The Deliberate Intent To Deceive People Is At An All Time High

Marco Torres

From pollution to politics, the era of deception and duplicity has reached new heights and hijacked almost every form of media in the world. In the last frontiers for truth such as the internet, disinformation operations are in full swing to discredit and destroy any semblance of authentic and factual information available to the public.

How many more lies will people around the world accept as truth? Some say a global awakening is taking place, but at what cost? Will it take the destruction of most of the earth and its resources before people are enlightened?

The escalating media and political reports are so far fetched, cunning, and so beyond reality, it’s as if each is trying to top the other with one sinister plot after the next. To demonstrate the outright lies by national governments and the media, let’s take three examples from the last year alone, including the H1N1 scandal, airport body scanners and the BP oil disaster.

The H1N1 Scandal

Last year, the H1N1 scandal reached its pinnacle in the fall of 2009 when the world united on the internet with a consensus and practical understanding of the World Health Organization’s orchestration to deceive the masses. From radio, internet, television, newspapers, magazines, outdoor posters, signage and promotions, you could not escape the flu hype campaigns so diligently pursued by all the malicious agendas at play who only wanted one thing – to promote a dangerous H1N1 vaccine. After hundreds of reports exposed the criminal activity by all levels of government, we left the same people in power to do it all over again.

According to preliminary reports, another round of pandemic vaccine campaigns are scheduled for the 2010/2011 season and they’re already underway. However, there appears to be a recombination that has changed the H1N1 lab created virus into a more lethal form and it is not a hoax, but it may be yet another CDC lab experiment.

The CDC has recently issued a Health Advisory in connection with two summer outbreaks of H3N2 in Iowa. Other reports from Russia and India indicate that a real epidemic may be upon us if the virus steadily recombines and acquires new genetics. Even though a new strain may have accidentally evolved in eggs, reassortment of H1N1-H5N1 has been a legitimate concern for years. The WHO first suggested the reassortment of H1N1-H5N1 in 2004.

If this is really the case, how will the public react after all the lies from health agencies who have sworn to protect us? Will they hype another vaccine and if so, will the public even respond?

Body Scanners

They’ve been approved all over the world and marketed as the next greatest airport scanning technology. The U.S., U.K., Russia, Australia, Europe and Canada have all installed airport body scanners which have potentially devastating health effects.

Many of these scanners are reportedly using terahertz (THz) waves, the radiation that fills the slot in the electromagnetic spectrum between microwaves and infrared. Evidence suggests that although the forces generated are tiny, resonant effects allow THz waves to unzip double-stranded DNA, creating bubbles in the double strand that could significantly interfere with processes such as gene expression and DNA replication.

As the path toward rolling out wider use of whole-body scanners in U.S. airports ran through the White House, Obama expedited their deployment because the Department of Homeland Security (DHS) and Transportation Security Administration (TSA) didn’t need legislation from Congress to start using the devices at any of the 560 U.S. airports.

The White House ignored all the scientific evidence presented which suggested negative health effects. Politicians and regulatory agencies then covered up the bad publicity on naked body scanners and focused on the presumed benefits under the guise of public safety.

Privacy commissioners and airport authorities have also insisted that there were no risks of images being stored or personal details being revealed to security screeners. Now there’s new evidence to show that the scanners can do just that.

According to a CNET report, another federal agency, the U.S. Marshall’s service, admitted that it had actually stored over 30,000 images recorded by a full-body scanner used at a Florida courthouse.

A watchdog group called the Electronic Privacy Information Center (EPIC) obtained over 100 of the images and states on its web site that, “The images, which are routinely captured by the federal agency, prove that body scanning devices store and record images of individuals stripped naked.” The group has filed a lawsuit to suspend the deployment of body scanners at airports.

EPIC also discovered that the TSA actually specified to manufacturers that the machines have the ability to send and store images. The TSA says that these functions are only for testing and training and insists on its web site that the airport body scanners are delivered to airports with storage and recording functions disabled.

Again, the upper levels of the echelon are caught lying and deceiving, yet they are still left to their own devices to further manipulate and continue misrepresenting facts to the gullible public.

BP Oil Disaster

When news unfolded about the April 20, 2010 BP oil disaster, it went from bad to worse. Instead of immediately mobilizing for action in the face of a massive public health threat, the response was to cover-up, deny and respond with ignorance. After all the public will always believe them, or so they thought.

