The 'New World Order'
 
Digital ID Or Digital Prison
Home Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 God's Plan
The New World Order
It's An Evil And Sinister Conspiracy That Involves Very Rich And Powerful People Who Mastermind Events And Control World Affairs Through Governments And Corporations And Are Plotting Mass Population Reduction And The Emergence Of A Totalitarian World Government!   By Using Occult Secret Societies The ILLUMINATI Will Bring All Of The Nations Of This World Together As One.   We'll Have No Recourse But To Submit And Be Under Their Control Utilizing Their Digital Central Bank Currency Or To Reject This Ill-Fated Digital Identification.   The Goal Is UN Agenda 2030!   This Is The Beginning Of The End!
The Tower Of Babel

The Tower Of Babel
(Gen. 11:1-9) Symbolizes the common effort of mankind to build a common political society. The Louise Weiss EU Parliamentary Building in Strassbourg that opened in December 2000
Tower Of Babel
is said to have Pieter Brueghel's (Tower Of Babel) painting for its model. Also, on this promotional poster used by the EU there's a reproduction of The Tower of Babel with construction cranes above it and the caption 'Many tongues, one voice.'
The myriad number of groups, governments, societies and interest groups who are working toward a New World Order are gradually placing all the necessary things in order to facilitate the revived dream of Babel. This would unite all nations and peoples in the worship of Lucifer. What's the logic behind the symbolism in this building? The EU says it is seeking to "build up the house of Europe" - a task yet to be completed. The building is complete and in use, but is designed to look unfinished, and even has ringed platforms to represent scaffolding. And here's the scary part. A reporter questioning "Why the Tower of Babel" as a design concept, was answered in an astounding way by an EU official. He said, "What they failed to complete 3000 years ago – we in Europe will finish now!"

Read more »





MIT Shows Off A Smart Tattoo That Can Turn Your Skin Into A Touchpad

With DuoSkin, wearables are no longer just an accessory. They become part of your skin.

The MIT Media Lab and Microsoft Research set out to create on-skin user interfaces using gold leaf, which is commonly found in craft stores, as a conductor. Piggybacking on the trend in body-art and metallic jewelry-like tattoos, the team decided to repurpose gold leaf because it is “robust to movements and skin deformations during motion…[and] both workable and aesthetic in appearance.” The smart tattoos, outlined in a paper that has been presented at the International Symposium on Wearable Computers, look like fashion statements but they include other materials and electrical components that make the tattoos interactive.

The tattoos can turn into an interface that can be used, for example, as a trackpad or a button to remotely control your phone. Alternatively, they can track and show you information about yourself. For example, by including thermochromic displays that change color in reaction to heat, the tattoos can show you your body temperature.

A third possible function is wireless communication. The tattoo could include an NFC (near field communications) tag, an electrical component that includes small microchips to store data that can be read by phones or other NFC devices nearby. In the near future, the technology could serve as a substitute for identification, subway cards, and even movie tickets, DuoSkin’s lead researcher Cindy Hsin-Liu Kao said in an interview.

Read more »





What Are Chemtrails And How Are They Harming Our Food And Water?

Just when you thought Monsanto was under wraps, you find out they’re up to something even more horrific. What’s even worse is that it all started a long time ago!

In the late 1960s Monsanto supported the secret Muad’ Dib Geoengineering Lab to develop “chemtrail” technology; their crown jewel program to protect earth from global warming via weather control. Sounds so humanitarian, right? Wrong!

Most folks discover the reality of “chemtrails” by initially reading about it online and then going outside, looking up into the sky, and noticing the crisscrossing streaks of white clouds trailing behind jet aircraft, stretching from horizon to horizon, eventually turning the sky into a murky haze. Chemtrails are like science fiction turned reality.

This article will answer the question “what are chemtrails?” We'll share the effects of chemtrails on your environment, food, water and their connection to cancer. This information is meant to increase your awareness of the toxicity in our environment and encourage you to eliminate toxins that are within your control whenever and wherever you can.

What Are Chemtrails?

Chemtrails are geo-engineered aerosols that are loaded with toxic chemicals, including but not limited to: barium, strontium 90, aluminum, cadmium, zinc, viruses and “chaff.” Chaff looks like snow but it’s actually Mylar fibers (like in fiberglass) coated with aluminum, desiccated blood cells, plastic, and paper. Polymer chemist Dr. R. Michael Castle has studied atmospheric polymers for years, and he has identified microscopic polymers comprised of genetically-engineered fungal forms mutated with viruses, which are now part of the air we breathe.

