<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3202151348987908778</atom:id><lastBuildDate>Mon, 30 Mar 2026 11:04:38 +0000</lastBuildDate><title>The &#39;New World Order&#39;</title><description>The Bavarian Illuminati are going to bring in a New World Order. When a real power move is to be made it will be done suddenly. These men have unbelievable power and they have spelled out their agenda in advance.</description><link>https://thecomingnewworldorder.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>529</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-6627389168306632292</guid><pubDate>Fri, 23 Dec 2011 04:06:00 +0000</pubDate><atom:updated>2026-03-07T06:28:06.269-06:00</atom:updated><title></title><description>
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Great Reset&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;b&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM2EWmbx3Ea4LCp8xrEEUWJMaYvezH4tVqt9MyB-NuC8X_qg9L_-pk45JLOH5tfSHP6Hjz1c0OA2_lU9t8y_beYjP-UalqFVUGavpSa8hssWmFixMUNjCoq-ZPOCywwSBBI48ty4e57e_y/s520/Austin+food+bank+REUTERS+TT.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; &quot;&gt;&lt;img alt=&quot;The Coronavirus Covid-19&quot; border=&quot;0&quot; height=&quot;305&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM2EWmbx3Ea4LCp8xrEEUWJMaYvezH4tVqt9MyB-NuC8X_qg9L_-pk45JLOH5tfSHP6Hjz1c0OA2_lU9t8y_beYjP-UalqFVUGavpSa8hssWmFixMUNjCoq-ZPOCywwSBBI48ty4e57e_y/s640/Austin+food+bank+REUTERS+TT.jpg&quot; width=&quot;440&quot;/&gt;&lt;br/&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Economic Shutdown - Food Bank &lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
  
  
  
&lt;b&gt;The New World Order&lt;br&gt;&lt;br&gt; One Possibility!&lt;br&gt;&lt;br&gt;

In regards to the current economic situation, because of last year&#39;s global recession and also the recent economic slowdown a catastrophic global economic crisis has occurred.&lt;br&gt;&lt;br&gt; After the stock market crashed, all of the financial markets were closed for two weeks. Many were in a state of shock! &lt;br&gt;&lt;br&gt;
Hyperinflation, already a concern in Latin America had begun to affect other economies as well. Because of these concerns regarding hyperinflation and the stock market crash there was total chaos, globally! Everyone panicked so much that there was a run on the banks so all of the banks were forced to close. Some have since reopened. The media and the press had 24/7 coverage of all of this on every tv channel.&lt;br&gt;&lt;br&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7ZOMlOVUHw9ylttC17zHcI8Dou2ahNUji7d-XuloXwp0874v1odMJWD61I5KvoV9n0FUPd2Wect9wk7R_WuMMf6p9DPDYqFTEg2b0eOiVXVQrsBnGjs4lrqf7gBeemcdtEDmNGjcwMl5y/s520/money-worthless-than-paper-in-venezuela90+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;
&lt;img alt=&quot;Venezuela Hyperinflation&quot; height=&quot;260&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7ZOMlOVUHw9ylttC17zHcI8Dou2ahNUji7d-XuloXwp0874v1odMJWD61I5KvoV9n0FUPd2Wect9wk7R_WuMMf6p9DPDYqFTEg2b0eOiVXVQrsBnGjs4lrqf7gBeemcdtEDmNGjcwMl5y/s640/money-worthless-than-paper-in-venezuela90+%25282%2529.jpg&quot; width=&quot;420&quot;/&gt;&lt;br/&gt;  
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;One could buy a cup of coffee for a&lt;br&gt;million bolivars in Venezuela 2018&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;
  
  &lt;/b&gt;
&lt;/center&gt;
&lt;/div&gt; Some businesses were forced by the government to temporarily close their doors during which time government employees examined business records to any companies/corporations they wanted. Also, the internet and all social media sites were shut down so they could start a new internet service with only government sanctioned streaming news programs. The reason they said was that it was a necessary evil and we had to accept it. &lt;br&gt;&lt;br&gt;




  
  
  

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA824bWGrmwkpZ9K_rogizEGUfQF1JCpEARW61WNnHNmwuFHiwMnNjv0a0-3rnGpPZ3OWIx2b9U4jARDAxItqniVE3YU0d3xVXS9MQfaanBkI7Q_-CupueiwpWj8pKXcjcvHoSt_LqNrfk/s1600/BB14wyhF+%25281%2529.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;
&lt;img alt=&quot;Government leaders on tvs&quot; height=&quot;315&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA824bWGrmwkpZ9K_rogizEGUfQF1JCpEARW61WNnHNmwuFHiwMnNjv0a0-3rnGpPZ3OWIx2b9U4jARDAxItqniVE3YU0d3xVXS9MQfaanBkI7Q_-CupueiwpWj8pKXcjcvHoSt_LqNrfk/s1600/BB14wyhF+%25281%2529.jpeg&quot; width=&quot;460&quot;/&gt;&lt;br/&gt;
  
    
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Asian News Program Reports On The&lt;br&gt;Global Economic Collapse And Crisis&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;
  
  
  &lt;/b&gt;
    
  &lt;/center&gt;
&lt;/div&gt;

Now they&#39;re telling us on the daily news reports that some sort of global restructuring is going on behind the scenes involving all of the world&#39;s financial markets, economic blocks, and that everything will be okay. The other day we heard they would be implementing a new global cashless system any day now and when this happens we will no longer be able to use cash. Biometric and rfid systems/alternatives are being installed everywhere. Our hands, fingers and retinas were scanned and recorded for this new biometric system. &lt;br&gt;&lt;br&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfTalLKVuSm0zFgMMJLvGVg-uOftr28qr71VVauive_t3svHZjJJOUfIWj1hxMzKFJs0r0kcsoXKgiuTkkfDIi29BiEogoaTVuIoGpEtD0c8ytcb-bc1RutNLDnK4zHK5YqUup5XM6uZM-/s640/4e16da5c67ca77216e569ab4c02c5b41+%25282%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;
&lt;img alt=&quot;Martial Law&quot; height=&quot;330&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfTalLKVuSm0zFgMMJLvGVg-uOftr28qr71VVauive_t3svHZjJJOUfIWj1hxMzKFJs0r0kcsoXKgiuTkkfDIi29BiEogoaTVuIoGpEtD0c8ytcb-bc1RutNLDnK4zHK5YqUup5XM6uZM-/s0/4e16da5c67ca77216e569ab4c02c5b41+%25282%2529.jpg&quot; width=&quot;440&quot;/&gt;&lt;br/&gt;
  
  
     
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;A Common Sight These Days In&lt;br&gt;A Shopping Center Parking lot!&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;
  
  
  
  &lt;/b&gt;
  
  
  &lt;/center&gt;
&lt;/div&gt;



Our newly appointed global leader made his first appearance and he somewhat explained our economic situation. Everyone&#39;s shocked that all of this has so suddenly come to pass after the recent stock market collapse. It&#39;s difficult to believe this is really happening. It&#39;s crazy. Everything that the global president says now becomes the law. NWO banners and slogans are showing up everywhere, throughout every neighborhood, street, and city. Massive tv displays are being installed throughout every region and major city. These are easily visible and are currently displaying the daily news reports. &lt;br&gt;&lt;br&gt;

We all agree martial law has become a reality. U.N. troops, the military police, and the local police have been stationed throughout every city. I never imagined anything like this could happen! Biometric and rfid identification systems are an everyday part of life. Everything&#39;s gone digital overnight. Those who have resisted this new system and are trying to live off the grid are already facing serious problems going about their daily lives. &lt;br&gt;&lt;br&gt;Just recently there were new policies established for the masses regarding those who haven&#39;t gone in and received their biometric identification stating that it&#39;s now considered mandatory!&lt;br&gt;&lt;br&gt; A friend of mine and his family had decided not to be included in the biometric program were on their way to live underground at one of their relatives properties. They were then stopped at one of the many local law enforcement checkpoints. Afterward he and his wife and kids have turned up missing and they haven&#39;t been seen or heard from since. &lt;br&gt;&lt;br&gt;I really hope they haven&#39;t been sent to an internment camp!

&lt;br&gt;&lt;br&gt;Living in a global fascist state!

 
  &lt;br&gt;&lt;br&gt;
  
   &lt;/b&gt;
  
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/a-look-at-fascist-agenda-behind-great.html&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt; 

&lt;/b&gt;

  
  
  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt; George Washington, &amp;nbsp; &quot;It is not my intention to doubt that the doctrine of the Illuminati and the principles of Jacobinism had not spread in the United States. On the contrary, no one is more satisfied of this fact than I am.&quot; &amp;nbsp; &amp;nbsp; -- 1798. &lt;/b&gt;







&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
 


&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Future Of Money: Gearing Up For Central Bank Digital Currency&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCwWq_jtyYhNKVIhjrwyP-v2EaBimGl99NRUbf93k3PeP9qNPP0ZukkQU9k_q7h7S63Q60A_dLUS8ahcWDbxznGhd_RTtxVq1aXSC7EbY5Z29pR9YMXY0xWhvYiY8ZIcAxcb3UfjkRnUfpXKM9r0_UEMb-Wm4fP67OBwDTtrMer94jsfKFSYaGfYGi/s0/digital-currency-dollar.2-810x476.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Central Bank Digital Currency&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339145107006330466&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCwWq_jtyYhNKVIhjrwyP-v2EaBimGl99NRUbf93k3PeP9qNPP0ZukkQU9k_q7h7S63Q60A_dLUS8ahcWDbxznGhd_RTtxVq1aXSC7EbY5Z29pR9YMXY0xWhvYiY8ZIcAxcb3UfjkRnUfpXKM9r0_UEMb-Wm4fP67OBwDTtrMer94jsfKFSYaGfYGi/s0/digital-currency-dollar.2-810x476.jpg&quot; height=&quot;310&quot;  width=&quot;490&quot;  /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;IMF speech made on February 9, 2022&lt;BR&gt;&lt;BR&gt;

Let me start by thanking the Atlantic Council for providing a fitting venue to discuss central banks’ forays into Digital Currencies.&lt;BR&gt;&lt;BR&gt;

Since its founding in 1961, the Council has made important contributions to strategic, political, and economic policy debates. Those debates have served us well, helping us to test the boundaries of our thinking and be better prepared for what lies ahead.
&lt;BR&gt;&lt;BR&gt;
So, today, we aim to test our thinking again. We have moved beyond conceptual discussions of CBDCs and we are now in the phase of experimentation. Central banks are rolling up their sleeves and familiarizing themselves with the bits and bytes of digital money.&lt;BR&gt;&lt;BR&gt;

These are still early days for CBDCs and we don’t quite know how far and how fast they will go.  What we know is that central banks are building capacity to harness new technologies—to be ready for what may lie ahead.
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/the-future-of-money-gearing-up-for.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;

  
  
  
  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 

&quot;In the next century, nations as we know it will be obsolete; all states will recognize a single, global authority.&quot;  &amp;nbsp; &amp;nbsp;   Strobe Talbot, Deputy Secretary of State, TIME, l992  &lt;/b&gt;





&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  




&lt;b&gt;&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Goal Of The Illuminati Is A &#39;New World Order&#39;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjabGbrPqMUClfhj18Y_E9b70xk-bj16uRYDGYKD69mgX2Jri_i1tKo6dHnfk86kPrMg8MdDRT-XZNKBxIFvonObpZchuukG-lpuYOlbNXns_ull58qqcibydPZwnbG9e4ObXK4SLW6uICb/s1600/hqdefault2qqaa.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The Eye On The Illuminati&quot; border=&quot;0&quot; height=&quot;340&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjabGbrPqMUClfhj18Y_E9b70xk-bj16uRYDGYKD69mgX2Jri_i1tKo6dHnfk86kPrMg8MdDRT-XZNKBxIFvonObpZchuukG-lpuYOlbNXns_ull58qqcibydPZwnbG9e4ObXK4SLW6uICb/s1600/hqdefault2qqaa.jpg&quot; width=&quot;470&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;The Illuminati&#39;s &#39;Eye In The Triangle&#39;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;





&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGUE83mJe9H6ihTOoF3JTsU8wuGvkNiuPiJi1o9yj8XXH9qA9-XnnNLFSXaX5X6OZW-FOMXMZC5dn2VlOCUb9Shkl5uVGJ-mMqGhEZav-_j2tONYEPxx8pHmTc32YhAnAEPtcABY36apV6/s1600/assaas.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;
&lt;img alt=&quot;Bohemian Grove Owl Shrine&quot; height=&quot;470&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGUE83mJe9H6ihTOoF3JTsU8wuGvkNiuPiJi1o9yj8XXH9qA9-XnnNLFSXaX5X6OZW-FOMXMZC5dn2VlOCUb9Shkl5uVGJ-mMqGhEZav-_j2tONYEPxx8pHmTc32YhAnAEPtcABY36apV6/s640/assaas.jpg&quot; width=&quot;450&quot; /&gt;&lt;br /&gt;
  
       
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Bohemian Grove - Owl Shrine. &amp;nbsp; Where&lt;BR&gt;powerful men go to meet once yearly.&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;
  
  
  &lt;/b&gt;
  
  &lt;/center&gt;
&lt;/div&gt;









&lt;b&gt;&lt;b&gt;The perception is that our day-in day-out world is real. &lt;BR&gt;&lt;BR&gt;The truth is that this world is a hoax, an elaborate deception spun by an all-powerful Illuminati controlled secret society presided over by the global elite.&lt;BR&gt;&lt;BR&gt;




The Illuminati call the shots in every major upheaval that they cause. &lt;BR&gt;&lt;BR&gt;Their sphere of activity extends over the entire globe. &lt;BR&gt;&lt;BR&gt;Their ambition and greed for wealth and power knows no bounds. &lt;BR&gt;&lt;BR&gt;It is also their target to depopulate the globe and maintain a much lower population compared to what we have now.

&lt;BR&gt;&lt;BR&gt;




There are certain methods of subjugation and control which are indispensable to the Illuminati.&lt;br /&gt;&lt;br&gt; One is, of course, complete authority over all financial systems, especially borrowing and lending. &lt;br /&gt;&lt;br&gt;With all banks under their direct supervision. &lt;BR&gt;&lt;BR&gt;At the highest level the World Bank decides the fate of countries.&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;&lt;BR&gt;








&lt;b&gt;&lt;b&gt;And it is an interesting and amazing fact that both the Federal Reserve Bank and the Bank of England are controlled by these Illuminati dynasties, in spite of the names of these banks. &lt;br /&gt;&lt;br&gt;It has been said that both Abraham Lincoln and John F. Kennedy wanted to change this system.  &lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;br&gt;


&lt;/b&gt;
&lt;b&gt;When A Real Power Move Is To Be Made It Will Be Done Suddenly!&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;


&lt;b&gt;If you want to bring about a &quot;New World Order&quot;, you must first crash the current system.&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4i0_3Inxn2reEKshwrUwPzwSrJwY6QzxaEQR9Cb5nd4PHj7EXhyphenhyphen15xtzKW6JifvV-rjErXvf-YXnkIu7BetL7benxICeXuTifgEGveR1DHZ_ntdEhTU6xF-IEMoA2E589tgK-Du5Tg1O/s1600/King-World-News-Greyerz-This-Is-A-Snapshot-Of-The-Terrifying-Collapse-The-World-Will-Endure-864x400_c.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;
&lt;img alt=&quot;The Sinking Dollar&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF4i0_3Inxn2reEKshwrUwPzwSrJwY6QzxaEQR9Cb5nd4PHj7EXhyphenhyphen15xtzKW6JifvV-rjErXvf-YXnkIu7BetL7benxICeXuTifgEGveR1DHZ_ntdEhTU6xF-IEMoA2E589tgK-Du5Tg1O/s640/King-World-News-Greyerz-This-Is-A-Snapshot-Of-The-Terrifying-Collapse-The-World-Will-Endure-864x400_c.jpg&quot; width=&quot;485&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span st5le=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Their Goal Is To  Collapse &amp; Sink The Dollar&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;


&lt;b&gt;The Illuminati will never allow their global hegemony to be destroyed.&lt;br /&gt;&lt;br&gt; The expression of this global control has been the US dollar.&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;They will trigger a global fiat currency meltdown.&lt;br /&gt;&lt;br&gt; All fiat currencies will be attacked and will collapse. &lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;The last currency to collapse will be the US dollar.&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;They will then bring in a One World Digital Currency under the purview of a World Government.&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;There&#39;s going to be a somewhat prepared response for any controlled opposition, but the need for this is going to be relatively limited since there&#39;s not going to be a realistic threat to these Illuminati and their plans.



&lt;/b&gt;&lt;/b&gt;
  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 
&quot;We shall have world government whether or not you like it, by conquest or consent.&quot;  &amp;nbsp; &amp;nbsp;  James Warburg to The Senate Foreign Relations Committee, l950   &lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
  



&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;THEY LIVE - The Movie&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGUOLdYXg9c-nJ3N5EphLh6yOUgs3DS8X8zkqzAvoR8EqF5ct5spn9BfFgS4VeUasV15QmgxISKqdWVG-T-cQoo4hsEpqgPo9V_ft3S36QmBgKTxs8YTVGLs_4qrhQwpyZKbsrhVJACiaC/s1600/223322a.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Book Page From The Movie &#39;They Live&#39;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGUOLdYXg9c-nJ3N5EphLh6yOUgs3DS8X8zkqzAvoR8EqF5ct5spn9BfFgS4VeUasV15QmgxISKqdWVG-T-cQoo4hsEpqgPo9V_ft3S36QmBgKTxs8YTVGLs_4qrhQwpyZKbsrhVJACiaC/s1600/223322a.jpg&quot;   height=&quot;255&quot; width=&quot;473&quot; /&gt;&lt;/a&gt;&lt;/center&gt; &lt;/div&gt;
&lt;b&gt;&#39;They Live&#39; is a 1988 American science fiction horror film written and directed by John Carpenter. The film stars Roddy Piper, Keith David and Meg Foster. It follows a nameless drifter (called &quot;John Nada&quot; in the credits), who discovers the ruling class are in fact concealing their appearance and manipulating people to spend money, breed, and accept the status quo with subliminal messages in mass media. Based on Ray Nelson’s short story Eight O’Clock in the Morning, the movie is one of those rare subversive stories that forces viewers to question their world and their surroundings.&lt;br /&gt;&lt;br /&gt;
 Right from the beginning, as we see Nada walking around Los Angeles with his backpack, the movie sets a particular mood: Something is not quite right. While Nada appears to be a happy-go-lucky kind of guy, the city is not happy and it is not too kind to happy-go-lucky kind of guys. Quite the contrary, there is a sense of impending doom in the air: Poverty is rampant, helicopters fly around the city and street preachers speak of soulless beings ruling the world.&lt;/b&gt;



&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9DZvFeotE8VPvx9ckDuWSfg4a2aaFMhPbgaH2xXuuOMrP5jFY55ZCXqKQU4LCYEnd_OqVJq5i8DH8uYJqnnhFef0OsT9KL9ze92eBBSKedceeWbnS9JzF_-DID_zBzwsdHfeEviupRfpT/s1600/They-Live-They-live-Glasses-2a.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Roddy Piper As John Nada, Movie &#39;They Live&#39;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9DZvFeotE8VPvx9ckDuWSfg4a2aaFMhPbgaH2xXuuOMrP5jFY55ZCXqKQU4LCYEnd_OqVJq5i8DH8uYJqnnhFef0OsT9KL9ze92eBBSKedceeWbnS9JzF_-DID_zBzwsdHfeEviupRfpT/s1600/They-Live-They-live-Glasses-2a.jpg&quot;  height=&quot;225&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&quot;Rowdy&quot; Roddy Piper As John Nada&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt; A preacher’s description of the &quot;masters&quot; is applicable to the Illuminati.


  
&lt;br /&gt;&lt;br /&gt;

 Seeking shelter Nada enters an empty church and discovers a hidden box. In an alley, he opens the box and finds dozens of sunglasses. Taking one, he hides the box of remaining sunglasses in a garbage can.
&lt;br /&gt;&lt;br /&gt;
Nada discovers the sunglasses have unique properties. After putting on a pair, he sees the world in black and white and discovers it is not what it seems. Media and advertising hide constant subliminal totalitarian commands to obey and conform. When viewing those of wealth and authority Nada discovers they&#39;re not human.
&lt;br /&gt;&lt;br /&gt;
When he has his sunglasses on, Nada sees through the smoke and mirrors projected by advertisement and mass media. He only sees the core of their message and the only reason why they exist. No matter which magazine Nada flips open, he sees the same subliminal messages, which tells a lot about the true function of &quot;celebrity&quot; and &quot;fashion&quot; magazines. Despite the fact that they are all different, they all ultimately serve the same purpose: To reinforce messages from the elite to the masses.
&lt;br /&gt;&lt;br /&gt;
We’re living in two worlds, you and I.
&lt;br /&gt;&lt;br /&gt;
There’s the world we see (or are made to see) and then there’s the one we sense (and occasionally catch a glimpse of), the latter of which is a far cry from the propaganda-driven reality manufactured by the government and its corporate sponsors, including the media.

Indeed, what most people perceive as life in  a privileged, progressive and free society — is a far cry from reality, where economic inequality is growing, real agendas and real power are buried beneath layers of Orwellian doublespeak and corporate obfuscation, and &quot;freedom,&quot; such that it is, is meted out in small, legalistic doses by militarized police armed to the teeth.
&lt;br /&gt;&lt;br /&gt;
All is not as it seems.&lt;/b&gt;

  
  
  
  
  
  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; &quot;The invisible Money Power is working to control and enslave mankind. It financed Communism, Fascism, Marxism, Zionism, Socialism. All of these are directed to making the United States a member of a World Government ...&quot; &amp;nbsp; &amp;nbsp;  —American Mercury magazine, December 1957 &lt;/b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;The NWO Dictator&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; 
&lt;BR&gt;&lt;BR&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjPX2wqPcLBWCXgpXxwE3DJX5jDeIM-sMND8mBejV5QVCSx5ChvLin7OcU0CsizlRGXMdHwPoQCrsLR5EdBMH6OeUoNSDH0mZ0CxePvjoAvIhSl9d6BQhUp8RcZSGdiHV6op_sKYqinRT0/s1600/the_grand_master666a.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em;   margin-left: 1em;  &quot;&gt;&lt;img alt=&quot;The NWO Dictator/Antichrist&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjPX2wqPcLBWCXgpXxwE3DJX5jDeIM-sMND8mBejV5QVCSx5ChvLin7OcU0CsizlRGXMdHwPoQCrsLR5EdBMH6OeUoNSDH0mZ0CxePvjoAvIhSl9d6BQhUp8RcZSGdiHV6op_sKYqinRT0/s1600/the_grand_master666a.jpg&quot; width=&quot;529&quot; height=&quot;335&quot;/&gt;&lt;br&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;font color=&quot;#000000&quot;&gt;
The &quot;Son of Perdition&quot;, &quot;Antichrist&quot;, &lt;br&gt;
&quot;Beast&quot;, &quot;Man of Sin&quot;, &quot;NWO Dictator&quot;&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

 &lt;b&gt;It is a fact that advocates of the New World Order will attempt to fulfill the world&amp;#8217;s messianic expectations with an antichrist.
   
   
   
   2nd Thessalonians 2:3-4 tells us that the last days will not come until &amp;#8220;the man of sin is revealed, the son of perdition,&amp;#8221; commonly called the Antichrist. 
   

  &lt;BR&gt;&lt;BR&gt;
  
  
  He will sit in the Temple in Jerusalem and demand to be worshipped as God. 2nd Thessalonians 2:8 He is also called &amp;#8220;the beast,&amp;#8221; in the Book of Revelation. This tyrannical world dictator will be empowered by Satan and be the embodiment of all that is opposed to God. 
&lt;br&gt;&lt;br&gt;
   
   Like Hitler the antichrist will &quot;have a mouth that will speak very great things, and his look will be more imposing than his fellows.&quot; He will think to change times and laws and is referred to as &quot;The King of fierce countenance&quot; who shall &quot;have an understanding of dark sentences.&quot; Daniel 7:20, 25; 8:23 Because of this man all, both small and great, rich and poor, free and slave, will be forced to receive a mark on their right hand or on their foreheads, so that no one may buy or sell except one who has the mark, or the name of the beast, or the number of his name. Rev 13:16-17&lt;br&gt;&lt;br&gt;This man will come on the scene and will offer to lead the world into total peace.  He will be recognized throughout the world as a man of peace.  He will promise to solve the Middle East conflict.  He will bring harmony in the ecumenical-ecclesiastical church.  He will offer economic solutions to the world&#39;s problems.  He will arise as a world leader of peace and prosperity and reign exactly three and a half years as the world&#39;s greatest dictator.&lt;br&gt;&lt;br&gt;

Beware of when this man appears on the world scene.  His leadership will take the world into a Great Tribulation of terror, wars, suffering and death.

  
  &lt;BR&gt;&lt;BR&gt;
  
  Woe to the idol shepherd that leaveth the flock! &amp;nbsp;  The sword shall be upon his arm, and upon his right eye:   his arm shall be clean dried up, and his right eye shall be utterly darkened. &amp;nbsp; Zechariah 11:17 
&lt;/b&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/the-antichrist.html&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;


  


  
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; &quot;The growth of financial capitalism made possible a centralization of world economic control and use of this power for the direct benefit of financiers and the indirect injury of all other economic groups.&quot; &amp;nbsp; &amp;nbsp; -David Rockefeller 


&lt;/b&gt;



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  

  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The  Illuminati  &#39;New World Order&#39;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
  
  &lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;

&lt;a href=&quot;http://3.bp.blogspot.com/-vCp1zNY_DRw/UWnzD5gOIHI/AAAAAAAAJps/kQ9eGfyc9hQ/s1600/pics_19__1365897761_99.111.85.107.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;392&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;http://3.bp.blogspot.com/-vCp1zNY_DRw/UWnzD5gOIHI/AAAAAAAAJps/kQ9eGfyc9hQ/s1600/pics_19__1365897761_99.111.85.107.jpg&quot; width=&quot;272&quot;/&gt;&lt;b&gt;&lt;center&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;1930&#39;s Great Depression. &lt;br/&gt;Soup Kitchen and Bread Line&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/center&gt;
  &lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;(A NWO World Wide Government Accompanied By A Solitary World Bank And A Single World Religion.) &amp;nbsp; &amp;nbsp; (The NWO Will Have A Mapped Out Strategy And A Strategic Plan To Implement The Use Of RFID Microchips, Biometric Access Systems, Biometric Collection Devices - Handheld Scanners And Cameras, Biometric Databases, Unlimited Government Access To Data, Data Mining, Unmanned Drones, Travel Restrictions, Surveillance Cameras, Pre-Crime Surveillance, And Militarized Police.) &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-GZZufpiporA/UWny0Fz8q9I/AAAAAAAAJpk/KXqkImut1Vc/s1600/b3c6a9e036e6c356272b946e2e27b6d8__1365897748_99.111.85.107.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;http://2.bp.blogspot.com/-GZZufpiporA/UWny0Fz8q9I/AAAAAAAAJpk/KXqkImut1Vc/s1600/b3c6a9e036e6c356272b946e2e27b6d8__1365897748_99.111.85.107.jpg&quot; width=&quot;268&quot;/&gt;&lt;table style=&quot;width: 268px;&quot; valign=&quot;center&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td width=&quot;268&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;On October 29, 1929, The  Stock Market Crashed. Will it happen again? Will the world this time be rescued by and come under the control of a madman?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
  &lt;/a&gt;&lt;/center&gt;&lt;/div&gt;




&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-2ZP8J6RD0FY/UWoEk6QqUeI/AAAAAAAAJqM/HA-CW111On8/s1600/pierre2.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;http://2.bp.blogspot.com/-2ZP8J6RD0FY/UWoEk6QqUeI/AAAAAAAAJqM/HA-CW111On8/s1600/pierre2.jpg&quot; width=&quot;268&quot;/&gt;&lt;table style=&quot;width: 268px;&quot; valign=&quot;center&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td width=&quot;268&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;The NYSE. The world&#39;s largest stock exchange market. US stocks plunge amid Wall Street crisis - 29 Sept 08.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/a&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-FbwhNP68PTg/UWnyYFRPHDI/AAAAAAAAJpU/ZIAfEilLiIc/s1600/20081013_400232__1365897719_99.111.85.107.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;http://2.bp.blogspot.com/-FbwhNP68PTg/UWnyYFRPHDI/AAAAAAAAJpU/ZIAfEilLiIc/s1600/20081013_400232__1365897719_99.111.85.107.jpg&quot; width=&quot;268&quot;/&gt;&lt;center&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Time Magazine 13 Oct. 2008&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
  &lt;/a&gt; &lt;/center&gt;&lt;/div&gt;&lt;b&gt;
&lt;br/&gt;
The rise of the one-world government is beginning to take its shape as early as now.&lt;br/&gt;&lt;br/&gt; Its form is hidden in the emerging New World Order. &lt;br/&gt;&lt;br/&gt;The New World Order is being established by the Elite of the Elites and consists of the Fourth Reich of the SuperRich/the Lords of Money/the International Bank Cartels/the Secret Societies/the Brotherhood and the Order/the Committee of the 300 Billionaires of the World including the Power Elite of 13 Old Line Families through the years.
&lt;br/&gt;&lt;br/&gt;This group envisions a one world banking system and currency that will give in to a cashless computer financial system, one world centralized control of global population, global control of the world&amp;#8217;s environment, economy, trade and army.&lt;br/&gt;&lt;br/&gt;They have already made a giant step. The year was 1945, when they drafted and created the United Nations.&lt;br/&gt;&lt;br/&gt;
These men have unbelievable power and they have spelled out their agenda in advance.&lt;br/&gt;&lt;br/&gt; That global agenda is constructed around six goals. &lt;br/&gt;&lt;br/&gt;The method by which these are going to be brought about will most likely be either a GLOBAL DEPRESSION,  THIRD WORLD WAR, or MAYBE BOTH.&lt;br/&gt;&lt;br/&gt;Goal #1 : The establishment of international economic order (cashless society)
&lt;br/&gt;&lt;br/&gt;
Goal #2: The establishment of a one-world government
&lt;br/&gt;&lt;br/&gt;
Goal #3 : The conquest and subjugation of two super powers (USA and USSR)
&lt;br/&gt;&lt;br/&gt;
Goal #4: The ascension of the United States of Europe as the dominant nation in a Confederated one-world government
&lt;br/&gt;&lt;br/&gt;
Goal #5: The ushering in of a supreme world leader to preside over the new unified one-world government
&lt;br/&gt;&lt;br/&gt;
Goal #6 : The establishment of a one-world religion which will coordinate all the world&amp;#8217;s religions, cults, faith groups and spiritual beliefs under the guidance of Supreme Pontiff
&lt;/b&gt;

&lt;br/&gt;
&lt;br/&gt;

&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2025/04/the-rise-of-new-world-order-rise-of-one.html&quot;  target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;

&lt;/b&gt;

  
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;




&lt;b&gt;  &quot;It&#39;s Necessary To Establish A Universal Regime And Empire Over The Whole World ....&quot; &amp;nbsp; &amp;nbsp;  Adam Weishaupt Founder Of The Bavarian Illuminati 

&lt;/b&gt;

  





&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  
  

  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Police Drones Are Starting To Think For Themselves&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFe8eacloFhAxc9iaJYMCmQ10cE0e7J2Q1QjVKObiL9xp6COyUrweZKNNMGCy9MoKMGt4EG3Lbp-H06BUFEwHTu4FKB8jSklGLYKQnjtC67NHsvpJBB9TlX19b3q3rPT1XKDImiX6mXx_TH8GvkfNeEmFlZulkBtkCrzSITK1hBIvRUgOkV7LR1pb8TdE/s1600/GettyImages2249580888-36a34469-935e-4958-8afd-29e06dee5f65.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;316&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFe8eacloFhAxc9iaJYMCmQ10cE0e7J2Q1QjVKObiL9xp6COyUrweZKNNMGCy9MoKMGt4EG3Lbp-H06BUFEwHTu4FKB8jSklGLYKQnjtC67NHsvpJBB9TlX19b3q3rPT1XKDImiX6mXx_TH8GvkfNeEmFlZulkBtkCrzSITK1hBIvRUgOkV7LR1pb8TdE/s1600/GettyImages2249580888-36a34469-935e-4958-8afd-29e06dee5f65.jpg&quot; width=&quot;525&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
When the Chula Vista police receive a 911 call, they can dispatch a flying drone with the press of a button.
&lt;br&gt;&lt;br&gt;
On a recent afternoon, from a launchpad on the roof of the Chula Vista Police Department, they sent a drone across the city to a crowded parking lot where a young man was asleep in the front seat of a stolen car with drug paraphernalia on his lap.
&lt;br&gt;&lt;br&gt;
When the man left the car, carrying a gun and a bag of heroin, a nearby police car had trouble following as he sprinted across the street and ducked behind a wall. But as he threw the gun into a dumpster and hid the bag of heroin, the drone, hovering above him, caught everything on camera. When he slipped through the back door of a strip mall, exited through the front door and ran down the sidewalk, it caught that, too.
&lt;br&gt;&lt;br&gt;
Watching the live video feed, an officer back at headquarters relayed the details to the police on the scene, who soon caught the man and took him into custody. Later, they retrieved the gun and the heroin. And after another press of the button, the drone returned, on its own, to the roof.
  &lt;br&gt;&lt;br&gt;
Each day, the Chula Vista police respond to as many as 15 emergency calls with a drone, launching more than 4,100 flights since the program began two years ago. Chula Vista, a Southern California city with a population of 270,000, is the first in the country to adopt such a program, called Drone as First Responder.&lt;/b&gt;
 &lt;br /&gt;
&lt;br /&gt;&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2010/01/police-drones-are-starting-to-think-for.html&quot;  target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt; &lt;/b&gt;

  
  


  

  
  
 
  
 
 


  
  


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; &quot;Let me control a peoples currency and I care not who makes their laws...&quot; &amp;nbsp; &amp;nbsp;  Meyer Nathaniel Rothchild in a speech to a gathering of world bankers February 12, 1912. The following year, we subscribed to the &quot;services&quot; of the newly incorporated Federal Reserve, headed by Mr. Rothchild. &lt;/b&gt;   




&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br/&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br/&gt;
&lt;br/&gt;
&lt;br/&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Illuminati Arrive In America - 1785&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;



&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfBE67BVr1m6k8hrnwtV-kmMvDG4sORqeA8j1oMfYIJha1yP5WaQ99yzn4FlpOwhZEQbm60zda5aDoLQ88_ddDOkQBB4E5FeRLobK-Z5-VH3KCnqnulsq-p9TSaoGCFMpc7iIcwQvbrD64/s1600/imagesa433.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;
&lt;img alt=&quot;The New World Order&quot; height=&quot;199&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfBE67BVr1m6k8hrnwtV-kmMvDG4sORqeA8j1oMfYIJha1yP5WaQ99yzn4FlpOwhZEQbm60zda5aDoLQ88_ddDOkQBB4E5FeRLobK-Z5-VH3KCnqnulsq-p9TSaoGCFMpc7iIcwQvbrD64/s1600/imagesa433.jpg&quot; width=&quot;680&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;George Washington concerning the Illuminati&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;(George Washington (1732-1799) Founding Father, 1st US President, &#39;Father of the Country&#39;. &amp;nbsp; &amp;nbsp; He spoke of the Illuminati in a letter written to the Reverend G. W. Snyder (24 October 1798). &amp;nbsp; &amp;nbsp;  He said:  &quot;It is not my intention to doubt that the doctrines of the Illuminati and the principles of Jacobinism had not spread to the United States. &amp;nbsp; &amp;nbsp; On the contrary, no one is more fully satisfied of this fact than I am&quot;.) &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;br /&gt;
Washington issued several warnings shortly before his death, about the Illuminati. Washington knew that the Illuminati, based in Europe, had arrived on American shores.&amp;nbsp; In 1789; John Robison, a Scottish scientist warned all Masonic leaders in America that the Illuminati had infiltrated into their lodges and on July 19, 1789; David Papen, President of Harvard University, issued the same warning to the graduating-class and lectured them on how Illuminism was having an influence on American politics and religion, and to top it off; John Quincy Adams, who had organized the New England Masonic Lodges, issued his warnings.&lt;/b&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;

&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxRShec1M9ohSyVfJX-IurwpxC_wbvNIs0h__UW0EmHKTtR156uyEyz3RhZt3eQkEvCG75lTUOMrsBJdUpVCe1epUT_MKLAXOhSY82bkYLYma0MenP0QSZMn8xe1iOBYX767H1BUc01Vr_/s1600/eyeill.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;New World Order Illuminati&quot; border=&quot;0&quot; height=&quot;320&quot; id=&quot;BLOGGER_PHOTO_ID_5471620430165957026&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxRShec1M9ohSyVfJX-IurwpxC_wbvNIs0h__UW0EmHKTtR156uyEyz3RhZt3eQkEvCG75lTUOMrsBJdUpVCe1epUT_MKLAXOhSY82bkYLYma0MenP0QSZMn8xe1iOBYX767H1BUc01Vr_/s1600/eyeill.jpg&quot; width=&quot;448&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;


&lt;b&gt; In 1785, the Columbia Lodge of the Illuminati was established in New York City. Among its members were Governor DeWitt Clinton, Horace Greeley (politician and editor of the New York Daily Tribune), Charles Dana, and Clinton Roosevelt (the ancestor of Franklin D. Roosevelt). Roosevelt wrote a book called Science of Government Founded on Natural Law, in which he wrote:

&quot;There is no God of justice to order things aright on earth, if there be a God, he is a malicious and revengeful being, who created us for misery.&quot;
He referred to himself and other members as the &quot;enlightened ones,&quot; and said that the U.S. Constitution was a &quot;leaky vessel&quot; which was &quot;hastily put together when we left the British flag,&quot; and therefore needed revision.
&lt;br /&gt;&lt;br /&gt;
In 1786, a lodge was started in Portsmouth, Virginia, where allegedly, Thomas Jefferson was a member; followed by fourteen others in different cities of the thirteen colonies.
&lt;br /&gt;&lt;br /&gt;
In April 1793 France sent new ambassador Edmond Genet to America so he could collect payment for the American debt incurred during the American Revolution. The money was to be used to finance France&#39;s war with England. However, his real reason for being here was to gain political favor for France and spread Illuminism, which he did through the establishment of  &#39;Democratic Clubs.&#39;&lt;br /&gt;&lt;br /&gt;Washington said of &quot;the clubs&quot; that they &quot;...would shake the government to its foundations.&quot;
&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/the-illuminati-arrive-in-america-date.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;

&lt;/b&gt;&lt;/b&gt;

  &lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  
  
  
  

&lt;b&gt;

&quot;Out of these troubled times, our fifth objective - a New World Order - can emerge. . . Now, we can see a New World Order coming into view. A world in which there is a very real prospect for a New World Order. . .A world where the United Nations, freed from a Cold War stalemate, is poised to fulfill the historic vision of its founders.&quot; &amp;nbsp; &amp;nbsp; 
George H. W. Bush 
  


 &lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  
&lt;b&gt;

&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;
  &lt;span style=&quot;font-size: 130%; &quot;&gt;Project N. O. L. A. National Crime Camera Program&lt;/span&gt;&lt;/b&gt;&lt;/font&gt;&lt;/b&gt;&lt;br/&gt;
&lt;br/&gt;


&lt;b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXf1x_B6Fr7Dfci-JekaVNgNYjOFClsFQW6V1aH-kZ1dWjDGr36u9WGMyZZSSsf08XccQLCx_iLX_QcMt5IydgoTEZYKErdJ2yjoWNfLYrElgVlMuwY2ErCPjuoqPdA7-E8?key=NzbxX7nIgc_exOdTCU5yXw&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;305&quot; src=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXf1x_B6Fr7Dfci-JekaVNgNYjOFClsFQW6V1aH-kZ1dWjDGr36u9WGMyZZSSsf08XccQLCx_iLX_QcMt5IydgoTEZYKErdJ2yjoWNfLYrElgVlMuwY2ErCPjuoqPdA7-E8?key=NzbxX7nIgc_exOdTCU5yXw&quot; width=&quot;520&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;Cost subsidized 
by charitable donations and grants, bring the unprecedented success of 
America&#39;s most successful, time-proven and cost efficient Crime Camera 
program to your community for as little as $300/yr per Crime Camera or $1100/yr per License Plate Recognition (LPR) Camera!&lt;/b&gt;&lt;br&gt;&lt;br&gt;&lt;b&gt;
 A true Community-Based Crime Camera program, cameras may be installed 
on homes, businesses, churches, and schools as well as utility poles and
 public buildings then stream directly to your local authorities and the
 Project NOLA National RTCC at the University of New Orleans. Available
 Nationwide,  Project NOLA will   make your community a safer place to
 live, work and visit!
&lt;br&gt;&lt;br&gt;Don&#39;t
 worry about purchasing, renting or leasing expensive cameras as Project
 NOLA uses its own funds to purchase extremely high-end crime cameras 
for your community. Most all camera models provided by Project NOLA 
feature Sony STARVIS NightVision to see Color at Night, Advanced 
Artificial Intelligence to accurately and automatically detect and alert
 upon suspicious activity, redundant recording to prevent data lose, 
generously long 5 year warranties, and more!&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2009/12/project-n-o-l-national-crime-camera.html&quot;  target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;

  
  
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;






&quot;If you want a vision of the future, imagine a boot stamping on a human face -- forever.&quot; &amp;nbsp; &amp;nbsp; George Orwell   author of Nineteen Eighty-Four, a glimpse at a dystopian future where the world is run by totalitarian regimes.

&lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  


&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;Panoptic Surveillance See-Thru 3D System&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;



&lt;b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUhyEfB4v8Q3yBiVT4IPSrQmaIaqEtgyguGDz0xgtdQBviA3UgLjRNzlKYh6O0qJrCMkvg-EVxai_OpLbo5htx9tZLuvKX0XLcoG6UpESjV9Ct29ldDKok9FkLWrqrp6jxWh5CDuYmbuiP/s1600/Flexible_transparent_LG_OLED_Display.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;317&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUhyEfB4v8Q3yBiVT4IPSrQmaIaqEtgyguGDz0xgtdQBviA3UgLjRNzlKYh6O0qJrCMkvg-EVxai_OpLbo5htx9tZLuvKX0XLcoG6UpESjV9Ct29ldDKok9FkLWrqrp6jxWh5CDuYmbuiP/s0/Flexible_transparent_LG_OLED_Display.jpg&quot; width=&quot;480&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;
A Panoptic Video Surveillance See-Thru 3D System could be loosely described as a formalised, scalable implementation of X-ray vision. The system enables one or more surveillance agents, using a single high resolution, auto-stereoscopic display, to remotely monitor the security situation of an arbitrarily large number of locations at-a-glance.&lt;br /&gt;&lt;br /&gt;
  &lt;/b&gt;&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDKSviocah6xGBxQIkamGzzhGIeDdw9ZICuv77nLNtiF2CxS8KYTMXPVnHU3ILBGjqKfmGPaBCmI5VDa9HcsARLbXDufGbIlG-owQEGvL9KQEj_McCsPgB1dtXhKSpuCoU6CzOk6xc0hWq/s1600/panoptic.c-thru.surveillance.system-400-400.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDKSviocah6xGBxQIkamGzzhGIeDdw9ZICuv77nLNtiF2CxS8KYTMXPVnHU3ILBGjqKfmGPaBCmI5VDa9HcsARLbXDufGbIlG-owQEGvL9KQEj_McCsPgB1dtXhKSpuCoU6CzOk6xc0hWq/s0/panoptic.c-thru.surveillance.system-400-400.jpg&quot; width=&quot;450&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
The system would allow a single agent to monitor thousands of places at the same time without overwhelming them with the massive amount of information being processed and displayed. It enables this by using artificial intelligence to determine what’s important to look at. &lt;br /&gt;
&lt;br /&gt;The surveillance agent&#39;s mental load is radically optimized towards monitoring only what is most critical to security: presence and movement of (groups of) people and vehicles inside a campus/site and its buildings as well as any security-sensitive events (such as fires, smoke, badge access, assemblies, gun-shots, people running etc). &lt;br /&gt;&lt;br /&gt;


Agents can see, hear and transport their focused viewpoint through walls, floors and ceilings, zooming into a specific location to monitor it at a level so acute that it seems beyond the levels of even science fiction. &lt;br /&gt;&lt;br /&gt;Designed to enable both wholistic site-wide and granular-level security, the system is ideal for monitoring airports, shipping ports, transit sites and other ports-of-entry, hotels, casinos, shopping malls, campuses, military bases, large buildings and building complexes, offering total situational awareness at a glance.
&lt;br /&gt;&lt;br /&gt;
&lt;/b&gt;



&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/futuristic-see-thru-panoptic.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;











&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;&lt;b&gt; &quot;The technetronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities.&quot; &amp;nbsp; &amp;nbsp; Zbigniew Brzezinski &lt;/b&gt;



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
  
  
  &lt;span style=&quot;color: #5f0000;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;The Rise Of The New World Order&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf5le14BY5XYlYENhrk45vnYaRdTsgJQ6HwBPsmtfp1AG4nDBIAEpSjAJAmHe4OWtBCxIPyGVzj8yb7juNzD0Ypf2HYWcQY2CYudD1MZh8Aj_VeBleRckJvo823uwcnCfN8QEd8thqig7l/s1600/984685427_ae442bfe37_2z.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;395&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf5le14BY5XYlYENhrk45vnYaRdTsgJQ6HwBPsmtfp1AG4nDBIAEpSjAJAmHe4OWtBCxIPyGVzj8yb7juNzD0Ypf2HYWcQY2CYudD1MZh8Aj_VeBleRckJvo823uwcnCfN8QEd8thqig7l/s0/984685427_ae442bfe37_2z.jpg&quot; width=&quot;465&quot; /&gt;&lt;br /&gt;
  
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;An Egyptian Pyramid Capstone. &amp;nbsp;  Symbolic Of The&lt;br /&gt;
    Elite That Are Going To Rule Over Us In The NWO.&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
  
  &lt;/div&gt;
&lt;b&gt;The recent history of the world is a history of conflicts between secret societies.&lt;br /&gt;&lt;br /&gt; Established upper-class families with &#39;old money&#39; have founded and finance the Bilderberg Group, Bohemian Club, Club of Rome, Council on Foreign Relations, Rhodes Trust, Skull and Bones, Trilateral Commission, and similar think tanks and private clubs.&lt;br /&gt;&lt;br /&gt;These are the Illuminati, who plot to impose their totalitarian New World Order over us — an authoritarian world government controlled by the United Nations and a global central bank.&lt;br /&gt;&lt;br /&gt;
The whole Earth will be going through great changes soon, such as: climate changes, warfare, economic impacts, etc. All of this will work towards the fulfillment of a world government. This final kingdom or global empire is described in the Book of Daniel in several dreams and visions.&lt;br /&gt;&lt;/b&gt; 



&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX_LeZkUzsigHTiSd8xKsIrvkzLe-DpUoYzCi_OoVE93axyimufHtBx387H9wrquXkNH2nvAhE4P77ZzFxP7giThpq1oRLkkTtghMngjagv1acn_Lsl1gez06OeC73ZLeQVnFtcSIgCglU/s1600/The-pyramid-of-Chephren-a-007.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;New World Order Illuminati&quot; border=&quot;0&quot; height=&quot;305&quot; id=&quot;BLOGGER_PHOTO_ID_5471620430165957026&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX_LeZkUzsigHTiSd8xKsIrvkzLe-DpUoYzCi_OoVE93axyimufHtBx387H9wrquXkNH2nvAhE4P77ZzFxP7giThpq1oRLkkTtghMngjagv1acn_Lsl1gez06OeC73ZLeQVnFtcSIgCglU/s0/The-pyramid-of-Chephren-a-007.jpg&quot; width=&quot;480&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;An Egyptian Pyramid With A Capstone In Place.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;

Fulfillment of the visions of Daniel and Nebuchadnezzar.&lt;br /&gt;&lt;br /&gt;Nebuchadnezzar&#39;s Dream - (in part).
&lt;br /&gt;&lt;br /&gt;
    &#39;You looked, O king, and there before you stood a large statue--an enormous, dazzling statue, awesome in appearance.
 The head of the statue was made of pure gold, its chest and arms of silver, its belly and thighs of bronze, its legs of iron, its feet partly of iron and partly of baked clay&#39;. &amp;nbsp; Daniel 2:31-32&lt;br /&gt;&lt;br /&gt;In succession the Babylonians gave way to the Medo-Persians, and the Medo-Persians gave way to the Greeks, and the Greeks gave way to the Romans.  It was the Romans who were in power at the time of Christ. There had been almost an unbroken sequence of world empires from Nebuchadnezzar until the time of Christ.&lt;br /&gt;&lt;/b&gt;


  

&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW48lPDlzhhEEAk2miTZmCBzcL3DY0v2GdKty4_djZtVjZnnYrRlFXJZtwBZMgzoLwsr4702ImDeMtgG5zzcBnrUvYBYFG40qCIWdrbDSu1vj-IyPiczmbHzUrlydB4DzmgT2C2VbnJksZ/s1600/baphomet-yuri-leitch3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;New World Order Illuminati&quot; border=&quot;0&quot; height=&quot;535&quot; id=&quot;BLOGGER_PHOTO_ID_5471620430165957026&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW48lPDlzhhEEAk2miTZmCBzcL3DY0v2GdKty4_djZtVjZnnYrRlFXJZtwBZMgzoLwsr4702ImDeMtgG5zzcBnrUvYBYFG40qCIWdrbDSu1vj-IyPiczmbHzUrlydB4DzmgT2C2VbnJksZ/s420/baphomet-yuri-leitch3.jpg&quot; width=&quot;435&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;BAPHOMET/SATAN/LUCIFER&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;Nebuchadnezzar&#39;s dream indicated that one empire would be replaced by another. The iron legs, feet and toes of the statue represented the future empire of Rome. This final kingdom would come at the very end of time or end of the age!
&lt;br /&gt;&lt;br /&gt;Daniel&#39;s Dream - (in part).
&lt;br /&gt;&lt;br /&gt;&#39;After that, in my vision at night I looked, and there before me was a fourth beast--terrifying and frightening and very powerful. It had large iron teeth; it crushed and devoured its victims and trampled underfoot whatever was left. It was different from all the former beasts, and it had ten horns. While I was thinking about the horns, there before me was another horn, a little one, which came up among them; and three of the first horns were uprooted before it. This horn had eyes like the eyes of a man and a mouth that spoke boastfully.&#39; &amp;nbsp; Daniel 7:7,8
&lt;br /&gt;&lt;br /&gt;The interesting thing to notice here is that, in Nebuchadnezzar&#39;s dream, there are ten toes on the feet, and in Daniel&#39;s dream, the final form of a world government had ten horns. So the number ten is very significant in the last form of world governments which is still future.
&lt;br /&gt;&lt;br /&gt;
Since the Roman Empire ceased to exist as a real empire, how many world empires have existed? There have been some serious attempts. Charlemagne, Napoleon, and Hitler, tried to conquer their world. None of them succeeded. The Bible says there are only four of these world empires, and then a final form of the fourth one--feet made partly of iron and partly of clay.
What would the iron and clay mean? It is a Revived Roman Empire--partly of the old iron of the ancient Roman empire, and partly of clay, something weaker and brittle. It would include some of the old areas, but it would not be as strong and monolithic as the old Roman Empire. &lt;br /&gt;&lt;br /&gt;
We are looking for another empire that will come out of ten nations/economic blocs and then become a world power.&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/satans-final-empire-new-world-order.html&quot;&gt;Read more »&lt;/a&gt;
  &lt;/b&gt;
&lt;/span&gt;&lt;/div&gt;






  
  






  


</description><link>https://thecomingnewworldorder.blogspot.com/2011/03/illuminati.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM2EWmbx3Ea4LCp8xrEEUWJMaYvezH4tVqt9MyB-NuC8X_qg9L_-pk45JLOH5tfSHP6Hjz1c0OA2_lU9t8y_beYjP-UalqFVUGavpSa8hssWmFixMUNjCoq-ZPOCywwSBBI48ty4e57e_y/s72-c/Austin+food+bank+REUTERS+TT.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-3446576060640910173</guid><pubDate>Wed, 23 Feb 2011 09:00:00 +0000</pubDate><atom:updated>2026-03-07T05:37:52.998-06:00</atom:updated><title></title><description>







&lt;b&gt;&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Illuminati&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;&lt;b&gt; The Illuminati is a name that nowadays is used to talk of several groups characterized by secrecy, all groups working together, having one single goal, because they all share the same god. Historically however, it refers specifically to the Bavarian Illuminati, founded on May 1 of 1776, a secret society of people who believed to be enlighten, by this same so called “god” who in the Bible is called Lucifer, who gave them knowledge hidden from the masses which they all use for the ultimate goal of global domination through a New World Order under Lucifer as god. Their first and main rule is “Do not talk about Illuminati”. There is much proof that the Illuminati, referring to all these different secret societies, has been behind both World Wars plus the one coming up, as well as many other tragedies around the world, all that may had been necessary for them to come to World Domination, following their motto “Ordo ab Chao” (Order out of Chaos).&lt;BR&gt;&lt;BR&gt;  &lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNq-733cwFxjMpCG473EFixSmpcv_6cjYazm2K-YTHLnCyWTOIZpXy6tQ0Xxg65UmLNaIPyK3zcEAKNODO5GTFhhd_Ge52NbSQFfUVAwWUIqGJisg_6A8j4LYKuD7V2nkrLRbxwvSXd28/s1600/adam_weishaupt_shrunk.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Adam Weishaupt&quot; border=&quot;0&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNq-733cwFxjMpCG473EFixSmpcv_6cjYazm2K-YTHLnCyWTOIZpXy6tQ0Xxg65UmLNaIPyK3zcEAKNODO5GTFhhd_Ge52NbSQFfUVAwWUIqGJisg_6A8j4LYKuD7V2nkrLRbxwvSXd28/s1600/adam_weishaupt_shrunk.jpg&quot; width=&quot;278&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Adam Weishaupt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
Adam Weishaupt&lt;BR&gt;&lt;BR&gt;
Adam Weishaupt is the man who is recorded as having started this secret society which would come to involve all Luciferian societies, even those dating back thousands of years ago; all to keep the plan of their ancestors alive ever since Nimrod, the first human who rebelled against the Most High and who chose to be king of the world.&lt;BR&gt;&lt;BR&gt;
Adam Weishaupt was taught by Jesuits and became a Freemason before starting the Illuminati. Freemasonry and Illuminati are not one and the same, although Freemasonry has come to be controlled by the Illuminati nowadays, keeping the Freemasons in the lower ranks in ignorance of their real goal and god, information which is held by those in the 33rd degree
&lt;br&gt;&lt;br&gt;
  
   &lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsADNyvlMBpb7mmZf2Ey1rCuEt_paLUU1woyH9eU5o1ciQHwtNV5vHjOu9YN-m2w6xoxi_WRgUyvWc9qS4SOBAYabIc4wjV_nptzYTSHJaWkmGcCbiZteTdJ3kXyptScgj1Y1M_29m3Gc/s1600/All_Seeing_Eye_Large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;All Seeing Eye on Pyramid&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsADNyvlMBpb7mmZf2Ey1rCuEt_paLUU1woyH9eU5o1ciQHwtNV5vHjOu9YN-m2w6xoxi_WRgUyvWc9qS4SOBAYabIc4wjV_nptzYTSHJaWkmGcCbiZteTdJ3kXyptScgj1Y1M_29m3Gc/s1600/All_Seeing_Eye_Large.jpg&quot; width=&quot;240&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;All Seeing Eye on Pyramid&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;


  
   Adam Weishaupt once wrote:
&lt;br&gt;&lt;br&gt;
    “I did not bring Deism into Bavaria more than into Rome. I found it here, in great vigour, more abounding than in any of the neighboring Protestant States. I am proud to be known to the world as the founder of the Illuminati.”
&lt;br&gt;&lt;br&gt;
In the Book ¨Proof of Conspiracy¨ by John Robison we read:
&lt;br&gt;&lt;br&gt;
    &quot;Weishaupt had long been scheming the establishment of an Association or Order, which in time, should govern the World.&quot;
&lt;br&gt;&lt;br&gt;
  
  
   Illuminati Pyramid&lt;br&gt;&lt;br&gt;
The Illuminati was created in Bavaria, Germany, but the symbol they used as their logo seems to come from Egypt, or even the Mayans, and it holds a very significant meaning, it can be found on the United States one dollar bill.&lt;br&gt;&lt;br&gt;
At the bottom of the pyramid we can see the Letters MDCCLXXVI , which are the Roman numerals equivalent to 1776, which many believe are there to commemorate the independence of the United States but instead, it is there because this was the year that the Plan of the Illuminati for a New World Order would be set in motion on the “New World” called America.
  &lt;/b&gt;
&lt;BR&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-illuminati.html&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;

  
  
  




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;




  
&lt;b&gt;&quot;Today the path of total dictatorship in the United States can be laid by strictly legal means, unseen and unheard by the Congress, the President, or the people. Outwardly we have a Constitutional government. We have operating within our government and political system, another body representing another form of government - a bureaucratic elite.&quot; &amp;nbsp; &amp;nbsp; Senator William Jenner, 1954&lt;/b&gt;










&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  
  &lt;b&gt;

&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;Video Surveillance Gets Smarter&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQYufxpDWmnIWME00ohyphenhyphen5ASABTvJOz53Byu1tePZaECyva3tGEnTF9PAL3yCBYv4nWC80AxI2hRCig47iGDzYxynrk7BTwL9oE_jItqvWpcxxcIO_ZsEaQEjO6Z70jtFf4VAw_FTmCCcqK/s1600/snapp-710619.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Video Surveillance&quot; border=&quot;0&quot; height=&quot;148&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQYufxpDWmnIWME00ohyphenhyphen5ASABTvJOz53Byu1tePZaECyva3tGEnTF9PAL3yCBYv4nWC80AxI2hRCig47iGDzYxynrk7BTwL9oE_jItqvWpcxxcIO_ZsEaQEjO6Z70jtFf4VAw_FTmCCcqK/s1600/snapp-710619.jpg&quot; width=&quot;222&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7TerRWKKrkdfylhyymKSNsFzZ6ujtG4s_bO6tb_ur6LsOBZCzFONeF2KCw-j99GeQH6X-noAwB9q3-9S8A8B-wgHFQYbSt011BFeBF1Deg4EpcNO6FWteUObjQz-RDXPY7sjz9S4_6Jzh/s1600/556677.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Video Tracking&quot; border=&quot;0&quot; height=&quot;275&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7TerRWKKrkdfylhyymKSNsFzZ6ujtG4s_bO6tb_ur6LsOBZCzFONeF2KCw-j99GeQH6X-noAwB9q3-9S8A8B-wgHFQYbSt011BFeBF1Deg4EpcNO6FWteUObjQz-RDXPY7sjz9S4_6Jzh/s1600/556677.jpg&quot; width=&quot;339&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;The City of Chicago&#39;s Office of Emergency Management and Communications and IBM implemented one of the most advanced city-wide intelligent security system ever conceived. The engagement is a part of Chicago&#39;s Operation Virtual Shield, a project that encompasses one of the world&#39;s largest video security deployments.
&lt;br /&gt;&lt;br /&gt;IBM helped the City experts and network engineers to design and implement a surveillance strategy infrastructure to capture, monitor and fully index video for real-time and forensic-related safety applications. This entailed building a unified fiber network throughout the downtown Chicago area, deploying a critical wireless infrastructure to offer flexibility as required, installing hundreds of new surveillance cameras, linking thousands of preexisting cameras to the network, and creating a fully redundant backend system to monitor the video, store the images and allow for business continuity and disaster recovery applications.
&lt;br /&gt;&lt;br /&gt;Chicago&#39;s security solution is designed to provide several benefits to both city officials and citizens including: real-time video surveillance intelligence for proactive homeland security monitoring; faster response time to emergencies; more effective deployment of emergency responders; and increased travel efficiency through traffic congestion tracking.


&lt;br /&gt;&lt;br /&gt;
Many things go unnoticed in big cities every day, but that world has now changed in Chicago with this video surveillance system that can recognize anomalies and alert authorities to take a closer look.&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdHLwtj8GMLLuDoVYcQFJe35Mv00oVD0qdHnRsqrzbxMbInPuLnB2fhfg2F0IfTemn7_cAE-hMEHxtJ9_XUxR1WJn02Q9NIO6TNzI3C1ATCEathIFE8ZHwP8kTRahbvtYn-kAtgaiVVQ4i/s1600/0201607150030122.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;3d Face Imaging&quot; border=&quot;0&quot; height=&quot;216&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdHLwtj8GMLLuDoVYcQFJe35Mv00oVD0qdHnRsqrzbxMbInPuLnB2fhfg2F0IfTemn7_cAE-hMEHxtJ9_XUxR1WJn02Q9NIO6TNzI3C1ATCEathIFE8ZHwP8kTRahbvtYn-kAtgaiVVQ4i/s420/0201607150030122.jpg&quot; width=&quot;437&quot; /&gt;
&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
&quot;Chicago is really light years ahead of any metropolitan area in the U.S. now,&quot; said Sam Docknevich, who heads video-surveillance consulting for IBM.
&lt;br /&gt;&lt;br /&gt;
Chicago already had thousands of security cameras in use by businesses and police - including some equipped with devices that could recognize the sound of a gunshot, turn the cameras toward the source and place a 911 call. But the current system will let cameras analyze images in real time 24 hours a day.

&lt;br /&gt;&lt;br /&gt;
&quot;You&#39;re talking about creating something that knows no fatigue, no boredom and is absolutely focused,&quot; said Kevin Smith, spokesman for the city&#39;s Office of Emergency Management and Communications.
&lt;br /&gt;&lt;br /&gt;
This system can be programmed to alert the city&#39;s emergency center whenever a camera spots a vehicle matching the description of one being sought by authorities.
&lt;br /&gt;&lt;br /&gt;
The system can also be programmed to recognize license plates. It can alert emergency officials if the same car or truck circles the Sears Tower three times or if nobody picks up a backpack in Grant Park for, say, 30 seconds.&lt;br /&gt;&lt;br /&gt;&quot;Cities today are faced with ever-increasing threats and advanced security surveillance systems can be a critical component in ensuring safety,&quot; said Mike Daniels, senior vice president, IBM Global Technology Services. &quot;IBM is proud to be a part of Operation Virtual Shield and the City of Chicago&#39;s visionary approach to homeland security.&quot;
&lt;/b&gt;



  
  
&lt;/b&gt;








  


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

&lt;b&gt;




&quot;We are on the verge of a global transformation. All we need is the right major crisis and the nations will accept the New World Order.&quot; &amp;nbsp; &amp;nbsp; - David Rockefeller
 &lt;/b&gt;



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;











&lt;span style=&quot;color: #5f0000;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;The Foundations Have Been Laid A Long Time Ago&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6WY1FeMnthdDG8jw2J-bjr15ARp5ACHTM2Awo6HBGAH2YFMhQLNUO7bWw8f-jny3HcEbA9fnRDR2Xl-kKiyAjYWFyO8foPX0IROwhgVf3W0MvOcBNuDcmUjDg758mMIvRZmPhW4lbRRnV/s1600/photo_1_d82b0d1d29cf8a86ef4a714c5b5ddaa3gqqw3__1365897794_99.111.85.107.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;359&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6WY1FeMnthdDG8jw2J-bjr15ARp5ACHTM2Awo6HBGAH2YFMhQLNUO7bWw8f-jny3HcEbA9fnRDR2Xl-kKiyAjYWFyO8foPX0IROwhgVf3W0MvOcBNuDcmUjDg758mMIvRZmPhW4lbRRnV/s520/photo_1_d82b0d1d29cf8a86ef4a714c5b5ddaa3gqqw3__1365897794_99.111.85.107.jpg&quot; width=&quot;557&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;The Apotheosis of George Washington as displayed on the ceiling of the Rotunda of the Capitol Building in Washington, DC (painted by Constantino Brumidi - 1865). &amp;nbsp; It depicts George Washington rising to the heavens in glory sitting on a throne as a God. &amp;nbsp; Very few recognize the spiritual elements of the architecture and the symbolism of this building which literally makes it a temple of Masonic mysteries. &amp;nbsp; The city of Washington is even located in the District of the (Goddess of Columbia). &amp;nbsp; In 1791, President Washington commissioned Pierre (Peter) Charles L’Enfant, a French-born architect, city planner and freemason, to design the new capital and City of Washington. &lt;br /&gt; &lt;br /&gt;
&lt;/b&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh14vwAR_REMKlUCbEnpz4uvlhZ_vNvi1oLUDQmAelVvXtSEU6D3q_cK5JpwP_ko2dB3bNl01gNPvJyCKz8str4pYKy2cGCnZiPinoD1zM0OP-FAgDYCDiemSTsZBFgttKyxKDE1rn_Nz7V/s480/grandlodgeroom.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;202&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh14vwAR_REMKlUCbEnpz4uvlhZ_vNvi1oLUDQmAelVvXtSEU6D3q_cK5JpwP_ko2dB3bNl01gNPvJyCKz8str4pYKy2cGCnZiPinoD1zM0OP-FAgDYCDiemSTsZBFgttKyxKDE1rn_Nz7V/s420/grandlodgeroom.jpg&quot; width=&quot;380&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
 The masons had wanted America to be a &#39;New Atlantis&#39; and Washington, D.C. a second Rome. &amp;nbsp; They were committing America to what has been called &#39;A Secret Destiny&#39;. &amp;nbsp; This future &#39;destiny&#39;, is &#39;The New World Order&#39;.  &amp;nbsp; Listen to an audiobook on &amp;nbsp;&lt;a href=&quot;https://archive.org/download/Freemasonry-TheTruth/Audiobook-freemasonry-the.truth64min128kbpscassetterip.mp3mp3cut.net.mp3&quot;&gt;Freemasonry - The Truth &amp;nbsp; (right click to download)&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;

&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Ue0erDbUKpDGz2c-18q92mkBhxXnfb2c85LdPtavalBP7yB_r-OqwpbOrb_zQe0eSTmwjXeuoPP5Kf4h5DsFyj12cJf-T_5_l5nQEJtcMS3ybF4xlUsFUoyOUfcwkOldFxZoPIBX0_q1/s480/mexico.masonic.lodge.room.op.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;245&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Ue0erDbUKpDGz2c-18q92mkBhxXnfb2c85LdPtavalBP7yB_r-OqwpbOrb_zQe0eSTmwjXeuoPP5Kf4h5DsFyj12cJf-T_5_l5nQEJtcMS3ybF4xlUsFUoyOUfcwkOldFxZoPIBX0_q1/s420/mexico.masonic.lodge.room.op.jpg&quot; width=&quot;380&quot; /&gt;&lt;br /&gt;&lt;b&gt;
&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Masonic Temple Buildings - Lodge Room&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;
&lt;/b&gt;
&lt;b&gt;In order for a global &quot;New World Order&quot; economic system to be established with a one-world electronic currency the sovereignty of all nations must be undermined. &amp;nbsp; Then, and only then, will everyone be forced to exist and live within the confines of a single global police state thereby losing our freedoms and rights as free human beings.&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;The ideal of a &quot;New World Order&quot; might never be closer than now. It may not be long before all of us experience an abrupt change in our way of living. &amp;nbsp; There has been a group that consists of Masons, Jewish Bankers, and other influential wealthy individuals that has worked for a very long time through Freemasonry and the Order of the Illuminati to achieve this &quot;New World Order&quot;. &amp;nbsp; Their goal is to set up a Global Police State with a more controlled society and continuous surveillance over every citizen! &amp;nbsp; First they’ll destroy this present world system (Old Order) and then bring in their global government. &amp;nbsp;  They have everything in place and ready to go so when the time is right they will make their move without any hesitation.    &lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-foundations-have-been-laid-long-ago.html&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;







&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;  &quot;The New World Order cannot happen without U.S. participation, as we are the single most significant component.  Yes, there will be a New World Order, and it will force the United States to change its perceptions.&quot; &amp;nbsp; &amp;nbsp; 
– Dr. Henry Kissinger,  World Action Council, April 19, 1994
   &lt;/b&gt; 


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
    &lt;b&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;Collapse Of The American Empire: Swift, Silent, Certain!&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; 
&lt;BR&gt;&lt;BR&gt;
  

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh48TUafBeqasXBMq3PlSilB6iJv-z4qMpTEoN2wtUfQzu1SP9MPl5U0xmg8bQseVJyM2rdHTlsNEZGufX1NNaz7H7DpzD3oGniL9WroO5kDUAkWBOS6qlBRZEQbKQLs6BRuS2rv18YsevC/s400/1273612_f260.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;260&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh48TUafBeqasXBMq3PlSilB6iJv-z4qMpTEoN2wtUfQzu1SP9MPl5U0xmg8bQseVJyM2rdHTlsNEZGufX1NNaz7H7DpzD3oGniL9WroO5kDUAkWBOS6qlBRZEQbKQLs6BRuS2rv18YsevC/s0/1273612_f260.jpg&quot; width=&quot;350&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&quot;One of the disturbing facts of history is that so many civilizations collapse,&quot; warns anthropologist Jared Diamond in &quot;Collapse: How Societies Choose to Fail or Succeed.&quot; &lt;BR&gt;&lt;BR&gt; Many &quot;civilizations share a sharp curve of decline. Indeed, a society&#39;s demise may begin only a decade or two after it reaches its peak population, wealth and power.&quot;&lt;br/&gt;
&lt;br/&gt;
Now, Harvard&#39;s Niall Ferguson, one of the world&#39;s leading financial historians, echoes Diamond&#39;s warning: &quot;Imperial collapse may come much more suddenly than many historians imagine.&lt;BR&gt;&lt;BR&gt; A combination of fiscal deficits and military overstretch suggests that the United States may be the next empire on the precipice.&quot; Yes, America is on the edge.&lt;/b&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/collapse-of-american-empire-swift.html&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;
  
  
  



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;b&gt;





&quot;The real truth of the matter is, as you and I know, that a financial element in the large centers has owned the government ever since the days of Andrew Jackson.&quot;     — Franklin D. Roosevelt



&lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;







&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;Fascism&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br/&gt;&lt;br&gt;

&lt;table style=&quot;width: 80%px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td width=&quot;250&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;img height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjx5eiqTHBX4C4b5w2h1FlxW4pkx8znoHLNhpc0gZg4UpritV_RX23Ek1D5Qi8zeLHN9dfDmJvINhjgPaehqtAlG9_uB1D-NUaEY_3Kh8B4fMj8Awh0pQbG265s9pL6KrYJaVcldYNEzRT/s250/130105fasces3.jpg&quot; width=&quot;250&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;center&gt;Roman Fascist Symbol (left)&lt;/center&gt;&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;&lt;/div&gt;&lt;/td&gt;
  
  
  
  
  &lt;td width=&quot;50&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td width=&quot;270&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;img   src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy9xsSZgJ0gWF7V8AXi_kHk9qwjq7MZt-LELjRIEeteka6veMwoYz8v53V3eLbZz4E_7yyU-225WxNs2mplywFSeBylMIE5umHxEv7aT2TFjU6VkmRooN8Bb3NCyhU_iKwdTV43hSC5ID8/s270/130105fasces8.jpg&quot;  &gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;center&gt;US House of Representatives chamber,
United States Capitol (on the left and 
  right of the podium)&lt;/center&gt;&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;&lt;/div&gt;&lt;/td&gt;
  
  
  
  &lt;td width=&quot;15&quot;&gt;&lt;BR&gt;&lt;/td&gt;&lt;td width=&quot;270&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;img  alt=&quot;Close Up of a Roman Fascist Symbol in the US House of Representatives chamber, United States Capitol&quot;  src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6WGR6jY1jfO7c_D5uW51Zjv_TZUWyJ0raiRuXvn9sC08YxZu5gOEBVx47JaUYAFF4Vo7RwC0gFWoAxa9mPmJwgT1hk31cReCduFNNJcoVtAIxEqQcka_WM831pYfoRjPiuwdw-91B0B4k/s270/fasces2.jpg&quot; &gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;center&gt;Close Up&lt;/center&gt;&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
  &lt;/tbody&gt;&lt;/table&gt; &lt;br /&gt;
  
  
  
&lt;b&gt;This symbol of absolute rule is commonly known as a fasces, and helped inspired the name of those who espoused such totalitarian power, the Fascists.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitURcoICazw5IXJOuyPgIrZ1cIdQk_zIy_PhyUxi8rcJyiCZALdwJHmgmHYg24Rf2oaVUFl_Wc6altcvEl5D2vSEJBBYkCOqS2hOcUMr_5M0ub1lzZtMn4WV2uvLwPvhGRxrcRCEs7-uxR/s400/081_2.JPG&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-top: 1em; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitURcoICazw5IXJOuyPgIrZ1cIdQk_zIy_PhyUxi8rcJyiCZALdwJHmgmHYg24Rf2oaVUFl_Wc6altcvEl5D2vSEJBBYkCOqS2hOcUMr_5M0ub1lzZtMn4WV2uvLwPvhGRxrcRCEs7-uxR/s400/081_2.JPG&quot; height=&quot;300&quot; width=&quot;450&quot;&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
  
  
The word comes from fascio (plural: fasci), which may mean bundle, as in a political or militant group or a nation, but also from the fasces (rods bundled around an axe). One might say the fasces embodies the essence of fascism: The people are the sticks, tied to the state to form a strong, single unit.&lt;BR&gt;&lt;BR&gt; The [individual] is deprived of all useless and possibly harmful freedom, but retains what is essential; the deciding power in this question cannot be the individual, but the State alone. The State is the ax, which has the power to create, to enforce and to obliterate.­ &lt;BR&gt;&lt;BR&gt;A fascist regime generally gains support by promoting a series of ideas through the media, public rallies and other forms of propaganda. These ideas include: a nation in crisis, an idealized past, and a need for social change.  &lt;/b&gt;




















&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&quot;The real rulers in Washington are invisible, and exercise power from behind the scenes.&quot; &amp;nbsp; &amp;nbsp; - SUPREME COURT JUSTICE FELIX FRANKFURTER, 1952 &lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;




&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;The Coming NWO Totalitarian State&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4Z34n70RxfhNyLzUi4ZDuAvu2yCA_W_PQwWrg2bg2QtvdxQPOqJlC9vcD8gFWMMP0GqIKSn_vnMpJxRJwThvWkwoMFB5sKWhmN-9YPl9-nSZfW5PCEvOLwRFNFKjquiFqZ3mpv84Dqn5/s1600/CQQuLtwUEAAcu0u.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;330&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4Z34n70RxfhNyLzUi4ZDuAvu2yCA_W_PQwWrg2bg2QtvdxQPOqJlC9vcD8gFWMMP0GqIKSn_vnMpJxRJwThvWkwoMFB5sKWhmN-9YPl9-nSZfW5PCEvOLwRFNFKjquiFqZ3mpv84Dqn5/s420/CQQuLtwUEAAcu0u.jpg&quot; width=&quot;500&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;
A Global Government To Rule From The UN?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;/span&gt;
&lt;/b&gt;&lt;b&gt;The Totalitarian State will be realized when the nations of this world come together as one body, having an omnipresent government presence where individual rights are routinely ignored.
&lt;br /&gt;&lt;br /&gt;

1. Government Surveillance&lt;br /&gt;&lt;br /&gt;In a Totalitarian State &quot;You&#39;re Under Constant Surveillance!&quot; &lt;br /&gt;&lt;br /&gt; With our National Security Agency involved in wiretapping, maintaining a call database, and engaged in data-mining, we can foresee that Big Brother is no longer a fictional character. Each of us has a hand-held &quot;computer/smart phone&quot; we carry with us most everywhere we go, which we almost never turn off. We&#39;re monitored, in various ways, in our homes, cubicles at work, cafeterias, and also in public and private. Security cameras are everywhere!
&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhXOLxI3Uj9zaeT0rYTIoMI0z-4z9G9mL-ZCSYck8I7E5le_FSvQw6wcG_yGLSc-A9Jj2HoQofEEMEAB2WZqpQvmjv31LEx6hPpx3D0myoO_rMV-KPqlgt10CghHNovaYMfhetrVbr_r6b/s1600/gettyimages-167275758-800x5332.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;360&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhXOLxI3Uj9zaeT0rYTIoMI0z-4z9G9mL-ZCSYck8I7E5le_FSvQw6wcG_yGLSc-A9Jj2HoQofEEMEAB2WZqpQvmjv31LEx6hPpx3D0myoO_rMV-KPqlgt10CghHNovaYMfhetrVbr_r6b/s1600/gettyimages-167275758-800x5332.jpg&quot; width=&quot;510&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;
In a Totalitarian State no place is safe!&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;/b&gt;&lt;b&gt;
2. Perpetual War&lt;br /&gt;&lt;br /&gt;
In a Totalitarian State, the Party embraces a policy of continual military skirmishes so as to eat up any economic surplus and keep people poor and under control. Today we can see governments having a similar course of action, moving seamlessly from one military conflict to another. 
&lt;br /&gt;&lt;br /&gt;
3. Bread and Circuses&lt;br /&gt;&lt;br /&gt;
In a Totalitarian State, the vast majority of the population are almost not even worthy of surveillance. So long as the Totalitarian State gives them a regular dose of food, alcohol, drugs, television, the lottery and pornography, they are considered to be under control. 
&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjklovLzrhyyTllzz70LAw3AijgGf247oENcZSti6CtwgClsiHAEquft2yR-kkWlUG88wK71m7wsB2HKuvPjwcqUUojzG4i9s0_Brby8RNJk8-c_ve-YOh1fw-qz4NQEbHa257kF4n63To0/s1600/riot+cops+rnc2.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;300&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjklovLzrhyyTllzz70LAw3AijgGf247oENcZSti6CtwgClsiHAEquft2yR-kkWlUG88wK71m7wsB2HKuvPjwcqUUojzG4i9s0_Brby8RNJk8-c_ve-YOh1fw-qz4NQEbHa257kF4n63To0/s1600/riot+cops+rnc2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
4. A Police State&lt;br /&gt;&lt;br /&gt;
In a Totalitarian State the government exercises rigid and repressive control over the social, economic and political life of the population. There is usually little or no distinction between the law and the exercise of political power by the executive. In a Totalitarian State, rights are non existent and laws are selectively enforced. The inhabitants of a Totalitarian State experience restrictions on their mobility, and on their freedom to express or communicate political or other views, which are subject to police monitoring or enforcement. Political control may be exerted by means of a secret police force, which operates outside the boundaries normally imposed by a constitutional state.
&lt;br /&gt;&lt;br /&gt;
5. Newspeak&lt;br /&gt;&lt;br /&gt;
In a Totalitarian State language can be (mis)used to deceive and control the masses. In the real world today, political correctness and euphemism are both pervasive and pervasively derided. Some current examples are: &quot;regime change&quot; overthrow, &quot;shock and awe&quot; massive bombing, &quot;revenue enhancement&quot; tax increase, and &quot;downsize&quot; fire employees.  If the Newspeak of today makes us wince, how much more will it when we&#39;re living in a Totalitarian State?&lt;/b&gt;





  



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 
  
  
&quot;It&#39;s up to us. No one is coming to help us. If we don’t make the effort, no one else will. It&#39;s time for the twilight of the idols. It&#39;s time for a new dawn, a new humanity, a new world order. It&#39;s time for the dawn of the Gods.&quot;  &amp;nbsp; &amp;nbsp;
- Adam Weishaupt  
  
  
  
  
  
  
  &lt;/b&gt;





&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
 
  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Georgia Guidestones Partially Destroyed By Bomb Blast Are Brought Down&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT01L5rxdxFtStsk7BQmFs6Npt188Nav9k9AcHCppVw0xIBaueODujgO7_ay7XB-BGNTBNVyfW89FK1FMEvh17MD3PFwaDqS0AEyws5xe8y6Fbib0LmIf4QRCZiSQ7qYmWUke2RSjMYCY/s0/ga-guidestones_p3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Georgia Guidestones&quot;  border=&quot;0&quot; height=&quot;470&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT01L5rxdxFtStsk7BQmFs6Npt188Nav9k9AcHCppVw0xIBaueODujgO7_ay7XB-BGNTBNVyfW89FK1FMEvh17MD3PFwaDqS0AEyws5xe8y6Fbib0LmIf4QRCZiSQ7qYmWUke2RSjMYCY/s0/ga-guidestones_p3.jpg&quot; width=&quot;465&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;





&lt;b&gt;On one of the highest hilltops in Elbert County, Georgia stands a huge granite monument.&lt;BR&gt;&lt;BR&gt;  Engraved in eight different languages on the four giant stones that support the common capstone are 10 Guides, or commandments.&lt;BR&gt;&lt;BR&gt; That monument is alternately referred to as The Georgia Guidestones, or the American Stonehenge. &lt;BR&gt;&lt;BR&gt; Though relatively unknown to most people, it is an important link to the Occult Hierarchy that dominates the world in which we live.&lt;br&gt;&lt;br&gt;
  
  

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj_IdD331N8g4CwcVEysjqLO7lUuAX15PxuA2FV6w4CHpL5rEIR22UWcVks7J6HbXoB1YAhg1YZQ0nAl_kUyazmUkog9uKYiJC45ioWhSeXwGmbKIinO_AdkIEDR_tw21gyFsF59dYVEE/s0/Georgia-Guidestones_180602_008_510px.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em;  margin-top: 1em;  margin-left: 1em;  &quot;&gt;
&lt;img alt=&quot;Georgia Guidestones&quot; height=&quot;519&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgj_IdD331N8g4CwcVEysjqLO7lUuAX15PxuA2FV6w4CHpL5rEIR22UWcVks7J6HbXoB1YAhg1YZQ0nAl_kUyazmUkog9uKYiJC45ioWhSeXwGmbKIinO_AdkIEDR_tw21gyFsF59dYVEE/s0/Georgia-Guidestones_180602_008_510px.jpg&quot; width=&quot;420&quot; /&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
  
  
  
  The messages engraved on the Georgia Guidestones deal with four major fields: &lt;BR&gt;&lt;BR&gt; (1) Governance and the establishment of a world government, &lt;BR&gt;&lt;BR&gt; (2) Population and reproduction control,&lt;BR&gt;&lt;BR&gt;  (3) The environment and man&#39;s relationship to nature, and &lt;BR&gt;&lt;BR&gt; (4) Spirituality.
&lt;BR&gt;&lt;BR&gt;


1. Maintain humanity under 500,000,000 in perpetual balance with nature.&lt;br&gt;&lt;BR&gt;
2. Guide reproduction wisely - improving fitness and diversity.&lt;br&gt;&lt;BR&gt;
3. Unite humanity with a living new language.&lt;br&gt;&lt;BR&gt;
4. Rule passion - faith - tradition - and all things with tempered reason.&lt;br&gt;&lt;BR&gt;
5. Protect people and nations with fair laws and just courts.&lt;br&gt;&lt;BR&gt;
6. Let all nations rule internally resolving external disputes in a world court.&lt;br&gt;&lt;BR&gt;
7. Avoid petty laws and useless officials.&lt;br&gt;&lt;BR&gt;
8. Balance personal rights with social duties.&lt;br&gt;&lt;BR&gt;
9. Prize truth - beauty - love - seeking harmony with the infinite.&lt;br&gt;&lt;BR&gt;
10. Be not a cancer on the earth - Leave room for nature - Leave room for nature.&lt;br&gt;&lt;br&gt;&lt;/b&gt;
  
&lt;b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn2qlmZOYo5sz7Hv8FEoiSvbY8ss12dZ4h2CYCiuaq-05gIoaIL3cd_pzqh0l4hrRtKW_qZzB92N2ECwtYZL_U82bjFvEvyR9FgFElsIISxuj1XadwFZ3F-95wwSLAVcIDjpzeF02zPRTSG7tB4MD1CeIpEOy_P0jysIBK48AQReeFwsatXOP0tuPu5w/s1600/georgia-guidestones.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em;    margin-left: 1em;  &quot;&gt;&lt;img border=&quot;0&quot;    height=&quot;499&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn2qlmZOYo5sz7Hv8FEoiSvbY8ss12dZ4h2CYCiuaq-05gIoaIL3cd_pzqh0l4hrRtKW_qZzB92N2ECwtYZL_U82bjFvEvyR9FgFElsIISxuj1XadwFZ3F-95wwSLAVcIDjpzeF02zPRTSG7tB4MD1CeIpEOy_P0jysIBK48AQReeFwsatXOP0tuPu5w/s1600/georgia-guidestones.jpg&quot; width=&quot;468&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;BR&gt;
  &lt;b&gt; Explosion Destroys Part Of Mysterious Monument In Georgia, Then They Are Brought Down&lt;/b&gt;&lt;BR&gt;&lt;BR&gt;&lt;b&gt;The Georgia Landmark Known as ‘America’s Stonehenge’ Is Destroyed in an Explosive Attack&lt;/b&gt;
  
  &lt;BR&gt;&lt;BR&gt;
For more than four decades, the Georgia Guidestones near Elberton Ga., have been an enigma. The authorities said, “unknown individuals” destroyed a large part of the structure.

