft, which one industry group estimates at $50 billion a year. With RFID tags providing economic efficiencies for businesses, consumers likely will end up with more choices and lower prices. Besides, wouldn't it be handy to grab a few items from store shelves and simply walk out, with the purchase automatically debited from your (hopefully secure) RFID'd credit card?
The privacy threat comes when RFID tags remain active once you leave a store. That's the scenario that should raise alarms--and currently the RFID industry seems to be giving mixed signals about whether the tags will be disabled or left enabled by default.
In an interview with News.com's Gilbert last week, Gillette Vice President Dick Cantwell said that its RFID tags would be disabled at the cash register only if the consumer chooses to "opt out" and asks for the tags to be turned off. "The protocol for the tag is that it has built in opt-out function for the retailer, manufacturer, consumer," Cantwell said.
Wal-Mart, on the other hand, says that's not the case. When asked if Wal-Mart will disable the RFID tags at checkout, company spokesman Bill Wertz told Gilbert: "My understanding is that we will."
Cantwell asserts that there's no reason to fret. "At this stage of the game, the tag is no good outside the store," he said. "At this point in time, the tag is useless beyond the store shelf. There is no value and no harm in the tag outside the distribution channel. There is no way it can be read or that (the) data would be at all meaningful to anyone." That's true as far as it goes, but it doesn't address what might happen if RFID tags and readers become widespread.
If the tags stay active after they leave the store, the biggest privacy worries depend on the range of the RFID readers. There's a big difference between tags that can be read from an inch away compared to dozens or hundreds of feet away.
The privacy threat comes
when RFID tags remain active once you leave a store.
But what about a more powerful RFID reader, created by criminals or police who don't mind violating FCC regulations? Eric Blossom, a veteran radio engineer, said it would not be difficult to build a beefier transmitter and a more sensitive receiver that would make the range far greater. "I don't see any problem building a sensitive receiver," Blossom said. "It's well-known technology, particularly if it's a specialty item where you're willing to spend five times as much."
Privacy worries also depend on the size of the tags. Matrics of Columbia, Md., said it has claimed the record for the smallest RFID tag, a flat square measuring 550 microns a side with an antenna that varies between half an inch long to four inches by four inches, depending on the application. Without an antenna, the RFID tag is about the size of a flake of pepper.
Matrics CEO Piyush Sodha said the RFID industry is still in a state of experimentation. "All of the customers are participating in a phase of extensive field trials," Sodha said. "Then adoption and use in true business practices will happen...Those pilots are only going to start early this year."
To the credit of the people in the nascent RFID industry, these trials are allowing them to think through the privacy concerns. An MIT-affiliated standards group called the Auto-ID Center said in an e-mailed statement to News.com that they have "designed a kill feature to be built into every (RFID) tag. If consumers are concerned, the tags can be easily destroyed with an inexpensive reader. How this will be executed i.e. in the home or at point of sale is still being defined, and will be tested in the third phase of the field test."
If you care about privacy, now's your chance to let the industry know how you feel. (And, no, I'm not calling for new laws or regulations.) Tell them that RFID tags are perfectly acceptable inside stores to track pallets and crates, but that if retailers wish to use them on consumer goods, they should follow four voluntary guidelines.
First, consumers should be notified--a notice on a checkout receipt would work--when RFID tags are present in what they're buying. Second, RFID tags should be disabled by default at the checkout counter. Third, RFID tags should be placed on the product's packaging instead of on the product when possible. Fourth, RFID tags should be readily visible and easily removable.
Given RFID's potential for tracking your every move, is that too much to ask?
________
Darpa's Pyramid page of the Babylonian Talmudic Order.
The Domestic Dissenter Tracking System

![]()
03 February 2003
Everybody in Europe and the US should have their genetic fingerprints entered into an international database to enable law enforcement agencies to fight crime and terrorism in an unstable world, according to James Watson, the co-discoverer of the DNA double helix.
In an exclusive interview with The Independent to mark the 50th anniversary of his discovery, the scientist said the risks posed by terrorists and organised criminals now outweighed the possible objections on civil liberties grounds to a DNA database.
"It is not that I am insensitive to the concerns about individual privacy or to the potential for inappropriate use of genetic information, but it would make life safer," Professor Watson, the president of the Cold Spring Harbor Laboratory in New York, said.
As the first director of the Human Genome Project, Professor Watson set aside funds to examine the potential ethical concerns relating to the misuse of genetic information. DNA fingerprints, which do not contain medical information and are merely used to establish a person's identity, pose fewer threats, he said.
"The sacrifice of this particular form of anonymity does not seem an unreasonable price to pay, provided the laws see to a strict and judicious control over access to public data," he said. "It would be harder to be a crook. If you want to make the criminal justice system more fair, what's wrong with it?"
