Saturday, December 19, 2015

They Would Be Gods - 77 - Control Through Technology

THEY WOULD BE GODS: OUR PAST RECONSIDERED, OUR FUTURE FOREWARNED

PART VIII: CONTROL

by Anthony Forwood (2011)

http://www.lulu.com/shop/anthony-k-forwood/they-would-be-gods/paperback/product-15534669.html 



77: Control Through Technology



In order to monitor and control us, this alien group who secretly operate from the shadows of our society rely on our use of the technology that they have encouraged to proliferate amongst us. They have introduced a succession of products for the masses, with a hidden purpose in mind. Some products are simply diversions to occupy our minds, while others are designed to further their control of us. These two aspects are purposely tied together in these products, however, so that if we are to accept one, we must accept both. Of course, most people aren’t even aware of the second aspect, or the degree that it can be applied.

Almost all of our greatest modern technologies originate from secret military research and development projects. They’re only brought into the open and made available to the public if and when their release serves the purpose of further controlling the public in some way. There are also advanced technologies that exist but remain hidden from the general masses. These hidden technologies are in the hands of the select few who work in close relationship with the alien group, and the technologies are used only under the direction of the latter group.

The military, to keep itself on top of technological progress, keeps very close ties to a number of corporations and other private institutions that are heavily involved with cutting-edge science and technology, and uses them as front organizations to pursue new research and development projects in secrecy. The contracts provide the corporation or institution with much of the necessary funding and allows them to retain patent ownership of any developments coming out of the projects. By keeping these projects in the private sector, there is no accountability to the public. Requests made under the Freedom of Information Act cannot be used to acquire information from the private sector, and this enables them to hide everything that they’re doing.

The possibility that a party outside of government control might develop some new technology that the alien group does not want them to develop is undermined to a great degree by the patent process, which is used to screen for just such developments. Certain patents for new technologies have been bought up by the government and then suppressed because the invention or discovery could disrupt the control that this alien group has over us, or would otherwise threaten to expose them and their lies. For instance, zero-point energy generators and antigravity technologies have been designed and built a number of times over the last century, but rarely ever seem to reach the attention of the greater public before they’re suppressed.

The alien group, whoever they might be, is allowing their most loyal minions to use technology, both those that have been proliferated among the public as well as those that have been kept completely unknown to the public, to closely monitor anyone they might choose. They have the means to listen to and watch us through our cell phones and computers, which they can tap into and operate without detection, through a computerized global surveillance system called ECHELON.

All cell phones and many other such devices are now equipped with a GPS (Global Positioning System) device, making the tracking of an individual with a cell phone automatic and extremely accurate. If a targeted individual doesn’t carry a cell phone, it’s still quite possible to track the person using the cell phones of the people around them.

There are also all the cameras discreetly popping up everywhere, from stores and banks to city parks and other public places. If these were all wired up to a central system that allowed for remote operation of the cameras, it would be quite possible to automate tracking and visual surveillance of an individual in most urban areas.

The US government is already doing this under the banner of the ‘War on Terrorism’, although they don’t often discuss the extent of the more invasive aspects of their automated surveillance techniques, which remains classified information to ensure public ignorance. Voice recognition software makes it possible to quickly identify a voice in a monitored phone call, and facial recognition software with advanced image enhancement capabilities make positive identification quick and automatic when searching for a particular target among a crowd of people. It’s quite conceivable that technology exists, or might soon exist, that would allow a person to sweep a large crowd with a camera and instantly receive a computer printout listing the personal information on every person in that crowd.

They also have other surveillance systems besides technological ones. They established a very good system of surveillance long before electronic technology came of age. During Stalinist Russia, the KGB used a system of domestic surveillance in which people willingly spied on each other – even on their own family members, reporting each other’s activities to the KGB. The KGB kept tabs on everybody in the population in this manner, and nobody could be sure who might be watching them, or what might be reported about them. Therefore, they had to be very careful of what they said and did. Every little bit of information could be reported, even suspicious but otherwise innocent activity. Spies didn’t have to be sought out, either. Living conditions were kept severe enough that people were always desperate for even the simplest things in life, and a small reward for information about some minor crime someone committed was always an incentive for a person to inform on whoever they could. For larger tidbits of information that might result in promotions for the KGB officers that a person reported to came bigger rewards for the informant. People who spoke out against the government or expressed undesirable beliefs were censored by being rounded up and sent to the Gulag prisons where they would often languish for years before finally going before a judge and being formally tried and convicted for their alleged crime, which usually resulted in spending more years of harsh existence in prison before they ever regained their freedom, if they even survived.

Although not nearly as harsh, an otherwise similar sort of domestic monitoring and control to that used by the KGB has been implemented in our modern western society, and is being continually improved and refined. Although we aren’t so blatantly coerced into snitching on a friend or family member out of sheer desperation, as they were in Russia during earlier times, we’re nevertheless being coerced to turn on each other in other ways, sometimes by more subtle means and sometimes not.

A continual sense of encroaching problems and dangers in society spewing out at us on the evening news night after night builds up until the ignorant believer is swayed into taking on the attitude that’s implicitly suggested to him or her again and again by carefully chosen experts or authorities. A person is led in this way to lose trust in the general public, and begins to divide people into stereotyped groups of good and bad. They learn from the expressed attitudes of authority figures to fear and suspect their fellow man to the point of paranoia. Once this sets in, a person is on their way to total submission.

We as a society have been enticed by the trinkets of technology, whose true purpose is not recognized by most people. The little cell phone you carry with you wherever you go (perhaps even to the toilet or shower) is a direct pinpoint on your location. The camera on that phone can be activated remotely to transmit pictures or live video even while the phone is shut off, and perhaps even with the battery removed. The same goes for your computer. The machine doesn’t have to be turned on and these intruders don’t have to log in. There are secret ‘backdoors’ built into computer architecture that very few even know about.

All of the technological devices that we have come to greatly depend on in our modernized daily lives – automobiles, electricity, phones, television, computers, etc. – have been implanted into our society in moderated steps, building our dependency on these technologies further and further until we are almost all now caught within their clutches, unable to even fathom how we might ever exist without them. And this is the underlying intent. Technology has crept into every corner of our lives so that through it we have become captivated, and in being captivated, we have become trapped in the web of control that it holds on us. Take away our sources of electricity – the lifeblood of these technologies – and we are completely incapacitated. Whole industries would shut down, communications would cease, movement would slow to a crawl. The majority of the population, living in large towns and cities, would suffer pandemonium relatively quickly.

This weakness is disregarded as technology progresses further, and the possibility that we might suddenly be thrown back into the stone age becomes more and more a real possibility when we realize that the US government has their no-longer-so-secret HAARP installation in Alaska that’s capable of creating an electromagnetic pulse that could traverse the entire globe in seconds, and in the process burning out every nation’s electric power grids and every unprotected electrical component that exists. This technology might be used in this way as part of a global takeover, using an ‘end of the world’ scenario in which civilization will be thrown into sudden chaos, putting it at the mercy of a new ruling power that will appear to offer the only hope for survival. This new ruling power may be human in nature, or maybe not. It’s possible that either an alien invasion or intervention might be staged as part of this scenario, however, it’s just as possible that such an eventuality might actually be real.


No comments:

Post a Comment