The Obama administration, Interior Secretary Ken Salazar, U.S. Coast Guard commandant admiral Thad Allen, energy and climate-change policy adviser Carol Browner, BP and all their constituents conspired to deliberately mislead the public from the inception of the disaster to present day. What’s worse is they all agreed to further disseminate toxins in the Gulf by spraying 1.8 to 2 million gallons of the neurotoxin Corexit which was exposed by over a hundred scientists, toxicologists and other experts who have unequivocally classified the irresponsible aerial spraying of the chemical dispersant as a large-scale, uncontrolled non-consensual human and environmental experiment is being conducted in the Gulf region.

The media was grossly censoring the extent of the devastation in the Gulf. The poisons–oil and corexit are destined to spread globally, but honest reporting was and still is restricted, and many independent investigators have been arrested. Read 30 Facts Evidencing that The Gulf Oil Crisis Was Planned.

On June 12, 2010, The Institute of Atmospheric Sciences and Climate (ISAC) released “Risk of Global Climate Change By BP Oil Spill“, a document detailing how the BP spill may cause irreparable damage to the Gulf Stream global climate thermoregulation activity. Read Gulf Loop Current Destroyed: May Lead To Shut Down of Atlantic Thermoregulation, Rapid Cooling.

According to Dr. Gianluigi Zangari, an Italian theoretical physicist, and major complex and chaotic systems analyst at the Frascati National Laboratories in Italy, the Loop Current in the Gulf of Mexico has stalled as a consequence of the BP oil spill disaster. Zangari notes that the effects of this stall have also begun to spread to the Gulf Stream. This is because the Loop Current is a crucial element of the Gulf Stream itself and why it is commonly referred to as the “main engine” of the Stream.

The concern now, is whether or not natural processes can re-establish the stalled Loop Current. If not, we could begin to see global crop failures as early as 2011.

Zangari’s assessment is based on daily monitoring of real-time data oceanographic satellite public data feeds called “Real-Time Mesoscale Altimetry” from the Jason, Topex/Poseidon, Geosat, Follow-On, ERS-2 and Envisat satellites.

These satellite feeds are captured and made publicly available by NASA, NOAA and by the Colorado Center for Astrodynamics Research (CCAR) at the University of Colorado at Boulder.

The CCAR is now being accused of scientific fraud and tampering of data directly associated with the events surrounding the Loop Current phenomenon and its current anomalies. Various reporters have spear-headed the charge including radio personality Dr. Bill Deagle who has featured Dr. Zangari on his radio show The Nutrimedical Report where he detailed the events leading up to the destruction of the Loop Current in the Gulf.

Dr. Zangari has stated that he will no longer use CCAR data due to its unreliability.

Organized and Professional Disinformation Operations

Well-funded and highly-organized disinformation operations are in full-swing throughout the internet. From forums to comment boards and even professional websites that have only one purpose: Defame, distract, and destroy the truth.

However organized, the tactics are very predictable in a world filled with lies and half-truths. This, sadly, includes every day news media, one of the worst offenders with respect to being a source of disinformation.

Disinformation campaigns are launched against those seeking to uncover and expose the truth and/or the conspiracy. The H1N1 scandal was a prime example of how hundreds of operations can be launched to sway opinions on the facts. For every fact-based article on the realities of the H1N1 vaccine, there were both very primitive and sophisticated counters on message boards, comment forums and hundreds of alternative and mainstream websites.

Stephen Barrett’s Quackwatch.com and supporters such as skeptic.org.uk and skepticblog.com are examples of websites who promote both synthetic and organic disinformation on almost any topic that does not concur with mainstream thought.

There are specific tactics which disinfo artists tend to apply, as H. Michael Sweeney has brilliantly detailed. Also included with this material are eight common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive. People can be bought, threatened, or blackmailed into providing disinformation, so even “good guys” can be suspect in many cases.

A rational person participating as one interested in the truth will evaluate that chain of evidence and conclude either that the links are solid and conclusive, that one or more links are weak and need further development before conclusion can be arrived at, or that one or more links can be broken, usually invalidating (but not necessarily so, if parallel links already exist or can be found, or if a particular link was merely supportive, but not in itself key) the argument. The game is played by raising issues which either strengthen or weaken (preferably to the point of breaking) these links. It is the job of a disinfo artist to interfere with these evaluation… to at least make people think the links are weak or broken when, in truth, they are not… or to propose alternative solutions leading away from the truth. Often, by simply impeding and slowing down the process through disinformation tactics, a level of victory is assured because apathy increases with time and rhetoric.