Europe and the US could introduce such a database relatively cheaply and easily, he said. "It's hard to imagine that in 100 years from now we won't have it. With the increase in terrorism, we want to know who people are."
Many people might object out of an irrational fear of DNA, which has a "voodoo quality", he admitted. "A lack of understanding of genetic complexities leaves one susceptible to the worst anxieties and conspiracy theories."
Professor Alec Jeffreys of Leicester University, who developed DNA fingerprinting in the 1980s, also called for a national DNA database for crime fighting in a speech last year at the Science Festival. Since its development, the fingerprinting technique has become one of the most powerful tools in forensic science.
________
Barcoding humans
The era of implanting people with identity chips is up on us
By Angela Swafford, Globe Correspondent, 5/20/2003
''First we locate a prime spot,'' he said. ''The next thing is to release the
button that triggers the injection mechanism, and that's it, the cargo's been
delivered.'' The ''cargo'' was a half-inch-long microchip inside a glass and silicone
cylinder that carries my permanent identification number. For an instant, I
remembered the famous scene in the movie ''Fantastic Voyage'' in which a
miniaturized Raquel Welch and her companions are inserted, submarine and all,
into the vein of a patient. In my case, the tiny chip inside me can transmit
personal information to anyone with a special handheld scanner. Theoretically, this VeriChip will allow doctors to call up my medical records
even if I'm too badly hurt to answer questions. It is also supposed to allow me
to get money from an automatic teller machine by flashing my arm instead of
punching in my PIN number. Or reassure airport security that I am a journalist,
not a terrorist. And, though the VeriChip strikes critics as Orwellian, its makers think the
surgically implanted IDs could be the Social Security numbers of the future in a
nervous world. ''I believe the day will come when most of us will have something similar to
the VeriChip under our skin,'' said Scott Silverman, president of Florida-based
Applied Digital Solutions. ''People will regard that its benefits -- in terms of
financial, security, and health care -- far outweigh the possibility of loss of
privacy.'' Right now, I am part of a very small club, the 18th person in the world --
and the first journalist -- to get ''chipped.'' Most of the others are ADS
employees along with one Florida family who have been jokingly dubbed ''the
Chipsons'' in a play on the old Jetsons cartoon. The idea of a system that gives emergency workers and others immediate access
to potentially lifesaving information is exactly what drew the Jacobs family of
Boca Raton to the VeriChip. At the request of their 14-year-old son, Derek, the
Jacobses got chipped last year. ''My husband has cancer and we've experienced the frustrating delays of
trying to provide urgent medical history information every time he is rushed
into the emergency room,'' says Leslie Jacobs. Since the attack on the World Trade Center on Sept. 11, 2001, she continues,
''we know that our lives are increasingly vulnerable. If we want increased
safety, security, and peace of mind, we need to take positive steps. We've
decided that having a VeriChip is one way to do just that.'' But critics see surveillance technology like the VeriChip as a growing
threat, giving potentially dangerous new power to businesses and government
alike. In a report issued in January by the American Civil Liberties Union, Jay
Stanley and Barry Steinhardt warned that an explosion of technology has already
created a ''surveillance monster.'' ''Scarcely a month goes by in which we don't read about some new high-tech
way to invade people's privacy, from face recognition to implantable microchips,
data mining, DNA chips, and even `brain wave fingerprinting,' '' they wrote.
