Академический Документы
Профессиональный Документы
Культура Документы
The Global Watch Weekly Report is a publicaon of Rema Markeng (www.remamarkeng.com) and is published every Friday.
For any queries regarding this service please contact us at admin@remamarkeng.com. ©Rema Markeng 20113. All Rights Reserved.
“The Number one weekly report which
provides concrete evidence of a New World
Order & One World Government agenda”
www.globalreport2010.com
www.globalreport2010.com
Welcome to the Global Watch Weekly Report
The former CIA worker who leaked secret surveillance details to the Guardian is a hero
according to two in five people polled. Edward Snowden, 29, who is currently on the run from the
American authorities, sacrificed himself for the public good according to 41% of respondents. An
Opinium/Observer poll further found that 43% also believe Snowden has done something "brave
and should be heard, not prosecuted".
Last Saturday, in a sign of public support for the American, a demonstration took place outside
the US consulate in Hong Kong. Snowden has not been seen since leaving a hotel there last
Monday. Hundreds marched to the consulate where they delivered a letter addressed to consul
general Steve Young. They also urged the city's government not to extradite Snowden who has
admitted to leaking documents said to show how the US National Security Agency obtained
direct access to the systems of Google, Facebook, Apple and other US internet giants.
A PowerPoint presentation leaked to the Guardian by Snowden appears to show that the
National Security Agency (NSA) access is part of a previously undisclosed program called Prism,
which allows officials to collect material including search history, the content of emails, file
transfers and live chats. The presentation claimed that the program is run with the assistance of
social networking companies, however Facebook and Google have denied knowledge of Prism.
Many of you probably will have some unease dealing with issues of security because inwardly
you already are aware that your personal details are at risk when using social networking sites
and cell phones with locational tracking functionality. Unfortunately feeling uneasy about such
matters does nothing to detract away from the fact that George Orwell's vision of a big brother
society is fully here.
In this edition we take a closer look at the objectives of the NSA under the big brother agenda.
www.globalreport2010.com
The Global Watch Weekly Report is a publicaon of Rema Markeng (www.remamarkeng.com) and is published every Friday.
For any queries regarding this service please contact us at admin@remamarkeng.com. ©Rema Markeng 2011. All Rights Reserved.
D
PRIVACY
Blackberry EXTINCTION
Under the Spotlight
THE PRISM PROGRAM Ed Snowden who is now on the run from Hong
Kong due to the Hong Kong authorities making
As you aware, former CIA contractor Edward statements that they would extradite him back to the
Snowden has carried out one of the biggest leaks in United States, made the following statement
US history, exposing a top-secret National Security regarding the PRISM program.
Agency (NSA) surveillance program to the media.
Leading tech companies were revealed to be “Because even if you’re not doing anything wrong, you’re being
watched and recorded. And the storage capability of these systems
involved in intelligence gathering through PRISM increases every year consistently by orders of magnitude to where
spy tool. PRISM is a top-secret program that allows it’s getting to the point where you don’t have to have done anything
the NSA to directly access the servers of numerous wrong, you simply have to eventually fall under suspicion from
online services and to obtain all kinds of information somebody, even by a wrong call. And then they can use the system
about its users. to go back in time and scrutinize every decision you’ve ever made.
Every friend you’ve ever discussed something with. And attack you
on that basis, to derive suspicion from an innocent life, and paint
anyone in the context of a wrongdoer.”
“And he causes all, the small and the great, and the rich and the poor,
and the free men and slaves, to be given a mark on their right hand
or on their forehead, and he provides that no one can buy or to sell,
except the one who has the mark, either the name of the beast or the
Since the story came out, some services such as number of his name” (Revelation 13:16-17).
Facebook denied any involvement with this
program, stating that the NSA does not have access President Obama assured the American people that
to their servers. The Guardian has however his security services are not listening to your online
published leaked top-secret PowerPoint slides used data and to a degree he is probably right. They are
to trained NSA agents that clearly state that 1- The not actually listening physically, computer
algorithms are doing that for them!
www.globalreport2010.com 4
D
PRIVACY
Blackberry EXTINCTION
Under the Spotlight
The random number generators constantly churn phones and email, governments around the world
out random numbers but appear to be affected by have struggled to maintain their ability to hunt down
situations that have an effect on large groups of criminals and dissidents. As the world went
humans, for instance big disasters. wireless, intelligence gathering agencies have
adapted and upgraded wiretapping skills, and major
The Human Consciousness telecommunications companies have helped them
Project data changed do it. Nokia, Sprint, Ericsson, Facebook, Google –
dramatically from random to think of a business that helps people talk and
non-random when 911 exchange information and you’ll think of a company
occurred and the Tsunami in that has helped law enforcement agencies look
the Philippines happened. through private data in search of the bad guys.