It would seem true in almost every instance, that if one cannot break the chain of evidence for a given solution, revelation of truth has won out. If the chain is broken either a new link must be forged, or a whole new chain developed, or the solution is invalid an a new one must be found… but truth still wins out. There is no shame in being the creator or supporter of a failed solution, chain, or link, if done with honesty in search of the truth. This is the rational approach. While it is understandable that a person can become emotionally involved with a particular side of a given issue, it is really unimportant who wins, as long as truth wins. But the disinfo artist will seek to emotionalize and chastise any failure (real or false claims thereof), and will seek by means of intimidation to prevent discussion in general.

It is the disinfo artist and those who may pull their strings (those who stand to suffer should the crime be solved) MUST seek to prevent rational and complete examination of any chain of evidence which would hang them. Since fact and truth seldom fall on their own, they must be overcome with lies and deceit. Those who are professional in the art of lies and deceit, such as the intelligence community and the professional criminal (often the same people or at least working together), tend to apply fairly well defined and observable tools in this process. However, the public at large is not well armed against such weapons, and is often easily led astray by these time-proven tactics. Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues. For the most part, only the players themselves understand the rules of the game.

Twenty-Five Rules of Disinformation

1. Hear no evil, see no evil, speak no evil.

Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

2. Become incredulous and indignant.

Avoid discussing key issues and instead focus on side issues which can be used to show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

3. Create rumor mongers.

Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

4. Use a straw man.

Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule.

This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run.

In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

7. Question motives.

Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority.

Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb.

No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news.

A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions.

Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

12. Enigmas have no solution.

Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic.

Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions.

Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions.

This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses.

If it does not exist, it is not fact, and you won’t have to address the issue.

17. Change the subject.

Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents.

If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

19. Ignore facts presented, demand impossible proofs.

This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence.

Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.

Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth.

Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions.

If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics.

If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish.

If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Eight Traits of the Disinformationalist

1) Avoidance

They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity

They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental

They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

4) Teamwork

They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial

They almost always have disdain for ‘conspiracy theorists’ and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain. Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions

An odd kind of ‘artificial’ emotionalism and an unusually thick skin — an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial. Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal.

But disinfo types usually have trouble maintaining the ‘image’ and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It’s just a job, and they often seem unable to ‘act their role in character’ as well in a communications medium as they might be able in a real face-to-face conversation/confrontation.

You might have outright rage and indignation one moment, ho-hum the next, and more anger later — an emotional yo-yo. With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game — where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent

There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat ‘freudian’, so to speak, in that perhaps they really root for the side of truth deep within.

I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I’m not aware of too many Navy pilots who don’t have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

Time Constant

There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

• ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT – FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

• When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR – there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to ‘get permission’ or instruction from a formal chain of command.

• In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay – the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues. For the most part, only the players themselves understand the rules of the game.

Brazil Also Violates Civil Liberties

By Luis R. Miranda
The Real Agenda
May 11, 2010

Brazil is well-known by its Samba, wonderful beaches and friendly relaxed people. It is often compared to more developed countries for its size, population and resources. But there is one more way in which Brazil is similar to the so called developed world: It also violates civil liberties. Different from say, the United States or England, police here do not harass citizens that much. However, the violation of their liberties and rights is still done quietly. Brazil is a country with very limited access to information and people here know very little about their rights and duties. This panorama is fertile ground for government abuse and corruption.

The giant of South America has been known to have some of the greatest impunity throughout the years. Corruption runs rampant from north to south and east to west. In a recent survey, it was determined that Brazil is among the first countries in corruption and impunity. Although much of this corruption amounts to politicians providing and receiving large sums of money for political favors, there is more beyond regular bureaucracy corruption. The former Portuguese colony is rapidly adopting globalist measures of population control, much like the United States, England, Australia and New Zealand.

Throughout the last 12 months, a few newspapers have revealed in the back of their pages and in tiny one column articles, the almost compulsory nature of the vaccination campaign against the H1N1 flu, which although it has been proven to be a sham, continues to be implemented countrywide. Fortunately, some people have been made aware of the dangers of the vaccine, and the campaign has not had the results first expected by government health authorities. According to Zero Hora newspaper, only 670,000 elderly got vaccinated instead of the 1.4 million expected in the state of Rio Grande do Sul. Less than 50 percent have taken the regular flu vaccination. However, this does not mean Brazil can escape from the control of the World Health Organization. The vaccinations continue to be carried out for different population groups all over the country.

