Вы находитесь на странице: 1из 7

A Weekly Global Watch Media Publicaon (www.globalreport2010.

com) June 21st, 2013

The Global Watch Weekly Report is a publicaon of Rema Markeng (www.remamarkeng.com) and is published every Friday.
For any queries regarding this service please contact us at admin@remamarkeng.com. ©Rema Markeng 20113. All Rights Reserved.
“The Number one weekly report which
provides concrete evidence of a New World
Order & One World Government agenda”

www.globalreport2010.com

This is a FREE report. Please pass this on to


others who you may feel would benefit from this
information. Web site owners please feel free to
give this away to your site visitors or email lists

Not yet on our mailing list? Then visit the web


site link below and sign up to ensure you don't
miss out on these free weekly reports

www.globalreport2010.com
Welcome to the Global Watch Weekly Report
The former CIA worker who leaked secret surveillance details to the Guardian is a hero
according to two in five people polled. Edward Snowden, 29, who is currently on the run from the
American authorities, sacrificed himself for the public good according to 41% of respondents. An
Opinium/Observer poll further found that 43% also believe Snowden has done something "brave
and should be heard, not prosecuted".

Last Saturday, in a sign of public support for the American, a demonstration took place outside
the US consulate in Hong Kong. Snowden has not been seen since leaving a hotel there last
Monday. Hundreds marched to the consulate where they delivered a letter addressed to consul
general Steve Young. They also urged the city's government not to extradite Snowden who has
admitted to leaking documents said to show how the US National Security Agency obtained
direct access to the systems of Google, Facebook, Apple and other US internet giants.

A PowerPoint presentation leaked to the Guardian by Snowden appears to show that the
National Security Agency (NSA) access is part of a previously undisclosed program called Prism,
which allows officials to collect material including search history, the content of emails, file
transfers and live chats. The presentation claimed that the program is run with the assistance of
social networking companies, however Facebook and Google have denied knowledge of Prism.

Many of you probably will have some unease dealing with issues of security because inwardly
you already are aware that your personal details are at risk when using social networking sites
and cell phones with locational tracking functionality. Unfortunately feeling uneasy about such
matters does nothing to detract away from the fact that George Orwell's vision of a big brother
society is fully here.

In this edition we take a closer look at the objectives of the NSA under the big brother agenda.

www.globalreport2010.com

The Global Watch Weekly Report is a publicaon of Rema Markeng (www.remamarkeng.com) and is published every Friday.
For any queries regarding this service please contact us at admin@remamarkeng.com. ©Rema Markeng 2011. All Rights Reserved.
D

PRIVACY
Blackberry EXTINCTION
Under the Spotlight
THE PRISM PROGRAM Ed Snowden who is now on the run from Hong
Kong due to the Hong Kong authorities making
As you aware, former CIA contractor Edward statements that they would extradite him back to the
Snowden has carried out one of the biggest leaks in United States, made the following statement
US history, exposing a top-secret National Security regarding the PRISM program.
Agency (NSA) surveillance program to the media.
Leading tech companies were revealed to be “Because even if you’re not doing anything wrong, you’re being
watched and recorded. And the storage capability of these systems
involved in intelligence gathering through PRISM increases every year consistently by orders of magnitude to where
spy tool. PRISM is a top-secret program that allows it’s getting to the point where you don’t have to have done anything
the NSA to directly access the servers of numerous wrong, you simply have to eventually fall under suspicion from
online services and to obtain all kinds of information somebody, even by a wrong call. And then they can use the system
about its users. to go back in time and scrutinize every decision you’ve ever made.
Every friend you’ve ever discussed something with. And attack you
on that basis, to derive suspicion from an innocent life, and paint
anyone in the context of a wrongdoer.”

For those who understands Bible prophecy, there is


nothing humorous about our government acting like
Big Brother. The Bible warns that in that last days
the Antichrist will have total control of the citizens of
planet Earth. If the NSA PRISM program is not part
of the Beast’s 666-mark system, it will at least be a
prototype of the network he sets-up.

“And he causes all, the small and the great, and the rich and the poor,
and the free men and slaves, to be given a mark on their right hand
or on their forehead, and he provides that no one can buy or to sell,
except the one who has the mark, either the name of the beast or the
Since the story came out, some services such as number of his name” (Revelation 13:16-17).
Facebook denied any involvement with this
program, stating that the NSA does not have access President Obama assured the American people that
to their servers. The Guardian has however his security services are not listening to your online
published leaked top-secret PowerPoint slides used data and to a degree he is probably right. They are
to trained NSA agents that clearly state that 1- The not actually listening physically, computer
algorithms are doing that for them!

However, there is a more sinister intention for


PRISM and it is data collection for use in future
predicative software! They are collecting huge
amounts of social data to tap into the collective
consciousness and see possible future events that
may be a threat to the current power system.