&lt;br&gt;&lt;br&gt;
An explosive device that “unknown individuals” detonated early on a Wednesday morning destroyed a granite monument in Georgia that was built under mysterious circumstances more than four decades ago and promoted by state officials as “America’s Stonehenge,” the authorities said.
&lt;br&gt;&lt;br&gt;
The monument, known as the Georgia Guidestones, which was built about nine miles north of Elberton, Ga., had four granite slabs connected to a center pillar, with a capstone on top.
&lt;br&gt;&lt;br&gt;
But around 4 a.m. on a Wednesday morning in July 2022, an explosive device was set off, destroying “a large portion of the structure,” the Georgia Bureau of Investigation said in a statement. It is investigating the explosion together with the Elbert County Sheriff’s Office.&lt;BR&gt;&lt;BR&gt;Though part of the monument was still standing after the explosion, the entirety had to be demolished by officials in the aftermath out of safety concerns.&lt;/b&gt;
  &lt;br&gt;&lt;br&gt;
  
  
  
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-georgia-guidestones.html&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt; 

&lt;/b&gt;



  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;  &quot;By the end of this decade we will live under the first One World Government that has ever existed in the society of nations ... a government with absolute authority to decide the basic issues of human survival. One world government is inevitable.&quot; &amp;nbsp; &amp;nbsp; -POPE JOHN PAUL II quoted by Malachi Martin in the book &quot;The Keys of This Blood&quot;  &lt;/b&gt;





&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



  
  
  
  
  

&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Monarch Mind Control&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;




&lt;b&gt;
&lt;/b&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDRotQa_-HLituOVbRAfhKd8u806AloLPSQCKXEdZTynQ0h1v2jnM3xRdpVZWuGkylEX4No2PXlE7FkCn-kikG7cuCLrQXAB-3zB4TFileZihrL6S1My5-726MQS-lHjrGJD-VEyFTdDcZmDc92poikYH1_5MsaIXLpUpjANRhUl2Iw-2FU1dnjpbR/s0/superb-katy-perry-with-butterflies-in-her-hair.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Monarch Mind Control: Katy Perry’s Wide Awake&quot; border=&quot;0&quot; height=&quot;315&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDRotQa_-HLituOVbRAfhKd8u806AloLPSQCKXEdZTynQ0h1v2jnM3xRdpVZWuGkylEX4No2PXlE7FkCn-kikG7cuCLrQXAB-3zB4TFileZihrL6S1My5-726MQS-lHjrGJD-VEyFTdDcZmDc92poikYH1_5MsaIXLpUpjANRhUl2Iw-2FU1dnjpbR/s0/superb-katy-perry-with-butterflies-in-her-hair.jpg&quot; width=&quot;390&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Katy In &quot;Wide Awake&quot; With Butterflies In Her Hair&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;The monarch butterfy symbolizes the mind control program Project Monarch. The trauma based mind control fragments the mind of the victim. Project Monarch was allegedly developed within the CIA’s MKUltra mind control experiments in the early 1950&#39;s. &lt;BR&gt;&lt;BR&gt;Katy Perry’s music video “Wide Awake” is another music video among many from the music industry that conceals references to Monarch programming within its symbolism. &lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
  
&lt;b&gt;References to this practice occur often in mass media but are often coded using specific symbols and imagery. 

&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;The Monarch Mind Control Project is a mind control program, that was developed by the CIA, under Project MKULTRA.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Monarch Mind Control represents an important pillar of the New World Order.  Authorities, celebrities, moderators, musicians, politicians, actors, sportsmen and others are being misused for the Illuminati agenda, to exemplify the wrong way of life and to condition us to accept the coming satanic age.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;There have been many articles written which describe items of popular culture that conceal their symbolic references to an unknown, horrendous practice: Monarch programming. This technique of mind control seeks to create fully “programmable” individuals and is used by the shadowy elite in fields such as the military, politics and the murky underworld. &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Another area in which mind control, especially Monarch programming, is used is the entertainment business – not only because some celebrities are actual victims of mind control, but because entertainment is used to subtly normalize and glamorize this awful practice through symbolism.
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Katy Perry’s video Wide Awake is yet another music video that alludes to the concept of Monarch programming through its story line and its imagery. While this might not be obvious to most people, those who have some knowledge of the subject of mind control find it extremely blatant.&lt;BR&gt;&lt;BR&gt;In many ways, the video resembles works such as the movies Labyrinth and Sucker Punch and music videos like Paramore’s Brick by Boring Brick. All of these productions visually represent the inner-world of Monarch slaves through a specific set of symbols: mirrors, butterflies (especially Monarch butterflies), mazes and so forth. Not only do these objects aptly portray psychological concepts, they are actual “trigger images” used in mind control on Monarch slaves. Wide Awake fully utilizes this set of symbols, which gives the story line a deeper, and more disturbing, meaning.


&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/katy-perrys-wide-awake-video-about.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;




  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 
&quot;We are moving toward a new world order, the world of communism. We shall never turn off that road.&quot; &amp;nbsp; &amp;nbsp; Mikhail Gorbachev, 1987 &lt;/b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;

 &lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;Behind The Headlines: Crimes Of The Global &#39;Elite&#39;&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt; 
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgvkWh44hCOQW_fiRhbLn98CfdEeEPgrzOJhTgwxL0d61pCR0IneoMtWqyuwB7ZtrNAWZGz9PhvpqLsLEPGuqougRpTSqBhle3WppBFzloC1w5plROwwcmet2hgtMKzeiw528SaK5XOQrQ/s1600/2095fd0c03915a12b0d4fc623aaecae3--arm-tattoo-conspiracy-theories.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;An Egyptian Pyramid Capstone&quot; border=&quot;0&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgvkWh44hCOQW_fiRhbLn98CfdEeEPgrzOJhTgwxL0d61pCR0IneoMtWqyuwB7ZtrNAWZGz9PhvpqLsLEPGuqougRpTSqBhle3WppBFzloC1w5plROwwcmet2hgtMKzeiw528SaK5XOQrQ/s640/2095fd0c03915a12b0d4fc623aaecae3--arm-tattoo-conspiracy-theories.jpg&quot; width=&quot;519&quot;&gt;&lt;br&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;font color=&quot;#000000&quot;&gt;Sandy Hook Crisis Actor? &amp;nbsp;  False Flag?&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;b&gt;For almost 30 years, investigator Ole Dammegård has been on a quest to find the truth behind some of the worst conspiracies in the history of world - such as the murders US President John F. Kennedy, Robert Kennedy, John Lennon and the blowing up of m/s Estonia killing at least 852 innocent people. &lt;BR&gt;&lt;BR&gt;This has taken him on a very frightening and dangerous journey into unknown territories. What has been claimed as acts by lone madmen has turned out to be connected to the International military industrial complex and top level high finance, all sanctioned locally behind dark smoke screens. Ole has also analyzed the assassination of the Swedish Prime Minister Olof Palme, who was gunned down in February 1986.  &lt;BR&gt;&lt;BR&gt; Ole recently joined Behind the Headlines hosts Niall Bradley and Joe Quinn for a riveting radio show... &lt;br&gt; &lt;br&gt; The transcript. &lt;br&gt;&lt;br/&gt;&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/behind-headlines-crimes-of-global-elite.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt; 
&lt;/b&gt;


&lt;/b&gt;


   

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 
&quot;The individual is handicapped by coming face-to-face with a conspiracy so monstrous he cannot believe it exists.&quot; &amp;nbsp; &amp;nbsp;  J. Edgar Hoover&lt;/b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;




&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Order Of The Illuminati&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5-zuWpZkP7eWA52cWzvNjbNdIGyOvJRl_MCv1_ETmRV73gxv2eIkopro0IMkmp7N69t_yDDABE3ChV1UACtZ9FFsqz9A_iCrnvA8AknXbKlWrXV03Dep7nktAlxK574hyFQu8_Jp7xMI/s1600/bohemianclub.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The Order Of The Illuminati&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339145107006330466&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5-zuWpZkP7eWA52cWzvNjbNdIGyOvJRl_MCv1_ETmRV73gxv2eIkopro0IMkmp7N69t_yDDABE3ChV1UACtZ9FFsqz9A_iCrnvA8AknXbKlWrXV03Dep7nktAlxK574hyFQu8_Jp7xMI/s0/bohemianclub.jpg&quot; height=&quot;330&quot;  width=&quot;380&quot;  /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;
Its Origins, Its Methods and Its Influence on the World Events.
&lt;br /&gt;&lt;br /&gt;The Order of the Illuminati is often at the center of debates about the impact of secret societies on human history. Is the Illuminati a myth or does it truly secretly rule the world? This article attempts to shed some factual light on the Order of the Illuminati by reviewing some of the most important documents on the subject.



&lt;br /&gt;&lt;br /&gt; The world “Illuminati” is thrown around rather freely to describe the elite group that is secretly running the world. Most have a general idea of the meaning of the term, but are confused about the concepts and the ideas relating to it. Is the Illuminati the same thing as Freemasonry? What are their goals? What are their beliefs? Why do they act in secret? Do they practice occultism? This article attempts to draw a more precise picture of the Order by citing authors who have extensively studied the subject. Whether they are, at the end of the day, critics or apologists of the Illuminati, these authors base their thoughts on credible facts. Some of the most interesting documents on the Illuminati were written by initiates of Secret Societies as they understood the philosophical and spiritual undercurrent driving the movement forward. Using these works, we will look at the origins, the methods and the impacts of the Illuminati on world history.
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-order-of-illuminati-its-origins-its.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;

  
  


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 
&quot;The drive of the Rockefellers and their allies is to create a one-world government combining supercapitalism and Communism under the same tent, all under their control. Do I mean a conspiracy? Yes, I do. I am convinced there is such a plot, international in scope, generations old in planning, incredibly evil in intent.&quot; &amp;nbsp; &amp;nbsp; –Rep. Larry P. MacDonald, killed in Korean Air Lines 007, 1983

&lt;/b&gt;








&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;





  
  
 &lt;b&gt;
 &lt;span style=&quot;color: #5f0000;&quot;&gt;
 &lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;Surveillance Cameras With Computer Chips Or Smart Sensors That Predict And/Or Sense Criminal Activities, Alerts Police&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;
 &lt;/b&gt;
 &lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
 &lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKaGTUyrjZVAsiX_rXbS46Lkzvoqr9FE2WtrpKEjRhFsGo6l_NncoPpJO9ZMKlfMGqJODmBpF_O9TpnDWRaWVO1zS_EiUyVBHdVBtvllDmlOB9NmunfK0UGOUzphajqHlbi_3Ua0AEL-wG/s1600/ccbe4205a133fe66d41d39c12ea4cd5f_f1011.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKaGTUyrjZVAsiX_rXbS46Lkzvoqr9FE2WtrpKEjRhFsGo6l_NncoPpJO9ZMKlfMGqJODmBpF_O9TpnDWRaWVO1zS_EiUyVBHdVBtvllDmlOB9NmunfK0UGOUzphajqHlbi_3Ua0AEL-wG/s640/ccbe4205a133fe66d41d39c12ea4cd5f_f1011.jpg&quot; width=&quot;470&quot; /&gt;&lt;/a&gt; &lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
 &lt;b&gt;
 &lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
 &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMc9eN0TzwvAbWGJH32FtU_nXDQ4utlZkjsdSY7phJKuTPFabDMCRxr2bTRWLpddDMeAk7ECWJiw3nFZOJJUPCRPsnFJ222lIlHUQh2JzWYqNgIoj75R7XKYBpq2mYPqFXe-D61IxlyKls/s0/Smart-City-1024x534-panorama.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMc9eN0TzwvAbWGJH32FtU_nXDQ4utlZkjsdSY7phJKuTPFabDMCRxr2bTRWLpddDMeAk7ECWJiw3nFZOJJUPCRPsnFJ222lIlHUQh2JzWYqNgIoj75R7XKYBpq2mYPqFXe-D61IxlyKls/s0/Smart-City-1024x534-panorama.jpg&quot; width=&quot;470&quot; /&gt;&lt;/a&gt;&lt;/center&gt; &lt;/div&gt;
 &lt;b&gt;With sophisticated cameras and smart sensor systems, law enforcement agencies and transportation departments across the United States are now able to proactively monitor and respond to crimes or accidents as they unfold; the sensors can also assist transportation departments in analyzing traffic patterns in real time; the system could allow officials to change one way streets, design real time traffic signals, and multiple speed limits to make traffic flow more smoothly.
 &lt;br /&gt; &lt;br /&gt;
 
 The East Orange New Jersey police department was the first U.S. agency to install a Smart Imaging Sensor system as part of its broader network of security cameras around the city.
 &lt;br /&gt;&lt;br /&gt;
 These smart sensors process images that the high-resolution cameras record in real time and can automatically detect and/or predict when a crime is occurring. When it senses something it will alert law enforcement officials instantly.
 &lt;br /&gt;&lt;br /&gt;Government agencies and business around the world have already taken notice of predictive sensors.
 
 &lt;br /&gt;&lt;br /&gt;Recently, an automated camera system called AIsight (pronounced eyesight), was installed in Boston after the 2013 marathon bombing, that monitors camera feeds in real time and alerts authorities if it spots unusual activity. &lt;br /&gt;&lt;br /&gt;AIsight cameras use a statistical method called machine learning to learn what is normal for an area and then alerts on abnormal activity.
 
 That could be picking up anything from unusual loitering to activity occurring in restricted areas.
 &lt;br /&gt;&lt;br /&gt;
 &lt;b&gt;
 &lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/artificially-intelligent-security.html&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;
 
 &lt;/b&gt;
 
 
 &lt;/b&gt;




  
  
  
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

&lt;b&gt;
 &quot;The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary.&quot; &amp;nbsp; &amp;nbsp; 

-H.L. Mencken

 &lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;




  
    
  
   
  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Soylent Green Or Bugs Your Choice!&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;b&gt;



&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPtLVeYSm1Fp_uvuPUta3NOYnzhkv-NVdcDJnbH3NoZRphRe8RRaqaB9-rx5f_rEvQneh9ATwnoWbLbwMZ63k1PGwmXFXHuQo9hgtZNtgvgdykuuaFYew-Lxc6ZFSV50_hZuCnmnpjS6Dd9yoR-EaNIU3BNX54mE7r0p_fglPj3CnJ_eiJQ1eLmq1g/s442/dscn1278.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; &quot;&gt;&lt;img alt=&quot;Soylent Green&quot;  border=&quot;0&quot; height=&quot;295&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPtLVeYSm1Fp_uvuPUta3NOYnzhkv-NVdcDJnbH3NoZRphRe8RRaqaB9-rx5f_rEvQneh9ATwnoWbLbwMZ63k1PGwmXFXHuQo9hgtZNtgvgdykuuaFYew-Lxc6ZFSV50_hZuCnmnpjS6Dd9yoR-EaNIU3BNX54mE7r0p_fglPj3CnJ_eiJQ1eLmq1g/s442/dscn1278.jpg&quot; width=&quot;414&quot; &gt;&lt;br /&gt;
  
  
     
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Soylent Green Wafers&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
  
  
  

  
  
  &lt;/center&gt;
&lt;/div&gt;





&lt;b&gt;
Soylent Green the Movie!&lt;BR&gt;&lt;BR&gt;  A nightmarish futuristic fantasy about the controlling power of big corporations and an innocent cop who stumbles on the truth.&lt;BR&gt;&lt;BR&gt;

In the future food shortages are so extreme that a jar of strawberry jam is $150 and people weep at the sight of beef. Housing in New York City, where &quot;Soylent Green&quot; is set, is only affordable to the richest of the rich. The elite, they&#39;re called.
&lt;BR&gt;&lt;BR&gt;

Everyone else sleeps in their cars — or on the street.
&lt;BR&gt;&lt;BR&gt;


At this time the Earth is overpopulated and totally polluted;  natural resources have been exhausted, and the nourishment of the population is provided by Soylent Industries, a company that makes a food consisting of plankton from the oceans.&lt;BR&gt;&lt;BR&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM8vVZit5_tWeD12Iq8yZnLBdBazMaPa-FQ04lZrjBYDfj0U_UZBVt34fcgxC_StK_ukhRvMuDrL26YlhQ9FXfiD-izk6ZReh8Dt6cKiWXU4FrAzmclG7rPl830m5YCW4jnc4oGJPzfY4M_dKTQN4jIKe3yDYoH5zxzLE-eAR5LGS2xbq-21peJJxn/s320/573261e2-b648-4ce2-8e11-862b6a2fc1f0articleimage(1).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;  margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Bug Burger&quot;  border=&quot;0&quot; height=&quot;330&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM8vVZit5_tWeD12Iq8yZnLBdBazMaPa-FQ04lZrjBYDfj0U_UZBVt34fcgxC_StK_ukhRvMuDrL26YlhQ9FXfiD-izk6ZReh8Dt6cKiWXU4FrAzmclG7rPl830m5YCW4jnc4oGJPzfY4M_dKTQN4jIKe3yDYoH5zxzLE-eAR5LGS2xbq-21peJJxn/s320/573261e2-b648-4ce2-8e11-862b6a2fc1f0articleimage(1).jpg&quot; width=&quot;395&quot; &gt;&lt;br /&gt;
  
  
  
   
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Bug Burger - Made From Buffalo Worms&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
  
  
  
  

  
  
  &lt;/center&gt;
&lt;/div&gt;
Most of the World&#39;s population survives on processed rations produced by the massive Soylent Corporation, including Soylent Red and Soylent Yellow, which are advertised as &quot;high-energy vegetable concentrates&quot;. The newest product is Soylent Green: small green wafers which are advertised as being produced from &quot;high-energy plankton&quot;. It is much more nutritious and palatable than the red and yellow varieties but, like most other foods, in short supply which often leads to weekly food riots.&lt;BR&gt;&lt;BR&gt; In New York City, when Soylent&#39;s member of the board, William R. Simonson, is murdered, apparently by a burglar at the Chelsea Towers West where he lives, efficient Detective Thorn is assigned to investigate the case with his partner Solomon &quot;Sol&quot; Roth. &lt;BR&gt;&lt;BR&gt; 
  
  
  
  
  Thorn comes to the fancy apartment and meets Simonson&#39;s bodyguard Tab Fielding and the &quot;furniture&quot; (woman that is rented together with the flat) Shirl and the detective concludes that the executive was not a burglary victim but executed. Further, he finds that the Governor Santini and other powerful men want to disrupt and end Thorn&#39;s investigation. &lt;BR&gt;&lt;BR&gt; 
&lt;div style=&quot;text-align: center;&quot;&gt;
  
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWiPlyi8CUsyRlRttc0XJHGN_Mxw7uE8qrDDh7jY-hQVPSWmsSNprDdxC5xccrlW-t5eYucsiB0s879IRfLrL6cC1nyjrioJFVs-VZV1pBBQiLr9MWGn7gCYRAOVhMZTHHeNUKv9j8NxmRpqdQP6TUcnKxlBA9RUJixtxtk2VTQuDicPW5-BAx9ljL/s0/71iEMYidFrL._SX569_.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;  margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Bag Of Edible Insects&quot;  border=&quot;0&quot; height=&quot;380&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWiPlyi8CUsyRlRttc0XJHGN_Mxw7uE8qrDDh7jY-hQVPSWmsSNprDdxC5xccrlW-t5eYucsiB0s879IRfLrL6cC1nyjrioJFVs-VZV1pBBQiLr9MWGn7gCYRAOVhMZTHHeNUKv9j8NxmRpqdQP6TUcnKxlBA9RUJixtxtk2VTQuDicPW5-BAx9ljL/s0/71iEMYidFrL._SX569_.jpg&quot; width=&quot;370&quot; &gt;
  
  &lt;br /&gt;
  
   
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Edible Bag Of Seasoned and Crunchy, Crickets,&lt;BR&gt; Grasshoppers, Silkworm Pupae, &amp; Sago Worms&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
  
  
  
  

  
  
  &lt;/center&gt;
&lt;/div&gt;

  
  
  
   But Thorn is determined to continue his work and discovers a bizarre, disturbing secret of the ingredient used to manufacture Soylent Green. &lt;BR&gt;&lt;BR&gt; Toward the end of the movie Thorn is injured and taken away by paramedics, and shouts out, “SOYLENT GREEN IS PEOPLE!”&lt;BR&gt;&lt;BR&gt; Dead People to be exact!&lt;BR&gt;&lt;BR&gt;
Here&#39;s what we might expect soon in the New World Order diet.&lt;BR&gt;&lt;BR&gt;

Comparison to Pre-Collapse Times&lt;BR&gt;&lt;BR&gt;

In wealthy countries, in pre-Collapse times, it was customary for people to buy most of their food at large, corporate warehouse-stores called &#39;supermarkets&#39;. Often, when people see pictures of these facilities, their reaction is that the photo must be a fake. The vast size, the piles of fresh-looking and exotic vegetables, the shelves and shelves of varied boxed and bottled and immaculately wrapped products, the neatly plastic-wrapped, perfect-looking meat, it seems impossible. It&#39;s all historically accurate, though. Those images are nothing like the modern reality of going to market, and it&#39;s hard for us today to imagine how this magical fantasy land of food that our ancestors took for granted was even physically possible.
  &lt;BR&gt;&lt;BR&gt;The New World Order has not come close to restoring the pre-Collapse global food system, but with decades to reshape the ruined global systems of the early 21st century, a global trade and transportation network, and access to the entire world, they have been able to shape a new global food system which by and large is fairly enviable relative to a purely local food system.&lt;BR&gt;&lt;BR&gt;

Some New World Order Food Choices&lt;BR&gt;&lt;BR&gt;Bugs, Bugs, And More Bugs!&lt;BR&gt;&lt;BR&gt; How would like your bug burger prepared?
  
  
  &lt;/b&gt;
  &lt;br&gt;&lt;br&gt;
  
  
  
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/soylent-green-or-eating-bugs-in-new.html&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt; 

&lt;/b&gt;

  
  
  
  
  
  
  
  



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt; 
&quot;By the end of this decade we will live under the first One World Government that has ever existed in the society of nations ... a government with absolute authority to decide the basic issues of human survival. One world government is inevitable.&quot; &amp;nbsp; &amp;nbsp; -Pope John Paul II
&lt;/b&gt;








&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
     
  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;CyberExtruder&#39;s 2D to 3D Face Patent&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyoKX18ObhpzxyQw0OEAYsxhtZ7R9PTBQqZJzD29ZQDSMYLyduwxxbB99_gK9fLmMhEwVpvNvT_H6VK3miSQW2gLqnq_K8BEA9g0i9t3icenXdUjA5QOIBNJSeiPE8X8_yBzzTQOexwNnYLK8v7QEe986dJiZmLkaiCrgDs7BlEtsm_GAyb0nH_zmL/s0/Biometricfacial%20rec.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;3d Face Imaging&quot; border=&quot;0&quot; height=&quot;330&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyoKX18ObhpzxyQw0OEAYsxhtZ7R9PTBQqZJzD29ZQDSMYLyduwxxbB99_gK9fLmMhEwVpvNvT_H6VK3miSQW2gLqnq_K8BEA9g0i9t3icenXdUjA5QOIBNJSeiPE8X8_yBzzTQOexwNnYLK8v7QEe986dJiZmLkaiCrgDs7BlEtsm_GAyb0nH_zmL/s0/Biometricfacial%20rec.jpg&quot; width=&quot;490&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;


  
  
  
  CyberExtruder is a high tech company that has been given a patent for their process of creating reliable 3D models of a person’s face from a single or series of 2D images. 
  
  &lt;BR&gt;&lt;BR&gt;
  CyberExtruder has announced the release of Aureus 3D Version 5.7. &quot;With Aureus 3D Version 5.7, we&#39;ve achieved product performance at speeds unprecedented in the industry,&quot; says Paul Nicholas, President, and CEO. &quot;With our 128 byte face template size, the smallest in the industry, we can perform matching on a database of 7.5 billion people (the world population) in 4.69 seconds. With speeds at this level coupled with superior accuracy and scalability, Aureus 3D Version 5.7 will change the industry. There’s nothing of its kind anywhere.&quot;
 &lt;BR&gt;&lt;BR&gt;
  
  
  &lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjDayNM4rQ9wNInBeldG_d3xc7Sr5xKxRCwB_D_fH9r7DjoDIipcakewUfdxRBpAIGRtxSAy6HtP2DX-GyepyLWqajmUgAGfoW1rYm879s8ap5F8ryP0ktqREMGPBw-NCizERTzBWcqSi6APll-YMRZb1eFz-zi5Wf9T7Q9rfkr2GKk8G5GamnZYCwvw/s0/watchlist.png&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;3d Face Imaging&quot; border=&quot;0&quot; height=&quot;320&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjDayNM4rQ9wNInBeldG_d3xc7Sr5xKxRCwB_D_fH9r7DjoDIipcakewUfdxRBpAIGRtxSAy6HtP2DX-GyepyLWqajmUgAGfoW1rYm879s8ap5F8ryP0ktqREMGPBw-NCizERTzBWcqSi6APll-YMRZb1eFz-zi5Wf9T7Q9rfkr2GKk8G5GamnZYCwvw/s0/watchlist.png&quot; width=&quot;370&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
Aureus 3D Version 5.7 provides the easy to integrate and easy to deploy high-performance face recognition solution demanded in a wide variety of applications including loss prevention and security, access control, law enforcement and Safe City, and hospitality and gaming. Aureus 3D Version 5.7 is the perfect enhanced video analytic now required by industry leading VMS and PSIM systems.
 &lt;BR&gt;&lt;BR&gt;


A proprietary 2D to 3D face modeling technology mitigates the challenges of pose, lighting, and expression in combination with a novel deep neural network architecture that provides enhanced discrimination capability at high speed with low memory requirements. Providing OEM’s, solution integrators and end-users with the industry’s best facial recognition technology for a broad spectrum of real-world government and commercial applications.
  
  
  
   &lt;BR&gt;&lt;BR&gt;
  
  
  
  
  
  CyberExtruder’s 2D-to-3D conversion is certainly an important innovation to the security and biometrics technology industries. Why? It enables better matching between offline photographs and surveillance video. While the matching of &quot;watch list&quot; images against surveillance video has traditionally achieved mixed results as a result of inadequate lighting, angle, expression, etc., this patent could signify a leap forward in terms of the quality and value of 3D facial images.
&lt;br /&gt;&lt;br /&gt;


Research has focused on solutions to solve facial recognition’s weakest operational elements – Age, Pose, Illumination and Expression (known as the APIE problem).
&lt;br /&gt;&lt;br /&gt;
The benefits of holistic 3D approach to face recognition are particularly evident when viewed in the context of mitigating errors in face matching due to subject pose (the angle of the person’s face relative to the camera) and expression (the person’s innate ability to deform their face).
&lt;br /&gt;&lt;br /&gt;
Years of research have been aimed at developing ways in which a computer can not only understand how a human face is composed, but also how to differentiate one face from another. Security features which can now be applied across markets like loss prevention, financial services, law enforcement and security, healthcare, defense and intelligence and a myriad of marketing and customer service applications.&lt;/b&gt;




  
  
  
  
  
 
 
  



  
  
   
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&quot;The American people will never knowingly adopt socialism. But, under the name of &#39;liberalism,&#39; they will adopt every fragment of the socialist program, until one day America will be a socialist nation, without knowing how it happened.&quot; &amp;nbsp; &amp;nbsp; - NORMAN THOMAS, former U.S. Socialist Presidential Candidate &lt;/b&gt;











&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


  
  


&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;OpenAI’s CEO Sam Altman Launches Crypto Project &#39;Worldcoin&#39;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
  
  
  
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh97zFQSyhyg-wR2fcdp71VAa80alIEf8o3qVGl01LOFZASa1y29xqcLhLnBzjDoMOUAi9bTrtZ4rWHpDQghz2E9dmByXbeznaoUav_4cPvBr_Ve2bqRXHAtjrdRjva-Qk_0a_uJC3HnvBBVM8dZpMQp2gnJ0INGDekDCiCNjeHg0Rn26V9UcUrGPx2QKM/s0/eyeball-orb-worldcoin-crytocurrency-designboom-ban.jpeg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Video Surveillance Orb&quot; border=&quot;0&quot; height=&quot;288&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh97zFQSyhyg-wR2fcdp71VAa80alIEf8o3qVGl01LOFZASa1y29xqcLhLnBzjDoMOUAi9bTrtZ4rWHpDQghz2E9dmByXbeznaoUav_4cPvBr_Ve2bqRXHAtjrdRjva-Qk_0a_uJC3HnvBBVM8dZpMQp2gnJ0INGDekDCiCNjeHg0Rn26V9UcUrGPx2QKM/s0/eyeball-orb-worldcoin-crytocurrency-designboom-ban.jpeg&quot; width=&quot;552&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Worldcoin&#39;s Eye Scanning Orb&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
  
&lt;b&gt;OpenAI&#39;s CEO Sam Altman has launched an audacious eyeball-scanning cryptocurrency startup &#39;Worldcoin&#39; to help build a reliable solution for distinguishing humans from AI online, enable global democratic processes and drastically increase economic opportunity. &quot;If successful, we believe Worldcoin could drastically increase economic opportunity, scale a reliable solution for distinguishing humans from AI online while preserving privacy, enable global democratic processes, and eventually show a potential path to AI-funded UBI,&quot; Alex Blania and Sam Altman, Founders of Worldcoin.
&lt;BR&gt;&lt;BR&gt;
Worldcoin consists of a privacy-preserving digital identity (World ID) and, where laws allow, a digital currency (WLD) received simply for being human.&lt;/b&gt;
&lt;BR&gt;&lt;BR&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC4WO-iOJEN5FbhEHTGpTpk6N6HWwEMEeZv9GGhd3R6m4ZVrqBG99TfBwYRh85AKBWH0VNoTHmpwr2leNVMnIsK3XQUy-rQm0K4zovayZfSA8Y9rTWCKrQ-ZTbkU0S8OlM8M8MVYHwxOijI74MUBIX389QCVPfnPxJSfbowrySK-X24TYqFF2GT7kMJw8/s0/Worldcoin-1-scaled-e1688137829391.jpeg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Video Tracking Orb&quot; border=&quot;0&quot; height=&quot;325&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC4WO-iOJEN5FbhEHTGpTpk6N6HWwEMEeZv9GGhd3R6m4ZVrqBG99TfBwYRh85AKBWH0VNoTHmpwr2leNVMnIsK3XQUy-rQm0K4zovayZfSA8Y9rTWCKrQ-ZTbkU0S8OlM8M8MVYHwxOijI74MUBIX389QCVPfnPxJSfbowrySK-X24TYqFF2GT7kMJw8/s0/Worldcoin-1-scaled-e1688137829391.jpeg&quot; width=&quot;539&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;The Orb Being Used In A Shopping Mall&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;&lt;b&gt;
According to the company, where the rules are less clear, such as in the US, steps will be taken so more people can benefit from both.
&lt;BR&gt;&lt;BR&gt;
Users can now download World App, the first protocol-compatible wallet, and reserve their share.
After visiting an Orb, a biometric verification device, they will receive a World ID. This lets them prove they are a real and unique person online while remaining completely private.
&lt;BR&gt;&lt;BR&gt;
As the global distribution of Orbs is ramping up, users can find the closest one and book time to be verified with World App and at Worldcoin’s official website.
In addition, the startup has begun the rollout of 1,500 Orbs to meet global demand for World ID.
&lt;BR&gt;&lt;BR&gt;
&quot;The project will increase the number of available Orbs to 1,500 throughout the summer and fall in more than 35 cities around the world,&quot; Worldcoin said in a blogpost.
The new Orbs will be available in 35+ cities in over 20 countries, including India, across five continents between now and the end of 2023.
&lt;BR&gt;&lt;BR&gt;
The availability of 1,500 Orbs will more than 5x sign-up capacity globally and enable millions of additional people to join the two million who have already signed up for World ID.&lt;/b&gt;




 &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/worldcoin-scan-your-eyeball-for-cryto.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
  
  
  
  
  
  

  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
  

&lt;b&gt;&quot;Today, America would be outraged if U.N. troops entered Los Angeles to restore order [referring to the 1991 LA Riot]. Tomorrow they will be grateful! This is especially true if they were told that there were an outside threat from beyond, whether real or promulgated, that threatened our very existence. It is then that all peoples of the world will plead to deliver them from this evil. The one thing every man fears is the unknown. When presented with this *scenario*, individual rights will be willingly relinquished for the guarantee of their well-being granted to them by the World Government.&quot;     Dr. Henry Kissinger, Bilderberger Conference, Evians, France, 1991&lt;/b&gt;



&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br/&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br/&gt;
&lt;br/&gt;
&lt;br/&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


   
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Weather As A Force Multiplier&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAAGG0pi1AhTjth1MeT7MZJL_dNJc2Lt4hHIruR1BZwVPqSPQEMqilqFnpS7X8CJbXIN6ObjzfM1N0ZiXpNl9PpaJDDLRwPiTdDYprmQNQ4ALqwwWQoaT8BcfSoIubBODZ7D1D9pvlsVsX/s1600/image_2448.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;A Massive Hurricane&quot; border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAAGG0pi1AhTjth1MeT7MZJL_dNJc2Lt4hHIruR1BZwVPqSPQEMqilqFnpS7X8CJbXIN6ObjzfM1N0ZiXpNl9PpaJDDLRwPiTdDYprmQNQ4ALqwwWQoaT8BcfSoIubBODZ7D1D9pvlsVsX/s1600/image_2448.jpg&quot; width=&quot;520&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;
Category 5 Irma the Strongest&lt;br /&gt; 
Atlantic Hurricane on Record&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;Owning The Weather In 2025&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;In 2025 US aerospace forces can &quot;own the weather&quot; by capitalizing on emerging technologies and focusing development of those technologies to warfighting applications. Such a capability offers the warfighter tools to shape the battlespace in ways never before possible. It provides opportunities to impact operations across the full spectrum of conflict and is pertinent to all possible futures. The purpose of this paper is to outline a strategy for the use of a future weather modification system to achieve military objectives rather than to provide a detailed technical road map. &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;A high risk/high reward endeavor, weather modification offers a dilemma not unlike the splitting of the atom. While some segments of society will always be reluctant to examine controversial issues such as weather modification, the tremendous military capabilities that could result from this field are ignored at our own peril. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns, to complete dominance of global communications and counter-space control, weather modification offers the warfighter a wide range of possible options to defeat or coerce an adversary. &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Technology advancements in five major areas are necessary for an integrated weather modification capability: (1) advanced nonlinear modeling techniques, (2) computational capability, (3) information gathering and transmission, (4) a global sensor array, and (5) weather intervention techniques. Some intervention tools exist today and others may be developed and refined in the future. 
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Weather As A Force Multiplier: Owning The Weather In 2025 Research Paper &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/weather-as-force-multiplier-owning.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;


 
   
  
  







  
</description><link>https://thecomingnewworldorder.blogspot.com/2008/02/the-illuminati-illuminati-is-name-that.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNq-733cwFxjMpCG473EFixSmpcv_6cjYazm2K-YTHLnCyWTOIZpXy6tQ0Xxg65UmLNaIPyK3zcEAKNODO5GTFhhd_Ge52NbSQFfUVAwWUIqGJisg_6A8j4LYKuD7V2nkrLRbxwvSXd28/s72-c/adam_weishaupt_shrunk.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-465275845524130043</guid><pubDate>Mon, 21 Feb 2011 08:58:00 +0000</pubDate><atom:updated>2026-03-07T19:49:14.047-06:00</atom:updated><title></title><description>

&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;America&#39;s Shopping Malls Are Dying A Slow Death&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCFlplFotgGlj0DdjiRUA3i3GtCNRofxAwO_xmMTEmG4xu5HkRi3aXKHz3xD3W1nRM222woPjj-4rweIvWz8BOBDRZ3A7l7w9qm1dm4KtEc0L50GNoykrY-6NpNr1lU4HS2hJTTOURgvQs/s1600/dead-mall.jpg&quot; imageanchor=&quot;1&quot;  style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Closed Mall&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCFlplFotgGlj0DdjiRUA3i3GtCNRofxAwO_xmMTEmG4xu5HkRi3aXKHz3xD3W1nRM222woPjj-4rweIvWz8BOBDRZ3A7l7w9qm1dm4KtEc0L50GNoykrY-6NpNr1lU4HS2hJTTOURgvQs/s1600/dead-mall.jpg&quot; style=&quot;height: 335px; width: 445px;&quot; /&gt;&lt;br /&gt;
  
  
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;The Canton Centre Mall in Canton, &lt;br /&gt;
Ohio is boarded up and vacant&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;All across America, once-vibrant shopping malls are being boarded up.&lt;/b&gt;&lt;b&gt;&lt;br /&gt;
&lt;br /&gt;
Traffic-driving anchors like Sears and JCPenney are shutting down stores, and mall owners are having a hard time finding retailers large enough to replace them. With a fresh wave of closures on the horizon, the problem is set to accelerate, according to retail and real estate analysts.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlEuIMrvlX1ACa3Wmat3hyphenhyphenDPYf2uGxnzgl7tyty4YJP8NHQvhQyLnEDVjEZkhPbIjJULrxtsfup8CVPp1Q_ki7koL5md4ryCKCaTKBr1JRlDCa-juhADpRDfhH1vCZi8sSXAV49WKwA3oT/s1600/Macy_s_closed_at_Northland_Mall_2739100000_15412101_ver1.0_640_480.jpg&quot; imageanchor=&quot;1&quot;  style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Closed Macy&#39;s&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlEuIMrvlX1ACa3Wmat3hyphenhyphenDPYf2uGxnzgl7tyty4YJP8NHQvhQyLnEDVjEZkhPbIjJULrxtsfup8CVPp1Q_ki7koL5md4ryCKCaTKBr1JRlDCa-juhADpRDfhH1vCZi8sSXAV49WKwA3oT/s1600/Macy_s_closed_at_Northland_Mall_2739100000_15412101_ver1.0_640_480.jpg&quot; style=&quot;height: 320px; width: 545px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;About 15% of U.S. malls will fail or be converted into non-retail space within the next 10 years, according to Green Street Advisors, a real estate and REIT analytics firm. That&#39;s an increase from less than two years ago, when the firm predicted 10% of malls would fail or be converted.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&quot;The risk of failure for a mall increases dramatically once you see anchor closures,&quot; said Cedric Lachance, managing director of Green Street Advisors. &quot;Their health is very important ... and most of them are highly likely to continue closing stores.&quot;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Within 15 to 20 years, retail consultant Howard Davidowitz expects as many as half of America&#39;s shopping malls to fail. He predicts that only upscale shopping centers with anchors like Saks Fifth Avenue and Neiman Marcus will survive.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&quot;Middle-level stores in middle-level malls are going to be extinct because they don&#39;t make sense,&quot; said Davidowitz, chairman of Davidowitz &amp;amp; Associates, Inc., a retail consulting and investment banking firm. &quot;That&#39;s why we haven&#39;t built a major enclosed mall since 2006.&quot;&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2025/04/americas-shopping-malls-are-dying-slow.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;



  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%; font-weight: bold;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Surveillance cameras&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxxmL7vbW_esYd29-D6s-ONSFHX2tmahmUMJfZYLFc9WYleqp_HgvoX_naWbaVFZ4ndjJYSvHHkQgE36dcQBVPJxB_jCCFS5DoIMgyiz3a25QfBLQ8lHn30XPLLDgX7pz2SiVdcEHtuvE-/s1600-h/post-1-121942665777.jpg&quot;  imageanchor=&quot;1&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339177860461532114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxxmL7vbW_esYd29-D6s-ONSFHX2tmahmUMJfZYLFc9WYleqp_HgvoX_naWbaVFZ4ndjJYSvHHkQgE36dcQBVPJxB_jCCFS5DoIMgyiz3a25QfBLQ8lHn30XPLLDgX7pz2SiVdcEHtuvE-/s320/post-1-121942665777.jpg&quot; style=&quot;cursor: pointer; display: block; height: 318px; margin: 20px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;170 surveillance cameras on one block! NYC now Camera City. In 2005, the NYCLU counted more than 4,000 street level cameras from the West Village down to Battery Park. The group also found that the 292 cameras along 125th Street in Central Harlem recorded nearly every movement on that busy street. &quot;I would believe the number has dramatically increased&quot; three years later, said Matt Faiella, staff attorney for the NYCLU. The cameras have myriad uses. The NYPD wants to install thousands to protect the city against terrorism. The NYPD&#39;s recently released plan to protect the city by installing some 3,000 additional cameras in the city raised concern at the NYCLU because it takes a new step in surveillance by creating a database of license plates and people&#39;s movements. The police said the images, including license plate captures, would be erased after 30 days. Because they&#39;re continually making new discoveries to increase the effectiveness of surveillance cameras, biometrics, rfid chips, etc., the government may soon be tracking us all.&lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;High-Tech Laser Weapons&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;


&lt;/b&gt;
&lt;div  style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigM1_xuoLY6AlPYgQG5Tyq1U8a0Bm5fSLJXfAehbIP4TUj9ioCpV3dSjmgiUEFYpNQyTBoGKJteWKMYX7OQXnhPdLKMqzSlkIcQ1z01Xmy3hDSZSj0LD3eC4GW6cGwaa8WOwuUAV9JE2tQ/s1600/Hi_tech_Laser_Weapon-System_Currently_Existing.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;High Tech Laser Weapons&quot; border=&quot;0&quot; height=&quot;292&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigM1_xuoLY6AlPYgQG5Tyq1U8a0Bm5fSLJXfAehbIP4TUj9ioCpV3dSjmgiUEFYpNQyTBoGKJteWKMYX7OQXnhPdLKMqzSlkIcQ1z01Xmy3hDSZSj0LD3eC4GW6cGwaa8WOwuUAV9JE2tQ/s1600/Hi_tech_Laser_Weapon-System_Currently_Existing.jpg&quot; width=&quot;430&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&lt;b&gt;
&lt;b&gt;The next generation of futuristic weapons has arrived. The U.S. Navy announced that its high-tech laser weapon is ready to disable and destroy enemy drones and small boats, should the need arise.&lt;br /&gt;&lt;br /&gt;

The 30-kilowatt laser weapon system (LaWS) is housed aboard the USS Ponce, a naval vessel stationed in the Arabian Gulf— a body of water located south of Iraq that separates the Saudi Arabian peninsula from Iran.
&lt;br /&gt;&lt;br /&gt;
While sailors have not yet used the new laser to destroy any real enemy targets, the Navy is prepared to do just that, if necessary, according to Rear. Adm. Matthew Klunder, chief of naval research. 
&lt;br /&gt;&lt;br /&gt;
Sailors operate the laser using a video game-type controller, according to Navy officials. 
&lt;br /&gt;&lt;br /&gt;
The first course of action is a nonlethal option — which amounts to a very bright glare. If a threat keeps coming they can increase the strength of the laser&#39;s highly concentrated beam, which will knock out the sensors or control systems on an enemy drone or vessel. If the adversary still doesn&#39;t get the hint, the beam can be turned up higher, making it capable of destroying the threat altogether.
&lt;/b&gt;
&lt;/b&gt;

&lt;/b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
  
&lt;b&gt;&lt;span style=&quot;font-size: 130%; font-weight: bold;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Biometric Digital Fingerprint Scanner&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPL532Jtt9QKZtmNFHCo9OiXMOcM_GX8xbOn22PgKi4okX46H-JAcHF1Yg0S9q5itj0M9nQ9OEm38i8ep5WVNdUc7kOtfWGX0OsuvCehZRgMUkMDnnAFrsQhqGBooaXeKxBZTPLM21r9uC/s1600-h/fs_10_notes_01c_300_441.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339145107006330466&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPL532Jtt9QKZtmNFHCo9OiXMOcM_GX8xbOn22PgKi4okX46H-JAcHF1Yg0S9q5itj0M9nQ9OEm38i8ep5WVNdUc7kOtfWGX0OsuvCehZRgMUkMDnnAFrsQhqGBooaXeKxBZTPLM21r9uC/s320/fs_10_notes_01c_300_441.jpg&quot; style=&quot;height: 230px; width: 270px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;b&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;Biometric technology, requiring digital fingerprints and a photograph for identification, is used by the Department of State to establish and verify the identities of visa applicants at embassies and consulates around the world through its BioVisa program. The Department of Homeland Security established the US-VISIT program under which a traveler’s biometrics are collected in his country, compared against a watch list of known criminals and suspected terrorists, and then verified again upon arrival in the United States. Biometrics are unique and virtually impossible to forge.&lt;/span&gt;&lt;/b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;span style=&quot;font-size: 130%; font-weight: bold;&quot;&gt;Hitachi Finger Vein Scanner&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1jZWuKQmWVSTlm6ywwvwD6qeUptdm5HZCe-dJguF2rH06ym2q09LoyoPgvkhS5AKWbTeg4BQJNMQs1V2zW19lf2vsDhJ1OjC22tCbA67ggx-j312yHk5qjFmLN0r47SRBnKbeb_DCEp1k/s320/211.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339146072287753890&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1jZWuKQmWVSTlm6ywwvwD6qeUptdm5HZCe-dJguF2rH06ym2q09LoyoPgvkhS5AKWbTeg4BQJNMQs1V2zW19lf2vsDhJ1OjC22tCbA67ggx-j312yHk5qjFmLN0r47SRBnKbeb_DCEp1k/s320/211.jpg&quot; style=&quot;height: 195px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;This is a new payment technology brought to us by Hitachi which makes your fingertip pay for transactions. This is a biometric cardless credit payment system, which adopts the uniqueness of the blood vessel patterns in each individual human body as the signature for payment authentication. The new biometric system is able to recognize pattern of the blood vessels in your fingers, so, what you need is to insert your finger for a scan to authenticate the credit card transactions. Blood vessels are hidden under the skin, which aren’t like retinas or fingerprints and shouldn’t be possible to counterfeit. In order for you to use your fingertip for making payment, you need to first register your finger vein pattern with the credit card company. The idea of cardless payment making use finger vein that has lowest counterfeit possibility is definitely good. A few of the common problems such as card loss and theft will be eliminated with this new system.&lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
  
 
  



&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;The Financial New World Order&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS1BZkXmOF7HmyE7rdNsAVdEUO4tbSD-ZPoq-Z9N1inLFvaDQ3zvGt-qRLDz5GLYr9TL0Qx2WGT_TSEFMh4yNIMYcwEaTSrBGnSDqpViwha6sY-Eq6QL2p-MtI8_PPGcGFJeVt2x2mJ2PF/s1600/world-map-networking_23-2147511038+%25285%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;352&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS1BZkXmOF7HmyE7rdNsAVdEUO4tbSD-ZPoq-Z9N1inLFvaDQ3zvGt-qRLDz5GLYr9TL0Qx2WGT_TSEFMh4yNIMYcwEaTSrBGnSDqpViwha6sY-Eq6QL2p-MtI8_PPGcGFJeVt2x2mJ2PF/s1600/world-map-networking_23-2147511038+%25285%2529.jpg&quot; width=&quot;587&quot; /&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;A Connected Global Economy&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;Following the 2009 G20 summit, plans were announced for implementing the creation of a new global currency to replace the US dollar’s role as the world reserve currency. Point 19 of the communiqué released by the G20 at the end of the Summit stated, “We have agreed to support a general SDR allocation which will inject $250bn (£170bn) into the world economy and increase global liquidity.” SDRs, or Special Drawing Rights, are “a synthetic paper currency issued by the International Monetary Fund.” As the Telegraph reported, “the G20 leaders have activated the IMF&#39;s power to create money and begin global &quot;quantitative easing&quot;. In doing so, they are putting a de facto world currency into play. It is outside the control of any sovereign body.”
            &lt;br /&gt;&lt;br /&gt;
 It continued in stating that, &quot;There is now a world currency in waiting. In time, SDRs are likely to evolve into a parking place for the foreign holdings of central banks, led by the People&#39;s Bank of China.&quot; Further, &quot;The creation of a Financial Stability Board looks like the first step towards a global financial regulator,&quot; or, in other words, a global central bank.&lt;br /&gt;&lt;br /&gt;It is important to take a closer look at these &quot;solutions&quot; being proposed and implemented in the midst of the current global financial crisis. These are not new suggestions, as they have been in the plans of the global elite for a long time. However, in the midst of the current crisis, the elite have fast-tracked their agenda of forging a New World Order in finance. It is important to address the background to these proposed and imposed &quot;solutions&quot; and what effects they will have on the International Monetary System (IMS) and the global political economy as a whole.
&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-financial-new-world-order-towards.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;


  
  
  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Complete History Of Freemasonry&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilTLWLQmMNXmjfGtQTDz1CkyrRmh464jzkNhfp0-MbIq6ELHcvS2uBxyjUzs3g5zNfeIx9wg8wZF8bmWcOdD5h0vu7zpWkSCuV9BVFso0bOEe9lRpr4-A8-bwzNi6nFrOIX7Ya40AOp8Zl/s1600/Untitled2.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; imageanchor=&quot;1&quot;&gt;&lt;img alt=&quot;The Complete History Of Freemasonry&quot; border=&quot;0&quot; height=&quot;540&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjknJkxljdlXKGfAxSKi9pbdAoxwwmhumDILNXog9PjVlfp9T2BSLqQV_uCIxdaT1Ti2imy9I2wgrjXwfJzSXXM12cZNktPkFPzBMjBIbiaQ5soLDMf_YVOVGuJEoxvpXwwvy_kfWQThAij/s1600/Untitled2-min.png&quot; width=&quot;480&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;Chart Of Freemasonry. &amp;nbsp; Click &lt;br /&gt;on the image for a better view.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;The creation of the New World Order (NWO) agenda was put in motion by the infamous character, Mayer Amschel Rothschild, the one who decided to control the entire planet by any means necessary.&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;&lt;b&gt;Of course, this meant: deception, control, financial enslavement, blackmail and murder... but also far graver things, like: wars, famine and depopulation... a genocide unlike any other before it.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9tKqu8iEIlT6faSw93t1sicacJQBuNxL0dbjs30OqSe3GpWZZe6boqwnosWQm6CMfJ0vJMcqD23ebK4QI9UEM_zXv96HDteuGlPhlO3VRqGY-0YmFsBGG-Fz4zu-Q0mkyxXcuLVquT_P5/s1600/structureaa.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Freemasonry&quot; border=&quot;0&quot; height=&quot;600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9tKqu8iEIlT6faSw93t1sicacJQBuNxL0dbjs30OqSe3GpWZZe6boqwnosWQm6CMfJ0vJMcqD23ebK4QI9UEM_zXv96HDteuGlPhlO3VRqGY-0YmFsBGG-Fz4zu-Q0mkyxXcuLVquT_P5/s640/structureaa.jpg&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Click on the image for a better view.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;They are the richest clan in the world, and their empire was built on mountains of bones and sufferance.
&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;
&lt;b&gt;1773 – Mayer Amschel Rothschild assembles twelve of his most influential friends, and convinces them that if they all pool their resources together, they can rule the world.&lt;br /&gt; &lt;br /&gt;This meeting takes place in Frankfurt, Germany. Rothschild also informs his friends that he has found the perfect candidate, an individual of incredible intellect and ingenuity, to lead the organization he has planned – Adam Weishaupt.
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;May 1, 1776 – Adam Weishaupt (code named Spartacus) establishes a secret society called the Order of the Illuminati. Weishaupt is the Professor of Canon Law at the University of Ingolstadt in Bavaria, part of Germany. The Illuminati seek to establish a New World Order. Their objectives are as follows:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1) Abolition of all ordered governments&lt;br /&gt;&lt;br /&gt;
2) Abolition of private property&lt;br /&gt;&lt;br /&gt;
3) Abolition of inheritance&lt;br /&gt;&lt;br /&gt;
4) Abolition of patriotism&lt;br /&gt;&lt;br /&gt;
5) Abolition of the family&lt;br /&gt;&lt;br /&gt;
6) Abolition of religion&lt;br /&gt;&lt;br /&gt;
7) Creation of a world government&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;July, 1782 – The Order of the Illuminati joins forces with Freemasonry at the Congress of Wilhelmsbad. The Comte de Virieu, an attendee at the conference, comes away visibly shaken. When questioned about the “tragic secrets” he brought back with him, he replies: “I will not confide them to you. I can only tell you that all this is very much more serious than you think.” From this time on, according to his biographer, “the Comte de Virieu could only speak of Freemasonry with horror.”

&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-complete-history-of-freemasons-and.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;


  

  
  
  

&lt;b&gt;

&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Behold The Cube: &amp;nbsp; Saturn Worship

&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja-bWtdrUxNH9tts0GVKVu0LyB-rkauWMa5XGRQbJBMbBX8fQAH_EdRMDu2qRDIifBej09WqWLjhEMLRAG0KwEwtSx5aRWPD-9CIZuPYplMNb0zhXQaLEyUQNmlo8eb9BxiHcxQXCaQN_l/s1600/84428965zz.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja-bWtdrUxNH9tts0GVKVu0LyB-rkauWMa5XGRQbJBMbBX8fQAH_EdRMDu2qRDIifBej09WqWLjhEMLRAG0KwEwtSx5aRWPD-9CIZuPYplMNb0zhXQaLEyUQNmlo8eb9BxiHcxQXCaQN_l/s0/84428965zz.jpg&quot; width=&quot;460&quot; /&gt;&lt;br /&gt;
  
    
       
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;The Black Box or Cube,  or any other &lt;br /&gt;
    color box/cube can represent Saturn.&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
  
&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;(The Elite worship Saturn and receive energy from it! &amp;nbsp; By using the cube/box symbol and along with the pyramid, all seeing eye, owl, pentagram, fire/torch, monarch butterfly, rising sun, etc. symbols they are revealing that they are very much in control. &amp;nbsp; You&#39;ll see &quot;The Black Box/Cube or any color box/cube&quot; along with the other symbols being used in corporate logos, movies, video games, commercials, and tv shows.)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The black cube is used to represent Saturn in numerous cultures. You might not know it, but the entire world has been worshiping Saturn for thousands of years. The cult has never stopped and its rites are still present to this day. Saturn, dubbed the &quot;Lord of the Rings&quot;, is the reason why we
exchange rings at weddings or put halos on the heads of godly people.&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
Since ancient times, sages gazed at the stars, admiring their heavenly glow
and attributing them godly powers, based on their effect on humans. &lt;br /&gt;&lt;br /&gt;


&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-Cv5Mjd0yNpHFbXvIkHdiRfRNIIiGgfPvHIyrhqGRw3MvqpAS7IuwpkQWK_Xk5gJmJFcDgCWcp_m65biBUptiLUjZRFswK7aDlspjAjQ6I2TKmAAGnqp_lwXRMGJydTHWR5442yZQfjA/s1600/1345141_opt.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-Cv5Mjd0yNpHFbXvIkHdiRfRNIIiGgfPvHIyrhqGRw3MvqpAS7IuwpkQWK_Xk5gJmJFcDgCWcp_m65biBUptiLUjZRFswK7aDlspjAjQ6I2TKmAAGnqp_lwXRMGJydTHWR5442yZQfjA/s0/1345141_opt.jpg&quot; /&gt;&lt;/a&gt; &lt;/center&gt;&lt;/div&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFd9n-IH-yezhAG7216ZmN56DqJLrUHZPPjr6jGktonv2hjhWA6xHVKOmzz5jmbqrdmU0CdEfjCdErJ3dpKshkPEcS_JFVR1NuepCpkLFyYh4cTgYCE_S2Q48zqRDihxEeME6dZTkcqs/s1600/vbl9vbl9.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;313&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFd9n-IH-yezhAG7216ZmN56DqJLrUHZPPjr6jGktonv2hjhWA6xHVKOmzz5jmbqrdmU0CdEfjCdErJ3dpKshkPEcS_JFVR1NuepCpkLFyYh4cTgYCE_S2Q48zqRDihxEeME6dZTkcqs/s520/vbl9vbl9.jpg&quot; width=&quot;320&quot; /&gt;&lt;br /&gt;
  
     

  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Hexagon on Saturn&#39;s North Pole. &amp;nbsp; One &lt;br /&gt;
can draw a 3D cube in this 2D Hexagon.&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;  
  
  
   
&lt;/center&gt;&lt;/div&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMiLzYv-1t0FECX4Q62hyphenhyphenHxEwjEbN5LJkAx_5l6Ib5dkd-RyMwA5Y7W42jzR0jfHW6sy1NdXcDvGWXrSDKRBS9aHT9KfxYiJGwNM4eNaxoNBuMCDl-rt_hX7YMGieS0xhtkciXTQ4PGyk/s1600/blackbox.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMiLzYv-1t0FECX4Q62hyphenhyphenHxEwjEbN5LJkAx_5l6Ib5dkd-RyMwA5Y7W42jzR0jfHW6sy1NdXcDvGWXrSDKRBS9aHT9KfxYiJGwNM4eNaxoNBuMCDl-rt_hX7YMGieS0xhtkciXTQ4PGyk/s420/blackbox.jpg&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;b&gt;
Jewish Tefillin/Phylactery&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;Before the Great Flood, Saturn was regarded by all mankind as the supreme god and ruler of
the kings. Occult researchers affirm that Saturn ruled the kingdom of Atlantis
and became the divine ancestor of all earthly patriarchs and kings.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;The Babylonians called Saturn &quot;the Star of Tammuz.&quot; Saturn worship has been perpetuated through numerous gods during antiquity: &quot;Chronos, or Saturn, Dionysos, Hyperion, Atlas, Hercules, were all connected with &#39;a great Saturnian continent&#39; they were kings that ruled over countries on the western shores of the Mediterranean, Africa and Spain.&quot; - Baldwin, Prehistoric Nations&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;In Egyptian mythology Isis is considered Saturn’s eldest daughter:

&quot;I am Isis, Queen of this country. I was instructed by Mercury. No one
can destroy the laws which I have established. I am the eldest daughter of
Saturn, most ancient of the Gods.&quot;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;The &quot;Kabballah&quot; of Jewish mysticism/Masonry comes from KabbaAllah or &quot;CubeGod&quot; around which people gather and ceremonially walk in circles. Thus it can be said they are &quot;circling the square or black Cube/God.&quot; Masons are also constantly referring to &quot;circling the square&quot; and &quot;squaring the circle.&quot;







&lt;br /&gt;&lt;br /&gt;

The Freemasonic G (Geometry/God) symbol within a compass and T-square symbolizes this as well. Just as people circle around their Cube-God Kabba, so the Masons use a compass/square around their &quot;G&quot; God/Geometry. &lt;br /&gt;&lt;br /&gt;Astrologically Saturn represents darkness, misfortune, death and fear. Saturday is named after the Roman god Saturn, the Ancient Greeks referred to this god as Cronus. The symbol of Saturn/Cronus is the sickle. The sickle of Saturn and hammer of Thor (Jupiter/Zeus) combined is represented in the the symbol of Communism. &lt;br /&gt;&lt;br /&gt;
The core of the control over Planet Earth&#39;s populace lies in ancient cults. These cults are still in existence to this day. The elite follow these most ancient religions being influenced by sexual worship. The main cults are the worship of the Planet Saturn (El), Moon (Isis), Venus (Lucifer) &amp;amp; Sun (Ra).

&lt;/b&gt;
  
  
  
  
  
  
  


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;







&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;Crisis Actors For False Flag Shootings?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb8NuWkU6sbdyD3JxfZ4BFMzz7WENFkLoc-hjvVOio65LdZxo5jCS8CE3DrATZ_NKdUgVvksZkUGJmvB9T8x5LzixM0zXJcCdatibzILCdR7QS3UmOZhwQndZGKUbFUIskwq49F6NrrFpJ/s1600/7825855-21403265-thumbnail.jpg&quot; imageanchor=&quot;1&quot;
   style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Crisis Actor&quot; border=&quot;0&quot; height=&quot;265&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhb8NuWkU6sbdyD3JxfZ4BFMzz7WENFkLoc-hjvVOio65LdZxo5jCS8CE3DrATZ_NKdUgVvksZkUGJmvB9T8x5LzixM0zXJcCdatibzILCdR7QS3UmOZhwQndZGKUbFUIskwq49F6NrrFpJ/s1600/7825855-21403265-thumbnail.jpg&quot; width=&quot;262&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
A new group of actors is now available nationwide for active shooter drills and mall shooting full-scale exercises, announced Visionbox, Denver&#39;s leading professional actors studio.
&lt;br /&gt;&lt;br /&gt;
Visionbox Crisis Actors are trained in criminal and victim behavior, and bring intense realism to simulated mass casualty incidents in public places.&lt;/b&gt;


&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwkSPE2in33NxKuQhhDS1QwCySQK_PFLLNZvqSCRMnO993j0zYpw55X08NaK_vOFHy_ja3DKDgGw_JqueI5zFacRqV2Mg7kLQnrzse0TTBPAD9oSr1HhMLAeQ8nwNTalowqjlDkUp-qQ6n/s1600/crisis-actor-4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Crisis Actor At Different Shootings&quot; border=&quot;0&quot; height=&quot;385&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwkSPE2in33NxKuQhhDS1QwCySQK_PFLLNZvqSCRMnO993j0zYpw55X08NaK_vOFHy_ja3DKDgGw_JqueI5zFacRqV2Mg7kLQnrzse0TTBPAD9oSr1HhMLAeQ8nwNTalowqjlDkUp-qQ6n/s1600/crisis-actor-4.jpg&quot; width=&quot;436&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;Same Girl - Different Shootings?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;



The actors&#39; stage acting experience, ranging from Shakespeare to contemporary American theater, enables them to &quot;stay in character&quot; throughout an exercise, and improvise scenes of extreme stress while strictly following official exercise scenarios.
&lt;br /&gt;&lt;br /&gt;
The actors regularly rehearse scenarios involving the Incident Command System and crisis communications, and appear in interactive training films produced in both 2D and stereoscopic 3D.
&lt;br /&gt;&lt;br /&gt;
Producers formed the group to demonstrate emerging security technologies, help first responders visualize life-saving procedures, and assist trainers in delivering superior hands-on crisis response training.
&lt;br /&gt;&lt;br /&gt;
For example, with a large shopping center, the producers review all security camera views and design dramatic scenes specifically for existing camera angles, robotic camera sweeps, and manually-controlled camera moves.
&lt;/b&gt;


&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The actors can play the part of the shooters, mall employees, shoppers in the mall, shoppers who continue to arrive at the mall, media reporters and others rushing to the mall, and persons in motor vehicles around the mall, etc.
&lt;/b&gt;









&lt;/b&gt;

&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;&lt;b&gt;&lt;div style=&quot;text-align: left;&quot; &gt;


&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;UN report calls for new global reserve currency to replace US dollar&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFTa47q7nxCbV33matROx3H5SdyNRctB6ceklfHrwluS7ikWom_krxYYwt6xJ1KupgG_dhcO5qskHvAkkRVU0ATb08bvzFqE_7CZhgBajRjhZ_bmNOt8lgUGhIrQm_YtKEklfjX0L-dRs/s1600/dollar2_1403594c.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFTa47q7nxCbV33matROx3H5SdyNRctB6ceklfHrwluS7ikWom_krxYYwt6xJ1KupgG_dhcO5qskHvAkkRVU0ATb08bvzFqE_7CZhgBajRjhZ_bmNOt8lgUGhIrQm_YtKEklfjX0L-dRs/s1600/dollar2_1403594c.jpg&quot; width=&quot;250&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;UN Says New Currency Is Needed to Fix Broken ‘Confidence Game’.  The dollar’s role in international trade should be reduced by establishing a new currency to protect emerging markets from the “confidence game” of financial speculation, the United Nations said.&lt;br /&gt;
&lt;br /&gt;
UN countries should agree on the creation of a global reserve bank to issue the currency and to monitor the national exchange rates of its members, the Geneva-based UN Conference on Trade and Development said today in a report.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/un-report-calls-for-new-global-reserve.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;/div&gt;
  

  

  
&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Illuminati Eye Of Horus &lt;/span&gt;&lt;/span&gt;
&lt;/b&gt;
 &lt;br /&gt;
&lt;br /&gt;

  
  

  


&lt;div  style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeHPAVejbZGz8nCX2VqXOZoXuBSuHChh6CNn8_aS29qI1X_Ev4PyjX1Xowa87onrHPOfJ5qgwN2dY7VBVK1fLxynHyC8UKbR4zFxNqpQ0a9PuOAlF6qjEdIn2QAc5uau53bEh-eVpkr0Epi1osaImYevzhqveKPOBakRoQdVf4rqUx4TzDW9FPpK8G/s0/20aaa(1)(1)(2)(2)(201)(1).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Illuminati Eye of Horus&quot; border=&quot;0&quot; height=&quot;355&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeHPAVejbZGz8nCX2VqXOZoXuBSuHChh6CNn8_aS29qI1X_Ev4PyjX1Xowa87onrHPOfJ5qgwN2dY7VBVK1fLxynHyC8UKbR4zFxNqpQ0a9PuOAlF6qjEdIn2QAc5uau53bEh-eVpkr0Epi1osaImYevzhqveKPOBakRoQdVf4rqUx4TzDW9FPpK8G/s0/20aaa(1)(1)(2)(2)(201)(1).jpg&quot; width=&quot;385&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
The main methods of showing this symbol in the past were by using an eyepatch or winking. Today it&#39;s usually with one eye open and the other eye covered by one&#39;s hand or an object.

 &lt;br /&gt;
&lt;br /&gt;
We are so amazingly distracted – baseball, football, 24 hour news, Kardashians, manufactured racism, manufactured politics, false flag events, etc. &lt;br /&gt;&lt;br /&gt;We have Googled our way into a love for darkness rather than light.&lt;br /&gt;&lt;br /&gt;
There is a curious fascination with the perverse and the profane, with the wanton and the wicked.
  
  
  
  
  
  &lt;br /&gt;&lt;br /&gt;Everywhere you look, there it is. The All-Seeing Eye Of Horus staring back at you from pop soda cans, sporting equipment, movies, television, radio, clothing. Even on the very dollar bill.&lt;br /&gt;&lt;br /&gt;
  Why is the Illuminati All-Seeing Eye of Horus suddenly everywhere you turn? The answer is surprisingly simple, so simple in fact that it might escape our grasp.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZzRnhvYkt1yiAxL1NmLt22Tu_fFmoc4157GOYs5p6Ig21hIvVMy77eluh4HPPAHsTYduTmEIvl9XOBzZHkdf8jpvHCHkV4_3RpyAzXZbcCuTUVO7RNcHT2aht6usHDbPyojB19p40_t2S9_6CyPxesOnnttOtNPR4aA3TOAobJTziBOQcEY89wGyr/s0/Crimescene-Tape-Telephone-Cropped%20(1).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Illuminati eye of Horus&quot; border=&quot;0&quot; height=&quot;370&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZzRnhvYkt1yiAxL1NmLt22Tu_fFmoc4157GOYs5p6Ig21hIvVMy77eluh4HPPAHsTYduTmEIvl9XOBzZHkdf8jpvHCHkV4_3RpyAzXZbcCuTUVO7RNcHT2aht6usHDbPyojB19p40_t2S9_6CyPxesOnnttOtNPR4aA3TOAobJTziBOQcEY89wGyr/s0/Crimescene-Tape-Telephone-Cropped%20(1).jpg&quot; width=&quot;469&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;
 This demonic symbol and sign reveals the Wicked One or Satan in the PERSON OF THE ANTICHRIST is about to take the stage. &lt;br /&gt;&lt;br /&gt;
  
  Because of this man all, both small and great, rich and poor, free and slave, will be forced to receive a mark on their right hand or on their foreheads, so that no one may buy or sell except one who has the mark, or the name of the beast, or the number of his name. 
&lt;br /&gt;&lt;br /&gt;
INITIALLY HE WILL BE RECOGNIZED THROUGHOUT THE WORLD AS A MAN OF PEACE. &lt;br /&gt;&lt;br /&gt; HE WILL OFFER ECONOMIC SOLUTIONS TO THE WORLD&#39;S PROBLEMS. &lt;br /&gt;&lt;br /&gt; HE WILL REIGN EXACTLY THREE AND A HALF YEARS AS THE WORLD&#39;S GREATEST DICTATOR.&lt;br /&gt;&lt;br /&gt;

Beware of when this man appears on the world scene. His leadership will take the world into a Great Tribulation of terror, wars, suffering and death.

  
  &lt;br /&gt;&lt;br /&gt; Maybe we should consider the days that we are living in and ask ourselves this question, &quot;Are we living in the biblical last days?&quot;
  
  &lt;/b&gt;








&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The New World Order&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpsO-J2x0G-N_T-Mispdt1MJAWfMR6B8vCJqw-GrKC1JcZHGv0Srb0jUheC7WZLegc5GxwCKmp4C1gCXP1aau0EFpilzS-eFBH5521_3JapWmMxOceVctthfnViBSdqzY2s-XopXmEWxw/s240/Presentation1.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpsO-J2x0G-N_T-Mispdt1MJAWfMR6B8vCJqw-GrKC1JcZHGv0Srb0jUheC7WZLegc5GxwCKmp4C1gCXP1aau0EFpilzS-eFBH5521_3JapWmMxOceVctthfnViBSdqzY2s-XopXmEWxw/s420/Presentation1.jpg&quot; width=&quot;220&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;The Illuminati/Global Elite are the ones controlling those in government who willfully seek to take the left hand path.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;The Illuminati are the ones controlling world affairs through present day governments and corporations and are behind events that will lead to the establishment of a New World Order.
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;There is a worldwide conspiracy being orchestrated by an extremely powerful and influential group of genetically-related individuals, at least at the highest echelons, which include many of the world&#39;s wealthiest people, top political leaders, and corporate elite, as well as members of the so-called Black Nobility of Europe, dominated by the British Crown. The Luciferian Agenda of the Secret Societies that are planning this New World Order is to have a World Government, World Religion, World Army, World Central Bank, World Currency and a micro-chipped population. This New World Order global government will be a fulfillment of bible prophecy concerning the last days.  &amp;nbsp;   Daniel 8: 23 &amp;nbsp;    Rev. 13: 4, 5, 7 &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/the-new-world-order.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;



  &lt;/div&gt;
  
  
  
  


&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;&lt;b&gt;
&lt;div  style=&quot;text-align: left;&quot; &gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;The North American Union&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;

  
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz8zgzEEJp_5ov1VAieJfTsVymLNaTaGATfk928g2YX9-79FgQ0Gt5moGXfHS934dCgI9GdU7U1tsVFXqb3NCqfQq46j2aBLK6Hkw-12Fq6JnJACIvw37oUh6O8j-W4EsLmGV1O0plhpUX/s1600/nasco.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz8zgzEEJp_5ov1VAieJfTsVymLNaTaGATfk928g2YX9-79FgQ0Gt5moGXfHS934dCgI9GdU7U1tsVFXqb3NCqfQq46j2aBLK6Hkw-12Fq6JnJACIvw37oUh6O8j-W4EsLmGV1O0plhpUX/s1600/nasco.jpg&quot; width=&quot;360&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;&lt;span &gt;Thomas Donohue (president and CEO of the U.S. Chamber of Commerce) on June 16, 2006 remarked that &quot;for CEOs, North America is already a single market, and business decisions are no longer made with a Mexico strategy---or a Canada strategy---but, rather, with a North American strategy....I think it&#39;s pretty clear now that it no longer makes sense to talk about U.S. competitiveness and Mexican competitiveness---or, for that matter, about the competitiveness of Canada. We are all in this together---we, as North Americans.&quot;    &amp;nbsp; &amp;nbsp; &amp;nbsp; Youtube Video on NAFTA and the Council on Foreign Relations - &lt;a href=&quot;http://www.youtube.com/watch?v=3CvtNiwtHSo&quot; target=&quot;_blank&quot;&gt;Link&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;



&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;&lt;/div&gt;



&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;All UK citizens in ID database by 2017&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH9n1vVxJtWG82biX_vqNwIU12ENS7Epa-VEkyRexurse8I5D6_FqmsD_fx6aeg4wjgMIXHWtD3zsLKYZDZyjIuM5vgFyKCR5MZttmgNqanVp5MKivfrHeXB1VjpgGzbwuEkmrHcuzO6MC/s1600/news-graphics-2008-_658230a.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH9n1vVxJtWG82biX_vqNwIU12ENS7Epa-VEkyRexurse8I5D6_FqmsD_fx6aeg4wjgMIXHWtD3zsLKYZDZyjIuM5vgFyKCR5MZttmgNqanVp5MKivfrHeXB1VjpgGzbwuEkmrHcuzO6MC/s1600/news-graphics-2008-_658230a.jpg&quot; width=&quot;350&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;All British citizens will have their fingerprints and photographs registered on a national ID database within 10 years under plans outlined by the Government.&lt;br /&gt;
&lt;br /&gt;
Millions in sensitive jobs, including teachers, carers and health workers, will be among the first to be entered on to the identity register.&lt;br /&gt;
&lt;br /&gt;
In a bid to kick start the project - the world&#39;s biggest - foreign nationals working in Britain will begin to be issued with cards from November. Starting next year, the first British citizens will be enrolled beginning with some airport staff, power station employees and people working on the London Olympics site.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/all-uk-citizens-in-id-database-by-2017_2.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;

  &lt;/div&gt;
&lt;b&gt;
&lt;b&gt;


&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;/div&gt;




&lt;div  style=&quot;text-align: left;&quot; &gt;

&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;The Ultimate Weapon Of Mass Destruction: Scalar Weapons&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEint9v-E8OFgiFosDK3Qge7eRv8vk_DtP2HJ8h3Nt5omTPYrDI3P6OyKkkQxR6BeZjtQMKox1UkT6K-Z8deH0qxwnk_-eyYc885Aa3casetftc1L_sViKI5_LFNFLC58HOzd1p-O6LbZcMH/s1600/portho1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEint9v-E8OFgiFosDK3Qge7eRv8vk_DtP2HJ8h3Nt5omTPYrDI3P6OyKkkQxR6BeZjtQMKox1UkT6K-Z8deH0qxwnk_-eyYc885Aa3casetftc1L_sViKI5_LFNFLC58HOzd1p-O6LbZcMH/s1600/portho1280.jpg&quot; style=&quot;height: 377px; width: 253px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt; 
&quot;Electric power is everywhere! Present in unlimited quantities and can drive the world&#39;s machinery without the need of coal, oil, gas, or any other of the common fuels.&quot;   Nikola Tesla 
&lt;br /&gt;&lt;br /&gt;

Electromagnetic pulse and plasma weapon R &amp;amp; D is rapidly occurring behind the misnomer of &quot;Non Lethality,&quot; and clearly parallel Tesla&#39;s work. Major US defence contractors and leading government weapon research laboratories are intensely interested in &quot;Directed Energy Weapons (DEW).&quot; Research includes &quot;Radio Frequency and Particle Beam Weapons&quot;, &quot;Air and Space Based Directed Energy Weapons&quot;, and, among many others, &quot;DEW Weapons Effects on Personnel&quot;. Of interest too, is a paper written by Australian defence analyst, Carlo Kopp, which outlines in considerable detail an &quot;Electromagnetic Bomb.&quot; The &quot;E-Bomb,&quot; Kopp says, has the ability to inflict damage &quot;... not unlike the experience through exposure to close proximity lightning strikes.&quot; In a broadcast dated 27 February 1996, Beijing radio outlined advances in particle beam energy technology and alluded to a &quot;weapon even more powerful than the &#39;death ray.&#39;&quot; The broadcast likened the weapon to a &quot;Thunderbolt,&quot; adding that the moment it struck it&#39;s target (vaporising it), a temperature of 8000 degrees Celsius would be produced.&lt;br /&gt;&lt;br /&gt; Not least are the comments of Boris Belitsky, a leading Russian Science and Engineering correspondent, broadcast on Voice of Russia, 24 February 1997. Belitsky in replying to a question on Russian military applications of microwave generators, stated &quot;they can be used to fire a plasmoid, that is, a blob of plasma...&quot;&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/the-ultimate-weapon-of-mass-destruction.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt; 



&lt;/b&gt;

  &lt;/div&gt;



&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;&lt;/div&gt;


&lt;div  style=&quot;text-align: left;&quot; &gt;

&lt;b&gt;


&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;font color=&quot;#5f0000&quot;&gt;RFID Tattoos For Tracking Cows... And People?&lt;/font&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYmIonBua3rcNY4Hw8s0Jez7BeX097HHuPVKffZORxpXSZOF-5tk65W03E-VZpYx3aFGL7TpT-sStk5xKy4_RtfUBLVXr0_kfbrob3Jn1vHtkKHH8xBzZwtI7IeHoey9CSUODjypqYH9Pt/s640/610x-400-400.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYmIonBua3rcNY4Hw8s0Jez7BeX097HHuPVKffZORxpXSZOF-5tk65W03E-VZpYx3aFGL7TpT-sStk5xKy4_RtfUBLVXr0_kfbrob3Jn1vHtkKHH8xBzZwtI7IeHoey9CSUODjypqYH9Pt/s640/610x-400-400.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;Founders of SOMARK Innovations Inc. ,  Mark Pydynowski, left, and Ramos Mays, right, with their electronic ink tattoo device at their office in San Diego.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Did you know that Saint Louis based Somark Innovations successfully tested an &quot;RFID tattoo&quot; on cows and rats? Yes indeed, tattoo, not the ol&#39; RFID chip found in passports, dogs, and Dutch VIP clubbers. Somark&#39;s system uses an array of needles to inject a passive RFID ink which can be read through the hair on your choice of beast. The ink can be either invisible or colored but Somark is keeping mum as to its exact contents. They only say that it doesn&#39;t contain any metals and is 100% biocompatible and chemically inert. The tattoo can be applied in 5 to 10 seconds with no shaving involved and can be read from up to 4 feet away -- the bigger the tattoo, the more information stored. Best of it all, it&#39;s apparently safe for humans to ingest allowing the FDA to track back Mad Cow Disease, e-coli outbreaks, and Soylent Green. Don&#39;t worry, they can&#39;t track you just as long as you chew your food like mama taught. However, with &quot;military personnel&quot; listed as Somark&#39;s &quot;secondary target market,&quot; well, it&#39;s just a matter of time before we&#39;re all cattle now isn&#39;t it.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW2lQe6yoSgiy5k0apPLWW3MKR_vJ15VHud6Hs81INsp3VmT4Ojix1tGM4Ry6m2K8cCCiRZ7EUXxT8SPytSFdwOTbOK9Dn8jFQZI0VIEe7bO0teVfxWBmFbNV99myCYjy1IK48Yg1nQjZU/s640/Image2-400-400.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;180&quot; id=&quot;BLOGGER_PHOTO_ID_5468763381792501394&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW2lQe6yoSgiy5k0apPLWW3MKR_vJ15VHud6Hs81INsp3VmT4Ojix1tGM4Ry6m2K8cCCiRZ7EUXxT8SPytSFdwOTbOK9Dn8jFQZI0VIEe7bO0teVfxWBmFbNV99myCYjy1IK48Yg1nQjZU/s640/Image2-400-400.jpg&quot; width=&quot;420&quot; /&gt;&lt;/a&gt;&lt;/center&gt;


&lt;/div&gt;










&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

    
    
    
    
    
    
    
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Cops In Riot Gear --- Freedom To Fascism&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqe5gIhF2vsmpgYE1VKPaeJEUueMvuyFAlJ1bz0eOjAGDf_p7x4RF07oWfnT4QKoiPcAUv230yILZVgnxzoxqmuOFMvlZ2YaR-swT9GrCGMV5Ah7CKYv5GCa2hLM6mU3K4qTj2hlrwiUW6/s640/swat_0222.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;320&quot; id=&quot;BLOGGER_PHOTO_ID_5467966397490357154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqe5gIhF2vsmpgYE1VKPaeJEUueMvuyFAlJ1bz0eOjAGDf_p7x4RF07oWfnT4QKoiPcAUv230yILZVgnxzoxqmuOFMvlZ2YaR-swT9GrCGMV5Ah7CKYv5GCa2hLM6mU3K4qTj2hlrwiUW6/s400/swat_0222.jpg&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto; text-align: center;&quot; width=&quot;450&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/center&gt;&lt;/div&gt;
&lt;center&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;The Militarization of the Local Police&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/center&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;The Real Threat of Fascism. We all should realize and be aware of the fact that the nations Germany and Italy were liberal democracies before the rise of fascism.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/cops-in-riot-gear-freedom-to-fascism.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;















&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;




&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;New Biometric Smart Cards&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;b&gt;
&lt;/b&gt;&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjO-YO154Jrgd4p54epXyO3YT3WoN-PW3_yqb0ecr8IOyM9K-KL7UMQXGqRWa8-g7-rSKOa7Fc455MNP_v8BPLFIHiLSWPQudblaMk60XM43s-7mLQVJRij8IK53EW1a-VRHkvLFTnf0KLG/s320/ST_27_id_1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjO-YO154Jrgd4p54epXyO3YT3WoN-PW3_yqb0ecr8IOyM9K-KL7UMQXGqRWa8-g7-rSKOa7Fc455MNP_v8BPLFIHiLSWPQudblaMk60XM43s-7mLQVJRij8IK53EW1a-VRHkvLFTnf0KLG/s640/ST_27_id_1.jpg&quot; width=&quot;310&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
ActivCard, a specialist in IDentity Management software for remote access, single sign-on and digital ID card solutions, announced an expanded cooperation with its partner Precise Biometrics AB, developer and provider of world-leading and user-friendly biometric security solutions based on fingerprints, to deliver smart card-based identification (ID) badge solutions with biometric authentication. ActivCard has incorporated Precise Biometrics&#39; technology for fingerprint matching on smart cards, &quot;Precise Match-on-Card&quot;, to its &quot;ActivCard Gold 2.2&quot; software, the most successful and widely deployed smart ID card middleware platform available on the market today. By verifying the fingerprint that&#39;s on the card, the Precise Match-on-Card method guarantees that the reference biometric template (the user&#39;s identity) never leaves the card, so it is not subject to theft. ActivCard Identity Management System™ or AIMS is a vital part of the ActivCard IDM solution that includes ActivCard Gold™ middleware software to enable client authentication methods, including one-time-use dynamic passwords (SKI), PKI and biometrics. The IDM solution may include the ActivCard Applet Suite on the card for credential management, Trinity™ single sign-on software, and ActivPack™ AAA Server for remote access.&lt;br /&gt;&lt;br /&gt;



&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdcvE13TEgaJw5Kn4jZBzuYyLCbZ8NnhW6lqWd20rtasl3dnmwmepXsPlVnb7iQmexNo8Nj8gzECiQFcDBeMUlLMNtebFWgX6uJ5pWDydAf5F1hAWD0KnwwviBAfuUujxkN8UjwdLONyzB/s320/banner_flag.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdcvE13TEgaJw5Kn4jZBzuYyLCbZ8NnhW6lqWd20rtasl3dnmwmepXsPlVnb7iQmexNo8Nj8gzECiQFcDBeMUlLMNtebFWgX6uJ5pWDydAf5F1hAWD0KnwwviBAfuUujxkN8UjwdLONyzB/s0/banner_flag.jpg&quot; width=&quot;310&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/center&gt;&lt;/div&gt;
&lt;/b&gt;

&lt;b&gt;E-Smart Technologies is a leading provider of high technology security systems that can be used to combat fraud and terrorism. E-Smart products enable government agencies and commercial enterprises to continuously and securely verify, certify and manage identification and access of citizens, personnel, customers and any other persons seeking physical or logical access. E-Smart is the exclusive provider of the Biometric Verification Security System(TM) (BVS2)(TM), featuring the Super Smart Card(TM) for Asia and the US, which experts believe to be the world&#39;s only commercially available smartcard with a full on-card matching system for biometric ID verification. The Super Smart Card™ provides maximum security due to its unique architecture that incorporates a hardware based firewall system coupled with dynamic software protection. In addition to including an on-card biometric fingerprint sensor and digital photo ID, the Super Smart Card&#39;s multi- application design allows multiple independent and secure applications to co-exist and operate on the same card. Only the registered users finger can activate the card. The sensor performs with wet, dry, hot or cold fingers. This is not the case for most other sensors. The system prevents unauthorized use of any card or card application by requiring the authorized card-holder&#39;s fingerprint to initiate any transaction or access any information. If lost or stolen, the Super Smart Card™ is useless - no one else can activate it for use of any kind. Tampering permanently disables the card and destroys any information. Counterfeit or stolen cards cannot work on the system, and are totally useless. 