Read more »




Weather As A Force Multiplier

Owning The Weather In 2025
In 2025 US aerospace forces can "own the weather" by capitalizing on emerging technologies and focusing development of those technologies to warfighting applications. Such a capability offers the warfighter tools to shape the battlespace in ways never before possible. It provides opportunities to impact operations across the full spectrum of conflict and is pertinent to all possible futures. The purpose of this paper is to outline a strategy for the use of a future weather modification system to achieve military objectives rather than to provide a detailed technical road map.

A high risk/high reward endeavor, weather modification offers a dilemma not unlike the splitting of the atom. While some segments of society will always be reluctant to examine controversial issues such as weather modification, the tremendous military capabilities that could result from this field are ignored at our own peril. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns, to complete dominance of global communications and counter-space control, weather modification offers the warfighter a wide range of possible options to defeat or coerce an adversary.

Technology advancements in five major areas are necessary for an integrated weather modification capability: (1) advanced nonlinear modeling techniques, (2) computational capability, (3) information gathering and transmission, (4) a global sensor array, and (5) weather intervention techniques. Some intervention tools exist today and others may be developed and refined in the future.

Weather As A Force Multiplier: Owning The Weather In 2025 Research Paper

Read more »
9/11 Attacks   No Wreckage!   Only A Round Hole At The Pentagon?

"How easy is it for you to shift your belief system from 'I totally believe in my government' to 'Oh My God! What’s going on?' That’s exactly where I went in all of this." – Albert N. Stubblebine III

Albert N. Stubblebine III is a retired Major General in the United States Army. He was the commanding general of the United States Army Intelligence and Security Command from 1981 to 1984. In this compelling interview, Stubblemine reveals the following information about the attacks on the Pentagon and the World Trade Center on September 11, 2001:

Stubblebine initially believed the official story regarding 9/11.

Then, he saw the hole in the Pentagon. The Pentagon was not hit by a Boeing 757.

All of the sensors around the Pentagon were turned off except one. That one sensor captured an image of the object that hit the Pentagon. At first it looked like a missile, but later the imagery was changed to look like a plane.

Note:   The collapse of the twin towers was caused by controlled demolition – not the fuel from the airplanes.

Note:   Larry Silverstein, the lease holder of the WTC complex, admitted that that BUILDING 7, which was not hit by a plane and had only a small fire, was intentionally "pulled" – which is phraseology used for controlled demolition.


All of the air defense systems around Washington DC were turned off that day.

Also on 9/11, there was an exercise designed to mimic an attack on the towers by airplanes.

When you connect the dots, the picture says that what we were told by the media was not the real story.

Stubblebine, visibly upset, describes how he felt when he realized the truth about his government after having a strong belief in his country since early childhood: "My belief system was so strong from age five when I could remember standing on a parade ground at attention with not anybody telling me to do that – at West Point."

Below are some notes from the interview including a partial transcript.

5:15 Stubblebine hears about the 9/11 attacks: "We’re at war."

6:00 Stubblebine said there must have been intelligence information to know that an attack was coming and we didn’t see the signals. Somebody missed it.

Read more »
Rfid Technology



RFID Label MPI Label Company | Alien chip | 96-bit


RFID tag UPM RAFLATAC | ShortDipole (ETSI) 96-bit Gen2 UHF


RFID tag UPM RAFLATAC | Frog DualDipole 96-bit Gen2 UHF


RFID tag UPM RAFLATAC | MiniDipole 96-bit Gen2 UHF


Implantable RFID chips RFID, Inc | used for animal tracking

Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be attached to or incorporated into a product, animal, or person for the purpose of identification using radio waves. All RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio frequency (RF) signal and perhaps other specialized functions. The second is an antenna for receiving and transmitting the signal. The RFID tag can automatically be read from several meters away and does not have to be in the line of sight of the reader. The current thrust in RFID use in supply chain management for large enterprises. RFID increases the speed and accuracy with which inventory can be tracked and managed thereby saving money for the business.





Biometrics To Be Used On IDs.


Minnesota to Use Facial Recognition Technology on IDs -- State will add biometrics component to prevent fake driver's licenses


BY BILL SALISBURY

Pioneer Press via Knight Ridder
Minnesota soon will start using biometric face scans to prevent would-be crooks — and underage wannabe smokers and drinkers — from getting fake driver's licenses from the state.

Gov. Tim Pawlenty on Thursday announced plans to add biometric facial recognition technology to driver's licenses as part of a broader effort to protect consumers from identity theft and unauthorized use of personal data. That effort will include stiffer criminal penalties for hackers and others who abuse access to personal data on computers.