''The fact is there are no longer any technical barriers to the Big Brother
regime portrayed by George Orwell [in his novel `1984'].'' The VeriChip is similar to the more than 25 million chips already embedded in
animals all over the world acting as ''pet passports,'' allowing customs
officials to monitor those animals that do not need to go into quarantine, or to
identify your stray dog. But, at least for now, the VeriChip does much less: it's mainly for
demonstration purposes, carrying only an identification number and the capacity
for about three paragraphs of information. Only 10 hospitals and doctors in
Florida have the scanner to read the chips. And the Food and Drug Administration
has not yet approved the chips for use in health care, so they cannot be used to
access medical records. However, ADS officials say this is just the beginning. They want to build a
chip that can store loads of information, or act as the key to a central
database that stores information about the user. Ultimately, the company hopes
to be able to track the movement of people with chips worldwide using global
positioning satellites. The company is field testing its Personal Locator Device, or PLD, which ADS
says could help track lost children, sick elderly family members, mountain
climbers who get lost, or kidnap victims. Company officials say they have been
inundated with requests from private companies in Latin America, especially
Mexico and Colombia. The PLD is still years away from wide use, according to Keith Bolton, ADS's
chief of technologies. The working prototype is rather large -- 2 1/2 inches in
diameter -- and would require major surgery for implantation (though it appears
some Israeli secret service agents already carry something similar). It is
powered by a pacemaker battery, and, just like in a Tom Clancy book, it would
let anyone with access to the PLD system follow the wearer anytime, anywhere in
the world, at the click of a mouse. ''The PLD would also monitor the vital signs of the wearer, and the
environmental conditions around that person, and it could be a great way to
protect a family member with a disease such as Alzheimer's,'' says Bolton. Businesses already use technology to track their products around the world,
but we should stop and think about the implications before starting a human
tracking system, cautions Mohan Tanniru, professor of information systems at the
University of Arizona. ''I am not going to put a chip on my kid thinking that she could be
kidnapped,'' he says, ''unless I know the chip will be activated only if I
report that my kid is lost. But how do I know that the police are only going to
activate it when I say so, and not when they feel like it? You can't just say
that technology is bad just because it is there. So it is a matter of deciding
what trusting agency should be given that responsibility.'' Tanniru actually thinks that human tracking might be welcome in certain
cases, such as following criminals on probation or making sure foreign nationals
don't overstay their visas. In fact, Pro Tech Monitoring of Tampa already makes
an externally worn tracking device for parolees that alerts authorities if the
wearer enters a forbidden area, such as a school zone. For ADS's Silverman, both the VeriChip and its future GPS-based version are a
matter of individual choice. ''No one is forcing you to have a VeriChip. If you want a chip in your right
arm you are going to know it is there because you will see it injected. When you
look at the events of 9/11 and the way people measure their own personal
security today versus the way they did a few years ago, there is a much higher
concern to make sure that family members are safe and sound, and some people now
put that above privacy rights.'' So far, ADS's technology gamble has not translated into profits. In 2002, ADS
lost $112 million on revenues of $96 million, though this loss is significantly
lower that that of the previous year. As far as I am concerned, having a chip with a code in it is not giving me
the chills. I think it would be nice to use it to get cash or pay for gas, and I
wouldn't mind paramedics having access to my health records in the blink of an
eye. Besides, I know it would never get lost. I did, however, have a few
questions about its health hazards. So I asked Dr. Kleiner. ''The VeriChip is extremely safe,'' he says. ''Pacemakers are hundreds of
times larger and more complicated and nobody has problems with them. To prevent
the chip from migrating to another part of the body there is a little polymer at
one end of the capsule that will adhere to the skin and hold it in place. At his office, my arm was like a barcoded product at a supermarket cash
register: It beeped every time the scanner prodded the chip. It worked even
through my clothes. Displayed on the screen was a long number with many zeroes.
For good or bad, I thought, this chip may be quietly heralding a time when
people will literally have technology under the skin.
he
painless procedure barely lasted 15 minutes. In his South Florida office, Dr.
Harvey Kleiner applied a local anesthetic above the tricep of my right arm, then
he inserted a thick needle deep under the skin.
This story ran on page C9 of the Boston Globe on 5/20/2003.
© Copyright
2003 Globe Newspaper Company.




Are you with them or, are you against them? That is the question?
In the Name of Jesus
Christ the Lord, amen
section 14 "The Protocols of the Illuminated Elders of Tzion"
section 16 "The Beast Has Risen"
Wall Street " The Mark" is Here
It has happened "War Declared upon and in America"
"All you ever need to know about their god and Qabalah"
A Sincere Request to "Rapture" Teachers
Compulsory Constitutional Cremation
Homeland Security, "The Police State"
The Babylonian Talmudic Mystical Qabalah
How will they do it- " The false-christ"
"Summation" The beginning of sorrows has begun
Satan's Tales "Wagging the Global Dog"
"Satan's Plan", Protocols of Zion ( of course they will dispute it's authenticity)
I Witch, New One World Order Seal
Satan's Enforcers of Quaballah
The Seed of God or the Seed of Satan, Your choice by faith
I AM, the Revelation of Jesus Christ
National Organization Against Hasidic International Talmudic Enforcement
Where's Da Plane Boss, wheres da plane?
The Federal Reserve, Fed up with the Fed?
The Protocols Today. Dispute this, Liars !
Letter to a friend "It's not the Jews Dummy"
The "Son's of the Synagogue of Satan"Chabad Lubavitch
The Chabad Satan Wall of Destruction
Columbia "The Queen of Heaven"
The Infiltration of the leaven "Jerusalem Council"
One World Religion Part 5 Religion Part 7
Obedient Ishmael Kislev 19, 5764
The Lord of the Ring, the Return of the Talmudic king
Changing the Time and the Laws
"Replacement Theology" of Judaic Talmudism
Eating Rainbow Stew with a Silver Spoon, underneath a Noahide Sky