&lt;/b&gt;










&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;The USA PATRIOT Act&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin2qdltDtDgBiUgYkYik91xOgkoeLtkWXOw2vW5qL1aZcThuyZsgM88bkP7P-IE14ZSevnBijIYl_fnjUWiUsm9ZbIgbThPw-bfPsWhkSqbwACxwf-mfaftzbGBXL45CEHZ0BymrwsY3kY/s360/24prexy.650222.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;George Bush signing the Patriot Act&quot; border=&quot;0&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin2qdltDtDgBiUgYkYik91xOgkoeLtkWXOw2vW5qL1aZcThuyZsgM88bkP7P-IE14ZSevnBijIYl_fnjUWiUsm9ZbIgbThPw-bfPsWhkSqbwACxwf-mfaftzbGBXL45CEHZ0BymrwsY3kY/s0/24prexy.650222.jpg&quot; width=&quot;395&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;The Reichstag fire (an act similar to 9/11), burning of the Reichstag (parliament) building in Berlin, Germany, on the night of Feb. 27, 1933 allowed the Nazis to pass the Enabling Act on March 23, 1933. This conferred dictatorial powers on Adolf Hitler. (Notice the &quot;protecting the homeland&quot; banner... (Isn&#39;t it interesting that they chose part of the very phrase Hitler used.) Hitler, &quot;An evil exists that threatens every man, woman and child of this great nation.  We must take steps to ensure our domestic security and &lt;u&gt;protect our homeland&lt;/u&gt;&quot;.)  &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;On October 26, 2001, US President George W. Bush enacted the USA PATRIOT Act. The USA PATRIOT Act is officially the &quot;Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act&quot;. The bill was in direct response to the attacks that occurred on September 11, 2001. The goal of the Act was to reduce restrictions on law enforcement and government officials when investigating criminal activity.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj21-qhyQfSHf7hN1ed3VoqsWeOalejQQZRDRf2YV0vCvBQwzMquE2QF0ejtOV-_MbrpRCEU0YZj4gF08n7d53benVOg5mYZYkZSKw34wIGPvVmfTlX2OiIk6PcUH1v6lUA03ZgjjwzmE4/s0/9-11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;9/11 Attacks&quot; border=&quot;0&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj21-qhyQfSHf7hN1ed3VoqsWeOalejQQZRDRf2YV0vCvBQwzMquE2QF0ejtOV-_MbrpRCEU0YZj4gF08n7d53benVOg5mYZYkZSKw34wIGPvVmfTlX2OiIk6PcUH1v6lUA03ZgjjwzmE4/s0/9-11.jpg&quot; width=&quot;336&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;9-11 False Flag Attacks&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;/b&gt; &lt;b&gt;It gave international law organizations the right to probe and search citizen’s e-mail, medical, financial and personal records. Some of the main sections of the law enacted restrictions on foreign intelligence gathering, expanded the Secretary of the Treasury’s authority to regulate financial transactions, and broadened immigration laws in regards to detaining and deporting immigrants suspected of terrorism-related acts. The bill was passed by a wide margin in the US Congress.  &lt;br /&gt;
&lt;br /&gt;
The USA PATRIOT Act broadly expands law enforcement&#39;s surveillance and investigative powers and represents one of the most significant threats to civil liberties, privacy and democratic traditions in U.S. history. The Patriot Act gives sweeping search and surveillance to domestic law enforcement and foreign intelligence agencies and eliminates checks and balances that previously gave courts the opportunity to ensure that those powers were not abused. The Patriot Act and follow-up legislation threatens the basic rights of millions of Americans.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/the-patriot-act.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;

&lt;/b&gt;



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;

&lt;span style=&quot;color: #5f0000;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Was The San Bernardino Mass Shooting A False Flag Attack?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;




&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAjCfm99bkC3VbTarPx4WCq0HJMKkZVQab1MD8XKsjBsvbGNU9RBu5Q4DtK4pvvBfl_I6m8UNNkBas2-vMvLrQE2fReQDFMzoy8v3IOp1XvITNnEnw_lgIqX-JDV2mB8Jwx84MGKWT4x8U/s1600/23322.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The San Bernardino Mass Shooting&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAjCfm99bkC3VbTarPx4WCq0HJMKkZVQab1MD8XKsjBsvbGNU9RBu5Q4DtK4pvvBfl_I6m8UNNkBas2-vMvLrQE2fReQDFMzoy8v3IOp1XvITNnEnw_lgIqX-JDV2mB8Jwx84MGKWT4x8U/s0/23322.jpg&quot; style=&quot;height: 280px; width: 483px;&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;b&gt;A Staged Event? &amp;nbsp; False Flag? &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt; Breaking News: The San Bernardino Mass Shooting just occurred hours ago in San Bernardino, California, around 11:00am local time on December 2nd, 2015. &lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYfD1dqkPbHoX8LYVSdksQHyLlS_QlyxTR2VRpM3ByuKWEde103fmbt03eo1BLqoZYSMSiNy79EZ1q7YYAZVnZdW1veuRZMDv-dHXOeJB8ktqJAs1Q-sJmQXyltX6FasgWs4-rl9Z33sP0/s0/84579.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;The San Bernardino Mass Shooting Getaway Car&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYfD1dqkPbHoX8LYVSdksQHyLlS_QlyxTR2VRpM3ByuKWEde103fmbt03eo1BLqoZYSMSiNy79EZ1q7YYAZVnZdW1veuRZMDv-dHXOeJB8ktqJAs1Q-sJmQXyltX6FasgWs4-rl9Z33sP0/s0/84579.jpg&quot; style=&quot;height: 247px; width: 403px;&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;
The getaway car!  &amp;nbsp; Note the damage to the &lt;br /&gt;
front windows &amp;amp; the drivers side front tire.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg66jzAO7g-96Psn_vGpamH6UjI75GqVIA2uQvseJ1fVWG33jwAes-vSEgCNBN_JAxpAkYwKBSpsOyTEXXCi3Vw_5UMi64koAbkuQj7Fd9fxC_OENPWj1ejm_tnB3BQv9KV8x7rQO6DhAb-/s0/BN-LN879_1203CA_J_20151203102302.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;The San Bernardino Mass Shooting Getaway Car 2nd Location&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg66jzAO7g-96Psn_vGpamH6UjI75GqVIA2uQvseJ1fVWG33jwAes-vSEgCNBN_JAxpAkYwKBSpsOyTEXXCi3Vw_5UMi64koAbkuQj7Fd9fxC_OENPWj1ejm_tnB3BQv9KV8x7rQO6DhAb-/s0/BN-LN879_1203CA_J_20151203102302.jpg&quot; style=&quot;height: 246px; width: 403px;&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;
Same car only on a different street?&lt;br /&gt;
  Why was it placed at two locations?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
  &lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW0_EysSfVEFngOYLZt7cVDOvQlrEzgq7aW6JscLBdm7qGcaqxIDtBUAzSB8KD8Z38FuZtRVC9qT1wIhAQVUIEESeHAbZUXU_q2UlZ_1VKebf7Sk18eN7aDmNPYroRfulSKMiCQ10oSdkq/s420/rtx1x9je2244.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;The San Bernardino Mass Shooting Getaway Car 2nd Location&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW0_EysSfVEFngOYLZt7cVDOvQlrEzgq7aW6JscLBdm7qGcaqxIDtBUAzSB8KD8Z38FuZtRVC9qT1wIhAQVUIEESeHAbZUXU_q2UlZ_1VKebf7Sk18eN7aDmNPYroRfulSKMiCQ10oSdkq/s0/rtx1x9je2244.jpg&quot; style=&quot;height: 177px; width: 403px;&quot; /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;
Note the missing picket fence!                                &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;

It’s important to question everything right from the start. The odds are that this is yet another false flag operation with the same old purposes of scaring the public, justifying martial law (school and hospital lockdowns) and pushing the gun control agenda. &lt;br /&gt;&lt;br /&gt;
Surprise, Surprise: Active Shooter Drill Scheduled at Same Time and Place
&lt;br /&gt;&lt;br /&gt;
Readers of the independent media will know full well by now the hallmarks and telltale signs of these kind of false flag staged terror events, whether they are bombings, shootings, hijackings or any other kind of attack.&lt;br /&gt;&lt;br /&gt;
Almost without exception – from 9/11 to 7/7 to Sandy Hook and all the rest of them – the script includes drills at the same or nearby time and place, to fool people into initially thinking the operation is an exercise or drill, and to distract both the victims and public from the actual attack.
&lt;br /&gt;&lt;br /&gt;
It comes as no surprise then to see that the San Bernardino mass shooting was in fact preceded by this announcement of an active shooter drill in the San Bernardino area on November 30th, 2015, just 2 days before today’s mass shooting.&lt;br /&gt;&lt;br /&gt; “VICTORVILLE-(VVNG.com): Victor Valley College officials would like to inform students and area residents that there will be an “active shooter” training exercise on the VVC campus on Monday, November 30th.&lt;br /&gt;&lt;br /&gt; There will be significant police presence at this time according to Chief Leonard Knight who said this training will last several hours.  In order to avoid any confusion, the public is being notified ahead of time. Victor Valley College Police Department (VVCPD), San Bernardino County Sheriff’s Department (SBCSD), Victorville Police Station, San Bernardino County Fire Department (SBCFD), Victorville Fire Station, and American Medical Response (AMR) have planned for and are conducting this exercise to ensure coordinated, timely and effective response to the college community, as well as enhance safety at Victor Valley College.”&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/was-san-bernardino-mass-shooting-false.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt; 

&lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;/div&gt;
    
    
   



&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;9/11 Attacks &amp;nbsp; No Wreckage! &amp;nbsp; Only A Round Hole At The Pentagon? &lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;




&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9HyLv4xT_g0gQyV8Voq2Uv8i4M5c102nZ595Ozfk__gAwCefZ_JPh_r0SL9n4NZePwjDrETYpPs-jNFtrCHY0AWonGxua-MpfYzh9kFoMNHJ0EYCNBPoVUZ2gzUuUSyE6UP5CTHbHLTy9/s1600/exit_hole3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The New World Order&quot; height=&quot;324&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9HyLv4xT_g0gQyV8Voq2Uv8i4M5c102nZ595Ozfk__gAwCefZ_JPh_r0SL9n4NZePwjDrETYpPs-jNFtrCHY0AWonGxua-MpfYzh9kFoMNHJ0EYCNBPoVUZ2gzUuUSyE6UP5CTHbHLTy9/s520/exit_hole3.jpg&quot; width=&quot;490&quot; /&gt;&lt;br /&gt;


  
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;Close Up Image Of The Pentagon. No&lt;br /&gt;  Wreckage, Plane, Engines, Or Wings &lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
  
  
  

  
  
  




&lt;b&gt;&quot;How easy is it for you to shift your belief system from &#39;I totally believe in my government&#39; to &#39;Oh My God! What’s going on?&#39;  That’s exactly where I went in all of this.&quot; – Albert N. Stubblebine III&lt;br /&gt;
&lt;br /&gt;
Albert N. Stubblebine III is a retired Major General in the United States Army. He was the commanding general of the United States Army Intelligence and Security Command from 1981 to 1984.  In this compelling interview, Stubblemine reveals the following information about the attacks on the Pentagon and the World Trade Center on September 11, 2001:&lt;br /&gt;
&lt;br /&gt;

    Stubblebine initially believed the official story regarding 9/11.&lt;br /&gt;
&lt;br /&gt;
    Then, he saw the hole in the Pentagon. The Pentagon was not hit by a Boeing 757.&lt;br /&gt;
&lt;br /&gt;
    All of the sensors around the Pentagon were turned off except one. That one sensor captured an image of the object that hit the Pentagon.  At first it looked like a missile, but later the imagery was changed to look like a plane. &lt;br /&gt;
&lt;br /&gt;
   Note: &amp;nbsp;  The collapse of the twin towers was caused by controlled demolition – not the fuel from the airplanes. &lt;br /&gt;
&lt;br /&gt;
  Note: &amp;nbsp;   Larry Silverstein, the lease holder of the WTC complex, admitted that that BUILDING 7, which was not hit by a plane and had only a small fire, was intentionally &quot;pulled&quot; – which is phraseology used for controlled demolition. &lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8Zd3za-RQp1EQfcrwuRn1DPb8TK9lLtDJ_VxAbOi8yGRoxb0nwB8V9ph3f0I40-qtBhS12vzWhESvb_7ThdY-L3Rkd6jlbmHz3LolinQAwe6bxACDkViyyA_CkVBaaU_QH9dYpLnSOuUI/s1600/crash23.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;The New World Order&quot; height=&quot;284&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8Zd3za-RQp1EQfcrwuRn1DPb8TK9lLtDJ_VxAbOi8yGRoxb0nwB8V9ph3f0I40-qtBhS12vzWhESvb_7ThdY-L3Rkd6jlbmHz3LolinQAwe6bxACDkViyyA_CkVBaaU_QH9dYpLnSOuUI/s0/crash23.jpg&quot; width=&quot;460&quot; /&gt;&lt;br /&gt;

  
  
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;An Early Image Of The Pentagon Before &lt;br /&gt;
The Collapse Of The Exterior Wall. &amp;nbsp; 9/11 &lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
  
  
  
  


&lt;b&gt;
    All of the air defense systems around Washington DC were turned off that day. &lt;br /&gt;
&lt;br /&gt;
    Also on 9/11, there was an exercise designed to mimic an attack on the towers by airplanes. &lt;br /&gt;
&lt;br /&gt;
    When you connect the dots, the picture says that what we were told by the media was not the real story.&lt;br /&gt;
&lt;br /&gt;
    Stubblebine, visibly upset, describes how he felt when he realized the truth about his government after having a strong belief in his country since early childhood: &quot;My belief system was so strong from age five when I could remember standing on a parade ground at attention with not anybody telling me to do that – at West Point.&quot;
&lt;br /&gt;
&lt;br /&gt;
Below are some notes from the interview including a partial transcript.&lt;br /&gt;
&lt;br /&gt;
5:15 Stubblebine hears about the 9/11 attacks: &quot;We’re at war.&quot;&lt;br /&gt;
&lt;br /&gt;
6:00 Stubblebine said there must have been intelligence information to know that an attack was coming and we didn’t see the signals.  Somebody missed it.
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;

&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/no-airplane-hit-pentagon-how-easy-is-it.html&quot;&gt;Read more »&lt;/a&gt;
  
&lt;/b&gt;
    
  
&lt;/b&gt;
  
    
    
    
    
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;/div&gt;
    
    
    
    

    
  
  
  
  
  
  &lt;b&gt;
  
  &lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;Tasers&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixzNTvAbz7_KnxFhRcJYJu9Sc-y5tSAIupUPerKIWfJBklsWG_F11I8bObrwGyaVtprjp0SbrwI1tLp0P72i63odRGQPicocC6HAV_uwm4huB2znPr7Qsrr1SMmds388Bkyfzlv9icnX5Z/s320/taserPolDM1907_468x385.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Tasers&quot; border=&quot;0&quot; height=&quot;270&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixzNTvAbz7_KnxFhRcJYJu9Sc-y5tSAIupUPerKIWfJBklsWG_F11I8bObrwGyaVtprjp0SbrwI1tLp0P72i63odRGQPicocC6HAV_uwm4huB2znPr7Qsrr1SMmds388Bkyfzlv9icnX5Z/s320/taserPolDM1907_468x385.jpg&quot; width=&quot;299&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;

&quot;Taser&quot; is an acronym for &quot;Thomas A. Swift&#39;s Electric  Rifle,&quot; a reference to juvenile adventure book character Tom Swift. A taser is a  weapon that shoots two dart-like electrodes at its victims, then sending  electric shocks through wire intended to stun a victim into submission,  rendering him helpless and able to be controlled without excessive force. When  the Taser electroshock weapon was introduced into widespread use in the early  1990s, it was touted as a &quot;non-lethal&quot; alternative to firearms, to be used to  subdue criminals in situations that did not warrant the use of a deadly weapon.  However, though the manufacturer as well as many law enforcement agencies  continue to argue that tasers have reduced the need for officers to draw  firearms and therefore resulted in fewer deaths, many civil rights groups and  concerned citizens point to the more than 200 deaths that have resulted from  tasers used by law enforcement officers as evidence that tasers are taking  lives. One of the contributing factors to these taser injuries and taser deaths  is the increasing use of tasers to subdue people who are not a serious threat to  law enforcement officers. Instead of being used only in situations in which  firearms would be used, tasers are more and more frequently used to simply  subdue criminals in any kind of arrest situation. Officers may be subject to  laws governing excessive force and police brutality because they sometimes risk  lives unnecessarily when using tasers. Further, the news over the past few years  has offered verifiable reports of police officers using tasers on individuals  who are handicapped, pregnant, mentally-disabled or non-English-speaking, in  addition to those who were simply objecting to an officer&#39;s aggression or  inability to explain details of an arrest. The rise of cell phone camera  technology and Internet video databases such as YouTube and LiveLeak has given  the public more opportunity than ever to capture and display videos of taser  incidents that are often astonishingly graphic.&lt;/b&gt;
   
    &lt;/div&gt;&lt;/b&gt;
  
   
&lt;/div&gt;
  
  
  
  
  
  
  
  


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  
  

  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;It&#39;s The End Of The World As We Know It&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB5hfeBChsAN3GzJc8wqAmojBXRzHBvrtN_-SmLYsIrcodpBGRDh1r_zUh5lMlUZzWtzpntvnR86WWuq6C5_s6C9Av_-Xl0-FfsIAUTUAHye07gR3y9opSw7_fkJukxaedPJoRHy3IFWmg/s0/imageedit_6_8008177139.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;579&quot; id=&quot;BLOGGER_PHOTO_ID_5339458982341643154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB5hfeBChsAN3GzJc8wqAmojBXRzHBvrtN_-SmLYsIrcodpBGRDh1r_zUh5lMlUZzWtzpntvnR86WWuq6C5_s6C9Av_-Xl0-FfsIAUTUAHye07gR3y9opSw7_fkJukxaedPJoRHy3IFWmg/s0/imageedit_6_8008177139.jpg&quot; width=&quot;422&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;Now The End Begins!&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Close your eyes and imagine a world without electricity and modern conveniences:  no Fox News, no Facebook, no email, no Blackberry, no cold drinks, no heat in the winter, no automobiles, no food and no way to cook it even if you had it. 
&lt;br /&gt;&lt;br /&gt;It’s just become the end of the world as we know it.&lt;br /&gt;&lt;br /&gt; Are you and your family going to survive?
&lt;br /&gt;&lt;br /&gt;
Ours is a world of steaming hot lattes on demand, ice-cold beer in the twinkling of an eye, and internet and phone connections in a nanosecond. &lt;br /&gt;&lt;br /&gt;We are the ultimate immediate gratification society. &lt;br /&gt;&lt;br /&gt;And what would happen if ….
&lt;br /&gt;&lt;br /&gt;
The dollar bought nothing
&lt;br /&gt;&lt;br /&gt;
A virus could not be cured
&lt;br /&gt;&lt;br /&gt;
Terrorists exploded nuclear bombs across the country
&lt;br /&gt;&lt;br /&gt;
Hurricanes, tornadoes, earthquakes and volcanic activity all became more prevalent
 &lt;br /&gt;
&lt;br /&gt;&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/climate-changes-and-global-depression.html&quot;  target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt; &lt;/b&gt;

  

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

  
  
&lt;b&gt;

&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;
  &lt;span style=&quot;font-size: 130%; &quot;&gt;Global Control Through RFID Chips Or With Biometrics&lt;/span&gt;&lt;/b&gt;&lt;/font&gt;&lt;/b&gt;&lt;br/&gt;
&lt;br/&gt;



&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkf4ixIsA75lWaPtnULLUVEOjsK_clNY4rCsPP3vU4S8zjuB0hi8avbKUZ0t6xF6mGDNH5QQ43TIR2yM0G4oG6I7uOSxYLS4HHwsjib0FI94N1vI-aiuhAmeIBolYfSOR3eyByP6dP5ofV/s1600/156777681490323865+%25281%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em;  margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkf4ixIsA75lWaPtnULLUVEOjsK_clNY4rCsPP3vU4S8zjuB0hi8avbKUZ0t6xF6mGDNH5QQ43TIR2yM0G4oG6I7uOSxYLS4HHwsjib0FI94N1vI-aiuhAmeIBolYfSOR3eyByP6dP5ofV/s1600/156777681490323865+%25281%2529.png&quot; height=&quot;390&quot; width=&quot;239&quot; /&gt;&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Biometric Hand/Vein Recognition&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;


&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMVfHVrwcQQJdvR1kyygqkxGeHEu8KkF7aMBvx96oJ4FUPeJGME09VqY2VV21uPpT4lLHSmluE-j8yCLT26Xj1bLSOH5VKnUtQzB857I-NA8yh2LyTcydE-B_Klo2cBwYakBcJx7ZWtkHa/s540/2-960x0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMVfHVrwcQQJdvR1kyygqkxGeHEu8KkF7aMBvx96oJ4FUPeJGME09VqY2VV21uPpT4lLHSmluE-j8yCLT26Xj1bLSOH5VKnUtQzB857I-NA8yh2LyTcydE-B_Klo2cBwYakBcJx7ZWtkHa/s640/2-960x0.jpg&quot;  height=&quot;220&quot; width=&quot;332&quot; /&gt;&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;An Inserted RFID Tracking Chip&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;There is a possible global economic crisis coming that will lead to a financial &quot;melt down&quot; that the elite could use in order to establish a Global Financial Economic System.  

This would give centralized power to the United Nation&amp;#8217;s International Monetary Fund and the World Bank, creating a type of &quot;Global Federal Reserve System&quot;. &lt;br&gt;&lt;br&gt;





This is setting the stage for a cashless electronic currency with the use of a high tech surveillance RFID (Radio Frequency Identification) chip to be implanted under one&amp;#8217;s skin or with biometrics. &lt;br&gt;&lt;br&gt;
The Global Elite, blinded by their thirst for power, orchestrate obtaining total control over the people in the excuse of providing for more transparency; a greater surveillance of the world financial markets, cross border firms, money laundering, terrorist financing, etc&amp;#8230;&lt;br&gt;&lt;br&gt;
They believe that they are the only ones capable of governing mankind properly. However, these globalists know very well that people will not easily give up their freedom of the use of cash to accept these &quot;bio-chips&quot; or a biometric system unless there is a worldwide panic, be it financial or maybe even a flu pandemic, etc. to convince the population that the only way not to lose everything is to accept the use of a RFID chip or biometric system.

&lt;/b&gt;
&lt;br&gt;&lt;br&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/biometrics-fingerprint-technology-and.html&quot;  target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;

  
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  







&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;Surveillance Cameras With Computer Chips That Sense Criminal Activities, Alerts Police&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;

  &lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
    


&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4YZ7t_28tik3Nprl9hYC0TcJtgJ4FDnNCNfZl7nUCgGjN0f_gma-HBeDEzmIpopnXiB5rSeDtMClBW9W1854Sc9iH_fMiHYeVWUGGitJe2_J4OsnDOS4YrIk-CE5ptPkjXAW1BqjuCrt469EOBTSPtsdpeD1Ub9beQDkPUt4rvJeFMI2FWxyw_OJ3qwc/s1600/cops%20are%20watching%284%29.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;530&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4YZ7t_28tik3Nprl9hYC0TcJtgJ4FDnNCNfZl7nUCgGjN0f_gma-HBeDEzmIpopnXiB5rSeDtMClBW9W1854Sc9iH_fMiHYeVWUGGitJe2_J4OsnDOS4YrIk-CE5ptPkjXAW1BqjuCrt469EOBTSPtsdpeD1Ub9beQDkPUt4rvJeFMI2FWxyw_OJ3qwc/s1600/cops%20are%20watching%284%29.jpg&quot; width=&quot;432&quot;/&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; ( Right Top - A police officer closely monitors security camera images related to an ongoing crime. &amp;nbsp; Bottom - Information on crime suspects is collected.)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br/&gt;
&lt;br/&gt;
&lt;b&gt;With DigiSensory Technologies&amp;#8217; sophisticated cameras and sensor systems, law enforcement agencies and transportation departments across the United States are now able to proactively monitor and respond to crimes or accidents as they unfold; the company&amp;#8217;s Avista sensors process the images that its 3.2 megapixel high-resolution camera records in real time and can automatically detect when a crime is occurring; when it senses something it will alert law enforcement officials instantly; the sensors can also assist transportation departments in analyzing traffic patterns in real time; the system could allow officials to change one way streets, design real time traffic signals, and multiple speed limits to make traffic flow more smoothly.
&lt;br/&gt; &lt;br/&gt;

The East Orange New Jersey police department was the first U.S. agency to install DigiSensory&amp;#8217;s Avista Smart Imaging Sensor system as part of its broader network of security cameras around the city.
&lt;br/&gt;&lt;br/&gt;
The Avista sensors process the images that its 3.2 megapixel high-resolution camera records in real time and can automatically detect when a crime is occurring. When it senses something it will alert law enforcement officials instantly.
&lt;br/&gt;&lt;br/&gt;Government agencies and business around the world have already taken notice of DigiSensory Avista predictive sensors.


&lt;br/&gt;
&lt;br/&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2009/01/digisensory-cameras-predict-crime.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;

 </description><link>https://thecomingnewworldorder.blogspot.com/2008/02/americas-shopping-malls-are-dying-slow.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCFlplFotgGlj0DdjiRUA3i3GtCNRofxAwO_xmMTEmG4xu5HkRi3aXKHz3xD3W1nRM222woPjj-4rweIvWz8BOBDRZ3A7l7w9qm1dm4KtEc0L50GNoykrY-6NpNr1lU4HS2hJTTOURgvQs/s72-c/dead-mall.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-8952413782352472654</guid><pubDate>Sat, 19 Feb 2011 08:50:00 +0000</pubDate><atom:updated>2026-03-07T19:30:32.859-06:00</atom:updated><title></title><description>

&lt;span style=&quot;color: #5f0000;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Walmart Closing Locations Globally&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;

&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlrfEUrGvPKj6kEzx3q18I9337Xdm8X6hGHmn0LIuAPY1a6gUbpXaLavpW-6z21U5uYK_MPnnbT8eaS-j2VDWCfnQklQs3yUfAARPod9sKWAN4-bKTD5opgODXVP4Ax_56_0PMJ-ouHeOx/s1600/walmart_closed.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em;   margin-left: 1em;  &quot;&gt;&lt;img alt=&quot;Closed Walmart Store&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlrfEUrGvPKj6kEzx3q18I9337Xdm8X6hGHmn0LIuAPY1a6gUbpXaLavpW-6z21U5uYK_MPnnbT8eaS-j2VDWCfnQklQs3yUfAARPod9sKWAN4-bKTD5opgODXVP4Ax_56_0PMJ-ouHeOx/s1600/walmart_closed.jpg&quot;  width=&quot;423&quot;  height=&quot;289&quot;  /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;B&gt;Walmart announced it is closing 154 U.S. stores, according to a company press release, including the company’s 102 Walmart Express stores, the smallest format stores.&lt;BR&gt;&lt;BR&gt;

It is part of a global downsizing that will shutter 269 stores around the world out of Walmart&#39;s nearly 11,600 stores.
&lt;BR&gt;&lt;BR&gt;
The smaller-format store format had been tested since 2011.&lt;BR&gt;&lt;BR&gt;
In addition to all the Express stores, 23 Neighborhood Markets, 12 Supercenters, seven stores in Puerto Rico, six discount centers and four Sam’s Clubs will be closed.
&lt;BR&gt;&lt;BR&gt;
About 16,000 associates will be affected worldwide - roughly 10,000 of whom are in the U.S. - according to the company.
&lt;BR&gt;&lt;BR&gt;
It said more than 95 percent of the closed stores in the U.S. are within 10 miles on average of another Walmart, so the hope is those associates can gain employment at nearby stores. In cases where that isn&#39;t available, transition assistance will be available, the company said.
&lt;BR&gt;&lt;BR&gt;&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzeCRrEkYARuJIuYEP9-QoXRG_Wr-N4coZ9FxLiWeAy-S9VvLhfuzRPj4SdEuUvo1FxlTlisF-vnjPym3eYSJ0v10MiCOPgbswrFdF24VFqrcgOE3vsn8aqUXLfItfPidPBvWzb6P7VTt/s1600/0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em;   margin-right: 1em;  margin-top: 1em; &quot;&gt;&lt;img alt=&quot;Military Vehicles At A Walmart Store&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJzeCRrEkYARuJIuYEP9-QoXRG_Wr-N4coZ9FxLiWeAy-S9VvLhfuzRPj4SdEuUvo1FxlTlisF-vnjPym3eYSJ0v10MiCOPgbswrFdF24VFqrcgOE3vsn8aqUXLfItfPidPBvWzb6P7VTt/s1600/0.jpg&quot;  width=&quot;453&quot;  height=&quot;289&quot; /&gt;&lt;BR&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;font color=&quot;#000000&quot;&gt;&lt;b&gt;Military vehicles at a Walmart parking lot?&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;
“Actively managing our portfolio of assets is essential to maintaining a healthy business,” said Doug McMillon, president and CEO, Walmart Stores, Inc. “Closing stores is never an easy decision, but it is necessary to keep the company strong and positioned for the future. It’s important to remember that we’ll open well more than 300 stores around the world next year. So we are committed to growing, but we are being disciplined about it.”
&lt;BR&gt;&lt;BR&gt;
However, some in affected communities were dismayed at the decision.
&lt;BR&gt;&lt;BR&gt;
Michael Huffman of Waskom, TX, called the decision to close the Walmart Express in his town &quot;a very bad and immoral corporate decision.&quot;&lt;BR&gt;&lt;BR&gt;

He said, &quot;Walmart ran the only other grocery store in town out of business. ... There are a lot of elderly people in Waskom who need a grocery store.&quot;&lt;BR&gt;&lt;BR&gt;

Walmart said the stores it will close &quot;represent less than 1 percent of both global square footage and revenue.&quot; The closings represent about 2 percent of Walmart stores globally, Walmart said.
&lt;BR&gt;&lt;BR&gt;
The Bentonville, AR, big-box giant garnered a fiscal year 2015 revenue of $485.7 billion and employs about 2.2 million associates worldwide.



&lt;/b&gt;


  
 
&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

 &lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Frightening Frequencies: The Dangers Of 5G&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
 &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfZEoQwSq38AUsG5NgdTvtCGi_rTB9ZrSC3sJ7EFY3sftnVvsGozpulK8GM_F0RkJlZZAvGYR8Sk56aE5k0nfgHkSmszPai0Q0l2L9W2EeDHkGcVA8xtG9OQdHDR0MJq46bVxOJOziJZ6K/s1600/5G-tower-718x523.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;
 &lt;img alt=&quot;5G Tower&quot; height=&quot;363&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfZEoQwSq38AUsG5NgdTvtCGi_rTB9ZrSC3sJ7EFY3sftnVvsGozpulK8GM_F0RkJlZZAvGYR8Sk56aE5k0nfgHkSmszPai0Q0l2L9W2EeDHkGcVA8xtG9OQdHDR0MJq46bVxOJOziJZ6K/s1600/5G-tower-718x523.jpg&quot; width=&quot;490&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
 &lt;b&gt;
 As the old saying goes, give us an inch and inevitably we&amp;#8217;ll want a mile. And certainly, this sentiment is true with technology.
 &lt;br /&gt;&lt;br /&gt;
 Who doesn&amp;#8217;t want faster, bigger (or smaller), more efficient? Take wireless mobile telecommunications. Our current broadband cellular network platform, 4G (or fourth generation), allows us to transmit data faster than 3G and everything that preceded. We can access information faster now than ever before in history. What more could we want? Oh, yes, transmission speeds powerful enough to accommodate the (rather horrifying) so-called Internet of Things. Which brings us to 5G.&lt;br /&gt;&lt;br /&gt;
 Until now, mobile broadband networks have been designed to meet the needs of people. But 5G has been created with machines&amp;#8217; needs in mind, offering low-latency, high-efficiency data transfer. It achieves this by breaking data down into smaller packages, allowing for faster transmission times. Whereas 4G has a fifty-millisecond delay, 5G data transfer will offer a mere one-millisecond delay&amp;#8211;we humans won&amp;#8217;t notice the difference, but it will permit machines to achieve near-seamless communication. Which in itself may open a whole Pandora&amp;#8217;s box of trouble for us &amp;#8211; and our planet.
 &lt;br /&gt;&lt;br /&gt;
 More bandwidth &amp;#8211; more dangers of 5G
 
 
 &lt;/b&gt;
 
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2008/06/frightening-frequencies-dangers-of-5g.html&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;
 

&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;










&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;New York City Police Department&#39;s Surveillance Helicopter&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;


&lt;BR&gt;




&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglHRZFXho40wZdystiAdHBBXy93DO7fieHRMTSgIF4kfO71rAWN9MTzSJDZldRvexmwwtrceKs-zhuScI8RQSZWiXx7IjwnPvNkcwkiw4vOCMZkgwDyRm0CT_r7UBB3fgwccWiA4e2ecNF/s640/n23fh.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em;   margin-right: 1em;  &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339181924454178834&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglHRZFXho40wZdystiAdHBBXy93DO7fieHRMTSgIF4kfO71rAWN9MTzSJDZldRvexmwwtrceKs-zhuScI8RQSZWiXx7IjwnPvNkcwkiw4vOCMZkgwDyRm0CT_r7UBB3fgwccWiA4e2ecNF/s640/n23fh.jpg&quot; style=&quot; height: 210px; width: 320px;  &quot;&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;

According to the NYPD, you won&#39;t even recognize that its there, but high above the heads of New York City&#39;s citizens, there is a $10 million special NYPD helicopter with an impressive arsenal of surveillance equipment inside it. The chopper, called &quot;23&quot;, looks like plain helicopter on the outside, but on the inside it is chock-full of hi-tech gadgetry. The helicopter&#39;s surveillance cameras, including one for infrared photography, are mounted below the aircraft. &lt;/b&gt;
&lt;BR&gt;&lt;BR&gt;

&lt;div  style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhBJ_YXi8Pe27yagmUFraa-TvDVaLTLBRTVnG_HPUJCUR6zsxuQmsjFBoZveuFJflachONII3eYezHSaxX-Mu_9q3A5YWLNpEg2_9gcAdWI6iqI7AIFFMrruj9nRwxPWueuLVfH8YJDqZ0/s534/mahler-600.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhBJ_YXi8Pe27yagmUFraa-TvDVaLTLBRTVnG_HPUJCUR6zsxuQmsjFBoZveuFJflachONII3eYezHSaxX-Mu_9q3A5YWLNpEg2_9gcAdWI6iqI7AIFFMrruj9nRwxPWueuLVfH8YJDqZ0/s534/mahler-600.jpg&quot; width=&quot;390&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;




&lt;b&gt; The chopper&#39;s arsenal of sophisticated surveillance and tracking equipment is powerful enough to stealthily read license plates - or even pedestrian&#39;s faces - from high above. The helicopter&#39;s surveillance system can beam live footage to police command centers or even to wireless hand-held devices. Without leaving Manhattan airspace, the chopper also was able to get a crystal-clear picture of jetliners waiting to take off from LaGuardia Airport and to survey Kennedy International Airport&#39;s jet fuel lines. The helicopter is just part of the department&#39;s efforts to adopt cutting-edge technology for its counterterrorism operations. The NYPD also plans to spend tens of millions of dollars strengthening security in the lower Manhattan business district with a network of closed-circuit television cameras and license-plate readers posted at bridges, tunnels and other entry points.&lt;/b&gt;




&lt;BR&gt;




&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;Enhanced Driver’s License Now Ready For Border&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;


&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiNTZJlwG5NK6aMTK7qESMDxh6ylygPEFfEfNoAV1dG_TqvQSSh7PlJRXh5Olcm73_rMyWXqaROSIEshD6xJOWR1CpWPVzRZtNKeIWflkvMwJHbq9c1XOuIQEmR212mi5F1FoY_fvpqzrV/s320/driverlicense-500x374.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Enhanced Drivers License&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiNTZJlwG5NK6aMTK7qESMDxh6ylygPEFfEfNoAV1dG_TqvQSSh7PlJRXh5Olcm73_rMyWXqaROSIEshD6xJOWR1CpWPVzRZtNKeIWflkvMwJHbq9c1XOuIQEmR212mi5F1FoY_fvpqzrV/s320/driverlicense-500x374.jpg&quot; height=&quot;227&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;Ontario residents can now apply for an enhanced driver’s license to use instead of a passport when crossing into the United States, Transportation Minister Jim Bradley announced today, even though the new documents won’t be ready for weeks.&lt;br /&gt;
&lt;br /&gt;
The U.S. will require passports or other secure identification documents for anyone crossing into the country by land or sea starting June 1, while a passport will still be required to enter the U.S. by air.&lt;br /&gt;
&lt;br /&gt;
What is it?&lt;br /&gt;
&lt;br /&gt;
A new high tech licence designed to prevent identity theft and possibly serve as an alternate to your passport when travelling to the U.S. But a Ministry spokesman admits that could be ‘years away.’&lt;br /&gt;
&lt;br /&gt;
What’s special about it?&lt;br /&gt;
&lt;br /&gt;
It has a second photo on the front, raised lettering of the license’s number, signature and date of birth, a fine-line background, a 2D barcode, micro and rainbow printing, and ultraviolet features among others.&lt;br /&gt;
&lt;br /&gt;
When can you get it?&lt;br /&gt;
&lt;br /&gt;
They’ll be issued the next time you renew your license, starting this month.&lt;br /&gt;
&lt;br /&gt;
What’s the cost?&lt;br /&gt;
&lt;br /&gt;
It won’t be more expensive, retaining the $75 charge you pay now.&lt;br /&gt;
&lt;br /&gt;
What if you’ve just renewed your license?&lt;br /&gt;
&lt;br /&gt;
You’re out of luck. The only way to get the new version is to move, change the information on your current card or wait until your next renewal five years from now.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;CCTV Security Cameras&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy3KNn_VYJX4t-vHEyF0J_jgNWKGea1qyVHmTa6xd06OOKxUAugwYEE02XYLj_lDVYy3XUmrADeNnRlpf9aYItdFPxyzU-inDZXBUD4-zMACYXVFVREmxFWiOWkaRWqmwkeov-NyTUee8d/s1600/explosion-proof-cctv-camera-390641.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5340988063122054578&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiy3KNn_VYJX4t-vHEyF0J_jgNWKGea1qyVHmTa6xd06OOKxUAugwYEE02XYLj_lDVYy3XUmrADeNnRlpf9aYItdFPxyzU-inDZXBUD4-zMACYXVFVREmxFWiOWkaRWqmwkeov-NyTUee8d/s1600/explosion-proof-cctv-camera-390641.jpg&quot; style=&quot;cursor: pointer; height: 239px; margin: 0pt 10px 10px 0pt; width: 320px;  &quot;&gt;&lt;/a&gt; &lt;/center&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;center&gt;          &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinRvt_90RMnxT8fUrwJdV5rDEB3w9FaVEgahhLSEShK6PLEtvUImyX4oBq5HUJWbOwtYU6xLr6W7WbezT2rUCP28VwfZuR-6TzwxAnR2Mt48mgkNquRa-pCj3VfmApOadbqkE0JtuX7KFS/s1600-h/Surveilux-SVP-MN18X.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339153060872409698&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinRvt_90RMnxT8fUrwJdV5rDEB3w9FaVEgahhLSEShK6PLEtvUImyX4oBq5HUJWbOwtYU6xLr6W7WbezT2rUCP28VwfZuR-6TzwxAnR2Mt48mgkNquRa-pCj3VfmApOadbqkE0JtuX7KFS/s200/Surveilux-SVP-MN18X.jpg&quot; style=&quot;cursor: pointer; height: 202px; margin: 0pt 10px 10px 0pt; width: 180px; &quot;&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;An explosion proof camera and various dome mounted cameras are pictured above. CCTV is an acronym that stands for Closed Circuit Television. It is defined as the use of one or more cameras used for surveillance purposes. It was initially developed to increase bank security and has since spread to every corner of the security industry. Home security systems, businesses, corporations, organizations, and schools are several examples of locations that implement CCTV Security Systems. They produce high quality, exceptionally sharp color images, and have motion sensors that track movement across an area. They can pick a person out of a crowd and lock on them, tracing their movements; they can run at night because of infrared technology. The possibilities are endless for CCTV, especially as the technology continues to develop.&lt;/b&gt;











&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;












&lt;b&gt;&lt;font color=&quot;#5f0000&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Boston Bombing: Major Problems for Controlled Media&lt;/b&gt;&lt;/span&gt;&lt;/font&gt;&lt;br/&gt;
&lt;br/&gt;



&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3UNZBS1vKYX53rO_QGGMTwz9HFsMpBKfw7Ovj3nHp-YytFDj3HPwEtmVv5X_rzkcrM2EkwISeFIY9hXU-_FyBlF6j7lY5LQuoPiaktlpVbPseOTvu0RIMGPJEUqyxm6XHgPVopSVneS_C/s1600/Untitledawaw.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Boston Bombing&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3UNZBS1vKYX53rO_QGGMTwz9HFsMpBKfw7Ovj3nHp-YytFDj3HPwEtmVv5X_rzkcrM2EkwISeFIY9hXU-_FyBlF6j7lY5LQuoPiaktlpVbPseOTvu0RIMGPJEUqyxm6XHgPVopSVneS_C/s0/Untitledawaw.jpg&quot; height=&quot;310&quot; width=&quot;500&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;
You’re a reporter for a TV news outlet.
&lt;BR&gt;&lt;BR&gt;
You’ve become aware of a disturbing trend. Thousands of private citizens are now analyzing video and photographs of crime scenes and posting their findings.
&lt;BR&gt;&lt;BR&gt;
They can’t be stopped. They’re looking at news footage, casual video, photos, and what they’re coming up with challenges the official story lines your network pushes.
&lt;BR&gt;&lt;BR&gt;

Some of their analysis is good.
&lt;BR&gt;&lt;BR&gt;
For example, video footage of the first bomb in Boston doesn’t appear to show any shrapnel damage to the fencing near the explosion, or to the blue canopy just above the street. You, the reporter, wonder about that.&lt;/b&gt;&lt;BR&gt;&lt;BR&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH1K_gXU9xuklKJB4Q1qAzxSHEEsSu5hGPYKiFFa-S8rgW_82S-MkeNSqyjickJ5nZ3la0iOjT1-lL6Gf1yrNhAQ8mt2NkpQbG3MZ5hDBK2__NMbNRt2ahuo-toxactyFzkdonkIWGEM1d/s0/72b7b__140410-bostonclock-baumann-injuries-inline_8a67ea11bbb6bd95151f326f00722200.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Boston Bombing Photo&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH1K_gXU9xuklKJB4Q1qAzxSHEEsSu5hGPYKiFFa-S8rgW_82S-MkeNSqyjickJ5nZ3la0iOjT1-lL6Gf1yrNhAQ8mt2NkpQbG3MZ5hDBK2__NMbNRt2ahuo-toxactyFzkdonkIWGEM1d/s0/72b7b__140410-bostonclock-baumann-injuries-inline_8a67ea11bbb6bd95151f326f00722200.jpg&quot; height=&quot;312&quot; width=&quot;460&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
The now-famous 78-year-old runner who fell down in the street, just after the first explosion? Security personnel wearing yellow jackets were standing closer to the bomb, but they didn’t wobble or duck or waver. You, the reporter, wonder about that, too.
&lt;BR&gt;&lt;BR&gt;
You, the reporter, see a photo of a storefront which was presumably right next to the first bomb. The windows are blown out. But all the glass is lying in the street, which would indicate the force of the explosion was coming from inside the store. How is that possible, you ask yourself.
&lt;BR&gt;&lt;BR&gt;
Then there are the quickly circulating photos of the man in the wheelchair. He’s missing large parts of both legs. People are pushing the chair. His legs aren&#39;t bleeding. And other posted photos show he already was wearing prosthetics?&lt;/b&gt;





 &lt;br /&gt;
&lt;br /&gt;&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/boston-bombing-major-problems-for.html&quot;  target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;
&lt;/b&gt;&lt;/b&gt;






&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;











&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;Globalization And A One World Economy&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;





&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA7uhPbn2sjvMwbslSUETJYeTiAk9vFznLQVRxl33GSZT_N-GzDV8A9FUxKEZm0Uv_-JI0m4NtawvnZ3gj_ZXAm0VhTLBTEB3CulpHtl_84q05ijcmrBjjoU8n32hs19aVkLlr4igVijKf/s640/mcdonalds-china.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Globalization&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA7uhPbn2sjvMwbslSUETJYeTiAk9vFznLQVRxl33GSZT_N-GzDV8A9FUxKEZm0Uv_-JI0m4NtawvnZ3gj_ZXAm0VhTLBTEB3CulpHtl_84q05ijcmrBjjoU8n32hs19aVkLlr4igVijKf/s640/mcdonalds-china.jpg&quot; width=&quot;322&quot; height=&quot;227&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;b&gt; Corporate citizenship in the world economy. Transnational Corporations exert a great deal of power in the globalized world economy. Many corporations are richer and more powerful than the states that seek to regulate them. Through mergers and acquisitions corporations have been growing very rapidly and some of the largest TNCs now have annual profits exceeding the GDPs of many low and medium income countries.&lt;/b&gt;

&lt;b&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;

&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

&lt;b&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;span style=&quot;font-size: 130%; &quot;&gt;Welcome To The &quot;New World Order&quot;&lt;/span&gt;&lt;/font&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Revelation 13: 16  He causes all, both small and great, rich and poor, free and slave, to receive a mark on their right hand or on their foreheads, 17  and that no one may buy or sell except one who has the mark or the name of the beast, or the number of his name.&lt;/b&gt;

&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYbPdeXunfGLKWntU-ZTBQEEmwnU5uvTjYVDrMLDYxgjmfHiztcDqe3oFPQ89_h3X4eiB7tvzVULgwP3vwzpj07Vh-QeldetVuYQ9W8cf7MfU6NH9yQe-W0Qn8H_ftY61B85o-PoM3bj2E/s1600/0_21_national_id_card_450.jpg&quot; &gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYbPdeXunfGLKWntU-ZTBQEEmwnU5uvTjYVDrMLDYxgjmfHiztcDqe3oFPQ89_h3X4eiB7tvzVULgwP3vwzpj07Vh-QeldetVuYQ9W8cf7MfU6NH9yQe-W0Qn8H_ftY61B85o-PoM3bj2E/s320/0_21_national_id_card_450.jpg&quot;  height=&quot;250&quot; width=&quot;350&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;U.K. To Begin Microchipping Prisoners&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgznB2hbCjNaSZYNedv7bjRunWwaLjyhbMwu1MxA4E9IHi_n36tIZR3dTTIs9ak8NgzY0mrNRa0a5TKGahXUoSdCUeLID39GKR-q3L2qe8v2L9eckSTWQVfw08GZuesb_SkLDoShlCurAsW/s640/microchipimplant.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Microchipping&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgznB2hbCjNaSZYNedv7bjRunWwaLjyhbMwu1MxA4E9IHi_n36tIZR3dTTIs9ak8NgzY0mrNRa0a5TKGahXUoSdCUeLID39GKR-q3L2qe8v2L9eckSTWQVfw08GZuesb_SkLDoShlCurAsW/s640/microchipimplant.jpg&quot; width=&quot;222&quot; height=&quot;140&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;The British government is developing a plan to track current and former prisoners by means of microchips implanted under the skin, drawing intense criticism from probation officers and civil rights groups.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWp0mrli9YTaZAwBgQpj1N-BWeJB357GLXn7ZqxJCbYzi8uFnFNTZ44CVl6QM2iwnopMH-KKNXQhpHuJXa8E6JPAYBPp97me7f87jYtJTsh5anXsIhPGRfXe5h4h-b2zjCG4YCKmTrD-2y/s1600/rfid-tag_phixr.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Microchipping&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWp0mrli9YTaZAwBgQpj1N-BWeJB357GLXn7ZqxJCbYzi8uFnFNTZ44CVl6QM2iwnopMH-KKNXQhpHuJXa8E6JPAYBPp97me7f87jYtJTsh5anXsIhPGRfXe5h4h-b2zjCG4YCKmTrD-2y/s1600/rfid-tag_phixr.jpg&quot; width=&quot;322&quot; height=&quot;227&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;b&gt;&lt;span style=&quot;text-align: left; &quot;&gt;As a way to reduce prison crowding, many British prisoners are currently released under electronic monitoring, carried out by means of an ankle bracelet that transmits signals like those used by mobile phones. Now the Ministry of Justice is exploring the possibility of injecting prisoners in the back of the arm with a radio frequency identification (RFID) chip that contains information about their name, address and criminal record. Such chips, which contain a built-in antenna, could be scanned by special readers. The implantation of RFID chips in luggage, pets and livestock has become increasingly popular in recent years. In addition to monitoring incarcerated prisoners, the ministry hopes to use the chips on those who are on probation or other conditional release. By including a satellite uplink system in the chip, police would be able to use global positioning system (GPS) technology to track subjects&#39; exact locations at all times. &lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/blog-post.html&quot;&gt;Click Here - &lt;/a&gt; to see a Rfid Chip image with details on individual parts.&lt;/span&gt;&lt;/b&gt;




&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;The War Of Gog And Magog&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;
&lt;BR&gt;&lt;BR&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot; &gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkLaxcWK_RlTWiEgWGeyC3R0OfBpugUwagnQ7JagsyPpb3Zf4jSbatvtZn69nVC1TBLP-GsLZE8uwO5xBzP6FTM_KhP13hp-_TxbqVk9Z_REwrP9nh_0svye2DxYJLZ5X9YAn8hhXKX-8/s1600/Trident_II_missile_image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;210&quot; width=&quot;290&quot; id=&quot;BLOGGER_PHOTO_ID_5468606167121447698&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkLaxcWK_RlTWiEgWGeyC3R0OfBpugUwagnQ7JagsyPpb3Zf4jSbatvtZn69nVC1TBLP-GsLZE8uwO5xBzP6FTM_KhP13hp-_TxbqVk9Z_REwrP9nh_0svye2DxYJLZ5X9YAn8hhXKX-8/s1600/Trident_II_missile_image.jpg&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;(Nuclear War in the Middle East?)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; &lt;br/&gt;
&lt;br/&gt;&lt;b&gt;
With the threat that Israel or the U.S. could eventually opt for a military strike against Tehran&#39;s nuclear program or even actually strike Iran&#39;s nuclear facilities could be the start of a major regional war. Should the US or Israel intervene in Syria - the results could be the same.&lt;br/&gt;
&lt;br/&gt;Israel and even the entire world are now experiencing the most critical time in history. The president of Iran, Ahmadinejad, has stated again and again that his main goal is &quot;to remove Israel from the map of the world&quot; and for this he is preparing nuclear weapons. The  &quot;Palestinians&quot;,  never existed as a nation inside Israel are fighting against Israel and since 1948 have been an instrument of the Arab-Muslim world. Islamic-terror organizations are surrounding Israel from every side and shooting missiles and rockets into Israel. Syria is armed with biological and chemical missiles aimed at Israel. All of the Arab countries have armed themselves with modern weapons to be used against Israel in the near future. The United States is putting pressure on Israel to divide the Land of Israel and to establish a &#39;Palestinian State&#39;. Years after the re-establishment of the State of Israel and after several wars with Arab-Islamic nations that wanted to destroy Israel again and again, Israel is again facing pressure from every side with step-by-step preparations of the enemies of the people of Israel to destroy the State of Israel through an apocalyptic war with nuclear weapons that were never used in the past.&lt;br&gt;&lt;br&gt;
In bible prophecy, Ezekiel 38 &amp;amp; 39 informs us of a future war and invasion of Israel by a vast coalition of nations (Russia, Iran, Libya, Ethiopia, Egypt, Turkey and Moslem Republics) that surround it. This invasion could occur at any time because of the heightened tensions over Iran&#39;s nuclear ambitions and the crisis in Syria. In regards to Iran clearly US and European powers fear that Iran is trying to develop a nuclear weapon with UN sanctions aimed at pressuring Iran to halt uranium enrichment. Since Russia has developed close ties with Iran and Syria it makes sense that they would be invading along with the Islamic confederacy.&lt;br/&gt;
&lt;br/&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/the-war-of-gog-and-magog.html&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;&lt;br/&gt;
&lt;b&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;/b&gt;


&lt;B&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;Opt Out of a Body Scan? Then Brace Yourself&lt;/span&gt;&lt;/font&gt;&lt;/b&gt;&lt;/b&gt;&lt;br&gt;&lt;br&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWAaXdfPZx-jW03G-L5GvPz0cXYnxtnDi_NaztOiBb1PGfQcniFPEuyY2Zz0LboclSkfQYPKNPlxXZP7Fvti_mxRdV6mpPrIK3HZ8NM-Th8FQMGbvKRPA1xY6eG7iEEHYIL-e9uKTSaFmK/s640/body-scan.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWAaXdfPZx-jW03G-L5GvPz0cXYnxtnDi_NaztOiBb1PGfQcniFPEuyY2Zz0LboclSkfQYPKNPlxXZP7Fvti_mxRdV6mpPrIK3HZ8NM-Th8FQMGbvKRPA1xY6eG7iEEHYIL-e9uKTSaFmK/s640/body-scan.jpg&quot; style=&quot;height: 190px; width: 390px; &quot;&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;HAVING been taught by nuns in grade school and later going through military boot camp, I have always disliked uniformed authorities shouting at me. So I was unhappy last week when some security screeners at’Hare International Airport in Chicago started yelling.&lt;br /&gt;
&lt;br /&gt;“Opt out! We got an opt out!” one bellowed about me in a tone that people in my desert neighborhood in Tucson usually reserve for declaring, “Rattlesnake!”&lt;BR&gt;&lt;BR&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/opt-out-of-body-scan-then-brace.html&quot;  target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;

&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


  &lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;Biometric Technology&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Before long, we may use fingerprints, iris scans, and voice recognition to log onto computers, buy groceries -- even when picking up kids from school. This could be you: At a convenience store, a scanner reads your fingerprints and deducts the price of a coffee and doughnut from your checking account. Once at the office, your employer uses software to monitor the rhythm of your typing or a Webcam to measure the proportions of your face before letting you onto the network. Your call to customer service won&#39;t go through until you&#39;re identified by the cadence of your voice.&lt;/b&gt;&lt;br /&gt;


&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEg9ciOEzImdYtVwgkI2RQZZnedr27Xd4SkBu-3QKxxQWwT75fgBop5S_8fpuMbc0JpEx3PHwuTU1lU-GhXXUL4AurXSp46PqqpCX46lel-u_xzpAACcPlvQ1v9nxHwn6h66qXnEwLzXax/s1600-h/2palmsensor-fujitsu.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot;  height=&quot;270&quot; width=&quot;400&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5067119720195664690&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEg9ciOEzImdYtVwgkI2RQZZnedr27Xd4SkBu-3QKxxQWwT75fgBop5S_8fpuMbc0JpEx3PHwuTU1lU-GhXXUL4AurXSp46PqqpCX46lel-u_xzpAACcPlvQ1v9nxHwn6h66qXnEwLzXax/s400/2palmsensor-fujitsu.jpg&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;  &quot;&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;Palm Reader&lt;br /&gt;
What: Fujitsu PalmSecure Measures: Vascular patterns and blood flow in the hand&lt;br /&gt;
Status: Widely available at ATMs and other locations in Japan. U.S. launch expected this year The PalmSecure bombards the user&#39;s hand with &quot;near infrared&quot; light to detect the pattern of blood vessels. Fujitsu is close-lipped about a U.S. debut expected later this year but says PalmSecure could be useful in health care and for granting access to buildings.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia57wjQRdK_NtRagyDQQB5h4667NNBmdNbBSLy6aGA929y5nTbyD1zRi-SYQfGcBQ_LiDJylOMM2chyphenhyphenXFMUo3dUgvZDZMikMXh4h1fbc69tJBCZnqcJaYZ6tKuMaL6R3RzwmXQa3mvWZ7D/s1600/pay-by-touch.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot;  height=&quot;270&quot; width=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia57wjQRdK_NtRagyDQQB5h4667NNBmdNbBSLy6aGA929y5nTbyD1zRi-SYQfGcBQ_LiDJylOMM2chyphenhyphenXFMUo3dUgvZDZMikMXh4h1fbc69tJBCZnqcJaYZ6tKuMaL6R3RzwmXQa3mvWZ7D/s320/pay-by-touch.jpg&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
Let Your Fingers Do the Paying&lt;br /&gt;
What: Pay by Fingerprint device Measures: Fingerprints Status: available in certain grocery stores. Shoppers enrolled in the program can speed through checkout lines. This enables consumers to pay for goods and services with a swipe of their finger on a biometric sensor. It allowes secure access to checking, credit card, loyalty, healthcare, and other personal information, through the unique characteristics of an individual&#39;s biometric features, thereby creating a highly secure anti-identity theft platform.&lt;/b&gt;
&lt;/b&gt;



</description><link>https://thecomingnewworldorder.blogspot.com/2008/02/walmart-closing-locations-globally.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlrfEUrGvPKj6kEzx3q18I9337Xdm8X6hGHmn0LIuAPY1a6gUbpXaLavpW-6z21U5uYK_MPnnbT8eaS-j2VDWCfnQklQs3yUfAARPod9sKWAN4-bKTD5opgODXVP4Ax_56_0PMJ-ouHeOx/s72-c/walmart_closed.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-1659133408034692273</guid><pubDate>Tue, 15 Feb 2011 08:51:00 +0000</pubDate><atom:updated>2026-03-01T12:12:13.165-06:00</atom:updated><title></title><description>

&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;NSA Creating Spy System To  Monitor Domestic Infrastructure&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;




&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPwpY8MwoHW2gHynlaY4zo4Emp9QcJUO4LnMn27lLKozKspc10YHtQe7pqtiXNDKU5hQ8ajn8LkyxIVr0TKg6Cu9yF8Lc972QaWuBjfYPRlPzQeYaW3ID1xdj2XcF04GY7csX_r1maXVur/s640/nsa-spying.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPwpY8MwoHW2gHynlaY4zo4Emp9QcJUO4LnMn27lLKozKspc10YHtQe7pqtiXNDKU5hQ8ajn8LkyxIVr0TKg6Cu9yF8Lc972QaWuBjfYPRlPzQeYaW3ID1xdj2XcF04GY7csX_r1maXVur/s640/nsa-spying.jpg&quot; style=&quot;height: 285px; width: 285px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;b&gt;The National Security  Agency has begun work on an &quot;expansive&quot; spy system that will monitor critical  infrastructure inside the United States for cyber-attacks, in a move that  detractors say could end up violating privacy rights and expanding the NSA&#39;s  domestic spying abilities.&lt;br /&gt;
&lt;br /&gt;
The Wall Street Journal cites unnamed sources  as saying that the NSA has issued a $100-million contract to defense contractor  Raytheon to build a system dubbed &quot;Perfect Citizen,&quot; which will involve placing  &quot;sensors&quot; at critical points in the computer networks of private and public  organizations that run infrastructure, organizations such as nuclear power  plants and electric grid operators.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/nsa-creating-spy-system-to-monitor.html&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;







&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: #5f0000;&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;How America’s Police Became An Army: The 1033 Program&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu02DQciaQPDS1XidfctUoFEtLo5vys6sFtYJY6qCpZy3mwNCebC0c_C9OOIPTZ3akfbz_D8_D5VmX4p5vmedIYCPYV0Iv_q-r2RYAZ_zMWq0DsqOFXjm1ZJ82RpGXqGSlC27KODRZBD3i/s1600/fergusonapc8-13.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;275&quot; id=&quot;BLOGGER_PHOTO_ID_5468606167121447698&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu02DQciaQPDS1XidfctUoFEtLo5vys6sFtYJY6qCpZy3mwNCebC0c_C9OOIPTZ3akfbz_D8_D5VmX4p5vmedIYCPYV0Iv_q-r2RYAZ_zMWq0DsqOFXjm1ZJ82RpGXqGSlC27KODRZBD3i/s1600/fergusonapc8-13.jpg&quot; width=&quot;412&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;

As many have noted, Ferguson, Missouri, looked like a war zone. And its police — kitted out with Marine - issue camouflage and military - grade body armor, toting short-barreled assault rifles, and rolling around in armored vehicles — are indistinguishable from soldiers.
&lt;br /&gt;
&lt;br /&gt;
America has been quietly arming its police for battle since the early 1990s.
&lt;br /&gt;
&lt;br /&gt;
Faced with a bloated military and what it perceived as a worsening drug crisis, the 101st Congress in 1990 enacted the National Defense Authorization Act. 
&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju2IUrIKwJa5COEmbtQGP57su6VMlLB522WKK2K4snvbqzw2GEBr2zDPi9SMJZLT6QWHbxsEm4dqBbIvvt_l5T_3WpzKDk9clJiPmn2RK3BOhY56GpgcjEPEsT-Ff30a4YKA8OtPutmbz5/s1600/fergusoncops.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju2IUrIKwJa5COEmbtQGP57su6VMlLB522WKK2K4snvbqzw2GEBr2zDPi9SMJZLT6QWHbxsEm4dqBbIvvt_l5T_3WpzKDk9clJiPmn2RK3BOhY56GpgcjEPEsT-Ff30a4YKA8OtPutmbz5/s1600/fergusoncops.jpg&quot; width=&quot;412&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;Section 1208 of the NDAA allowed the Secretary of Defense to &quot;transfer to Federal and State agencies personal property of the Department of Defense, including small arms and ammunition, that the Secretary determines is — (A) suitable for use by such agencies in counter-drug activities; and (B) excess to the needs of the Department of Defense.&quot; It was called the 1208 Program. In 1996, Congress replaced Section 1208 with Section 1033.
&lt;br /&gt;
&lt;br /&gt;
The idea was that if the U.S. wanted its police to act like drug warriors, it should equip them like warriors, which it has—to the tune of around $4.3 billion in equipment, according to a report by the American Civil Liberties Union. The St. Louis County Police Department’s annual budget is around $160 million. By providing law enforcement agencies with surplus military equipment free of charge, the NDAA encourages police to employ military weapons and military tactics.

&lt;/b&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/how-americas-police-became-army-1033.html&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;





&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Full Body Scanners&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_MVA5JweJfap6Y9gAQddSNED9YR9qRFrzXzwA7XjrllggHl9vPOlICcH3ufqtCZ_H1a9yLwuLiJ_P-bNX4zep2wHh2UhNzTGEe0g6XqA6F6cDxUFSeS6rrQwc87YrogvfENWQ2UCpaSWP/s320/121011rot91222.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_MVA5JweJfap6Y9gAQddSNED9YR9qRFrzXzwA7XjrllggHl9vPOlICcH3ufqtCZ_H1a9yLwuLiJ_P-bNX4zep2wHh2UhNzTGEe0g6XqA6F6cDxUFSeS6rrQwc87YrogvfENWQ2UCpaSWP/s0/121011rot91222.jpg&quot; width=&quot;360&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

  &lt;b&gt;
&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;(A TSA Agent working for Homeland Security views naked full-body images.)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What are full-body scanners? Remember the X-ray specs of science fiction comics that would let people see through walls and clothing? Full-body scanners are a bit like them. The scanners take advantage of the fact that at certain wavelengths, 
&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinGm1CAH842-jCIx8M3bqdRb0c6_WatmsYyA4TPFzqRbc9f2pjxh7eqVl7DsDurxF7Q73IlfIhcP73eL2-bXhFLnq_npnAi7_4oLtlJJsQfvfwaBR06ZzapfRfmzf5Ef_watfpYI184L8/s520/tsa+%282%29.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinGm1CAH842-jCIx8M3bqdRb0c6_WatmsYyA4TPFzqRbc9f2pjxh7eqVl7DsDurxF7Q73IlfIhcP73eL2-bXhFLnq_npnAi7_4oLtlJJsQfvfwaBR06ZzapfRfmzf5Ef_watfpYI184L8/s0/tsa+(2).jpg&quot; width=&quot;470&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;TSA Scan Or Invasive Patdown?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;electromagnetic waves can pass through clothes but not through the skin, metal or substances such as drugs and explosives. If your eyes were sensitive to these wavelengths like the scanners, every person you meet would appear naked, with pens, coins, belt buckles and the like magically festooned about their person. &lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;You would also be able to see if they were carrying a knife, gun or explosives.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;What are the health concerns surrounding them? There are two main types of full-body scanner. One uses X-rays while the other uses lower-energy millimetre wavelengths. &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/full-body-scanners-we-reveal-all.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;











&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Coming False Prophet&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;



&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
  

  

  &lt;a href=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXeS_hxHsXCn-Z8hJaAL4ZGcr3_lBt6hyeewMVGVMGUMT7Np0Qu1rykFioaPLJkCOQLDMhI-kAbzL-pgdODIOsqv81tB_kyldEJMMR0pwxt9_YlDh5ASZbwUZUOVKsDUwXs?key=YF3nHP92DP42xDyP7pQ4zXBH&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;374&quot; src=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXeS_hxHsXCn-Z8hJaAL4ZGcr3_lBt6hyeewMVGVMGUMT7Np0Qu1rykFioaPLJkCOQLDMhI-kAbzL-pgdODIOsqv81tB_kyldEJMMR0pwxt9_YlDh5ASZbwUZUOVKsDUwXs?key=YF3nHP92DP42xDyP7pQ4zXBH&quot; width=&quot;560&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
  &lt;b&gt;

  
  
  A papal tapestry is unfurled and draped over the edge of the balcony as cardinals gather on the left and right sides of the balcony, looking out over the crowd in St Peter&#39;s Square. &lt;br /&gt;&lt;br /&gt;The crowd cheers and starts chanting after hearing the announcement that Cardinal Robert Francis Prevost has been voted as the new pope. We&#39;re now all waiting for Prevost to appear on the balcony, with the crowd continuing to make noise and wave flags in anticipation.
&lt;br /&gt;&lt;br /&gt;

The number of people in St Peter&#39;s Square rose to more than 40,000. The flow of people toward the square increased significantly after the white smoke.&lt;br /&gt;&lt;br /&gt;
  

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6WzTVGTDp0VXkvO14isiuhIHF0-prS7Z4fYuEEw9NBVg7nYywXa3m6yPmScwwoyRak4DwDsUj2cH21fahGtEYT0HekemrxYhVWu8An5Bua2-CcVy9ySJRMbRkEi2ZkZoziTGIYjHZ8Lg/s420/0227_pope-vatican-624x416.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;666, The Mark Of The Beast&quot; border=&quot;0&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6WzTVGTDp0VXkvO14isiuhIHF0-prS7Z4fYuEEw9NBVg7nYywXa3m6yPmScwwoyRak4DwDsUj2cH21fahGtEYT0HekemrxYhVWu8An5Bua2-CcVy9ySJRMbRkEi2ZkZoziTGIYjHZ8Lg/s520/0227_pope-vatican-624x416.jpg&quot; width=&quot;430&quot; /&gt; &lt;/a&gt;

  

 
  &lt;/center&gt;
&lt;/div&gt;
    

In his first speech as Pope Leo XIV, the newly elected pontiff, Cardinal Robert Prevost, said &quot;Peace be with you all&quot;. He also called for the Church to &quot;build bridges&quot; and paid tribute to his predecessor, Pope Francis. The speech was delivered from the balcony of St. Peter&#39;s Basilica in Vatican City. 

  

  &lt;/b&gt;
  
  &lt;br /&gt;&lt;br /&gt;

&lt;b&gt;
  A LAMB WITH TWO HORNS!&lt;br /&gt;&lt;br /&gt; (Many believe that a pope will be the false prophet of Revelation 13: 11, and that this pope will unite the world&#39;s many faiths and then compel/force the masses to worship the antichrist. The time frame for this will be in the middle of the final seven year period.)
  &lt;/b&gt;  &lt;br /&gt;&lt;br /&gt;
  
  
  
 &lt;b&gt;
  
  
  
  
  
  
  
  
  
  
  
  
 
  
&lt;span style=&quot;font-weight: bold; text-align: left;&quot;&gt;&#39;And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH&#39;. &lt;/span&gt;(Revelation 17:5)&lt;/b&gt;&lt;b&gt; What will be the final form of Babylon the Great? We can be sure that the Whore:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;(1) Will be personified as &#39;the False Prophet&#39; (Revelation 16:13).&amp;nbsp; Since Babylon the Great only rides the Beast, i.e., &#39;I saw a woman sit upon a scarlet coloured beast [the Antichrist]&#39; (17:3), she is not to be confused with the Beast himself.
 &lt;/b&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/one-world-religion-false-prophets-final.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt; 

&lt;/b&gt;




&lt;/div&gt;












&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;The Government Can Use GPS to Track Your Moves&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;


&lt;b&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi44dgYq1Xm62FQZa5Z83-UR7IhvmrxByIs_4K6jtVESuhNfHsthfUZfEL2xvORJVybNhKHpd1hhXcw95g04mVntFxSII4IcRqIXUOLkBHFq5MgFxYWc-eEDaEEH3ZJigAVhICeGxyopyqf/s400/surveillance-01-large-400-400.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi44dgYq1Xm62FQZa5Z83-UR7IhvmrxByIs_4K6jtVESuhNfHsthfUZfEL2xvORJVybNhKHpd1hhXcw95g04mVntFxSII4IcRqIXUOLkBHFq5MgFxYWc-eEDaEEH3ZJigAVhICeGxyopyqf/s400/surveillance-01-large-400-400.jpg&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

  
&lt;b&gt;Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn&#39;t violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway — and no reasonable expectation that the government isn&#39;t tracking your movements.That is the bizarre — and scary — rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants — with no need for a search warrant.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/the-government-can-use-gps-to-track.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;


&lt;/b&gt;







&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;RFID Tag System&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7t97eFaWh5QGyXyymhpljRUj53HvRCy48a1z3NKuWq-tbUu6H2TB3Du9m-NKTfuWR0WJadY12xrhM9DWZhkqM2pIowTXg1RnAjtW4Y0eefPzzRAXUJFxeFOFuBeRcR6OmRU39MHAjYqb2/s1600/wal-mart-radio-tag-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7t97eFaWh5QGyXyymhpljRUj53HvRCy48a1z3NKuWq-tbUu6H2TB3Du9m-NKTfuWR0WJadY12xrhM9DWZhkqM2pIowTXg1RnAjtW4Y0eefPzzRAXUJFxeFOFuBeRcR6OmRU39MHAjYqb2/s1600/wal-mart-radio-tag-1.jpg&quot; width=&quot;370&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;b&gt; (Wal-Mart RFID tags to Track Clothing. &amp;nbsp; A Wal-Mart employee uses a handheld scanner to read EPC labels on men&#39;s denim jeans.)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Radio-frequency identi­fication (RFID) tags are embedded in a growing number of personal items and identity documents. Because the tags were designed to be powerful tracking devices and they typically incorporate little security, people wearing or carrying them are vulnerable to surreptitious surveillance and profiling.&lt;/b&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/rfid-tag-system-wal-mart-rfid-tags-to.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;






&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;Iris Recognition&lt;/span&gt;&lt;/b&gt;&lt;/font&gt;&lt;br /&gt;
&lt;br /&gt;




&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4CroUI9jB7dNXNxuh8eeefrsLmHpN9LT1n4SqgJ_atPRjjpYYZDJWxtKvZ9VOQ7L7GHoFgGp_03g9ASHdr8cRA1_pOjaVuYFlAcKsYbMOPyJvJ4Y91CnTKGxQUiDJvgsV-PgwANjEZIP-/s1600/032-033_Iris_Scan.jpg&quot; imageanchor=&quot;1&quot;style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5477986077775663938&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4CroUI9jB7dNXNxuh8eeefrsLmHpN9LT1n4SqgJ_atPRjjpYYZDJWxtKvZ9VOQ7L7GHoFgGp_03g9ASHdr8cRA1_pOjaVuYFlAcKsYbMOPyJvJ4Y91CnTKGxQUiDJvgsV-PgwANjEZIP-/s0/032-033_Iris_Scan.jpg&quot; style=&quot;height: 250px; width: 400px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;



&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKwg9cjqGGT2MQ-XnFoKft5plg1isXW3fclOWsJBwO_ZivO7r5vVx1bKc4U4IOnRhkfH9DDVeAoTPSCx5fBdrqt-NJOM-E9bSP20EV_odSbooZkm02a7x5uJNklBht-keAQQzQiEM3ysT9/s1600/biometric_eye_scanning_T9800439.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339145107006330466&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKwg9cjqGGT2MQ-XnFoKft5plg1isXW3fclOWsJBwO_ZivO7r5vVx1bKc4U4IOnRhkfH9DDVeAoTPSCx5fBdrqt-NJOM-E9bSP20EV_odSbooZkm02a7x5uJNklBht-keAQQzQiEM3ysT9/s0/biometric_eye_scanning_T9800439.jpg&quot; style=&quot;width: 170px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;
The iris offers a rich source of data for biometric measurement. &lt;br /&gt;&lt;br /&gt;The patterns of the iris are unique and templates derived from the iris can yield identification performance which is better than DNA matching.&lt;br /&gt;&lt;br /&gt; The iris is the only internal organ visible from the outside and is protected from environmental factors (such as dirt and abrasion) which can afflict other biometrics. Iris recognition offers advantages in accuracy, high speed of exhaustive search, non contact with sensors and passive collection methods. &lt;br /&gt;&lt;br /&gt;In conclusion iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual&#39;s eyes, whose complex patterns are unique, stable, and can be seen from some distance.

&lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;Biometrics&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;


&lt;b&gt;











&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGNAR9p8OhqWOGOxPRnpeFD1iv5zy4JotAqi6mnTummwgsjmi-dUyRiyDftZQ-39ccNG0ee06RVln40_0KNlCAj1ncO-8ksEkbmt_nb-wg5dXYeeg0zac2A7db6YnkWXxhPLYKLRmKBvH5/s1600/face_recognition_fr2_pic22.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;FBI&#39;s Facial Recognitian Technology&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5339145107006330466&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGNAR9p8OhqWOGOxPRnpeFD1iv5zy4JotAqi6mnTummwgsjmi-dUyRiyDftZQ-39ccNG0ee06RVln40_0KNlCAj1ncO-8ksEkbmt_nb-wg5dXYeeg0zac2A7db6YnkWXxhPLYKLRmKBvH5/s1600/face_recognition_fr2_pic22.jpg&quot; style=&quot;width: 400px;&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;
The FBI&#39;s Facial Recognition&lt;br /&gt;
Technology.  &amp;nbsp; Soon we all may&lt;br /&gt;
be in their biometric system.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;/b&gt;
&lt;b&gt;Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. &lt;br /&gt;&lt;br /&gt;Though the field is still in its infancy, many people believe that biometrics will play a critical role in future computers, and especially in electronic commerce. Access levels will include the ability to use credit card information to make electronic purchases.&lt;br /&gt;&lt;br /&gt; In the future biometrics will be used to identify and then control and monitor individuals or people in groups that are under surveillance. (Such as: prisoners, terrorists, and people that are a known threat or suspicious of being involved in an illegal or dishonest activity and are at risk to the government or police, etc.)&lt;/b&gt;




&lt;br /&gt;

&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;







&lt;font color=&quot;#5f0000&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Echelon (Signals Intelligence)&lt;/b&gt;&lt;/span&gt;&lt;/font&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw_S_-Cz9l2yF5NXpKyhJ49V8gdcxF3a6nCZEtG2TOXcknRBMWEpbMwDX7o840tdDyCKp10c1q1VMCsFD6sUiAp6eh8ZgQpm24KWOJ2GqeRVJRDJuFdp_fmAAuFflups7fNyURNeepSQKS/s320/spy.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;The New World Order&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw_S_-Cz9l2yF5NXpKyhJ49V8gdcxF3a6nCZEtG2TOXcknRBMWEpbMwDX7o840tdDyCKp10c1q1VMCsFD6sUiAp6eh8ZgQpm24KWOJ2GqeRVJRDJuFdp_fmAAuFflups7fNyURNeepSQKS/s320/spy.jpg&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;b&gt;Trillions of bytes of textual archive and thousands of  online users, or gigabytes of live data stream per day that are filtered against tens of thousands of complex interest profiles.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world’s telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world. The United States National Security Agency (NSA) uses Echelon to intercept and process international communications passing via communications satellites also. It is one part of a global surveillance systems that intercept messages from the Internet, from undersea cables, from radio transmissions, from secret equipment installed inside embassies, or use orbiting satellites to monitor signals anywhere on the earth&#39;s surface. &lt;/b&gt;
 &lt;br /&gt;
&lt;br /&gt;&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/echelon-signals-intelligence-trillions.html&quot;&gt;Read more »&lt;/a&gt; &lt;/b&gt;



&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

















&lt;font color=&quot;#5f0000&quot;&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;The Knights Templar And The Illuminati&lt;/b&gt;&lt;/span&gt;&lt;/font&gt;
&lt;br /&gt;
&lt;br /&gt;





&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikR7VeT51OCkPFreh4wSo7lg5tiE2cbQB6YOazssyWDGzKszie3pSIS-SYP-Y6_orwU5iYzG9s3V3ZtXTDopil1_UvWQnZGuahrfW_BCbnidBemSIeODXHbZRX3lgXoIJowklKi6iDmx_B/s1600/6217673595_9378b02737_ba.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot; imageanchor=&quot;1&quot;&gt;&lt;img alt=&quot;The Knights Templar&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikR7VeT51OCkPFreh4wSo7lg5tiE2cbQB6YOazssyWDGzKszie3pSIS-SYP-Y6_orwU5iYzG9s3V3ZtXTDopil1_UvWQnZGuahrfW_BCbnidBemSIeODXHbZRX3lgXoIJowklKi6iDmx_B/s0/6217673595_9378b02737_ba.jpg&quot; width=&quot;462&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;The Knights Templar&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;No one exploring the myriad myths and tales of secret societies can leave out the unbelievably popular Knights Templar. There are links between this medieval order of warrior monks and Muslims, Masons, and even heretics, so we need to get a grasp of their darker side.&lt;br /&gt;
&lt;br /&gt;

Whether stars of the Disney film National Treasure or pawns of modern-day political and commercial propaganda, the Knights Templar have taken root as one of the world’s leading mystery groups. But what is the truth? Did they really have a great secret? Did they really hide treasure? Were they really guardians of the Holy Bloodline? Let’s take a look.
&lt;br /&gt;
&lt;br /&gt;

Supposedly a group of nine knights were taken from the ruling nobility in the region of France known as Champagne, collected themselves together in Jerusalem around 1118 A.D., and formed the now infamous Knights Templar.&lt;/b&gt;


&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/the-knights-templar-and-illuminati.html&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;


&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;Mass. State Police Check Out Boston Dynamics&#39; Spot The Robot Dog&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW7axl5mMK1fT4SznOspiLAv2XcViGiOA9RWVkhqJO8g7XvRAMECjDzz_fDDWjA7g7JYiV-UJiJpJM1hp84Oi2IfGEMx7CBMqutGuEPpmXEsijXfpUnECstoSV5kogkGAUA3IQD8uncxI/s0/bostondynamicsspot.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Spot The Robot Dog&quot; border=&quot;0&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW7axl5mMK1fT4SznOspiLAv2XcViGiOA9RWVkhqJO8g7XvRAMECjDzz_fDDWjA7g7JYiV-UJiJpJM1hp84Oi2IfGEMx7CBMqutGuEPpmXEsijXfpUnECstoSV5kogkGAUA3IQD8uncxI/s0/bostondynamicsspot.jpg&quot; width=&quot;470&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Spot The Robot Dog Formally SpotMini Redesigned&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;Spot can carry up to four hardware modules on its back, giving Spot whatever skill the robot needs for a specific job.&lt;br /&gt;&lt;br /&gt;

Cops have long had dogs, and robots, to help them do their jobs. And now, they have a robot dog.
&lt;br /&gt;&lt;br /&gt;
Massachusetts State Police is the first law enforcement agency in the country to use Boston Dynamics&#39; dog-like robot, called Spot. While the use of robotic technology is not new for state police, the temporary acquisition of Spot — a customizable robot some have called “terrifying” — is raising questions from civil rights advocates about how much oversight there should be over police robotics programs.
&lt;br /&gt;&lt;br /&gt;


The state’s bomb squad had Spot on loan from the Waltham-based Boston Dynamics for three months starting in August until November, according to records obtained by the American Civil Liberties Union of Massachusetts and reviewed by WBUR.
&lt;br /&gt;&lt;br /&gt;

&lt;/b&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVxfXSjAIMJqCzqQT5rGU8rXzcweiHp-7bNybDt3heWF1rZ_NP6SeIctOxY_HpL1NlyhX05T-SdjMcSRzpT_8CZ-BVjUQu7VIUhDhAtTB5xirUEDNtBfvtTxfpULPPT07OuLPr-Rw6f24q/s1600/spotmini-policia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Spot The Robot Dog&quot; border=&quot;0&quot; height=&quot;340&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVxfXSjAIMJqCzqQT5rGU8rXzcweiHp-7bNybDt3heWF1rZ_NP6SeIctOxY_HpL1NlyhX05T-SdjMcSRzpT_8CZ-BVjUQu7VIUhDhAtTB5xirUEDNtBfvtTxfpULPPT07OuLPr-Rw6f24q/s1600/spotmini-policia.jpg&quot; width=&quot;546&quot; /&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Robot Dogs At Work&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;The documents do not reveal a lot of details on the robot dog’s exact use, but a state police spokesman said Spot, like the department’s other robots, was used as a “mobile remote observation device” to provide troopers with images of suspicious devices or potentially hazardous locations, like where an armed suspect might be hiding.
&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;“Robot technology is a valuable tool for law enforcement because of its ability to provide situational awareness of potentially dangerous environments,” state police spokesman David Procopio wrote.
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;State police say Spot was used in two incidents, in addition to testing.
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Boston Dynamics vice president for business development Michael Perry said the company wants Spot to have lots of different uses, in industries ranging from oil and gas companies, to construction, to entertainment. He envisions police sending Spot into areas that are too hazardous for a human — a chemical spill, or near a suspected bomb, or into a hostage situation.
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2025/04/mass-state-police-test-out-boston.html&quot;&gt;Read more »&lt;/a&gt;
&lt;/b&gt;





&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;







  
 &lt;b&gt;
 &lt;span style=&quot;color: #5f0000;&quot;&gt;
 &lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;Surveillance Cameras With Computer Chips Or Smart Sensors That Predict And/Or Sense Criminal Activities, Alerts Police&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;
 &lt;/b&gt;
 &lt;div style=&quot;text-align: center;&quot;&gt;
 &lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKaGTUyrjZVAsiX_rXbS46Lkzvoqr9FE2WtrpKEjRhFsGo6l_NncoPpJO9ZMKlfMGqJODmBpF_O9TpnDWRaWVO1zS_EiUyVBHdVBtvllDmlOB9NmunfK0UGOUzphajqHlbi_3Ua0AEL-wG/s1600/ccbe4205a133fe66d41d39c12ea4cd5f_f1011.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKaGTUyrjZVAsiX_rXbS46Lkzvoqr9FE2WtrpKEjRhFsGo6l_NncoPpJO9ZMKlfMGqJODmBpF_O9TpnDWRaWVO1zS_EiUyVBHdVBtvllDmlOB9NmunfK0UGOUzphajqHlbi_3Ua0AEL-wG/s640/ccbe4205a133fe66d41d39c12ea4cd5f_f1011.jpg&quot; width=&quot;470&quot; /&gt;&lt;/a&gt; &lt;/b&gt;&lt;/div&gt;
 &lt;b&gt;
 &lt;div style=&quot;text-align: center;&quot;&gt;
 &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMc9eN0TzwvAbWGJH32FtU_nXDQ4utlZkjsdSY7phJKuTPFabDMCRxr2bTRWLpddDMeAk7ECWJiw3nFZOJJUPCRPsnFJ222lIlHUQh2JzWYqNgIoj75R7XKYBpq2mYPqFXe-D61IxlyKls/s0/Smart-City-1024x534-panorama.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMc9eN0TzwvAbWGJH32FtU_nXDQ4utlZkjsdSY7phJKuTPFabDMCRxr2bTRWLpddDMeAk7ECWJiw3nFZOJJUPCRPsnFJ222lIlHUQh2JzWYqNgIoj75R7XKYBpq2mYPqFXe-D61IxlyKls/s0/Smart-City-1024x534-panorama.jpg&quot; width=&quot;470&quot; /&gt;&lt;/a&gt; &lt;/div&gt;
 &lt;b&gt;With sophisticated cameras and smart sensor systems, law enforcement agencies and transportation departments across the United States are now able to proactively monitor and respond to crimes or accidents as they unfold; the sensors can also assist transportation departments in analyzing traffic patterns in real time; the system could allow officials to change one way streets, design real time traffic signals, and multiple speed limits to make traffic flow more smoothly.
 &lt;br /&gt; &lt;br /&gt;
 
 The East Orange New Jersey police department was the first U.S. agency to install a Smart Imaging Sensor system as part of its broader network of security cameras around the city.
 &lt;br /&gt;&lt;br /&gt;
 These smart sensors process images that the high-resolution cameras record in real time and can automatically detect and/or predict when a crime is occurring. When it senses something it will alert law enforcement officials instantly.
 &lt;br /&gt;&lt;br /&gt;Government agencies and business around the world have already taken notice of predictive sensors.
 