"Identity theft causes great trauma, inconvenience and damage to a lot of people and families," Pawlenty said at a Capitol news conference. He said the state must do more to crack down on identity thieves and strengthen safeguards for personal information.

Driver's licenses are one of the state's most important forms of identification, he said, and biometric technology will help law enforcement officers ensure that individuals are who they say they are.

The new technology would match an individual's driver's license photo with images in the state's database.

Here's how Pawlenty's office described it: "Facial recognition technology converts an image into a mathematical computer algorithm as a basis for a positive match. It uses the structure of a person's face — such as width between the eyes, forehead depth and nose length — to assign mathematical points of reference creating a unique data file."

The face scans will enable the state to detect people attempting to obtain licenses using the same photo with multiple names and birth dates, or the same name and birth date with multiple people's photos, said state Public Safety Commissioner Michael Campion. "The technology … will create a higher level of integrity for Minnesota's driver's licenses."

Pawlenty said 13 other states use the technology, and it has proved "highly accurate."

No new photos will be needed to develop the state's face-scan file. State workers will scan photos on current driver's licenses to create the new file.

The new technology will cost about $1 to $2 per driver's license. Pawlenty said an $800,000 federal grant will offset these costs and that he will ask the 2006 Legislature to pay the rest.

Although he believes he has the power to implement the new system on his own, he said he would ask the Legislature to approve it.

For Minnesota retailers, the new technology means customers will be far less likely to try to use fake identification cards to make purchases, especially of alcoholic beverages and tobacco products, said Steve Rush, board chairman of the Minnesota Retailers Association. Businesses will not have equipment to read the face scans, however; only the state will have that ability.





Parallels - The Roman Empire And America

(In the past the trend has been when a civilization has fully matured they have an inclination to develop imperialistic tendencies, then expand and ultimately collapse.)

Today, the United States has many parallels as an empire to that of the collapse of the ancient Roman Empire. There were many causes of the fall of Rome however, but the main problems which led to it are exactly the same as those we face currently, here in America as a nation.

The fall of the Roman Empire took a few centuries for the total dissolution of that government to take place. However, in America the same problems that brought down the Roman Empire are expedited to the point that we are looking at decades, rather than centuries before the collapse of the US government.

The following are examples of what brought Rome down as an empire, and what is going to destroy the American government in a very short time.

Antagonism between the Senate and the Emperor:

We experience this in the US today in the form of the constant bickering between the House and Senate in their disdain of the President over power, money, and control.

Decline in Morals: 


Read more »
New Rfid Technology


RFID tags are miniscule microchips, which already have shrunk to half the size of a grain of sand. They listen for a radio query and respond by transmitting their unique ID code. Most RFID tags have no batteries: They use the power from the initial radio signal to transmit their response. You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept. Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, Calif. It becomes unnervingly easy to imagine a scenario where everything you buy that's more expensive than a Snickers will sport RFID tags, which typically include a 64-bit unique identifier yielding about 18 thousand trillion possible values. KSW-Microtec, a German company, has invented washable RFID tags designed to be sewn into clothing. And according to EE Times, the European central bank is considering embedding RFID tags into banknotes by 2005.


The VeriChip, made by Applied Digital Solutions, Inc., is an implantable RFID microchip for humans. It is about the size of a grain of rice. The chip has been approved by the Food and Drug Administration and can be used to hold patient-approved health-care information.





Los Angeles To Install Body Scanners In The Subway


Video Surveillance
The Los Angeles' subway will become the first mass transit system in the U.S. to install body scanners that screen passengers for weapons and explosives, officials said recently.

The deployment of the portable scanners, which project waves to do full-body screenings of passengers walking through a station without slowing them down, will happen in the coming months, said Alex Wiggins, who runs the Los Angeles County Metropolitan Transportation Authority's law enforcement division.

The machines scan for metallic and non-metallic objects on a person's body, can detect suspicious items from 30 feet (9 meters) away and have the capability of scanning more than 2,000 passengers per hour.

Video Surveillance
"We're dealing with persistent threats to our transportation systems in our country," said Transportation Security Administration Administrator David Pekoske. "Our job is to ensure security in the transportation systems so that a terrorist incident does not happen on our watch."

Recently, Pekoske and other officials demonstrated the new machines, which are being purchased from Thruvision, which is headquartered in the United Kingdom.

"We're looking specifically for weapons that have the ability to cause a mass-casualty event," Wiggins said. "We're looking for explosive vests, we're looking for assault rifles. We're not necessarily looking for smaller weapons that don't have the ability to inflict mass casualties."