There is now more than enough data, in the public


domain, to prove that there is something we do not
quite understand about the human consciousness
and that it does react to certain situations. A perfect
example is The Human Consciousness Project.
This a global project created by hundreds of
NSA can directly access these servers and 2- Most scientists and physicians who collect data, from
major providers are directly involved in the program. random number generators located worldwide.
The slide above actually show the date when some Their data clearly proves that when the human
of the world leading communication and social consciousness reacts it has an effect on real digital
networking companies joined the PRISM program. communications.

www.globalreport2010.com 4
D

PRIVACY
Blackberry EXTINCTION
Under the Spotlight
The random number generators constantly churn phones and email, governments around the world
out random numbers but appear to be affected by have struggled to maintain their ability to hunt down
situations that have an effect on large groups of criminals and dissidents. As the world went
humans, for instance big disasters. wireless, intelligence gathering agencies have
adapted and upgraded wiretapping skills, and major
The Human Consciousness telecommunications companies have helped them
Project data changed do it. Nokia, Sprint, Ericsson, Facebook, Google –
dramatically from random to think of a business that helps people talk and
non-random when 911 exchange information and you’ll think of a company
occurred and the Tsunami in that has helped law enforcement agencies look
the Philippines happened. through private data in search of the bad guys.

We also have more data Not such a big deal, right? I mean, we all want to
pointing to the potential use hunt down the bad guys. Yet it’s becoming clear
of data for monitoring the future with Clif High’s that not only is the loss of our privacy considered
webbots. For years he has been using analyzed acceptable collateral damage, but giving backdoor
collected social data to help predict future events. access to governments make a business’ data more
The webbot results, although not 100% correct, vulnerable to the bad guys as well.
have some amazing hits. The data from Clif’s
webbots predicted the large Tsunami in the In many areas of the globe, such as the US, UK and
Philippines and even gave the exact number of EU, to name a few, governments may monitor a
fatalities prior to the event. citizen’s communications when they are suspected
of a crime. There are legal/judicial hurdles that must
be cleared for such observations to be installed but
once they are cleared governments are legally
allowed to spy. Such wiretapping has been going on
since before the phone was invented. Now,
however, much of our communication doesn’t pass
through telephone wires but through the servers of
corporate giants like Google. This proved to be both
a hindrance and a large opportunity to information
gathering and law enforcement agencies. They
didn’t have direct access to those lines of
communication, but the new medium allowed for
automated detection and recording. By requiring
companies like Facebook, Google, Sprint, etc. to
The point being made here is that an organization, grant them automated backdoor access to their
like the NSA, with unlimited finances and resources technologies, government agencies all around the
could have possibly taken this research to the next world suddenly had the means to browse through
level and to make use of their new found technology billions of communications.
would require huge amounts of social media data to
analyze. Email subject lines, mobile phone GPS locations,
call histories – all this digital information could be
scanned, sorted, and stored for future use. For
INFORMATION HIGHWAY CONTROL instance, Sprint-Nextel provided US agencies with 8
million requests for cell phone GPS location
Controlling information and spying on citizens were information in 2008-2009 alone – and that’s just one
hallmarks of totalitarian regimes in the 20th century. mobile company. In an interview with Russia Today,
Yet today, even moderate democracies are getting Julian Assange, head of WikiLeaks stated that other
in on the action. In the last decade, as technology companies, such as Facebook, are so
communication has shifted from traditional accessible to US intelligence agencies that they act
landlines, phone calls, and postal service to cell as de facto information gathering sources.

www.globalreport2010.com 5
D

PRIVACY
Blackberry EXTINCTION
Under the Spotlight
DANIELS REVELATION GATHERING PACE In the twentieth century, internet technology opened
a new era by making communication and
But thou, O Daniel, shut up the words, and seal the book, even to the information sharing almost instantaneous. Learning,
time of the end: many shall run to and fro, and knowledge shall be reading an international organization's reports,
increased. Daniel 12:4
researching in a library, getting news, learning
According to these instructions to the Hebrew about technological developments and relevant
prophet Daniel, neither Daniel nor anyone else comments now takes only a few minutes. As a
would be able to correctly interpret any time of the result, comprehensive information collection that
end time prophecies in Daniel 12 related to the end used to take long years of research can now be
times until "the time of the end." This means a new done with a minimum of effort.
message will mark the arrival of the time of the end;
a message that will not only feature things never Today, the explosion of information and technology
heard before, but one that could not have been has reached critical mass, doubling every 10
determined by anyone prior to the time of the end months, with many of the discoveries becoming the
up until now. source of major debates about human ethics, the
boundaries which man should abide by in terms of
not playing “God” and also the impact that new
technologies are having on personal privacy.