 &lt;br /&gt;&lt;br /&gt;Recently, an automated camera system called AIsight (pronounced eyesight), was installed in Boston after the 2013 marathon bombing, that monitors camera feeds in real time and alerts authorities if it spots unusual activity. &lt;br /&gt;&lt;br /&gt;AIsight cameras use a statistical method called machine learning to learn what is normal for an area and then alerts on abnormal activity.
 
 That could be picking up anything from unusual loitering to activity occurring in restricted areas.
 &lt;br /&gt;&lt;br /&gt;
 &lt;b&gt;
 &lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/05/artificially-intelligent-security.html&quot;&gt;Read more &amp;#187;&lt;/a&gt;&lt;/b&gt;
 
 &lt;/b&gt;
 
 
&lt;/b&gt;

  
  


</description><link>https://thecomingnewworldorder.blogspot.com/2008/02/nsa-creating-spy-system-to-monitor.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPwpY8MwoHW2gHynlaY4zo4Emp9QcJUO4LnMn27lLKozKspc10YHtQe7pqtiXNDKU5hQ8ajn8LkyxIVr0TKg6Cu9yF8Lc972QaWuBjfYPRlPzQeYaW3ID1xdj2XcF04GY7csX_r1maXVur/s72-c/nsa-spying.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-1200925484875968360</guid><pubDate>Mon, 14 Feb 2011 08:50:00 +0000</pubDate><atom:updated>2025-07-10T17:06:43.668-05:00</atom:updated><title></title><description>
&lt;div align=&quot;left&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Tower Of Babel&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;/b&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaNdcc6-o8VXIZcdHXA6kXMdn_s9WtOptK2fZHNi9Ordbwz_TO2ZLt-3h6lVMlwNgHx4X7lOGXNCCLkjeS-HqpW3xZx02Mt1vTPOYA66sUUlKxEXjZoUeyJoXxxBQRyylk8vVtSMsEG_nn/s1600/01c.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The Tower Of Babel&quot; border=&quot;0&quot; height=&quot;240&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaNdcc6-o8VXIZcdHXA6kXMdn_s9WtOptK2fZHNi9Ordbwz_TO2ZLt-3h6lVMlwNgHx4X7lOGXNCCLkjeS-HqpW3xZx02Mt1vTPOYA66sUUlKxEXjZoUeyJoXxxBQRyylk8vVtSMsEG_nn/s0/01c.jpg&quot; width=&quot;292&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;

  


&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;(Gen. 11:1-9)  Symbolizes the common effort of mankind to build a common political society. &lt;/b&gt; &lt;b&gt;The Louise Weiss EU Parliamentary Building in Strassbourg that opened in December 2000 &lt;/b&gt;



&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1hAZN9jsORKTpYm2oCqNgin8pX2N_uELLqzsks_FG9U840eYATZLtaZlqudoM_jPy55S09c7XOGVmviowPv_f_Qe5X1limADfl8uPGGbePqQ4Ld8qW1YpZ0GnQgFWoRnChu86AODEjHnU/s1600/euposter.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Tower Of Babel&quot; border=&quot;0&quot; height=&quot;347&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1hAZN9jsORKTpYm2oCqNgin8pX2N_uELLqzsks_FG9U840eYATZLtaZlqudoM_jPy55S09c7XOGVmviowPv_f_Qe5X1limADfl8uPGGbePqQ4Ld8qW1YpZ0GnQgFWoRnChu86AODEjHnU/s0/euposter.jpg&quot; width=&quot;263&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;is said to have Pieter Brueghel&#39;s (Tower Of Babel) painting for its model. &lt;/b&gt;&lt;b&gt;Also, on this pro&lt;/b&gt;&lt;b&gt;motional poster &lt;/b&gt;&lt;b&gt;used by the EU there&#39;s a &lt;/b&gt;&lt;b&gt;     reproduction of The Tower of Babel with construction cranes above     it and the caption &#39;Many tongues, one voice.&#39;  &lt;/b&gt; &lt;b&gt;The myriad number of groups, governments, societies and interest groups who are working toward a New World Order are gradually placing all the necessary things in order to facilitate the revived dream of Babel. This would unite all nations and peoples in the worship of Lucifer. What&#39;s the logic behind the &lt;/b&gt;&lt;b&gt;symbolism in this &lt;/b&gt;&lt;b&gt;building?  The EU says it is seeking to &quot;build up the house of Europe&quot; - a task yet to be completed. The building is complete and in use, but is designed to look unfinished, and even has ringed platforms to represent scaffolding. And here&#39;s the scary part. A reporter questioning &quot;Why the Tower of Babel&quot; as a design concept, was answered in an astounding way by an EU official. He said, &quot;What they failed to complete 3000 years ago – we in Europe will finish now!&quot;  &lt;br /&gt;&lt;br /&gt; 
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/is-e.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;  &lt;/b&gt;











&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;b&gt;




&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;MIT Shows Off A Smart Tattoo That Can Turn Your Skin Into A Touchpad&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;



&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;&lt;b&gt;&lt;b&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIGmrTKwtF5XIgKd2-rh9xdNX2ycLPFWvYuQCj91BUDUiEdOM32d7xFD5TYkjpD9yMzsci8ri6nsxJSrGNin_ITgip-O_Dgjr50xrxE6KWZXpVH62us0DoAMkCVa60-NE-fLSVZLrHxRE/s1600/image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIGmrTKwtF5XIgKd2-rh9xdNX2ycLPFWvYuQCj91BUDUiEdOM32d7xFD5TYkjpD9yMzsci8ri6nsxJSrGNin_ITgip-O_Dgjr50xrxE6KWZXpVH62us0DoAMkCVa60-NE-fLSVZLrHxRE/s0/image.png&quot; width=&quot;350&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
With DuoSkin, wearables are no longer just an accessory. They become part of your skin. 
&lt;br /&gt;
&lt;br /&gt;
The MIT Media Lab and Microsoft Research set out to create on-skin user interfaces using gold leaf, which is commonly found in craft stores, as a conductor. Piggybacking on the trend in body-art and metallic jewelry-like tattoos, the team decided to repurpose gold leaf because it is “robust to movements and skin deformations during motion…[and] both workable and aesthetic in appearance.” The smart tattoos, outlined in a paper that has been presented at the International Symposium on Wearable Computers, look like fashion statements but they include other materials and electrical components that make the tattoos interactive. 
&lt;br /&gt;
&lt;br /&gt;
The tattoos can turn into an interface that can be used, for example, as a trackpad or a button to remotely control your phone. Alternatively, they can track and show you information about yourself. For example, by including thermochromic displays that change color in reaction to heat, the tattoos can show you your body temperature. &lt;br /&gt;
&lt;br /&gt;A third possible function is wireless communication. The tattoo could include an NFC (near field communications) tag, an electrical component that includes small microchips to store data that can be read by phones or other NFC devices nearby. In the near future, the technology could serve as a substitute for identification, subway cards, and even movie tickets, DuoSkin’s lead researcher Cindy Hsin-Liu Kao said in an interview.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/mit-shows-off-smart-tattoo-that-can.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
&lt;/b&gt;




&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;What Are Chemtrails And How Are They Harming Our Food And Water?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;

&lt;/b&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
  
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMOqWn9YZ0j6-Q8C219Nwur7bMe75q-2GuaBhvH6BUTn7UNX9hafLu5pclKCXCE3YrLKVq_eivKogY4vhKb0h0AUcSU6NXhYRAsWig-fhXiz_JtiQXZRwHwNeqyQy03YcOrghyphenhyphenxdWxkC4/s640/GettyImages-548029033-58d6c48c3df78c5162f87517.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;
  
  &lt;img alt=&quot;A Massive Hurricane&quot; border=&quot;0&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMOqWn9YZ0j6-Q8C219Nwur7bMe75q-2GuaBhvH6BUTn7UNX9hafLu5pclKCXCE3YrLKVq_eivKogY4vhKb0h0AUcSU6NXhYRAsWig-fhXiz_JtiQXZRwHwNeqyQy03YcOrghyphenhyphenxdWxkC4/s640/GettyImages-548029033-58d6c48c3df78c5162f87517.jpg&quot; width=&quot;480&quot; /&gt;
  
  &lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;
Chemtrails&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
  
  
  
  
&lt;b&gt;Just when you thought Monsanto was under wraps, you find out they’re up to something even more horrific. What’s even worse is that it all started a long time ago!&lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;BR&gt;
&lt;b&gt;In the late 1960s Monsanto supported the secret Muad’ Dib Geoengineering Lab to develop “chemtrail” technology; their crown jewel program to protect earth from global warming via weather control. Sounds so humanitarian, right? Wrong!&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Most folks discover the reality of “chemtrails” by initially reading about it online and then going outside, looking up into the sky, and noticing the crisscrossing streaks of white clouds trailing behind jet aircraft, stretching from horizon to horizon, eventually turning the sky into a murky haze. Chemtrails are like science fiction turned reality.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;This article will answer the question “what are chemtrails?” We&#39;ll share the effects of chemtrails on your environment, food, water and their connection to cancer. This information is meant to increase your awareness of the toxicity in our environment and encourage you to eliminate toxins that are within your control whenever and wherever you can.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;What Are Chemtrails?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Chemtrails are geo-engineered aerosols that are loaded with toxic chemicals, including but not limited to: barium, strontium 90, aluminum, cadmium, zinc, viruses and “chaff.” Chaff looks like snow but it’s actually Mylar fibers (like in fiberglass) coated with aluminum, desiccated blood cells, plastic, and paper. Polymer chemist Dr. R. Michael Castle has studied atmospheric polymers for years, and he has identified microscopic polymers comprised of genetically-engineered fungal forms mutated with viruses, which are now part of the air we breathe.

&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/what-are-chemtrails-and-how-are-they.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;









&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  

   
  
  
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;China Is Building A &quot;Social Credit&quot; System. &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg32jsFFx66DpPsoesSua-sVAgUNoTcUcT5JkiWOZGNEMv-EVfSpBa60t05x8AozhXB93hlLx3oOQmKhAuZ3_Mn_H_uuEO_fmNcqhWNvBEcpr8-mUkT7ufeM6wU6MyWPEVb9TijdNOmzQg/s640/0_IaBIyrblT3T-LGjf.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;
&lt;img alt=&quot;The New World Order&quot; height=&quot;423&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg32jsFFx66DpPsoesSua-sVAgUNoTcUcT5JkiWOZGNEMv-EVfSpBa60t05x8AozhXB93hlLx3oOQmKhAuZ3_Mn_H_uuEO_fmNcqhWNvBEcpr8-mUkT7ufeM6wU6MyWPEVb9TijdNOmzQg/s640/0_IaBIyrblT3T-LGjf.jpg&quot; width=&quot;480&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;




Everyone listen, stated the lady, &quot;Dear passengers, people who travel without a ticket, or behave disorderly, or smoke in public areas, will be punished according to regulations and the behavior will be recorded in individual credit information system. To avoid a negative record of personal credit please follow the relevant regulations and help with the orders on the train and at the station.&quot;&lt;br /&gt;&lt;br /&gt;
This is particularly chilling to anyone familiar with George Orwell&#39;s dystopian classic, 1984. &lt;br /&gt;&lt;br /&gt;
Is China&#39;s social credit system really the dystopian sci-fi scenario that many fear?
 &lt;br /&gt;&lt;br /&gt;
China’s draconian censorship efforts appear a world apart from the freedom of speech protections tenuously preserved in American society. But as the two world powers evolve the similarities are becoming just as striking as the differences. While their social designs diverge, their intended results do not: both seek to shrink the Overton Window in favor of what the governing class considers a healthier, more orderly, more moral discourse.&lt;br /&gt;&lt;br /&gt;

In China, censorship isn’t just limited to critiques of the government. It also includes what the ruling party considers moral rot. Underage drinking, drug use, violence, and hyper-sexualized content get scrubbed from media and film. This top-down social engineering finds its shape in the country’s new social-credit system, which punishes undesirable behavior like canceling dinner reservations or jaywalking by restricting travel rights or access to (financial) credit.


&lt;/b&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/china-is-building-social-credit-system.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;






&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;






&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;font color=&quot;#5f0000&quot;&gt;Predictive Programming&lt;/font&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
  
&lt;a   
 href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDZFLjT1n_Y-IEDXC_G3K_dbA-QXr47sgWlZYgRmnd4GHe2BaO_34kIyxmpvmk9RaZNufUyksNYuAu3Z6Sio0hZzFXLA2nroAtRcUUdUlV17HGk4wHYyhDNatKMzOX82hiev6s0tclS82H/s1600/vq50ceb5a7s.jpg&quot;  imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot; &gt;
  
  
  &lt;img alt=&quot;The New World Order&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDZFLjT1n_Y-IEDXC_G3K_dbA-QXr47sgWlZYgRmnd4GHe2BaO_34kIyxmpvmk9RaZNufUyksNYuAu3Z6Sio0hZzFXLA2nroAtRcUUdUlV17HGk4wHYyhDNatKMzOX82hiev6s0tclS82H/s1600/vq50ceb5a7s.jpg&quot; height=&quot;329&quot; width=&quot;464&quot; &gt;
  
 &lt;br&gt;&lt;center&gt;
&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;Neo&amp;#8217;s passport in &#39;The Matrix&#39;&lt;BR&gt; 
  expired on September 11, 2001&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/center&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
  
  
&lt;b&gt;What is predictive programming? &amp;nbsp; Is it an invasive form of Subliminal Behavior Modification? &amp;nbsp; Alan Watt author of &amp;nbsp; &#39;Cutting Through The Matrix&#39; &amp;nbsp; says that, &quot;Hollywood is the magician&#39;s wand which has been used to cast a spell on the unsuspecting public. Things or ideas which would otherwise be seen as bizarre, vulgar, undesirable or impossible are inserted into films in the realm of fantasy. When the viewer watches these films, his/her mind is left open to suggestion and the conditioning process begins. These same movies which are designed to program the average person, can give the discerning viewer a better understanding of the workings and the plan of the world agenda.&quot; &lt;BR&gt;&lt;BR&gt;

It used to be just TV and cinema, but now &#39;the screen&#39; implies a number of different media flavours and delivery formats: television, film, HD, DVD, Blue Ray, computer/console games, and also the internet and mobile media.
&lt;BR&gt;&lt;BR&gt;
The control system works by keeping everyone focused on the lowest levels of the pyramid, the base levels of illusion/reality. Within this contrived paradigm, people are conditioned to believe in the synthetic culture received through their screen. Cars and football, home makeovers and cooking, gossip and reality television, etc. It all amounts to the same thing: diversion. The magician&amp;#8217;s misdirection distracts attention while the Illuminists controls your thoughts.&lt;/b&gt;
&lt;BR&gt;&lt;BR&gt;

&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/neo-passport-in-matrix-expired-on.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Read more &amp;#187;&lt;/a&gt;
&lt;/b&gt;&lt;/b&gt;









&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;Rfid Technology&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidgGEyOT_lnamQS6zQNvJgaAPnFsJg3tAdY9SOmETvDH7h5gGCfiBMs7DIqDFZsmqwUfBj2hjaYVRYThx_M964Q1xw9V3yVQRw9oxbTXvLtqw2mEG7v0i9p5NWmfCzmy2eVufEBjfKqAIL/s1600-h/rfid-tag-006lr.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5066269681743276546&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidgGEyOT_lnamQS6zQNvJgaAPnFsJg3tAdY9SOmETvDH7h5gGCfiBMs7DIqDFZsmqwUfBj2hjaYVRYThx_M964Q1xw9V3yVQRw9oxbTXvLtqw2mEG7v0i9p5NWmfCzmy2eVufEBjfKqAIL/s400/rfid-tag-006lr.JPG&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;

&lt;center&gt;
&lt;b&gt;
RFID Label         MPI Label Company | Alien chip | 96-bit&lt;/b&gt;&lt;/center&gt;
&lt;b&gt;
&lt;br /&gt;
&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSyuAdRslyXiZANEEzeyNuhW_REfpxEUzTCUEDl45XVnTOnZUW1qbXVI6IwfI5k-AibAbn3DhP2WnePODSftuE9TfDR0pHf8yeo0ARfJUiTmSTTtTKLuWlpIa4xvEkTZcxhxMk9-tPiL5w/s1600-h/rfid-tag-003lr.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5066269299491187186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSyuAdRslyXiZANEEzeyNuhW_REfpxEUzTCUEDl45XVnTOnZUW1qbXVI6IwfI5k-AibAbn3DhP2WnePODSftuE9TfDR0pHf8yeo0ARfJUiTmSTTtTKLuWlpIa4xvEkTZcxhxMk9-tPiL5w/s400/rfid-tag-003lr.JPG&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;b&gt;
     RFID tag         UPM RAFLATAC | ShortDipole (ETSI) 96-bit         Gen2 UHF&lt;/b&gt;&lt;/center&gt;
&lt;b&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBQHAho0LQWd-5CcaZQ3bPmtUy4rRZRiMx6QZadlB1uC8SxvBTBDM-08LQuYL4kTI-6_ngg5xLV_pPegdv_Sc6t71Dhiyo-x2Q08GQ34SZ_Yz_v6FMwyhzWz3m7GGBDHLeJYg7a0s7GeFC/s1600-h/rfid-tag-002lr.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5066268741145438690&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBQHAho0LQWd-5CcaZQ3bPmtUy4rRZRiMx6QZadlB1uC8SxvBTBDM-08LQuYL4kTI-6_ngg5xLV_pPegdv_Sc6t71Dhiyo-x2Q08GQ34SZ_Yz_v6FMwyhzWz3m7GGBDHLeJYg7a0s7GeFC/s400/rfid-tag-002lr.JPG&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;BR&gt;
&lt;center&gt;
RFID tag UPM RAFLATAC | Frog         DualDipole 96-bit Gen2 UHF&lt;/center&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFmL4aB59Tt7_kUn2l76FLE9KUxcBOFSaPfpONL2rtVAHWmZkqAbBV0Wiv_N_7bTwDt01nVjyjASIpMPlDc3MuksK-1eTu5qPHLwzCUU6KhPXa5Io-WiwFW6KEvMtRdksir5SVM7s2trLU/s1600-h/rfid-tag-001lr.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5066265275106830802&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFmL4aB59Tt7_kUn2l76FLE9KUxcBOFSaPfpONL2rtVAHWmZkqAbBV0Wiv_N_7bTwDt01nVjyjASIpMPlDc3MuksK-1eTu5qPHLwzCUU6KhPXa5Io-WiwFW6KEvMtRdksir5SVM7s2trLU/s400/rfid-tag-001lr.JPG&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;BR&gt;
&lt;center&gt;
   RFID tag        UPM RAFLATAC | MiniDipole 96-bit Gen2 UHF&lt;/center&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzuZBKqJkvpkDuXWrIWZYc2gUTxOoz1LdHZ5D1vORBlCypkOUUuzv4qlGyLQg4ahi-TbYC2zchAh0HCYOhQJKXHbvrL9BMSfV1HXGNS55PElSnVL5DCCyVqA9gYDew8kqHe7SoVDnvCrZM/s1600-h/rfid-tag-005lr.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5066263011659065730&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzuZBKqJkvpkDuXWrIWZYc2gUTxOoz1LdHZ5D1vORBlCypkOUUuzv4qlGyLQg4ahi-TbYC2zchAh0HCYOhQJKXHbvrL9BMSfV1HXGNS55PElSnVL5DCCyVqA9gYDew8kqHe7SoVDnvCrZM/s400/rfid-tag-005lr.JPG&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;center&gt;
    Implantable RFID chips     RFID, Inc        | used for animal tracking&lt;/center&gt;
&lt;br /&gt;

Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be attached to or incorporated into a product, animal, or person for the purpose of identification using radio waves. All RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio frequency (RF) signal and perhaps other specialized functions. The second is an antenna for receiving and transmitting the signal. The RFID tag can automatically be read from several meters away and does not have to be in the line of sight of the reader. The current thrust in RFID use in supply chain management for large enterprises. RFID increases the speed and accuracy with which inventory can be tracked and managed thereby saving money for the business.&lt;/b&gt;








&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Biometrics To Be Used On IDs.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiArCn4LyU78hXJGISkB4hTMDXn0KlKzLcXV70WADLOodwf2GYgsVcVUVLxk_CY4vDwrxNTMAtnsfeqjL0ZCdwLgeO_hWoGwrW_NaAxWImxg0rLTkMABRsRDEzKomCTIOL2BvFL5sS3Cyfw/s1600-h/biometrics2.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;150&quot; id=&quot;BLOGGER_PHOTO_ID_5065467824234014786&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiArCn4LyU78hXJGISkB4hTMDXn0KlKzLcXV70WADLOodwf2GYgsVcVUVLxk_CY4vDwrxNTMAtnsfeqjL0ZCdwLgeO_hWoGwrW_NaAxWImxg0rLTkMABRsRDEzKomCTIOL2BvFL5sS3Cyfw/s960/biometrics2.jpg&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;&quot; width=&quot;650&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;
Minnesota to Use Facial Recognition Technology on IDs -- State will add biometrics component to prevent fake driver&#39;s licenses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BY BILL SALISBURY&lt;br /&gt;
&lt;br /&gt;
Pioneer Press via Knight Ridder&lt;br /&gt;
Minnesota soon will start using biometric face scans to prevent would-be crooks — and underage wannabe smokers and drinkers — from getting fake driver&#39;s licenses from the state.&lt;br /&gt;
&lt;br /&gt;
Gov. Tim Pawlenty on Thursday announced plans to add biometric facial recognition technology to driver&#39;s licenses as part of a broader effort to protect consumers from identity theft and unauthorized use of personal data. That effort will include stiffer criminal penalties for hackers and others who abuse access to personal data on computers.&lt;br /&gt;
&lt;br /&gt;
&quot;Identity theft causes great trauma, inconvenience and damage to a lot of people and families,&quot; Pawlenty said at a Capitol news conference. He said the state must do more to crack down on identity thieves and strengthen safeguards for personal information.&lt;br /&gt;
&lt;br /&gt;
Driver&#39;s licenses are one of the state&#39;s most important forms of identification, he said, and biometric technology will help law enforcement officers ensure that individuals are who they say they are.&lt;br /&gt;
&lt;br /&gt;
The new technology would match an individual&#39;s driver&#39;s license photo with images in the state&#39;s database.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s how Pawlenty&#39;s office described it: &quot;Facial recognition technology converts an image into a mathematical computer algorithm as a basis for a positive match. It uses the structure of a person&#39;s face — such as width between the eyes, forehead depth and nose length — to assign mathematical points of reference creating a unique data file.&quot;&lt;br /&gt;
&lt;br /&gt;
The face scans will enable the state to detect people attempting to obtain licenses using the same photo with multiple names and birth dates, or the same name and birth date with multiple people&#39;s photos, said state Public Safety Commissioner Michael Campion. &quot;The technology … will create a higher level of integrity for Minnesota&#39;s driver&#39;s licenses.&quot;&lt;br /&gt;
&lt;br /&gt;
Pawlenty said 13 other states use the technology, and it has proved &quot;highly accurate.&quot;&lt;br /&gt;
&lt;br /&gt;
No new photos will be needed to develop the state&#39;s face-scan file. State workers will scan photos on current driver&#39;s licenses to create the new file.&lt;br /&gt;
&lt;br /&gt;
The new technology will cost about $1 to $2 per driver&#39;s license. Pawlenty said an $800,000 federal grant will offset these costs and that he will ask the 2006 Legislature to pay the rest.&lt;br /&gt;
&lt;br /&gt;
Although he believes he has the power to implement the new system on his own, he said he would ask the Legislature to approve it.&lt;br /&gt;
&lt;br /&gt;
For Minnesota retailers, the new technology means customers will be far less likely to try to use fake identification cards to make purchases, especially of alcoholic beverages and tobacco products, said Steve Rush, board chairman of the Minnesota Retailers Association. Businesses will not have equipment to read the face scans, however; only the state will have that ability.
&lt;/b&gt;

&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Parallels - The Roman Empire And America&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjay8bh7n0rJN99jz-vQB6t5DUrW8WEnXWIoxW4LatmOdP2vWfGdXJZWNJjgC50jopQXMUq3m3OqyK3lQ5NOK0aVP6zsZQhgsjqVOvn6QII-nRnD_LqDYCltRDbSp1zOguV1bQm_RdvBhS3Bey1xd4VZSZ9vTKaKEOPaP_xaglEMnRTzMGZ9ufTOEGU/s1060/1*Qxt831Dxzd-HJq8SGFcmRg.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;340&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjay8bh7n0rJN99jz-vQB6t5DUrW8WEnXWIoxW4LatmOdP2vWfGdXJZWNJjgC50jopQXMUq3m3OqyK3lQ5NOK0aVP6zsZQhgsjqVOvn6QII-nRnD_LqDYCltRDbSp1zOguV1bQm_RdvBhS3Bey1xd4VZSZ9vTKaKEOPaP_xaglEMnRTzMGZ9ufTOEGU/s480/1*Qxt831Dxzd-HJq8SGFcmRg.jpeg&quot; width=&quot;480&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;Today, the United States has many parallels as an empire to that of the collapse of the ancient Roman Empire. There were many causes of the fall of Rome however, but the main problems which led to it are exactly the same as those we face currently, here in America as a nation.&lt;br /&gt;&lt;br /&gt;The fall of the Roman Empire took a few centuries for the total dissolution of that government to take place. However, in America the same problems that brought down the Roman Empire are expedited to the point that we are looking at decades, rather than centuries before the collapse of the US government.&lt;br /&gt;&lt;br /&gt;The following are examples of what brought Rome down as an empire, and what is going to destroy the American government in a very short time.&lt;br /&gt;&lt;br /&gt;Antagonism between the Senate and the Emperor:&lt;br /&gt;&lt;br /&gt;We experience this in the US today in the form of the constant bickering between the House and Senate in their disdain of the President over power, money, and control.&lt;br /&gt;&lt;br /&gt;Decline in Morals:&amp;nbsp; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/parallels-of-fall-of-roman-empire-and.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;
&lt;/b&gt;







&lt;/div&gt;

&lt;div&gt;
&lt;/div&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;New Rfid Technology&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIEq-TyFZM4D764PEsVF2GNRighx5Z3qrAbHD9CoYxIlu0nAgIW6wi8gRqYoNvdxd1e1lu6OezBNBCgJIaVJMUZH81T0CI3kArE4njheHp7RQWDOANumECd-PkwvsK3BX0pjAwj1wHt6Pp/s1600-h/tag-fron.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5416764039516774194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIEq-TyFZM4D764PEsVF2GNRighx5Z3qrAbHD9CoYxIlu0nAgIW6wi8gRqYoNvdxd1e1lu6OezBNBCgJIaVJMUZH81T0CI3kArE4njheHp7RQWDOANumECd-PkwvsK3BX0pjAwj1wHt6Pp/s320/tag-fron.jpg&quot; style=&quot;cursor: pointer; display: block; height: 209px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;RFID tags are miniscule microchips, which already have shrunk to half the size of a grain of sand. They listen for a radio query and respond by transmitting their unique ID code. Most RFID tags have no batteries: They use the power from the initial radio signal to transmit their response. You should become familiar with RFID technology because you&#39;ll be hearing much more about it soon. Retailers adore the concept. Wal-Mart and the U.K.-based grocery chain Tesco are starting to install &quot;smart shelves&quot; with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, Calif. It becomes unnervingly easy to imagine a scenario where everything you buy that&#39;s more expensive than a Snickers will sport RFID tags, which typically include a 64-bit unique identifier yielding about 18 thousand trillion possible values. KSW-Microtec, a German company, has invented washable RFID tags designed to be sewn into clothing. And according to EE Times, the European central bank is considering embedding RFID tags into banknotes by 2005.&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCtYNJMOGsiuAsQA-V_DE4WRrbZt-f2un6O_7rwa5C-IjcNb3gN7elWLz96HoSV8zX6PQvUhQGtSYZTygKtJNGpvTz2AIpbCTdL4lk5hjWc1FxS0qSG8CDs-e8NrqPKBXJdeUclVu2Rh2g/s1600/Radio-Frequency-Identificat1.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5067122206981729122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCtYNJMOGsiuAsQA-V_DE4WRrbZt-f2un6O_7rwa5C-IjcNb3gN7elWLz96HoSV8zX6PQvUhQGtSYZTygKtJNGpvTz2AIpbCTdL4lk5hjWc1FxS0qSG8CDs-e8NrqPKBXJdeUclVu2Rh2g/s1600/Radio-Frequency-Identificat1.jpg&quot; style=&quot;text-align: center;&quot; width=&quot;377&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaB0uuE-X-zFwvyoQe5Yih8x7Q3e8zJKw3VI4JMYQulnn-pck9iw5rjThrivODpwSGSylcUB79TsHb4NK3MenWv-Xy0ooWgTYd725ZmwtEWpgyg7pcrKd4_YD0Zoet1QBIltAOGfKgI3bS/s1600/tvn-05042017232827.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5067122206981729122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaB0uuE-X-zFwvyoQe5Yih8x7Q3e8zJKw3VI4JMYQulnn-pck9iw5rjThrivODpwSGSylcUB79TsHb4NK3MenWv-Xy0ooWgTYd725ZmwtEWpgyg7pcrKd4_YD0Zoet1QBIltAOGfKgI3bS/s1600/tvn-05042017232827.jpg&quot; style=&quot;text-align: center;&quot; width=&quot;377&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;The VeriChip, made by Applied Digital Solutions, Inc., is an implantable RFID microchip for humans. It is about the size of a grain of rice. The chip has been approved by the Food and Drug Administration and can be used to hold patient-approved health-care information.&lt;br /&gt;

&lt;/b&gt;


&lt;b&gt;

&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;





&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;Los Angeles To Install Body Scanners In The Subway
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnEuQobF1aLngq6TFJ3I4Rkx1CVPQFCJfL5eGPZ0xqBB9DM1no_C455ziCrndXOu82uGsSVAXwGFQzDJyY55Z1w9KtMqc4MIlXelwIGVbaFC-AcgKRbE33pfajnFMOjpQqz35ow3WuRdpS/s420/BBLVDtL.img.jpeg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Video Surveillance&quot; border=&quot;0&quot; height=&quot;393&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnEuQobF1aLngq6TFJ3I4Rkx1CVPQFCJfL5eGPZ0xqBB9DM1no_C455ziCrndXOu82uGsSVAXwGFQzDJyY55Z1w9KtMqc4MIlXelwIGVbaFC-AcgKRbE33pfajnFMOjpQqz35ow3WuRdpS/s420/BBLVDtL.img.jpeg&quot; width=&quot;460&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;The Los Angeles&#39; subway will become the first mass transit system in the U.S. to install body scanners that screen passengers for weapons and explosives, officials said recently.
&lt;br /&gt;&lt;br /&gt;
The deployment of the portable scanners, which project waves to do full-body screenings of passengers walking through a station without slowing them down, will happen in the coming months, said Alex Wiggins, who runs the Los Angeles County Metropolitan Transportation Authority&#39;s law enforcement division.
&lt;br /&gt;&lt;br /&gt;
The machines scan for metallic and non-metallic objects on a person&#39;s body, can detect suspicious items from 30 feet (9 meters) away and have the capability of scanning more than 2,000 passengers per hour.
&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIO4RMz0InIz2g3LPyNXbSA0dL_gnP-FN5grt3iOj1hB3ap0pxlfvLUyHgqr3B1wfJ1-1mo8Q-i2Sk6Omfpv31APPXza6TkTNL19DDXs92KwbWZq9CQpBiUM-OfkhT8Uu6hFHnmamlaNqW/s420/ACDCD637-6AA6-460D-945F-E8677F941A02_cx0_cy14_cw0_w1023_r1_s.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Video Surveillance&quot; border=&quot;0&quot; height=&quot;348&quot; id=&quot;BLOGGER_PHOTO_ID_5339158749922230114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIO4RMz0InIz2g3LPyNXbSA0dL_gnP-FN5grt3iOj1hB3ap0pxlfvLUyHgqr3B1wfJ1-1mo8Q-i2Sk6Omfpv31APPXza6TkTNL19DDXs92KwbWZq9CQpBiUM-OfkhT8Uu6hFHnmamlaNqW/s420/ACDCD637-6AA6-460D-945F-E8677F941A02_cx0_cy14_cw0_w1023_r1_s.jpg&quot; width=&quot;440&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
 
&quot;We&#39;re dealing with persistent threats to our transportation systems in our country,&quot; said Transportation Security Administration Administrator David Pekoske. &quot;Our job is to ensure security in the transportation systems so that a terrorist incident does not happen on our watch.&quot;
&lt;br /&gt;&lt;br /&gt;Recently, Pekoske and other officials demonstrated the new machines, which are being purchased from Thruvision, which is headquartered in the United Kingdom.
&lt;br /&gt;&lt;br /&gt;
&quot;We&#39;re looking specifically for weapons that have the ability to cause a mass-casualty event,&quot; Wiggins said. &quot;We&#39;re looking for explosive vests, we&#39;re looking for assault rifles. We&#39;re not necessarily looking for smaller weapons that don&#39;t have the ability to inflict mass casualties.&quot;


&lt;br /&gt;&lt;br /&gt;


  
In addition to the Thruvision scanners, the agency is also planning to purchase other body scanners — which resemble white television cameras on tripods — that have the ability to move around and hone in on specific people and angles, Wiggins said.
&lt;/b&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/06/los-angeles-will-be-first-us-city-to.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;



</description><link>https://thecomingnewworldorder.blogspot.com/2021/02/the-tower-of-babel-gen.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaNdcc6-o8VXIZcdHXA6kXMdn_s9WtOptK2fZHNi9Ordbwz_TO2ZLt-3h6lVMlwNgHx4X7lOGXNCCLkjeS-HqpW3xZx02Mt1vTPOYA66sUUlKxEXjZoUeyJoXxxBQRyylk8vVtSMsEG_nn/s72-c/01c.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-4260652798464538381</guid><pubDate>Sun, 13 Feb 2011 08:49:00 +0000</pubDate><atom:updated>2026-03-07T19:37:37.702-06:00</atom:updated><title></title><description>

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;Electronic surveillance: it&#39;s everywhere and it&#39;s growing&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;



&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBKJsxDmpSwm71giMAwHMQeDAQyrcgVxx0gK7TXpXeG3beImlwBgT24QSA28hLFmD3hPJt4zOdR64_MiGLpc6xGSXdQGwyciGKDq7OYwVkGLK7cnpXt9GqPZ3_8QaT9-HgPjCLkMxVM1Ax/s1600-h/200px-Eye-in-the-sky085.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5065010539066009570&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBKJsxDmpSwm71giMAwHMQeDAQyrcgVxx0gK7TXpXeG3beImlwBgT24QSA28hLFmD3hPJt4zOdR64_MiGLpc6xGSXdQGwyciGKDq7OYwVkGLK7cnpXt9GqPZ3_8QaT9-HgPjCLkMxVM1Ax/s320/200px-Eye-in-the-sky085.jpg&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center; &quot;&gt;&lt;/a&gt;&lt;center&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&quot;Eye-in-the-sky&quot; surveillance dome camera&lt;br /&gt;
  mounted on top of a tall steel pole.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/center&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
    
    
    
Has the demand for and use of electronic surveillance increased? The rapid changes in telecommunications technology has been accompanied by a growth in the potential intrusiveness of electronic surveillance and a steady increase in government surveillance activity. Surveillance is the monitoring of behavior of people, objects or processes within systems for conformity to expected or desired norms. Although the word surveillance literally means &quot;watching over&quot; the term is often used for all forms of observation or monitoring, not just visual observation. Such as the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without a persons knowledge) or overt (perhaps with frequent reminders such as &quot;we are watching over you&quot;). Because they&#39;re continually making new discoveries to increase the effectiveness of biometrics, rfid chips, etc., the government may soon be tracking us all.&lt;/b&gt;





&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;



&lt;b&gt;
  &lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;The Future Of Biometrics&lt;/font&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWxNXo0L5gGQ4XJz3gX7gGR3jodIMyHjqPfB-2c6Uegwbv2I5iiFHotAcSrFpr2j0IOPvZ32we4OWTbpuO_ohSft8ZG2AAnwl-bUgPrbDEp0l-7MJi-UWsynCY4N2_Mx6tinydbVwoVYr1/s1600-h/iris_scanner-sm.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5065030691052562434&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWxNXo0L5gGQ4XJz3gX7gGR3jodIMyHjqPfB-2c6Uegwbv2I5iiFHotAcSrFpr2j0IOPvZ32we4OWTbpuO_ohSft8ZG2AAnwl-bUgPrbDEp0l-7MJi-UWsynCY4N2_Mx6tinydbVwoVYr1/s320/iris_scanner-sm.jpg&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center; &quot;&gt;&lt;/a&gt;&lt;b&gt;&lt;center&gt;
&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;Iris scanner&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/center&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;The next ten years will bring major advancements in the field of biometrics -- things like reading faces, fingerprints and irises to safeguard our own security and personal information.
&lt;/b&gt;





&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;







&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;font color=&quot;#5f0000&quot;&gt;&lt;b&gt;The headlines stated &quot;Europe Is United Again&quot;, May 2004&lt;/b&gt;&lt;/font&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;
&lt;b&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEito9IyP4xyBAfLUgT-btPEST70IQYvOIeMUVC53c0VHCX3yVr9iJundTI44gweGCWMwKIMMouseD_Lx9G8DhgfCyHJKurDyA0rZFC1TxEhjDMJcEzsz7C0Wz5WKCisNhrxHi8An49chlFy/s1600-h/222.jpg&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;170&quot; width=&quot;420&quot;  border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5064568655746806370&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEito9IyP4xyBAfLUgT-btPEST70IQYvOIeMUVC53c0VHCX3yVr9iJundTI44gweGCWMwKIMMouseD_Lx9G8DhgfCyHJKurDyA0rZFC1TxEhjDMJcEzsz7C0Wz5WKCisNhrxHi8An49chlFy/s320/222.jpg&quot; style=&quot;cursor: pointer; display: block; margin: 0px auto 10px; text-align: center;  &quot;&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
10 nations in eastern Europe and Mediterranean join bloc. Europe stood proudly reunited yesterday almost six decades after it was split in two by the Cold War, as 10 nations in eastern Europe and the Mediterranean took their places in the European Union. The once-communist states of the Czech Republic, Estonia, Hungary, Latvia, Lithuania, Poland, Slovakia and Slovenia officially joined the EU family. Mediterranean islands Cyprus and Malta joined them as well, rounding out what is indisputably the world’s biggest single economic bloc, and a fledgling political force, with a total population of 455 million, the EU now surpasses the United States as the world&#39;s biggest economy.&lt;/b&gt;


&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
  
&lt;/span&gt;&lt;/div&gt;


&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;b&gt;&lt;font color=&quot;#5f0000&quot;&gt;Will a global religious system the Roman Catholic Church become the Mystery Babylon spoken of in the bible?&lt;/font&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXdEHvs4rKuZF9Q9bDjkPSdX-3RsF52zPEURftOXzAttqhxBAvxbtCAXuChmDsXmfc5BNYX3uXF4l8No3sHcYPWLaWVWJuy1WGOJsCVlkb3j4Rkz_vQ9jfnV2LimVAtH0AQ?key=YF3nHP92DP42xDyP7pQ4zXBH&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot;   height=&quot;500&quot; width=&quot;830&quot; src=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXdEHvs4rKuZF9Q9bDjkPSdX-3RsF52zPEURftOXzAttqhxBAvxbtCAXuChmDsXmfc5BNYX3uXF4l8No3sHcYPWLaWVWJuy1WGOJsCVlkb3j4Rkz_vQ9jfnV2LimVAtH0AQ?key=YF3nHP92DP42xDyP7pQ4zXBH&quot; &gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;
In Revelation 17:1-6 The angel said to John come hither; I will shew unto thee the judgment of the great whore that sitteth upon many waters: With whom the kings of the earth have committed fornication, and the inhabitants of the earth have been made drunk with the wine of her fornication. So he carried me away in the spirit into the wilderness: and I saw a woman sit upon a scarlet coloured beast, full of names of blasphemy. And the woman was arrayed in purple and scarlet colour, and decked with gold and precious stones and pearls, having a golden cup in her hand full of abominations and filthiness of her fornication: And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH.&lt;/b&gt;&lt;/b&gt;



&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;
&lt;span style=&quot;font-size: 130%;&quot;&gt;Face, Eye, Retina, Fingerprint, And Hand Scanning Devices&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXX5u49zDDkYjaWnz5jsPsI53JaYZ-ReQa8NuG6UgDR6sNeRwChGlwOdk1G4zUQ5WxJCq60W0g9Aw_zKS4T-jOA9VmX5w3Wtc968beS5rxzMJ6ez0KGIZe3-a03CDo0BNJlreGoK4-aXtc/s1600/face-recognition-access-control-system-500x500.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Multi Biometric Reader&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5477986077775663938&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXX5u49zDDkYjaWnz5jsPsI53JaYZ-ReQa8NuG6UgDR6sNeRwChGlwOdk1G4zUQ5WxJCq60W0g9Aw_zKS4T-jOA9VmX5w3Wtc968beS5rxzMJ6ez0KGIZe3-a03CDo0BNJlreGoK4-aXtc/s1600/face-recognition-access-control-system-500x500.jpg&quot; style=&quot;height: 380px; width: 390px;&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;
Face Recognition Technology
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;Here users are provided the opportunity to identify or verify themselves either by biometric identification, ID card or PIN/password.
&lt;br /&gt;&lt;br /&gt;
&lt;/b&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjfcWiH7ZRjQgvo50HY4zfchEYt5GGTnuYKrf5zaKuRMVtlh9qpgv4FxxffSCkPB4_LT-cZUn4bUQNGSQrsFQmqIAxcjAESaMWET1PDR2dsUjN8n5u1TdEf_zv6XoapXidKWp55vAd-RUT/s1600/MK-CI933_SCREEN_P_20131230193450.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Hand Scanning Biometric Reader&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5477986077775663938&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjfcWiH7ZRjQgvo50HY4zfchEYt5GGTnuYKrf5zaKuRMVtlh9qpgv4FxxffSCkPB4_LT-cZUn4bUQNGSQrsFQmqIAxcjAESaMWET1PDR2dsUjN8n5u1TdEf_zv6XoapXidKWp55vAd-RUT/s520/MK-CI933_SCREEN_P_20131230193450.jpg&quot; style=&quot;height: 335px; width: 505px;&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;Hand Scanning Device&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;b&gt;
 These units use state of the art 3D imaging technology providing for a secure biometric recognition authentication. &lt;br /&gt;&lt;br /&gt;
 All of the operations of these biometric devices can be accessed from the menu on the touchscreen or keypad. &lt;br /&gt;&lt;br /&gt;
These devices feature a high definition infrared (IR) camera that enables user identification even in dimly lit environments.  &lt;br /&gt;&lt;br /&gt;

When using a biometric face reader the person looks into the camera, it captures the relative position, size, and shape of the user’s eyes, nose, cheekbones, and jaw which is then used to subsequently verify or identify the user.&lt;br /&gt;&lt;br /&gt;
These biometric face readers offer lightning quick detection. &lt;br /&gt;&lt;br /&gt; That&#39;s ideal for areas where a large flux of people have to pass.&lt;br /&gt;&lt;br /&gt; They&#39;re also capable of recognizing the same face with up to 15 different facial expressions.&lt;br /&gt;&lt;br /&gt; So no matter how you look or feel the reader will know that it&#39;s you!


&lt;br /&gt;&lt;br /&gt;

In biometric applications, physiological characteristics are extensively used for personal identification. Some of these characteristics have also served forensics and law enforcement. Facial features, friction ridges on fingertips, ear geometry, toe print, teeth pattern, etc. have been historically used in court of law to prove an individual’s presence at crime scenes. Physiological characteristics are unique to an individual and have served as a proven way for positively identification. For example, fingerprints have been used extensively for personal identification in civil as well as law enforcement applications. Technological advancement made it possible to identify and map other physiological and behavioral features that could be leveraged to establish an individual’s identity.

&lt;br /&gt;&lt;br /&gt;Both retina and facial recognition are categorized as physiological characteristic. Retina recognition is more popular in high security applications where reliability aspect is crucial, while face biometrics is used for mass surveillance as well as personal identification. Many mobile banking and finance application use face biometrics, popularly known as ‘selfie banking’, to identify and authenticate its customers. Though application of retina biometrics has been shrinking and gradually getting outnumbered by iris recognition in recent years, it is still one of the most reliable biometrics. Retina scan requires a very close encounter with the scanning device by using a beam of light deep inside the eye which is considered to be invasive, while iris pattern can be captured with near infrared illumination from a distance which is comparatively safer for human eye. Despite their differences, retina and face biometrics share common objectives: identifying and authenticating people.

&lt;/b&gt;









&lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;


&lt;b&gt;

&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;A Global Currency&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;b&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVOUOJ2c045FYdPUTMYqvYN6Ax-9d5Lqs9XDN0D0TCNNruxktjYb-vx-qOmhQvH6uIMDgDRCLeBQ2PTuOJX8bxUfy4CM8pA34lhz0g6CG8b6H7srP9YJbW91hOpGw-RGyowNihUhWQ85p-/s1600/The+Phoenix_phixr2222a.jpg&quot; imageanchor=&quot;1&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Phoenix World Currency&quot; border=&quot;0&quot; height=&quot;372&quot; id=&quot;BLOGGER_PHOTO_ID_5468606167121447698&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVOUOJ2c045FYdPUTMYqvYN6Ax-9d5Lqs9XDN0D0TCNNruxktjYb-vx-qOmhQvH6uIMDgDRCLeBQ2PTuOJX8bxUfy4CM8pA34lhz0g6CG8b6H7srP9YJbW91hOpGw-RGyowNihUhWQ85p-/s1600/The+Phoenix_phixr2222a.jpg&quot; width=&quot;281&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;


The Phoenix a hypothetical currency rises from the ashes of the dollar.&lt;br /&gt;
&lt;br /&gt;
In 1988, The Economist ran an article titled, Get Ready for the Phoenix, in which they wrote.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYIiIhbE5EGJbgVxdlZ69UFAJniuFEFYcXY2P1nuJUd7ZQvnI3hAMQl4SUDs-i0XYrM4WWQ4cyV167_6XMzbJe8a7jnSUxzwAoqq8sKeycs4AIk6skPghH3KavKqGsCte2eUsHmFuXjfFP/s1600/arrangement-various-world-currencies-including-chinese-yuan-japanese-yen-us-dollar-euroaa.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img alt=&quot;Today&#39;s Currencies&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYIiIhbE5EGJbgVxdlZ69UFAJniuFEFYcXY2P1nuJUd7ZQvnI3hAMQl4SUDs-i0XYrM4WWQ4cyV167_6XMzbJe8a7jnSUxzwAoqq8sKeycs4AIk6skPghH3KavKqGsCte2eUsHmFuXjfFP/s1600/arrangement-various-world-currencies-including-chinese-yuan-japanese-yen-us-dollar-euroaa.jpg&quot; width=&quot;366&quot; /&gt;&lt;br /&gt;
  
  
  
  &lt;b&gt;&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;center&gt;A New Global Digital System Will&lt;br /&gt;
 Replace All Of Today&#39;s Currencies&lt;/center&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;
  
  
  
  
  
  
  &lt;/center&gt;
&lt;/div&gt;
&lt;/b&gt;
&lt;b&gt;THIRTY years from now, Americans, Japanese, Europeans, and people in many other rich countries, and some relatively poor ones will probably be paying for their shopping with the same currency. Prices will be quoted not in dollars, yen or D-marks but in, let&#39;s say, the phoenix. &lt;/b&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;At the beginning of 1988 this appears an outlandish prediction. Proposals for eventual monetary union proliferated five and ten years ago, but they hardly envisaged the setbacks of 1987.
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;The phoenix will be favoured by companies and shoppers because it will be more convenient than today&#39;s national currencies, which by then will seem a quaint cause of much disruption to economic life in the last twentieth century.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/a-global-currency.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;


  
  
  
  
  
  &lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
  
  
  
  

&lt;b&gt;


&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;&lt;b&gt;British Military Attacks Drones With Huge Laser -  Costs $13 Per Shot &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;


  &lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
    


&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2W0BZJhenT5ZI1-hgDryOeq_Ft-RYkqYzc7YYzvgvQDjtWbyDfzlWnaBWXJci9P_gtd9dB2hXQgEOmMahvVvfebsBB3hg8s5RR9zMyXAUH2oW1Thr0nqt3OcENptZrgcOzfYsDqiSFPEmqXX1IY43ZoElPLC3LJn5VzlrmO4xF5gYzqMkLc_TyhxTkJ0/s1600/Screenshot%202025-11-25%20at%2012-27-05%20New%20DragonFire%20laser%20shoots%20down%20high-speed%20drones%20and%20can%20hit%20a%20coin%20from%20a%20kilometer%20away%20%E2%80%93%20it%27s%20heading%20to%20a%20UK%20Navy%20ship%20near%20you.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;430&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2W0BZJhenT5ZI1-hgDryOeq_Ft-RYkqYzc7YYzvgvQDjtWbyDfzlWnaBWXJci9P_gtd9dB2hXQgEOmMahvVvfebsBB3hg8s5RR9zMyXAUH2oW1Thr0nqt3OcENptZrgcOzfYsDqiSFPEmqXX1IY43ZoElPLC3LJn5VzlrmO4xF5gYzqMkLc_TyhxTkJ0/s1600/Screenshot%202025-11-25%20at%2012-27-05%20New%20DragonFire%20laser%20shoots%20down%20high-speed%20drones%20and%20can%20hit%20a%20coin%20from%20a%20kilometer%20away%20%E2%80%93%20it%27s%20heading%20to%20a%20UK%20Navy%20ship%20near%20you.jpg&quot; width=&quot;458&quot;/&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

&lt;b&gt;New   DragonFire laser defense system has just been tested and the laser shoots down high-speed drones and can even hit a coin.&lt;br&gt;&lt;br&gt;
  

    It can shoot down drones moving at 400 mph with incredible accuracy.
&lt;br&gt;&lt;br&gt;
    With a contract signed to provide the Royal Navy with the weapon for $415 million (£316 million), it&#39;ll be on board a UK destroyer in 2027, with a rapidly accelerated deployment timeframe, five years ahead of the originally anticipated date.&lt;br&gt;&lt;br&gt;


The UK government just announced that the  contract with MBDA will ensure the laser-directed energy weapon (LDEW) system is on board a Royal Navy Type 45 destroyer very soon.
&lt;br&gt;&lt;br&gt;
  The recent test runs of DragonFire at the UK Ministry of Defence&#39;s (MoD) Hebrides range witnessed the laser taking out drones flying at up to 650km/h (just over 400 mph). The MoD tells us that this LDEW can hit a  coin smaller than a US Quarter from a kilometer away, which is a mind-boggling feat.
&lt;br&gt;&lt;br&gt;The UK DragonFire programme brings together the best of UK industry. It leverages MBDA&#39;s decades of weapon system manufacturing expertise, Leonardo&#39;s position as a world-leading authority in laser technology, electro-optics, and advanced targeting, and QinetiQ&#39;s experience as the only UK company to successfully develop and safely operate high-energy laser sources in the UK and coherent beam-combining technology.
&lt;br/&gt;
&lt;br/&gt;
&lt;b&gt;&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2009/01/british-military-attacks-drones-with.html&quot; target=&quot;_blank&quot;&gt;Read more »&lt;/a&gt;&lt;/b&gt;
  
  
  
  
  
  &lt;BR&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;
&lt;span style=&quot;font-size: 100%;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
  
  
  
  

&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;Body Check&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwmfyRfUBRc4TBVscKp6oj6j_9Sxn0x965SXbiKpRJdytC9A6uym9d8buY30Po8yaD5MDqPY5EnuLKwBwuEqSbyj2WEP2Cb4YmCPKN1xVQTl2lAK3yqSklTUX0s8U8eRCmyQM7qnuS7_h0/s0/FacialScan.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwmfyRfUBRc4TBVscKp6oj6j_9Sxn0x965SXbiKpRJdytC9A6uym9d8buY30Po8yaD5MDqPY5EnuLKwBwuEqSbyj2WEP2Cb4YmCPKN1xVQTl2lAK3yqSklTUX0s8U8eRCmyQM7qnuS7_h0/s0/FacialScan.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: 82%;&quot;&gt;&lt;span style=&quot;font-size: 89%;&quot;&gt;&lt;b&gt; (Dynamic structured light acquisition techniques use a set of lines projected onto an object of interest to generate a 3D surface. Fingerprints or facial scans can be acquired using this method without the need for contact, making acquisition possible from a distance)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;




&lt;b&gt;In recent years a number of countries have initiated biometric schemes aimed at protecting their borders. Although they are typically launched amid claims that they will accelerate the immigration process, this isn&#39;t always their central purpose, and frequently the new systems culminate in long queues.&lt;br /&gt;
&lt;br /&gt;
Back in 2002 Australia unveiled its plans for SmartGate, a system that uses biometric facial recognition technology linked to the passenger&#39;s e-passport. &lt;br /&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;center&gt;

&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr2M2epSIcE-qz46j9X1o84Fjkufko8JJkzue_MVzp3mior0yrSzAj5Ox2wvoK8VA4UvcFr6muPfX5P1k-kG6OymMhyphenhyphenvvUS-vQ9TQkDaQ5_bSt8Vav7XHkcR-lG3AVKLMhxAeO38bhQkQP/s1600/biometric.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr2M2epSIcE-qz46j9X1o84Fjkufko8JJkzue_MVzp3mior0yrSzAj5Ox2wvoK8VA4UvcFr6muPfX5P1k-kG6OymMhyphenhyphenvvUS-vQ9TQkDaQ5_bSt8Vav7XHkcR-lG3AVKLMhxAeO38bhQkQP/s1600/biometric.jpg&quot; height=&quot;195&quot; width=&quot;375&quot;/&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;

Recent travellers in the US may have been taken by surprise by a new biometric security system in place at key airports, which requires ten fingerprints for identification. Clear Cards, which carry biometric information, have been used by Americans since 2005.
&lt;br /&gt;&lt;br /&gt;CLEAR is a private program that uses biometrics — your identity is verified through a scan of your iris or fingerprints, depending on which image is most distinctive. Clear’s biometric identity verifier is now in 24 airports (34 soon) and eight sports stadiums.&lt;/b&gt;
&lt;br /&gt;&lt;br /&gt;


&lt;div style=&quot;text-align: center;&quot;&gt;&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGb4yfImfVa7MrQjS0EJmF3OwSZf1bxw2LiTYFMxsQj0dFVHxF6ufC4y_TmBwFZrbSfvagH1sdR-NFl2xspQoBY4XCUQKyPLWVgrzBmLvvutE42S8AvQR2fqU1ALK8JRgKajqmH6V8xzM-/s580/1140-clear-entry-airport-checkin.imgcache.rev9d6f2d2b45051c6faca30b8be068ed94.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; margin-top: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGb4yfImfVa7MrQjS0EJmF3OwSZf1bxw2LiTYFMxsQj0dFVHxF6ufC4y_TmBwFZrbSfvagH1sdR-NFl2xspQoBY4XCUQKyPLWVgrzBmLvvutE42S8AvQR2fqU1ALK8JRgKajqmH6V8xzM-/s640/1140-clear-entry-airport-checkin.imgcache.rev9d6f2d2b45051c6faca30b8be068ed94.jpg&quot; width=&quot;530&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;
&lt;b&gt;
Clear ID Pass document is available to US citizens and permanent residents. In addition, to the documents required to apply for the ID, applicants were required to submit digital images of their fingerprints and iris scans, as well as a digital photo before they are issued the document. Clear then &quot;creates and stores a template, or mathematical representation, of the fingerprints and iris images, to create a unique biometric ID of the Member.&quot;&lt;BR&gt;&lt;BR&gt; All of the data submitted by the applicant is sent to TSA, which creates an applicant&#39;s &quot;security threat assessment&quot; based upon a background check that&#39;s included its controversial &quot;no-fly lists.&quot; After the verification process, each approved applicant is issued a “card” that allows them to access designated airport security fast lanes for processing through security at airports nationwide. The card also gives access to discount parking and speedy entry into major sports venues.



&lt;br /&gt;&lt;br /&gt;

 Dubai has established e-gates where registered passengers swipe an ID card and pass through a fingerprint scan, and the Netherlands has introduced Privium, a paid-for iris scanning service that offers a range of benefits, including lounge access and fast-track check-in.&lt;br /&gt;&lt;br /&gt;e-Borders
&lt;br /&gt;&lt;br /&gt;
Now e-Borders (electronic borders), a programme run by the UK Home Office&#39;s UK Border Agency at a likely total cost of £1.2bn, aims to tighten security at the country&#39;s borders. e-Borders is a joint programme run in partnership with the police and intelligence agencies. It requires commercial carriers and owners, or operators, of all vessels to submit detailed passenger, service and crew data in advance of their departure to and from the UK.
&lt;br /&gt;&lt;br /&gt;
&lt;/b&gt;

&lt;b&gt;
  
  
&lt;a href=&quot;https://thecomingnewworldorder.blogspot.com/2005/07/body-check.html&quot;  target=&quot;_blank&quot; &gt;Read more »&lt;/a&gt;
&lt;/b&gt;

  
  
  &lt;/b&gt;&lt;/b&gt;
  
  
  
  &lt;/b&gt;

</description><link>https://thecomingnewworldorder.blogspot.com/2008/02/electronic-surveillance-its-everywhere.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBKJsxDmpSwm71giMAwHMQeDAQyrcgVxx0gK7TXpXeG3beImlwBgT24QSA28hLFmD3hPJt4zOdR64_MiGLpc6xGSXdQGwyciGKDq7OYwVkGLK7cnpXt9GqPZ3_8QaT9-HgPjCLkMxVM1Ax/s72-c/200px-Eye-in-the-sky085.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-8324681693471740362</guid><pubDate>Thu, 10 Feb 2011 19:33:00 +0000</pubDate><atom:updated>2025-07-10T17:05:59.924-05:00</atom:updated><title></title><description>

&lt;b&gt;&lt;span style=&quot;font-size: 130%;&quot;&gt;&lt;span style=&quot;color: #5f0000;&quot;&gt;The Plan&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;


&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;center&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU4ooaNolCtYIbJuIiIB5pJvkCb1ObqPwkHIhMqekIoeTl6O2p8C5Ot5Ey6hbLex4keXC4pnBdAG8cGrKKB2oDC5ZGh3Qotmx9jspg0lfSrfcCE2FfJdT-h7vsmY-9j2i367WRBuLMAFu-/s1600/UGGS-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU4ooaNolCtYIbJuIiIB5pJvkCb1ObqPwkHIhMqekIoeTl6O2p8C5Ot5Ey6hbLex4keXC4pnBdAG8cGrKKB2oDC5ZGh3Qotmx9jspg0lfSrfcCE2FfJdT-h7vsmY-9j2i367WRBuLMAFu-/s400/UGGS-logo.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/center&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Whether you believe in a spiritual war or not, you still need Salvation. It is all that will save you when this life on earth is finished.&lt;/b&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;Do you know beyond the shadow of a doubt where you would go if you died tonight? If not, please consider the following, we pray it’s a blessing to you. The Bible says there is only one way to Heaven&lt;br /&gt;&lt;br /&gt;Jesus said: “I am the way, the truth, and the life: no man cometh unto the Father but by me.” (John 14:6)&lt;br /&gt;&lt;br /&gt;Good works cannot save you.&lt;br /&gt;&lt;br /&gt;“For by grace are ye saved through faith; and that not of yourselves: it is the gift of God: Not of works, lest any man should boast.” (Ephesians 2:8-9)&lt;br /&gt;&lt;br /&gt;Trust Jesus Christ today! Here’s what you must do:&lt;br /&gt;&lt;br /&gt;1. Admit you are a sinner.&lt;br /&gt;&lt;br /&gt;“For all have sinned, and come short of the glory of God;” (Romans 3:23)&lt;br /&gt;&lt;br /&gt;“Wherefore, as by one man sin entered into the world, and death by sin; and so death passed upon all men, for that all have sinned:” (Romans 5:12)&lt;br /&gt;&lt;br /&gt;“If we say that we have not sinned, we make him a liar, and his word is not in us.” (1 John 1:10)&lt;br /&gt;&lt;br /&gt;2. Be willing to turn from sin (repent).&lt;br /&gt;&lt;br /&gt;Jesus said: “I tell you, Nay: but, except ye repent, ye shall all likewise perish.” (Luke 13:5)&lt;br /&gt;&lt;br /&gt;“And the times of this ignorance God winked at; but now commandeth all men every where to repent:” (Acts 17:30)&lt;br /&gt;&lt;br /&gt;3. Believe that Jesus Christ died for your sins, was buried, and rose from the dead.&lt;br /&gt;&lt;br /&gt;“For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life.” (John 3:16)&lt;br /&gt;&lt;br /&gt;“But God commendeth his love toward us, in that, while we were yet sinners. Christ died for us.” (Romans 5:8)&lt;br /&gt;&lt;br /&gt;“That if thou shalt confess with thy mouth the Lord Jesus, and shalt believe in thine heart that God hath raised him from the dead, thou shalt be saved.” (Romans 10:9)&lt;br /&gt;&lt;br /&gt;4. Upon believing the gospel, God declares you to be righteous and saves you by his grace.&lt;br /&gt;&lt;br /&gt;“For with the heart man believeth unto righteousness; and with the mouth confession is made unto salvation.” (Romans 10:10)&lt;br /&gt;&lt;br /&gt;“For whosoever shall call upon the name of the Lord shall be saved.” (Romans 10:13)&lt;/b&gt;&lt;br /&gt;

</description><link>https://thecomingnewworldorder.blogspot.com/2007/05/the-plan-whether-you-believe-in.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgU4ooaNolCtYIbJuIiIB5pJvkCb1ObqPwkHIhMqekIoeTl6O2p8C5Ot5Ey6hbLex4keXC4pnBdAG8cGrKKB2oDC5ZGh3Qotmx9jspg0lfSrfcCE2FfJdT-h7vsmY-9j2i367WRBuLMAFu-/s72-c/UGGS-logo.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-3472135239410693724</guid><pubDate>Tue, 12 Jan 2010 16:06:00 +0000</pubDate><atom:updated>2026-03-24T11:19:54.036-05:00</atom:updated><title>Bugs Were Supposed to be the Future of Food. Now, the Industry is Collapsing.</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;478&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit6iMZkBYb0N3uST8-LYdQFHMEMW-WHlRakOAJYq8ckTcv8D9nCtxa3RzEvOIO9RE3TTSuzX9XLp2P3uGjW4D1NHdP44zDUgCNilEHV10LyWVODIzNtMCGSwTnXv5o4wbDc3rrF7dvaRU9Z-vNIalXhwdcDWFU3Zo3SVPeN-zm2pUxCOEUFhY6O9uv/s0/U3YWY5.jpeg&quot; width=&quot;810&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  

How the farmed-insect frenzy lost its buzz.&lt;p&gt;
  “We have to get used to the idea of eating insects.”
  &lt;/p&gt;&lt;p&gt;
This proclamation came from, of all people, an insect researcher. Dutch entomologist Marcel Dicke pitched eating bugs in his 2010 TED talk as critical to sustainably feeding a growing human population, because insects have a much smaller carbon footprint than beef, pork, and chicken.
  &lt;/p&gt;&lt;p&gt;
To make his point, he even featured photographs of what might be a common meal in this bold new future: a stir-fry with mealworm larvae, mushrooms, and snap peas, finished with a chocolate dessert topped with a large fried cricket.
  &lt;/p&gt;&lt;p&gt;
Three years later, the United Nations published a comprehensive report that echoed many of Dicke’s ideas and argued that insects could be a more eco-friendly food source not just for humans, but also for livestock. The report received widespread media coverage and helped to trigger a wave of investment from venture capital firms and governments alike into insect farming startups across Europe, the US, Canada, and beyond, totaling some $2 billion.
    &lt;/p&gt;&lt;p&gt;
  There’s a ring of truth, it turns out, to the conspiracy theory that the globalist elites want us to eat bugs.
  &lt;/p&gt;&lt;p&gt;
This money was pouring into insect agriculture at a time when investors and policymakers were hungry for new models to fix the conventional meat industry’s massive carbon footprint. And what’s more disruptive and novel than farming and eating bugs?
  &lt;/p&gt;&lt;p&gt;
You personally might recoil at the thought of eating fried crickets or roasted mealworms, but many cultures around the world consume insects, either caught from the wild or farmed on a small scale. And while grubs don’t feature prominently in current paleo cookbooks, our paleolithic ancestors most certainly ate plenty of bugs.
  &lt;/p&gt;&lt;p&gt;
But the past decade has shown that even if you build an insect farm, the global market may not come. Of the 20 or so largest insect farming startups, almost a quarter have gone belly up in recent years, including the very largest, Ÿnsect, which ceased operations in December.
  &lt;/p&gt;&lt;p&gt;
All told, shuttered insect farming startups account for almost half of all investment into the industry. “Things have gone from bad to worse for the big insect factory business model,” one insect farming CEO said late last year in a YouTube video.
  &lt;/p&gt;&lt;p&gt;
And Vox can exclusively report that plans to build a large insect farm in Nebraska—a joint project between Tyson Foods, America’s largest meat company, and Protix, now the world’s second largest insect farming company—are indefinitely on hold.
  &lt;/p&gt;&lt;p&gt;
Beyond the financial woes of the insect farming industry, some philosophers worry about the ethical implications of potentially farming tens of trillions of bugs for food, as emerging research suggests insects may well have some form of consciousness and hold the capacity to feel pain and suffer.
  &lt;/p&gt;&lt;p&gt;
“Evidence is building that there’s a form of sentience there in insects,” Jonathan Birch, a philosopher at the London School of Economics who leads the Foundations of Animal Sentience project at the university, told me last year.
  &lt;/p&gt;&lt;p&gt;
But it looks like they may not have too much to worry about. In spite of the initial hype surrounding the bug farming boom, the insect agriculture industry has learned just how difficult it is to compete with the incumbent, larger animal-based meat industry—and that, perhaps, it never really made sense to try doing so with bugs.
  &lt;/p&gt;&lt;p&gt;
Insect farming is similar to other types of animal farming. The insects reproduce, and the offspring are raised in large numbers in factory-style buildings. Many of the same welfare concerns for farmed chickens and pigs are present on insect farms, like disease, cannibalism, and painful slaughter. In the case of insects, the creatures are killed by a variety of means. They might be frozen, baked, roasted, shredded, grond, microwaved, boiled, or suffocated.
  &lt;/p&gt;&lt;p&gt;
In 2020, insect companies farmed an estimated 1 trillion bugs, and the most commonly farmed species today are black soldier fly larvae, mealworms, and crickets.
  &lt;/p&gt;&lt;p&gt;
While some people might tell researchers they’re open to adding bugs to their diet, these smallest of animals remain a novelty food in the US and Europe, as opposed to a commodity capable of displacing wings or burgers.
  &lt;/p&gt;&lt;p&gt;
“The human food market, basically, has not materialized,” Dustin Crummett, a philosopher and executive director of The Insect Institute—a nonprofit that researches the environmental and animal welfare implications of large-scale insect agriculture—told me. “Only a tiny fraction of farmed insects are used for human food.”
    &lt;/p&gt;&lt;p&gt;
  But insect farming startups haven’t only sought to put insects on our plates or grind them into protein bars; many want to sell insect meal (ground up insects) as feed for other farmed animals. It’s a sustainable alternative, they argue, to the soy fed to factory-farmed chickens and cattle, much of which is grown on deforested land. Insect meal could also replace fishmeal (largely composed of small, wild-caught species, like anchovies and sardines), which is fed to farmed fish and heavily contributes to overfishing.  &lt;/p&gt;&lt;p&gt;

This approach of farming insects for livestock feed, however, isn’t materializing either, and much of it comes down to cost.
  &lt;/p&gt;&lt;p&gt;
According to a 2024 analysis published in the journal Food and Humanity and co-authored by Crummett, the cost of insect meal is about 10 times that of soybean meal and 3.5 times that of fishmeal, a major cost gap that is unlikely to narrow anytime soon.
  &lt;/p&gt;&lt;p&gt;
Insect meal is so expensive, in part, because feeding insects is expensive. Farmed insects are typically fed agricultural “co-products”—like wheat bran and corn gluten—most of which is already fed to livestock, and so insect farmers have wound up in competition with big meat companies to buy up these ingredients. This simple fact weakens the narrative often driven by insect farming startups that they are putting food scraps that otherwise would’ve been thrown away to good use.
  &lt;/p&gt;&lt;p&gt;
“Organic waste from the industry becomes feed for insects,” Protix’s website reads. “This circular food production mirrors nature’s circle of life.” But this is misleading; Protix feeds its insects ingredients like oat husk and starch, which are typically used in traditional livestock feed anyway. “It doesn’t really make sense to buy chicken feed to feed insects to feed to chicken,” as one insect farming startup founder told AgriTech Insights a couple of years ago.
  &lt;/p&gt;&lt;p&gt;
And it’s not guaranteed that insect meal will be more sustainable than soy or fishmeal. According to a UK government report, the environmental impact of insect farming depends on a number of factors, including what insects are fed and whether startups power their farms with fossil fuels or renewable energy.
  &lt;/p&gt;&lt;p&gt;
Energy usage explains a lot of the industry’s cost challenge. Farmed insects require warm temperatures, and in Europe, where so many of the startups are based, energy prices have sharply risen in recent years.
  &lt;/p&gt;&lt;p&gt;
To lower costs and develop new revenue streams, some insect farming startups have pivoted to become “waste management” companies, too. Rotting food waste in landfills is a huge source of global greenhouse gas emissions, and insect farming companies can earn money by taking it off other companies’ hands and letting bugs eat it.
  &lt;/p&gt;&lt;p&gt;
But here, too, the industry has run into obstacles, including strict EU regulations around what can be fed to insects and an inconsistent product. When insects are fed food waste, their final nutritional profile can vary widely depending on what they’re fed, but livestock feed companies need nutritional consistency.
  &lt;/p&gt;&lt;p&gt;
And it turns out that even the largest and most powerful companies in the space can run into hard, economic realities when trying to rear bugs on waste en masse.
  &lt;/p&gt;&lt;p&gt;
In late 2023, America’s biggest meat company, Tyson Foods, announced it had invested an undisclosed sum of money in Protix, a large Dutch insect farming startup. That Tyson was putting its weight behind it seemed like much-needed proof that insects could be the future of food, as so many startups, investors, and researchers had claimed.
  &lt;/p&gt;&lt;p&gt;
The two companies planned to build a massive insect farm together near Tyson’s cattle slaughterhouse in Dakota City, Nebraska. At the insect farm, Protix would raise and kill around 70,000 tons of larvae annually—what I estimate to be approximately 300 billion individual insects. The bugs would feed on cattle paunch, partially digested plant matter removed from the stomachs of cattle slaughtered at Tyson’s plant. After a few weeks of feeding on the animal waste, the larvae would be slaughtered and ground up into insect meal, destined to become food for pets and livestock.
  &lt;/p&gt;&lt;p&gt;
It was a way for Tyson to “derive value” from its waste, as it told CNN.
  &lt;/p&gt;&lt;p&gt;
Now, Vox can exclusively report that Tyson Foods has withdrawn its air permit application to build the plant, and the plant itself is “on hold indefinitely.” That’s according to email exchanges last December between Tyson Foods and the Nebraska Department of Water, Energy, and Environment, which were obtained through public records requests by the nonprofit Society for the Protection of Insects.
  &lt;/p&gt;&lt;p&gt;
Tyson and Protix did not respond to questions for this story.
  &lt;/p&gt;&lt;p&gt;
The companies’ stalled plans aren’t unique in the insect farming space.
  &lt;/p&gt;&lt;p&gt;
In early 2024, Innovafeed—currently the largest insect farming startup—opened a pilot plant in Decatur, Illinois, in partnership with ADM, the massive food and livestock feed manufacturing company. The US Department of Agriculture awarded Innovafeed a $11.7 million grant to turn insect waste into fertilizer at the plant, but a year and a half after it opened, it suspended operations, citing funding challenges.
  &lt;/p&gt;&lt;p&gt;
Through a public records request, Society for the Protection of Insects obtained over 600 pages of documents pertaining to the grant, though about half of it is redacted, including much of the environmental review and Innovafeed’s commercial records. Last week, the organization sued the USDA over the heavy redactions, arguing it’s in the public’s interest to fully disclose the details of the deal.
  &lt;/p&gt;&lt;p&gt;
The USDA declined to comment on pending litigation, and Innovafeed did not respond to questions for this story.
  &lt;/p&gt;&lt;p&gt;
The biggest blow to the industry yet came late last year when the largest startup of them all—France-based Ÿnsect, which had raised over $600 million, representing nearly a full third of the sector’s funding—ran out of money. And a quarter of that backing had come from the French government. A recent whistleblower investigation alleged severe mismanagement at Ÿnsect’s production facility that led to filthy conditions and health problems for workers. The company didn’t respond to a request for comment.  &lt;/p&gt;&lt;p&gt;

As insect farming startups struggle to stay afloat, their main trade group—the International Platform of Insects for Food and Feed (IPIFF)—is going so far as to call on the European Union to mandate publicly funded food services, like school cafeterias, to buy insect meat and publicly owned farms to buy insect meal to feed to their animals. IPIFF didn’t respond to an interview request for this story, nor did the North American Coalition for Insect Agriculture.
  &lt;/p&gt;&lt;p&gt;
As for the outlook of the insect farming sector, more startups will probably go under in the years ahead, and for the survivors to continue on, they may need to leave Europe and North America for warmer climates and lower operating costs.
  &lt;/p&gt;&lt;p&gt;
But the rise, fall, and resettling of the industry isn’t uncommon in the agricultural technology field, Crummett says. Vertical farming, for example, seemed like a great idea on paper, but it’s been an economic failure.
  
  
    
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
  
Bug Out: the Insect-farming Industry Is Collapsing, for Reasons That Aren’t Hard To Guess &lt;p&gt;
  
  Perhaps the greatest revelation of the Department of Government Efficiency, apart from the sheer, staggering scale of the pork, was just how much of it was being funnelled through USAID—and, of course, where it was going and to whom.
  &lt;/p&gt;&lt;p&gt;
All of a sudden, we discovered that literally everything awful in the world—from drag-queen storytime in Vanu’atu and sex-changes for dwarfs in Morocco, to research into rare aardvark viruses and cat-torture in China—all of it was being paid for with US taxpayer money via USAID.
  &lt;/p&gt;&lt;p&gt;
Fancy that!?  &lt;/p&gt;&lt;p&gt;

So why not insect-farming too?
  &lt;/p&gt;&lt;p&gt;
It certainly fits the bill. It’s evil and disgusting and runs counter to all our deepest, most fundamental instincts; it serves no real purpose except to degrade, humiliate and elicit sniggers—if not uproarious laughter—from those who came up with the idea and would never, under any circumstances, do it themselves.
  &lt;/p&gt;&lt;p&gt;
In short, it’s perfect.
  &lt;/p&gt;&lt;p&gt;
Well, I did a little digging and, to my surprise, it doesn’t look like the US taxpayer was propping up the global insect-farming industry, not really. USAID made a “request for information” in 2022, meaning it was looking for input on how it could invest in the industry, but other than that it was just a few small-scale projects in places like Uganda, Madagascar and Indonesia to help farmers feed their livestock with black soldier flies or dispose of waste by feeding it to worms—stuff like that.
  &lt;/p&gt;&lt;p&gt;
So, it’s just a coincidence that insect-farming is on its last… legs, ahem, after Kekius Maximus took his gold-plated chainsaw to the United States Agency for International Development.
  &lt;/p&gt;&lt;p&gt;
Anyway, none of this changes the fact that insect-farmers are, indeed, in very deep trouble.
  &lt;/p&gt;&lt;p&gt;
A long article on Mother Jones examines the industry’s woes in detail, from its early days with so much promise, when billions of dollars poured into startups from venture-capital firms and governments; to today’s dismal prospects. In recent years, almost a quarter of the 20 largest insect-farming startups have now failed, including the biggest, Ynsect, which came tumbling down last December.
  &lt;/p&gt;&lt;p&gt;
“Things have gone from bad to worse for the big insect factory business model,” one unhappy CEO said in a YouTube video.
  &lt;/p&gt;&lt;p&gt;
Plans for further expansion, including the building of a massive insect farm in Nebraska by Tyson Foods, have been placed on indefinite hold.
    &lt;/p&gt;&lt;p&gt;
  As if to add insult to injury, moral philosophers are now proposing that, far from being ethical, bug-farming on an industrial scale is, like traditional farming, deeply immoral. Insects, apparently, have some form of consciousness, feel pain and may even have opinions about the final season of Stranger Things.
  &lt;/p&gt;&lt;p&gt;
I pondered the question of insect sentience this morning while I sat on the toilet and watched a woodlouse meander across the bathroom floor. Frankly, I’m not convinced. But if moral philosophers—a useless lot, for the most part—can make life harder for insect-farmers, then I’m happy to let them do it.
  &lt;/p&gt;&lt;p&gt;
End cruelty to mealworms! Worker ants of the world, unite—you have nothing to lose but your chains!
  &lt;/p&gt;&lt;p&gt;
Energy-price increases have played a big role in the industry’s misery, driving up the cost of heating the enormous warehouses where the insects are farmed. Costs are especially high in Europe, where more sensible energy policies could have been devised by a four-year-old child with water on the brain.  &lt;/p&gt;&lt;p&gt;

It also turns out feeding insects is expensive—maybe even more expensive than feeding some larger animals, like fish. We were told the opposite.
  &lt;/p&gt;&lt;p&gt;
But, of course, the biggest problem is that nobody wants to eat insects. Obviously. It doesn’t matter how many times we’re told “cockroach milk” is the next superfood, or that we have to eat crickets instead of chicken to save the planet from global boiling, people just don’t want to do it.
  &lt;/p&gt;&lt;p&gt;
In large part, the problems of the insect-farmers are the problems of the so-called “alternative protein” industry more broadly.
  &lt;/p&gt;&lt;p&gt;
Nobody wants to eat “plant-based meat” either, or “plant-based eggs,” or “lab-grown meat” or any other eldritch abomination spawned in a bioreactor and dressed up as a cruel mockery of Mother Nature’s perfection.
  &lt;/p&gt;&lt;p&gt;
During the pandemic, the makers of these products started to change tack as it became clear sales were flagging and projections laughably optimistic. They turned from claims about taste and health benefits—which nobody really believed—to manipulation and shame-based marketing. The most notable example was the barf-inducing “Help Dad” campaign from “oat-milk” brand Oatly. Tragically unhip fathers were confronted by their broccoli-haired kids and put through a plant-based struggle-session at the fridge door. Dad’s crime? Reaching for a cold glass of cow’s milk instead of Oatly.
  &lt;/p&gt;&lt;p&gt;
  Unsurprisingly, despite market research that suggests shame is the best way to market oat milk and insects, consumers aren’t buying it. So long as there are free-market mechanisms driving what ends up on store shelves, consumers will keep on buying the real thing instead.  &lt;/p&gt;&lt;p&gt;

Which is why pressure groups are now trying to get government to step in and force consumers to buy insects. The International Platform of Insects for Food and Feed is calling on the European Union to mandate that taxpayer-funded food services, including school cafeterias, sell insect “meat” and that publicly owned farms feed their animals insectmeal—ground-up insects. Other groups are trying to do the same thing in the US.
  
