Shadow Government: Secret panel can put Americans on “kill list’

American militants like Anwar al-Awlaki are placed on a kill or capture list by a secretive panel of senior government officials, which then informs the president of its decisions, according to officials.

By Mark Hosenball
Reuters
October 6, 2011

There is no public record of the operations or decisions of the panel, which is a subset of the White House’s National Security Council, several current and former officials said. Neither is there any law establishing its existence or setting out the rules by which it is supposed to operate.

The panel was behind the decision to add Awlaki, a U.S.-born militant preacher with alleged al Qaeda connections, to the target list. He was killed by a CIA drone strike in Yemen late last month.

The role of the president in ordering or ratifying a decision to target a citizen is fuzzy. White House spokesman Tommy Vietor declined to discuss anything about the process.

Current and former officials said that to the best of their knowledge, Awlaki, who the White House said was a key figure in al Qaeda in the Arabian Peninsula, al Qaeda’s Yemen-based affiliate, had been the only American put on a government list targeting people for capture or death due to their alleged involvement with militants.

The White House is portraying the killing of Awlaki as a demonstration of President Barack Obama’s toughness toward militants who threaten the United States. But the process that led to Awlaki’s killing has drawn fierce criticism from both the political left and right.

In an ironic turn, Obama, who ran for president denouncing predecessor George W. Bush’s expansive use of executive power in his “war on terrorism,” is being attacked in some quarters for using similar tactics. They include secret legal justifications and undisclosed intelligence assessments.

Liberals criticized the drone attack on an American citizen as extra-judicial murder.

Conservatives criticized Obama for refusing to release a Justice Department legal opinion that reportedly justified killing Awlaki. They accuse Obama of hypocrisy, noting his administration insisted on publishing Bush-era administration legal memos justifying the use of interrogation techniques many equate with torture, but refused to make public its rationale for killing a citizen without due process.

Some details about how the administration went about targeting Awlaki emerged on Tuesday when the top Democrat on the House Intelligence Committee, Representative Dutch Ruppersberger, was asked by reporters about the killing.

The process involves “going through the National Security Council, then it eventually goes to the president, but the National Security Council does the investigation, they have lawyers, they review, they look at the situation, you have input from the military, and also, we make sure that we follow international law,” Ruppersberger said.

Biometrically Identifiable Gesture Technology

If you believe fingerprinting or picture ID’s are invasive forms of technology, wait until you read this.

by Luis R. Miranda
The Real Agenda
July 20, 2011

If you have never seen the documentary Shadow Government, I honestly recommend it. It details the latest information regarding the use of technology to create a global identification system of biblical proportions. In this system that is being built as we wonder “why I have to give my fingerprint to obtain a driver’s license”, every single human being will be accounted for; no exceptions.

The variety of technologies available to effectively identify anyone at work, at the gym, at public events, in Court houses and even at home, is simply mind blowing. However, the producers and buyers of these so-called security enhancing tools do not stop thinking about new ways to get the highest paid contracts from private companies or the government.

The latest example of invasive identification technology is Biometric Signature ID, Inc’s BioSig-ID. According to the manufacturer’s description, BioSig-ID is a “Multi-Factor Identity Proofing Technology”; the best of its kind. This earned the company the trust of a variety of organizations going from sectors such as healthcare, the financial and banking systems, online education, cloud computing, the White House and the Department of Homeland Security.

The BioSig-ID is known for its capacity to gather information such as mouse movement patterns, typing speeds, user gestures, and other personal characteristics to fully identify the person who intends to access information or use a piece of equipment.

Biometric Signature ID announced recently it received approval from the United States Patent and Trademark Office for its latest patent which will be added to the large collection of technology-based identification tools it produces. The BioSig-ID technology collects movements made with various devices such as a mouse, touchscreen markings, fingers and body movements to create a biometric multi-factor password used for identification purposes.

Convenience is the name of the Game

As it often happens, the use of BioSig-ID as well as other invasive technologies, is presented not as a threat to personal privacy, but as a “convenient way to stay safe” or to keep data and information safe. In other examples of privacy violations we encounter the entertainment industry which managed to create products such as video game consoles that record the users movements as a biometric human fingerprint. Kinect, the device that is inside Microsoft’s XBox, allows users to play by just moving their bodies. “The console detects movement and recognizes people through a camera and various sensors installed on the device.” Isn’t that convenient?

Along with video gaming are the infamous full body scanners, which are supposed to keep us all safe from terrorism, but that instead are one of the most invasive forms of technology ever created. The scanners not only render full naked images of the passengers that allow their privacy to be violated -there is an opt out chance- but also bathes them with poisonous doses of radiation. See information on the scanners’ radiation amounts here. Read about full body scanner backscatter radiation here. Learn about radiation flux here.

Creating a need for invasive identification technologies

The amount of biometric-based identification technology production and consumption has increased exponentially in the last decade or so. This does not mean, however, that the use of these technology is so young. Military and technology contractors have been working on ways to fully identify individuals for a long time. In most cases, technology such as the one developed by Biometric Signature ID has been used in highly sensitive places in companies and military installations.

The success of this technology relies on the fact that a market was created -as it happens with many products- to assure its adoption. The evil part is that people’s fear and government policy are also used to push the production and sale of biometric identification. By the time consumers get to know about its existence, it has already been tried and tested for many years. In the case of BioSig-ID, the product was tested initially by The Tolly Group.

As we cited before, many organizations and companies adopt this kind of technologies under the safety excuse. Data safety, information safety, access to premisses safety, web access safety and so on. In the healthcare business, for example, the DEA requires electronic prescription of controlled substances, another failure of the infamous war on drugs. DEA uses this technology to authenticate access to patients’ records.

