from:alt.conspiracy As, always, Caveat Lector Om K ----- Click Here: <A HREF="aol://5863:126/alt.conspiracy:618493">Technologies of Political Control</A> ----- Subject: Technologies of Political Control From: Freedom Project <A HREF="mailto:Use-Author-Supplied-Address-Header@[127.1]">Use-Author-Supplied-A ddress-Header@[127.1]</A> Date: Wed, May 31, 2000 11:19 AM Message-id: <[EMAIL PROTECTED]> These Orwellian technologies fall into two main categories: (1)Surveillance - to enable ruling regimes to track everyone at all times, and (2)Punishment - 'non-lethal' methods of torture to enforce compliance on dissidents. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "We should ask ourselves... who will heed our cry for help once these technologies are fully implemented? Excerpts from: <A HREF="http://www.newdawnmagazine.com.au/back.htm">http://www.newdawnmagazin e.com.au/back.htm</A> TOTALITARIAN TECHNOLOGY - The Truth is Closer Than Fiction By SUSAN BRYCE Over the last decade, Hollywood has sensitised us to totalitarian technology. Block buster movies portray our heroes and heroines using the weapons of the new millennium. Militarised police forces keep citizens safe; android warrior personnel, part human, part robot are gainfully employed as global peacekeepers; prisoners are incarcerated in high tech electronic jails, controlled with implanted microchips, while the free population is kept under surveillance through the use of biometric identity systems. Science fiction perhaps? Reality yes! Much of what we see on the big screen is not the latest fantasy of Hollywood script writers, but is based on fact. Any film maker wanting a picture of the future need look no further than existing military technology and research. A recent report published by the European Parliament, "An Appraisal of the Technologies of Political Control", shows just how far these new technologies have come, and how they are being actively employed against citizens in countries across the globe. Developments in surveillance technology, innovations in crowd control weapons, new prison control systems, the rise of more powerful restraint, torture, killing and execution technologies and the role of privatised enterprises in promoting such technologies pose a grave threat to our immediate and future freedoms. . Trade in Technologies of Control Cutting edge developments made by the Western military-industrial complex are providing invaluable support to various governments throughout the world. The report "Big Brother Incorporated", by surveillance watchdog Privacy International, presents a detailed analysis of the international trade in surveillance technology. Privacy International says it is concerned about "the flow of sophisticated computer-based technology from developed countries to developing countries _ and particularly to non-democratic regimes where surveillance technologies become tools of political control." The international trade in surveillance technology (known as the Repression Trade), involves the manufacture and export of technologies of political control. More than seventy per cent of companies manufacturing and exporting surveillance technology also export arms, chemical weapons or military hardware. Tools of Repression for 'Democratic' States We should not forget that the same companies supplying regimes with repression technology, also supply `democratic' states with their totalitarian tools. The existing arsenal of weapons designed for public order and control will soon be joined by a second generation of kinetic, chemical, optico-acoustic, and microwave weapons, adding to the disabling and paralysing technologies already available. Much of the initial work on these new technologies has been undertaken in US nuclear laboratories such as Oak Ridge, Lawrence Livermore and Los Alamos. The European Parliament Report "An Appraisal of the Technologies of Political Control" lists a Pandora's box of new technologies including: Ultra-sound generators, which cause disorientation, vomiting and involuntary defecation, disturbing the ear system which controls balance and inducing nausea. The system which uses two speakers can target individuals in a crowd. Visual stimulus and illusion techniques such as high intensity strobes which pulse in the critical epileptic fit-inducing flashing frequency and holograms used to project active camouflage. Reduced energy kinetic weapons. Variants on the bean bag philosophy which ostensibly will result in no damage (similar claims were once made about plastic bullets). New disabling, calmative, sleep inducing agents mixed with DMSO which enables the agent to quickly cross the skin barrier and an extensive range of pain causing, paralysing and foul-smelling area-denial chemicals. Some of these are chemically engineered variants of the heroin molecule. They work extremely rapidly, one touch and disablement follows. Yet one person's tranquillisation may be another's lethal dose. Microwave and acoustic disabling systems. Human capture nets which can be laced with chemical irritant or electrified to pack an extra disabling punch. Lick `em and stick `em technology such as the Sandia National Laboratory's foam gun which expands to between 35-50 times its original volume. Its extremely sticky, gluing together any target's feet and hands to the pavement. Aqueous barrier foam which can be laced with pepper spray. Blinding laser weapons and isotrophic radiator shells which use superheated gaseous plasma to produce a dazzling burst of laser like light. Thermal guns which incapacitate through a wall by raising body temperature to 107 degrees. Magnetosphere gun which delivers what feels like a blow to the head. "An Appraisal of the Technologies of Political Control" says "we are no longer at a theoretical stage with these weapons. US companies are already piloting new systems, lobbying hard and where possible, laying down potentially lucrative patents." Advances in Biometric Identification Through the inevitability of gradualness, repression technology, in the form of biometric identity systems, is permeating our every day life. Biometry involves using a physical characteristic such as a fingerprint, palm print, iris or retina scan to identify individuals. These unique identity charact-eristics are digitally stored on a computer system for verification. This way, the identity of each person can be compared to the stored original. Biometric identification is not something that we just see at the movies. It is here, it is with us now. Governments in Australia, the USA and the UK are planning its widespread introduction by 2005. Big Brother's International Network of Surveillance Biometric identification is the technology of today and the future. It is not a matter of if, but when, a global network of computers will link all stored biometric images in a central location, managed by a collective of international authorities. Once upon a time, surveillance was targeted at certain groups and individuals. In our time, surveillance occurs en masse. Much of the `harmless' computer based technology necessary for our daily lives could actually be used to keep the entire population under surveillance. Telephone systems lend themselves to a dual role as a national interceptions network, according to "An Appraisal of the Technologies of Political Control". For example, the message switching system used on digital exchanges like System X in the UK, supports an Integrated Services Digital Network (ISDN) Protocol. This allows digital devices, e.g. faxes, to share the system with existing lines. The ISDN subset is defined in their documents as "Signaling CCITT"-series interface for ISDN access. What is not widely known is that built-in to the international CCITT protocol is the ability to take phones `off hook' and listen into conversations occurring near the phone, without the user being aware that it is happening. This effectively means that a national dial up telephone tapping capacity is built into these systems from the start. Further, the digital technology required to pinpoint mobile phone users for incoming calls means that all mobile phones in a country when activated, are mini-tracking devices. The issues surrounding the uncontrolled and unregulated spread of tyrannical technology are immediate and ongoing. The technologies of repression that are trialed in so-called non-democratic countries are now being aggressively marketed in the West, while Hitler's Germany becomes a vague memory. It is up to us to do what ever we can to stop the insidious spread of this technology, and to demand the right to choose whether we participate in the biometric system or not. We should ask ourselves... who will heed our cry for help once these technologies are fully implemented? _____________________ ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, All My Relations. Omnia Bona Bonis, Adieu, Adios, Aloha. Amen. Roads End <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance�not soap-boxing�please! These are sordid matters and 'conspiracy theory'�with its many half-truths, misdirections and outright frauds�is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html <A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