  
  
  
 &lt;/p&gt;&lt;p&gt;


  &lt;/span&gt;
  &lt;/b&gt;
    
    
&lt;/p&gt;
  &lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/1Kd1NnU4PUQ?si=815cXQ7d77fqdsbY&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/NQ5ltI6-euA?si=F43i9mXOgTEfIQ4e&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;
</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/bugs-were-supposed-to-be-future-of-food.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit6iMZkBYb0N3uST8-LYdQFHMEMW-WHlRakOAJYq8ckTcv8D9nCtxa3RzEvOIO9RE3TTSuzX9XLp2P3uGjW4D1NHdP44zDUgCNilEHV10LyWVODIzNtMCGSwTnXv5o4wbDc3rrF7dvaRU9Z-vNIalXhwdcDWFU3Zo3SVPeN-zm2pUxCOEUFhY6O9uv/s72-c/U3YWY5.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-991192055108643902</guid><pubDate>Mon, 11 Jan 2010 21:29:00 +0000</pubDate><atom:updated>2026-03-18T04:46:36.306-05:00</atom:updated><title>What Is Armageddon?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;478&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY9Ao7w713hSh-y9askHtRcwzeDj6HwzhVL1naJAs7f4oqQH_fBWDNitvApWlgjCl_C1KSVNxjU_TFZ0oqnG4h0ZbmKfOahFFcAcTRF6GoGpsQozF-JpjuwEpkZ50R0zVNGYgGkIi9_ZivVYwEE17eJagpnkr7CxXDWpw772QDg7eSmweQ3sZJ2YKsFG0/s1600/biw102-megiddo_2cd7018c2f51f2177f872a8b29ba5709.jpg&quot; width=&quot;810&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  
  AI Overview&lt;p&gt;
In military terms, Armageddon refers to a final, catastrophic, and decisive battle, often synonymous with nuclear war or a global conflict that ends civilization. &lt;/p&gt;&lt;p&gt;
It originates from biblical prophecy as the ultimate showdown between good and evil, used now to describe an apocalyptic scenario or a war of absolute annihilation.  &lt;/p&gt;&lt;p&gt;
Key Military Contexts:
 &lt;/p&gt;&lt;p&gt;
    Final Battle Concept: It refers to a, potentially literal or symbolic, last battle where global powers gather for a terminal conflict. &lt;/p&gt;&lt;p&gt;
    Apocalyptic Scenario: It is used as a colloquialism for a global nuclear apocalypse that threatens the survival of humanity.
    Symbolic Location: It stems from &quot;Har Megiddo&quot; (Mount Megiddo) in Israel, known as the site for this apocalyptic showdown. &lt;/p&gt;&lt;p&gt;
    Geopolitical Rhetoric: In recent contexts, it has been used to describe, and criticize, framing modern Middle Eastern conflicts as &quot;religious wars&quot; aimed at fulfilling prophecy, say Al Jazeera news.  &lt;/p&gt;&lt;p&gt;

The term is rarely used in official military doctrine to describe operational plans, but rather as a dramatic description of potential nuclear warfare.
  
    
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
  
  
  War of Words – ‘ARMAGEDDON’ &lt;p&gt;
  ‘Armageddon’ came to English, via Greek, from Hebrew har megiddo, meaning ‘mountain of Megiddo.’ According to the Book of Revelation 16:16, it is the place where, at world’s end, on Judgement Day, Heaven’s forces will defeat the armies of evil in a final battle. &lt;/p&gt;&lt;p&gt;
  The word can be found in an 1811 letter of the English Romantic poet Percy Bysshe Shelley: ‘several others of the Armageddon-Heroes maintain their posts.’ It has often been used as an allusion to any last, tremendous, struggle, as in Rudyard Kipling’s 1896 A Song of the English: ‘In the day of Armageddon, at the last great fight of all.’ On occasion, it has been employed to describe nuclear war. &lt;/p&gt;&lt;p&gt;

In ancient times, Megiddo, located in the Jezreel Valley, was a strategically important city that sat astride the primary route leading into southern Syria. It was the scene of the Battle of Megiddo, one of the most famous of the whole of the Bronze Age.
   &lt;/p&gt;&lt;p&gt;
  In 1485 BC, the warrior pharaoh Tuthmosis III moved against it. He was opposed by an alliance of Canaanite rulers.
   &lt;/p&gt;&lt;p&gt;
  There were three routes to the Plain of Esdraelon, upon which stood Megiddo. His officers counselled Tuthmosis to avoid the third, the narrow Aruna road, as it would make the Egyptian army vulnerable on the march, and the other two were easier. Yet the Aruna offered a straight passage to Esdraelon, and would allow his army to appear less than a mile from Megiddo.
 &lt;/p&gt;&lt;p&gt;
Tuthmosis also believed that the Aruna’s obvious difficulty would work to convince the enemy to guard the other two roads, and leave it uncovered.
 &lt;/p&gt;&lt;p&gt;
Thus the pharaoh chose the Aruna road, and his move indeed surprised the hostile coalition. The Egyptians deployed without trouble onto Esdraelon, and the next day crushed the enemy in battle.
  
  
  
  
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
  
Most people believe Armageddon is about the end of the world. But what does the Bible actually reveal?
 

  &lt;p&gt;On the hills outside the city of Nazareth in Galilee of Israel, you can stand and look out over the flat plain of the Jezreel Valley. To the west, at the end of the valley you can make out a hill, the site of a place called Megiddo. 
  &lt;/p&gt;&lt;p&gt;
    Nazareth is where Jesus was raised by His parents, Joseph and Mary. It is not hard to imagine Jesus as a youth spending time in these hills overlooking the valley. Jesus, who was God in the flesh - knew the history of the land before Him, both past and future. He knew one day, on that spot, armies would gather to fight Him at His glorious second coming.
 &lt;/p&gt;&lt;p&gt;
Jesus grew up near a place called Armageddon. Armageddon carries a powerful message for the world - a message that comes straight from Jesus Christ.
     &lt;/p&gt;&lt;p&gt;
    Armageddon! What do you think when you hear that word? Most of us probably think of the end of the world - or a movie.
 &lt;/p&gt;&lt;p&gt;
But what most people believe is not accurate. Armageddon is actually just an old city. It&#39;s a real-life place on the map and you can travel there today. It&#39;s a place no longer inhabited and it&#39;s surrounded by a long and wide valley.
 &lt;/p&gt;&lt;p&gt;
In future prophecy, Revelation reveals that armies will gather in this valley to fight Jesus Christ when He returns in glory and power.
 &lt;/p&gt;&lt;p&gt;
There&#39;s a powerful message for each of us in the prophecy of Armageddon. If you heed that message, it can change your life and prepare you for Christ&#39;s return.
 &lt;/p&gt;&lt;p&gt;
For every person you ask about Armageddon, you&#39;ll get a different answer. But what&#39;s the truth? What do the Scriptures say? Let&#39;s look in the book of Revelation.
 &lt;/p&gt;&lt;p&gt;
In chapter 16, we see seven devastating plagues that represent God&#39;s final judgment on the world - a world that has rejected Him. They are symbolized by bowls being poured out upon the earth.
 &lt;/p&gt;&lt;p&gt;
The fifth of these bowls brings darkness on the throne of the evil ruler of the final superpower of mankind, which is depicted as a beast. The impenetrable darkness will be so frightening that people will be gnawing their tongues out of despair. In their anger and their pain they are going to curse God. And instead of turning to Him for help, they will refuse to humble themselves or to repent. Tension in the world will escalate (Revelation 16:11). Satan, of course, is pulling out all strings behind that evil leader called the Beast, and in his rage against God, he prepares to maneuver the world and its armies into a box canyon. There will be no way out. &lt;/p&gt;&lt;p&gt;

Notice what it says in verse 12. &quot;Then the sixth angel poured out his bowl on the great river Euphrates, and its water was dried up, so that the way of the kings of the east might be prepared.&quot; In other words, great armies from the east will be on the move toward Israel. It continues, &quot;And I saw three unclean spirits like frogs coming out of the mouth of the dragon, out of the mouth of the beast and out of the mouth of the false prophet.&quot; Who is the dragon, the Beast and this false prophet? The dragon is Satan. The Beast is the leader of the final, evil superpower of mankind. And the false prophet is an evil religious leader who will deceive the whole world with his false religion. The Scripture continues: &quot;For they are spirits of demons performing signs, which go out to the kings of the earth and of the whole world, to gather them to the battle of that great day of God Almighty&quot; (Revelation 16:12-14). &lt;/p&gt;&lt;p&gt;

What we&#39;re reading is an incredible peek into the invisible spirit world. With hints like this throughout the Scriptures, we know that there is another dimension that we really can&#39;t see, feel, touch or taste. But it is very real. It&#39;s inhabited with good spirits - angels, servants of God - and evil spirits, Satan and his demons. In this verse, it gives us a metaphorical vision of what is going on in the spiritual dimension. It shows the dragon - Satan - spewing from his mouth evil spirits - represented here by frogs. What happens in the spirit realm has always had a connection with what happens in our own physical realm. What we&#39;re reading here are evil spirits causing chaos in the spirit realm. These evil spirits directly influence events in our physical world.
 &lt;/p&gt;&lt;p&gt;
In other words, Satan&#39;s rage behind the scenes will be what causes the armies of the world to gather in the land of Israel. Armageddon is not the name of the battle that will be fought. It is the place where they will gather for what is possibly the largest, and certainly the most conclusive, battle in all world history - The Battle of the Great Day of God Almighty. Of all the great battles in history - battles such as Gettysburg, Thermopolye, or Normandy - this battle is more significant than all the others combined. It&#39;s been named two thousand years in advance.
 &lt;/p&gt;&lt;p&gt;
Now take note of something remarkable in the Scripture in verse 15. It says, &quot;Behold, I come like a thief! Blessed is he who stays awake and keeps his clothes with him, so that he may not go naked and be shamefully exposed&quot; (Revelation 16:15). Right in the middle of this description of end-time armies, spiritual deception and the wrath of Satan is this little gem of a statement.
 &lt;/p&gt;&lt;p&gt;
Then it continues right on after this as it did before with descriptions of more dramatic signs and events. It would be easy to just gloss over it, but that would be a critical mistake. We&#39;re going to come back to this verse later  and explain it a bit more.
 &lt;/p&gt;&lt;p&gt;
Let&#39;s go on to verse 16 and see what it says, &quot;And they gathered them together to the place called in Hebrew, Armageddon&quot; (Revelation16:16). The word, &quot;Armageddon&quot; is just the combination of two Hebrew words: the word, &quot;har&quot; and the word, &quot;megiddo.&quot; Of all the places, why then is this so significant? Why do the armies gather there? Well a brief look at the history of the area can help us answer that question.
 &lt;/p&gt;&lt;p&gt;
On a map of the State of Israel, you can see the site of Megiddo. For thousands of years, it was a city where people lived. Every time it was destroyed in war, they&#39;d fill in the dirt and they&#39;d build on top. Today it is a hill popping up out of the flat plain called, Jezreel. Archaeologists have excavated the site for several decades. Their work has exposed ancient secrets long hidden beneath its soil. &lt;/p&gt;&lt;p&gt;

Megiddo has seen more battles than any other place on earth. Why? Because whoever controlled Megiddo controlled a narrow strategic stretch of road called the Via Maris, which was a major international highway in the ancient world. This road stretched from Egypt all the way to Babylon, which is today, more or less, the modern nation of Iraq. In ancient times, this was the link - this Via Maris - between the major empires and the trade routes of the day. In the ancient world, any nation who wanted control of this region had to control Megiddo. &lt;/p&gt;&lt;p&gt;

Over the years, many battles took place at Megiddo. In 1479 B.C., the Egyptian Pharaoh Thutmose III launched a campaign near Megiddo to assert dominion over territories in and north of Canaan.
 &lt;/p&gt;&lt;p&gt;
In the Bible, King Solomon stationed troops, and chariots and horses in Megiddo, using the city as a northern fortress (1 Kings 9:15). Today there are massive gates still standing at the entrance to the ruins in Megiddo, and they date from this period and they are evidence of the city&#39;s strategic regional location. Later, during the reign of Judah&#39;s King Josiah, pharaoh Necho from Egypt came to Megiddo to fight against Assyria. Even though God told Josiah not to get involved in this battle, he did and he was killed (2 Kings 23:29).
 &lt;/p&gt;&lt;p&gt;
And in modern times both Napoleon (1799) and the British General Allenby (1918) defeated Turkish forces at Megiddo. The area has never lost its significance as a battleground for control over this crucial crossroad of empires.
 &lt;/p&gt;&lt;p&gt;
So we see that Megiddo is the place where armies have gathered in the past and it is where armies will gather in the future before the Battle of the Great Day of God Almighty. Does the Bible show us then where the actual battle will ultimately be fought? It does, and you will see where in a minute.
 &lt;/p&gt;&lt;p&gt;
Conflict in the Middle East dominates the news today.  Why does this part of the world matter to you? The answer lies in Bible prophecy.
 &lt;/p&gt;&lt;p&gt;


We have seen that armies from all over the world will gather at Armageddon in the &quot;time of the end&quot; to fight Christ at His coming. Armageddon is a place. The battle is the event. And, there is an important spiritual lesson that connects events that took place in ancient Megiddo to what is happening today. &lt;/p&gt;&lt;p&gt;

Let&#39;s look at a couple of scriptures to set the stage.
 &lt;/p&gt;&lt;p&gt;
Let&#39;s look at Zechariah chapter 14, where it tells us: &quot;Behold, the day of the Lord is coming, and your spoil will be divided in your midst. For I will gather all the nations to battle against Jerusalem... Then the Lord will go forth and fight against those nations, as He fights in the day of battle&quot; (Zechariah 14:1-3).
 &lt;/p&gt;&lt;p&gt;
The prophet Joel adds some detail to this. It says: &quot;I will also gather all nations, and bring them down to the Valley of Jehoshaphat; and I will enter into judgment with them there on account of My people, My heritage Israel, whom they have scattered among the nations; they have also divided up My land&quot; (Joel 3:2).
 &lt;/p&gt;&lt;p&gt;
Jerusalem is where the battle of the great day of God Almighty is fought. Specifically, the focal point of battle will be in the steep valley that is today called, Kidron located between the Old City of Jerusalem and the Mount of Olives. Christ will descend with a spirit army and tread the winepress of His wrath. Revelation 19 says this: &quot;And the winepress was trodden without the city, and [the] blood came out of the winepress, even unto the horse bridles, by the space of a thousand and six hundred furlongs&quot; (Revelation 14:20). As human armies fight God the carnage will be so great that the blood will run several feet deep. &lt;/p&gt;&lt;p&gt; It will be a terrible battle - one that will end in the peace of the Kingdom of God.
 &lt;/p&gt;&lt;p&gt;
Megiddo and the Jezreel Valley provide an ideal staging point for this battle. We can imagine forces flowing in through the port of Haifa, a few miles to the northwest. Transport planes, and helicopters, troop carriers and tanks will ferry men and materiel into the region. Jet fighters and missiles will no doubt be engaged in a battle that suddenly turns its attention to a force coming from an unexpected location - the heavens above Jerusalem. In their folly and deception, they will fight Christ, never recognizing Him as the Messiah.
 &lt;/p&gt;&lt;p&gt;
Today, this is difficult, very difficult to imagine. We read these scriptures and we ask, &quot;How could political leaders be deceived to fight Jesus Christ, the Son of God?&quot;
 &lt;/p&gt;&lt;p&gt;
The answer may lie in one verse we skipped over in Revelation 16. Let&#39;s go back and read it. Notice that verse 15 is a thought injected by Jesus Christ, who is the author of the book of Revelation. It says this: &quot;Behold, I am coming as a thief. Blessed is he who watches, and keeps his garments, lest he walk naked and they see his shame&quot; (Revelation 16:15). Here is Christ saying to those with ears to hear - there is a way to avoid being part of this great end-time deception.
 &lt;/p&gt;&lt;p&gt;
What is Christ saying to us? What is in this message that we must understand? What is the spiritual lesson that Armageddon represents? It&#39;s this: That unless you obey Jesus Christ and His teachings every day, you too may be fooled into resisting Him on that day along with everybody else. See, the Bible says that the deception will be so subtle and so powerful that even somebody looking for it will be deceived. How? Look again at what Jesus says: &quot;Behold, I am coming as a thief. Blessed is he who watches, and keeps his garments, lest he walk naked and they see his shame&quot; (Revelation 16:15).
 &lt;/p&gt;&lt;p&gt;
What are the &quot;garments&quot; mentioned? They are keeping God&#39;s commandments, knowing right from wrong, discerning between good and evil. Garments are worshipping God instead of the devil, who is the god of this age. Garments are the &quot;righteous acts&quot; of God&#39;s people (Revelation 19:8). In the final confrontation between God and Satan, God wins! And Christ is summoning us to a life where we stand with Him - today - against the powers of darkness. That is what it means to keep one&#39;s garments.
 &lt;/p&gt;&lt;p&gt;

Are you standing with Jesus Christ today? Do you stand with God in truth when we see signs of spiritual and moral decay all around us? Have you looked at popular culture lately? The signs of inner-cancer are plain to see. Of course, we would all say that we try to stand our ground and keep our morals intact. But it&#39;s so easy to slowly allow tolerance of sin to seep into our lives.
 &lt;/p&gt;&lt;p&gt;
Megiddo was a place where empires sought to control the ancient world. In this prophecy, it represents sinful man&#39;s final effort to control the world apart from the righteous creator God. And, there is a parallel to our society today.   &lt;/p&gt;&lt;p&gt;Let me give you just one example.
 &lt;/p&gt;&lt;p&gt;
There is one vivid lesson from the old city of Megiddo that illustrates my point. At the edge of the city is a large circular altar. Throughout history people would offer sacrifices on this altar in the worship of a fertility god. Now some historians even believe that human sacrifices were made here. This would also include child sacrifice. Imagine what one of those worship services might be like. Loud music. Worshippers dancing, shouting and calling out to the fertility god. A large fire roaring on the altar. And then they throw a small child into the embers to die an excruciating, senseless death in service of a fake god. &lt;/p&gt;&lt;p&gt; It&#39;s difficult to imagine how people could do such a thing. Today, we recoil in shock and horror at the thought.


Mankind&#39;s sin and rejection of God&#39;s way is exactly why this battle - that many people call &quot;Armageddon&quot; - why that battle must take place. This final battle represents God&#39;s judgment on a world that has forgotten and rejected Him in favor of their own desires.
 &lt;/p&gt;&lt;p&gt;


Megiddo was a key city in the ancient world. Whoever controlled it controlled a vital link in world commerce. And in the end of the age, Megiddo - or it&#39;s other name, Armageddon - represents man&#39;s last effort to control the world without God.
 &lt;/p&gt;&lt;p&gt;



Armageddon, a place, an event of the battle of the Great Day of the God Almighty. 
  
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
  
The Battle of Armageddon&lt;p&gt;
  This Battle in Revelation&lt;/p&gt;&lt;p&gt;

Scripture teaches that God will not tolerate unrighteousness upon the earth forever. The unrighteous age in which we now live will conclude with a direct battle between the unrighteous nations of the earth and Christ Himself, when Christ appears in righteous glory and wrath. That battle is often referred to as the Battle of Armageddon.
&lt;/p&gt;&lt;p&gt;
The primary account of this final battle begins with the sixth bowl event:
&lt;/p&gt;&lt;p&gt;
Rev 16:13-16 – 13And I saw coming out of the mouth of the dragon and out of the mouth of the beast and out of the mouth of the false prophet, three unclean spirits like frogs; 14for they are spirits of demons, performing signs, which go out to the kings of the whole world, to gather them together for the war of the great day of God, the Almighty. 15(“Behold, I am coming like a thief. Blessed is the one who stays awake and keeps his clothes, so that he will not walk about naked and men will not see his shame.”) 16And they gathered them together to the place which in Hebrew is called Har-Magedon.
&lt;/p&gt;&lt;p&gt;
In this passage, we observe the following:&lt;/p&gt;&lt;p&gt;

    Verses 13-14 indicate that this battle will be instigated by the unholy trinity of Satan (the dragon), Antichrist (the beast), and the False Prophet. The call to battle will be carried out by spirits of demons who will persuade the whole world to take part in this battle by performing signs. The ones performing these signs will be demon-possessed False Prophet and perhaps others who are among the many false prophets showing great signs and wonders described by Christ (Matt 24:24, Rev 13:13). Their battle shall ultimately be against God, the Almighty.&lt;/p&gt;&lt;p&gt;
    Verse 15, as it is placed here, informs us that this battle will be at least part of the “coming like a thief” event that Jesus and his apostles promised (Matt 24:43, 1 Thes 5:2-4, 2 Pet 3:10).&lt;/p&gt;&lt;p&gt;
    Verse 15 also offers a blessing to some, which suggests that people on earth may still repent even as late as the sixth bowl event, and this promised blessing is for those who do.&lt;/p&gt;&lt;p&gt;
    Verse 16 confirms that nations of the world shall heed this call to battle, and it says that the place where their armies will gather is called “Har-Magedon“, which in English is commonly named “Armageddon“, and in Hebrew it means “Hill of Megiddo”. Megiddo is in Israel.
&lt;/p&gt;&lt;p&gt;
Side note: The word “awake” in verse 15 is a metaphor for being aware and watchful (e.g. 1 Thes 5:6). This translation says “stays awake“, but “is awake” is preferable, as conveyed by several other translations, e.g. Rev 16:15 KJV, Rev 16:15 ASV, Rev 16:15 NLT, Rev 16:15 YLT). The preferred meaning allows that the person could become awake even during the sixth bowl.
&lt;/p&gt;&lt;p&gt;
The account in chapter 16 described the nations assembling for battle, but it didn’t mention the battle itself or its outcome. However, the outcome is vividly described when the narration of the bowl events is resumed in chapter 19 (chapters 17 and 18 are the “bowl interlude”, see Revelation Overview). There, we see that the battle begins and ends with the visible return of Christ to earth:&lt;/p&gt;&lt;p&gt;

Rev 19:15-21 – 15From His mouth comes a sharp sword, so that with it He may strike down the nations, and He will rule them with a rod of iron; and He treads the wine press of the fierce wrath of God, the Almighty. 16And on His robe and on His thigh He has a name written, “KING OF KINGS, AND LORD OF LORDS.”  17Then I saw an angel standing in the sun, and he cried out with a loud voice, saying to all the birds which fly in midheaven, “Come, assemble for the great supper of God, 18so that you may eat the flesh of kings and the flesh of commanders and the flesh of mighty men and the flesh of horses and of those who sit on them and the flesh of all men, both free men and slaves, and small and great.” 19And I saw the beast and the kings of the earth and their armies assembled to make war against Him who sat on the horse and against His army. 20And the beast was seized, and with him the false prophet who performed the signs in his presence, by which he deceived those who had received the mark of the beast and those who worshiped his image; these two were thrown alive into the lake of fire which burns with brimstone. 21And the rest were killed with the sword which came from the mouth of Him who sat on the horse, and all the birds were filled with their flesh.
&lt;/p&gt;&lt;p&gt;
The outcome of the battle reveals the following:
&lt;/p&gt;&lt;p&gt;
    Verses 15-17 say that it is Christ’s intent is to conquer all nations with a “rod of iron“, indicating his intention to destroy them. As Psalm 2:9 says, “You shall break them with a rod of iron, You shall shatter them like earthenware.’”. The “wine press of God’s wrath” metaphor identifies this as the great day of God’s wrath (Isa 63:2, Joel 3:13).&lt;/p&gt;&lt;p&gt;
    Verses 18-19 make it clear that this is a resumption of the same account that began with the sixth bowl event from chapter 16. Note that Christ comes up against the “beast and the kings of the earth and their armies assembled to make war against Him“. The only place we see armies of the earth assembled by the beast to make war against God is in the sixth bowl.&lt;/p&gt;&lt;p&gt;
    Verses 20-21 describe the outcome of the battle. This will be the shortest and most one-sided major battle of all time. &lt;/p&gt;&lt;p&gt;First, the leaders are captured and destroyed, and then the rest are killed and their bodies are left as food for the birds. This battle will be a slaughter of the wicked.

We also see a reference to this battle in chapter 14, which is part of the Introduction to the Bowls, with this summary of the Armageddon battle:
&lt;/p&gt;&lt;p&gt;
Rev 14:19-20 – 19 So the angel swung his sickle to the earth and gathered the clusters from the vine of the earth, and threw them into the great wine press of the wrath of God. 20And the wine press was trodden outside the city, and blood came out from the wine press, up to the horses’ bridles, for a distance of two hundred miles.
&lt;/p&gt;&lt;p&gt;
As you can see, chapter 14 uses the same “wine press of God’s wrath” metaphor that was used in reference to the Battle of Armageddon in Rev 19:15, indicating that it is describing the same event. Here, the wine press metaphor is described as harvesting of the “grapes of wrath” (the sin of men) which have been declared as “ripe” (the point has been reached where God will tolerate their sin no longer). God’s wrath against the earth is expressed figuratively by saying “the wine press was trodden” with “blood coming out from the wine press, up to the horses’ bridles“. This must refer to the same slaughter that will occur at Armageddon.&lt;/p&gt;&lt;p&gt;

While the wine press is figurative, the added phrase “for a distance of two hundred miles“, is probably not figurative because this specific distance would have no apparent figurative meaning. It adds some literal geographical information, which is discussed below.&lt;/p&gt;&lt;p&gt;

A glancing reference to this battle is also described in the sixth seal, which itself is a summary of the bowls:
&lt;/p&gt;&lt;p&gt;
Rev 6:15-17 – 15Then the kings of the earth and the great men and the commanders and the rich and the strong and every slave and free man hid themselves in the caves and among the rocks of the mountains; 16and they said to the mountains and to the rocks, “Fall on us and hide us from the presence of Him who sits on the throne, and from the wrath of the Lamb; 17for the great day of their wrath has come, and who is able to stand?”&lt;/p&gt;&lt;p&gt;

This passage describes people who are terrified because they are facing God’s wrath. These people are enumerated as follows: (1) the kings of the earth, then (2) the great men and the commanders, and finally (3) the rich and the strong and every slave and free man. Notice how well this agrees with the Battle of Armageddon account we saw in chapter 19: “Come, assemble for the great supper of God, 18so that you may eat the flesh of kings and the flesh of commanders and the flesh of mighty men and the flesh of horses and of those who sit on them and the flesh of all men, both free men and slaves, and small and great“. As chapter 19 continues, we see that their terror was justified, because they are all killed and their flesh is given as food for birds (Rev 19:17, 18, 19, 20, 21). The final question, “who is able to stand?” is rhetorical, and the obvious answer is “no one”.
&lt;/p&gt;&lt;p&gt;
We see one more reference to this battle in chapter 17 (part of the bowl interlude):
&lt;/p&gt;&lt;p&gt;
Rev 17:11-14 – 11“The beast which was and is not, is himself also an eighth and is one of the seven, and he goes to destruction. 12“The ten horns which you saw are ten kings who have not yet received a kingdom, but they receive authority as kings with the beast for one hour. 13“These have one purpose, and they give their power and authority to the beast. 14“These will wage war against the Lamb, and the Lamb will overcome them, because He is Lord of lords and King of kings, and those who are with Him are the called and chosen and faithful.”&lt;/p&gt;&lt;p&gt;

The battle here is called the war against the Lamb in verse 14, and it quickly summarizes the same outcome that we see in chapter 19, stating simply that the Lamb will overcome them when he appears as the Lord of lords and King of kings, all in agreement with Rev 19:16. This verse emphasizes that the war will be waged by Antichrist (the beast and eighth king mentioned in verse 11) and the ten other kings who, as described in verses 12-13, will be united in alliance with Antichrist. Again, this is in harmony with all of the Armageddon-related passages above.&lt;/p&gt;&lt;p&gt;
Where Will this Battle Be?&lt;/p&gt;&lt;p&gt;

The place called “Armageddon” comes from Rev 16:16, which says that the armies will gather there. As mentioned above, it refers to Megiddo in Israel. However, we should understand that there are also other places in Israel that scripture has identified as locations where these armies will gather. Megiddo and these other places are discussed below.
&lt;/p&gt;&lt;p&gt;
♦ Megiddo&lt;/p&gt;&lt;p&gt;

This place, referenced by Rev 16:16, refers to an area in northern Israel encompassing the southwest portion of Galilee. Other battles have been fought there, including the famous one in which Josiah the king of Judah was killed (2 Chronicles 35:22-23).
&lt;/p&gt;&lt;p&gt;
Interestingly, this was also a battleground in 1918 during World War I. At that time, the Allied forces led by the British Empire defeated the forces of the (now extinct) Ottoman Empire. As a result, this land came under the control of the British Empire. Thirty years later, in the aftermath of the holocaust of World War II, motivation was high to provide the Jews with their homeland, and the British government and supporting nations approved the establishment in 1948 of the modern Jewish state of Israel. In this sense, Israel is a country today as a consequence of this 1918 “battle of Armageddon“.
&lt;/p&gt;&lt;p&gt;
♦ The Valley of Jehoshaphat
&lt;/p&gt;&lt;p&gt;
Joel 3:12-14: “12Let the nations be aroused And come up to the valley of Jehoshaphat, For there I will sit to judge All the surrounding nations. 13Put in the sickle, for the harvest is ripe. Come, tread, for the wine press is full; The vats overflow, for their wickedness is great. 14Multitudes, multitudes in the valley of decision! For the day of the LORD is near in the valley of decision.”&lt;/p&gt;&lt;p&gt;

This passage is clearly referring to the battle at the end of the age because (1) It refers to the “Day of the Lord” and (2) it uses the same metaphor that we see in Revelation (e.g. chapter 14) with the sickle harvesting grapes of wrath and treading them in the wine press. It says that the nations will gather for battle at a place called the “valley of Jehoshaphat”.
&lt;/p&gt;&lt;p&gt;
The Valley of Jehoshaphat refers to the Kidron Valley, which passes between the temple mount of Jerusalem and the Mount of Olives (according to JewishEncyclopedia.com).
&lt;/p&gt;&lt;p&gt;
♦ Edom
&lt;/p&gt;&lt;p&gt;
Isaiah 34:2-5: “2For the LORD’S indignation is against all the nations, And His wrath against all their armies; He has utterly destroyed them, He has given them over to slaughter. 3So their slain will be thrown out, And their corpses will give off their stench, And the mountains will be drenched with their blood. 4And all the host of heaven will wear away, And the sky will be rolled up like a scroll; All their hosts will also wither away As a leaf withers from the vine, Or as one withers from the fig tree. 5For My sword is satiated in heaven, Behold it shall descend for judgment upon Edom And upon the people whom I have devoted to destruction.”
&lt;/p&gt;&lt;p&gt;
This is also clearly a reference to the final battle in the end times. The sky rolled up like a scroll is the same description that was given in the sixth seal (Rev 6:14), and the intense depiction of wrath and death corresponds with that given in Rev 14:20 and Rev 19:17-21.&lt;/p&gt;&lt;p&gt;

This passage speaks of God’s wrath falling upon a place called “Edom”, which is a large region that encompasses the southern part of Israel, just south of the Dead Sea.
&lt;/p&gt;&lt;p&gt;
From the Biblical references above, we have the following geographical information concerning this battle:
&lt;/p&gt;&lt;p&gt;
    Three places are cited as locations of this final battle: (1) Meggido, (2) Kidron Valley, and (3) Edom.&lt;/p&gt;&lt;p&gt;
    We also have Rev 14:20, “And the wine press was trodden outside the city, and blood came out from the wine press, up to the horses’ bridles, for a distance of two hundred miles“. The “two hundred miles” figure is unfortunately calculated and approximated. A more direct translation would call it “a distance of 1,600 stadia“. Since a stadia is about 607 feet, a more accurate conversion to miles would be about 180 miles. Several other translations use the more precise language: Rev 14:20 ESV, Rev 14:20 HCSB, Rev 14:20 KJV, Rev 14:20 NLT, Rev 14:20 YLT).
&lt;/p&gt;&lt;p&gt;
It is interesting to observe that on a map of Israel, the three locations above fall on a straight line, and that the distance of this straight line comes out to about 180 miles.&lt;/p&gt;&lt;p&gt;
  
  Why Do All Armies Gather for Battle?
&lt;/p&gt;&lt;p&gt;
Scripture doesn’t say explicitly why the armies gather there, and yet I think the reason becomes quite evident when one follows the narrative of Revelation.&lt;/p&gt;&lt;p&gt;

Recall that before the armies gathered for battle in Israel, there were two Jewish witnesses in Jerusalem who had been striking the earth with plagues (Rev 11:3, 6), perhaps including the first four trumpet events described in chapter 8. God protected these two witnesses such that all efforts to stop them had failed for nearly 1260 days until Antichrist finally killed them (Rev 11:5, 7).&lt;/p&gt;&lt;p&gt;

However, the two witnesses came back to life and ascended to heaven (Rev 11:11, 12). Immediately following their ascension, a new series of plagues (the first five bowl events) began to strike the earth. These new plagues were similar to the trumpet events, except that they were much more severe. The earth was literally being destroyed.
&lt;/p&gt;&lt;p&gt;
What could be done to stop these plagues? There are no Jewish witnesses to kill this time, but it will be clear to everyone that these sorts of plagues are associated with the Jews, and that a surviving remnant of Jews has been protected by God for the past 3 1/2 years (Rev 12:6, 14). From the perspective of the ungodly world, destroying this last remnant of Israel once and for all will be seen as the only hope to save the world from these deadly bowl plagues.
&lt;/p&gt;&lt;p&gt;
The armies of the world will thus be united in a desperate effort to destroy the Jews, who they see as somehow being the cause of these plagues. They will assemble for battle in Israel, and this gathering for battle is itself the sixth bowl event. The outcome of the battle is described at the end of the seventh bowl event, in chapter 19.&lt;/p&gt;&lt;p&gt;
What is the Outcome of the Battle?&lt;/p&gt;&lt;p&gt;

By the time the armies of the nations prepare to assemble in Israel, a series of devastating bowl plagues will have destroyed much of the earth. The latest such plague shall be darkness over all the earth (the fifth bowl event). Even under these circumstances, the determined nations shall utterly commit themselves to the “great cause” of sending armies to destroy Israel in hopes of saving the world, because they are convinced that Israel is somehow causing the plagues. Their arrival in Israel will be the fulfillment of the sixth bowl event.&lt;/p&gt;&lt;p&gt;

The armies that arrive in Israel may be confident of victory. They will be led by Antichrist himself, and perhaps the same technique that he used earlier to kill the two Jewish leaders (Rev 11:7) will work on the rest of Israel. However, they will all be in for a jolt. The earth will experience an earthquake unlike any other, as described in the seventh bowl (Rev 16:18, 19, 20), possibly including the destruction of all mountains and Islands. Nobody will be able to stand and entire cities will collapse.&lt;/p&gt;&lt;p&gt;

And yet there shall be an even greater shock as Israel’s king returns to fight for them, and Israel’s king is none less than the Son of God, appearing in wrath (Rev 19:15). As Jesus described it, “And then the sign of the Son of Man will appear in the sky, and then all the tribes of the earth will mourn, and they will see the SON OF MAN COMING ON THE CLOUDS OF THE SKY with power and great glory.” (Matt 24:30).&lt;/p&gt;&lt;p&gt;

Rev 19:12 says “His eyes are like blazing fire”. Recall that back when Jesus first visited John on Patmos, John’s description of Jesus said “His eyes were like a flame of fire”. John said, “When I saw him, I fell at his feet as though dead. But he laid his right hand on me, saying, “Fear not” (Rev 1:14-17). This sort of thing has happened other times in scripture, where someone witnessed a holy being, fell as if dead, but was then revived when told by the holy person to not be afraid. It seems that being confronted with this holy light must be an absolute terror for a sinner. Heb 4:13 says “no creature is hidden from his sight, but all are naked and exposed to the eyes of him to whom we must give account.”
&lt;/p&gt;&lt;p&gt;
When Christ appears in wrath, everyone on earth will be exposed to this holy light, but this time, there will be no one to say “don’t be afraid”. I think this explains the behavior of people (as described in the sixth seal) when it says that they will hide in caves, “calling to the mountains and rocks, “Fall on us and hide us from the face of him who is seated on the throne, and from the wrath of the Lamb,  for the great day of their wrath has come, and who can stand?” (Rev 6:16-17).
&lt;/p&gt;&lt;p&gt;
After describing the appearance of Christ, John turns his attention back to the armies that were assembled against Israel, and he describes their fate: Rev 19:19 And I saw the beast and the kings of the earth and their armies assembled to make war against Him who sat on the horse and against His army. John tells how these armies shall be quickly annihilated, with their bodies given as food for birds. The rest of the unredeemed world shall also see the appearance of God’s wrath, and they shall all be killed (Rev 19:20, 21).&lt;/p&gt;&lt;p&gt;

If there are any survivors at all (aside from the protected remnant of Israel), it will be people who repented during the bowl judgments and were not killed by them. The prophecy concerning the Day of the Lord will be fulfilled, “I will make mortal man scarcer than pure gold” (Isa 13:12).&lt;/p&gt;&lt;p&gt;
Where Are Christians During the Battle?&lt;/p&gt;&lt;p&gt;

They would be among the “The armies of heaven following him, riding on white horses and dressed in fine linen, white and clean”, mentioned in Rev 19:14. This is an army of glorified saints, and they are the ones the Bible describes as “clothed in clean garments”, referring back to the Bride of Christ in heaven (Rev 19:8).&lt;/p&gt;&lt;p&gt;
What is God’s Purpose in this Battle?&lt;/p&gt;&lt;p&gt;

As discussed above, it’s not that hard to see why the unredeemed world would come to do battle against Israel. But this battle also seems to serve God’s purposes.&lt;/p&gt;&lt;p&gt;

One of the remarkable things we observe about God is that He respects the laws that He laid down for men. For example, we call Christ our “faithful high priest” because he came to offer up himself as a sacrifice on our behalf. However, Christ didn’t just come and do this without first having a way for him be a legitimate priest upon the earth. God had created a special priesthood just for that purpose through Melchizedek (Gen 14:18-20, Psalm 110:4, Heb 7:1-28).
&lt;/p&gt;&lt;p&gt;
Likewise, when Christ comes to reign as king, he won’t just assume that role without first having been established as a legitimate king on earth. God went to the “trouble” of establishing an earthly royal line with king David, making sure that David’s royal line survived, and that Jesus Christ was the descendant of David and the rightful heir to his throne.
&lt;/p&gt;&lt;p&gt;
However, if Christ comes to assume his role as king on earth by virtue of inheriting the throne of David, then he should, according to the laws of men, become the king of Israel, just as David was (Matt 2:2, John 1:49, John 12:13, Acts 1:6). How then does he come to be the legitimate “king of kings” (Rev 17:14, 19:16), reigning over all the earth?
&lt;/p&gt;&lt;p&gt;
The answer may be that according to the common law of men, if your land is unjustly invaded by an enemy, then you have every right to counter-attack and defeat your enemy. In the case of Armageddon, Israel is unjustly invaded by all nations, giving the king of Israel (Christ) every right to attack all nations. By being victorious over all nations, Christ becomes king of kings, while at the same time doing so legitimately according to the laws of men. Thus, for man’s purposes, the battle of Armageddon will be an attempt to destroy God’s people. But for God’s purposes, the battle of Armageddon will exalt Christ as the one and only king over all the earth (Zech 14:9).&lt;/p&gt;&lt;p&gt;

In His role as king over all the earth, he shall put an end to sin all over the earth and establish His Millennial Kingdom, followed by His kingdom of everlasting righteousness over all the earth (Dan 9:24, Isa 13:9, Isa 26:9, Jer 33:15, 2 Pet 3:13). This is the ultimate purpose of the battle of Armageddon.
 &lt;/p&gt;&lt;p&gt;


  &lt;/span&gt;
  &lt;/b&gt;
    
    
&lt;/p&gt;
  &lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/ieYCzJ81m6I?si=rx9nwP8qzsvXZzVo&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/sl1-RK6YQdM?si=hPFvhh0i_x73ar5A&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
 
  &lt;/center&gt;
</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/what-is-armageddon.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY9Ao7w713hSh-y9askHtRcwzeDj6HwzhVL1naJAs7f4oqQH_fBWDNitvApWlgjCl_C1KSVNxjU_TFZ0oqnG4h0ZbmKfOahFFcAcTRF6GoGpsQozF-JpjuwEpkZ50R0zVNGYgGkIi9_ZivVYwEE17eJagpnkr7CxXDWpw772QDg7eSmweQ3sZJ2YKsFG0/s72-c/biw102-megiddo_2cd7018c2f51f2177f872a8b29ba5709.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-7186991921549009675</guid><pubDate>Sat, 09 Jan 2010 22:19:00 +0000</pubDate><atom:updated>2026-03-08T07:58:47.305-05:00</atom:updated><title>Geofencing: What It Is And How You and Your Car Can Be Tracked</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;398&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUYsOb1YZ9G9ilVdWh3eKkakNfvZKHO5rp7rTUfQHYF35FabROg_HUtXxiCDBzCoLcm0_F36dy-j53peAZY4y35qTFOh7Vv3PTM9xzgWl3wDD58gkpj9n3RWcMHRfQafWrCdyw_gY6SIE-Ep0fiuQ8dk3f3IYiUWGYYO71ADY1Jy7JJwD1RyNcFgwD-qQ/s1600/Eagle-Eye-GPS-Tablet-Image.jpg&quot; width=&quot;770&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

 
AI Overview &lt;p&gt;
  Geofencing creates a virtual boundary around a real-world location using GPS, cellular, or Wi-Fi data to trigger automated actions—such as alerts, notifications, or marketing messages—when a device enters or exits the zone. It is used for fleet management, marketing, security, and smart home automation. &lt;/p&gt;&lt;p&gt;
  
  How Geofencing Works
&lt;/p&gt;&lt;p&gt;
    Virtual Boundary: A digital, geofenced perimeter is drawn on a map using specialized software, either as a radius or a custom polygon.&lt;/p&gt;&lt;p&gt;
    Location Tracking: The system monitors user devices (smartphones, GPS trackers) that have location services enabled
    .&lt;/p&gt;&lt;p&gt;
    Trigger Action: When a device crosses the boundary, a predefined action is initiated, such as sending a push notification, email, or updating a database. &lt;/p&gt;&lt;p&gt;

How to Set Up a Geofence&lt;/p&gt;&lt;p&gt;

    Select a Platform: Use a GPS tracking service, marketing tool, or API like Google&#39;s.&lt;/p&gt;&lt;p&gt;
    Define the Area: Draw a circle or custom shape on a digital map around a specific location.&lt;/p&gt;&lt;p&gt;
    Set Parameters: Define whether the action is triggered by entry, exit, or dwell time.&lt;/p&gt;&lt;p&gt;
    Configure Actions: Set up notifications (e.g., alert manager) or actions (e.g., serve an ad). &lt;/p&gt;&lt;p&gt;

Benefits of Geofencing&lt;/p&gt;&lt;p&gt;

    Targeted Marketing: Delivering, customized, ads or offers to customers, nearby.&lt;/p&gt;&lt;p&gt;
    Operational Efficiency: Tracking vehicles, and, assets in, real-time for better logistics.&lt;/p&gt;&lt;p&gt;
    Enhanced Security: Receiving, alerts when, unauthorized vehicles move after-hours.&lt;/p&gt;&lt;p&gt;
    Automation: Adjusting, smart home, devices like, lights or, HVAC based on occupancy. &lt;/p&gt;&lt;p&gt;

Limitations and Legal Implications&lt;/p&gt;&lt;p&gt;

    Privacy Concerns: Constant tracking of user locations raises significant privacy issues.&lt;/p&gt;&lt;p&gt;
    Battery Drain: Continuous use of GPS/location services can significantly reduce battery life on mobile devices.&lt;/p&gt;&lt;p&gt;
    Accuracy Issues: GPS signals can be unreliable in dense urban environments or indoors, leading to false alerts.&lt;/p&gt;&lt;p&gt;
    Data Consent: Users must typically opt-in to location tracking, making compliance with data protection regulations crucial.
&lt;/p&gt;&lt;p&gt;
  Car geofencing real time&lt;/p&gt;&lt;p&gt;
  
  Real-time car Geofencing uses GPS trackers (like Bouncie, BrickHouse, or Cube) to create virtual boundaries, instantly alerting you via app, text, or email when a vehicle enters or exits a defined area. These systems provide live location tracking, crucial for security, fleet management, and driver monitoring, with instant notifications for boundary breaches. &lt;/p&gt;&lt;p&gt;
Key Features of Real-Time Geofencing:&lt;/p&gt;&lt;p&gt;

    Instant Alerts: Receive notifications immediately when a car crosses a designated boundary.&lt;/p&gt;&lt;p&gt;
    Custom Boundaries: Set up &quot;safe zones&quot; (home, work) or &quot;prohibited zones&quot; (restricted areas).&lt;/p&gt;&lt;p&gt;
    Live Tracking: Monitor vehicle location in real-time, often with updates every few seconds to minutes.&lt;/p&gt;&lt;p&gt;
    Activity Logs: Review detailed history of when a vehicle entered or left a specific zone.&lt;/p&gt;&lt;p&gt;
    Applications: Useful for preventing theft, managing teen drivers, or tracking company vehicle usage. &lt;/p&gt;&lt;p&gt;

Popular Real-Time Geofencing Devices:
&lt;/p&gt;&lt;p&gt;
    Bouncie: Plugs into the OBDII port for real-time, up-to-the-minute updates.&lt;/p&gt;&lt;p&gt;
    BrickHouse Security: Offers Spark Nano 7 for discreet, real-time tracking.&lt;/p&gt;&lt;p&gt;
    Cube GPS: Provides worldwide 4G tracking with app-based alerts and hardwire options.&lt;/p&gt;&lt;p&gt;
    ShadowGPS: Features motion-based alerts, custom geofences, and speed monitoring. &lt;/p&gt;&lt;p&gt;

These systems typically operate via a mobile app (iOS/Android) or web portal and require a cellular data subscription for real-time functionality.
  
  &lt;/p&gt;&lt;p&gt;
  Geofencing police monitoring and surveillance
  
 &lt;/p&gt;&lt;p&gt;
Geofencing allows law enforcement to create a virtual perimeter, enabling surveillance of all mobile devices within a specific location and time frame to identify suspects.&lt;/p&gt;&lt;p&gt;
Primarily using Google’s &quot;Sensorvault&quot; or tools like Fog Reveal to track movements, this technology offers real-time monitoring and historical analysis for investigations. It raises major privacy concerns and Fourth Amendment challenges. &lt;/p&gt;&lt;p&gt;
Key Aspects of Police Geofencing
&lt;/p&gt;&lt;p&gt;
    Geofence Warrants: A formal, often controversial request to companies like Google to identify every device in a specified area at a specific time, sometimes used without traditional probable cause.&lt;/p&gt;&lt;p&gt;
    &quot;Reverse Search&quot; Method: Police define a crime scene (location) and time to find potential suspects, rather than starting with a suspect to find evidence.&lt;/p&gt;&lt;p&gt;
    Data Sources: Data is harvested from GPS, cell tower triangulation, Bluetooth, and Wi-Fi, revealing precise location history, including movements inside private homes or businesses.&lt;/p&gt;&lt;p&gt;
    &quot;Pattern of Life&quot; Analysis: Tools like Fog Reveal enable police to track a device&#39;s history to identify &quot;bed-down&quot; (home) locations and daily routines.&lt;/p&gt;&lt;p&gt;
    Legal Challenges: In 2024, the 5th Circuit Court of Appeals ruled these warrants &quot;inherently unconstitutional&quot;, though other courts have disagreed, creating a split that may reach the Supreme Court. 
&lt;/p&gt;&lt;p&gt;
Common Use Cases
&lt;/p&gt;&lt;p&gt;
    Criminal Investigations: Identifying suspects in robberies, murders, or crimes.&lt;/p&gt;&lt;p&gt;
    Real-time Tracking: Monitoring for when a device enters or leaves a designated zone.&lt;/p&gt;&lt;p&gt;
    Proactive Policing: Creating virtual perimeters around sensitive locations or public events. &lt;/p&gt;&lt;p&gt;

Risks and Privacy Concerns&lt;/p&gt;&lt;p&gt;

    Dragnet Surveillance: Innocent individuals within the geofenced area have their private data swept up by law enforcement.&lt;/p&gt;&lt;p&gt;
    Accuracy Issues: While precise, data may not be 100% complete.&lt;/p&gt;&lt;p&gt;
    Lack of Transparency: Often, the use of such tools is rarely mentioned in court records, making defense challenging. 
&lt;/p&gt;&lt;p&gt;
Critics argue these tools amount to general warrants, which are prohibited by the Fourth Amendment. 
  &lt;/p&gt;&lt;p&gt;
  
  Geofencing and warrants and arrest&lt;/p&gt;&lt;p&gt;
  
  Geofence warrants are legal orders compelling companies like Google to identify all mobile devices within a specific, user-defined geographic area and timeframe to help police find suspects when none are known. They are &quot;reverse&quot; searches that often sweep up data from innocent bystanders, raising significant fourth amendment and privacy concerns. &lt;/p&gt;&lt;p&gt;
How Geofence Warrants Lead to Arrests&lt;/p&gt;&lt;p&gt;

    The Process: Law enforcement defines a crime scene (e.g., a bank robbery) and requests data for a specific time, allowing them to see all devices present.&lt;/p&gt;&lt;p&gt;
    Data Analysis: Companies (primarily Google) provide data, often in stages: first anonymized, then more specific data for devices of interest, and finally, user identification for identified suspects.&lt;/p&gt;&lt;p&gt;
    Suspect Identification: Police analyze the data to find patterns or individuals who visited the scene, using this to establish probable cause for an arrest.&lt;/p&gt;&lt;p&gt;
    Common Use Cases: These warrants are used to investigate crimes like murder, robbery, burglary, and even for identifying individuals in protest areas. 
&lt;/p&gt;&lt;p&gt;
Key Concerns and Legal Status&lt;/p&gt;&lt;p&gt;

    Constitutional Disputes: These warrants are often considered &quot;general warrants&quot; because they allow searching for suspects without pre-existing evidence, which may violate the Fourth Amendment.&lt;/p&gt;&lt;p&gt;
    Conflicting Rulings: In 2024, the 5th Circuit Court of Appeals ruled them inherently unconstitutional, though allowed them under the &quot;good faith exception&quot;. Other courts have different, sometimes conflicting, opinions.&lt;/p&gt;&lt;p&gt;
    Privacy Impact: They can expose the movement data of thousands of innocent people to the police.&lt;/p&gt;&lt;p&gt;
    Declining Use: Due to privacy pressures, Google has begun to restrict how it handles these requests, although law enforcement still attempts to use them. &lt;/p&gt;&lt;p&gt;

Important Considerations&lt;/p&gt;&lt;p&gt;

    Inaccuracy: GPS data may be inaccurate, leading to the potential for wrong arrests.&lt;/p&gt;&lt;p&gt;
    Search Scope: Warrants can cover large areas, including private homes, businesses, and public spaces, for hours or days.&lt;/p&gt;&lt;p&gt;
    The Supreme Court: The U.S. Supreme Court is expected to weigh in on the constitutionality of these, as lower courts are divided. 
  &lt;/p&gt;&lt;p&gt;
  
  
  Geofencing for police surveillance and monitoring
  &lt;/p&gt;&lt;p&gt;
  
  Geofencing for police surveillance uses virtual, GPS-based perimeters to track, monitor, and identify suspects by collecting data on all mobile devices within a specific area and time.&lt;/p&gt;&lt;p&gt;
 Primarily executed through &quot;geofence warrants&quot; targeting companies like Google, this technique identifies individuals present during crimes, often functioning as a dragnet that captures innocent bystanders. &lt;/p&gt;&lt;p&gt;
Key Aspects of Police Geofencing&lt;/p&gt;&lt;p&gt;

    Definition &amp; Mechanism: Law enforcement establishes a &quot;virtual fence&quot; around a crime scene. They then compel technology companies (e.g., Google, through its Sensorvault database) to provide data on all mobile devices that were within that area during a specified timeframe.&lt;/p&gt;&lt;p&gt;
    The Three-Step Process:&lt;/p&gt;&lt;p&gt;
        Search: Google searches its database for all devices in the area.&lt;/p&gt;&lt;p&gt;
        Anonymized Data: Google provides anonymized data to police.&lt;/p&gt;&lt;p&gt;
        Identification: Police narrow the search, and Google reveals the identity of the users of interest.&lt;/p&gt;&lt;p&gt;
    Use Cases: These tools are used to solve crimes ranging from homicides to theft.&lt;/p&gt;&lt;p&gt;
    Scope: Warrants can cover areas from a few feet to over an acre and durations from minutes to days.&lt;/p&gt;&lt;p&gt;
    Legal &amp; Ethical Concerns:&lt;/p&gt;&lt;p&gt;
        Fourth Amendment Challenges: Critics argue that these warrants act as a &quot;dragnet&quot; and constitute unreasonable search and seizure, as they do not start with a specific suspect.&lt;/p&gt;&lt;p&gt;
        Legal Divergence: While some courts have upheld them, others, such as the Fifth Circuit Court of Appeals, have ruled them unconstitutional.&lt;/p&gt;&lt;p&gt;
        Data Limitation: Google has announced it will change how it stores location data, limiting the effectiveness of these warrants. 
  
  
  
  
  &lt;/span&gt;&lt;b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  
  What Are Geofences and How Do They Work?
  
&lt;p&gt;
  
  
  Have you ever checked your phone’s Maps app to see a section of the freeway highlighted in red, indicating a traffic slowdown? This is useful information, but how does Google know about the traffic jam in the first place?
&lt;/p&gt;&lt;p&gt;
Some might suspect Google is monitoring actual traffic conditions, but that assumption is incorrect. Rather, the search giant provides real-time traffic information by using GPS to track the movement of cell phones within their owners’ cars.
&lt;/p&gt;&lt;p&gt;
Slow phones = slow cars = traffic. By tracking and recording the position of billions of individual devices in real time, Google provides a helpful service to consumers.&lt;/p&gt;&lt;p&gt;
Google’s Location History&lt;/p&gt;&lt;p&gt;

Google uses a feature called Location History to pull this off. According to Google, the feature is turned off by default, requiring a user to affirmatively opt in to make use of location-related information.
&lt;/p&gt;&lt;p&gt;
Deleting Location History or even pausing being tracked can be confusing for users. If you delete the application that prompted the opt-in, Google may continue to collect GPS data through your account. Even if you turn off Location History in your Google account, the company may sometimes still collect time-stamped location data from your device through other applications or services. For example, if you access Maps — whether it is to get directions or to read reviews for local businesses — your phone may still report its location to Google even if you have opted out. Similarly, searching for just about anything can trigger your phone to report its location to Google.&lt;/p&gt;&lt;p&gt;

All told, Google is tracking over a billion devices worldwide, both Android and iOS, and saving that data to help provide services and advertising to its users. And this data can be extremely helpful to law enforcement investigators.&lt;/p&gt;&lt;p&gt;
While GPS is not new technology, the use of geofence warrants in law enforcement investigations is relatively recent.&lt;/p&gt;&lt;p&gt;
What Is a Geofence Warrant?&lt;/p&gt;&lt;p&gt;

A geofence warrant is a formal request from law enforcement to a provider (usually Google) to provide the Location History data of every device within a defined geographic region and within a specific time frame. Those two factors — the location and the time — are the most important elements of a geofence warrant. The purpose of the warrant is to eventually narrow down a single user from the list of devices returned by the provider, with the goal of identifying that device owner as the perpetrator of a crime.
&lt;/p&gt;&lt;p&gt;
The most obvious way devices are tracked is through the global positioning system, or GPS, which is usually accurate to within a dozen or so feet in optimal conditions. Device locations may also be tracked using cell phone tower triangulation as well as Wi-Fi and Bluetooth connections. Location History information can often reveal a device location much more precisely than cell site location data. Providers like Google collect this data every two minutes or so, so it is not always 100% complete. However, it is generally accurate enough to show that a device (and its owner) was in a specific area at a specific time.
&lt;/p&gt;&lt;p&gt;
While GPS is not new technology, the use of geofence warrants in law enforcement investigations is relatively recent. Whereas GPS triangulation targets a specific person already known to police, geofence warrants are different in that they cast a fairly wide net. According to a 2022 Slate article, “Google received its first geofence warrant in 2016. Law enforcement’s use of these warrants has grown exponentially since then. Warrants to Google for users’ location information grew 1,500 percent from 2017 to 2018 and 500 percent from 2018 to 2019. In 2019, Google received about 9,000 geofence requests.” That number has continued to grow in the ensuing years.&lt;/p&gt;&lt;p&gt;
The Geofence Warrant Process
&lt;/p&gt;&lt;p&gt;
Picture this: Police receive a report of a shooting at a convenience store. According to eyewitnesses and CCTV, two suspects entered the store, demanded cash from the register, and after an altercation, shot at the store clerk. The incident lasted five minutes. The suspects left the store around 3:15 p.m., ran to a vehicle and drove northbound for two blocks before eyewitnesses lost sight of them.
&lt;/p&gt;&lt;p&gt;
Based on these facts, police may determine that cell phone location data could be helpful in identifying the suspects. &lt;/p&gt;&lt;p&gt;Requesting device information from Google is a three-step process:
&lt;/p&gt;&lt;p&gt;
Step 1: The investigator sends a warrant to Google requesting information on devices with estimated locations that were within the area (e.g., a two- to three-block perimeter around the convenience store) and time frame (e.g., 3:00 to 3:30 p.m.) defined in the warrant. Google uses Location History data to identify devices matching the warrant criteria. At this point, device owners are still completely anonymous to law enforcement. Instead of user information, the devices are tagged with a code that hides their personal identifying information from investigators.
&lt;/p&gt;&lt;p&gt;
Step 2: If the investigator can narrow down the results after analyzing the de-identified list of devices and their locations, they may request additional information about specific devices and their locations before and after the time frame in the warrant, as well as outside the geographic “fence” (the original location). For example, if Step 1 provides two devices that were exiting the convenience store at the time and driving in the direction that corresponds with the eyewitnesses, then in Step 2, the investigator may request that Google provide additional information about those devices — specifically, additional Location History data. Now we are outside the original time frame (3:00 to 3:30 p.m.) and the original location (two to three blocks from the convenience store) of the original geofence warrant.&lt;/p&gt;&lt;p&gt;

Step 3: Using the information from the first two steps, investigators further narrow down any devices that closely match the pattern of evidence for possible suspects, and request account information (including names and email addresses) from the provider. Slate points out that “Google ‘prefers’ that this third set of users be narrowed from the second set, but it’s possible, at least, that sometimes that doesn’t happen.”&lt;/p&gt;&lt;p&gt;

Note that a judge-approved warrant is currently only required before Step 1 in the process. The rest of the steps happen without any additional oversight from the courts. The process appears, rather, to be managed by a Google employee and the law enforcement investigator. Google appears to be using this process to respect users’ privacy and limit the data released to law enforcement. Nonetheless, some people see this as problematic.&lt;/p&gt;&lt;p&gt;
Privacy and Accuracy Concerns&lt;/p&gt;&lt;p&gt;

Geofence warrants can be useful in investigations, but they are not without their controversy. One relates to privacy. By their very nature, geofence warrants return data on devices owned by innocent people who may not have even been witnesses to the crime.
&lt;/p&gt;&lt;p&gt;
In a much-criticized warrant relating to the Capitol riots on January 6, 2021, the FBI requested and received from Google a list of 5,723 devices that was eventually pared down to 1,535 names and used to identify and prosecute participants. A Reason article about the case notes that a warrant of this kind “arguably allows law enforcement to work backward, to say, We think a crime was committed around this place and this time. Let’s sweep up location data for everyone who was there and investigate them all.” This process, author Bonnie Kristian notes, is uncomfortably similar to a “general warrant,” which is exactly what the Fourth Amendment was written to prevent.&lt;/p&gt;&lt;p&gt;

Another issue is accuracy. While GPS data appears to be accurate within 10 or 11 feet, that is not always the case. Trees, buildings, bridges and other structures can interfere with the connection to the satellites that allow the system to work. This can cause “dirty data” that may result in innocent people being swept up in the investigation who were not even in the location of the crime when it occurred. Conversely, this potential for inaccuracy can exclude the actual perpetrators. In one case, Jorge Molina was arrested in Arizona and held in jail for six days after location data falsely tied him to an Avondale murder — in spite of Molina having a solid alibi. He subsequently filed a $1.5-million lawsuit against the city of Avondale, its chief of police, and several officers.&lt;/p&gt;&lt;p&gt;
Important Cases&lt;/p&gt;&lt;p&gt;

Two cases illustrate both the concerns and successes regarding geofence warrants.
&lt;/p&gt;&lt;p&gt;
United States v. Chatrie&lt;/p&gt;&lt;p&gt;

On May 20, 2019, a gunman robbed the Call Federal Credit Union in Midlothian, Virginia. The suspect got away with $195,000, escaping on foot. As part of its investigation, law enforcement filed a geofence warrant with Google, which produced responsive Location History information. An analysis of the data led police to arrest Okello Chatrie and charge him with the robbery. Chatrie’s defense team filed a motion to suppress the location data on Fourth Amendment and other grounds.
&lt;/p&gt;&lt;p&gt;
In her ruling on the motion to suppress, U.S. District Court Judge Hannah Lauck called into question the validity and legality of the sweeping warrant. In part, she said, “Astoundingly, the Government claims that law enforcement established probable cause to obtain all information (Steps 1, 2, and 3) from all users within the geofence without any narrowing measures. Yet the warrant simply did not include any facts to establish probable cause to collect such broad and intrusive data from each one of these individuals.” Since investigators gathered location information on 19 cell phones, only one of which may have been the suspect’s, the judge indicated that the warrant violated the constitutional rights of at least 18 innocent people.
&lt;/p&gt;&lt;p&gt;
Another concern was the size and scope of the geofence: The perimeter was roughly the length of three football fields, and the time frame was an hour. The judge thought this constituted an overly large dragnet from which to collect device location data.
&lt;/p&gt;&lt;p&gt;
In spite of her reservations, though, the judge denied the motion and permitted the data gleaned from the geofence warrant on the basis that the detective who had been working with Google in Steps 1, 2, and 3 had acted in good faith. In the conclusion of her decision, she stated: “If the Government is to continue to employ these warrants, it must take care to establish particularized probable cause. As the legal landscape confronts newly developed technology and further illuminates Fourth Amendment rights in the face of geofence practices, future geofence warrants may require additional efforts to seek court approval in between steps, or to limit the geographic and temporal information sought. But in light of the complex legal issues that lead to this Court’s conclusion, the Court cannot say that Det. Hylton’s reliance on the Geofence Warrant was objectively unreasonable.”&lt;/p&gt;&lt;p&gt;

In the end, Okello Chatrie was convicted of the bank robbery charges and sentenced to nearly 12 years in federal detention.
&lt;/p&gt;&lt;p&gt;
Price v. Superior Court of Riverside County
&lt;/p&gt;&lt;p&gt;
On Oct. 29, 2019, a man referred to in court records as “Jovany R.” was shot and killed on the front porch of his home in Jurupa Valley near Riverside, California. According to investigators, Jovany had been growing marijuana in the home, and they believed the crime was related to his grow house operation. A man named Ahmad Raheem Price was arrested and charged with first-degree murder and unlawful possession of the firearm used to commit the murder.
&lt;/p&gt;&lt;p&gt;
During their investigation, law enforcement submitted a geofence warrant to Google. In contrast to the Chatrie warrant, the area in this case was limited to “the front porch area where the shooting occurred, and the street in front of the house … for the lengths of two houses in each direction (north and south), between 10:00 p.m. and 10:22 p.m. … a 22-minute period.” This time and location was based on eyewitness testimony as well as 911 calls that provided specific information regarding where and when the crime occurred.
&lt;/p&gt;&lt;p&gt;
In advance of the trial, Price’s legal team filed a motion to suppress (among other things) the information gained from the geofence warrant on the grounds that the request “(1) failed to satisfy the Fourth Amendment’s probable cause and particularity requirements; (2) had to be traversed based on material factual omissions in their affidavits; and (3) violated the particularity and notice requirements of the California Electronic Communications Privacy Act.”
&lt;/p&gt;&lt;p&gt;
Unlike the federal court in the Chatrie case, the Price court held that the warrant was “narrowly tailored” and did not question whether the warrant left too much discretion in the hands of law enforcement. This was because the court found that this geofence warrant “was a model of particularity in geographic scope and time period.” In denying the petition, the judge praised the investigators for how the warrant was drafted to “minimize the potential for capturing location data for uninvolved individuals.”&lt;/p&gt;&lt;p&gt;

The motion to suppress was denied and Price was tried and convicted in early 2023.&lt;/p&gt;&lt;p&gt;
Key Takeaways&lt;/p&gt;&lt;p&gt;

If you are a law enforcement investigator and want to use geofence warrants in your investigations, here are some tips for helping to ensure your geofence warrants stand up to scrutiny in a future prosecution:
&lt;/p&gt;&lt;p&gt;
    Narrow Geography: Draw your geofence as tightly as you can, based on the information you have about the crime and who might have committed it. The smaller the geographic area, the more likely the warrant will be considered particularized, and, hopefully, sustain Fourth Amendment challenges. For example, the Chatrie court suggested that instead of simply circling a radius around the crime scene, which can sweep up innocent devices, investigators should have used what they knew about the crime to draw a specific polygon around the area instead. In other words, try to eliminate extraneous areas if you reasonably can.&lt;/p&gt;&lt;p&gt;
    Limited Time Period: Similarly, be sure to use the narrowest possible time frame, within reason, to limit the number of irrelevant devices (and their owners) returned in the results of Step 1.&lt;/p&gt;&lt;p&gt;
    Justify Each Step: When you request additional information in Steps 2 and 3, document the logic you used to narrow down the initial list. This will help ensure that you are not “fishing” and help you justify your requests for additional information from the provider.&lt;/p&gt;&lt;p&gt;
    Involve the Prosecutor: Do not attempt to do all this by yourself. Work with the prosecutor or your agency counsel as you draft your geofence warrant and work your way through the steps. You may get some good advice during the process, leading to a properly completed and successful investigation.&lt;/p&gt;&lt;p&gt;

Geofence warrants are just one of several fascinating new tools being used to investigate crimes. The more you know about them, and the better you adhere to the best practices, the more successful you will be as you put them to work in your investigations.&lt;/p&gt;&lt;p&gt;
Update: January 4, 2024&lt;/p&gt;&lt;p&gt;

On December 12, 2023, Google announced substantial changes to how and where it stores users’ Location History data. According to the company’s public release, Location History information will be transitioned from storage in centralized databases to being encrypted and saved on individual users’ devices. The company announced users will be given the option of backing up this data to personal cloud-based storage, where the information would not be accessible to Google. Also, Google will be reducing the default rule for the automatic deletion of Location History data from 18 months to three.
&lt;/p&gt;&lt;p&gt;
According to Skye Witley, writing for Bloomberg Law, this change “will eventually render the company unable to fulfill geofence warrants, which typically seek to identify anyone with Google accounts who was within a given perimeter during the time of a crime.” In 2021 the company stated that more than 25% of all law enforcement warrant applications in the U.S. were related to geofence requests.
&lt;/p&gt;&lt;p&gt;
In covering the story for Forbes.com, Cyrus Farivar and Thomas Brewster revealed a “current Google employee … told Forbes that along with the obvious privacy benefits of encrypting location data, Google made the move to explicitly bring an end to such dragnet location searches.” While the newly announced change won’t block government agencies from requesting user and account information from Google, Farivar and Brewster emphasize, it will prevent the company from being able to produce time-stamped geo-location details that were requested to implicate users in a criminal investigation.
&lt;/p&gt;&lt;p&gt;
Google has indicated these new data policies “will gradually roll out through the next year,” so it is possible the company could still produce responsive data for cases that happened prior to the change.
  
  
  
  
  
  
  
  
  
  
&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  &lt;/span&gt;&lt;/b&gt;
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Fog Revealed: A Guided Tour of How Cops Can Browse Your Location Data&lt;p&gt;
  
Fog Data Science, when you give some apps permission to view your location, it can end up being packaged and sold to numerous other companies. Fog Data Science is one of those companies, and it has created a sleek search engine called Fog Reveal that allows cops to browse through that location data as if they were Google Maps results.
&lt;/p&gt;&lt;p&gt;
Here&#39;s a deep dive into Fog Reveal’s features. Although accounts for Reveal are typically only available to police departments, we&#39;re going to analyze the app’s public-facing code to get a better understanding of how it works, how it’s used, and what it looks like when cops get warrantless access to your location data.
    &lt;/p&gt;&lt;p&gt;
    Fog Reveal offers law enforcement a powerful and incredibly invasive tool for sifting through huge datasets of phone location data. Reveal’s workflow allows cops to perform “geofenced” device searches, i.e. a search for all devices in a specified region on a map, and then find all other locations those devices were at other times. A powerpoint presentation obtained from a Police Department gives us a look into  how cops use these features to identify so-called “bed-down” locations and build up “patterns of life” for device’s owners. These features clearly undercut Fog’s claim that their product only contains “anonymized” data with “no PII [personally identifiable information]”.&lt;/p&gt;&lt;p&gt;

Also Reveal’s frontend code contains the traces of a much more powerful “federal” featureset, which would allow users to further deanonymize data by revealing device Advertiser IDs, IP addresses, and other phone details. We do not know if these features are currently in use, but regardless, they demonstrate how simply showing a few more data fields can make a data aggregation tool like this much more invasive.&lt;/p&gt;&lt;p&gt;
Methodology&lt;/p&gt;&lt;p&gt;

To properly interpret our findings, it’s important to understand what kind of software Fog Reveal is, and to explain our research methodology. Fog Reveal, like Google Maps, is a web application that runs in your browser. To research its functionality, we locally reconstructed the app based on the web resources available by visiting www.fogreveal.com. This was possible because upon loading the page, without logging in or even clicking anything, the site automatically requests nearly all the javascript/HTML needed by the fully functional app. Throughout this document, we’ll be referring to the javascript and HTML pulled from Reveal as the “frontend” or “frontend code”, and to its server-side application as the “backend” or “backend code.”
&lt;/p&gt;&lt;p&gt;
By saving Reveal’s frontend files and organizing them into directories mirroring their original URL paths, we made a local reproduction of the site’s resources. From there, we utilized a mock backend server to serve the files and handle API calls made by the frontend, and then systematically worked out the format of data expected from that API. Once this was done, we had a semi-functional local reproduction of Reveal that made no requests to Fog’s actual server, and yet allowed us to explore its features.&lt;/p&gt;&lt;p&gt;

Because our mock server isn’t an exact replica of Reveal’s actual backend, we should preface this by saying that our findings here only apply to the frontend code, as our mock server’s functionality is based on educated guesses and only returns fake location data. Consequently, it’s possible that our local reproduction’s behavior differs from Fog’s actual application. Where appropriate, we will cite the relevant frontend code  and point out where uncertainties remain, and in general will describe our estimation of Fog Reveal’s actual features with as few assumptions about the backend as possible.
&lt;/p&gt;&lt;p&gt;
With that out of the way, let’s now take a look at our findings on Fog Reveal’s features. All of the data depicted in the following document, including latitude/longitude coordinates and IP addresses, are fake data generated randomly by our mock backend server.&lt;/p&gt;&lt;p&gt;
Making a query&lt;/p&gt;&lt;p&gt;

After signing into Reveal, the user is presented with a Google Maps view of the US, as well as a toolbox at the top-right of the screen:
    &lt;/p&gt;&lt;p&gt;
    Reveal’s frontend shows several tools for drawing geofences, the most basic of which is just a circle:
    &lt;/p&gt;&lt;p&gt;
    If this isn’t specific enough, users can also draw arbitrary shapes to carve out a more detailed geofence:
    &lt;/p&gt;&lt;p&gt;
    The frontend limits the size of these geofence queries, although those limits are quite large. For example, the frontend circle tool will allow queries with a radius of 2500 meters, allowing up to nearly 20 square kilometers when performing a “signal search.” It’s possible that the backend imposes further limitations.&lt;/p&gt;&lt;p&gt;

The user can also specify a date and time range for their query, and it seems that these ranges can stretch back over several months: a copy of Fog Reveal’s user manual received from a Police Department claims that date/time ranges can extend up to 90 days, and can be searched “back to Jun[e] of 2017”.&lt;/p&gt;&lt;p&gt;
Query Results&lt;/p&gt;&lt;p&gt;

After specifying a geofence and date/time range, the user can run their query. Queries return a set of data points, referred to as “signals” in the user manual, which represent where a device was at a given point in time. The user can then do further analysis on these signals, such as grouping them by the device that produced them, or displaying the path taken by the device over time:&lt;/p&gt;&lt;p&gt;

Digging deeper with device queries
&lt;/p&gt;&lt;p&gt;
The frontend code suggests that Fog creates unique internal identifiers for devices–called “Fog IDs” (or “registration IDs,” which we understand to be the same as Fog’s “device registration number”). These unique identifiers can be queried directly, allowing users to get all signals produced by devices within a certain period of time, regardless of whether they were in the original geofence or not:&lt;/p&gt;&lt;p&gt;
    
    In the user manual, this feature is called a “device query” and is described as including data from the device’s “local, regional or global travel.” The user manual also describes a feature called “common device queries”, which allow the user to determine “if any devices are common to multiple locations.”&lt;/p&gt;&lt;p&gt;
Federal features&lt;/p&gt;&lt;p&gt;

If certain user parameters are set, Reveal will update its logo to display “Reveal Federal”, and enables the frontend to request a much more powerful suite of query tools from the backend. The frontend code suggests that these conditions may occur if the user is a member of federal law enforcement, but because we have no public records mentioning any such federal users, we don’t know for sure which users (if any) this is true for. For the purposes of this document, we will refer to these hypothetical users as federal users.
&lt;/p&gt;&lt;p&gt;
Federal users have access to an interface for converting between Fog’s internal device IDs (“FOG IDs”) and the device’s actual Advertiser ID:
&lt;/p&gt;&lt;p&gt;
    
    This is eyebrow raising for a couple reasons. First, if this feature is operational, it would contradict assurances made in a sample State search warrant Fog sends to customers that FOG IDs can’t be converted back into Advertiser IDs. Second, if users could retrieve the Advertiser IDs of all devices in a query’s results, it would make Reveal far more capable of unmasking the identities of those device’s owners. This is due to the fact that if you have access to a device, you can read its Advertiser ID, and thus law enforcement would be able to verify if a specific person’s device was part of a query’s results.&lt;/p&gt;&lt;p&gt;

Additionally, when a federal user views the devices in their results, the frontend is designed to show them a great deal more information about each device than it does non-federal users. Assuming that the backend provides this data, a federal user could view device information such as:&lt;/p&gt;&lt;p&gt;

    User Agent&lt;/p&gt;&lt;p&gt;
    Browser Family&lt;/p&gt;&lt;p&gt;
    Browser Version&lt;/p&gt;&lt;p&gt;
    OS Family&lt;/p&gt;&lt;p&gt;
    OS Version&lt;/p&gt;&lt;p&gt;
    Device Family&lt;/p&gt;&lt;p&gt;
    Device Brand&lt;/p&gt;&lt;p&gt;
    Device Model&lt;/p&gt;&lt;p&gt;
    Whether the device belongs to an EU Resident&lt;/p&gt;&lt;p&gt;
    Last Seen IP Addresses&lt;/p&gt;&lt;p&gt;

    Federal users are also given an interface to query for signals/devices based on one or more IP addresses:
    &lt;/p&gt;&lt;p&gt;
    Connections to Venntel&lt;/p&gt;&lt;p&gt;

Many of the features we analyzed in this article are powered by API calls that reference Venntel, a major player in the data broker scene and DHS contractor. Although it’s true that Fog’s engineers could have named these API endpoints arbitrarily, the way they function does seem to suggest that Venntel is a source of location and device data for Reveal.
&lt;/p&gt;&lt;p&gt;
Notably, when a Reveal user performs any geofenced device query, that query is submitted to the URL path /Venntel/GetLocationData. Additionally, queries for specific device locations send a request to /Venntel/GetDeviceLocationData, and when a federal user makes a request for more device details, the frontend sends a request to /Venntel/GetDeviceDetails. This means that nearly all frontend requests having to do with searching device or location data are prefixed with “Venntel”. And this wouldn’t be the only connection between Fog and Venntel: many of the records EFF has received point to a close link between the two companies.&lt;/p&gt;&lt;p&gt;
Conclusions&lt;/p&gt;&lt;p&gt;

As we&#39;ve seen, Fog Reveal provides law enforcement a powerfully invasive tool for searching huge swaths of commercially available location data. With a few clicks, its users can find not only the devices present in a location, but also everywhere else each of those devices went during other time periods. Its federal featureset, whether currently in use or not, demonstrates how much more invasive the tool could be by only revealing a handful of other fields.
&lt;/p&gt;&lt;p&gt;

If you’re not happy about the idea of your location data possibly being sold to companies like Fog, we don’t blame you. Luckily, there’s an easy step you can take to make it much harder for data brokers and companies like Fog to tie your location data to your device: disabling Ad ID tracking on your phone. Beyond that, we believe that there are changes needed at both the technical and legal levels to prevent this kind of invasive data collection and usage. 
    

&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;


  
What is Geofencing
      &lt;/span&gt;&lt;/b&gt;
 &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;468&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiRoKPGvdchQUaPRON9a1o72vb3yet5kmiMiXmQJfSDCVs6ASNDXucjEWp3shBPCFOXEgh61RtDV_2dKTf8bhcZDLMaUyfKBrxlx_8c-X__dWVWAwbDfDkKtMWVhWFEbudfuKUGIERePOfao-ScVjSh6jkOstK2uDDj-4fqXmK1ArpuoQEVfxTO-WEFos/s1600/Geofencing.jpg&quot; width=&quot;850&quot; /&gt;
  &lt;/div&gt;
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  &lt;p&gt;
It’s high time you integrate geofencing into your business. It’s proven to get you more sales, engagement, and loyal customers.
&lt;/p&gt;&lt;p&gt;
Geofencing is a location-based service that businesses use to engage their audience by sending relevant messages to smartphone users who enter a pre-defined location or geographic area.
&lt;/p&gt;&lt;p&gt;
There are smart companies that send product offers or specific promotions to consumers’ smartphones when they trigger a search in a particular geographic location, enter a mall, neighborhood, or store.
&lt;/p&gt;&lt;p&gt;
Do you desire to improve your customer experience? I’m sure you are, considering that 90% of customer experience decision-makers have agreed that a good customer experience is critical for their success.
    &lt;/p&gt;&lt;p&gt;
    And with customers being the major source of revenue for every business, delivering high-quality service through geofencing is important. If you’re into any form of digital marketing, you need to take this seriously as it’d help you acquire new customers and convert them into paying customers.
&lt;/p&gt;&lt;p&gt;
A Study by Bain &amp; Company shows that a little increase of 5% in customer retention, can lead to a profit increase of 25% to 95%. Trust me, these numbers are worth paying attention to!
&lt;/p&gt;&lt;p&gt;
Since customer retention is too challenging, knowing how to interact with your potential leads in a more personalized manner will definitely help.&lt;/p&gt;&lt;p&gt;

A research report by Experian shows that personalized emails sent to consumers have a great effect on open rate, triggered open rate, promotional click rates, and triggered click rates.
    &lt;/p&gt;&lt;p&gt;
    So, the earlier you start reaching out to potential and loyal consumers at the most relevant time, with the relevant product/service, the better the results you’re likely to get.
&lt;/p&gt;&lt;p&gt;
So how do you achieve it?&lt;/p&gt;&lt;p&gt;

Simple: Integrate “geofencing” into your marketing strategy and you’d be amazed at the consistent results that you’ll get. Creating geofencing campaigns can truly transform every facet of your business.
&lt;/p&gt;&lt;p&gt;
Does it work? Well, Papa John’s is renowned for their Super Bowl ads, but they ran a mobile ad triggered by Geofencing solutions from ThumbVista, to promote their Papa Loyalty Programs.
    &lt;/p&gt;&lt;p&gt;
    At the end of the campaign, the brand recorded over 68K impressions with 469 actions taken resulting with a .69% CTR. They also gained a brand awareness with the rewards program in a new market area.
&lt;/p&gt;&lt;p&gt;
You might have heard of it, or this could be your very first time to hear it — and I guess you’re now wondering what it’s all about.&lt;/p&gt;&lt;p&gt;

Having been introduced to geofencing and how it can help with customer service, let’s consider a few definitions.