Brazil also uses a form of fluoride in the water supply, a practice largely adopted for its supposed benefits on people’s teeth, but that has also been found to be pseudoscience. Recently this publication interviewed a head chemist at SEMAE, a government organization that cares for the quality of water in the town of Sao Leopoldo, Brazil. With a Master’s Degree in chemistry, she not only admitted she never saw a study that confirmed the claim fluoride, in any form, is beneficial to people, but also confessed that fluoride is put in the water based on the belief it helps to promote oral health. When asked about the dangers sodium fluoride and substances of the like pose to people, she said she never learned anything about that in college or training courses she attended. In fact, fluoride causes tooth decay, mouth cancer and several neurological disorders in addition to lowering intelligence.

The country is in advanced stages of implementing National Identification Cards as well as using Airport Body Scanners. These last two technologies are already being used or will be in force in less than 10 years. In the case of the radiation emitting body scanners, there are several of them in national and international airports. According to the newspaper Zero Hora, from the state of Rio Grande do Sul, beginning in May 2010, travelers who board planes in the cities of Guarulhos, Rio de Janeiro, Recife and Manaus, may be selected as candidates for walk through one of the full body scanners. This measure is taken even though in more developed countries, the use of the scanners raised concern not only for the radiation they emit, but also due to the fact people’s bodies are seen completely naked in the images the machine generates.

According to many civil rights and privacy groups the use of scanners is a gross violation of privacy laws. The images generated from the scanners are saved in hard drives and kept for further use in surveillance. Although authorities in Brazil deny the capacity of the scanners to provide such images, Angelo Gioia, from the Federal Police in Rio de Janeiro, admitted it is a more invasive method of surveillance. Currently, Brazilian laws allow for searches of people when there are founded suspicions of illegal activities, but do not regulate the use of this kind of scanners. Goia believes there should not be any limits when it comes to security. The cost of every body scanner is $170,000. Body scanning technology operates based on the use of millimeter waves over a body to measure the energy reflected back to render a 3D image.Millimeter wave scanners produce,30 to 300 gigahertz electromagnetic waves, something close to what a cellphone emits. The promoters of Airport Body Scanners always cite the huge benefits they provide in preventing safety hazards such as guns, explosives, etc. But the truth is that a pat down or bomb sniffing dogs are as useful or more accurate. Just as it has been done in other countries, in Brazil the use of this technology is presented as an added convenience, so more people receive it and adopt it willingly. Little is talked about the violation to the right to be private as persons and in our property. Added to the convenience, there is another factor injected in the adoption of the scanners: Fear. The threat of terrorism is the extra ace under the sleeve always ready to be pulled out in case people complain or find the scanners to be an inconvenience.

How much terrorism is there in Brazil? Compared to other countries like Ireland, Israel, Palestine, Pakistan or Great Britain, the answer is: nothing. The country has never suffered a major terrorist attack in modern history. The closest to terrorism are the occasional shootings between drug lords and military police in small neighborhoods of Rio or Sao Paulo. So why does Brazil need the scanners? It does not. As in many other countries, the adoption of this technology is all about submission and loss of liberties. In fact, history shows that the most incredible terror attacks have been of the false-flag kind. Trend forecaster and founder of the Trends Research Institute, Gerald Celente, a notable guest in main stream media outlets such as CNN and NBC, believes 2010 will be the year of multiple government sponsored attacks. “It’s the crash of 2010 as we predicted it,” says Celente. “The global economy collapse in March of 2009 when they inflated the markets with fiat money.” Celente predicted the current crisis, falling stock market, civil unrest in Greece and the collapse of Iceland, Argentina, Portugal, Spain as well as the crisis in the United States and the United Kingdom. “Anyone who believes this kind of stuff is beneficial, deserves what they get.” Gerald Celente warns people on what will happen once this kind of policies are fully implemented. Watch this clip at 5 minutes and 30 seconds.