In the banking and financial markets, both private institutions and government offices use biometric identification to “bring security and safeguard customer information, reduce fraud, etc. It has not worked very well, though, as millions of customer credit card information has been stolen from those very same institutions and neither the hackers nor the banks have been held accountable for endangering the privacy of their customers.

Education has not escaped privacy violation. Both physical and online educational organizations adopted biometric and other invasive identification technologies to “guarantee” the correct accreditation of students as well as for registration and payment controls. Universities and other learning online-based institutions offer classes online which require signing in with more than one fingerprint.

New internet-based services such as Mobile and Cloud computing will pile on the number of consumers and users of Bi0Sig-ID and similar validation tools. As all content migrates to the “Cloud” and the corporations and the government become more empowered by centrally controlling information and how people access it from work or home, biometric identification systems will be key to mandate certified entrance to those “Clouds”. The idea to have a unique internet ID, as it has been proposed by government officials in several countries is suddenly appearing more and more realistic.

And if you are a government employee, as many are nowadays, and more will be in the near future, get ready to give every single piece of information your body emits. In Mexico,  all federal government employees had to submit to biometric identification recognition in order to keep their jobs. All over the world, government implement security protocols that include the use of Government Identity Cards or Credentials to access and manage information.

E-IDs are already available in countries like Hong Kong, Malaysia, Estonia, Finland, Belgium, Portugal, Morocco and Spain.

Target: Global Genocide. The Elite’s Plan Unveiled

by Luis R. Miranda
Video from PrisonPlanet.tv
June 19, 2011

Historian and investigator Webster Tarpley describes what the plans of the Elite are for most of the world’s population. From De-development to depopulation. From the installation of a planetary regime to the use of vaccines to carry out forced sterilization. He takes the plans written  down on John P. Holdren’s book “Ecoscience: Population, Resources, Environment” which is inspired on older writings from Paul Ehrlich and Thomas Malthus. John P. Holdren is the current United States Science and Technology Czar and serves Barack Obama as his science and technology advisor.

The plans stated on John P. Holdren’s book have been laid out in other Elite sponsored writings that originate from organizations such as the Bill and Melinda Gates Foundation, the Rockefeller Foundation, the Club of Rome, the Bilderberg Club, and so on.

If the world were to conduct itself by the teachings that Holdren intends to establish, the result would be global depopulation, hunger, forced sterilization, chip and other device implantation for controlling the people and an overall 360 change in the way humans live, move and use their skills to develop real alternative technologies to deal with issues such as energy, food and health in third world nations as well as for the middle class in developed nations.

The Elite members and their pawns who intend to put these human hating policies in place have made it clear that they will use every resource available to them to carry out their eugenics plan and to rid the planet of the “human scum” so the planet is left for them alone.

The Elite, the Oligarchy will only serve itself, the Oligarchs. For them, there should be the Elite and the Masses, and nothing in between. The masses are useless eaters, animals, whose lives are not worth living. Therefore, such lives must be stopped. Population needs to be cut to a few hundred million. See, the Elite is afraid of a larger population who they will no longer be able to control and who will take the Elite’s place and the resources they have monopolized so far for so many decades.

They have been smart while carrying out their unseen and unfelt genocide. They have used two of the most silent weapons they possessed. Economics and Modern Medicine. Out of sight, out of mind. Vaccinations, pharmaceuticals and medical malpractice kill more people than disease itself. Economic policies imposed on poor and developing nations by the IMF and the World Bank -the creatures of Bretton Woods I- have killed more people than any military conflict we’ve heard about in the 20th century.

The problem for the Elite, though, is that a large part of the world population has awaken to their plan and has begun to see and understand its plan. It is the growing awareness of millions of people around the globe which has prompted the Elite, the Globalists, the Oligarchy, to launch multiple attacks on various nations -militarily in the Middle East and economically in Europe and Latin America- in order to accelerate its plans. Through its military and economic aggression, the Elite intends, for one last time, to absorb the majority of the world’s resources, infrastructure and land before they openly decide to exterminate most of the masses.

If you believe the information presented here is a Conspiracy Theory, an exaggeration of the facts or a misinterpretation of John P. Holdren’s words and thoughts, please do read the book “Ecoscience: Population, Resources, Environment” yourself. In addition, please also take a look at other literature -historical and current- regarding policy that has been implemented or is going to be adopted regarding global issues such as Health, Growth, Development, Population Control and so on.

Please revise the Books and Videos posted below for further research:

Books:

Cognitive Infiltration
by David Ray Griffin

Dumbing us Down
by John Taylor Gatto

Underground History of American Education
by John Taylor Gatto

The Globalization of Poverty and the NWO
by Michel Chossudovsky

Ecoscience: Population, Resources,
Environment
by Paul R. Ehrlich

The Illusion of Disease
by Mike Adams

Callous Disregard
by Dr. Andrew Wakefield

IBM and the Holocaust
by Edwin Black

Videos:

Global Eugenics: Using Modern Medicine to Kill

Endgame: Blueprint for Global Enslavement  from producer Alex Jones

Consuming Kids  by the Media Education Foundation

The Secret of Oz   from Writer and Director Bill Still

We Become Silent: The Last Days Of Health Freedom

For Love of Water   from director Ilena Salinas

The World According to Monsanto    from Marie-Monique Robin

House of Numbers:  Anatomy of an Epidemic  from producer Brent W. Leung

Shadow Government  from producer Grant R. Jeffrey

Inside Job  from producer Charles Ferguson