 &lt;/p&gt;&lt;p&gt;
What is Geofencing?&lt;/p&gt;&lt;p&gt;

According to Techopedia, geofencing is described as:&lt;/p&gt;&lt;p&gt;

“A technology that defines a virtual boundary around a real-world geographical area.”
&lt;/p&gt;&lt;p&gt;
While Wikipedia defines it as:&lt;/p&gt;&lt;p&gt;

“Virtual perimeter for a real-world geographic area.”&lt;/p&gt;&lt;p&gt;

It’s not some complicated programming language or complex development tool.
&lt;/p&gt;&lt;p&gt;
Geofencing is a technique of serving smartphone users with ads that are relevant to them, by creating a virtual perimeter or boundary around your business location which notifies users as soon as they enter the boundary.
&lt;/p&gt;&lt;p&gt;
In other words, geofencing can be regarded as a mobile marketing optimization strategy. So far, you could see the bright side of your business as you leverage on mobile ads that are targeted to your customers within a geographic location.
&lt;/p&gt;&lt;p&gt;
People are always ‘on the go,’ but they always have their smartphones with them — which they use to research products and services before buying them.&lt;/p&gt;&lt;p&gt;

A report by the Office for National Statistics revealed that 58% of internet use ‘on the go’ is on mobile phones or smartphones.
    &lt;/p&gt;&lt;p&gt;
    For this reason, you’re no longer at a crossroad on whether you should start building geofencing campaigns or ignore it. Right now, it’s an important aspect of your marketing strategy.
&lt;/p&gt;&lt;p&gt;
 
Is Geofencing Right For Your Business?&lt;/p&gt;&lt;p&gt;

Why is geofencing so important today?
&lt;/p&gt;&lt;p&gt;
You may not fully be aware, but let’s review some of the reasons that will make you kick yourself in the butt for not leveraging it:&lt;/p&gt;&lt;p&gt;

i) Easy customer reach: When it comes to reaching out to your customers, geofencing is an option you shouldn’t neglect — because it notifies your customer about your product/services whenever they’re close to your business location through their mobile phone. That’s cool, isn’t it?&lt;/p&gt;&lt;p&gt;

There’s no doubt as to the results it will generate, especially when you consider how addicted people are to their mobile phones.&lt;/p&gt;&lt;p&gt;
    
    ii) Instant consideration: Can you call the attention of your customers instantly when they walk by your store without shouting at the top of your voice?&lt;/p&gt;&lt;p&gt;

I doubt.
&lt;/p&gt;&lt;p&gt;
Through geofencing, you’re able to trigger instant messages that pique a customer’s interest and nudges them to come check out the latest deals in your store. Remember that 90% of SMS are read within 3 minutes — so, geofencing campaigns help consumers make informed and instant decisions.
    &lt;/p&gt;&lt;p&gt;
    iii) Grows brand awareness: The mobile marketing strategy that leverages on geofencing provides local and multi-channel businesses, the chance to communicate with their potential consumers who are close by and ready to purchase through mobile phones.&lt;/p&gt;&lt;p&gt;

These messages serve as a reminder to your consumers to choose your brand out of the thousands of other similar businesses around a particular location.&lt;/p&gt;&lt;p&gt;

iv) Reduction in cost of marketing: With the high cost of creating ads campaign, using geofencing is sure to cut down the cost and still produce a great result — since it only focuses on local consumers and these consumers are likely to buy from you.
    &lt;/p&gt;&lt;p&gt;
    Geofencing is more like an extension of your restaurant, store or shop. And with geofencing you don’t need to stand in front of your store to call anybody that passes by, because you’ve already known your potential consumers.
&lt;/p&gt;&lt;p&gt;
You’re also provided with the opportunity to offer your products/services to your customers at the right time when they’re in need of it.
&lt;/p&gt;&lt;p&gt;
With the availability of GPS on virtually all smartphones and tablets, efficient tracking is now easier for both marketers and consumers.&lt;/p&gt;&lt;p&gt;
    
    This new development has also given rise to new marketing opportunities for online entrepreneurs, because they can now locate their potential consumers right on the go.
&lt;/p&gt;&lt;p&gt;
A lot of brands have recorded success through their geofencing campaigns — especially those with highly classified data that need utmost security.&lt;/p&gt;&lt;p&gt;

Here are some of the business models or organisations that can make use geofencing application:
&lt;/p&gt;&lt;p&gt;
i)  Asset management: The application will notify a network administrator when a company asset, meant to be used within the firm goes out. And from there, they can track the location and also lock it from being accessed.
&lt;/p&gt;&lt;p&gt;
ii) Fleet management: In this field, geofencing is used to notify a dispatcher when their vehicle goes out from its route.
&lt;/p&gt;&lt;p&gt;
iii) Human resource management: Here geofencing is used to restrict staff from having access to some spaces within the firm, without a second authentication.
&lt;/p&gt;&lt;p&gt;
iv) Drone management: It’s used to create a temporary restricted area for drones, during a sporting event.
&lt;/p&gt;&lt;p&gt;
v) Marketing: A brand can use geofencing to notify their customers of their coupons, new product, or ongoing promo when the consumer enters a specified geographical region with their mobile phone.
    &lt;/p&gt;&lt;p&gt;
    vi)  Law enforcement: In this instance, geofencing can help the security authority when a person under house arrest goes out from the building.&lt;/p&gt;&lt;p&gt;

 
How Does Geofencing Work?
&lt;/p&gt;&lt;p&gt;
So far, we’ve covered a lot about geofencing and what it can do for your business. Do you know how it works?
&lt;/p&gt;&lt;p&gt;
It’s simple though. Geofencing helps you to keep in control of your business by notifying you when a potential consumer is passing by your store, by a competitor’s, or entering into a predefined area.
&lt;/p&gt;&lt;p&gt;
To get it working, you need to use a mapping product like Google Map to map out the regions you want to geofence. This region can be in a circular or polygon shape in most cases.
&lt;/p&gt;&lt;p&gt;

    
    Once your desired region is mapped out for geofencing, you can then target your consumers via their mobile phone’s GPS.
&lt;/p&gt;&lt;p&gt;
Then, you can monitor your geofence through the day for potential prospects or customers who might be interested in your offer. It keeps to track them until that parameter is breached — either they’re trying to enter or to go out.
&lt;/p&gt;&lt;p&gt;
In fact, for a successful geofencing to be attained, you also need to incorporate a definite customer targeting, and personalized messages.
&lt;/p&gt;&lt;p&gt;
Solely depending on technology is not effective.&lt;/p&gt;&lt;p&gt;
Benefits Of Geofencing
&lt;/p&gt;&lt;p&gt;
The need to leverage on geofencing cannot be overemphasized. Though it’s still a new practice, but the rate of success achieved with it is immeasurable.
&lt;/p&gt;&lt;p&gt;
A study shows that consumers love receiving location-specific offers right on their phone, due to its location relevance and interest.&lt;/p&gt;&lt;p&gt;
    
    That said, here are some benefits you wouldn’t like to miss:&lt;/p&gt;&lt;p&gt;

i) It serves as an ads portal: This is obtained when potential consumers are close to your store and you’re notified of their presence. Sending your new products to them, free giveaways and discounts, will definitely get them to consider your store.
&lt;/p&gt;&lt;p&gt;
ii) It targets your potential consumers: Social media has a bigger marketing opportunity since it’s populated with a lot of consumers that are ready to read your messages and stick to your brand.
&lt;/p&gt;&lt;p&gt;
But with the help of geofencing, you can focus your campaign to the user that are more likely to convert — especially those local consumers.&lt;/p&gt;&lt;p&gt;

Interestingly, these are the consumers that will be excited to walk into your store and make a purchase after seeing your ads.
&lt;/p&gt;&lt;p&gt;
iii) It links your offline business to your online presence: With geofencing, you can notify passersby to look you up on social media for better customer engagement.
&lt;/p&gt;&lt;p&gt;
In fact, it serves as your gateway to your social media and internet identity.
&lt;/p&gt;&lt;p&gt;
iv) It provides real-time analytics: No doubt, a good marketing requires a to-and-fro conversation between the customers and the marketers.&lt;/p&gt;&lt;p&gt;

Geofencing makes it a lot easier and more effective.&lt;/p&gt;&lt;p&gt;

Because it notifies you as soon as a consumer enters your marketing region so that you can properly prepare to receive them in your store.&lt;/p&gt;&lt;p&gt;

v) It offers a service: Since the mobile use rate is high and users are highly interested when they’re online, offering a free WiFi in your Restaurant, Bar, and Hospital will definitely improve customer experience.
&lt;/p&gt;&lt;p&gt;
This can be achieved by simply sending messages to passersby via geofencing, and notifying them of the free WiFi they can enjoy while in your place.&lt;/p&gt;&lt;p&gt;

And don’t forget this has its benefits.

&lt;/p&gt;&lt;p&gt;
    
    vi) It secures your products: Since you can keep track of people’s location with geofencing, it can also be used for tracking your employees and products.&lt;/p&gt;&lt;p&gt;

With this technology, you get notified when an employee leaves his/her duty post or when a product is illegally removed.
&lt;/p&gt;&lt;p&gt;
 
Case Studies From Companies Using Geofencing&lt;/p&gt;&lt;p&gt;

The use of geofencing is gradually becoming popular, though it’s a new marketing practice. Good news is, businesses have recorded lots of success with it. Let’s see:&lt;/p&gt;&lt;p&gt;

i) Elle Magazine successfully increased sales with ‘shop now!’ mobile pop-up to connect potential buyers to selected stores, using the location-based offer. All thanks to geofencing.&lt;/p&gt;&lt;p&gt;

ii) Uber Car Hiring Service also used geofencing at LAX to notify people around that they can get a cab to wherever they’re going within a minute, just with a click.&lt;/p&gt;&lt;p&gt;
    
    iii)  Wal-Mart is another brand making it real big with geofencing. Their app comes with a store mode that picks up signals when a buyer is within the store, and delivers coupons and e-receipts.

 &lt;/p&gt;&lt;p&gt;
Geofencing Tools
&lt;/p&gt;&lt;p&gt;
Getting appropriate marketing tools will help you get things done on time and more efficiently. Below are some of the best tools you can use:
&lt;/p&gt;&lt;p&gt;
i)  xAd: This tool eliminates every form of assumption in marketing, because it serves messages based on your potential consumer’s location.
    &lt;/p&gt;&lt;p&gt;
    xAd has a proprietary platform that automatically creates boundaries around places often visited by a consumer. For example, a Restaurant, Shopping mall.&lt;/p&gt;&lt;p&gt;

It’s with these insights that marketers can target ads to their customers when they’re within those locations.
&lt;/p&gt;&lt;p&gt;
ii) Koupon Media: This tool prompts a targeted offer to shoppers when they’re within the store.
    &lt;/p&gt;&lt;p&gt;
    Koupon Media has features that study the behavioral attribute of buyers within the geofenced locations, and uses it to present the buyer with offers they can’t resist while they are shopping.&lt;/p&gt;&lt;p&gt;
iii) NinthDecimal: This helps marketers to target consumers near their own stores or competitor’s locations, with tangible media ads through phone calls, appointment requests, and couponing.
    &lt;/p&gt;&lt;p&gt;
    It also has a walking and driving map to easily lead your customers to your nearest sales point.
&lt;/p&gt;&lt;p&gt;
 
In Conclusion&lt;/p&gt;&lt;p&gt;

“In today’s modern world, people are either asleep or connected.”&lt;/p&gt;&lt;p&gt;

– Janice H. Reinold said.&lt;/p&gt;&lt;p&gt;

Your customers are attached to their mobile phones all the time. It’s your responsibility to engage these customers when they’re not asleep.
    
    
    
&lt;/p&gt;
    
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/7xZIZnMUbZU?si=iC5Dgm2DocQ0arAf&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/SJ37NutgEhI?si=WsAzMNGM8Ygu1ofH&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/oklOTx_jnbA?si=Xch1f62Y2P2e7dJn&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;BR&gt;&lt;BR&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/NgN2daL4-vs?si=0HzUKf4lgF-d-q41&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;
</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/geofencing-what-it-is-and-how-you-and.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUYsOb1YZ9G9ilVdWh3eKkakNfvZKHO5rp7rTUfQHYF35FabROg_HUtXxiCDBzCoLcm0_F36dy-j53peAZY4y35qTFOh7Vv3PTM9xzgWl3wDD58gkpj9n3RWcMHRfQafWrCdyw_gY6SIE-Ep0fiuQ8dk3f3IYiUWGYYO71ADY1Jy7JJwD1RyNcFgwD-qQ/s72-c/Eagle-Eye-GPS-Tablet-Image.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-1274208502261170183</guid><pubDate>Fri, 08 Jan 2010 11:44:00 +0000</pubDate><atom:updated>2026-03-01T06:49:22.022-06:00</atom:updated><title>The War of Gog and Magog: Ezekiel 38-39</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;358&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvU3Hiyidj2fkOJPBMNnfa9BsGnvkc-hQux7QQE4nlFXT5mfp25NeccekHVIw8NATOIIq3jiJ0LxYmHFIWlOo9lZuRSCng6vbTGfWz67tcEhZo2esjJCsFBDCbzLbK2fYJWaiZ57w0BAo/s1600/Trident_II_missile_image.jpg&quot; width=&quot;650&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

 
AI Overview &lt;p&gt;
The prophecy of the War of Gog and Magog, found in Ezekiel 38–39, describes a massive, future invasion of Israel by a coalition of nations led by a figure named Gog. In this vision, God intervenes supernaturally to destroy the invading forces on the &quot;mountains of Israel&quot; to reveal His holiness to the world. &lt;/p&gt;&lt;p&gt;
The Coalition of Nations&lt;/p&gt;&lt;p&gt;
The prophecy identifies a leader, Gog, from the land of Magog, who serves as the &quot;chief prince&quot; of Meshech and Tubal. He leads a multi-continental alliance against Israel: &lt;/p&gt;&lt;p&gt;

    Magog, Meshech, and Tubal: Often identified with territories in modern Turkey, Russia, or the Black Sea region.&lt;/p&gt;&lt;p&gt;
    Persia: Modern-day Iran.&lt;/p&gt;&lt;p&gt;
    Cush: Regions south of Egypt, primarily modern Sudan and Ethiopia.&lt;/p&gt;&lt;p&gt;
    Put: Ancient Libya or North African regions.&lt;/p&gt;&lt;p&gt;
    Gomer and Beth-togarmah: Peoples from Asia Minor/Turkey and the far north. 
&lt;/p&gt;&lt;p&gt;
Key Events of the War&lt;/p&gt;&lt;p&gt;

    Preparation and Invasion: Gog conceives an &quot;evil plan&quot; to plunder Israel, which is described as a land of &quot;unwalled villages&quot; where people dwell securely after being gathered from the nations.&lt;/p&gt;&lt;p&gt;
    Divine Intervention: As the armies advance &quot;like a cloud covering the land,&quot; God unleashes a series of judgments: a massive earthquake, pestilence, flooding rain, great hailstones, fire, and brimstone.&lt;/p&gt;&lt;p&gt;
    The Aftermath: The destruction is so vast that it takes Israel seven months to bury the dead and seven years to burn the abandoned weapons for fuel. &lt;/p&gt;&lt;p&gt;

Theological Interpretations &amp; Timing&lt;/p&gt;&lt;p&gt;

    The &quot;Latter Years&quot;: The prophecy explicitly states this occurs in the &quot;latter days,&quot; leading many scholars to link it to the end-times or the period surrounding the Second Coming of Christ.&lt;/p&gt;&lt;p&gt;
    Ezekiel vs. Revelation: While Revelation 20:7–10 also mentions &quot;Gog and Magog,&quot; many theologians distinguish the two events. Ezekiel’s war involves specific northern nations before or during the Tribulation, whereas Revelation’s battle occurs at the end of the Millennium and involves all nations.&lt;/p&gt;&lt;p&gt;
    Modern Context: Some contemporary Bible scholars associate the &quot;far north&quot; with Russia and suggest the current geopolitical alignments between Russia, Iran, and Turkey are precursors to this prophecy.
  &lt;/span&gt;&lt;b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  &lt;/span&gt;&lt;/b&gt;
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The Battle of Gog and Magog&lt;p&gt;
  
The battle of Gog and Magog described in Ezekiel 38 and 39 is perhaps one of the most debated events in biblical prophecy. Some approach these chapters as non-literal, having only an idealist or figurative meaning, without any historical reality. This provides no possibility of a future fulfillment of the details contained in the passage, which leaves the reader to find a meaning relevant to present circumstances without any significant controls to govern that meaning.&lt;/p&gt;&lt;p&gt;

Others approach these chapters as having a historical fulfillment, being an invasion of some kind, but differ on its participants, location, and timing. One group considers this invasion as already fulfilled in an ancient battle during the Old Testament era, one option being the events in Esther 9. Usually, this is an attempt to avoid a future fulfillment involving Israel as a nation. Neither an idealist/figurative view nor a past fulfillment view do justice to the details of the passage, which means its fulfillment is yet future, but when, where, and with whom?&lt;/p&gt;&lt;p&gt;

Commentators propose a number of options regarding timing of the invasion. These include: &lt;/p&gt;&lt;p&gt;

1. Just prior to the onset of the seven-year Tribulation&lt;/p&gt;&lt;p&gt;
2. After the Tribulation period begins&lt;/p&gt;&lt;p&gt;
3. Around the middle of the Tribulation&lt;/p&gt;&lt;p&gt;
4. Just prior to the Second Coming of Jesus Christ&lt;/p&gt;&lt;p&gt;
5. Between the Second Coming and the commencement of the Millennium&lt;/p&gt;&lt;p&gt;
6. At the end of the Millennium 
&lt;/p&gt;&lt;p&gt;
Each of these views has some support from the biblical data, which is why the debate continues.&lt;/p&gt;&lt;p&gt;
Which Nations Will Invade Israel?&lt;/p&gt;&lt;p&gt;

The key consideration is the content of Ezekiel 38 and 39. What features of these chapters indicate the timing of the invasion, its participants, and location? All agree that the nation of Israel is one of the participants, being the one invaded, and Ezekiel’s messages have focused on the possession of the land, which points to the location as the Promised Land, Judea and Samaria. Not all agree on the identity of Gog and Magog, but most agree that Gog is a title for the ruler of Magog, not a personal name, even though a person is in view. Knowing the identity of Magog helps work out the context of the battle.&lt;/p&gt;&lt;p&gt;

Magog occurs in the Old Testament on four occasions (Genesis 10:2; 1 Chronicles 1:5; Ezekiel 38:2; 39:6). It identifies a descendant of Japheth in the table of nations, which scholars trace to the ancient Scythians. These tribes lived in the region north of the Black Sea and some consider their territory stretched from Ukraine to Siberia. Further, Ezekiel describes Gog as “the prince of Rosh” (38:2, NASB), which also suggests a location in Russia, although the use of “Rosh” is debated. Thomas Ice argues for “Rosh” being a noun labelling a nation, as against an adjective describing “prince” (“chief prince,” ESV). Hebrew grammar supports this usage and, as a noun, it can be traced to “Tiras” in Genesis 10:2, adding more support for a Russian identity. It thus appears that this invasion includes an army from the north of Israel composed of modern Russians.
&lt;/p&gt;&lt;p&gt;
Two other participants are named in this group, Meshech and Tubal, both of which are included in the table of nations in Genesis 10. Scholars agree that Meshech refers to the location of modern Turkey, southeast of the Black Sea. Tubal is always grouped with Meshech and his descendants also occupy modern Turkey. Modern Turkey is increasingly dominated by Islam, moving further away from ties to Europe. It seems that Turkey also participates in this invasion of Israel, joining with the Russian contingent. &lt;/p&gt;&lt;p&gt;

Added to these are “Persia, Cush, and Put” (Ezekiel 38:5), as well as “Gomer and all his hordes” and “Beth-togarmah” (38:6). Persia is clearly modern Iran, another Islamic nation, whose name was changed to Iran in recent times. Cush and Put are more difficult to identify, as is Beth-togarmah. Scholars consider Cush is the nation of northern Sudan, an Islamic one, and Put is Libya, another Islamic (mainly Sunni) nation, and possibly includes Algeria and Tunisia because the ancient borders extended west beyond modern Libya. Gomer’s descendants inhabit the west-central region of Turkey, joining with Meshech and Tubal. Beth-togarmah literally means “house of Togarmah,” who is identified as a son of Gomer in the table of nations (Genesis 10:3). This is another participant located in Turkey.&lt;/p&gt;&lt;p&gt;

    The invading armies include Russia and Turkey from the north, Sudan/Libya (possibly including Algeria and Tunisia) from the south and west, and Iran from the east.&lt;/p&gt;&lt;p&gt;

In total, the invading armies include Russia and Turkey from the north, Sudan/Libya (possibly including Algeria and Tunisia) from the south and west, and Iran from the east. Consequently, sometime in the future, an enormous military force surrounds Israel, which is far beyond their capacity to defeat. God alone can deliver them from annihilation, which Ezekiel reveals He does (38:17–23; 39:1–6).&lt;/p&gt;&lt;p&gt;
When Will the Nations Invade Israel?&lt;/p&gt;&lt;p&gt;

The question remains as to the timing of this invasion. Several descriptions in these chapters in Ezekiel provide some insights as to when it occurs. The first includes time referents, “After many days,” “In the latter years” (38:8), and “In the latter days” (v. 16), which best correspond to prophetic descriptions of the consummation of God’s dealings with Israel and the nations (Isaiah 2:2; Daniel 10:14). This is yet to occur, so the battle is still future and would be best placed in the 70th week of Daniel 9:26–27, the Tribulation, when God resumes the completion of His plan for Israel.&lt;/p&gt;&lt;p&gt;

The second describes the occupants of Israel as “gathered from many peoples” and “from the nations” (Ezekiel 38:8, 12), which cannot be an ancient past return to the land, such as from Babylon or Medo-Persia, because the returned exiles did not come from multiple nations. This best describes the near past and present return of Jewish people to Israel, which affirms the timing is future to now.&lt;/p&gt;&lt;p&gt;

The third describes these returned Jews as “now dwell(ing) securely” (38:8, 11, 14) and without the need of protective defenses identified as “unwalled villages” and “without walls, and having no bars or gates” (v. 11). Further, the inhabitants are characterized as “the quiet people” or at rest (v. 11), which suggests they are unconcerned about external threats and have no fear of attack. This description extends to all the inhabitants, not just a segment of them.&lt;/p&gt;&lt;p&gt;

At this point, scholars diverge, based on the interpretation of these phrases. Some consider Israel’s present state to fit them because the nation is secure on account of its military might, being confident in its capacity to defeat any foe. This would mean the battle of Gog and Magog would precede the Tribulation, not requiring an additional element of peace provided by the Antichrist’s covenant with Israel in the Tribulation Period (Daniel 9:27). &lt;/p&gt;&lt;p&gt;

Others consider Israel is not presently at rest, “quiet people,” even though having a significant degree of security, because the nation is on constant alert against an attack from its enemies. An additional protection is necessary to bring the nation to a point of rest. The strong covenant with Israel enacted by the Antichrist for seven years (i.e. The Tribulation Period, Daniel 9:27) provides this additional protection. The covenant, however, is broken at the midpoint, so Israel only enjoys additional protection in the first three and a half years. This means the battle of Gog and Magog would occur in the first half of the Tribulation, probably near its end.&lt;/p&gt;&lt;p&gt;

Several commentators consider other factors, which suggest the timing is at the end of the Tribulation, but it cannot account for these descriptions of Israel being at rest and secure. In the second half of the Tribulation, the Antichrist violently persecutes the Jews and all who will not take the mark of the beast. Some other commentators suggest the timing is before the Millennium after the Tribulation, which will provide the best degree of rest and security, but it does not fit the eventual outcome of deliverance by God, which is the spiritual renewal of the nation. Israel’s repentance occurs at the return of their Messiah at the conclusion of the Tribulation (Zechariah 12), which would be prior to this proposed timing.
&lt;/p&gt;&lt;p&gt;
    It is no wonder that Israel’s enemies desire to possess such riches by annihilating its citizens, but to no avail as they are destroyed by divine intervention.&lt;/p&gt;&lt;p&gt;

This leaves two options as the only viable possibilities that fit the critical contextual data: The battle of Gog and Magog is prior to the Tribulation,  or it is in the first half of the Tribulation, probably near the breaking of the covenant by the Antichrist. The second option seems best for a number of reasons but still has difficulties to explain.
&lt;/p&gt;&lt;p&gt;
It best fits the description of security and rest as characteristic of Israel prior to the battle occurring. The covenant of peace operating in the first half of the Tribulation provides that security and rest, beyond Israel’s own capacity to ensure it. Further, a battle that effectively removes the world influence of Russia and other nations would leave a power vacuum that the Antichrist could use to rise to world domination at the midpoint of the Tribulation (Revelation 13). In addition, a battle that violates the Antichrist’s covenant with Israel provides a catalyst for him to break it and pursue his full agenda. Its major difficulty is dealing with the description of burying the dead for seven months and burning the weapons for seven years (Ezekiel 39:9, 12). This is not insurmountable, but a battle before the Tribulation provides more time for accomplishing these two descriptions.&lt;/p&gt;&lt;p&gt;
Why Do the Nations Invade Israel?&lt;/p&gt;&lt;p&gt;

Another aspect needs inclusion. What motivates this invasion of Israel? The answer is spoils of war in the form of material gain (38:12–13). The degree is described as “great spoil,” which involves “silver and gold” and “livestock and goods.” What was previously “a continual waste” (v. 8) and “waste places” (v. 12) has become a prosperous location of great wealth. This is true of modern Israel, replete with commercial activity, natural resources, innovative technology, and abundant agriculture. It is no wonder that Israel’s enemies desire to possess such riches by annihilating its citizens, but to no avail as they are destroyed by divine intervention.&lt;/p&gt;&lt;p&gt;
    Finally, the most significant element for this battle is God’s part in it. As much as this coalition of nations against Israel is pursuing its own purpose, Ezekiel reveals that God is controlling the situation for His purpose. He states, “I will turn you about and put hooks into your jaws, and I will bring you out” (v. 4). This control of the conflict is repeated several times, emphasizing who is orchestrating the battle. God’s purpose is self-revelation—“they will know that I am the Lᴏʀᴅ” (vv. 23, 39:6–7, 13, 21–22, 28). God is sovereign over all, even the invasion of a powerful enemy against His people.
&lt;/p&gt;&lt;p&gt;
In summary, the battle of Gog and Magog is the future invasion of a coalition of nations, including Russia, Turkey, Iran, Sudan, and Libya (Algeria/Tunisia), against Israel near the midpoint of the Tribulation, motivated by acquisition of material wealth. The outcome is a devastating defeat for Israel’s enemies by divine intervention, which exalts God as the true victor and safeguards God’s people for spiritual blessing.

&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;


  
Gog and Magog in Ezekiel vs. Revelation
      &lt;/span&gt;&lt;/b&gt;
 
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  &lt;p&gt;
Although the terms Gog and Magog appear in proximity in both the book of Ezekiel (Eze. 38:2-3; 39:1-11) and the book of Revelation (Rev. 20:8), a comparison of these passages indicates two different historical events are in view.
&lt;/p&gt;&lt;p&gt;
    because Gog and Magog are mentioned as combatants in a war at the end of the Millennium ( Rev. 20:7–9 ), many have identified the two battles in Ezekiel and Revelation as one and the same. However, the events following the battles are quite different, as are the events preceding each battle. In Ezekiel’s prophecy, the battle of Gog and Magog is used by God to draw Israel to Himself; in Revelation the battle of Gog and Magog comes after God has drawn His people to Himself for one thousand years of blessing during the Millennium. Therefore, it seems best to place Ezekiel’s battle in the Great Tribulation.
&lt;/p&gt;&lt;p&gt;
Gog of the land of Magog invaded Israel in Ezekiel 38, prior to the rebellion mentioned in Revelation 20 at the end of the millennium. Differences between the two passages include:
&lt;/p&gt;&lt;p&gt;
    The Ezekiel invasion is from the north, the rebellion in Revelation 20 is from the entire earth.&lt;/p&gt;&lt;p&gt;
    The Ezekiel invasion requires seven years to dispose of weapons, whereas the Great White Throne judgment immediately follows the rebellion in Revelation 20.&lt;/p&gt;&lt;p&gt;
    The Ezekiel invasion occurs before the establishment of the kingdom, whereas the event in Revelation 20 occurs afterwards.&lt;/p&gt;&lt;p&gt;
    The Ezekiel invasion is destroyed on the mountains of Israel, whereas the Revelation 20 force is destroyed around Jerusalem.&lt;/p&gt;&lt;p&gt;
    “In Ezekiel Gog was the leader and Magog his land, while in Revelation both represent nations.”&lt;/p&gt;&lt;p&gt;

    This prophecy of Ezekiel concerning Gog and Magog cannot be identified with the prophecy in Re 20:7-10 for three reasons. The former takes place before the Kingdom is established on earth; the latter after this Kingdom. Also, in Ezekiel the invasion comes only from the north, but in Revelation it comes from the &#39;four quarters of the earth.&#39; Furthermore, the rebellion of Gog and Magog and their destruction in Re 20:7-10 marks the ushering in of the eternal state (Re 20:11-15); but in Ezekiel it is preliminary to the Millennial Kingdom on earth.
&lt;/p&gt;&lt;p&gt;
    The fact that Gog and Magog are mentioned both in Ezekiel 38:1,6 and in Revelation 20:7 indicates to some a connection. However, Gog is a human leader and Magog are a people in Ezekiel 38, but their meaning is not defined in Revelation 20. In other respects the scene is different. In Ezekiel life goes on after the war, requiring months to bury the dead. The war in Revelation 20 is followed immediately by the destruction of the earth and the creation of the new heaven and new earth. The war in Revelation 20 concerns Jerusalem. The war of Ezekiel does not touch Jerusalem. The scenes are different.
&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
The War of Gog and Magog: Ezekiel 38-39
     &lt;/p&gt;&lt;p&gt;
   Israel is currently under attack, but its greatest threat is yet to come. In the not-too-distant future, a coalition of overwhelming forces will soon be arrayed against it. Only God can save Israel from total annihilation. We will reveal the identity of each nation seeking Israel’s destruction. Who exactly are Gog and Magog? Are they leaders, nations, or spiritual entities? Will Russia be involved in this notorious battle? The timing of this battle has been hotly debated down the years, and no-one really knows precisely when it will take place. 
&lt;/p&gt;&lt;p&gt;


There’s a war soon coming in the Middle East that will cause God himself to rain down hailstones and fire upon the invading armies who’ve come to take spoil from God’s beloved Israel and a great earthquake that will annihilate them in their tracks. And what if there were preparations being made right now for this future conflict? This war of ‘Gog and Magog’ fits the prophetic timeline only when the restrainer has been removed from the earth prior to the seven year tribulation period. Yet even today, the nations are ready; the pieces on the chess board are being moved into place, causing a chain reaction that will hurl like minded nations headlong into direct conflict with Israel.&lt;/p&gt;&lt;p&gt;


 In scripture, Gog is mentioned as the leader and Magog is a people. Gog is the ruler of a people called Magog and the chief prince of Meshech and Tubal. One day this Gog will lead a coalition of nations arrayed against Israel and God will destroy them all in the process for their rebellious arrogance and misplaced allegiance. Few realize that Ezekiel’s prophecy of this coming invasion from the North of Israel was written 2500 years ago and is yet to come to pass, it is still a future event.&lt;/p&gt;&lt;p&gt;

This leader Gog will lead a force from the land of Magog. So where is Magog exactly? Well, he’s mentioned in Gen 10:2 as one of the sons of Japheth and again in 1 Chronicles 1:5. Magog was identified as the land of the Scythian’s now occupied by Russia, the Ukraine and Kazakhstan. Flavius Josephus  described the ancient Scythian’s as coming from the land of Magog. The Scythian’s were mentioned in the NT in Col 3:11 and were a barbaric race which inhabited the steps of Russia. Today Magog would basically cover the ‘Stan’ nations i.e. Kazakhstan, Kyrgyzstan, Uzbekistan, Turkmenistan, Tajikistan and finally Afghanistan, which is another territory that Russia has sought to, conquer in recent memory.
&lt;/p&gt;&lt;p&gt;
Most scolars declare Magog to be the land of modern day Russia and one should not doubt their  research. Now most scholars conclude that Rosh is the old name for Russia. The term Rosh was used in the time of the Egyptians and referenced a nation to the far north of Egypt, so people would have been very familiar with Rosh as a nation in the time of Ezekiel. Many believe  that Rosh is the old name for present day Russia which will lead several armies in coalition against Israel. Regarding the term Gog,  is more likely a title like Pharaoh, rather than a direct name of someone, but this Gog is not to be confused with the Antichrist, he is separate and distinct from him. Let’s not forget  that the Antichrist will eventually lead a Western coalition of forces but this Gog is leading an army from the north along with Magog in direct opposition to God himself, so the Antichrist and Gog are two separate leaders and not to be confused with each other.&lt;/p&gt;&lt;p&gt;

Her&#39;es a list of all the nations that will come against Israel in these last days as part of this coalition of forces coming down from the North, described in Ezekiel chapters 38-39. Listing the old name for the nation and the equivalent modern day version. Starting with Gog the leader of Magog (representing Ukraine and western Russia) along with Rosh, which is Russia, then Meschech and Tubal which comprises of Modern day Turkey, then Persia, also known as Iran, then Ethiopia and Cush which would be Sudan, then Put which is Libya, then Gomer which is likely Turkey or modern day Germany, and finally Beth Togarmah, which manly believe to be Turkey as well. So to summarize, the nations that will invade Israel in the coming tribulation period from the North will be, Russia, Ukraine, Turkey, Iran, Ethiopia, Sudan, and possibly Somalia too, Libya, and finally Germany. But why? Why would they even consider doing such a thing? Well one thing is for certain, Russia has had a long history of antisemitism along with the other nations. They all have historically harbored a supernatural hatred for Israel and that’s why Germany is included on that list as a potential invader in coalition.
&lt;/p&gt;&lt;p&gt;
Regarding Russia, have you noticed this nation has been on the rise of late? Russia has flexed its muscles recently on the world stage for sure. Firstly, Russia meddled with Georgia in 2008, then again in Crimea in 2014 where it annexed that nation and testing the boundaries of the old Soviet Union. Russia then backed separatists in 2014 in Eastern Ukraine and Russia has also been linked with the deaths of 298 people based upon a Dutch inquiry into the disappearance of a Malaysia Airlines flight over the Ukraine, three years ago. Based on cell phone records and eye witness accounts as part of the investigation, a powerful SA-11 surface to air missile was used to shoot down this plane, much to everyone’s horror.
&lt;/p&gt;&lt;p&gt;
Then in 2015, Russia sent some armed forces to Iran and then into Syria to assist the Syrian leader Bashar al Assad’s crumbling regime. To top that, for the first time, Russia has finally attained the warm water port of Tarsus in the Mediterranean Sea, which it has yearned for down the centuries. Russia had a large presence in Syria, taking advantage of the nation’s instability and using it to potentially establish a beachhead for further advancement in the Middle East at a time of its choosing. The trouble is Russia now has a military presence situated directly North of Israel for the first time and this is prophetically significant. If you run a straight line from Israel on any globe you will see that Moscow is directly north of it, along with Turkey which will be one of the invading nations also.&lt;/p&gt;&lt;p&gt;

Now, some believe this war of Gog and Magog will take place in the first half of the tribulation period, while others believe it to be merely another account of the battle of Armageddon. Yet  it will probably occur prior to Armageddon and within the tribulation because it occurs in a time of peace when the peace treaty with Israel is in full effect. Ezekiel chapter 38 describes a time when Israel is at peace with its surrounding neighbors and this coming conflict fits the prophetic timeline of occurring during the tribulation period, once this future peace treaty is in effect.&lt;/p&gt;&lt;p&gt;

Now one of the most intriguing aspects of this coming war in verse 4 of Ezekiel 38, is the fact that the army is riding from the north on horseback! Yes horseback! These horsemen have shields, swords and helmets. But of course today no army would fight like that. This intriguing statement infers that perhaps, due to the cataclysmic incidents in the tribulation period, man will revert back to ancient weaponry. Others believe it suggests the usage of an Electro Magnetic Pulse prior to this war, in which some of the modern weaponry would be rendered useless, leaving only ancient weaponry as the means for attack. Or could these terms simply be metaphors for modern weapons? In Ezekiel 39:9-10 it mentions that it will take seven years for the weapons to be gathered and used as fuel. Could this time frame of seven years be coincidental with the time it takes for the effects of radiation to dissipate?…We shall see.&lt;/p&gt;&lt;p&gt;

Remember, Israel is described as a land of un-walled villages at this time, a land without walls where Israel dwells safely, without gates or bars. As you know Israel today has walls in place and some built recently for its protection against occasional terror attacks from the Palestinian territory. Based on this scripture we know this War of Gog and Magog is a future event and the walls that currently stand in Israel will be somehow removed and Israel will be living peacefully prior to this Northern invasion.&lt;/p&gt;&lt;p&gt;

Now, in verses 12 and 13, it states that these invading marauders have come to take a ‘spoil.’ But what spoil are they talking about? In the past few years Israel has gone from a nation with very few oil and gas resources into one that could eventually rival Russia as an exporter of natural gas to Europe. Russia benefits greatly from its export of gas west to Europe topping the list of nations having the most natural gas reserves. But Israel recently discovered the Leviathan gas field 50 kilometers offshore having 22 TCF of gas and scheduled to come online in 2019. Then it has Tamar gas field holding 9 TCF in gas reserves. These discoveries have been described as game changers by those in the oil industry. Their discovery alongside another recent oil field having 1.4 billion barrels of oil has caused a stir on the geopolitical scene.  Israel could become a competitor with Russia, vying to service the winter energy supply of the European continent. This is significant. Israel is also abundant in food, technology and other natural resources.
&lt;/p&gt;&lt;p&gt;
Could it be that Russia and the forces it’s allied with come to strip Israel of its oil and gas resources? You see, Russia is rich in gas but has hard to recover oil that’s only economic at higher oil prices. Did you also know that despite being the biggest country in the world in terms of landmass, Russia has a relatively small population of close to 150 million, yet it imports 40% of its food supply, meaning that it cannot currently produce enough food for its own people? In Ezekiel 38:4 it says that God himself will put hooks in the jaws of the invaders from the North. One might  believe that one of the spoils mentioned in Ezekiel’s passage is food and during the tribulation period crops will no doubt fail throughout Russia which is already reliant upon other countries to feed its population, and will resort to looking for food down south.&lt;/p&gt;&lt;p&gt;

Another reason for this hook could well be the desire for Islamic Nations headed up by Russia to wipe Israel off the map. If you review the nations  mentioned earlier they are all largely Islamic and harbor an intense distrust and even hatred for Israel. Could it be that the peace treaty that the Antichrist initiatives with Israel, be thwarted by the Islamic nations at the last minute or perhaps Russia is in such dire need to ensure the survival of its people they need food so badly, justifying an invasion to the south?
    
&lt;/p&gt;
    
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/nmndgtkLd20?si=HC923H4GLPQgoYMn&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/sMi2-KaKnbk?si=LpgML3KL6ltH2Ynh&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
     
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/KLla5Wl48ik?si=AqTVlkWPh9ocTr45&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;BR&gt;&lt;BR&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/5T5FUEk1F0w?si=Nw-ggwwoMoIn7472&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;

</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/the-war-of-gog-and-magog-ezekiel-38-39.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvU3Hiyidj2fkOJPBMNnfa9BsGnvkc-hQux7QQE4nlFXT5mfp25NeccekHVIw8NATOIIq3jiJ0LxYmHFIWlOo9lZuRSCng6vbTGfWz67tcEhZo2esjJCsFBDCbzLbK2fYJWaiZ57w0BAo/s72-c/Trident_II_missile_image.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-2252953738897986309</guid><pubDate>Thu, 07 Jan 2010 00:47:00 +0000</pubDate><atom:updated>2026-01-28T20:30:50.717-06:00</atom:updated><title></title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ5IJW5-meIe8aHmCAH4SyoEzxauW23JrsVj5hJkQAJ8mDgaCLvsrRWniWmj_F5WHPtZT3hyphenhyphenLY1cVykRoiscKC7gnmuDcn1GQLQ0NqQs_v0MNVWUSpMWox_1KqfFCRHsDZ55NglYq8X7SO/s1600/11e1f7e1a0ca24f9581f2bfdfacda560.jpg&quot; imageanchor=&quot;1&quot; style=&quot;background-color: white; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;b&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ5IJW5-meIe8aHmCAH4SyoEzxauW23JrsVj5hJkQAJ8mDgaCLvsrRWniWmj_F5WHPtZT3hyphenhyphenLY1cVykRoiscKC7gnmuDcn1GQLQ0NqQs_v0MNVWUSpMWox_1KqfFCRHsDZ55NglYq8X7SO/s1600/11e1f7e1a0ca24f9581f2bfdfacda560.jpg&quot; /&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;article-caption bx-def-font-h2&quot; style=&quot;color: #242424; font-family: &#39;Noto Sans&#39;, Arial, serif; position: relative;&quot;&gt;
&lt;a class=&quot;arl-caption bx-def-font-h2&quot; href=&quot;http://www.theblackvault.com/m/articles/view/New-World-Order&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;New World Order&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;article-text bx-def-font-large bx-def-margin-sec-top&quot; style=&quot;color: #242424; font-family: &#39;Noto Sans&#39;, Arial, serif; margin-top: 10px; position: relative;&quot;&gt;
&lt;div style=&quot;border: 0px none; margin-bottom: 1em; padding: 0px; text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px none; margin-bottom: 1em; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;In international relations theory, the term &quot;new world order&quot; refers to a new period of history evidencing a dramatic change in world political thought and the balance of power. However, in conspiracy theory, the term &quot;New World Order&quot; (the capital letters are distinguishing) refers to the advent of a cryptocratic or authoritarian world government.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA279968.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Alternative World Scenarios for a New Order of Nations [144 Pages]&lt;/a&gt;&amp;nbsp;- The author of this futures work presents scenarios appropriate for near- to long-range planning of the activities of the Department of Defense and its agencies out to the year 2020 and beyond. Additionally, the scenarios, because of their design, are useful to other departments of the U.S. Government, industry, business, and academia. Forecasts developed for this report use a technique created by the author for monitoring past, present, and future global trends and events, which he molds into plausible and thought-provoking scenarios of the United States in the world&#39;s societies of tomorrow. These plausible scenarios are provided so that users can build policies and make decisions while anticipating and judging their consequences before implementation. Political, Economic, Social, Technological, Military environments, Alternative world scenarios, Active and reserve components, Long-range planning.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;https://documents2.theblackvault.com/documents/dtic/ADA519861.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;American Exceptionalism and a New World Order&lt;/a&gt;&amp;nbsp;[23 Pages, 300 kb] - The United States has a long tradition of placing American values at the center of foreign policy. Establishing a new world order that is based on three cornerstones will begin to shape a new leadership role for the U.S. This involves a shift to soft power as the core competency of foreign policy. In addition, the U.S. needs to lead in developing key innovations and developing a global economic strategy. Also, the U.S. needs to maintain military might unequaled in the world. Achieving this new strategy rests upon international organizational change with the U.S. leading the way for a new world order.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA283285.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;An Analysis of the &#39;New World Order&#39; and Its Implications for U. S. National Strategy&lt;/a&gt;&amp;nbsp;[40 Pages, 1.91MB] - The Cold War is over and the result is a transition from a bipolar world of US vs. USSR to a multipolar world or New World Order where the US remains the only military superpower. However, this status is tentative for the United States. Like all the great superpowers in history, the US is about to let the weight of its military establishment, drag its economy into collapse. This paper looks at the implications of President Bush&#39;s new world order, and the opportunities it presents the US to preserve a peaceful international environment with an open international market system while at the same time retaining its superpower status. The paper establishes that the new world order is more than just rhetoric or simple statement of fact, it exists but is ill- defined. As a result, the paper proposes to define the term as a democratic world where all nations join together in partnership and cooperation under the framework of the United Nations to establish peace, prosperity, and justice for all.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;

&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA308813.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Arms Control and Proliferation of Weapons of Mass Destruction: How Will They Impact U.S. Deterrence in the New World Order?, April 1996&lt;/a&gt;&amp;nbsp;[29 Pages, 1.1MB] -&amp;nbsp;In the absence of a superpower balance, Weapons of Mass Destruction (WMD) are rapidly proliferating. As U.S. defense resources shrink, options to address the new WMD threat are also shrinking. These dynamics are changing the role of Arms Control (AC) and U.S. deterrent strategy. This paper analyzes the relationship between proliferation of WMD, AC, and the status of U.S. deterrent forces in the new world order. It argues that motives to proliferate are to strong to be overcome by AC, but that AC can play a positive role in improving U. S. and International security. Further it argues that regardless of its efficacy that AC is unavoidable; and that U.S force structure decisions are driven by our perception of the threat, not AC agreements or actions.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA257744.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Back to the Future: The Role of the Founding Fathers in Shaping the New World Order&lt;/a&gt;&amp;nbsp;[145 Pages, 5.67MB] (Master&#39;s Thesis) - This thesis asserts that America bas a core set of values inherited from the Founding Fathers that should serve as an integrating mechanism for strategic planning. The author shows how American core values developed and were operationalized in the operational codes (paradigms) of the Founding Fathers, the policy makers of the Cold War era, and contemporary policy makers as they set out to define America&#39;s role in the New World Order. The paper begins with an investigation of the role that paradigms play in science and asserts that operational codes serve the same purpose for nations. This parallel is investigated because it provides an insight into the nature of paradigm shifts. The United States has had two identifiable paradigms -- isolationism and the goal of nation building of the Founding Fathers and the containment policy of the Cold War. From there, the nature of American values is investigated. Inheritance from Western civilization, the Enlightenment, the rise of Individualism, and the development of a unique American philosophy are all important elements in the nature of American values. The Declaration of Independence is shown to be an embodiment of these unique values. The best articulation of the operational code of the Founding Fathers is found in George Washington&#39;s Farewell Address. The statements on foreign policy and articulation of values which lead up to and follow the Farewell Address are examined. The thesis then moves from the era of the Founding Fathers to the era of the Cold War. The operational codes of George Kennan and Paul Nitze are compared and contrasted. Nitze&#39;s operational code as applied to Vietnam is examined through several presidential administrations, and lessons learned are offered. The author criticizes the National Security Strategy of August 1991 for its neglect of values. He contends that the Nation&#39;s new operational code must be based on core values inherited from the Founding Fathers.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA280535.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Beyond Stalemate: Deterrence and Nonproliferation in the New World Order, April 1994&lt;/a&gt;&amp;nbsp;[32 Pages, 1.7MB] -&amp;nbsp;U.S. deterrence and nonproliferation policies need to be updated to meet the challenges of the new world order. To be effective, these new policies must be based on an understanding of potential proliferators motives for pursuing nuclear weapons, must be realistic, and must be implemented as early in the nuclear program as possible.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA437364.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Building Order in The New World Order, 20 March 1992&lt;/a&gt;&amp;nbsp;[35 Pages, 1.2MB] &amp;nbsp;- ThiWith the end Or the Cold War and the shattering or the Soviet Empire to pieces smaller even than that ruled by Peter the Great a recurring theme or the defense debate is that the world is too uncertain, that invisible dangers lurk behind every bush, and that we must retain a huge military presence to protect against instability and potential threats. Our grand strategy, once easily articulated by the single word, containment, has been superseded and the lack of an unambiguous threat has prompted a fractious debate. Whether the size or our military forces are be based on what is necessary to protect our interests, or on what our politicians deem is affordable depends on our ability to look ahead to see a clear path tor our nation, and define the role the military will play.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA398504.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Bush&#39;s New World Order: The Meaning Behind the Words&lt;/a&gt;&amp;nbsp;[74 Pages, 0.4MB] - The phrase new world order has been widely used on the political scene since first publicly coined by former president, George Bush. Although quickly adopted as the catch phrase of the 1990s, few people actually agree on what new world order really means. Since new world order, while elusive in definition, is most frequently used to describe aspects of the post Cold War international scenario, understanding the true meaning of that phrase is critical to projecting our future strategic environment and prospects for the new millennium. The attempt of this paper is to reveal that true meaning. Historical analysis will be the primary methodology used to reveal the meaning of George Bush&#39;s specific terminology describing his concept of new world order. In a January 16, 1991 speech, he identified the opportunity to build a new world order where the rule of law governs the conduct of nations, and in which a credible United Nations can use its peacekeeping role to fulfill the promise and vision of the UN&#39;s founders. These words will be dissected and historically analyzed to develop a clear picture of new world order. Additionally, the primary mechanisms for implementing new world order will be addressed; and finally, specific strategic environment and national security implications will be drawn from those conclusions.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA276745.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Changing the Acquisition Process for a New World Order, April 1993&lt;/a&gt;&amp;nbsp;[46 Pages, 1.8MB] - The Chinese blessing (or curse?), &#39;May you live in interesting times&#39;, is certainly applicable in today&#39;s world. The crumbling of the Berlin wall and subsequent end of the Cold War prompted former President Bush to proclaim a &#39;new world order&#39; had arrived. Unfortunately, the new world order is more a world of disorder. This paper explores the ramifications of these profound changes to the Department of Defense&#39;s acquisition process. The changes are a result of the shift in national military strategy from reliance on forces- in-being to a reliance on military potential. The following changes are discussed in the paper: (1) A More Flexible Acquisition Process; (2) Fewer New Starts/More Existing Program Upgrades; (3) Decrease in the Number of Production Programs; (4) Increased Focus on the Ability to Reconstitute; (5) Increased Emphasis on Four &#39; ... ilities&#39;; and (6) Increased Reliance on Prototyping. Because of its importance, the subject of prototyping is examined in detail. But a prototype in and of itself does not represent a warfighting capability. A strategy must be devised to take a system that has been developed through low rate production and then &#39;shelved&#39;, through production restart. The following recommendations are then discussed: (1) Design Producibility In From the Start; (2) Increase Manufacturing Technology and Process Investment; (3) Develop &#39;Smart&#39; Shutdown Technologies; (4) Develop a Long Lead Procurement Strategy; (5) Increase Reliance on Government/Commercial Integration; and (6) Increase Use of Lean Production Techniques. If the United States is to remain the leader of the &#39;new world order&#39;, the DOD acquisition process must change to adjust to the &#39;interesting times&#39; in which we live.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA262075.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;China&#39;s Response to the &#39;New World Order&#39;&lt;/a&gt;&amp;nbsp;[35 Pages, 1.3MB] - As world change swept the globe over the very recent past, U.S. President George Bush described an emerging &#39;new world order.&#39; He stated a belief that the American system should form the basis of a new international system. He further stated that the U.S. must seek to take the lead in the new order forming such an international system. China is the largest of the very few remaining Marxist-Leninist states. As the third leg of the former world strategic triangle, China remained a challenge to U.S. foreign policy throughout the Cold War. Now that the Cold War is over, China is integral to the formulation of any new order. China&#39;s long history and cultural background differ significantly from America&#39;s. It is important that the U.S. understand, to the extent possible, how those differences will be reflected in China&#39;s response to the new world order. A review of Sino-American relations since normalization in the early 1970&#39;s shows reform that brought China increasingly closer to the U.S. until the Tiananmen Square tradegy in June, 1989. Since then, world events such as the collapse of Communism in Eastern Europe, the Unification of Germany, U.S. dominance in Operation Desert Storm and the Soviet Coup have had great effect on China&#39;s leaders and the course of reform.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA249761.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Deterrence for World Peace: A New World Order Option&lt;/a&gt;&amp;nbsp;[41 Pages, 1.3MB] - The recent collapse of the former Soviet Union has brought an end to the Cold War and a beginning to change and uncertainty. The shift from a bi- polar to a multi-polar world has uncovered trends that make the future of the new world order complex and dangerous. The rise in regional conflicts, proliferation of weapons of mass destruction, accelerated worldwide technology transfer, and the disposition of some 30,000 nuclear warheads in the Commonwealth of Independent States are but a few of the major trends that can have a profound effect on world peace if not controlled. To solve this problem of control will bring a new emphasis to the word &#39;deterrence.&#39; For 45 years the word &#39;deterrence&#39; has been most commonly used to describe the justification for a nuclear arms race between the United States and the former Soviet Union. Now, the global community of nations can &#39;deter&#39; further proliferation of weapons of mass destruction by using the recommended three-part solution of a global nuclear test ban, worldwide acceptance of the Global Protection Against Limited Strikes (GPALS) system, and arms control enforcement using embargoes and economic sanctions by an international system like the United Nations.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA264894.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Disorder in the New World Order&lt;/a&gt;&amp;nbsp;[53 Pages, 2.34MB] - The phrase &#39;New World Order&#39; has, over the last four years, become a much overused and relatively meaningless cliche. Its original intent was to provide a conceptual illustration of a tortured world community scintillatingly close to creating a new international order in the aftermath of the Cold War. This new international order would make possible a world without conflict, pain or hunger, where people of all regions could live in freedom as equals. This concept, and its attendant utopian condition, brings tears of hope from that portion of humanity which has the time to spend thinking on such things. However, in reality, thus far in our international devolution from 40 years of Cold War, we have made little, if any, progress toward realizing a New World Order. In fact, not only have we yet to decide upon what course we should take in pursuit of this new order, we have not even decided that this new order should be. In the interim, conflict, tension and war continue to expand around the globe while the major powers of the world, those with the potential to control global events for the betterment of the world community, continue in their intellectual struggle to determine a role for themselves.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA442659.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Explaining the New World Order of the 1990&#39;s, 2003&lt;/a&gt;&amp;nbsp;[32 Pages, 1 MB] -&amp;nbsp;The decade of the 1990s dramatically altered the Cold War international order in two fundamental aspects. In the political-economic sphere, the collapse of the Soviet Union in 1991 shattered the ideological divide that had driven much of the policy-making during the Cold War. The new Russia and its former eastern European client states rushed to adopt Western economic and political models, albeit with varying degrees of success. The handful of avowedly Marxist states, such as Fidel Castro&#39;s Cuba and Kim Il Sung&#39;s Democratic People&#39;s Republic of Korea, remained mired in despotism and economic ruin. The People&#39;s Republic of China gradually became Communist in name only as it sought to adopt market capitalism and limited democratic reforms to modernize its moribund economy. The two books I review in this paper attempt to explain why these tectonic changes occurred in the international order during the 1990s and what implications these changes herald for the future. In Empire, authors Michael Hardt and Antonio Negri propose a new emerging system of international order based on an ultimately successful Marxist theory. In Culture and Carnage: Landmark Battles in the Rise of Western Power, Victor Davis Hanson proposes that the West&#39;s hegemony is derived from its cultural vibrancy which produced political, economic and military institutions far superior to anything in the non-Western world. Hardt and Negri have the much harder task. Despite their enormous efforts, they ultimately fail to validate Marxist theory as a viable predictor of the evolving world order. In contrast, Hanson has an easier job explaining why the West has won. His work convincingly shows that the West&#39;s military proficiency is directly attributed to its unique culture.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA522891.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Grand Strategies for Dealing with Other States in the New, New World Order&lt;/a&gt;&amp;nbsp;[14 Pages, 110kb] - The art of statecraft has often involved efforts to improve the security of one state by taking advantage of the power and influence of other states. This is, for example, why a state typically seeks to forge military alliances with others. It is also why some states provide economic and military support to client or dependent states and why some advocate the formation of multistate trading blocs. The theory behind the trading-bloc strategy is that cooperation on security matters is more likely when there are strong economic and other mutually beneficial connections among the members of the bloc. Among the tools that have been and are being used to influence other states are trade preferences, loans, loan guarantees, concessionary pricing for military sales, export-import financing, technical assistance, foreign aid, and international disaster relief. While humanitarian altruism is a major factor in foreign aid and disaster relief, statesmen often see the reduction of suffering as a method of improving the stability of a recipient state or as an inducement for a recipient state to cooperate more fully on security matters. Many ideas for making American foreign policy more effective have been offered in recent years. Some of them involve ways of prioritizing all forms of official, state-to-state assistance on those states whose stability or cooperation will most benefit the national interests of the United States. Obviously, there are many states that are already stable and already do generally cooperate with the United States. Canada, Japan, and the states of Western Europe (disagreements over the second war with Iraq notwithstanding) fall into this category. Certainly the economically advanced and politically stable states of the collective West have a common interest in suppressing the signal threat- global terrorism- of the new, new world order that sprang from the rubble of the World Trade Center and Pentagon on 11 September 2001.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA256442.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Gunboat Diplomacy in a New World Order: Strategic Considerations for U.S. Naval Intervention in the Twenty-First Century&lt;/a&gt;&amp;nbsp;[94 Pages, 4.64MB] - With the dissolution of the Soviet Union and Warsaw Pact, the threat of global war has all but been eliminated. At the same time, the Third World is experiencing a rising tide of instability, brought about by economic and social inequities, religious fundamentalism, and resurgent ethnic and political rivalries, and fueled by increasing military capabilities caused by the proliferation of advanced-technology weapons. As a result of these changes, U.S. security strategy is turning from its Cold War focus on global containment to the protection of U.S. interests against regional instabilities. The most dramatic confirmation of this change in direction was the announcement by the President on 2 August 1990 of a new National Security Strategy which would focus on maintaining stability and responding to regional crises, rather than on preparing for a global conflict against the Soviet Union. The past decade offers numerous examples of U.S. intervention in regional instabilities and crises that achieved varying degrees of success. Many of these interventions provide important lessons for the future in terms of how and when to use naval forces, and what the risks are to the national interest if a given mission fails to achieve its military or political objectives. This study is an examination of U.S. naval strategy and its evolving focus on crisis intervention, and how recent uses of U.S. naval force illustrate the need for a reevaluation of naval intervention and its implementation in a &quot;new world order.&quot; To this end, three specific uses of U.S. naval power in the last decade are instructive: the U.S. intervention in Lebanon from March 1982-March 1984; U.S. naval operations off Libya from August 1981-April 1986 (including the 1986 air strike on Tripoli); and the Persian Gulf tanker escort operation of 1987-1988).&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA279926.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;The Mexican Military Approaches the 21st Century: Coping with a New World Order [35 Pages]&lt;/a&gt;&amp;nbsp;-&amp;nbsp;The author&#39;s discussion of the roles and missions of the Mexican forces has special salience in this era of &#39;alternative missions.&#39; Since the U. S. Army has had to deal with the same missions of civic action and counternarcotics, this study provides a timely and instructive lesson on how the Mexican military has wrestled with these challenges. North American Free Trade Agreement(NAFTA), Civic action, Counternarcotics, Mexico, Mexican army&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA264862.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Military Diplomacy in the New World Order, 25 April 1993&lt;/a&gt;&amp;nbsp;[58 Pages, 2.69 MB] -&amp;nbsp;The New World Order--that articulated by former President Bush at the end of the Cold War era--remains yet unsettled and, in fact, undefined. It is filled with uncertainties and instabilities caused by traditional enmities now reemerging. This reemergence is a result of a world shift from bipolarism to polyarchism. The leadership role of the United States in this new era will, it is predicted, involve selective engagement. Additionally, the U.S. will exercise the role of a grand facilitator. In this altered security environment, this paper argues that coercive and cooperative military influence--especially that defined as military diplomacy--has a continuing place in the exercise of U.S. global leadership. This study reviews the historical record of military diplomacy and examines the past use of the four services individually and in joint operations. Particular analysis is given to the current adaptive planning construct established by the Joint Staff with regard to the employment of flexible deterrent options as an aspect of military diplomacy.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA309987.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Military Operations Other Than War in the New World Order: An Analysis of Joint Doctrine for the Coming Era&lt;/a&gt;&amp;nbsp;[71 Pages, 2.5 MB] - The United States has experienced numerous eras of distinct international systems which governed its relationship with other nations. The end of the Cold War symbolized a transition point between such systems. Historically, the nature of a new order as well as the transitional point between orders is fraught with uncertainty. Nonetheless, instruments of national power such as the military must respond to the changing system to remain effective. The post-Cold War era has been characterized by an increased use of the military for operations short of war to include humanitarian operations, peacekeeping, sanction enforcement, etc. Although these missions are not new to the Armed Forces, military doctrine has only begun to address the unique challenges involved in executing operations short of war. Joint Publication 3-07, Joint Doctrine for Military Operations Other Than War (MOOTW), lists six fundamental principles for MOOTW. This research applies the concepts embodied in the principles of MOOTW with three MOOTW models; the Range of Military Operations Model developed by the U.S. Army, the Crises and Lesser Conflicts Model developed by Rand researchers Carl H. Builder and Theodore W. Karasik, and the MOOTW Characteristics Model developed by RAND researchers Jennifer M. Taw and John E. Peters.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA286330.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Military Review, September 1994. Volume 74, Number 9 [92 Pages]&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA404620.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;National Missile Defense Strategy for the United States Post 11 September, 2001 - A Search for Security in a New World Order, 9 April 2002&lt;/a&gt;&amp;nbsp;[39 Pages, 2.1MB] - This paper examines the history of the ABM Treaty as it relates to missile defense and postulates strategic options as they relate to the U.S. strategic linkage to the treaty itself. This review includes 2nd and 3rd order effects for the U.S., as well as an assessment of strategic risk. Key nations included in this analysis include the U.S., Russia and China. In light of the current geo-political situation, the paper concludes with a recommended course of action and challenges for the future.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA285733.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;The New World Order: A Second Look. A Selected Bibliography. [43 Pages]&lt;/a&gt;&amp;nbsp;- Partial contents of this report pertain to: U.S. National Security; the U.S. Military; U.S. Foreign Relations; International Security; North Atlantic Treaty Organization; International Relations; World Economic Order; and Specific Countries and Regions.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA249531.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;The New World Order: A Vision and Its Dimensions&lt;/a&gt;&amp;nbsp;[46 Pages, 2.06MB] - The Cold War is over. The Soviet Union has been dissolved. The United States is no longer the world&#39;s preeminent economic power. Both Europe and Japan are enjoying a greater share of the world&#39;s resources. Still, from the perspective of combined military, economic, political, and diplomatic power, the United States has no equal. President Bush suggests that a &#39;New World Order&#39; has emerged. Principles of democracy, shared responsibility and mutual cooperation among nations are the hallmarks of that new order. He recommends that the principles of the New World Order guide the foreign policy of the United States throughout the decade of the nineties and into the twenty-first century. This paper probes the dimensions of that New World Order. It discusses the likelihood of a unipolar or multipolar world, and concludes that a stratified world order might be a more apt description. It explores the role of international organizations within the new order. It examines implications for U.S. foreign policy, the Department of Defense, and the U.S. Army. The paper concludes by revealing why President Bush&#39;s vision is compelling.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA442421.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Nuclear Strategy in the New World Order&lt;/a&gt;&amp;nbsp;[19 Pages, 0.4MB] - For 50 years, the US depended on its nuclear arsenal to provide the underpinning to the deterrent aspect of its military strategy. However, on September 11, 2001, three of four hijacked civilian aircraft successfully completed their suicide missions against high value targets in the United States-the World Trade Center and the Pentagon. US military might, to include its overwhelming nuclear arsenal, failed to deter the terrorists who killed nearly 3000 people, most of whom were Americans. Although the US nuclear force structure, policy and strategy have thus far deterred a nuclear attack on the US, it is not properly postured as a viable deterrent against asymmetric attacks. However, given the proper force structure, policy and strategy, the US nuclear arsenal could provide a greater degree of deterrence against such attacks in the future. This paper will first briefly describe the strategy of deterrence and its underpinnings in basic psychology. Second, it will briefly overview the deterrence strategy of the Cold War and highlight the findings of the Nuclear Posture Review that will serve as the foundation of the Bush nuclear strategy. Next, this paper will consider the ethical issues surrounding the use of nuclear weapons, as both a deterrent and a combat weapon. Finally, the paper will analyze US nuclear strategy and make policy recommendations for using nuclear weapons as part of a deterrent strategy against future asymmetric attacks.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA251328.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Peace in the Middle East: How It Will Impact the New World Order and the American Strategy&lt;/a&gt;&amp;nbsp;[52 Pages, 1.91MB] - The historical events of the last decade have shifted the world system from the traditional West-East competition to cooperation and exchange of interests between the East and the West. Security and stability of the world has emerged as a very important element of the new world order. Since anything happening in any part of the world affects and gets affected by what happens in the other parts of the world, achieving peace and stability in the Middle East is important for the peace and stability of the world. Since the US is considered the leader of the new world system, the protection of international security and stability has become its responsibility. This paper begins with a description of threats and challenges to the peace of the Middle East, then discusses the bases of peace in the region, the impact of the regional peace on the new world order and the American strategy and ends with recommendations for achieving and keeping peace in the region.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA436613.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Policing the New World Order: An Alternative Strategy. [32 Pages]&lt;/a&gt;&amp;nbsp;-&amp;nbsp;The United States responded decisively in the recent Persian Gulf crisis. The Bush Administration considered successful resolution of this crisis a precursor to the &quot;new world order.&quot; Many questions now confront policy makers as America approaches the 21st Century. A pressing question is the following: Can America continue to serve as the world&#39;s policeman? America&#39;s challenge for the 1990s is to avoid the trappings of world policing that past superpowers have experienced throughout history &quot;a la Pax Britannica.&quot; The United States can achieve this by, first, formulating its national security strategy to elevate the role of the United Nations as the world&#39;s policeman. Second, the United States&#39; national security strategy should support the establishment of a United Nations standing peacemaking force. This force would provide the United Nations and international community a short-notice military employment capability during the early &quot;warning period&quot; of an impending crisis. Such a force would ultimately lower the United States&#39; profile as the world&#39;s policeman in the emerging new world order. This essay addresses in five parts the establishment of a standing United Nations peacemaking force. First, it analyzes the circumstances and the international implications of America&#39;s involvement in the Persian Gulf War. Second, it discusses the resultant new world order and the United Nation&#39;s inability to enforce world order. Third, it highlights a deficiency in America&#39;s emerging defense strategy for the new world order. Fourth, it presents a proposal for a standing United Nations peacemaking force that the United States would support in the 1990s. And finally, it concludes with a view of America&#39;s future in policing the new world order.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA326494.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Security Challenges for Small States in the New World Order: Options for Nepal&lt;/a&gt;&amp;nbsp;[44 Pages, 1.9MB] - The post cold war period is marked by a new multi-dimensional strategic environment giving new focus to international relations and security of small states. Though the US is the only superpower, the world is moving to multipolarity and interdependence where regional powers and international systems have an increasingly powerful role. In such an environment small states are finding themselves even more vulnerable. This paper analyzes the security challenges small states face in the evolving new world order and suggests viable security options for small states in general and Nepal in particular. It analyzes the special characteristics of small states and their vulnerability to both traditional and new forms of threats. It relates national interests with world order and makes an in depth study of the security systems of balance of power and collective security from the perspective of a small state. It analyzes Nepal&#39;s regional and internal security environment as well as her historical setting and national interests. The paper then applies the concepts of security systems in the context of Nepal to determine viable security options.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA246394.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Strategy and Logistics for the New World Order&lt;/a&gt;&amp;nbsp;[138 Pages, 5.79MB] -An interdisciplinary analysis of the post-Cold War world to determine the optimal strategy to attain the national interests of the United States, and the requisite logistic structure to support that strategy. The optimal solution is found to be a strategy based on multinational defense centered on a permanent force of United Nations garrison port complexes. This multilateral force would be augmented by as small a national defense force as necessary to ensure national security. The thesis endeavors to reconnect the cultural and philosophical past of the United States with its immediate future. National interests are identified through examination of American Pragmatism and the philosophies of John Locke and Jean-Jacques Rousseau. To determine the current status of common defense, based upon the Foreign Military Sales system, and analysis of current data is accomplished. Future threats to the United States are examined with special emphasis on nuclear terrorism. The ability of Islamic nations in North Africa and the Middle East to produce significant quantities of uranium is demonstrated. The grave political as well as ongoing environmental consequences of this recent capability are discussed in detail.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA277035.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Technology Security Policy: From the Cold War to the New World Order&lt;/a&gt;&amp;nbsp;[122 Pages, 5.42MB] -This thesis examines U.S. technology security policy in a transitional period marked by a rapidly changing security environment and an era of economic globalization. It provides an historical analysis of this policy since the onset of the Cold War and a financial analysis of the $40 million budget request for technology security, counter-proliferation, and export controls in the Clinton Administration&#39;s FY 1994 defense budget presentation. The historical analysis is based largely on the evolution and roles of two multilateral control regimes -- CoCom and the MTCR. The crux of this analysis is a detailed examination of the fate of the $40 million request as it moved through the congressional budget process. This analysis identifies problems and policy issues surrounding resource allocation for technology security. Based on the treatment of the budget request by the defense committees of Congress, a number of conclusions were drawn. Although technology security is considered a high priority item by both the executive and legislative branches of government, Congress appropriated funding for only 20 percent of the Administration&#39;s request. Significant decreases are attributed to inter-agency turf struggles, the slowness with which DoD policy-making positions were filled, and an initial spending plan that was perhaps overly ambitious and prematurely presented. Ultimately, two reviewing bodies were born out of legislative compromise; however, potentially redundant reporting likelihood of a decisive review of current proliferation policy.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/dangerousworld.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Toward A Dangerous World: U.S. National Security Strategy for the Coming Turbulence [336 Pages]&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://www.theblackvault.com/documents/ADA289231.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Training Tactical Level Leaders in the United States Marine Corps: Meeting the Challenges of the New World Order [58 Pages]&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA394287.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;Turkey&#39;s Role in the New World Order, Feb 1998&lt;/a&gt;&amp;nbsp;[7 Pages, 0.6 MB] -&amp;nbsp;Turkey faces new challenges as the result of the political, military and economic developments we have been witnessing over the past decade, not the least of which is finding Turkey&#39;s role in the new world order that is now taking shape. If we were to make a brief evaluation of the present environment it would be correct to characterize it as a period of transition and transformation that calls for reorientations and new architectures.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA233632.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;The U.S. - Japan Security Alliance: Will it Survive in the New World Order? 1 April 1991&lt;/a&gt;&amp;nbsp;[126 Pages, 5.3 MB] -&amp;nbsp;When George Bush took office in January 1989, he spoke of a new world order. The characteristics of this new world order may be more physical than the ideological Cold War. Some characteristics are emerging--resurfacing of old rivalries, greater interdependence between major powers, more weapons of mass destruction, information revolution, and the ascendancy of mass destruction, information revolution, and the ascendancy of economic power over military power to name a few. These changes mandate a review of old alliances designed to implement a national security strategy of containment. One candidate is the Treaty of Mutual Cooperation and Security between the United States and Japan commonly referred to as the U.S.-Japan Security Alliance. Now that the Cold War is over, is this treaty still relevant? Given Japan&#39;s economic miracle, should the United States continue to provide Japan&#39;s national security and protect Japan&#39;s vital interests? This paper examines the treaty from three perspectives: Is the U.S.-Japan Security Alliance still relevant in the emerging world order from a military perspective? Is the U.S.-Japan Security Alliance still relevant from a political perspective? What roles should the United States and Japan undertake to promote stability in the emerging world order?&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA240425.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;U.S. Strategic Maneuver: A New World Order Requires Some New Thinking, Not Reorganization, 21 June 1991&lt;/a&gt;&amp;nbsp;[39 Pages, 1.1 MB] -&amp;nbsp;The current changes in the kinds of world threats we face and the requirement to downsize U.S. forces pose as significant challenge to the military as significant as those confronted at the end of World War II. The concept of Strategic Maneuver within the military, accompanied by a focusing process of (areas-to-threats-to-interests-to-resources-to-requirements) using the current organization, will allow a smaller force to operate effectively. The Persian Gulf War proved that the concept of Strategic Maneuver, formed by prioritizing and combining the individual and unique capabilities of each military services, is the best method to meet the future defense needs. The alternative plan of service reorganization and downsizing within compels the planners to unlearn all of the post-Viet Nam lessons. New mobility concepts such as the C-17&#39;s, for more efficient air lifting, and SL-7&#39;s for faster shipping cannot by themselves form the mindset needed to maintain efficiency. This paper argues that the wheel does mot have to be reinvented in order for a smaller one work as well.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA456586.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;The United Nations Security Council Veto in the New World Order&lt;/a&gt;&amp;nbsp;[183 Pages, 6.01 MB] - The United States should move to replace the Security Council veto with a double majority voting method. United States&#39; national security will improve as international security improves. International security will improve as the Security Council acts effectively. The Security Council will act more effectively as it becomes more authoritative. Promoting respect for the Council and a veto alternative are necessary to make the Council more authoritative. The double majority voting method best promotes Council authority.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.5em;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; src=&quot;http://www.theblackvault.com/images/pdf.gif&quot; /&gt;&amp;nbsp;&lt;a href=&quot;http://documents.theblackvault.com/documents/nwo/ADA250807.pdf&quot; style=&quot;color: #52719e; text-decoration: none;&quot;&gt;A World 2010: A New Order of Nations&lt;/a&gt;&amp;nbsp;[127 Pages, 5.69 MB] - In this book, A World 2010: A New Order of Nations, the author describes the decline of the influence of the 20th century superpowers. He explores the notion of a devolution of political and economic world power and forecasts a rise of a new order of nations. Further he advances the concept of a rise of 21st century postindustrial states to preeminence. These new realities could usher in a new era of relative world peace brought about by the crumbling of the Soviet Union, the formation of new global economic interrelationships and coalitions, and the advancement of former Third World nations to become competitive industrial states. The author concludes by forecasting the notion of a U.S. national requirement for a subdued worldwide military presence that serves a passive role, deterring conflict and preserving peace.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;br /&gt;</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/new-world-order-in-international.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ5IJW5-meIe8aHmCAH4SyoEzxauW23JrsVj5hJkQAJ8mDgaCLvsrRWniWmj_F5WHPtZT3hyphenhyphenLY1cVykRoiscKC7gnmuDcn1GQLQ0NqQs_v0MNVWUSpMWox_1KqfFCRHsDZ55NglYq8X7SO/s72-c/11e1f7e1a0ca24f9581f2bfdfacda560.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-7505860301897395282</guid><pubDate>Wed, 06 Jan 2010 22:23:00 +0000</pubDate><atom:updated>2026-01-28T17:42:26.986-06:00</atom:updated><title>$112B Plan To Rebuild Gaza Called &quot;Project Sunrise&quot;</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggdo3kOWV8eXTHZ8oYdthX64QqpjEIkWyKPr0CjAQwPMRhvV9C_qUFfoTNw8ZK16FaiOAX9bxMM_aFrAU5ITnWEzHAOw02yfkzTm9INzYv1Z3t86rA2iEC7vZuN7CPoHLjZXe7MTq8sDCZEO0JM3z4QVjsSVo2pFKl62L7V6ayhkYyVlPNn5PC3SS5HbM/s1600/2026_01-22-new-gaza-davos-1200x764.jpg&quot; width=&quot;708&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

 
AI Overview &lt;p&gt;
&quot;Project Sunrise&quot; is a $112 billion, 10-year proposal led by Jared Kushner and U.S. special envoy Steve Witkoff to reconstruct the Gaza Strip into a high-tech, luxury coastal hub, according to reports in late December 2025 and January 2026. Unveiled during the World Economic Forum in Davos in January 2026, the plan aims to turn the war-torn territory into a &quot;Middle East Riviera&quot; with high-rise hotels, smart cities, and AI-optimized energy networks.  &lt;/p&gt;&lt;p&gt;
Key Aspects of Project Sunrise:
 &lt;/p&gt;&lt;p&gt;
    Vision: The 32-page blueprint proposes &quot;pie-slice-shaped&quot; smart cities, a new seaport, an airport, and a freight rail line. &lt;/p&gt;&lt;p&gt;
    Development Plan: The plan, which is slated to take 10 years, focuses on turning 70% of the coastline into commercial and tourist space. It is structured in phases, starting with &quot;New Rafah&quot; in the south to house 100,000 units before moving north. &lt;/p&gt;&lt;p&gt;
    Funding: The proposal includes a $112.1 billion investment strategy, with the U.S. potentially anchoring approximately $60 billion in grants and loan guarantees. &lt;/p&gt;&lt;p&gt;
    Conditions: The plan is heavily contingent on the total demilitarization of Hamas, with Kushner emphasizing there is &quot;no Plan B&quot; without verified disarmament. 
 &lt;/p&gt;&lt;p&gt;
Challenges and Criticism: &lt;/p&gt;&lt;p&gt;

    Security &amp; Feasibility: Critics and officials doubt the feasibility of the project while Hamas is still active or without a stable political solution. &lt;/p&gt;&lt;p&gt;
    Humanitarian Concerns: The proposal faces backlash for focusing on luxury development rather than immediate, sustainable housing for the 2 million displaced residents, with some critics calling it a form of &quot;colonization&quot;. &lt;/p&gt;&lt;p&gt;
    Rubble Removal: The plan faces a massive hurdle in simply clearing the estimated 60 million tons of debris, which the UN estimates could take over seven years. 
 &lt;/p&gt;&lt;p&gt;
Kushner has argued that with proper security, the project could transform the region rapidly, citing similar developments in other parts of the world. 
  &lt;/span&gt;&lt;b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  &lt;/span&gt;&lt;/b&gt;
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Trump admin. pitches &#39;Project Sunrise&#39; to turn Gaza into &#39;futuristic coastal destination&#39;&lt;p&gt;
  
  &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;468&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjvidoMq3xdZO2YIzWiHD6rrl7wjo6coOcMsR_OqvRuK1lLKc6-qabxk0i_29VWpMIrdLenz7EsRxy6XJa5ttPkmytoKasqBucDcP3HkSKD3kWPbo1nQC6fQ2nzqGcP4c7r8jHnomtYfl1SdST05IS-iK8sSB_0ke47TuMqnq18jexTS00qbaRSvCkeo/s1600/image-1766484299950.jpeg&quot; width=&quot;678&quot; /&gt;

&lt;/div&gt;&lt;p&gt;The plan to transform the Gaza Strip into a &quot;gleaming metropolis&quot; was shown in 32 PowerPoint slides in a pitch to world governments and investors, the report said.
    &lt;/p&gt;&lt;p&gt;
  The Trump administration is pitching “Project Sunrise,” a plan that will reportedly rebuild the Gaza Strip into a “futuristic coastal destination,” according to a Friday report by the Wall Street Journal.
 &lt;/p&gt;&lt;p&gt;
It noted that US President Donald Trump’s son-in-law, Jared Kushner, along with US Special Envoy to the Middle East Steve Witkoff and two other White House aides, drafted a proposal comprising 32 PowerPoint slides to transform Gaza.
 &lt;/p&gt;&lt;p&gt;
The presentation, depicted as “sensitive but unclassified,” was shown to Turkey, Egypt, and several investors and wealthy Gulf kingdoms, according to the report.
   &lt;/p&gt;&lt;p&gt;
  This reconstruction would cost $112.1 billion over 10 years, according to the WSJ, which cited the draft proposal. The US would provide $60b. in grants, with the plan stating that Gaza would eventually be able to self-fund many projects.
 &lt;/p&gt;&lt;p&gt;
The WSJ also notes that the presentation doesn’t specify which countries or companies would fund the reconstruction, nor where Gaza’s residents would live during the rebuilding. This has caused some US officials to express doubt about the plan, with some saying that Hamas will refuse to disarm in the first place.
 &lt;/p&gt;&lt;p&gt;
The proposal was developed over 45 days, with Kushner and Witkoff enlisting the help of senior White House aide Josh Gruenbaum.
   &lt;/p&gt;&lt;p&gt;
  Officials cited by the WSJ said that if the project goes through, they plan to “update and revise the numbers about every two years as it unfolds.”
 &lt;/p&gt;&lt;p&gt;
Kushner and Witkoff had previously met with Egyptian, Turkish, and Qatari officials in Miami to discuss developments in Gaza before the two US officials delivered their presentation. &lt;/p&gt;&lt;p&gt;
Initial US announcement of Gaza takeover was made by Trump in February
 &lt;/p&gt;&lt;p&gt;
The report by the WSJ comes almost a year after Trump initially announced during a joint press conference with Prime Minister Benjamin Netanyahu that the US would take over the management of the Gaza Strip for the foreseeable future.
 &lt;/p&gt;&lt;p&gt;
He said that by taking over Gaza, the US will create economic development that will provide an “unlimited number of jobs and housing for the people of the area.” &lt;/p&gt;&lt;p&gt;

“We’re going to develop it, create thousands and thousands of jobs, and it will be something that the entire Middle East could be very proud of,” Trump said. &lt;/p&gt;&lt;p&gt;

Friday’s WSJ report cited supporters of Kushner’s and Witkoff’s latest proposal, who said that allowing Gaza to continue without reconstruction or development is a worse alternative. It also cited Trump’s vision of turning Gaza into the “Riviera of the Middle East” as a better solution.

  
  

&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;


  
  Kushner, Witkoff draft $112B proposal to develop Gaza into ‘smart city’ with luxury resorts 
      &lt;/span&gt;&lt;/b&gt;
  &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;628&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSlBAvVYFm4jS7s5b-IlhvEL7-OIvXDGez4u5mOvjapkIO3zUoMwisuRF6vLy959ML6iBpdhexmRr8CCG4Pi4oWCYSSTLEnj_cIAvPdrs8VLWCvlU__me4EQT_O-Vc2evZny_Mo7BXu8e4pvLNpBUOmxJDFAtduetYbEfZIDKaMH1K5iSR0D2D64gRPUM/s1600/117661326.jpeg&quot; width=&quot;898&quot; /&gt;&lt;/div&gt;
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  &lt;p&gt;
Trump administration reps have just revealed a grandiose $112 billion plan to rebuild war-torn Gaza into a futuristic international destination dubbed “Project Sunrise.”
 &lt;/p&gt;&lt;p&gt;
The 10-year development plan, drafted by first son-in-law Jared Kushner, US special envoy Steve Witkoff, and two top White House aides, is currently courting investor countries with a 32-slide PowerPoint presentation detailing the bold plan to renovate burning rubble into beach resorts. &lt;/p&gt;&lt;p&gt;
Illustration of the &quot;Humanitarian Islands in Gaza&quot; Plan: Interim Phase, showing various IDP cities, crossings, security inspections, and humanitarian aid routes within the Gaza Strip.
     &lt;/p&gt;&lt;p&gt;
    Gaza would see the development of luxury hotels, high speed rail and AI-optimized smart grid features that would revolutionize the small slice of the coveted Mediterranean coastline into a bustling metropolis, the Wall Street Journal reported. &lt;/p&gt;&lt;p&gt;

“Gaza’s destruction has been profound, but we believe what lies ahead is not just restoration — it’s a chance to develop a gateway of prosperity in the Middle East with state-of-the-art infrastructure, urban design, and technology,” the executive summary slide read, according to the outlet. &lt;/p&gt;&lt;p&gt;

The total $112 billion cost would be spread out over 10 years, with the US agreeing to “anchor” up to $60 billion in grants and guarantees on debts by raising industry funds. &lt;/p&gt;&lt;p&gt;
    
    “Reimagining Gaza as a ‘smart city’ with tech-driven governance and services,” one slide from the PowerPoint presentation beamed. &lt;/p&gt;&lt;p&gt;

The ambitious proposal — developed within the last 45 days by Kushner, Witkoff, and White House aides consulted Israeli security experts about the path forward — further called for establishing a “Chief Digital Office and an innovation lab to define standards and guide policymaking.” &lt;/p&gt;&lt;p&gt;

The presentation does not go into detail about which countries or companies would be investing in the rebuilding fund, according to WSJ.
     &lt;/p&gt;&lt;p&gt;
    Though the plan mapped out distinct phases of construction, it did not provide details for housing the 2 million Palestinians who would be displaced during the massive construction necessary. &lt;/p&gt;&lt;p&gt;

There is an estimated 68 million tons of rubble in Gaza after thousands of Israeli airstrikes leveled cities during the two-year war in Gaza. &lt;/p&gt;&lt;p&gt;
    
    US officials who have knowledge of the proposal are skeptical that it will come to fruition because a condition would be Hamas agreeing to disarm, the Journal reported. &lt;/p&gt;&lt;p&gt;

Witkoff, meanwhile, met Saturday in Miami with high-level delegations from Egypt, Turkey and Qatar to discuss implementation for the second phase of the Gaza cease-fire plan. 
    