When it comes to the National Identification Card in Brazil, information about it is very scarce. Most people here visit Federal PolicRFIDe offices all around the country to renew their driver licenses or identification and do not inquire or wonder about the new technology used in those documents. In other countries where it has been implemented, the National ID card is rejected by informed citizens as well as pro privacy groups because it contains all information related to the bearer of the card: Social Security number, physical address and a unique identification number that unlocks a wide variety private information such as bank accounts, savings, workplace, voting record, and so on.

In Brazil, the new National ID Card, provides a unique ID number according to the state the person lives in. In the south, people will have ID’s with a unique 10 digit number, in Brasilia, 7 digits, Sao Paulo 9 digits, and so on. The issuance of the new card will begin in October 2010, and it is estimated that every citizen, naturalized and legal immigrants will be part of the database by 2020. According to technology expert Chris Paget, Radio Frequency Technology, the type used in National ID Cards, has been used for years in credit and checking cards. “There have been hundreds of millions of cards issued with RFID. The problem is that people do not know that technology is contained in the cards, and therefore they don’t do anything to protect it” It sounds strange to say the least, that the technology that is supposed to keep us safe, needs to be protected itself. Right now, anyone with an RFID reader can pin point credit and checking cards and obtain enough information to clone it and use it in a transaction. So, why do countries what to literally count and have such a tight control of their citizenry? Dr. Katherine Albrecht, Founder and Director of CASPIAN Consumer Privacy believes there is a massive push for governments to identify and number all of their citizens, and in the process, use technology created by mega corporations which then, would be in control of personal information such as identification number, banking accounts, social security, pension fund accounts, credit card numbers and so on. “We are seeing this in China, where 1 billion people have been issued National ID Cards with radio frequency devices. They are doing the same in Mexico, 1.2 billion people in India…”

According to historian Daniel Estulin, the use of National ID cards along with other technologies is a push for creating a cashless society. “No more money will be needed, because you will have credit assigned to your identification number. The problem is you are not going to be the one deciding how many credit to put on the card. The government will.” Estulin as well as Albrecht recognize the existence of government databases for jobs, credit and crime, and warn the use of National ID Cards will allow for the creation of a worldwide complete database where everyone will be included.

In Brazil, the issuance of the National ID Card will begin as a pilot project in every region. The card will be similar to a Credit Card, with a chip containing information such as the CPF or Cadastro de Pessoa Fisica, voter registration number, fingerprint, or an iris scanned image which will be accepted by the system known as AFIS or Automatic Fingerprint Identification System. This system is recognized worldwide, and is the one utilized by governments in all 5 continents. The resulting number will be a standardized RG or Registro Geral. With this local, regional and national database, Brazil will be one of the last giants in the planet to succumb to the plan to submit to a global registration program where corporations know each and every human being, no matter where they live.

Sources:

Immigration Proposal Creates National ID Card, fingerprint database

https://realagenda.wordpress.com/2010/05/02/dems’-immigration-proposal-creates-national-id-card-‘fingerprints-database/

A Fluoretacao da Agua: O Maior Caso de Fraude Cientifica do Seculo

https://realagenda.wordpress.com/2010/05/01/a-fluoretacao-da-agua-o-maior-caso-de-fraude-cientifica-do-seculo/

Cnet News

http://news.cnet.com/8301-27083_3-10423199-247.html

Gerald Celente, Trend Forecaster

http://www.youtube.com/watch?v=QVonJr9XvK0&feature=player_embedded#!

Shadow Government Film, RFID

http://www.youtube.com/watch?v=Vfpdbxh-8-o

Shadow Government Full Documentary

http://www.liveleak.com/view?i=56a_1265516934

Zero Hora Newspaper, Friday May 7th, 2010

“Identidade terá novo modelo em outubro.” Page 54

Zero Hora Newspaper, Friday May 7th, 2010

“Aeroportos terao scanner de corpo.” Page 57

Automatic Fingerprint Identification System

http://www.interoptest-berlin.de/pdf/DERMALOG_Company_Profile.pdf

European Health Council Unveils H1N1 Fraud

http://www.associatedcontent.com/article/2664587/health_council_of_europe_unveils_h1n1.html?cat=5

Russia Today. Get Ready for the European Double Dip

http://rt.com/Business/2010-05-07/ready-european-double-dip.html

RFID Reader

http://www.cypress.com/?docID=15592

National ID Card

http://epic.org/privacy/id-cards/

CASPIAN Consumer Privacy

http://www.nocards.org/

Daniel Estulin

http://www.danielestulin.com/el-hombre-tras-los-libros/