We also have more data Not such a big deal, right? I mean, we all want to
pointing to the potential use hunt down the bad guys. Yet it’s becoming clear
of data for monitoring the future with Clif High’s that not only is the loss of our privacy considered
webbots. For years he has been using analyzed acceptable collateral damage, but giving backdoor
collected social data to help predict future events. access to governments make a business’ data more
The webbot results, although not 100% correct, vulnerable to the bad guys as well.
have some amazing hits. The data from Clif’s
webbots predicted the large Tsunami in the In many areas of the globe, such as the US, UK and
Philippines and even gave the exact number of EU, to name a few, governments may monitor a
fatalities prior to the event. citizen’s communications when they are suspected
of a crime. There are legal/judicial hurdles that must
be cleared for such observations to be installed but
once they are cleared governments are legally
allowed to spy. Such wiretapping has been going on
since before the phone was invented. Now,
however, much of our communication doesn’t pass
through telephone wires but through the servers of
corporate giants like Google. This proved to be both
a hindrance and a large opportunity to information
gathering and law enforcement agencies. They
didn’t have direct access to those lines of
communication, but the new medium allowed for
automated detection and recording. By requiring
companies like Facebook, Google, Sprint, etc. to
The point being made here is that an organization, grant them automated backdoor access to their
like the NSA, with unlimited finances and resources technologies, government agencies all around the
could have possibly taken this research to the next world suddenly had the means to browse through
level and to make use of their new found technology billions of communications.
would require huge amounts of social media data to
analyze. Email subject lines, mobile phone GPS locations,
call histories – all this digital information could be
scanned, sorted, and stored for future use. For
INFORMATION HIGHWAY CONTROL instance, Sprint-Nextel provided US agencies with 8
million requests for cell phone GPS location
Controlling information and spying on citizens were information in 2008-2009 alone – and that’s just one
hallmarks of totalitarian regimes in the 20th century. mobile company. In an interview with Russia Today,
Yet today, even moderate democracies are getting Julian Assange, head of WikiLeaks stated that other
in on the action. In the last decade, as technology companies, such as Facebook, are so
communication has shifted from traditional accessible to US intelligence agencies that they act
landlines, phone calls, and postal service to cell as de facto information gathering sources.
www.globalreport2010.com 5
D
PRIVACY
Blackberry EXTINCTION
Under the Spotlight
DANIELS REVELATION GATHERING PACE In the twentieth century, internet technology opened
a new era by making communication and
But thou, O Daniel, shut up the words, and seal the book, even to the information sharing almost instantaneous. Learning,
time of the end: many shall run to and fro, and knowledge shall be reading an international organization's reports,
increased. Daniel 12:4
researching in a library, getting news, learning
According to these instructions to the Hebrew about technological developments and relevant
prophet Daniel, neither Daniel nor anyone else comments now takes only a few minutes. As a
would be able to correctly interpret any time of the result, comprehensive information collection that
end time prophecies in Daniel 12 related to the end used to take long years of research can now be
times until "the time of the end." This means a new done with a minimum of effort.
message will mark the arrival of the time of the end;
a message that will not only feature things never Today, the explosion of information and technology
heard before, but one that could not have been has reached critical mass, doubling every 10
determined by anyone prior to the time of the end months, with many of the discoveries becoming the
up until now. source of major debates about human ethics, the
boundaries which man should abide by in terms of
not playing “God” and also the impact that new
technologies are having on personal privacy.
www.globalreport2010.com 6
D
PRIVACY
Blackberry EXTINCTION
Under the Spotlight
People are eager to make friends even if some of “The purpose of the SSNA algorithms program is to extend
them could be suspect. It helps them feel connected techniques of social network analysis to assist with distinguishing
potential terrorist cells from legitimate groups of people ... In order
and not isolated, something essential in our 21st to be successful SSNA will require information on the social
century impersonal world. With the avalanche of interactions of the majority of people around the globe. Since the
social networking tools such as Twitter, Linkedin, Defense Department cannot easily distinguish between peaceful
Myspace, Badoo etc the world has truly become a citizens and terrorists, it will be necessary for them to gather data on
global village. innocent civilians as well as on potential terrorists.”
Many U.S. government agencies such as the With globalism now at its peak is the Antichrist
Defense Advanced Research Projects Agency waiting in the wings? Perhaps. Technology will drive
(DARPA), the National Security Agency (NSA), and the final generation. In a sense, it already is.
the Department of Homeland Security (DHS) are Everything in Revelation 13 depends on technology:
currently investing heavily in research involving The electronic money system, electronic control of
social network analysis. The intelligence community the media, electronic control of commerce and even
believes that the biggest threat to the U.S. comes electronic control of the one-world religion. When he
from decentralized, leaderless, geographically enters the scene, the technology infrastructure must
dispersed groups. These types of threats are most first be in place.
easily countered by finding important nodes in the
network, and removing them. To do this requires a
detailed map of the network.
www.globalreport2010.com 7