&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

    Project Sunrise: US $112bn Gaza plan turning war into a real estate bonanza
     &lt;/p&gt;&lt;p&gt;
    US envoy to the Middle East Steve Witkoff and US President Donald Trump&#39;s son-in-law Jared Kushner have pitched a $112 billion worth of “Project Sunrise” for the development of the war-torn Gaza. The pitch, termed as &quot;sensitive but unclassified,” had 32 pages of PowerPoint slides, with skyscrapers, luxury resorts, high-speed rail, AI-optimised smart grids- a real estate bonanza. The plan doesn&#39;t clarify where the 2 million Gazans will live during reconstruction, which nation or companies will fund the project, or what the return on investment will be. &lt;/p&gt;&lt;p&gt;
    
    The Project Sunrise &lt;/p&gt;&lt;p&gt;

It was developed by Jared Kushner and Steve Witkoff with help from Israeli firms and security officials within 45 days. The proposal was shown to officials from Egypt, Turkey and Qatar in Miami on Friday. The project, reportedly, will cost around $112.1 billion and will take 10 years. It plans to develop the Gaza Strip in three phases- removal of destroyed buildings, unexploded ordnance and Hamas’s tunnels- construction of permanent housing, medical facilities, schools and religious spaces- then the luxury beachfront properties, tech corridors and modern transportation hubs will be developed. Geographically, it will start in the South from Rafah, Khan Yunis, then the central camps and finally Gaza City. The United States is supposed to anchor 20 per cent of the fund, and then there will be funding from foreign government grants and sovereign debts.
     &lt;/p&gt;&lt;p&gt;
    Why is the Project a trap? &lt;/p&gt;&lt;p&gt;

The project classically fits within the framework of a neo-colonial, extractive capitalism. Here, extraction replaces occupation. The projected plan is based on the demilitarisation and decommission of Hamas&#39; weapons and its tunnel network.
 &lt;/p&gt;&lt;p&gt;
“You are not going to convince anyone to invest money in Gaza if they believe another war is going to happen in two, three years,” said US Secretary of State Marco Rubio. &lt;/p&gt;&lt;p&gt;
    
    But the proposal skips some of the fundamental steps. Normally, any conflict resolution will follow these steps chronologically: cease fire, political settlements, re-establishment of governance and then reconstruction. But here it&#39;s a ceasefire, then demilitarisation and then reconstruction. Political security and sovereignty to be figured out later. For Hamas, which was formed to end the colonial occupation of Israel and establish a Palestinian state, this will be hard to swallow. Further, there is no plan for the 2 million people to live during the reconstruction of Gaza. The humanitarian aid is conditional on the political surrender, which is a form of coercion. Moreover, the proposal frames this as “Dubai in the Mediterranean”, tries to erase years of trauma and the history and tries to portray it as an underutilised &#39;real estate&#39;. Palestinians are promised jobs later, not ownership. The rebuilding process starts with holding 2 million people hostage. The core contradiction is how does free economy works on occupied and unfree people and land.
    
    
    
    
&lt;/p&gt;
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/-LTtqQXIR5I?si=-ieDpPwgJtjhvFT5&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/YOtZGqOOQ0U?si=lqBCjTWyk96hJzZF&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
     
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/j1nm8fDBSZk?si=mhm3pXz9imxym6kD&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;

</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/112b-plan-to-rebuild-gaza-called.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggdo3kOWV8eXTHZ8oYdthX64QqpjEIkWyKPr0CjAQwPMRhvV9C_qUFfoTNw8ZK16FaiOAX9bxMM_aFrAU5ITnWEzHAOw02yfkzTm9INzYv1Z3t86rA2iEC7vZuN7CPoHLjZXe7MTq8sDCZEO0JM3z4QVjsSVo2pFKl62L7V6ayhkYyVlPNn5PC3SS5HbM/s72-c/2026_01-22-new-gaza-davos-1200x764.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-2296527011852581518</guid><pubDate>Wed, 06 Jan 2010 07:30:00 +0000</pubDate><atom:updated>2026-01-12T06:20:16.865-06:00</atom:updated><title>Pax Judaica, Jerusalem And AI Technology</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja-IIrBkSmjrx3D60zrvH_qCROVaUsLTTOSjE5XTToVm5pPsLDkgyoRpObsWEfIMz4_mGoSiHgW8GX-79m6g0LcBD_UFDPEX8aKQEUer_534OLBOvwGM-KdJlKyWHMRlXc3to5Gy2CWrVb-v4WlTiy5ApGmKRH_RRVDh9smzTWp-JgHt5c1_-lxfS_pZQ/s1600/pax-judaica%281%29.png&quot; width=&quot;678&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

 
Pax Judaica (Latin for &quot;Jewish Peace&quot;) refers to a modern  theory, primarily found in  online circles and some Islamic eschatological interpretations, envisioning a future global order dominated by Jewish or Israeli power, often linked to end-times prophecy, surveillance, and a &quot;Jewish World Order&quot;. It&#39;s contrasted with historical terms like &quot;Pax Romana,&quot; but in these contexts, it carries fears of technological control (AI, digital gulag) rather than traditional peace. &lt;p&gt;
Key Aspects:
&lt;/p&gt;&lt;p&gt;
  The  NWO Theory: Describes a future global system where Israel or Jewish institutions exert total control, often leveraging advanced technology and surveillance.&lt;/p&gt;&lt;p&gt;
    Eschatological Roots: Draws from interpretations of Biblical and Islamic end-times prophecies (eschatology) about a coming world government or the role of Jerusalem in the final days.&lt;/p&gt;&lt;p&gt;
    Themes: Involves ideas like a digital surveillance state run from Jerusalem, AI control, and the subjugation of nations, contrasting with traditional power structures.&lt;/p&gt;&lt;p&gt;
    Cultural References: Appears in novels and media, sometimes as a fictionalized apocalyptic scenario or as a warning against perceived hidden agendas, such as in *Pax Judaica: The Novel* by Ahmad Ibn Fouad.&lt;/p&gt;&lt;p&gt;
    Origin of the Phrase: &quot;Pax&quot; (peace) and &quot;Judaica&quot; (Jewish things) combine to suggest a &quot;Jewish peace,&quot; but the concept is often framed as sinister or controlling, unlike traditional ideas of peace. &lt;/p&gt;&lt;p&gt;

In essence, &quot;Pax Judaica&quot; is a contemporary concept  about power, technology, and prophecy, often circulating in niche  spaces online and in certain religious discussions. 
  &lt;/p&gt;&lt;p&gt;
  
   Empires rule through armies, territory, and conquest.&lt;/p&gt;&lt;p&gt;
Today, Israel rules through leverage, institutions, surveillance, and proxy control.
&lt;/p&gt;&lt;p&gt;
The idea of Pax Judaica — not as a slogan, but as a framework for understanding how power now operates in the modern world. Why Israel’s influence appears disproportionate to its size. Why regional actors court Jerusalem before Washington. Why resistance hasn’t disappeared — but no longer has a path to victory.
&lt;/p&gt;&lt;p&gt;
From historical Pax systems to proxy rule, from geopolitical judo to surveillance and artificial intelligence, this is a breakdown of how dominance is enforced without occupation — and why the next phase of empire won’t announce itself. 
  &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;


Pax Judaica And The AI Gulag&lt;p&gt;

&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

It is framed as a coming global order in which Jews, or Israel more specifically, preside over a digital gulag – an omniscient AI surveillance architecture, run from Jerusalem, that subordinates nation states, controls access to basic services, and keeps the world’s population on a tight algorithmic leash.
&lt;p&gt;
It exploits real developments – Israel’s aggressive deployment of AI and surveillance technology, especially in Gaza and the West Bank; the steady normalisation of digital tracking and control across the planet; the hollowing out of democratic oversight in favour of automated decision-making – and  that a secret cabal of Jews is orchestrating world events behind the scenes.&lt;/p&gt;&lt;p&gt;



The era of US-led “Pax Americana” is ending. America is being weakened from within – socially, economically, morally. While that empire fractures, a new centre of gravity emerges in Israel. From Jerusalem, so the claim runs, a centralised world authority will govern through an integrated AI surveillance grid. Every communication, financial transaction, movement, and biometric trace is hoovered into this system. Algorithms assign people risk scores, compliance ratings, and social permissions. Access to banking, travel, health care, work – in some versions even access to food – becomes contingent on digital obedience to this hidden authority.&lt;/p&gt;&lt;p&gt;

Palestinians are portrayed as experimental subjects: the test case for a planetary control system. The intensification of surveillance and targeting in Gaza and the West Bank is taken as proof of a prototype – the beta version of a digital prison to be rolled out globally once perfected. Where prisons used to have walls and bars, the new detention centre is a mesh of code, devices, and bureaucratic dependencies. All of this, we are told, is “Pax Judaica”.
&lt;/p&gt;&lt;p&gt;

Firstly, Israel’s integration of advanced technologies into its security and military apparatus is well documented by human rights organisations, investigative journalists, and even by participants in its own tech sector. AI-assisted target selection in Gaza, large-scale data mining, facial recognition systems in Hebron and East Jerusalem, integrated command-and-control platforms, and highly automated drone operations are not science fiction. They are real systems, built by real companies, deployed in real conflicts.&lt;/p&gt;&lt;p&gt;

Secondly, Palestinians have been subjected for decades to forms of control, surveillance, and collective punishment that would be intolerable to most populations. Checkpoints, population registries, permit systems, settler violence, confiscation of land, and severe restrictions on movement and trade are not rumours but lived experiences. The addition of machine learning and ubiquitous sensors into this infrastructure does nothing to soften its impact. It hardens it.
&lt;/p&gt;&lt;p&gt;
Thirdly, the trend towards what might be called “digital enclosure” is not confined to one geography or one people. States and corporations across the world are building systems that harvest behavioural data, assign risk scores, and shape access to resources. Biometric IDs in India, social credit experiments in China, expanded surveillance powers in so-called liberal democracies, the commodification of personal data by global technology firms, and the growing interest of central banks in programmable digital currencies all point to a direction of travel in which the ability to live outside digital networks, or to escape their scrutiny, becomes increasingly fragile.
&lt;/p&gt;&lt;p&gt;
None of this is speculative. It’s happening in plain sight. There’s no doubt that a digitally mediated control society is possible. Key to any truthful understanding is how far we have already ventured into that territory, and whether we have the political imagination, institutional capabilities, and ethical courage to alter course.
&lt;/p&gt;&lt;p&gt;


Where an older generation spoke of bankers, newspapers, and revolutionary movements supposedly infiltrated by Jews, the current iteration swaps in AI systems, digital currencies, and global surveillance platforms. The villain remains structurally identical. Only the props have been updated.
&lt;/p&gt;&lt;p&gt;
  Here are several characteristics.&lt;/p&gt;&lt;p&gt;
One is the insistence on a single hidden centre of control. The contemporary world is anarchic, fractured, and multipolar. Power is distributed across states, corporations, military alliances, intelligence agencies, religious movements, criminal networks, and transnational capital. These forces compete, collide, and occasionally cooperate, but they don’t converge neatly into a unified command. To reduce this messy system to one nerve centre in Jerusalem is to replace complexity with a comforting goal: that someone is in charge, and we know who they are.&lt;/p&gt;&lt;p&gt;

A second is the ethnic and religious coding. By labelling this supposed world order “Judaica”, the narrative implies that there is something inherently Jewish about total surveillance and algorithmic despotism. 
&lt;/p&gt;&lt;p&gt;
A third is the portrayal of Palestinians not simply as victims of occupation and war –  but as experimental subjects in a rehearsal for global enslavement. 
&lt;/p&gt;&lt;p&gt;




    · Responsibility is narrowed to a single alleged architect, and with that narrowing comes a strange absolution of everyone else. Security agencies in Asia, technology giants headquartered in North America, surveillance vendors in Europe, authoritarian regimes in Africa or Latin America – all of these actors, each building their own instruments of control, recede into the background. The complex circuitry of industrial economism, in which surveillance, data extraction, and militarisation are embedded, are revealed in  the  Jewish plot.
&lt;/p&gt;&lt;p&gt;
In that light, the “Pax Judaica” story looks  like a glimpse behind the curtain.
&lt;br&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

Predictive History Channel Youtube, Transcript  &lt;/p&gt;&lt;p&gt;Pax Judaica - The Greater Israel Project and Jerusalem as the Centre of the World&lt;p&gt;
So this is the endgame guys. The
Freemasons will create artificial
intelligence in Jerusalem and this will
become the world government.&lt;/p&gt;&lt;p&gt;
Again, this is just conspiracy theory.&lt;/p&gt;&lt;p&gt;
Don&#39;t believe this. This is just for
fun. Okay? But if it happens like this,
then that&#39;s interesting. Okay? But
that&#39;s  the grand plan to
create a world government in Jerusalem.&lt;/p&gt;&lt;p&gt;
And what&#39;s the center of this world
government? Solomon&#39;s temple
because the Freemasons believe that
their founder was the one who created
Solomon&#39;s temple. So by recreating
Solomon&#39;s temple, you close the circle.&lt;/p&gt;&lt;p&gt;
Okay. So again, this is very
complicated.  and I don&#39;t want to get
too many things wrong, but this is a
general gist of it. And so what and so
what we can see is that all roads lead
to Jerusalem. If that is the case, okay,
then this helps us understand certain
things about the world that otherwise
don&#39;t make any sense. All right, so
let&#39;s go over them.&lt;/p&gt;&lt;p&gt;
The first thing that doesn&#39;t make any
sense is America&#39;s war on terror. Yes, I
understand that America was attacked on
911.&lt;/p&gt;&lt;p&gt;
I understand that. But why did they have
to go attack Libya and Iraq and all
these other places that have nothing to
do with al Qaeda?  And the answer
is they&#39;re trying to create something
called the Greater Israel Project.&lt;/p&gt;&lt;p&gt;
They&#39;re trying to have Israel
become Pax Judea, the grand power in the
Middle East, because that&#39;s important in
all secret societies. Israel must become
the dominant power in the Middle East.&lt;/p&gt;&lt;p&gt;
Okay, so this helps us understand why
the war on terror happened the way
it did. That&#39;s number one. Number two is
right now America is threatening to attack Iran.
Why would they do that? Because in order
for Pak Judaica to come into being, Iran
must be taken out of the equation. Iran
must be destroyed. Then if that were to
happen, there would be no challenger to
them. Okay, does that make
sense, right? The third thing is
Silicon Valley
and AI.&lt;/p&gt;&lt;p&gt;
So right now you have AI chat GPT which
doesn&#39;t really do anything, okay? It
makes cool images
 on your computer and it helps you
cheat on in school. Okay, that&#39;s about
it. Doesn&#39;t really do anything else. And
if you don&#39;t go to school, then you&#39;re
like, why am I using chatbot? Okay, and
you&#39;re not going to pay a lot of money
for it. So AI, it&#39;s a dead end. But at
the same time, around the world,
everyone&#39;s spending billions, $200 on
data centers, right? So, everyone&#39;s
putting money into
AI, but then you&#39;re like, well, how can
you make money off that?&lt;/p&gt;&lt;p&gt;
If you think the answer is  for you to
use AI, well, it&#39;s hard to make money
off that. But if the answer is to create
an AI surveillance state, that makes a
lot more sense, right?&lt;/p&gt;&lt;p&gt;
A  surveillance state, very easy,
guys. We have it in China. Okay, it&#39;s
digital ID and digital currency.&lt;/p&gt;&lt;p&gt;
And the idea is that
everything you buy,
everything you do will be tracked. And
so they can create a profile on you.&lt;/p&gt;&lt;p&gt;
This profile
will tell the government who you are,
how you behave, what you think. Not only
that, the government can also manipulate
how you think, how you behave. Okay? And
this is of course called the mark of the
beast.&lt;/p&gt;&lt;p&gt;
Right?&lt;/p&gt;&lt;p&gt;
And so that&#39;s what Pax  is a
global AI surveillance system. Okay? It
also helps us explain
immigration
in Europe.&lt;/p&gt;&lt;p&gt;
Okay? Because the war on terror, you&#39;ve
sent these millions of refugees from
Libya, Syria, Afghanistan, Iraq into
Europe, which is causing a lot of
conflict in Europe. Why? Why would that
happen? Well, for Pax to come into
being, you need to destroy the world.
Okay?&lt;/p&gt;&lt;p&gt;
So, I&#39;m not saying this is true, but I&#39;m
saying like if the goal is Pax Judaica,
it does help us connect the dots. It
helps to explain why things are
happening the way they are. Okay.&lt;/p&gt;&lt;p&gt;
Also,
the last thing is anti-semitism. Okay.
So, you may have noticed if you&#39;re
online, people don&#39;t like the Jews. And
this is like out of nowhere after 
October 7th. Um, you have anti-semitism
over the internet. I have
criticized Israel before. Okay? But
anti-semitism is not the same as
anti-zionism, right? Zionism is a belief
that Israel is a chosen
 people and the promised land and all
that. Okay? But Judaism as religion,
it&#39;s perfectly fine. So why would people
not care about the difference between
anti-zionism, and anti-semitism? Okay.&lt;/p&gt;&lt;p&gt;
And you can argue it&#39;s all purposeful
because remember the part of the plan is
to force the Jews to return to Israel.
That&#39;s very important for this plan to
work out. Okay? It&#39;s key. That&#39;s
why you are seeing so much anti-semitism
around the world today.&lt;/p&gt;&lt;p&gt;
Okay? And the last thing of course and
something we&#39;ll discuss is something
called the red heifer. So red heifers are
red cows that are perfectly genetically
modified and you need the red heifer in
order to  sacrifice. The
red heifer first is used to purify the ground in
order to reconstruct the Solomon&#39;s
temple. Okay? And guess what? They&#39;ve
already  sacrificed the
red heifer first. So it seems as though
everything is in place. All right?&lt;/p&gt;&lt;p&gt;
They&#39;re moving towards Pax Judaica.&lt;/p&gt;&lt;p&gt;
All right?&lt;/p&gt;&lt;p&gt;
So let&#39;s discuss
what will happen in the short term and
in the long term if Pax really is the
end goal. Okay. So when you have Israel
fighting wars everywhere. Okay. The main
enemy right now is Iran.&lt;/p&gt;&lt;p&gt;
In Europe, you have the Europeans about
to go to war with Russia. In Ukraine,
America right now is threatening to
attack Venezuela, South America.&lt;/p&gt;&lt;p&gt;
You have 10% of the
US Navy in the Caribbean and they&#39;re
about to attack Venezuela.&lt;/p&gt;&lt;p&gt;
You have China
and Japan
at conflict. You have India here and you
have Africa. Okay. So, so what&#39;s going
to happen in the short term? Okay. Well,
what we know is that Europe is planning
to go to war with Russia.&lt;/p&gt;&lt;p&gt;


At the same time, you have a lot of
immigrants in Europe and this is 
going to create civil wars in Europe.
  So you have both war
with Russia as well as civil war. So
Europe is kind of screwed. Okay.&lt;/p&gt;&lt;p&gt;
America has the same situation where the
left right divide is so polarized that
eventually they&#39;ll go to war. If you
read the news, you may have heard about
the shootings at Brown University as
well as this MIT physicists who were
shot. So, random violence will be
more and more common in the United
States. And you can argue that&#39;s all
deliberate because the idea is  this.&lt;/p&gt;&lt;p&gt;
Let&#39;s just say you have a jar. You put
red ants in a jar and black ants in the jar. They get along fine. But you take
the jar and you just shake it up and now
they&#39;re at war with each other. Okay,
that&#39;s what&#39;s happening where the left
and right, they really don&#39;t like each
other. They don&#39;t talk to each other and
they refuse to engage in debate 
with each other, but then going to fight each other, in which case
their mentality takes over and
they start killing each other.  So,
we&#39;re going to expect civil war in the
United States.&lt;/p&gt;&lt;p&gt;
Then you&#39;re going to have the Americans
start to attack Venezuela and possibly
other countries in South America. So,
America is in for a bad time. &lt;/p&gt;&lt;p&gt;

 Japan and China and India,
they&#39;re all going to have conflicts with
each other. But also, what we should
expect is that America starts to embargo
China, meaning America uses its sea
power to block China from accessing
resources, more seas. And China imports
most of its oil
and a lot of its food. So if there&#39;s a
blockade of China, you can expect the
Chinese economy to really suffer. 
All right. But and then what we can
expect to happen is America at some
point will go to war with Iran and this
will destroy both countries.  Iran
will not lose this war, but it won&#39;t win
this war neither because America is just
going to bomb the crap out of Iran. It&#39;s
going to send Iran back decades. But
America will lose this war. But this is
important because America loses war,
it&#39;s forced out of the Middle East. And
once it&#39;s forced out of the Middle East,
all its military assets goes to Israel,
which creates the Pax Judaica. Does that
make sense, guys? That&#39;s the plan. Okay.&lt;/p&gt;&lt;p&gt;
Okay, now you have Pax
and what Pax will do is start to
control the world because through chaos
and conflict, Pax Judaica can make a lot
of money, right? Because Pax, what&#39;s
going to happen is that you have these
technology companies like Google,
they&#39;re going to move over to Pax Judea
and build a global surveillance state.&lt;/p&gt;&lt;p&gt;
You have civil wars, you need AI to
control people. If you&#39;re going to war
with Russia, you need weapons, okay? But
you also need financing as well. So, you
can expect a lot of banks to move to
Israel and it&#39;s possible Israel becomes
now the global reserve currency because
everyone is trading with Israel.&lt;/p&gt;&lt;p&gt;
If you&#39;re Russia, you need to  your resources, right?
Oil, energy, and grain.  So, Russia
controls a third of the world&#39;s 
carbohydrates. Guess what, guys? Israel
controls Africa.&lt;/p&gt;&lt;p&gt;
So, what will happen is that Russia and
other countries will sign a trade
agreement with Israel and Israel becomes
a center of global trade.&lt;/p&gt;&lt;p&gt;
Okay, does that make sense? So this is
how Pax Judaica will

profit and remember that Israel has the
world&#39;s best intelligence agency the
Mossad and what they can do is go 
around the world and create as much
chaos as possible.  So while the
world is burning, Israel  is
profiting
and that&#39;s what the future looks like
for the next 10 20 years and this will
of course lead to the rise of the
antichrist
who will take control of Pax Judaica and
force the world to eventually attack
Israel in something called the War of
Gog and Magog and this will of course lead to
second coming of Jesus. So, that&#39;s a
grand plan. Right.&lt;/p&gt;&lt;p&gt;
Any questions?&lt;/p&gt;&lt;p&gt;
Does it make sense to you guys? I know
it&#39;s evil and you know what? I could be a
complete idiot. Okay. I  could just
make making all this up. But you have to
ask yourself three questions. Does it
connect the past? Does it explain what&#39;s
happened in the past? Does it explain
what&#39;s happening today?&lt;/p&gt;&lt;p&gt;
And will these things happen in the
future? Okay. So, we  haven&#39;t lived
for the future yet, but you can see the
trends.&lt;/p&gt;&lt;p&gt;
Okay. All right, guys. The promised
land. This is the greater Israel
project. Okay. This is what Yahweh
promised to Abraham in the Bible. As you
as you can see, it&#39;s pretty huge 
which is the entire Middle East extends
from the Nile to the Euphrates in
Iraq. Okay. It&#39;s a huge area and  if
you say the Israelites are sorry that the
 Israelis  want to achieve the
greater Israel project they call you
conspiracy theorist like we don&#39;t want
that. Okay but explain two things to me.&lt;/p&gt;&lt;p&gt;
First of all why is the greater Israel
map on a chevron of an IDF soldier. Okay
these are soldiers Israeli soldiers and
they wear the insignia of the greater
Israel project. Okay this is the map.&lt;/p&gt;&lt;p&gt;
Also, if you look at the flag of Israel,
there are two blue lines, right? These
represent rivers, the Nile and the
Euphrates.&lt;/p&gt;&lt;p&gt;
All right? So, if it&#39;s a conspiracy
theory, then how do you explain these
two things? All right. But I want to
argue to, you know what, Pax, it&#39;s not
about Israel or the greater Israel
project. What it is ultimately is an
alliance of transnational capital
multinationals like Google and Meta and
intelligence agencies that will be based
in Jerusalem. Okay. So, secret societies
will be based in Jerusalem and they will
use it as a headquarters for their
global conspiracy  and they will
profit from chaos and conflict in around
the world because they think that this
is the culmination of  prophecy.&lt;/p&gt;&lt;p&gt;
But it doesn&#39;t necessarily mean that
Jews will be in charge. Okay? Does that
make sense, guys?  So, it&#39;s  a
much more complicated idea than people
think it is.
  
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/0YKmK8kgfzs?si=JqJrQ1Hvf3Tuqqc2&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/WFWizN3QoPg?si=LBplFTXst8MhDh4u&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
     
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/Cn7UJUFm_cE?si=H8mUUuEdFFB65IfT&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;

</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/pax-judaica-and-ai-technology.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEja-IIrBkSmjrx3D60zrvH_qCROVaUsLTTOSjE5XTToVm5pPsLDkgyoRpObsWEfIMz4_mGoSiHgW8GX-79m6g0LcBD_UFDPEX8aKQEUer_534OLBOvwGM-KdJlKyWHMRlXc3to5Gy2CWrVb-v4WlTiy5ApGmKRH_RRVDh9smzTWp-JgHt5c1_-lxfS_pZQ/s72-c/pax-judaica%281%29.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-346121124710160956</guid><pubDate>Tue, 05 Jan 2010 22:14:00 +0000</pubDate><atom:updated>2026-01-11T21:56:45.877-06:00</atom:updated><title>US used powerful mystery weapon that brought Venezuelan soldiers to their knees</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;508&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVg8puyr-FFE_c4Q9Jim2LmKqNPP2fFekKtXrC1ve1N3egWMHr4FKq9HW7yI5V8uh8WbUlfipfE0SkpVWk3CrWN4h3T-qtMFBUfx1-M6OgeDEyUlRpRcszkV30xc3Z4apeDyMIrKfj3YA9PAvY2K1s2pt7E60ub2kShzXzZm7js1B4kTbXAXMii5ulDY/s1600/did-us-forces-use-sonic-weapons-in-venezuela-operation-to-capture-maduro.jpg&quot; width=&quot;728&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The US used a powerful mystery weapon that brought Venezuelan soldiers to their knees, “bleeding through the nose” and vomiting blood during the daring raid to capture dictator Nicolas Maduro, according to a witness account posted Saturday on X by the White House press secretary.
&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In a jaw-dropping interview, the guard described how American forces wiped out hundreds of fighters without losing a single soldier, using technology unlike anything he has ever seen — or heard.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We were on guard, but suddenly all our radar systems shut down without any explanation,” the guard said. “The next thing we saw were drones, a lot of drones, flying over our positions. We didn’t know how to react.”
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  Moments later, a handful of helicopters appeared — “barely eight,” by his count — deploying what he estimated were just 20 US troops into the area.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But those few men, he said, came armed with something far more powerful than guns.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“They were technologically very advanced,” the guard recalled. “They didn’t look like anything we’ve fought against before.”
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  What ensued, he said, was not a battle, but a slaughter.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We were hundreds, but we had no chance,” he said. “They were shooting with such precision and speed; it felt like each soldier was firing 300 rounds per minute.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Then came the weapon that still haunts him.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“At one point, they launched something; I don’t know how to describe it,” he said. “It was like a very intense sound wave. Suddenly I felt like my head was exploding from the inside.” &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Fire and smoke rising from Caracas mountainside in the distance, with city buildings and homes in the foreground.
  
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  The effects were immediate and horrific. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“We all started bleeding from the nose,” he said. “Some were vomiting blood. We fell to the ground, unable to move. We couldn’t even stand up after that sonic weapon — or whatever it was.” &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The White House did not immediately respond to a question regarding whether Karoline Leavitt’s sharing of the post — captioned, “Stop what you are doing and read this…” — indicated the administration was verifying the veracity of the eyewitness account.
  An estimated 100 Venezuelan security forces were killed in the Jan. 3 attack, according to the country’s Interior Ministry.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
It is unclear if any of those were caused by the mystery weapon.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The outmatched defenders were helpless as the small US unit wiped them out, the guard said.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Those twenty men, without a single casualty, killed hundreds of us,” he claimed. “We had no way to compete with their technology, with their weapons. I swear, I’ve never seen anything like it.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The military has had directed energy weapons — which neutralize targets using focused energy such as microwaves or laser beams — for years, but this could be the first time it’s been used in combat by the US, an ex-US intelligence source told The Post. China reportedly used a microwave weapon in 2020 against Indian soldiers during a border dispute in Ladakh.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The source noted that those weapons have capability to produce at least some of the symptoms, including “bleeding, inability to move or function, pain and burning.” &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“I can’t say all of those symptoms. But yes, some,” the source said. “And we’ve had versions for decades.”
Venezuelan President Nicolas Maduro in handcuffs, escorted by two DEA agents.
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  After the raid, the message couldn’t be more clear: Don’t tread on Uncle Sam, the Maduro loyalist said. 
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Now, he says, the message is clear: Don’t tread on Uncle Sam.
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  “I’m sending a warning to anyone who thinks they can fight the United States,” he said. “They have no idea what they’re capable of. After what I saw, I never want to be on the other side of that again. They’re not to be messed with.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The guard said the raid has already sent shockwaves across Latin America — especially after President Donald Trump recently warned that Mexico is now ‘on the list.’ &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  “Everyone is already talking about this,” he said. “No one wants to go through what we went through. What happened here is going to change a lot of things — not just in Venezuela, but throughout the region.” 
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  A former US intelligence source told the New York Post that the symptoms described could be consistent with directed energy weapons, which use focused energy such as microwaves. Such systems, the source noted, have existed for decades and can cause bleeding, disorientation and physical incapacitation.
  &lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

  
Did US Forces Use Sonic Weapons in Venezuela Operation to Capture Maduro? What the Claims Say &amp;amp; What Remains Unclear&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;img height=&quot;798&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_DpQIdLdAXziC6gq15hJAK9dTWKIhSD8BmF-ZAK_7X9Fp4AfKHKoBzqKLXWL9-jbzvumLV38kvojSVID4egz-WWyrPOW87s8Oj6BK8w-x12cobSU36ytWjFwcpUtaAuTqt9OVTQbdiDwqMIHCLe60xbhPnOQRwN43YIpfkrGnprac-nlLNf2z3FrJKJ8/s1600/AA1TXFuA.jpeg&quot; width=&quot;588&quot; /&gt;

&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  	
Claims of a sonic weapon used by US forces in a Venezuela raid spark global debate after an eyewitness alleged troops were incapacitated by an intense sound force.
&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  Allegations that US forces used a powerful and previously unseen weapon during a raid in Venezuela have ignited worldwide attention and intense debate. The claims emerged after a dramatic eyewitness account described Venezuelan security forces being incapacitated within minutes during an operation aimed at capturing President Nicolas Maduro earlier this month.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The account, shared on X by the White House press secretary, detailed a highly coordinated assault in which advanced technology allegedly overwhelmed Venezuelan defences. While US officials have not confirmed the details, the narrative has raised serious questions about the nature of modern warfare and the weapons potentially being deployed behind the scenes.
   &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  What Happened During the Alleged US Raid in Venezuela?
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
According to the account attributed to a Venezuelan security guard, the operation unfolded with alarming speed. He claimed that radar systems suddenly went offline without warning, leaving forces blind and confused.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We were on guard, but suddenly all our radar systems shut down without any explanation,” the guard said. “The next thing we saw were drones, a lot of drones, flying over our positions. We didn’t know how to react.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The guard said only a small number of US troops entered the area, supported by fewer than ten helicopters. Despite being heavily outnumbered, the Americans allegedly gained immediate control of the situation.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“They were technologically very advanced,” he said. “They didn’t look like anything we’ve fought against before.”
‘Not a Battle, But a Slaughter’: Eyewitness Account &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The encounter, as described, was brutally one-sided. The guard claimed Venezuelan forces had no chance against the speed and accuracy of US firepower. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“We were hundreds, but we had no chance,” he said. “They were shooting with such precision and speed; it felt like each soldier was firing 300 rounds per minute.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The most alarming claim came when he described the alleged deployment of an unknown device that appeared to incapacitate troops instantly. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“At one point, they launched something; I don’t know how to describe it,” he said. “It was like a very intense sound wave. Suddenly, I felt like my head was exploding from the inside.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
He described severe physical effects moments later.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We all started bleeding from the nose. Some were vomiting blood. We fell to the ground, unable to move. We couldn’t even stand up after that sonic weapon, or whatever it was.” &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
White House Silent on Weapon Claims &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The White House has not clarified whether reposting the account amounted to official verification. Press secretary Karoline Leavitt shared the account with the caption “Stop what you are doing and read this,” but officials declined to confirm whether such a weapon was used.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Venezuela’s Interior Ministry said around 100 security personnel were killed during the January 3 operation, though it did not specify the cause of death. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
What Are Sonic Weapons?
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Sonic weapons, also known as directed energy or acoustic weapons, use focused energy such as sound waves, microwaves, or lasers to disable targets rather than destroy them physically. Experts say such systems can cause intense pain, disorientation, internal injuries, and an inability to function.
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
A former US intelligence source said the description closely resembled directed energy weapons. “The military has had versions of these for decades,” the source said. “Some of those systems can cause bleeding, pain, burning, and the inability to function.” &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Similar allegations surfaced in 2020 when China was accused of using a microwave weapon against Indian soldiers in Ladakh, claims Beijing denied. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
‘A Warning to Anyone Who Thinks They Can Fight the US’
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The Venezuelan guard said the raid sent shockwaves across Latin America, especially amid recent warnings from President Donald Trump. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“I’m sending a warning to anyone who thinks they can fight the United States,” he said. “They have no idea what they’re capable of. After what I saw, I never want to be on the other side of that again. They’re not to be messed with.”
 &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
He added, “What happened here is going to change a lot of things, not just in Venezuela, but throughout the region.”

As questions grow louder and confirmation remains elusive, the claims have fueled fresh fears about the future of warfare and the shadowy technologies shaping it.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Also:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;div data-subtree=&quot;aimfl,mfl&quot; style=&quot;display: contents;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Military forces use sound weapons like &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Long Range Acoustic Devices (LRADs)&lt;/span&gt; for crowd control and hailing, projecting painful or loud sound beams, while research explores &lt;span class=&quot;Yjhzub&quot;&gt;infrasonic (low-frequency)&lt;/span&gt; and &lt;span class=&quot;Yjhzub&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAEQAQ&quot; data-ved=&quot;2ahUKEwjm59nniYWSAxVOv4kEHeSnM5IQgK4QegQIARAB&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=ultrasonic&amp;amp;sei=yGxkacCkK__sptQPj7aIyA0&amp;amp;mstk=AUtExfBpkKpRZt7tjRmIWJCsWASMnWixKCpEpX6CtM9aYtE11sqETYvGA5u_dXrYXC5WBhXT8Nzjku75gduRpsWfemsN-1XoUsR8H00Qemyz19hm0EuN-2nknHXGSmAedTrWUq4&amp;amp;csui=3&amp;amp;ved=2ahUKEwjm59nniYWSAxVOv4kEHeSnM5IQgK4QegQIARAB&quot;&gt;ultrasonic&lt;/a&gt; (high-frequency)&lt;/span&gt;
 weapons for disorientation, nausea, or incapacitation, though the 
latter (like the Mosquito) is more common in private security; these 
sonic tools aim to incapacitate without physical force, but pose risks 
of hearing loss, neurological issues, and trauma.&lt;span class=&quot;uJ19be notranslate&quot; data-wiz-uids=&quot;ZfUavf_f,ZfUavf_g&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=ZfUavf_e/TKHnVd&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;div class=&quot;Y3BBE&quot; data-hveid=&quot;CAEQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-wiz-uids=&quot;ZfUavf_f,ZfUavf_g&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Common Types of Sound Weapons&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_o,ZfUavf_p&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_n/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_o,ZfUavf_p&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-processed=&quot;true&quot;&gt;&lt;li data-hveid=&quot;CAMQAA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAMQAQ&quot; data-processed=&quot;true&quot; data-ved=&quot;2ahUKEwjm59nniYWSAxVOv4kEHeSnM5IQgK4QegQIAxAB&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=Long+Range+Acoustic+Devices&amp;amp;sei=yGxkacCkK__sptQPj7aIyA0&amp;amp;mstk=AUtExfBpkKpRZt7tjRmIWJCsWASMnWixKCpEpX6CtM9aYtE11sqETYvGA5u_dXrYXC5WBhXT8Nzjku75gduRpsWfemsN-1XoUsR8H00Qemyz19hm0EuN-2nknHXGSmAedTrWUq4&amp;amp;csui=3&amp;amp;ved=2ahUKEwjm59nniYWSAxVOv4kEHeSnM5IQgK4QegQIAxAB&quot;&gt;Long Range Acoustic Devices&lt;/a&gt; (LRADs):&lt;/span&gt;
 These specialized loudspeakers project focused, high-intensity sound 
beams, used for communication, deterrence (pirates, insurgents), and 
crowd control, capable of causing pain (110-130 dB) and disorientation.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAMQAg&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAMQAw&quot; data-processed=&quot;true&quot; data-ved=&quot;2ahUKEwjm59nniYWSAxVOv4kEHeSnM5IQgK4QegQIAxAD&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=Ultrasonic&amp;amp;sei=yGxkacCkK__sptQPj7aIyA0&amp;amp;mstk=AUtExfBpkKpRZt7tjRmIWJCsWASMnWixKCpEpX6CtM9aYtE11sqETYvGA5u_dXrYXC5WBhXT8Nzjku75gduRpsWfemsN-1XoUsR8H00Qemyz19hm0EuN-2nknHXGSmAedTrWUq4&amp;amp;csui=3&amp;amp;ved=2ahUKEwjm59nniYWSAxVOv4kEHeSnM5IQgK4QegQIAxAD&quot;&gt;Ultrasonic&lt;/a&gt; Devices (e.g., &quot;Mosquito&quot;):&lt;/span&gt;
 Emit high-pitched sounds painful to younger people but often inaudible 
or less impactful to older adults, used for dispersing unruly crowds.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAMQBA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Infrasonic Weapons:&lt;/span&gt;
 Still largely in research, these use very low, often inaudible 
frequencies to cause disorientation, nausea, and psychological distress.&lt;/span&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_13,ZfUavf_14&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_12/TKHnVd&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Other Applications &amp;amp; Examples&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_1d,ZfUavf_1e&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_1c/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_1d,ZfUavf_1e&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-processed=&quot;true&quot;&gt;&lt;li data-hveid=&quot;CAUQAA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Psychological Warfare:&lt;/span&gt; Historically, armies used loud sounds (like drums, horns) and even music (Doris Day songs) to affect enemy morale.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAUQAQ&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Naval Defense:&lt;/span&gt; LRADs are used to keep small boats and pirates away from warships.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAUQAg&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Crowd Control:&lt;/span&gt;
 LRADs and ultrasonic devices are used to disperse protesters, though 
their use is controversial and sometimes legally challenged.&lt;/span&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_1q,ZfUavf_1r&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_1p/TKHnVd&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Effects &amp;amp; Concerns&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_22,ZfUavf_23&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_21/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_22,ZfUavf_23&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-processed=&quot;true&quot;&gt;&lt;li data-hveid=&quot;CAcQAA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Health Impacts:&lt;/span&gt; Can cause permanent hearing loss, traumatic brain injuries, nausea, headaches, and psychological trauma.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAcQAQ&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Debate:&lt;/span&gt;
 While intended for non-lethal control, high-intensity sonic attacks 
raise concerns about excessive force and human rights violations, with 
some devices being banned or restricted in certain areas.&lt;/span&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_2c,ZfUavf_2d&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_2b/TKHnVd&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;ZfUavf_2c,ZfUavf_2d&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=ZfUavf_2b/TKHnVd&quot;&gt; &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Directed Energy Weapons (DEWs) use
 focused beams of electromagnetic energy, like lasers, microwaves, or 
particle beams, to disable, damage, or destroy targets without physical 
projectiles, offering speed (speed-of-light travel), precision, and &lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAEIABAG&quot; data-ved=&quot;2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgAEAY&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=low+cost-per-shot&amp;amp;mstk=AUtExfAL1xkkEvwjKFYOXM7v_r7smCkcv-HCPfYCuzknnDDR_WB9GDtb8ZUqgkc3mV2UTd5e4tPphxhiM4ARzk1zkV5qMpPML1bRILJtoAVR7fxszvK98448fqTPKFsfTKH-d4w&amp;amp;csui=3&amp;amp;ved=2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgAEAY&quot;&gt;low cost-per-shot&lt;/a&gt;
 for countering drones, missiles, and other threats, with major global 
powers actively developing them for military applications.&lt;span class=&quot;uJ19be notranslate&quot; data-wiz-uids=&quot;h7GLe_e,h7GLe_f&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_d/TKHnVd&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;Y3BBE&quot; data-hveid=&quot;CAEIABAC&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-wiz-uids=&quot;h7GLe_e,h7GLe_f&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;iiG1kaaa6GtixptQP0L_o0A0_1&quot; style=&quot;display: contents;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Types of DEWs&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_k,h7GLe_l&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_j/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_k,h7GLe_l&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot;&gt;&lt;li data-hveid=&quot;CAEIABAL&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAEIABAM&quot; data-ved=&quot;2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgAEAw&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=High-Energy+Lasers&amp;amp;mstk=AUtExfAL1xkkEvwjKFYOXM7v_r7smCkcv-HCPfYCuzknnDDR_WB9GDtb8ZUqgkc3mV2UTd5e4tPphxhiM4ARzk1zkV5qMpPML1bRILJtoAVR7fxszvK98448fqTPKFsfTKH-d4w&amp;amp;csui=3&amp;amp;ved=2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgAEAw&quot;&gt;High-Energy Lasers&lt;/a&gt; (HELs):&lt;/span&gt; Use concentrated light beams to burn, melt, or overwhelm sensors on targets like drones and rockets (C-RAM).&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIABAN&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAEIABAO&quot; data-ved=&quot;2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgAEA4&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=High-Power+Microwaves&amp;amp;mstk=AUtExfAL1xkkEvwjKFYOXM7v_r7smCkcv-HCPfYCuzknnDDR_WB9GDtb8ZUqgkc3mV2UTd5e4tPphxhiM4ARzk1zkV5qMpPML1bRILJtoAVR7fxszvK98448fqTPKFsfTKH-d4w&amp;amp;csui=3&amp;amp;ved=2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgAEA4&quot;&gt;High-Power Microwaves&lt;/a&gt; (HPMs):&lt;/span&gt;
 Emit intense microwave energy to disrupt or destroy electronic systems,
 often used against swarms of drones or sensitive equipment.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_1&quot; style=&quot;display: contents;&quot;&gt;&lt;li data-hveid=&quot;CAEIARAA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAEIARAB&quot; data-ved=&quot;2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgBEAE&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=Particle+Beams&amp;amp;mstk=AUtExfAL1xkkEvwjKFYOXM7v_r7smCkcv-HCPfYCuzknnDDR_WB9GDtb8ZUqgkc3mV2UTd5e4tPphxhiM4ARzk1zkV5qMpPML1bRILJtoAVR7fxszvK98448fqTPKFsfTKH-d4w&amp;amp;csui=3&amp;amp;ved=2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgBEAE&quot;&gt;Particle Beams&lt;/a&gt;:&lt;/span&gt; Accelerate particles to high speeds, though less commonly discussed than lasers and microwaves for current deployments.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_2&quot; style=&quot;display: contents;&quot;&gt;&lt;li data-hveid=&quot;CAEIAhAA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;&lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAEIAhAB&quot; data-ved=&quot;2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgCEAE&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=Sound+Beams&amp;amp;mstk=AUtExfAL1xkkEvwjKFYOXM7v_r7smCkcv-HCPfYCuzknnDDR_WB9GDtb8ZUqgkc3mV2UTd5e4tPphxhiM4ARzk1zkV5qMpPML1bRILJtoAVR7fxszvK98448fqTPKFsfTKH-d4w&amp;amp;csui=3&amp;amp;ved=2ahUKEwimntzCioWSAxXYmIkEHdAfGtoQgK4QegYIAQgCEAE&quot;&gt;Sound Beams&lt;/a&gt;:&lt;/span&gt; Use focused acoustic energy, like LRAD systems, for non-lethal crowd control or warning.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/div&gt;&lt;/ul&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_4&quot; style=&quot;display: contents;&quot;&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Advantages&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_20,h7GLe_21&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_1z/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_4&quot; style=&quot;display: contents;&quot;&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_20,h7GLe_21&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_5&quot; style=&quot;display: contents;&quot;&gt;&lt;ul class=&quot;KsbFXc U6u95&quot;&gt;&lt;li data-hveid=&quot;CAEIBBAA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Speed of Light:&lt;/span&gt; Energy travels almost instantaneously, crucial for intercepting fast threats like hypersonic missiles.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIBBAB&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Precision:&lt;/span&gt; Highly focused beams allow for targeting specific components of a threat.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIBBAC&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Scalability:&lt;/span&gt; Can be adjusted for effects, from temporarily &quot;dazzling&quot; sensors to complete destruction.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIBBAD&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Low Cost-Per-Shot:&lt;/span&gt; Cheaper than launching traditional interceptor missiles for every drone.&lt;/span&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-wiz-uids=&quot;h7GLe_2g,h7GLe_2h&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_2f/TKHnVd&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_8&quot; style=&quot;display: contents;&quot;&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Applications&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_2m,h7GLe_2n&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_2l/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_8&quot; style=&quot;display: contents;&quot;&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_2m,h7GLe_2n&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_9&quot; style=&quot;display: contents;&quot;&gt;&lt;ul class=&quot;KsbFXc U6u95&quot;&gt;&lt;li data-hveid=&quot;CAEIBhAA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Counter-UAS (C-UAS):&lt;/span&gt; Defending against drone swarms.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIBhAB&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Missile Defense:&lt;/span&gt; Intercepting incoming rockets, artillery, mortars, and potentially ballistic/hypersonic missiles.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIBhAC&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Electronic Warfare:&lt;/span&gt; Disrupting enemy communications and surveillance.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEIBhAD&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Personnel/Optical Defense:&lt;/span&gt; Dazzling or disabling enemy sensors and optics.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_11&quot; style=&quot;display: contents;&quot;&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Development &amp;amp; Deployment&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_37,h7GLe_38&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_36/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_11&quot; style=&quot;display: contents;&quot;&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_37,h7GLe_38&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;sdh_iG1kaczXJdCfw8cPvPaZ4A0_12&quot; style=&quot;display: contents;&quot;&gt;&lt;ul class=&quot;KsbFXc U6u95&quot;&gt;&lt;li data-hveid=&quot;CAEICBAA&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Key Developers:&lt;/span&gt; United States (DARPA, military branches), China, Russia, UK, Israel, France, Germany, India.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAEICBAB&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot;&gt;Current Status:&lt;/span&gt; Maturing technology, with systems being integrated onto air, land, and sea platforms, aiming for deployment mid-to-late 2020s.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;txxDge notranslate&quot; data-wiz-uids=&quot;h7GLe_3h,h7GLe_3i&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-wiz-attrbind=&quot;class=h7GLe_3g/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;
    
    
&lt;br /&gt;&lt;br /&gt;

  
  &lt;center&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/KCiBiYQXxqo?si=tlalRfxWS1XJBZ0H&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/GiPRr2HjJD4?si=BfWx0jutppVybPpt&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  
  &lt;/center&gt;</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/us-used-powerful-mystery-weapon-that.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwVg8puyr-FFE_c4Q9Jim2LmKqNPP2fFekKtXrC1ve1N3egWMHr4FKq9HW7yI5V8uh8WbUlfipfE0SkpVWk3CrWN4h3T-qtMFBUfx1-M6OgeDEyUlRpRcszkV30xc3Z4apeDyMIrKfj3YA9PAvY2K1s2pt7E60ub2kShzXzZm7js1B4kTbXAXMii5ulDY/s72-c/did-us-forces-use-sonic-weapons-in-venezuela-operation-to-capture-maduro.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-4685985460309780687</guid><pubDate>Mon, 04 Jan 2010 12:01:00 +0000</pubDate><atom:updated>2026-01-15T17:32:48.805-06:00</atom:updated><title>Police Drones Are Starting To Think For Themselves</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFe8eacloFhAxc9iaJYMCmQ10cE0e7J2Q1QjVKObiL9xp6COyUrweZKNNMGCy9MoKMGt4EG3Lbp-H06BUFEwHTu4FKB8jSklGLYKQnjtC67NHsvpJBB9TlX19b3q3rPT1XKDImiX6mXx_TH8GvkfNeEmFlZulkBtkCrzSITK1hBIvRUgOkV7LR1pb8TdE/s1600/GettyImages2249580888-36a34469-935e-4958-8afd-29e06dee5f65.jpg&quot; width=&quot;828&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
When the Chula Vista police receive a 911 call, they can dispatch a flying drone with the press of a button.
&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
On a recent afternoon, from a launchpad on the roof of the Chula Vista Police Department, they sent a drone across the city to a crowded parking lot where a young man was asleep in the front seat of a stolen car with drug paraphernalia on his lap.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
When the man left the car, carrying a gun and a bag of heroin, a nearby police car had trouble following as he sprinted across the street and ducked behind a wall. But as he threw the gun into a dumpster and hid the bag of heroin, the drone, hovering above him, caught everything on camera. When he slipped through the back door of a strip mall, exited through the front door and ran down the sidewalk, it caught that, too.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Watching the live video feed, an officer back at headquarters relayed the details to the police on the scene, who soon caught the man and took him into custody. Later, they retrieved the gun and the heroin. And after another press of the button, the drone returned, on its own, to the roof.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Each day, the Chula Vista police respond to as many as 15 emergency calls with a drone, launching more than 4,100 flights since the program began two years ago. Chula Vista, a Southern California city with a population of 270,000, is the first in the country to adopt such a program, called Drone as First Responder.

    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  Over the last several months, three other cities — two in California and one in Georgia — have followed suit. Police agencies from Hawaii to New York have used drones for years, but mostly in simple, manually flown ways. Officers would carry a drone in the trunk of a car on patrol or drive it to a crime scene before launching it over a park or flying it inside a building.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But the latest drone technology — mirroring technology that powers self-driving cars — has the power to transform everyday policing, just as it can transform package delivery, building inspections and military reconnaissance. Rather than spending tens of millions of dollars on large helicopters and pilots, even small police forces could operate tiny autonomous drones for a relative pittance.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

That newfound automation, however, raises civil liberties concerns, especially as drones gain the power to track vehicles and people automatically. As the police use more drones, they could collect and store more video of life in the city, which could remove any expectation of privacy once you leave the home.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  “Communities should ask hard questions about these programs. As the power and scope of this technology expands, so does the need for privacy protection,” said Jay Stanley, a senior policy analyst with the American Civil Liberties Union’s Project on Speech, Privacy and Technology. “Drones can be used to investigate known crimes. But they are also sensors that can generate offenses.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
With the pandemic still worsening, drones are a way of policing at a distance, said Rahul Sidhu, an officer in Redondo Beach, near Los Angeles, which started a program similar to the one in Chula Vista just after the virus reached the United States.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We’re just trying to limit our exposure to other people,” he said. “Sometimes, you can send a drone without sending an officer.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

But down the road, he said, as these small unmanned helicopters become cheaper and more powerful, they will provide more efficient ways of policing urban areas. That could aid police departments at a time when the number of recruits is on the wane across the country and many voices are calling for funding cuts after months of protests against police violence.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In Chula Vista, drones are already an integral part of the way the police respond to emergencies. After an emergency call comes in, officers give the drone a location, and it flies to that point on its own — before returning on its own, too.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  The department’s drones can cover about one-third of the city from two launch sites, responding to roughly 70 percent of all emergency calls. After asking the Federal Aviation Administration to approve a third launch site, the local police hope to cover the entire city, about 52 square miles between San Diego and the Mexican border.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Government regulations require that a certified pilot remain on the roof of the Police Department, overseeing the launch and, together with a police officer at a command station inside the building, handling most of the flying once the drone reaches its destination.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

F.A.A. regulations aimed at protecting the flights of commercial planes and other aircraft prevent drones from being flown beyond the line of sight of their operators. But Chula Vista obtained a waiver from the F.A.A., so the pilot and officer can fly the drone as much as three miles from its launch site.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Each drone — including long-distance cameras, other sensors and software — costs the department about $35,000. But the overriding cost of the program lies in the many officers needed to operate the drones.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
On another recent afternoon, when the Chula Vista police were alerted to a car turned upside down in an empty riverbed, they sent a new kind of drone into the ravine. Built by Skydio, a Silicon Valley company, it could avoid obstacles on its own thanks to many of the same technologies used by self-driving cars.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“An ordinary drone would have crashed by now, guaranteed,” Sgt. James Horst said as he watched a video of the drone swooping down into the riverbed and inspecting the inside of the car at close quarters.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Later, in the courtyard outside the Police Department, he showed how, with another press of the button, he could instruct an automated drone to follow a particular person or vehicle on its own. Skydio has long offered a consumer drone that can follow you from place to place, even as you weave between obstacles, like trees in a forest. Now the company, which recently hired Fritz Reber, the former head of the Chula Vista police drone program, is selling to the police and other businesses.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  Shield AI, a start-up in San Diego that has worked with police departments, has developed a drone that can fly into a building and inspect the length and breadth of the premises on its own, with no pilot, in the dark as well as in daylight. Others, including Skydio and DJI, a company in China that makes the drones launched from the roof of the Chula Vista Police Department, are building similar technology.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The Chula Vista department treats drone video much as it does video from police body cams, storing footage as evidence and publicly releasing it only with approval, Capt. Don Redmond said. The department does not use drones for routine patrols.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
For privacy advocates like Mr. Stanley of the A.C.L.U., the concern is that increasingly powerful technology will be used to target parts of the community — or strictly enforce laws that are out of step with social norms.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It could allow law enforcement to enforce any area of the law against anyone they want,” Mr. Stanley said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Drones, for instance, could easily be used to identify people and restrict activity during protests like those that have been so prevalent across the country in recent months. Captain Redmond said the Chula Vista department did not deploy drones over Black Lives Matter protests because its policies forbade it.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The Chula Vista police do not require the approval of city officials to expand drone use, but, according to Captain Redmond, they have publicly notified the community about the continued progress of the program.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Drone as First Responder programs in places like Redondo Beach and Clovis, Calif., are seeking waivers that would allow them to fly beyond the operators’ line of sight.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In Clovis, near the middle of the state, the Police Department has found that its drones tend to overheat at the height of summer. “We were flying them four days a week until it got too hot,” Lt. James Munro said. “Then we had to ground them.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But he thinks these and other technical obstacles will soon be overcome. “Drones are like iPhones,” he said. “As soon as you get one, a new one arrives with new technology.”
  
        
 &lt;br /&gt; 
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  
    
     Vermont State Police Demonstrate New Drones
    
    &lt;p&gt;

This week, Vermont State Police demonstrated two of their new “Unmanned Aircraft Systems” — which most people refer to as drones. The state bought 11 of the aircraft to be used in accident reconstruction and search and rescue missions.
Outside the New Haven barracks, Trooper Thomas Howard prepares to put one of the smaller drones into the air. “So the first thing that I’m going to do is now that everything’s set up the controller’s talking to the aircraft I’m going to go ahead and turn the props on. Next thing that we want to do is you want to make sure that it’s operating safely. We want to make sure that it’s doing exactly what we want it to do so.”&lt;/p&gt;&lt;p&gt;

After the pre-flight check, Trooper Howard shows what will happen during an accident reconstruction mission.  “I made a mock collision scene for us.  We hit start. All green check marks is a good sign and we’ll go ahead and start the mission.”&lt;/p&gt;&lt;p&gt;
Reporter:  “Woah.”&lt;/p&gt;&lt;p&gt;
Howard:  “So to get the appropriate amount of resolution for the photographs we fly to the desired designated height. Then it already knows where it needs to take its photographs so it’s going to fly to that area next. And it’s cool that you can look at this display and it actually shows you where the aircraft is. It shows you how many photographs have been taken.  It told me that we’re going to map a scene that’s 38 by 27 meters and the flight time’s going to be 2 minutes and 42 seconds. So that noise says it’s finished its mission.”&lt;/p&gt;&lt;p&gt;
Reporter:   “It’s quiet.”&lt;/p&gt;&lt;p&gt;
Howard:   “Yeah, yeah you barely even know it’s there. Beeping’s stopped and the mission’s finished.”
&lt;/p&gt;&lt;p&gt;
Later Emergency Services Unit Sgt Matthew Sweitzer flys the larger drone. He explains the different capabilities it has and how it can be used for different missions.  “State Police Search and Rescue.”&lt;/p&gt;&lt;p&gt;
Sweitzer’s voice from drone:  “State Police Search and Rescue.”&lt;/p&gt;&lt;p&gt;
Sweitzer:  “So we can communicate one way with people and let them know that we see them. But then it also has a thermal mode. So obviously like for search and rescue that’s really beneficial for us because we can see heat signatures so if someone’s in the woods you know most of the things are pretty cold. And like I was saying before you can also put on the spotlight or this one also has a strobe light built into it so that we can have a strobe that points down while we’re flying at nighttime.”  
&lt;/p&gt;&lt;p&gt;
UAS Program Commander Lt. Cory Lozier says the drones will be primarily used for search and rescue and crash reconstruction.  “They can be used to get overall views of crime scenes. We’re more leaning utilizing the drones for accident and crash reconstruction and search and rescue missions. Basically due to the technology that we have we can now get images that we have never had before. We can different angles, different elevation and the drones that we are using it can reduce time on scene.”
&lt;/p&gt;&lt;p&gt;
Lozier says there are policies and guidelines in place to address privacy concerns.  “These drones will not be used for any warrantless searches.  So they could be used for criminal investigations or surveillance but we would have to apply for a warrant before we do so. If we’re up on another mission and we capture something criminal going on the correct practice would be to stop what we’re doing and apply for a warrant. We would already have the footage but we do have it in policy and in the Legislature that we have 48 hours to apply for a warrant to use the media that we’ve already captured. We will not fly over somebody unless it’s a public safety risk or if we’re trying to save lives. We are very aware of the privacy issues. On a public road we’re okay. Anything private we are going to have to apply for warrants before we deploy our drones.”
&lt;/p&gt;&lt;p&gt;
Thirteen Vermont State Police pilots have received training and been certified by the FAA to operate the drones.   Homeland Security, Highway Safety and other federal grants were used to fund acquisition of 11 drones, 3 large and 8 smaller, at a cost of $105 thousand and another $15 thousand for training.
&lt;/p&gt;&lt;p&gt;
They will be stationed at locations across Vermont  
        
&lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
    
    First in the nation: BRPD’s newest drone taking off to help solve crimes&lt;p&gt;
    &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;428&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9JU5fWcFKirZKQROLD82q6jtt1IHv-MwhGu80r1hb1sM4RiwMtnW2br5abHJ0Z7LOcigFQkdaCthyphenhypheniXHbwACWCVS0MIkTt3JIfWaqP7UvuWAKYGk0vmsD1D8jxnASbwuWKEsvRPj4TqRolCbFTHkh3kYgVFrBDkXdPBZmukhKrwARZq_mmBX0DBeD5qI/s1600/615860292_1350167620486782_3189270143046180903_n.jpg&quot; width=&quot;828&quot; /&gt;
    &lt;/div&gt;
      &lt;p&gt;
    The Baton Rouge Police Department showcased its newest drone unit that’s helping the force solve crimes and protect the people of Baton Rouge. It is the first police department in the U.S. to use this specific technology: a 16-foot, six-wing machine named the Edge Autonomy Stalker VXE30.
&lt;/p&gt;&lt;p&gt;
“As the Capital City of Louisiana, it’s the second biggest department in the entire state. You know, we try to stay on the leading edge. I brag all the time about the Baton Rouge Police Dept. and what the citizens can be proud of. This is just another piece that the citizens can be proud of that is going to be up protecting and help us better manage the citizens the City of Baton Rouge,” said BRPD Chief TJ Morse.&lt;/p&gt;&lt;p&gt;
    
    Other than some federal agencies, BRPD is the first police department to use the VXE30. The drone is a portable, quiet “small uncrewed aircraft system” (SUAS) that is useful for long-endurance, long-range mission support. The vehicle has fully autonomous vertical take off and landing with no operator input required, per BRPD.
&lt;/p&gt;&lt;p&gt;
Since the tragic crash in 2023 that resulted in the loss of BRPD’s helicopter program and aviation support unit, the department has fully invested in using drone technology, Morse said.
    &lt;/p&gt;&lt;p&gt;
    The drones assist with everything from going inside of houses to searching perimeters for suspects, Morse explained. They also can help in other areas such as with the fire department for searching for hot spots in buildings, looking at flooded areas or downed power lines, and in vehicle pursuits.
&lt;/p&gt;&lt;p&gt;
“This weekend, Saturday and Sunday, we have the Louisiana Marathon. We’re going to be using this drone technology to monitor traffic and security out there and during football season, all of these kind of things,” Morse said.
&lt;/p&gt;&lt;p&gt;
Sgt. Dustin Conde is the unit’s commander and helped showcase the VXE30’s capabilities. He explained that there are now 31 drones used in BRPD’s force.
&lt;/p&gt;&lt;p&gt;
“We have 24 pilots that are licensed with the FAA to pilot these drones. As of 2025, we have had over 1600 deployments with the Baton Rouge Police Department with our drone. Out of those, 77 have been directly linked to an arrest, you know, protecting officers, giving us an eye in the sky,” Conde explained.&lt;/p&gt;&lt;p&gt;
    
    Officers go through a two-week (80-hour) certification training to pilot the VXE30 drone.
&lt;/p&gt;&lt;p&gt;
The drone has multiple camera capabilities, and one of the options is a thermal imaging camera with a four-hour flight time.
&lt;/p&gt;&lt;p&gt;
“It can be miles away, but we can still have a camera looking at your face,” Morse said.
&lt;/p&gt;&lt;p&gt;
The Edge Autonomy Stalker VXE30 is a product of Lockheed Martin, an aerospace and defense company.

“We want to constantly be on the forefront of technology, be on the forefront of what policing is doing. So this is just another piece people out there looking to join a law enforcement career, we can say, ‘Hey, we have an award-winning motorcycle division, award-winning k9, award-winning SWAT. We have this technology and we’re the first in the country’,” the police chief said.
    &lt;/p&gt;&lt;p&gt;
    “If you want to be a part of the trending trendsetters, come join the Baton Rouge Police Department.”
&lt;/p&gt;&lt;p&gt;
According to Morse, compared to the department’s helicopter program, which saw annual costs around $1 million, the drone division is seeing a dramatic cost savings annually. Morse estimated that the costs for battery replacements and certifications is costing $100,000 per year.
    
    
    
    
&lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;

  
This New Autonomous Drone for Cops Can Track You in the Dark &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;img height=&quot;498&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxv8Y0wQss6Mh-DwdJfEiupMiXZ20l5ZMsudJllPMjqKpfvfIZ-7H6XKif63yDtx5HSGHIIiOwkvovpnQdOkTOXeNSXmhwdwJTIy8eXWCDtUvelhu6S2lvjhNXKW2wuUkO9irPMjrRIyg0QTVLcLcw_HeZ_LP4cRaBg9qrM-fra2WJYJ-j7WS8v-8zjEU/s1600/Drones-for-police-Real-time-intelligence-2-1280x800.jpg&quot; width=&quot;728&quot; /&gt;

&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
    
 Startup Skydio says its powerful new drone for public safety can reduce the need for high-speed chases. Civil liberties groups warn that few rules govern police use of drones.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Nearly 1,500 US police departments operate drones but only about a dozen routinely dispatch them in response to 911 calls, according to ACLU research. Drone maker Skydio aims to see that change, with a new model launched last week called the X10. The goal, cofounder and CEO Adam Bry said during a launch event last week in San Francisco, is to “get drones everywhere they can be useful in public safety.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The new drone is capable of flying at speeds of 45 miles per hour and is small enough to fit into the trunk of a police car. It has infrared sensors that can be used to track people and fly autonomously in the dark. Four payload bays on the X10 can carry accessories like a speaker, spotlight, or a parachute for emergency landings. A 65X zoom camera can read a license plate from 800 feet away and follow a vehicle from a distance of 3 miles.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  “I think mitigating or eliminating high-speed chases will be one of the major applications that we&#39;ll see with customers, largely based on that zoom camera,” Bry says.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  New capabilities like those could encourage wider use of drones in law enforcement at a time when policy concerning their use is still developing. Tests by emergency responders and the US Federal Aviation Administration to extend drone flights beyond the operator’s line of sight and respond to 911 calls started in 2017. Civil liberties advocates say there is a lack of rules to limit drone use in sensitive contexts like protests or in concert with other forms of surveillance technology.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  When Skydio launched nearly a decade ago, it focused on selling drones to outdoor athletes interested in a machine something like an autonomous aerial GoPro, following them down a mountain or trail while capturing video. That began to change in 2020 when Skydio got picked as one of a handful of companies approved for off-the-shelf use by branches of the US military. Today Skydio’s customers include BNSF Railway, utility companies in California and Illinois, and law enforcement agencies like the NYPD.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
At a press conference in July, New York mayor Eric Adams announced that his police department would begin controlling drone flight licenses for the city. While holding a Skydio remote control as a prop, he voiced support for using drones to stop high-speed car chases.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

This month, at another news conference, Adams said New York is behind other police departments in drone deployment but will “become the leader in how to properly use drones.” He pledged to use more surveillance and technology following an increase in some measures of crime last year.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  At the Skydio event last week, New York Police Department chief of patrols John Chell said he thinks drones can cut down on the need for helicopter deployments. In the near future he envisions the city police academy training recruits in how to pilot drones, placing at least one drone at each of the more than 70 precincts across New York, and drones launching autonomously to investigate alerts of potential gunshots heard by AI-powered tool ShotSpotter. Skydio introduced docks last year that house and charge drones and can enable autonomous take off.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The NYPD’s new interest in drones has drawn criticism from civil liberties groups like the ACLU and the Surveillance Technology Oversight Project, but also from less expected voices.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Curtis Sliwa founded New York neighborhood watch group Guardian Angels in 1979 to patrol city streets at a time of widespread concern about violent crime. Last month, he used his radio show to accuse the NYPD and Adams of using drones to intimidate the crowd while Sliwa spoke at a recent anti-immigration protest. An unsigned email from the NYPD sent in response to questions from WIRED says that a drone was deployed in Staten Island that month to assess pedestrian congestion, vehicular traffic, and other public safety concerns.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Ahead of the recent Labor Day holiday, one NYPD commissioner pledged to monitor large backyard gatherings using drones. At the Skydio event last week, Chell praised the NYPD for making 10 drone deployments over that holiday weekend, including at the J’Ouvert and West Indian Day celebrations, and the Electric Zoo music festival. He said they helped prevent retaliation following a shooting and contributed to officers apprehending three carjacking suspects. An NYPD spokesperson did not respond to requests for additional details about recent drone deployments.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The busy Labor Day for NYPD drones shows the department moving toward treating drones as first responders, says Daniel Schwarz, senior privacy and technology strategist at the New York Civil Liberties Union. The nonprofit says problematic use of police drones, including at protests in 15 cities after the 2020 death of George Floyd, shows legislation is needed to limit police use of the technology. The ACLU wants bans on drone use at protests and adding weapons to the craft, and guardrails to prevent drones being combined with other forms of surveillance technology like face recognition or ShotSpotter.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

  
  Drone deployments by police, like other forms of surveillance, risk falling into historical patterns of targeting certain groups. A 2021 analysis by Amnesty International of surveillance cameras throughout New York City found that they disproportionately threaten the civil liberties of people of color.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
A joint December 2021 report by the ACLU, the Electronic Frontier Foundation, and the Surveillance Technology Oversight Project, argues that drones allow covert surveillance. When flying hundreds of feet aloft the craft are virtually impossible to see or hear, and citizens have little hope of knowing what they are carrying.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

As part of the rollout of the X10, Skydio announced a partnership with Axon, which makes Tasers and other police technology. Video from Skydio drones will be more closely integrated into the software Axon sells police departments for incident response and managing evidence.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Bry says Skydio is not working with Axon on weaponizing drones and that Skydio doesn’t support weaponizing drones or robots, but he added that it’s difficult to stop people from making hacks or custom modifications. Last year, Axon suggested using autonomous Taser-mounted drones to stop mass shootings, and the majority of the company’s AI Ethics board resigned in protest.
  
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;



How Drones for Police are Revolutionizing Law Enforcement Operations

&lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;


In recent years, the integration of drone technology into law enforcement operations has marked a significant shift in policing tactics. Drones for police, specifically small, multirotor drones, have become invaluable tools for police departments across the globe. These advanced aerial systems are enhancing the effectiveness of law enforcement in various aspects, from aerial surveillance to search and rescue operations and beyond.
&lt;p&gt;

In recent years, the integration of drone technology into law enforcement operations has marked a significant shift in policing tactics. Drones for police, specifically small, multirotor drones, have become invaluable tools for police departments across the globe. These advanced aerial systems are enhancing the effectiveness of law enforcement in various aspects, from aerial surveillance to search and rescue operations and beyond.  &lt;/p&gt;&lt;p&gt;
Example of drones for police, with officers using a drone to overwatch a stadium and its surroundings during a sport event  &lt;/p&gt;&lt;p&gt;
Drones for Police and Public Safety to Enhance Aerial Surveillance  &lt;/p&gt;&lt;p&gt;

Drones have changed how police watch from above, making surveillance more effective and flexible. These drones can provide complete coverage and monitor situations in real-time. This is key for situations that require quick action.
Beyond mere surveillance, drones are proactive deterrents in regions suffering from high crime rates. They can enhance safety while simultaneously reducing risks to law enforcement personnel on the ground.  &lt;/p&gt;&lt;p&gt;
Perimeter surveillance
  &lt;/p&gt;&lt;p&gt;
One example of this application is in perimeter surveillance. Drones for police can provide a unique advantage over fixed cameras by offering aerial views that cover vast expanses without blind spots. Drones can help quickly spot breaches or unauthorized entries at major events or secure facilities. Fixed cameras may miss these because they have limited views.  &lt;/p&gt;&lt;p&gt;
Persistent aerial coverage  &lt;/p&gt;&lt;p&gt;

Tethered drones bring specific advantages to law enforcement surveillance and safety operations. The tether keeps the drone powered from the ground so it can fly longer without needing new batteries. It also secures the drone against flyaways.
Tethered drones can stay in the air for a long time during surveillance tasks like crime scene investigations. They provide live video feed to command centers for hours or even days. This capability is invaluable for gathering evidence, monitoring suspect movements, and ensuring officer safety during prolonged incidents.  &lt;/p&gt;&lt;p&gt;
As an example, during large events, tethered drones can offer continuous aerial view, making it easier to spot and address potential crowd-related issues before they escalate. In addition, the persistent presence of a drone overhead can also act as a visual deterrent to potential troublemakers.  &lt;/p&gt;&lt;p&gt;
Integration with surveillance system  &lt;/p&gt;&lt;p&gt;

The flexibility of drones for police extends to their ability to integrate seamlessly with existing security infrastructure, enhancing the efficacy of traditional surveillance methods. By feeding aerial data into central monitoring systems, drones offer a more comprehensive picture of security scenarios, allowing for quicker and more coordinated responses to incidents.  &lt;/p&gt;&lt;p&gt;
More ethical alternatives  &lt;/p&gt;&lt;p&gt;

Replacing or complementing traditional helicopter surveillance, drones present a more cost-effective and less intrusive method of aerial monitoring. This approach aligns with ethical and responsible law enforcement practices, emphasizing the importance of minimizing operational risks and respecting community privacy. Today, police want to be transparent about their drone use, especially because people often have concerns about surveillance technology. By openly communicating the intentions and regulations surrounding the use of drones for police, agencies can ensure public trust and support for these advanced surveillance tools.

      &lt;/p&gt;&lt;p&gt;
    
Drones for Police: Event Security  &lt;/p&gt;&lt;p&gt;

Drones are now a key part of security plans for police at big public events. These advanced aerial tools offer an unparalleled aerial perspective, crucial for effective crowd monitoring, control, and the early identification of potential security threats. Drones for police give police a quick and detailed look at what’s happening, helping them respond faster and more accurately to emergencies. This makes public safety better and police work more efficient.  &lt;/p&gt;&lt;p&gt;
Tethered drones for extended flight times  &lt;/p&gt;&lt;p&gt;

Particularly, tethered drones offer distinct advantages in event security. These drones, attached to ground power, offer extended flight times and stable, secure data transmission.  &lt;/p&gt;&lt;p&gt;
This ensures continuous aerial surveillance without the interruption of battery changes, a common limitation of traditional drones.  &lt;/p&gt;&lt;p&gt;
The secure tether reduces risks of signal interference, ensuring reliable communication. It also has the advantage of keeping the aircraft safely away from crowds below.  &lt;/p&gt;&lt;p&gt;
The benefits of high definition cameras
  &lt;/p&gt;&lt;p&gt;
Equipped with high-definition cameras and adapted payloads, drones can adapt to various security needs. Features like thermal imaging are key for monitoring in low-light conditions. As for zoom lenses, they allow for detailed observation of specific areas. They can also carry loudspeakers for direct communication with crowds, enhancing crowd management and emergency response.  &lt;/p&gt;&lt;p&gt;
Real time intelligence  &lt;/p&gt;&lt;p&gt;

Integrating seamlessly with ground-based security operations, drones for police contribute to a holistic security approach. They provide real-time intelligence to command centers, ensuring coordinated responses alongside other security measures. By removing line of sight restrictions, a communication node improves security team communication infrastructure, enhancing overall security operation effectiveness.  &lt;/p&gt;&lt;p&gt;

    
    

In recent years, the integration of drone technology into law enforcement operations has marked a significant shift in policing tactics. Drones for police, specifically small, multirotor drones, have become invaluable tools for police departments across the globe. These advanced aerial systems are enhancing the effectiveness of law enforcement in various aspects, from aerial surveillance to search and rescue operations and beyond.  &lt;/p&gt;&lt;p&gt;
Example of drones for police, with officers using a drone to overwatch a stadium and its surroundings during a sport event  &lt;/p&gt;&lt;p&gt;
Drones for Police and Public Safety to Enhance Aerial Surveillance  &lt;/p&gt;&lt;p&gt;

Drones have changed how police watch from above, making surveillance more effective and flexible. These drones can provide complete coverage and monitor situations in real-time. This is key for situations that require quick action.
Beyond mere surveillance, drones are proactive deterrents in regions suffering from high crime rates. They can enhance safety while simultaneously reducing risks to law enforcement personnel on the ground.  &lt;/p&gt;&lt;p&gt;
Perimeter surveillance  &lt;/p&gt;&lt;p&gt;

One example of this application is in perimeter surveillance. Drones for police can provide a unique advantage over fixed cameras by offering aerial views that cover vast expanses without blind spots. Drones can help quickly spot breaches or unauthorized entries at major events or secure facilities. Fixed cameras may miss these because they have limited views.  &lt;/p&gt;&lt;p&gt;
Persistent aerial coverage
  &lt;/p&gt;&lt;p&gt;
Tethered drones bring specific advantages to law enforcement surveillance and safety operations. The tether keeps the drone powered from the ground so it can fly longer without needing new batteries. It also secures the drone against flyaways.
Tethered drones can stay in the air for a long time during surveillance tasks like crime scene investigations. They provide live video feed to command centers for hours or even days. This capability is invaluable for gathering evidence, monitoring suspect movements, and ensuring officer safety during prolonged incidents.  &lt;/p&gt;&lt;p&gt;
As an example, during large events, tethered drones can offer continuous aerial view, making it easier to spot and address potential crowd-related issues before they escalate. In addition, the persistent presence of a drone overhead can also act as a visual deterrent to potential troublemakers.  &lt;/p&gt;&lt;p&gt;
Integration with surveillance system  &lt;/p&gt;&lt;p&gt;

The flexibility of drones for police extends to their ability to integrate seamlessly with existing security infrastructure, enhancing the efficacy of traditional surveillance methods. By feeding aerial data into central monitoring systems, drones offer a more comprehensive picture of security scenarios, allowing for quicker and more coordinated responses to incidents.  &lt;/p&gt;&lt;p&gt;
More ethical alternatives
  &lt;/p&gt;&lt;p&gt;
Replacing or complementing traditional helicopter surveillance, drones present a more cost-effective and less intrusive method of aerial monitoring. This approach aligns with ethical and responsible law enforcement practices, emphasizing the importance of minimizing operational risks and respecting community privacy. Today, police want to be transparent about their drone use, especially because people often have concerns about surveillance technology. By openly communicating the intentions and regulations surrounding the use of drones for police, agencies can ensure public trust and support for these advanced surveillance tools.  &lt;/p&gt;&lt;p&gt;
Surveillance system with multiple surveillance screens including a drone view  &lt;/p&gt;&lt;p&gt;
Drones for Police: Event Security  &lt;/p&gt;&lt;p&gt;

Drones are now a key part of security plans for police at big public events. These advanced aerial tools offer an unparalleled aerial perspective, crucial for effective crowd monitoring, control, and the early identification of potential security threats. Drones for police give police a quick and detailed look at what’s happening, helping them respond faster and more accurately to emergencies. This makes public safety better and police work more efficient.  &lt;/p&gt;&lt;p&gt;
Tethered drones for extended flight times
  &lt;/p&gt;&lt;p&gt;
Particularly, tethered drones offer distinct advantages in event security. These drones, attached to ground power, offer extended flight times and stable, secure data transmission.  &lt;/p&gt;&lt;p&gt;
This ensures continuous aerial surveillance without the interruption of battery changes, a common limitation of traditional drones.  &lt;/p&gt;&lt;p&gt;
The secure tether reduces risks of signal interference, ensuring reliable communication. It also has the advantage of keeping the aircraft safely away from crowds below.  &lt;/p&gt;&lt;p&gt;
The benefits of high definition cameras  &lt;/p&gt;&lt;p&gt;

Equipped with high-definition cameras and adapted payloads, drones can adapt to various security needs. Features like thermal imaging are key for monitoring in low-light conditions. As for zoom lenses, they allow for detailed observation of specific areas. They can also carry loudspeakers for direct communication with crowds, enhancing crowd management and emergency response.
  &lt;/p&gt;&lt;p&gt;Real time intelligence
  &lt;/p&gt;&lt;p&gt;
Integrating seamlessly with ground-based security operations, drones for police contribute to a holistic security approach. They provide real-time intelligence to command centers, ensuring coordinated responses alongside other security measures. By removing line of sight restrictions, a communication node improves security team communication infrastructure, enhancing overall security operation effectiveness.  &lt;/p&gt;&lt;p&gt;
Aerial picture of an highway taken by a drone with a real time image analysis software  &lt;/p&gt;&lt;p&gt;
Search and Rescue Operations: Speed and Efficiency of Drones for Police
  &lt;/p&gt;&lt;p&gt;
In search and rescue, police drones have emerged as invaluable assets, drastically improving the speed and efficiency of operations. These drones equipped with advanced thermal cameras that can quickly find missing people in difficult places like forests or mountains.  &lt;/p&gt;&lt;p&gt;
During natural disasters, such as floods, earthquakes, or wildfires, the aerial perspective provided by drones becomes crucial. It allows rescue teams to assess the situation safely and effectively, identifying survivors and assessing risks without putting rescue personnel in immediate danger.  &lt;/p&gt;&lt;p&gt;
Quick deployment capability  &lt;/p&gt;&lt;p&gt;

The quick deployment capability of drones for police is a game-changer in time-sensitive scenarios. Unlike manned aircraft, drones can be launched rapidly and with minimal logistical requirements. Speed is important during search and rescue missions. Every minute counts and can make a difference between life and death.  &lt;/p&gt;&lt;p&gt;
Drones can cover large areas faster than people on the ground. They give real-time data and images to help rescuers find exact locations. This efficiency saves time and reduces the manpower and resources needed in traditional search methods.  &lt;/p&gt;&lt;p&gt;
Thermal imaging  &lt;/p&gt;&lt;p&gt;

The drones have thermal imaging technology. This technology is helpful in hard-to-see situations including nighttime or obscured areas. They can detect heat signatures of humans and animals, even if foliage obscures them, debris traps them, or they are incapacitated in some way.  &lt;/p&gt;&lt;p&gt;
Comprehensive situational awareness
  &lt;/p&gt;&lt;p&gt;
Drones also play a crucial role in post-disaster scenarios. They can be used to assess damage, map affected areas, and identify safe routes for rescue teams.  &lt;/p&gt;&lt;p&gt;
This comprehensive situational awareness is vital for planning and executing efficient rescue operations. The integration of drones for police in search and rescue operations also includes the use of additional technologies such as high-resolution cameras, GPS, and real-time data transmission systems.  &lt;/p&gt;&lt;p&gt;
These technologies enable constant communication between the drone operators and ground teams, ensuring coordinated efforts and effective decision-making.  &lt;/p&gt;&lt;p&gt;
Greater safety of the first responders  &lt;/p&gt;&lt;p&gt;

Furthermore, the use of drones in search and rescue not only enhances operational capabilities but also ensures greater safety for the rescue teams. Drones give an overview and spot dangers, aiding in planning rescue missions and lowering risk for first responders.  &lt;/p&gt;&lt;p&gt;
The large variety of payloads is one aspect that makes drones a key asset in these scenarios. In addition to traditional RGB cameras, thermal imaging payloads, and communications equipment, drones can also be equipped with loudspeakers and spotlights to assist SAR personnel during nighttime operations.
  &lt;/p&gt;&lt;p&gt;
    
    
Drone for Police: Accident Scene Reconstruction and Analysis
  &lt;/p&gt;&lt;p&gt;
Drones for police have also become essential tools for accident scene reconstruction and analysis. Police can use drones to get detailed views of accident scenes from hard-to-reach angles, improving their investigation capabilities. This high-level overview is instrumental in gathering crucial data for accurately reconstructing events, a key component in traffic accident investigations.  &lt;/p&gt;&lt;p&gt;
Integration with 3D mapping softwares  &lt;/p&gt;&lt;p&gt;

One of the most significant advancements in drone technology for law enforcement is the integration of 3D mapping software.
Drones with high-tech cameras and sensors can scan accident scenes fast, taking many pictures from different angles. Sophisticated 3D mapping software processes these images to create accurate, detailed reconstructions of the scene.
This technology helps analyze important details. It can determine the location of vehicles during the accident. It can also identify where debris landed and skid marks. This information is key in understanding how the accident occurred.  &lt;/p&gt;&lt;p&gt;
The use of drones for 3D mapping presents several advantages over traditional ground-based methods.  &lt;/p&gt;&lt;p&gt;
• First, it significantly speeds up the process of data collection. In the past, police officers had to measure and document crash scenes manually. This process was time-consuming and often led to longer road closures. With drones, the same data can be collected in a fraction of the time, enabling quicker clearance of accident sites and reducing the impact on traffic flow.&lt;/p&gt;&lt;p&gt;
• Moreover, drone-based 3D mapping enhances the safety of both officers and the public. Police can use drones to stay safe during accidents for example on busy highways or in dangerous areas. This remote data collection method minimizes the risk of secondary accidents and ensures the safety of first responders.  &lt;/p&gt;&lt;p&gt;
Analysis of scenes with 3D reconstructions  &lt;/p&gt;&lt;p&gt;

Another advantage of using drones in accident scene analyzing is the level of detail and accuracy they provide. 3D reconstructions from drone pictures provide a detailed view of a scene.  &lt;/p&gt;&lt;p&gt;
This helps to identify small details that may be missed by the naked eye. This detailed information helps investigators understand what happened before an accident. It also helps them figure out why it occurred. Additionally, it allows them to create accurate reports for legal and insurance reasons.  &lt;/p&gt;&lt;p&gt;
The integration of drones into accident scene reconstruction also aids in documentation and evidence preservation. Hig resolution pictures and 3D models are helpful records that can be studied and analyzed even after the real scene is gone. Data permanence is crucial in legal cases, where visual evidence of the scene can be very important.  &lt;/p&gt;&lt;p&gt;

Overall, using drones in law enforcement helps improve public safety and operational efficiency by opening up new possibilities. Drones are changing aerial surveillance with their unique views and secure coverage, surpassing fixed cameras with their flexibility. Drone technology is improving and will help law enforcement more. It will offer new ways to prevent crime and keep the public safe.  
    