In addition to the Thruvision scanners, the agency is also planning to purchase other body scanners — which resemble white television cameras on tripods — that have the ability to move around and hone in on specific people and angles, Wiggins said.


Read more »
Electronic surveillance: it's everywhere and it's growing

"Eye-in-the-sky" surveillance dome camera
mounted on top of a tall steel pole.

Has the demand for and use of electronic surveillance increased? The rapid changes in telecommunications technology has been accompanied by a growth in the potential intrusiveness of electronic surveillance and a steady increase in government surveillance activity. Surveillance is the monitoring of behavior of people, objects or processes within systems for conformity to expected or desired norms. Although the word surveillance literally means "watching over" the term is often used for all forms of observation or monitoring, not just visual observation. Such as the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without a persons knowledge) or overt (perhaps with frequent reminders such as "we are watching over you"). Because they're continually making new discoveries to increase the effectiveness of biometrics, rfid chips, etc., the government may soon be tracking us all.





The Future Of Biometrics

Iris scanner

The next ten years will bring major advancements in the field of biometrics -- things like reading faces, fingerprints and irises to safeguard our own security and personal information.
The headlines stated "Europe Is United Again", May 2004


10 nations in eastern Europe and Mediterranean join bloc. Europe stood proudly reunited yesterday almost six decades after it was split in two by the Cold War, as 10 nations in eastern Europe and the Mediterranean took their places in the European Union. The once-communist states of the Czech Republic, Estonia, Hungary, Latvia, Lithuania, Poland, Slovakia and Slovenia officially joined the EU family. Mediterranean islands Cyprus and Malta joined them as well, rounding out what is indisputably the world’s biggest single economic bloc, and a fledgling political force, with a total population of 455 million, the EU now surpasses the United States as the world's biggest economy.




Will a global religious system the Roman Catholic Church become the Mystery Babylon spoken of in the bible?


In Revelation 17:1-6 The angel said to John come hither; I will shew unto thee the judgment of the great whore that sitteth upon many waters: With whom the kings of the earth have committed fornication, and the inhabitants of the earth have been made drunk with the wine of her fornication. So he carried me away in the spirit into the wilderness: and I saw a woman sit upon a scarlet coloured beast, full of names of blasphemy. And the woman was arrayed in purple and scarlet colour, and decked with gold and precious stones and pearls, having a golden cup in her hand full of abominations and filthiness of her fornication: And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH.
Face, Eye, Retina, Fingerprint, And Hand Scanning Devices

Here users are provided the opportunity to identify or verify themselves either by biometric identification, ID card or PIN/password.

These units use state of the art 3D imaging technology providing for a secure biometric recognition authentication.

All of the operations of these biometric devices can be accessed from the menu on the touchscreen or keypad.

These devices feature a high definition infrared (IR) camera that enables user identification even in dimly lit environments.

When using a biometric face reader the person looks into the camera, it captures the relative position, size, and shape of the user’s eyes, nose, cheekbones, and jaw which is then used to subsequently verify or identify the user.

These biometric face readers offer lightning quick detection.

That's ideal for areas where a large flux of people have to pass.

They're also capable of recognizing the same face with up to 15 different facial expressions.

So no matter how you look or feel the reader will know that it's you!

In biometric applications, physiological characteristics are extensively used for personal identification. Some of these characteristics have also served forensics and law enforcement. Facial features, friction ridges on fingertips, ear geometry, toe print, teeth pattern, etc. have been historically used in court of law to prove an individual’s presence at crime scenes. Physiological characteristics are unique to an individual and have served as a proven way for positively identification. For example, fingerprints have been used extensively for personal identification in civil as well as law enforcement applications. Technological advancement made it possible to identify and map other physiological and behavioral features that could be leveraged to establish an individual’s identity.

Both retina and facial recognition are categorized as physiological characteristic. Retina recognition is more popular in high security applications where reliability aspect is crucial, while face biometrics is used for mass surveillance as well as personal identification. Many mobile banking and finance application use face biometrics, popularly known as ‘selfie banking’, to identify and authenticate its customers. Though application of retina biometrics has been shrinking and gradually getting outnumbered by iris recognition in recent years, it is still one of the most reliable biometrics. Retina scan requires a very close encounter with the scanning device by using a beam of light deep inside the eye which is considered to be invasive, while iris pattern can be captured with near infrared illumination from a distance which is comparatively safer for human eye. Despite their differences, retina and face biometrics share common objectives: identifying and authenticating people.

Q - Web Map (Deep State Map)


Larger image of the Q - Web Map for printing:     Right click to download here
Link to a pdf file of the Q - Web Map:     Click here

List Of Approximately 200 Articles