A bird’s eye view of the world in 2013 shows that we


are heading rapidly into a full blown surveillance
society. The U.K. probably heads the world in this
effort, but the U.S. is nipping at its heels. Newsmax
online has reported the fact that Barack Obama is
The technological advances of the twentieth eyeing the Internet to ID all Americans. This was
century, especially during its last quarter, and also preceded by the Net Neutrality Act which was the
the twenty first century are without historical first phase of the government monitoring the
precedent. Many technological instruments that internet. White House Cybersecurity Coordinator
were unknown just 100 years ago have become Howard Schmidt says,
"This is the perfect spot in the U.S. government to centralize efforts
integral parts of our lives. The gap between the toward creating an 'identity ecosystem' for the Internet."
technology of the nineteenth century and of today
has reached unimaginable dimensions. Current Privacy groups are alerting that this is an absolute
developments provide important signs regarding the infringement on Americans' rights. The Department
technological advances from which people will of Homeland Security will also help implement this.
benefit in the twenty first century. The Obama administration has back up support
from a United Nations office in Geneva where
Great advances in communication have provided officials from 18 countries voted to staff a working
very rapid communication and information group on the future of something called the “Internet
exchange among all people, regardless of location. Governance Forum”. Since it's a United Nations
Satellite-based telecommunication networking, in backed initiative, there is already reason to be
particular, will provide tremendously rapid concerned. The plan was supported by China and,
communication, and holographic telephones will not without surprise, Iran. So, it has global impact,
introduce a new dimension to communication by not just Obama impact.
projecting a life size holographic image of the
person being called. For good or bad, technology is taking center stage.
It has for 25 years or more. Time magazine's man
Today, computers are improving life quality in of the year for 2010 was Mark Zuckerberg, creator
houses, workplaces, medicine, communication, the of Facebook. This communication tool has taken the
arts, and so on. In the Golden Age, these world by storm. Zuckerberg is worth about $50
developments will accelerate in the socioeconomic billion as a result of a device that helps people
domain on a global basis and bring more comfort to communicate with one another.
humanity.

www.globalreport2010.com 6
D

PRIVACY
Blackberry EXTINCTION
Under the Spotlight
People are eager to make friends even if some of “The purpose of the SSNA algorithms program is to extend
them could be suspect. It helps them feel connected techniques of social network analysis to assist with distinguishing
potential terrorist cells from legitimate groups of people ... In order
and not isolated, something essential in our 21st to be successful SSNA will require information on the social
century impersonal world. With the avalanche of interactions of the majority of people around the globe. Since the
social networking tools such as Twitter, Linkedin, Defense Department cannot easily distinguish between peaceful
Myspace, Badoo etc the world has truly become a citizens and terrorists, it will be necessary for them to gather data on
global village. innocent civilians as well as on potential terrorists.”

Many U.S. government agencies such as the With globalism now at its peak is the Antichrist
Defense Advanced Research Projects Agency waiting in the wings? Perhaps. Technology will drive
(DARPA), the National Security Agency (NSA), and the final generation. In a sense, it already is.
the Department of Homeland Security (DHS) are Everything in Revelation 13 depends on technology:
currently investing heavily in research involving The electronic money system, electronic control of
social network analysis. The intelligence community the media, electronic control of commerce and even
believes that the biggest threat to the U.S. comes electronic control of the one-world religion. When he
from decentralized, leaderless, geographically enters the scene, the technology infrastructure must
dispersed groups. These types of threats are most first be in place.
easily countered by finding important nodes in the
network, and removing them. To do this requires a
detailed map of the network.

One common form of surveillance is to create maps


of social networks based on data from social
networking sites as well as from traffic analysis
information from phone call records such as those
in the NSA call database, and internet traffic data
gathered under the Communication Assistance for
Law Enforcement (CALEA). These social network
"maps" are then data mined to extract useful
information such as personal interests, friendships
& affiliations, wants, beliefs, thoughts, and activities. Whether it's net neutrality, an effort to use the
Internet to ID all Americans, Facebook, Twitter, or
an all-new scheme to come down the pipe to use
the magic of modern day technology to limit
freedoms, stay on guard. We may not be able to
stem the tide of intrusiveness. The Bible talks too
much about such themes as privacy loss under the
rule of Antichrist, but please don't fall under the
spell of "it's predicted, we can't fight it, let's
surrender." As Edmund Burke said,

"All that is necessary for evil to prosper is for good people to do


nothing."

But then there is a price to pay as we have seen


with Edward Snowden.
Jason Ethier of Northeastern University, in his study
of modern social network analysis, said the
following of the Scalable Social Network Analysis
Program developed by the Information Awareness
Office:

www.globalreport2010.com 7

Вам также может понравиться