from:alt.conspiracy
As, always, Caveat Lector
Om
K
-----
Click Here: <A HREF="aol://5863:126/alt.conspiracy:618493">Technologies of
Political Control</A>
-----
Subject: Technologies of Political Control
From: Freedom Project <A
HREF="mailto:Use-Author-Supplied-Address-Header@[127.1]">Use-Author-Supplied-A
ddress-Header@[127.1]</A>
Date: Wed, May 31, 2000 11:19 AM
Message-id: <[EMAIL PROTECTED]>


These Orwellian technologies fall into two main categories:
(1)Surveillance - to enable ruling regimes to track everyone
at all times, and (2)Punishment - 'non-lethal' methods of torture
to enforce compliance on dissidents.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"We should ask ourselves... who will heed our cry for help once
these technologies are fully implemented?

Excerpts from:
<A HREF="http://www.newdawnmagazine.com.au/back.htm">http://www.newdawnmagazin
e.com.au/back.htm</A>

TOTALITARIAN TECHNOLOGY - The Truth is Closer Than Fiction

By SUSAN BRYCE

Over the last decade, Hollywood has sensitised us to totalitarian
technology. Block buster movies portray our heroes and heroines
using the weapons of the new millennium. Militarised police
forces keep citizens safe; android warrior personnel, part human,
part robot are gainfully employed as global peacekeepers;
prisoners are incarcerated in high tech electronic jails,
controlled with implanted microchips, while the free population
is kept under surveillance through the use of biometric identity
systems.

Science fiction perhaps? Reality yes! Much of what we see on the
big screen is not the latest fantasy of Hollywood script writers,
but is based on fact. Any film maker wanting a picture of the
future need look no further than existing military technology and
research.

A recent report published by the European Parliament, "An
Appraisal of the Technologies of Political Control", shows just
how far these new technologies have come, and how they are being
actively employed against citizens in countries across the globe.


Developments in surveillance technology, innovations in crowd
control weapons, new prison control systems, the rise of more
powerful restraint, torture, killing and execution technologies
and the role of privatised enterprises in promoting such
technologies pose a grave threat to our immediate and future
freedoms.
.

Trade in Technologies of Control

Cutting edge developments made by the Western military-industrial
complex are providing invaluable support to various governments
throughout the world. The report "Big Brother Incorporated", by
surveillance watchdog Privacy International, presents a detailed
analysis of the international trade in surveillance technology.

Privacy International says it is concerned about "the flow of
sophisticated computer-based technology from developed countries
to developing countries _ and particularly to non-democratic
regimes where surveillance technologies become tools of political
control."

The international trade in surveillance technology (known as the
Repression Trade), involves the manufacture and export of
technologies of political control. More than seventy per cent of
companies manufacturing and exporting surveillance technology
also export arms, chemical weapons or military hardware.


Tools of Repression for 'Democratic' States

We should not forget that the same companies supplying regimes
with repression technology, also supply `democratic' states with
their totalitarian tools.


The existing arsenal of weapons designed for public order and
control will soon be joined by a second generation of kinetic,
chemical, optico-acoustic, and microwave weapons, adding to the
disabling and paralysing technologies already available. Much of
the initial work on these new technologies has been undertaken in
US nuclear laboratories such as Oak Ridge, Lawrence Livermore and
Los Alamos. The European Parliament Report "An Appraisal of the
Technologies of Political Control" lists a Pandora's box of new
technologies including:

     Ultra-sound generators, which cause disorientation,
     vomiting and involuntary defecation, disturbing the ear
     system which controls balance and inducing nausea. The
     system which uses two speakers can target individuals in a
     crowd.

     Visual stimulus and illusion techniques such as high
     intensity strobes which pulse in the critical epileptic
     fit-inducing flashing frequency and holograms used to
     project active camouflage.

     Reduced energy kinetic weapons. Variants on the bean bag
     philosophy which ostensibly will result in no damage
     (similar claims were once made about plastic bullets).

     New disabling, calmative, sleep inducing agents mixed with
     DMSO which enables the agent to quickly cross the skin
     barrier and an extensive range of pain causing, paralysing
     and foul-smelling area-denial chemicals. Some of these are
     chemically engineered variants of the heroin molecule. They
     work extremely rapidly, one touch and disablement follows.
     Yet one person's tranquillisation may be another's lethal
     dose.

     Microwave and acoustic disabling systems.

     Human capture nets which can be laced with chemical
     irritant or electrified to pack an extra disabling punch.

     Lick `em and stick `em technology such as the Sandia
     National Laboratory's foam gun which expands to between
     35-50 times its original volume. Its extremely sticky,
     gluing together any target's feet and hands to the
     pavement.

     Aqueous barrier foam which can be laced with pepper spray.

     Blinding laser weapons and isotrophic radiator shells which
     use superheated gaseous plasma to produce a dazzling burst
     of laser like light.

     Thermal guns which incapacitate through a wall by raising
     body temperature to 107 degrees.

     Magnetosphere gun which delivers what feels like a blow to
     the head.

"An Appraisal of the Technologies of Political Control" says "we
are no longer at a theoretical stage with these weapons. US
companies are already piloting new systems, lobbying hard and
where possible, laying down potentially lucrative patents."


Advances in Biometric Identification

Through the inevitability of gradualness, repression technology,
in the form of biometric identity systems, is permeating our
every day life. Biometry involves using a physical characteristic
such as a fingerprint, palm print, iris or retina scan to
identify individuals. These unique identity charact-eristics are
digitally stored on a computer system for verification. This way,
the identity of each person can be compared to the stored
original.

Biometric identification is not something that we just see at the
movies. It is here, it is with us now. Governments in Australia,
the USA and the UK are planning its widespread introduction by
2005.


Big Brother's International Network of Surveillance

Biometric identification is the technology of today and the
future. It is not a matter of if, but when, a global network of
computers will link all stored biometric images in a central
location, managed by a collective of international authorities.


Once upon a time, surveillance was targeted at certain groups and
individuals. In our time, surveillance occurs en masse. Much of
the `harmless' computer based technology necessary for our daily
lives could actually be used to keep the entire population under
surveillance.

Telephone systems lend themselves to a dual role as a national
interceptions network, according to "An Appraisal of the
Technologies of Political Control". For example, the message
switching system used on digital exchanges like System X in the
UK, supports an Integrated Services Digital Network (ISDN)
Protocol. This allows digital devices, e.g. faxes, to share the
system with existing lines. The ISDN subset is defined in their
documents as "Signaling CCITT"-series interface for ISDN access.

What is not widely known is that built-in to the international
CCITT protocol is the ability to take phones `off hook' and
listen into conversations occurring near the phone, without the
user being aware that it is happening. This effectively means
that a national dial up telephone tapping capacity is built into
these systems from the start. Further, the digital technology
required to pinpoint mobile phone users for incoming calls means
that all mobile phones in a country when activated, are
mini-tracking devices.

The issues surrounding the uncontrolled and unregulated spread of
tyrannical technology are immediate and ongoing. The technologies
of repression that are trialed in so-called non-democratic
countries are now being aggressively marketed in the West, while
Hitler's Germany becomes a vague memory. It is up to us to do
what ever we can to stop the insidious spread of this technology,
and to demand the right to choose whether we participate in the
biometric system or not. We should ask ourselves... who will heed
our cry for help once these technologies are fully implemented?

        _____________________
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths,
misdirections
and outright frauds�is used politically by different groups with major and
minor
effects spread throughout the spectrum of time and thought. That being said,
CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html
<A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to