Navigation bar
  Print document Start Previous page
 497 of 645 
Next page End  

The Soon Coming Judgment Of God Upon America and How To Escape It                 497
decisions, and the way we manage scarce and precious resources.”
1631
(Emphasis added.) Mr.
Gutierrez may be right but the way we live may be changed in a much different capacity than
was presented an the Global Earth Observation Summit!
Surveillance
The state of surveillance technology is such that almost nothing can be done in private
anymore. Businesses collect, store and sell your personal information. There are cameras on
freeways, at intersections, at teller machines and in many government buildings and most
businesses. There are satellites in the sky. And your phones, cell phones, faxes, e-mail and
Internet transactions and all other electronic communications are monitored.
Under the Department of the Treasury, the U.S. government monitors financial
transactions around the world under a program called FinCEN. The purpose of the program is to
aid in the “detection, investigation, and prosecution of financial crimes.” This is accomplished
through an international computerized operation “that collects and analyzes data to unearth
criminal activities.” “FinCEN is the largest government-run, artificial intelligence data base ever
established in history.”
1632
In The World’s Last Dictator, author, Dwight L. Kinman writes: “Today, not one, but
tens of thousands of interconnected computers monitor U.S. citizens. Their data bases contain an
astounding variety of personal information, used in a multitude of ways that threaten privacy and
property. They can determine your entire financial profile in five minutes.”
1633
The National Security Agency (NSA) employs an international spy network known as
Echelon. The NSA partners with U.S. allies in the operation of the Echelon spy network. The
primary allies are Australia, the UK, New Zealand and Canada. This partnership arrangement
allows the allies to spy on each other’s citizens and share the information. In this manner the
NSA and intelligence organizations of the other nations skirt around privacy laws.
1634
Echelon “has the capability of intercepting all the world’s communications at any given
time.”
1635
This includes telephone, and cell phone conversations, faxes, e-mails, Internet traffic,
e-commerce, satellite and microwave transmissions, and fiber-optic communications traffic.
Echelon is able to accomplish this astounding feat through an assortment of communications
interception systems. These systems are based on land and in the sea, air and outer space. It
employs ships, submarines, aircraft and satellites. To accomplish this incredible feat, the NSA
employs rings of state-of-the-art satellites that can range in price of upwards of $1 billion
each.
1636
While the NSA has almost limitless ability to intercept communications, its ability to
decode, translate, analyze and report is very limited. To aid this task the NSA employs the most
advanced supercomputers that use a specified dictionary to look for suspicious communications.
If anybody uses a predetermined number of the words in the dictionary, or if they use the words
within a certain proximity, the computer flags the communication for further analysis. The NSA
also has the ability to use voice recognition software.
The U.S. government is also able to view what a person is doing on their computer even
when they are not hooked to the Internet from approximately 1-kilometer away. The technology
is called TEMPEST. “Computers and other electronic equipment release interference to their
Click to Convert - Powerful PDF Converter and HTML Converter.