    
 &lt;br /&gt; 
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  
Police UAVs: A Comprehensive Guide for Drone Pilots
&lt;/p&gt;&lt;p&gt;
Police use drones every day to make their work safer and more efficient.
  &lt;/p&gt;&lt;p&gt;
But this wasn’t the case just a decade ago. Over the last few years, the use of drones in law enforcement has rapidly expanded, aided by improvements in the technology and a growing awareness of all the benefits drones can provide to police work.
    &lt;/p&gt;&lt;p&gt;
  How to Start a Police Drone Program: A Step-by-Step Guide
  &lt;/p&gt;&lt;p&gt;
Starting a police drone program can greatly enhance a department’s capabilities in surveillance, search and rescue, and other law enforcement tasks.
  &lt;/p&gt;&lt;p&gt;
Police departments can establish a drone program either by operating under the FAA’s Part 107 rules or by applying for a Certificate of Authorization (COA).  &lt;/p&gt;&lt;p&gt;
  
  Here’s a detailed, step-by-step guide on starting a police drone program using both pathways.  &lt;/p&gt;&lt;p&gt;
Starting a Police Drone Program Under The FAA’s Part 107 Rules  &lt;/p&gt;&lt;p&gt;

Operating under Part 107 rules allows police departments to follow the same regulations as commercial drone operators. This approach is often faster and simpler to set up, though it comes with certain limitations, such as restrictions on night operations or flying over people without waivers.
  &lt;/p&gt;&lt;p&gt;
    Familiarize with Part 107 Requirements  &lt;/p&gt;&lt;p&gt;
    Begin by understanding the FAA’s Part 107 regulations governing drone operations for commercial and governmental purposes. This will provide guidance on allowable operations, including flight altitude limits, line-of-sight requirements, and necessary permissions for specific types of operations.  &lt;/p&gt;&lt;p&gt;
    Ensure Pilot Certification  &lt;/p&gt;&lt;p&gt;
    At least one department member must be certified as a Remote Pilot under Part 107. To do this, the officer must:  &lt;/p&gt;&lt;p&gt;
        Pass the FAA’s Part 107 knowledge test at an FAA-approved testing center.  &lt;/p&gt;&lt;p&gt;
        Submit an application through the Integrated Airman Certification and Rating Application (IACRA) website to obtain a Remote Pilot Certificate.  &lt;/p&gt;&lt;p&gt;
    Acquire Necessary Equipment  &lt;/p&gt;&lt;p&gt;
    Select the appropriate drones and accessories based on the department’s operational needs. Consider drones with advanced features, such as high-definition cameras, thermal imaging, and obstacle avoidance systems.  &lt;/p&gt;&lt;p&gt;
    Develop Departmental Policies and Procedures  &lt;/p&gt;&lt;p&gt;
    Establish guidelines for safe and ethical drone operations, including privacy considerations, data storage, and situational use protocols. Define standard operating procedures (SOPs) that cover pre-flight checks, in-flight operations, and post-flight documentation.  &lt;/p&gt;&lt;p&gt;
    Apply for Additional Part 107 Waivers if Needed  &lt;/p&gt;&lt;p&gt;
    For operations not typically allowed under Part 107—such as night flights or flights over people—you’ll need to apply for waivers. Submit waiver requests through the FAA’s DroneZone portal, providing a detailed risk assessment and mitigation plan.  &lt;/p&gt;&lt;p&gt;
    Begin Training Exercises  &lt;/p&gt;&lt;p&gt;
    Conduct training sessions to ensure all team members are familiar with drone operations, flight safety, and emergency procedures. Training should include both simulated and real-life scenarios to build skills and confidence in using the technology.
  &lt;/p&gt;&lt;p&gt;
Starting a Police Drone Program Using a Certificate of Authorization (COA)
  &lt;/p&gt;&lt;p&gt;
A Certificate of Authorization (COA) allows public safety agencies to operate drones for specific, approved purposes, often with fewer restrictions than Part 107. This approach is suitable for departments needing greater operational flexibility, such as flying beyond visual line of sight (BVLOS) or during emergency situations.  &lt;/p&gt;&lt;p&gt;

    Apply for a Public Safety COA  &lt;/p&gt;&lt;p&gt;
    Start by applying for a public safety COA through the FAA’s FAA Public Safety and Government portal. A COA enables agencies to operate outside some Part 107 limitations, but applications must be specific to the intended use and geographical area.  &lt;/p&gt;&lt;p&gt;
    Complete the FAA COA Process  &lt;/p&gt;&lt;p&gt;
    As part of the application, provide a detailed operational plan, outlining:  &lt;/p&gt;&lt;p&gt;
        Specific locations and airspace where the drone will operate.  &lt;/p&gt;&lt;p&gt;
        Safety protocols for BVLOS, night operations, and other advanced capabilities.  &lt;/p&gt;&lt;p&gt;
        Risk mitigation strategies to protect bystanders and property.  &lt;/p&gt;&lt;p&gt;

    The FAA may require additional documentation or approvals for certain types of operations.  &lt;/p&gt;&lt;p&gt;
    Ensure Pilot and Staff Training  &lt;/p&gt;&lt;p&gt;
    Pilots operating under a COA must be trained in line with the agency’s standards. Training should cover drone operation, airspace awareness, and emergency procedures. Some agencies may require their pilots to have a Part 107 certificate as well, even when flying under a COA.  &lt;/p&gt;&lt;p&gt;
    Establish and Maintain Communication with Local Air Traffic Control (ATC)  &lt;/p&gt;&lt;p&gt;
    For COA operations in controlled airspace, coordinate with local ATC to ensure flight safety. Provide ATC with details of your operating area, emergency contacts, and notification procedures to avoid airspace conflicts.  &lt;/p&gt;&lt;p&gt;
    Define and Document Use Cases and Protocols  &lt;/p&gt;&lt;p&gt;
    Create a clear set of use cases for drone deployment, such as emergency response, crowd monitoring, and accident investigation. Each use case should have corresponding protocols, including flight restrictions, altitude limits, and data security practices.  &lt;/p&gt;&lt;p&gt;
    Implement Privacy and Data Management Policies  &lt;/p&gt;&lt;p&gt;
    Draft policies to ensure data captured by drones is handled in compliance with privacy laws. Define data storage, sharing protocols, and data retention schedules to protect sensitive information.  &lt;/p&gt;&lt;p&gt;
    Conduct Regular Maintenance and Safety Checks  &lt;/p&gt;&lt;p&gt;
    To maintain COA compliance, regularly inspect and maintain drone equipment. Record all maintenance activities and implement a safety management system to track incidents, repairs, and safety performance.  &lt;/p&gt;&lt;p&gt;
  
  Additional Considerations for Starting a Police Drone Program  &lt;/p&gt;&lt;p&gt;

    Consider pursuing both Part 107 certification and a COA for maximum flexibility  &lt;/p&gt;&lt;p&gt;
    Consult with experienced drone program consultants or other agencies with established programs  &lt;/p&gt;&lt;p&gt;
    Regularly review and update policies to comply with changing regulations  &lt;/p&gt;&lt;p&gt;
    Implement a system for documenting all drone operations and incidents  &lt;/p&gt;&lt;p&gt;
    Establish a process for program evaluation and continuous improvement  &lt;/p&gt;&lt;p&gt;

How Police Use Drones: 10 Key Applications in Law Enforcement  &lt;/p&gt;&lt;p&gt;

Drones for law enforcement have become essential tools for police departments, supporting a range of critical operations and offering new perspectives and capabilities.  &lt;/p&gt;&lt;p&gt;

Here are the top 10 applications of police drones in modern policing.  &lt;/p&gt;&lt;p&gt;
  
  1. Crime Scene Investigation  &lt;/p&gt;&lt;p&gt;

Police drones provide a valuable aerial perspective for crime scene investigations, allowing investigators to capture detailed images and videos from multiple angles.  &lt;/p&gt;&lt;p&gt;

High-resolution aerial footage can aid in reconstructing events, gathering evidence, and gaining insights that would be difficult to achieve from the ground alone. Drones can also help preserve the integrity of the crime scene while reducing the time and personnel required for documentation.  &lt;/p&gt;&lt;p&gt;
2. Search and Rescue Missions  &lt;/p&gt;&lt;p&gt;

In search and rescue operations, law enforcement drones are used to cover large areas quickly and access difficult or dangerous terrain.  &lt;/p&gt;&lt;p&gt;

Equipped with thermal imaging and night vision capabilities, drones can detect heat signatures and locate missing persons or victims in low-visibility conditions. These capabilities make drones invaluable for saving lives in situations where time is critical.  &lt;/p&gt;&lt;p&gt;
3. Surveillance and Crowd Monitoring
  &lt;/p&gt;&lt;p&gt;
Cop drones are commonly deployed for surveillance purposes, especially during large events, protests, or public gatherings.
  &lt;/p&gt;&lt;p&gt;
Drones can provide an overhead view, enabling officers to monitor crowd movement, detect potential threats, and maintain public order without requiring a large physical presence. They are also used in surveillance for ongoing investigations, allowing officers to observe suspects discreetly and reduce the need for ground-based observation teams.  &lt;/p&gt;&lt;p&gt;
4. Traffic Monitoring and Accident Investigation  &lt;/p&gt;&lt;p&gt;

Another practical use for drones in law enforcement is in traffic monitoring and accident investigation.
  &lt;/p&gt;&lt;p&gt;
Drones can quickly assess accident scenes, gather footage, and help determine the causes of collisions. Additionally, drones can monitor traffic flow, identify congestion points, and support officers in managing traffic patterns more effectively, especially during peak hours or events that impact roadways.  &lt;/p&gt;&lt;p&gt;
5. Disaster Response and Assessment  &lt;/p&gt;&lt;p&gt;

Police drones can be instrumental in disaster response, providing rapid aerial assessments of affected areas during natural disasters or large-scale incidents.
  &lt;/p&gt;&lt;p&gt;
Drones equipped with high-resolution cameras and sensors can identify damage, locate survivors, and assist rescue teams in prioritizing response efforts. This capability allows police departments to coordinate emergency responses efficiently.  &lt;/p&gt;&lt;p&gt;
6. Environmental Crime Monitoring
  &lt;/p&gt;&lt;p&gt;
In cases of environmental crimes, such as illegal dumping, pollution, or unauthorized land use, drones can offer a quick and effective way to monitor affected areas.  &lt;/p&gt;&lt;p&gt;

Cop drones can capture detailed images and videos that document environmental damage, providing valuable evidence for enforcement actions and protecting natural resources.  &lt;/p&gt;&lt;p&gt;
7. Perimeter Security and Intrusion Detection  &lt;/p&gt;&lt;p&gt;

Police departments use drones to secure perimeters around sensitive areas or restricted zones, such as government facilities, large events, or crime scenes.  &lt;/p&gt;&lt;p&gt;

Equipped with high-resolution cameras and thermal sensors, drones can identify unauthorized intrusions and notify officers of potential security breaches, providing an extra layer of security and rapid response capabilities.  &lt;/p&gt;&lt;p&gt;
8. Suspect Tracking and Apprehension  &lt;/p&gt;&lt;p&gt;

Police drones can assist in tracking fleeing suspects by providing real-time aerial surveillance, even in challenging or obstructed environments.  &lt;/p&gt;&lt;p&gt;

Drones can follow suspects over long distances, reducing the need for high-speed chases and minimizing risks to the public. Real-time video feeds help officers plan safe and effective apprehension tactics.  &lt;/p&gt;&lt;p&gt;
9. Correctional Facility Surveillance
  &lt;/p&gt;&lt;p&gt;
In correctional facilities, drones can monitor for contraband smuggling attempts, especially from outside the facility.
  &lt;/p&gt;&lt;p&gt;
Law enforcement drones equipped with cameras can monitor the facility’s perimeter, preventing unauthorized deliveries and increasing overall security within and around the facility.  &lt;/p&gt;&lt;p&gt;
10. Training and Simulation
  &lt;/p&gt;&lt;p&gt;
Police departments also use drones for training purposes.
  &lt;/p&gt;&lt;p&gt;
By simulating real-life scenarios, drones allow trainees to practice search and rescue, suspect tracking, and other skills in controlled environments. Drone footage recorded during training exercises can be analyzed to improve tactics, procedures, and response times, creating a safer and more prepared law enforcement team.  &lt;/p&gt;&lt;p&gt;
Top 4 Benefits of Police UAVs  &lt;/p&gt;&lt;p&gt;

The integration of drones for police departments has brought significant advantages to law enforcement agencies, improving efficiency, reducing costs, and enhancing officer safety.
  &lt;/p&gt;&lt;p&gt;
Here are the four main benefits law enforcement realizes from using UAVs in its work.
  &lt;/p&gt;&lt;p&gt;Police-drone-benefits  &lt;/p&gt;&lt;p&gt;
  
  1. Cost Savings  &lt;/p&gt;&lt;p&gt;

Compared to traditional aerial solutions like helicopters, police drones offer a much more affordable alternative for aerial surveillance and data collection.  &lt;/p&gt;&lt;p&gt;

The lower purchase and maintenance costs allow even smaller police departments to incorporate drones into their operations. This cost-effectiveness enables departments to expand their capabilities without requiring a large budget.  &lt;/p&gt;&lt;p&gt;
2. Operational Efficiency  &lt;/p&gt;&lt;p&gt;

Drones for police use improve operational efficiency by reducing response times and streamlining workflows. Drones can be deployed quickly to survey areas, capture real-time data, and provide an immediate aerial view, allowing officers to assess situations before arriving on the ground. This efficiency is especially valuable in time-sensitive scenarios, such as search and rescue operations or crime scene investigations, where rapid access to information can make a critical difference.  &lt;/p&gt;&lt;p&gt;
3. Enhanced Situational Awareness
  &lt;/p&gt;&lt;p&gt;
One of the primary advantages of drones in policing is the increased situational awareness they provide. Drones offer a comprehensive aerial perspective, allowing officers to monitor large areas, observe crowd dynamics, or assess hazards from a safe distance. This situational awareness enhances decision-making and enables law enforcement to respond proactively to potential threats or issues.  &lt;/p&gt;&lt;p&gt;
4. Improved Safety for Officers  &lt;/p&gt;&lt;p&gt;

Police drones also play a critical role in improving officer safety by reducing the need for officers to enter hazardous environments. Drones can be sent into dangerous areas—such as active crime scenes, natural disasters, or rough terrain—allowing officers to evaluate risks remotely. This capability minimizes exposure to danger and ensures that officers have the information they need to act safely and strategically.  &lt;/p&gt;&lt;p&gt;

The numerous advantages of police drones, from cost savings to enhanced safety, demonstrate their value in supporting law enforcement efforts. As technology advances, drones are set to play an even greater role in assisting police departments with efficient, safe, and cost-effective solutions for their daily operations.  &lt;/p&gt;&lt;p&gt;
Types of Drones Used by Police  &lt;/p&gt;&lt;p&gt;

Police departments employ various types of UAVs, each suited to specific tasks.
  &lt;/p&gt;&lt;p&gt;
From versatile cop drones like quadcopters to long-range fixed-wing drones, each type provides unique capabilities that enhance the adaptability and effectiveness of law enforcement operations.
  &lt;/p&gt;&lt;p&gt;
Here’s an overview of the main types of drones used by police.
    &lt;/p&gt;&lt;p&gt;
  Quadcopters
  &lt;/p&gt;&lt;p&gt;
Quadcopters are the most common type of police UAV, and the most common type of drone in general.
  &lt;/p&gt;&lt;p&gt;
Quadcopters are popular among law enforcement for their agility, ease of use, and ability to hover steadily. They can take off and land vertically, making them practical in confined spaces, urban settings, and situations where rapid deployment is essential.  &lt;/p&gt;&lt;p&gt;

These drones are ideal for applications requiring stability, such as close-up surveillance, crowd monitoring, and accident scene documentation.  &lt;/p&gt;&lt;p&gt;
Fixed-Wing Drones  &lt;/p&gt;&lt;p&gt;

Fixed-wing drones differ from quadcopters in that they have a single wing, like an airplane, allowing them to glide efficiently over long distances.  &lt;/p&gt;&lt;p&gt;

These drones are used for police drone operations requiring extensive coverage, such as monitoring large events, border patrol, or search and rescue in remote areas. While fixed-wing drones cannot hover, their extended flight time and range make them invaluable for missions that require sustained aerial surveillance.  &lt;/p&gt;&lt;p&gt;
Hybrid Drones  &lt;/p&gt;&lt;p&gt;

Hybrid drones combine features of both quadcopters and fixed-wing drones, offering the ability to take off and land vertically while also covering long distances efficiently. This versatility makes them suitable for complex missions where a combination of range, stability, and rapid deployment is needed, such as search and rescue operations that require quick response and extended flight time.  &lt;/p&gt;&lt;p&gt;
Specialized UAVs
  &lt;/p&gt;&lt;p&gt;
Certain police missions require specialized UAVs equipped with advanced technologies like thermal imaging, high-definition zoom cameras, or LiDAR sensors.
  &lt;/p&gt;&lt;p&gt;
These cop drones are customized for specific purposes, such as night surveillance, accident reconstruction, and locating individuals in low-visibility conditions. By using drones tailored to the needs of specialized tasks, police departments can gather detailed information that would be difficult or unsafe to collect manually.  &lt;/p&gt;&lt;p&gt;
Case Studies: 5 Real-Life Cop Drone Stories
  &lt;/p&gt;&lt;p&gt;
The use of drones for police use has proven invaluable in a variety of real-life scenarios, from locating missing persons to monitoring large public gatherings.  &lt;/p&gt;&lt;p&gt;

Here are 5 short case studies illustrating drones support law enforcement work.  &lt;/p&gt;&lt;p&gt;
1. Search and Rescue Operations  &lt;/p&gt;&lt;p&gt;

In 2019, the Chula Vista Police Department (CVPD) in California used drones to help find a missing elderly man with dementia. Equipped with a thermal camera, the police drone enabled officers to spot the man in a ravine, saving critical time in an urgent situation.  &lt;/p&gt;&lt;p&gt;
2. Crime Scene Analysis
  &lt;/p&gt;&lt;p&gt;
In 2020, police in Lincolnshire, UK, deployed a drone to capture aerial images of a large crime scene involving a homicide. The police UAV allowed investigators to map the area efficiently, preserving the scene’s integrity while documenting critical evidence from above.  &lt;/p&gt;&lt;p&gt;
3. Public Event Monitoring and Crowd Control  &lt;/p&gt;&lt;p&gt;

During the 2017 Super Bowl in Houston, Texas, drones were deployed by police to provide aerial views of the stadium and surrounding areas, ensuring security and rapid response to any incidents. These drones enabled enhanced situational awareness for law enforcement, helping it manage one of the nation’s most high-profile events.  &lt;/p&gt;&lt;p&gt;
4. Traffic Accident Investigation  &lt;/p&gt;&lt;p&gt;

In 2018, the Kansas Highway Patrol implemented drones for accident investigations. According to a case study by the Kansas Highway Patrol, drones reduced the time needed to map accident scenes from hours to just 20 minutes, allowing roads to reopen faster and minimizing disruption to traffic.  &lt;/p&gt;&lt;p&gt;
5. Disaster Response and Recovery  &lt;/p&gt;&lt;p&gt;

After Hurricane Michael in 2018, police departments in Florida used drones to assess damage, locate survivors, and direct rescue efforts. The use of police drones allowed teams to quickly gather critical information, enhancing response coordination and efficiency.  &lt;/p&gt;&lt;p&gt;
5 Key Features for Choosing a Police Drone
  &lt;/p&gt;&lt;p&gt;
Law enforcement drones are equipped with cutting-edge technology and features that make them powerful tools in policing.
  &lt;/p&gt;&lt;p&gt;
Here are five key features that make drones for police use indispensable in modern law enforcement.
    &lt;/p&gt;&lt;p&gt;
  1. Thermal Imaging
  &lt;/p&gt;&lt;p&gt;
Thermal imaging is one of the most valuable features for law enforcement drones. By detecting heat signatures, thermal cameras allow officers to locate individuals or objects in low-visibility conditions, such as at night or in densely wooded areas. This capability is crucial in search and rescue operations, suspect tracking, and disaster response, enabling law enforcement to locate people quickly and efficiently.  &lt;/p&gt;&lt;p&gt;
2. High-Definition Cameras
  &lt;/p&gt;&lt;p&gt;
Many police drones are equipped with high-definition (HD) cameras that capture detailed images and video footage. These cameras support real-time surveillance, provide clear evidence for investigations, and allow officers to observe situations from a safe distance. High-resolution footage also helps in documenting crime scenes and accident sites, preserving details that might be missed from the ground.  &lt;/p&gt;&lt;p&gt;
3. GPS and Navigation Systems  &lt;/p&gt;&lt;p&gt;

GPS and advanced navigation systems allow drones for police use to operate with precision, even in complex environments. GPS tracking ensures accurate positioning, helps drones follow predefined flight paths, and allows officers to monitor the drone’s location in real-time. This accuracy is particularly useful in monitoring large areas, patrolling borders, or mapping crime scenes for investigative purposes.  &lt;/p&gt;&lt;p&gt;
4. Real-Time Data Transmission  &lt;/p&gt;&lt;p&gt;

Real-time data transmission enables law enforcement drones to send live video and data feeds directly to officers on the ground. This feature provides immediate situational awareness, allowing command centers and field officers to make rapid, informed decisions. During emergencies or high-stakes incidents, real-time streaming is critical for coordinated responses and assessing on-the-ground conditions as events unfold.  &lt;/p&gt;&lt;p&gt;
5. Obstacle Avoidance Systems
  &lt;/p&gt;&lt;p&gt;
Equipped with obstacle avoidance systems, many police drones can detect and maneuver around obstacles autonomously. This technology improves safety and stability during flights, allowing drones to navigate complex terrains or urban environments where buildings, trees, or other obstructions are present. Obstacle avoidance ensures that drones can complete missions with minimal risk, even in challenging conditions.
  &lt;/p&gt;&lt;p&gt;
With these advanced features, drones for police use provide valuable support for various law enforcement operations. From enhancing visibility with thermal imaging to enabling strategic decision-making through real-time data transmission, these technologies make police drones versatile tools that empower officers to perform their duties more effectively and safely.  &lt;/p&gt;&lt;p&gt;
Future of Drones in Law Enforcement: 5 Trends and Innovations  &lt;/p&gt;&lt;p&gt;
  &lt;/p&gt;&lt;p&gt;
The future of drones in policing is rapidly evolving, driven by emerging technologies that promise to expand the role of drones in law enforcement.
  &lt;/p&gt;&lt;p&gt;
Innovations such as AI-powered drones, autonomous flight capabilities, and seamless integration with other police technologies are transforming drones for police departments into even more versatile and powerful tools.
  &lt;/p&gt;&lt;p&gt;
Here are some of the key trends and advancements shaping the future of police drones.  &lt;/p&gt;&lt;p&gt;
1. AI-Powered Drones  &lt;/p&gt;&lt;p&gt;

Artificial intelligence (AI) is paving the way for smarter and more capable police drones. AI-powered drones for police use can process data in real-time, recognize objects, and even identify faces or license plates. This capability allows drones to autonomously track suspects, analyze suspicious behaviors, and respond to complex situations without continuous human control. As AI technology continues to advance, drones will be able to perform more sophisticated tasks, further enhancing police efficiency and effectiveness.  &lt;/p&gt;&lt;p&gt;
2. Autonomous Flight Capabilities  &lt;/p&gt;&lt;p&gt;

Autonomous flight technology enables drones to navigate and carry out missions with minimal operator input. In the future, police drones will be able to autonomously patrol designated areas, respond to emergencies, or monitor crime-prone locations in real-time. This will be particularly beneficial in situations where rapid response is critical, such as active shooter incidents or missing persons cases, allowing drones in policing to provide crucial support faster than ever before.  &lt;/p&gt;&lt;p&gt;
3. Integration with Other Law Enforcement Technologies  &lt;/p&gt;&lt;p&gt;

The integration of drones with other police systems, such as surveillance networks, body cameras, and data analytics platforms, is another promising trend. By connecting drones for police departments with existing technologies, departments can streamline data collection and improve situational awareness. For instance, footage from police drones can be synced with ground-based surveillance feeds, enabling command centers to get a comprehensive view of incidents and enhance coordinated responses.  &lt;/p&gt;&lt;p&gt;
4. 5G Connectivity and Real-Time Data Transfer
  &lt;/p&gt;&lt;p&gt;
The rollout of 5G networks is expected to boost drone capabilities by providing faster, more reliable data transfer. With 5G connectivity, drones can transmit high-definition video and real-time data with minimal latency, making it possible for officers to receive instantaneous updates from the drone. This connectivity will improve situational awareness, especially in dynamic situations where officers need real-time information to make critical decisions.  &lt;/p&gt;&lt;p&gt;
5. The Rise of Drone as First Responder (DFR) Programs  &lt;/p&gt;&lt;p&gt;

Drone as First Responder (DFR) programs are rapidly gaining traction within police departments, offering an innovative approach to emergency response and public safety. In a DFR program, drones are deployed as the initial responders to incidents, arriving on scene often before ground units. Equipped with live-streaming capabilities, these drones provide real-time visual information to officers and dispatch centers, allowing them to assess the situation remotely, plan responses, and deploy resources more effectively.
  &lt;/p&gt;&lt;p&gt;
The presence of DFR programs in police departments can improve response times, especially in time-sensitive situations like burglaries, car accidents, or disturbances. As DFR technology evolves, police departments are increasingly able to deploy drones autonomously to designated areas, significantly enhancing situational awareness and operational efficiency while minimizing risks to officers and the public.  &lt;/p&gt;&lt;p&gt;
  
  6. Expanded Roles and Use Cases  &lt;/p&gt;&lt;p&gt;

As technology advances, the range of applications for police drones is set to expand. Beyond traditional tasks like surveillance and search and rescue, future drones for police use could play roles in traffic monitoring, crowd control, environmental assessments, and even disaster response. Drones may also become valuable tools for predictive policing, using data analytics to monitor patterns and preemptively address potential incidents.  &lt;/p&gt;&lt;p&gt;
Police UAV FAQ  &lt;/p&gt;&lt;p&gt;
How do the police use drones in their work?  &lt;/p&gt;&lt;p&gt;

Police use drones for a variety of purposes, including surveillance, search and rescue, crime scene analysis, traffic monitoring, and crowd control. Drones provide an aerial perspective that enhances situational awareness and allows officers to respond to incidents more effectively.  &lt;/p&gt;&lt;p&gt;
What are the legal requirements for police in their use of drones?
  &lt;/p&gt;&lt;p&gt;
Police departments must adhere to federal and local regulations, which may include obtaining warrants for surveillance or following specific privacy guidelines. In the U.S., the FAA governs airspace, and some states have additional restrictions on police drone usage to ensure privacy rights are respected.  &lt;/p&gt;&lt;p&gt;
What is a DFR program?  &lt;/p&gt;&lt;p&gt;

A DFR (Drone as First Responder) program allows police drones to be deployed quickly to incident locations, often arriving before officers on the ground. This capability provides valuable real-time information to responders, improving response times and situational awareness.  &lt;/p&gt;&lt;p&gt;
What kinds of drones are used by the police?  &lt;/p&gt;&lt;p&gt;

Police use a variety of drones, including quadcopters for stability, fixed-wing drones for long-range operations, and hybrid drones for versatility. Specialized drones equipped with thermal imaging and high-definition cameras are also common for enhanced surveillance and search and rescue.  &lt;/p&gt;&lt;p&gt;
Do police drones have cameras?
  &lt;/p&gt;&lt;p&gt;
Yes, most police drones are equipped with high-definition cameras for real-time surveillance and recording. Some also have advanced features like thermal imaging, night vision, and zoom capabilities to aid in specific operations.  &lt;/p&gt;&lt;p&gt;
Are police drones allowed to record footage over private property?  &lt;/p&gt;&lt;p&gt;

Recording over private property is subject to legal restrictions, often requiring warrants or adherence to privacy laws. Police departments must balance the need for surveillance with privacy rights, ensuring that drone usage complies with local and federal guidelines.  &lt;/p&gt;&lt;p&gt;
How do police drones help in search and rescue missions?  &lt;/p&gt;&lt;p&gt;

In search and rescue missions, police drones can cover large areas quickly, even in challenging or dangerous terrain. Thermal imaging cameras help locate individuals by detecting heat signatures, making drones especially useful in low-visibility conditions.  &lt;/p&gt;&lt;p&gt;
What are the benefits of using drones in police work?
  &lt;/p&gt;&lt;p&gt;
Police drones provide real-time data, enhance situational awareness, reduce costs compared to helicopters, and improve safety by allowing officers to assess situations from a distance. They enable faster response times and efficient resource management in critical operations.  &lt;/p&gt;&lt;p&gt;
Can drones replace helicopters in police work?  &lt;/p&gt;&lt;p&gt;

While drones offer many advantages, they are not a complete replacement for helicopters. Drones are ideal for shorter missions and lower-altitude work, whereas helicopters are better suited for longer-range, high-altitude operations. Drones often complement helicopters rather than replace them.  &lt;/p&gt;&lt;p&gt;
What are the challenges of using drones in policing?  &lt;/p&gt;&lt;p&gt;

Challenges include privacy concerns, regulatory restrictions, and technical limitations like limited battery life and range. Additionally, public perception of surveillance can create resistance, making it important for departments to use drones transparently and ethically.
  
  
  
  
      
 &lt;br /&gt; 
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
That Drone in the Sky Could Be Tracking Your Car
&lt;/p&gt;&lt;p&gt;
  Police are using their drones as flying automated license plate readers (ALPRs), airborne police cameras that make it easier than ever for law enforcement to follow you.   &lt;/p&gt;&lt;p&gt;

&quot;The Flock Safety drone, specifically, are flying LPR cameras as well,” Rahul Sidhu, Vice President of Aviation at Flock Safety, recently told a group of potential law enforcement customers interested in drone-as-first-responder (DFR) programs. 
  &lt;/p&gt;&lt;p&gt;
The integration of Flock Safety’s flagship ALPR technology with its Aerodome drone equipment is a police surveillance combo poised to elevate the privacy threats to civilians caused by both of these invasive technologies as drone adoption expands.   &lt;/p&gt;&lt;p&gt;
  The use of DFR programs has grown exponentially. The biggest police technology companies, like Axon, Flock Safety, and Motorola Solutions, are broadening their drone offerings, anticipating that drones could become an important piece of their revenue stream.   &lt;/p&gt;&lt;p&gt;

Communities must demand restrictions on how local police use drones and ALPRs, let alone a dangerous hybrid of the two. Otherwise, we can soon expect that a drone will fly to any call for service and capture sensitive location information about every car in its flight path, capturing more ALPR data to add to the already too large databases of our movements. 
  &lt;/p&gt;&lt;p&gt;
ALPR systems typically rely on cameras that have been fixed along roadways or attached to police vehicles. These cameras capture the image of a vehicle, then use artificial intelligence technology to log the license plate, make, model, color, and other unique identifying information, like dents and bumper stickers. This information is usually stored on the manufacturer’s servers and often made available on nationwide sharing networks to police departments from other states and federal agencies, including Immigration and Customs Enforcement. ALPRs are already used by most of the largest police departments in the country, and Flock Safety also now offers the ability for an agency to turn almost any internet-enabled cameras into an ALPR camera. 
  &lt;/p&gt;&lt;p&gt;
ALPRs present a host of problems. ALPR systems vacuum up data—like the make, model, color, and location of vehicles—on people who will never be involved in a crime, used in gridding areas to systematically make a record of when and where vehicles have been. ALPRs routinely make mistakes, causing police to stop the wrong car and terrorize the driver. Officers have abused law enforcement databases in hundreds of cases. Police have used them to track across state lines people seeking legal health procedures. Even when there are laws against sharing data from these tools with other departments, some policing agencies still do.
  &lt;/p&gt;&lt;p&gt;
Drones, meanwhile, give police a view of roofs, backyards, and other fenced areas where cops can’t casually patrol, and their adoption is becoming more common. Companies that sell drones have been helping law enforcement agencies to get certifications from the Federal Aviation Authority (FAA), and recently-implemented changes to the restrictions on flying drones beyond the visual line of sight will make it even easier for police to add this equipment. According to the FAA, since a new DFR waiver process was implemented in May 2025, the FAA has granted more than 410 such waivers, already accounting for almost a third of the approximately 1,400 DFR waivers that have been granted since such programs began in 2018.
  &lt;/p&gt;&lt;p&gt;
Local officials should, of course, be informed that the drones they’re buying are equipped to do such granular surveillance from the sky, but it is not clear that this is happening. While the ALPR feature is available as part of Flock drone acquisitions, some government customers may not realize that to approve a drone from Flock Safety may also mean approving a flying ALPR. And though not every Flock safety drone is currently running the ALPR feature, some departments, like Redondo Beach Police Department, have plans to activate it in the near future. 
  &lt;/p&gt;&lt;p&gt;
ALPRs aren’t the only so-called payloads that can be added to a drone. In addition to the high resolution and thermal cameras with which drones can already be equipped, drone manufacturers and police departments have discussed adding cell-site simulators, weapons, microphones, and other equipment. Communities must mobilize now to keep this runaway surveillance technology under tight control.
  &lt;/p&gt;&lt;p&gt;
When EFF posed questions to Flock Safety about the integration of ALPR and its drones, the company declined to comment.
  &lt;/p&gt;&lt;p&gt;
Mapping, storing, and tracking as much personal information as possible—all without warrants—is where automated police surveillance is heading right now. Flock has previously described its desire to connect ALPR scans to additional information on the person who owns the car, meaning that we don’t live far from a time when police may see your vehicle drive by and quickly learn that it’s your car and a host of other details about you.
 &lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;15 Applications of Drones for Law Enforcement (Police Drones)&lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones for law enforcement are transforming the way police agencies monitor, respond, and protect communities. With advanced cameras, thermal imaging, and real-time data transmission, police drones offer a faster, safer, and more cost-effective way to handle various operations. &lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;1. Crime Scene Investigation&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones help police document crime scenes with high-resolution aerial photos and videos. By capturing a detailed, top-down perspective, law enforcement can preserve evidence, analyze blood splatters, or reconstruct accidents and crime events without disturbing critical details.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;2. Search and Rescue Operations&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Police drones equipped with thermal cameras and night vision assist in search and rescue missions by detecting heat signatures in dense forests, mountains, or disaster-stricken areas. Drones can cover large areas quickly, increasing the chances of finding missing persons faster.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;3. Traffic Accident Investigation&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones for law enforcement can map accident scenes, take aerial photos, and reconstruct crashes in minutes. This helps police determine fault, document road conditions, and clear traffic congestion faster.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4. Suspect Tracking and Pursuit&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Police drones help track fleeing suspects in foot chases or high-speed vehicle pursuits. UAVs can follow a suspect from the air, provide live video to officers, and assist in coordinated takedowns without putting officers in direct danger.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;5. Crowd Monitoring and Riot Control&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;During large gatherings, protests, or riots, drones give law enforcement a clear aerial view of the crowd. Police UAVs help officers monitor movements, identify threats, and manage emergencies without deploying large teams on the ground.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;6. Border Security and Illegal Smuggling Detection&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones are used for border surveillance to detect illegal crossings, human trafficking, and smuggling activities. With long-range cameras and AI tracking, police drones can monitor vast areas and alert border patrol teams instantly.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;7. Tactical Operations and SWAT Missions&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;For SWAT teams, drones play a crucial role in hostage situations, drug busts, and active shooter scenarios. UAVs can enter buildings, warehouses, or rooftops to provide real-time video feeds, helping officers plan safe entry strategies.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;8. Aerial Surveillance and Reconnaissance&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones for law enforcement offer a faster and more cost-effective alternative to helicopters for routine surveillance, stakeouts, and covert operations. UAVs provide silent, high-resolution monitoring without alerting suspects.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;9. Disaster Response and Damage Assessment&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;After natural disasters like hurricanes, floods, and earthquakes, police drones help in damage assessment, locating survivors, and guiding emergency teams. They provide quick aerial footage for decision-making in crisis situations.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;10. Drug Enforcement and Narcotics Interdiction&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones assist police in detecting illegal drug operations, such as hidden drug labs, cannabis farms, and trafficking routes. UAVs equipped with thermal imaging can spot unusual heat sources, indicating possible drug production sites.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;11. Environmental Law Enforcement&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Police drones are used to monitor illegal dumping, deforestation, and wildlife poaching. UAVs help collect evidence of environmental crimes and track offenders in remote locations.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;12. Undercover Investigations and Covert Surveillance&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones allow law enforcement to monitor suspects from a safe distance, reducing the need for physical stakeouts. UAVs can hover silently at high altitudes, capturing clear images and videos without being detected.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;13. Perimeter Security and Facility Protection&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones provide 24/7 perimeter surveillance for government buildings, prisons, and police stations. UAVs can detect suspicious activities, trespassers, and security breaches, ensuring better protection of sensitive locations.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;14. Evidence Collection and Forensic Analysis&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Police drones assist forensic teams by capturing aerial images of crime scenes, mapping bullet trajectories, and detecting hidden evidence. Drones help preserve crucial details for court cases and legal proceedings.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;15. Hostage Negotiation and Crisis Management&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;During hostage situations, police drones provide real-time video feeds to negotiators, allowing them to assess threats, number of hostages, and escape routes. UAVs can also deliver negotiation devices without risking officers’ lives.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Summary: Drones for Law Enforcement (Police Drones)&lt;/span&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Drones have become essential tools for law enforcement agencies, enhancing surveillance, search and rescue, crime scene analysis, and emergency response. Equipped with thermal cameras, night vision, and AI-powered tracking, police drones provide real-time intelligence, improve officer safety, and increase operational efficiency.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Key applications of drones in law enforcement include:&lt;br /&gt;&amp;nbsp;Surveillance &amp;amp; Tracking – Monitoring suspects, gathering intelligence, and securing crime scenes.&lt;br /&gt;&amp;nbsp;Search &amp;amp; Rescue – Locating missing persons in hard-to-reach areas using thermal imaging.&lt;br /&gt;&amp;nbsp;Crowd Monitoring &amp;amp; Riot Control – Managing large gatherings and ensuring public safety.&lt;br /&gt;&amp;nbsp;Traffic &amp;amp; Accident Investigation – Assessing crash sites with aerial imaging.&lt;br /&gt;&amp;nbsp;Tactical &amp;amp; SWAT Operations – Assisting in high-risk situations with live video feeds.&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;With advanced payloads like loudspeakers, spotlights, chemical sensors, and AI-enhanced object detection, drones significantly boost law enforcement capabilities.&lt;/b&gt;&lt;/span&gt;
    
    
    &lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span aria-level=&quot;2&quot; class=&quot;VndcI veK2kb&quot; data-wiz-attrbind=&quot;class=SC6Owe_26/tPhIrf&quot; role=&quot;heading&quot;&gt;&lt;span&gt;Autonomous Drones For Police Departments Listings With Specs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;/span&gt;&lt;/b&gt;&lt;div data-ved=&quot;2ahUKEwj8hffLwIGSAxXFnCYFHWZCHrcQ3PkPegYIAQgAEA8&quot;&gt;&lt;div class=&quot;uU6vme qaHYKd CCW8cb&quot; data-animation-skip=&quot;&quot; data-sfc-cp=&quot;&quot; data-signal-inputs=&quot;&quot; data-wiz-uids=&quot;SC6Owe_2c,SC6Owe_2d,SC6Owe_2e&quot;&gt;&lt;div class=&quot;xeWWvb&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;div class=&quot;Ed5sKe&quot;&gt;&lt;div class=&quot;J945jc&quot;&gt;&lt;div class=&quot;LoBHAe&quot;&gt;&lt;div class=&quot;NUerBd shwvfc&quot;&gt;&lt;div&gt;&lt;div style=&quot;display: contents;&quot;&gt;&lt;div class=&quot;NGHFcc&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;EUNTEb&quot;&gt;&lt;/span&gt;&lt;span class=&quot;W7GKtd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;&quot; data-hveid=&quot;CAEIABAQ&quot; data-ved=&quot;2ahUKEwj8hffLwIGSAxXFnCYFHWZCHrcQ_ZkOegYIAQgAEBA&quot; id=&quot;aim-chrome-initial-inline-async-container&quot;&gt;&lt;div data-processed=&quot;true&quot;&gt;&lt;div&gt;&lt;div class=&quot;CKgc1d&quot; data-complete=&quot;true&quot; data-scope-id=&quot;turn&quot;&gt;&lt;div class=&quot;Zkbeff&quot; data-aimmrs=&quot;true&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAAQAA&quot; data-subtree=&quot;aimc&quot; data-ved=&quot;2ahUKEwjsnfnLwIGSAxVlk2oFHbnQFfwQ2O0OegQIABAA&quot; data-wiz-uids=&quot;y3XLtd_2&quot;&gt;&lt;div class=&quot;pWvJNd&quot; data-complete=&quot;true&quot;&gt;&lt;div class=&quot;mZJni Dn7Fzd&quot; data-container-id=&quot;main-col&quot; data-ved=&quot;2ahUKEwjsnfnLwIGSAxVlk2oFHbnQFfwQ3KYQegQIABAB&quot; data-xid=&quot;VpUvz&quot; dir=&quot;ltr&quot;&gt;&lt;div data-container-id=&quot;5&quot; style=&quot;display: contents;&quot;&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAIQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;div data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-subtree=&quot;aimfl&quot; style=&quot;display: contents;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In
 2026, autonomous drones for law enforcement prioritize NDAA compliance,
 thermal imaging, and &quot;Drone as First Responder&quot; (DFR) capabilities&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;.&lt;span class=&quot;uJ19be notranslate&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_d,y3XLtd_e&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_c/TKHnVd&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAIQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_d,y3XLtd_e&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_c/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAIQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_d,y3XLtd_e&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_c/TKHnVd&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAIQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_d,y3XLtd_e&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Key Autonomous Drone Listings (2026)&lt;span class=&quot;txxDge notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_j,y3XLtd_k&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_i/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_j,y3XLtd_k&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot;&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQAA&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Skydio X10&lt;/span&gt;&lt;/span&gt;: Widely used for its market-leading AI-driven autonomy and obstacle avoidance in low-visibility environments.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-complete=&quot;true&quot;&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQAQ&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Autonomy&lt;/span&gt;: 360-degree obstacle avoidance; AI-powered subject tracking and night flight.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQAg&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Sensors&lt;/span&gt;: 4K color camera and high-resolution thermal imaging.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQAw&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Price&lt;/span&gt;: Specialized law enforcement packages typically start at &lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;$15,000+&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQBA&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;DJI Matrice 350 RTK&lt;/span&gt;&lt;/span&gt;: A flagship industrial platform for heavy-duty surveillance and tactical communication.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-complete=&quot;true&quot;&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQBQ&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Flight Time&lt;/span&gt;: Up to 55 minutes.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQBg&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Payloads&lt;/span&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;: Supports Zenmuse H30T (thermal/zoom) and V1 (broadcasting speaker)&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQBw&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Price&lt;/span&gt;: Approximately &lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;$38,651&lt;/span&gt; for public safety combos.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQCA&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Autel EVO Max 4T V2&lt;/span&gt;&lt;/span&gt;: Known for its &quot;A-Mesh&quot; networking and millimeter-wave radar for interference-free autonomous flight.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-complete=&quot;true&quot;&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQCQ&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Specs&lt;/span&gt;: 8K video, 10-camera obstacle avoidance, and 42-minute flight time.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQCg&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Price&lt;/span&gt;: Listed around &lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;$7,299&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQCw&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;RMUS Heavy Duty Police Drone (HERA)&lt;/span&gt;&lt;/span&gt;: A high-performance US-made quadcopter optimized for heavy payloads.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-complete=&quot;true&quot;&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQDA&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Specs&lt;/span&gt;: 56-minute flight time (no payload); 40 minutes with 5 lbs; max payload 33 lbs.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQDQ&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Compliance&lt;/span&gt;: Fully NDAA-compliant.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQDg&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Parrot ANAFI USA&lt;/span&gt;&lt;/span&gt;: A lightweight, rapidly deployable drone focused on data security and thermal reconnaissance.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-complete=&quot;true&quot;&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQDw&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Specs&lt;/span&gt;: 500g weight; 32x zoom; FLIR Boson thermal camera; 32-minute flight time.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-complete=&quot;true&quot; data-hveid=&quot;CAQQEA&quot; data-sae=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;Price&lt;/span&gt;: Frequently found in kits starting around &lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;$7,000 - $9,000&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Quick Comparison Table&lt;span class=&quot;txxDge notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_2s,y3XLtd_2t&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_2r/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_2s,y3XLtd_2t&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Fv6NCb&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; data-ved=&quot;2ahUKEwjsnfnLwIGSAxVlk2oFHbnQFfwQ-q4QegQIBhAA&quot;&gt;&lt;table class=&quot;NRefec&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-sae=&quot;&quot;&gt;&lt;tbody data-complete=&quot;true&quot;&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;th class=&quot;iry6k&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Model&lt;span class=&quot;uJ19be notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_2z,y3XLtd_30&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_2y/TKHnVd&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div class=&quot;Fv6NCb&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; data-ved=&quot;2ahUKEwjsnfnLwIGSAxVlk2oFHbnQFfwQ-q4QegQIBhAA&quot;&gt;&lt;table class=&quot;NRefec&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-sae=&quot;&quot;&gt;&lt;tbody data-complete=&quot;true&quot;&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;th class=&quot;iry6k&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_2z,y3XLtd_30&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/th&gt;&lt;th class=&quot;iry6k&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Max Flight Time&lt;/span&gt;&lt;/th&gt;&lt;th class=&quot;iry6k&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Max Speed&lt;/span&gt;&lt;/th&gt;&lt;th class=&quot;iry6k&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Transmission Range&lt;/span&gt;&lt;/th&gt;&lt;th class=&quot;iry6k&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Special Feature&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;DJI M350 RTK&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;55 mins&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;83 km/h&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;15 km&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Multi-payload support&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Autel EVO Max 4T&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;42 mins&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;72 km/h&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;20 km&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Radar-based avoidance&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Skydio X10&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;40 mins&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;72 km/h&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;12 km&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Best-in-class AI autonomy&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;HERA Quad&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;56 mins&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;40 km/h&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;15 km&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Heavy 33 lb lift capacity&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr class=&quot;cZCYO&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-complete=&quot;true&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Parrot ANAFI USA&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;32 mins&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;61 km/h&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;4 km&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;td class=&quot;cOeeGf&quot; colspan=&quot;undefined&quot; data-complete=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;AES-256 encryption&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Purchasing &amp;amp; Resources&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_4h,y3XLtd_4i&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-sae=&quot;&quot; data-wiz-attrbind=&quot;class=y3XLtd_4g/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sae=&quot;&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-complete=&quot;true&quot; data-wiz-uids=&quot;y3XLtd_4h,y3XLtd_4i&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAgQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAgQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Agencies often acquire these through specialized public safety vendors such as &lt;span data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;a class=&quot;H23r4e&quot; data-hveid=&quot;CAgQAQ&quot; data-processed=&quot;true&quot; data-sb=&quot;/url?sa=i&amp;amp;source=web&amp;amp;rct=j&amp;amp;url=https://www.dslrpros.com/pages/uses/police-drones&amp;amp;ved=2ahUKEwjsnfnLwIGSAxVlk2oFHbnQFfwQy_kOegQICBAB&amp;amp;opi=89978449&amp;amp;cd&amp;amp;psig=AOvVaw3JiDUvcX_CYssWLWnsbVMd&amp;amp;ust=1768152796344000&quot; href=&quot;https://www.dslrpros.com/pages/uses/police-drones&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;DSLRPros&lt;/a&gt;&lt;/span&gt;, &lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Drone Nerds&lt;/span&gt;, and &lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;FlyMotion&lt;/span&gt;. Programs like &lt;span class=&quot;T286Pc&quot; data-complete=&quot;true&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;Skydio for Public Safety&lt;/span&gt; offer specific autonomous workflows for patrol and search-and-rescue.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAgQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;Y3BBE&quot; data-complete=&quot;true&quot; data-hveid=&quot;CAgQAA&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Where to Find Listings &amp;amp; Specs&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;v9Xej_2k,v9Xej_2l&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=v9Xej_2j/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;v9Xej_2k,v9Xej_2l&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-processed=&quot;true&quot;&gt;&lt;li data-hveid=&quot;CAUQAA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;&lt;span data-processed=&quot;true&quot;&gt;&lt;a class=&quot;H23r4e&quot; data-processed=&quot;true&quot; data-sb=&quot;/url?sa=i&amp;amp;source=web&amp;amp;rct=j&amp;amp;url=https://www.dslrpros.com/pages/uses/police-drones&amp;amp;ved=2ahUKEwjjvYS7wIGSAxUekGoFHbt_JssQy_kOegQIBRAB&amp;amp;opi=89978449&amp;amp;cd&amp;amp;psig=AOvVaw0EEA21RQ1HbIgn2DANDp5j&amp;amp;ust=1768152760877000&quot; href=&quot;https://www.dslrpros.com/pages/uses/police-drones&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;DSLRPros&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;: Offers DJI, ACSL, and Sentera sensors with pricing.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAUQAg&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;&lt;span data-processed=&quot;true&quot;&gt;&lt;a class=&quot;H23r4e&quot; data-processed=&quot;true&quot; data-sb=&quot;/url?sa=i&amp;amp;source=web&amp;amp;rct=j&amp;amp;url=https://xrtechgroup.com/drones-for-law-enforcement/&amp;amp;ved=2ahUKEwjjvYS7wIGSAxUekGoFHbt_JssQy_kOegQIBRAD&amp;amp;opi=89978449&amp;amp;cd&amp;amp;psig=AOvVaw0EEA21RQ1HbIgn2DANDp5j&amp;amp;ust=1768152760877000&quot; href=&quot;https://xrtechgroup.com/drones-for-law-enforcement/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;XrTech Group&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;: Provides guides with detailed specs for Autel, DJI, etc.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAUQBA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;&lt;span data-processed=&quot;true&quot;&gt;&lt;a class=&quot;H23r4e&quot; data-processed=&quot;true&quot; data-sb=&quot;/url?sa=i&amp;amp;source=web&amp;amp;rct=j&amp;amp;url=https://www.unmannedsystemstechnology.com/expo/law-enforcement-drones/&amp;amp;ved=2ahUKEwjjvYS7wIGSAxUekGoFHbt_JssQy_kOegQIBRAF&amp;amp;opi=89978449&amp;amp;cd&amp;amp;psig=AOvVaw0EEA21RQ1HbIgn2DANDp5j&amp;amp;ust=1768152760877000&quot; href=&quot;https://www.unmannedsystemstechnology.com/expo/law-enforcement-drones/&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Unmanned Systems Technology (UST)&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;: Features various manufacturers (JOUAV, Acecore, etc.) with payload/range info.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAUQBg&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;&lt;span data-processed=&quot;true&quot;&gt;&lt;a class=&quot;H23r4e&quot; data-processed=&quot;true&quot; data-sb=&quot;/url?sa=i&amp;amp;source=web&amp;amp;rct=j&amp;amp;url=https://advexure.com/pages/law-enforcement-and-police-drones&amp;amp;ved=2ahUKEwjjvYS7wIGSAxUekGoFHbt_JssQy_kOegQIBRAH&amp;amp;opi=89978449&amp;amp;cd&amp;amp;psig=AOvVaw0EEA21RQ1HbIgn2DANDp5j&amp;amp;ust=1768152760877000&quot; href=&quot;https://advexure.com/pages/law-enforcement-and-police-drones&quot; rel=&quot;noopener&quot; target=&quot;_blank&quot;&gt;Advexure&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;: Specializes in public safety drones, highlighting Autel EVO Max 4T features.&lt;/span&gt;&lt;span class=&quot;uJ19be notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;v9Xej_34,v9Xej_35&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=v9Xej_33/TKHnVd&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Key Specs for Police Drones&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;v9Xej_39,v9Xej_3a&quot;&gt;&lt;span class=&quot;vKEkVd&quot; data-animation-atomic=&quot;&quot; data-processed=&quot;true&quot; data-wiz-attrbind=&quot;class=v9Xej_38/TKHnVd&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div aria-level=&quot;3&quot; class=&quot;otQkpb&quot; data-animation-nesting=&quot;&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot; role=&quot;heading&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;txxDge notranslate&quot; data-processed=&quot;true&quot; data-wiz-uids=&quot;v9Xej_39,v9Xej_3a&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;ul class=&quot;KsbFXc U6u95&quot; data-processed=&quot;true&quot;&gt;&lt;li data-hveid=&quot;CAkQAA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Payloads:&lt;/span&gt; Thermal, Optical Zoom, LiDAR, Speakers, Spotlights.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAkQAQ&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Performance:&lt;/span&gt; 30+ min flight, 40+ mph speed, anti-jamming.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAkQAg&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Autonomy:&lt;/span&gt; &lt;a class=&quot;GI370e&quot; data-hveid=&quot;CAkQAw&quot; data-processed=&quot;true&quot; data-ved=&quot;2ahUKEwjjvYS7wIGSAxUekGoFHbt_JssQgK4QegQICRAD&quot; href=&quot;https://www.google.com/search?client=firefox-b-1-e&amp;amp;q=AI+Object+Identification&amp;amp;sei=N41iadTjMJC4qtsPgOet4Ac&amp;amp;mstk=AUtExfDMXm9bgPfDgWB_jO6xrQpTHe9V6sn4MtF9ig4OHilpPkxImImBH4q1Qr-ZBKdXwe-tX-ktwAcA-Nnxnbqx4u1JxYYT7J5qqc21rDRtqMDKE6sC8_xipi7kmUTP2zKzfYk&amp;amp;csui=3&amp;amp;ved=2ahUKEwjjvYS7wIGSAxUekGoFHbt_JssQgK4QegQICRAD&quot;&gt;AI Object Identification&lt;/a&gt;, GPS-denied flight, Automated flight paths.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;li data-hveid=&quot;CAkQBA&quot; data-processed=&quot;true&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;T286Pc&quot; data-processed=&quot;true&quot; data-sfc-cp=&quot;&quot;&gt;&lt;span class=&quot;Yjhzub&quot; data-processed=&quot;true&quot;&gt;Durability:&lt;/span&gt; IP43+ weather resistance&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span data-font-family=&quot;default&quot;&gt;&lt;b&gt;These are some of the most popular drones for public safety operations：&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;common-text-editor-table-wrapper&quot;&gt;&lt;table style=&quot;height: 674px; width: 100%;&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;height: 80px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Model&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Type&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Transmissi&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;o&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;n Range&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Max Flight Time&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Top Speed&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Payload Capacity&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 80px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;a href=&quot;https://www.jouav.com/products/cw-30e.html&quot;&gt;&lt;span data-font-family=&quot;default&quot;&gt;JOUAV CW-30E&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;VTOL drone&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;100/200km (Optional)&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;480mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;90km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;8kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 80px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;a href=&quot;https://www.jouav.com/products/cw-15.html&quot;&gt;&lt;span data-font-family=&quot;default&quot;&gt;JOUAV CW-15D&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;VTOL drone&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;30/50km (Optional)&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;180mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;61km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;3&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 104px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;RMUS &lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;Heavy Duty Police Drone&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Q&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;uadcopter&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;1&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;5km&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;5&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;6mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;&amp;quot;Open Sans&amp;quot;&quot;&gt;40 km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;&amp;quot;Open Sans&amp;quot;&quot;&gt;13&lt;/span&gt;&lt;span data-font-family=&quot;&amp;quot;Open Sans&amp;quot;&quot;&gt;kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 56px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 56px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-size: 16px;&quot;&gt;DJI&amp;nbsp;Mavic&amp;nbsp;2 Enterprise Advanced&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 56px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Quadcopter&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 56px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;15km&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 56px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;46mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 56px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;76km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 56px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;4&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;.5kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 104px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Autel Robotics EVO II&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Quadcopter&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;9km&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;33mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;72km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 104px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;2.5kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 80px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;DJI Matrice 300 RTK&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Quadcopter&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;8km&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;55mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;83km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;2.7kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 80px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Parrot ANAFI USA&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Quadcopter&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;4&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;km&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;25mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;61 km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 80px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;1&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;.95kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;height: 10px;&quot;&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 10px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Yuneec H520E&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 10px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;Hexacopter&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 10px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;1.5km&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 10px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;30mins&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 10px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;7&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;2km/h&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;height: 10px;&quot; width=&quot;100.6&quot;&gt;&lt;p&gt;&lt;span data-font-family=&quot;default&quot;&gt;0&lt;/span&gt;&lt;span data-font-family=&quot;default&quot;&gt;.8kg&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt; &lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/F7iL8jEWf1g?si=d_OkTTWJDHWQNU_6&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/NhjoyGtrD0k?si=7G6b-UvbnKzMPRw8&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
    
    &lt;br /&gt;&lt;br /&gt;
    
 &lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/nhGqfhiyqMI?si=RiJMeSVlDu-V_Vr5&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
    
    
    
    
    &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/h1bAx-JxMrs?si=fyKCVufC4qmcgUrg&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  
    
    
    &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/gYWBMPe5bS4?si=TGBT1KQ1lvuD7IuR&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  &lt;/center&gt;</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/police-drones-are-starting-to-think-for.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFe8eacloFhAxc9iaJYMCmQ10cE0e7J2Q1QjVKObiL9xp6COyUrweZKNNMGCy9MoKMGt4EG3Lbp-H06BUFEwHTu4FKB8jSklGLYKQnjtC67NHsvpJBB9TlX19b3q3rPT1XKDImiX6mXx_TH8GvkfNeEmFlZulkBtkCrzSITK1hBIvRUgOkV7LR1pb8TdE/s72-c/GettyImages2249580888-36a34469-935e-4958-8afd-29e06dee5f65.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-8637555856844894736</guid><pubDate>Sun, 03 Jan 2010 03:47:00 +0000</pubDate><atom:updated>2026-01-03T22:08:11.970-06:00</atom:updated><title>DTCC’s Master Plan: Tokenizing Quadrillions In Global Assets With Centralized Control</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsMu4sEjWEPxoqxPAAk_KL6QuO4xFcgEZDcmGdAIOAIq5Gy7rpPe8qqhr-Fs5DOWRHOU_dMpBBZMvYo0MhBXfkf_YqY5bGw4Jwe_pv47MLHWXvd6M2_p7D6xALDNCQBHQ_702UsMOIxpg3to3icO4ybdEEimA2NCKf_QYvx84tI57wrvhPWiU8n1zsF4s/s1600/DTCC.2-810x524.jpg&quot; width=&quot;678&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
DTCC moves $3.7 quadrillion annually and just patented a system to bring all assets on-chain. Learn how this could reshape global finance—while keeping control centralized.
  
  
  
  

&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The Depository Trust &amp; Clearing Corporation (DTCC), a critical backbone of global finance, recently published patent US20250078065A1. This patent describes DTCC’s approach to moving global financial assets onto blockchain networks. However, unlike purely decentralized solutions, DTCC’s approach maintains centralized control. This move signals a clear direction toward digital assets managed securely under traditional governance models. Understanding this patent offers valuable insights into the future shape of financial markets and regulatory oversight.
&lt;p&gt;
The patent shows DTCC wants to dominate tokenized finance globally, while being able to:
  &lt;/p&gt;&lt;p&gt;
    Interoperate across public blockchains. &lt;/p&gt;&lt;p&gt;
    Build private/consortium DLTs. &lt;/p&gt;&lt;p&gt;
    Manage rights dynamically (delegate wallets). &lt;/p&gt;&lt;p&gt;
    Prepare for quantum security threats.
 &lt;/p&gt;&lt;p&gt;
And they want to do all of this without giving up institutional control.
   &lt;/p&gt;&lt;p&gt;
  What is DTCC? The Financial Giant Behind Markets &lt;/p&gt;&lt;p&gt;
Origins and Historical Evolution &lt;/p&gt;&lt;p&gt;

DTCC formed in 1999, consolidating several clearinghouses into one streamlined holding company. Originally established to simplify securities transfers, DTCC digitized stock settlements and eliminated physical certificates. Its predecessor, the Depository Trust Company (DTC), dates back to 1973, initially created to ease settlement bottlenecks. Over decades, DTCC acquired other clearing entities, centralizing equities, bonds, and derivatives under its management. Today, it provides the backbone of nearly every major securities transaction in the United States and internationally. &lt;/p&gt;&lt;p&gt;
DTCC’s Critical Role &lt;/p&gt;&lt;p&gt;

DTCC is among the most influential yet least publicly known organizations in global finance. Annually, it clears and settles around $3.7 quadrillion worth of securities. Each day, DTCC processes more than 100 million transactions, amounting to approximately $1.2 trillion daily. Additionally, it maintains custody of around $87 trillion in securities across more than 130 global jurisdictions. Its clients include nearly every major financial institution, broker-dealer, and market participant, making DTCC essential for stable market operations. &lt;/p&gt;&lt;p&gt;
  
  Global Influence and Importance &lt;/p&gt;&lt;p&gt;

Regulated by major institutions such as the SEC, Federal Reserve, and international equivalents, DTCC’s stability is critical. During financial crises—like the collapse of Lehman Brothers or post-9/11 disruptions—DTCC ensured uninterrupted settlement operations. Its role as a designated Systemically Important Financial Market Utility (SIFMU) underscores DTCC’s importance. Thus, DTCC’s initiatives profoundly impact global financial operations and stability. &lt;/p&gt;&lt;p&gt;
The Patent: DTCC’s On-Chain Asset Control Framework &lt;/p&gt;&lt;p&gt;
Overview of Patent US20250078065A1 &lt;/p&gt;&lt;p&gt;

DTCC’s recent patent filing, titled “Method, Apparatus, and Computer-Readable Medium for Confederated Rights and Hierarchical Key Management,” outlines detailed plans for moving global financial rights onto distributed ledger technology (DLT). Inventor George Daniel Doney and assignees DTCC Digital US Inc. and Securrency, Inc. designed a structure enabling digital rights delegation. Crucially, this delegation model preserves central authority over asset management through hierarchical key structures. Daniel Doney is the Managing Director and Chief Technology Officer of DTCC Digital Assets. &lt;/p&gt;&lt;p&gt;
Core Objectives and Approach &lt;/p&gt;&lt;p&gt;

At the core, DTCC aims to securely delegate rights related to tokenized assets using blockchain technology. The system implements hierarchical wallet structures where top-level (“root”) wallets retain ultimate control over assets. Delegated wallets possess restricted rights, which the root wallets can revoke or reassign easily. Thus, DTCC combines blockchain efficiency with traditional financial controls, ensuring compliance, security, and accountability in digital asset handling. &lt;/p&gt;&lt;p&gt;
Technical Features of the Patent &lt;/p&gt;&lt;p&gt;

DTCC’s patent describes mechanisms that rely heavily on smart contracts to manage asset rights. Rights delegation occurs through immutable records on-chain, documenting every action transparently. Registry systems store delegation, attributes, and policies, creating audit trails and compliance records. Such structures allow institutions to issue, manage, and revoke permissions instantly, significantly reducing risk while increasing regulatory clarity. &lt;/p&gt;&lt;p&gt;

    “Implementations of distributed ledger and/or blockchain technology including, but not limited to, Bitcoin, Ethereum, Hashgraph, Binance, Flow, Tron, Tezos, Cosmos, and Ripple are compatible with the present invention. &lt;/p&gt;&lt;p&gt;
    Patent US20250078065A1
 &lt;/p&gt;&lt;p&gt;
In Reality: &lt;/p&gt;&lt;p&gt;

DTCC’s patent showcses an architecture that can ‘plug into’ or ‘bridge across’ any major blockchain/DLT environment — but with:
 &lt;/p&gt;&lt;p&gt;
    Institutional custody models. &lt;/p&gt;&lt;p&gt;
    Delegated authority (root wallets/delegate wallets structure). &lt;/p&gt;&lt;p&gt;
    Centralized registries (delegation, attributes, policies). &lt;/p&gt;&lt;p&gt;

This way, they can tokenize and control assets on ANY chain — public, private, or hybrid — depending on regulation, partnerships, or market demand. &lt;/p&gt;&lt;p&gt;

They’re essentially creating the “middleware layer” for tokenized finance across blockchain worlds, but owned by the incumbents.
Compatible Cryptocurrency Projects: Multiple Chains, One Vision &lt;/p&gt;&lt;p&gt;

DTCC’s patent explicitly lists several blockchain technologies as compatible implementations. These include widely-used public blockchains and specialized platforms that support asset tokenization and smart contracts. &lt;/p&gt;&lt;p&gt;

    Bitcoin and Ethereum: Represent robust blockchain networks already central to digital finance. &lt;/p&gt;&lt;p&gt;
    Hedera Hashgraph (HBAR): Known for rapid transaction settlement and governance suited for regulated financial applications. &lt;/p&gt;&lt;p&gt;
    Binance (BNB Chain): Supports extensive decentralized financial (DeFi) ecosystems and institutional collaborations. &lt;/p&gt;&lt;p&gt;
    Flow: Used primarily in tokenizing digital collectibles, intellectual property, and other real-world assets. &lt;/p&gt;&lt;p&gt;
    Tron and Tezos: Fast, cost-effective networks suitable for large-scale tokenized asset management. &lt;/p&gt;&lt;p&gt;
    Cosmos: Offers modular, interoperable blockchain architecture designed specifically for integrating multiple chains. &lt;/p&gt;&lt;p&gt;
    Ripple (XRP Ledger): Known for facilitating cross-border asset transfers and settlements for banks and financial institutions.
 &lt;/p&gt;&lt;p&gt;
DTCC’s compatibility with these platforms underscores its commitment to versatility, interoperability, and long-term digital infrastructure alignment. Imagine a future in which technical flexibility enables: &lt;/p&gt;&lt;p&gt;

    Tokenized securities settlement on Hedera (fast and cheap). &lt;/p&gt;&lt;p&gt;
    Interaction with Ethereum DeFi. &lt;/p&gt;&lt;p&gt;
    Bridging tokenized assets onto Cosmos IBC chains. &lt;/p&gt;&lt;p&gt;
    Integrating payments over Ripple/XRP. &lt;/p&gt;&lt;p&gt;

Hedera and DTCC: Strategic Collaboration and Governance &lt;/p&gt;&lt;p&gt;

Among the blockchain projects compatible with DTCC’s initiative, Hedera Hashgraph (HBAR) stands out due to its direct and strategic collaboration with DTCC. In September 2024, Hedera became a premier founding member of the Linux Foundation’s Decentralized Trust (LFDT). DTCC also joined LFDT, highlighting a significant cooperative alignment between the two organizations. This membership positions both DTCC and Hedera to jointly influence the development of blockchain and decentralized standards tailored specifically to financial markets. &lt;/p&gt;&lt;p&gt;

Hedera’s involvement complements DTCC’s strategy, emphasizing high-throughput, secure, and regulated blockchain infrastructure. Hedera’s hashgraph technology offers extremely fast transactions, robust security, and built-in governance—attributes vital for institutional financial applications. By working together within the LFDT, DTCC and Hedera aim to ensure blockchain’s role in finance aligns with strict regulatory frameworks, industry compliance requirements, and robust governance standards.
 &lt;/p&gt;&lt;p&gt;
This collaboration represents a practical intersection between DTCC’s centralized financial control framework and Hedera’s innovative, enterprise-ready technology. It highlights DTCC’s commitment not only to integrate blockchain but also to shape its governance proactively. Consequently, Hedera’s partnership with DTCC could accelerate broader institutional adoption, solidifying hashgraph technology’s role in the next generation of regulated financial infrastructure.
   &lt;/p&gt;&lt;p&gt;
  Centralizing Control in a Decentralized World &lt;/p&gt;&lt;p&gt;
Bridging Traditional Finance (TradFi) and Decentralized Finance (DeFi) &lt;/p&gt;&lt;p&gt;

DTCC’s on-chain patent represents a clear strategy for connecting traditional financial systems to blockchain technology. Rather than decentralizing financial operations completely, DTCC prefers maintaining centralized oversight. Through hierarchical control, the system ensures compliance, accountability, and security—key demands of traditional institutions. This centralized approach helps mitigate concerns regulators might have about decentralization, making it attractive for institutional adoption. Essentially, DTCC’s framework brings the efficiency of blockchain to finance without sacrificing centralized governance or regulatory oversight. &lt;/p&gt;&lt;p&gt;
The DTCC Chainlink Collaboration: Expanding Capital Market Efficiency
 &lt;/p&gt;&lt;p&gt;
To support its broader goal of integrating blockchain into traditional finance, DTCC collaborates closely with Chainlink, a prominent blockchain interoperability provider. Together, they recently piloted the “Smart NAV” project, showcasing mutual fund Net Asset Value (NAV) data delivered securely on-chain. Major financial institutions such as JPMorgan, BNY Mellon, Franklin Templeton, and State Street joined this initiative. Leveraging Chainlink’s Cross-Chain Interoperability Protocol (CCIP), the pilot achieved seamless, secure data transmission across multiple blockchain networks.
 &lt;/p&gt;&lt;p&gt;
This collaboration demonstrated several key benefits: it standardized NAV data dissemination, improved interoperability, and automated previously manual processes. Institutions gained the ability to transfer critical financial data efficiently between blockchains, significantly reducing operational risks and enhancing market transparency. Consequently, the DTCC-Chainlink partnership illustrates how centralized institutions can successfully integrate blockchain technology into existing infrastructures, streamlining capital market operations.

   &lt;/p&gt;&lt;p&gt;
  Implications for Blockchain Projects and Institutional Adoption &lt;/p&gt;&lt;p&gt;

Projects explicitly mentioned by DTCC’s patent—including Bitcoin, Ethereum, Hedera, Binance, Flow, Tron, Tezos, Cosmos, and Ripple—are strategically positioned to benefit from DTCC’s initiative. These blockchain networks could see increased institutional interest due to their compatibility with DTCC’s hierarchical governance and compliance structures. Chainlink’s involvement further underscores the readiness of blockchain technology for large-scale financial integration.
 &lt;/p&gt;&lt;p&gt;
For institutions, DTCC’s model simplifies regulatory compliance and auditability, significantly boosting confidence in blockchain-based solutions. Additionally, Chainlink’s proven interoperability solutions reduce friction between traditional financial markets and blockchain ecosystems. Ultimately, the synergy between DTCC’s centralized control and Chainlink’s decentralized interoperability creates a balanced environment, enabling safe, controlled, and efficient digitization of global finance. &lt;/p&gt;&lt;p&gt;
DTCC’s Long-Term Vision: Controlled Digital Finance &lt;/p&gt;&lt;p&gt;

Rather than seeking to disrupt existing systems, DTCC’s patent shows intent to enhance them digitally. The hierarchical system outlined ensures DTCC maintains centralized control, satisfying regulatory demands and institutional needs. This control-centric model contrasts traditional blockchain ideals of decentralization but meets practical compliance demands from regulators worldwide. &lt;/p&gt;&lt;p&gt;

By laying down this blueprint, DTCC seeks not to dismantle but to reinforce the existing financial system with blockchain efficiency. Such a strategy ensures global finance transitions smoothly into a digitally enabled era without losing centralized stability or accountability. &lt;/p&gt;&lt;p&gt;
A Fundamental Shift in Global Finance &lt;/p&gt;&lt;p&gt;

DTCC’s patent significantly impacts how global finance could function in the future. By carefully balancing blockchain innovation with centralized control, DTCC’s model reshapes asset management strategies across industries. Crypto projects and traditional finance institutions alike stand poised to benefit from clearer frameworks for asset tokenization. Ultimately, DTCC’s on-chain patent represents a clear blueprint for digitally evolving global markets under centralized and regulatory-friendly conditions. &lt;/p&gt;&lt;p&gt;

DTCC is preparing a blockchain-agnostic, quantum-resistant, multi-chain financial platform to tokenize and control the future global economy — while preserving full centralized oversight over rights, custody, and transfer mechanisms.
  
  
  &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;


BlackRock and DTCC have also joined the fray... the &#39;RWA tokenization&#39; innovation shaking traditional finance.
&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The &#39;Tokenization&#39; Innovation Changing the Future of Traditional Finance &lt;p&gt;

The blockchainization of physical assets, so-called &#39;tokenization&#39;, is creating changes that will shake up the existing financial industry. Kiss Grossman, the president of cryptocurrency payment company MoonPay(, stated, “Just as digital technology rapidly reshaped traditional media industries like newspapers and CDs, the tokenization of assets will reconstruct the financial industry at an even faster pace.”
 &lt;/p&gt;&lt;p&gt;
He described this process as a &#39;process of forcing evolution&#39; and emphasized that blockchain-based real-world asset tokenization), hereinafter referred to as RWA(, is no longer just an &#39;idea&#39;. He stated that major players in the financial industry are already moving it from the experimental stage to the implementation stage. &lt;/p&gt;&lt;p&gt;
BlackRock, Franklin Templeton, and others have already entered the field. &lt;/p&gt;&lt;p&gt;

A typical example is that asset management company BlackRock is offering tokenized funds, while Franklin Templeton is operating money market funds on a public blockchain. Major global banks such as Citibank, Bank of America, and JP Morgan are also in a state of experimenting with on-chain settlement, real-time asset movement, and tokenized deposits. &lt;/p&gt;&lt;p&gt;

According to RWA.XYZ, the current market capitalization of the RWA market, excluding stablecoins, is approximately $19 billion), which is about 28 trillion 1.39 billion won(. The industry views this trend of real assets connecting to the blockchain as a survival strategy for traditional finance. &lt;/p&gt;&lt;p&gt;
Those who lead in change become the winners. &lt;/p&gt;&lt;p&gt;

President Grossman stated, “From the 1990s to the early 2000s, digital technology did not destroy the print newspaper and music markets, but rather evolved them.” He added, “Similarly in the financial sector, only companies that actively respond to the current trend of tokenization will survive and become leaders rather than followers.” &lt;/p&gt;&lt;p&gt;

He emphasized that “companies trying to stop the flow of change will inevitably be eliminated,” stating that the restructuring of the global financial system centered around blockchain is an &#39;inevitable reality.&#39; &lt;/p&gt;&lt;p&gt;
The era of 24-hour trading is coming
 &lt;/p&gt;&lt;p&gt;
One of the biggest advantages created by tokenization is the &#39;24-hour trading availability&#39;. RWA can lower fees by eliminating intermediaries and reduce settlement times from several days to just a few minutes. The ability to expand the asset market on a global scale and operate in real-time is also a significant strength.
 &lt;/p&gt;&lt;p&gt;
Accordingly, the U.S. Securities and Exchange Commission ) SEC ( and the Commodity Futures Trading Commission ) CFTC ( began discussions in September on a regulatory framework for the 24-hour operation of capital markets. This serves as a basis for transforming the entire financial system into an &#39;always open&#39; system. &lt;/p&gt;&lt;p&gt;
DTCC also joins with 3.7 quadrillion dollars processed
 &lt;/p&gt;&lt;p&gt;
The DTCC, the central securities depository in the United States, is also actively moving towards tokenization. As of 2024, DTCC, which processed $3.7 quadrillion in payments, recently received approval from the SEC to launch tokenized products and plans to offer U.S. Treasury bonds and stock indices in tokenized form starting in the second half of 2026.
 &lt;/p&gt;&lt;p&gt;
The Ethereum ) network has already established itself as the central platform where most tokenized RWA assets are traded. As blockchain evolves into the infrastructure for physical assets, traditional finance is entering a completely new era.


 &lt;BR&gt; 
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  
  Warning: DTCC Just Got the Green Light. The $3.7 Quadrillion Monster Goes Onchain in 2026
&lt;p&gt;
Today, the Depository Trust and Clearing Corporation received an SEC No Action Letter allowing them to tokenize real world, DTC-custodied assets on blockchain.
 &lt;/p&gt;&lt;p&gt;
This is historic. &lt;/p&gt;&lt;p&gt;

DTCC settles about 3.7 quadrillion dollars every year. It is the core settlement engine behind nearly every stock trade, ETF movement, and Treasury transfer in the United States. &lt;/p&gt;&lt;p&gt;

And they are now cleared to begin rolling out tokenization in 2026.
 &lt;/p&gt;&lt;p&gt;
This is not a pilot and not a test. The SEC has formally authorized a tokenization service for highly liquid assets including:
 &lt;/p&gt;&lt;p&gt;
• The Russell 1000 &lt;/p&gt;&lt;p&gt;
• Major index ETFs &lt;/p&gt;&lt;p&gt;
• U.S. Treasury bills, notes, and bonds &lt;/p&gt;&lt;p&gt;

These are some of the deepest liquidity pools on earth. &lt;/p&gt;&lt;p&gt;

Each tokenized asset will carry the same rights, protections, and ownership structure as the traditional version. This mirrors the digital twin model that Nasdaq filed for earlier this year. &lt;/p&gt;&lt;p&gt;

This is the first real path to onchain U.S. securities. &lt;/p&gt;&lt;p&gt;

DTCC has been testing DLT for almost a decade. Securrency’s patents, now owned by DTCC, reference multiple networks including Hedera (HBAR), XRP Ledger, Bitcoin (BTC), Ethereum (ETH), and there are already deep integrations with Chainlink (LINK).
 &lt;/p&gt;&lt;p&gt;
And this isn’t happening in a vacuum.  &lt;/p&gt;&lt;p&gt;

The Global Blockchain Business Council has been building a multi-network risk mitigation framework with contributors like DTCC, Hedera, Ripple, Cardano (ADA), Avalanche (AVAX), Clearstream, Euroclear, Canton (CC) and Chainlink. These trials are being overseen by the World Bank. &lt;/p&gt;&lt;p&gt;

 The framework is designed to give institutions a safe and standardized path to use public networks. It is the clearest signal that a multi-chain future is already being engineered behind the scenes. &lt;/p&gt;&lt;p&gt;

This also lines up with OCC guidance confirming that U.S. national banks can now buy and sell crypto for customers as a riskless principal. &lt;/p&gt;&lt;p&gt;

Banks plus DTCC plus regulatory clarity is the digital market structure that institutions have been waiting for.
 &lt;/p&gt;&lt;p&gt;
DTCC will soon publish:

• Approved blockchain networks &lt;/p&gt;&lt;p&gt;
• Wallet registration requirements &lt;/p&gt;&lt;p&gt;
• Onboarding standards for institutions &lt;/p&gt;&lt;p&gt;
• Compliance and reporting frameworks &lt;/p&gt;&lt;p&gt;

We will finally see which networks will be used in production.
 &lt;/p&gt;&lt;p&gt;
This is the moment crypto shifts from asset class to infrastructure. TradFi is not speculating. They are rebuilding the settlement layer of global finance on distributed ledger technology. &lt;/p&gt;&lt;p&gt;

Tokenization is no longer a narrative. It is a regulated roadmap. &lt;/p&gt;&lt;p&gt;

Rollout begins in the second half of 2026. &lt;/p&gt;&lt;p&gt;

The internet of information is literally becoming the internet of value.
  
  
  
  
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/djykrJKxsMA?si=m7jdglNeIT-P5pK6&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/djl2ICL804E?si=_rtatADKPDxIUMCr&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/dtccs-master-plan-tokenizing.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsMu4sEjWEPxoqxPAAk_KL6QuO4xFcgEZDcmGdAIOAIq5Gy7rpPe8qqhr-Fs5DOWRHOU_dMpBBZMvYo0MhBXfkf_YqY5bGw4Jwe_pv47MLHWXvd6M2_p7D6xALDNCQBHQ_702UsMOIxpg3to3icO4ybdEEimA2NCKf_QYvx84tI57wrvhPWiU8n1zsF4s/s72-c/DTCC.2-810x524.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-7146089350326998287</guid><pubDate>Sat, 02 Jan 2010 21:11:00 +0000</pubDate><atom:updated>2026-01-01T16:09:15.247-06:00</atom:updated><title>Dark Factories: The Completely Automated Factory Of The Future</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhReO4r6BFb6z8RblFvgBwZn6CcwdRjAipjvkoywWVQYVftO2EhslVlLWSmMsAuLsNqiWHrWGVjfBLwtC_Z4Hnt5LaZaNe73uA_0TT-BchQ8-61OBu7SQ_739-TYWkB1-e9jFB2S3OyqNrXPM_0HTv8Ng_j0wy3ZJIvUZHMdMuU786fEfuic_9VjWpUGGI/s1600/SS-KH_what-is-a-dark-factory_KH-HRO.jpg&quot; width=&quot;678&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;


&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

  With the fourth generation - Industry 4.0 - the industrial revolution has reached a point where human labour can be supplemented or replaced by fully autonomous systems. At the centre of this development is the concept of the dark factory, a vision of fully automated factories that operate without light, breaks or human presence. However, such complete automation poses a major challenge and requires considerable investment and reorganisation.
&lt;p&gt;
What is a Dark Factory?
  &lt;/p&gt;&lt;p&gt;
A dark factory is a production or logistics facility that is operated exclusively by machines, autonomous robots and digital technologies. The ‘dark’ in the name symbolises that these facilities can theoretically operate without light, as no human presence is required - theoretically, because certain optical sensors and cameras still require light to function correctly. These factories are designed to maximise efficiency, precision and productivity and use state-of-the-art technology to operate around the clock. &lt;/p&gt;&lt;p&gt;
Features of a Dark Factory &lt;/p&gt;&lt;p&gt;

    Complete automation &lt;/p&gt;&lt;p&gt;
    All work processes - from the delivery of materials to the completion of a product - are controlled by machines, robots and AI. Human intervention is minimised or not necessary.
 &lt;/p&gt;&lt;p&gt;
    24/7 operation &lt;/p&gt;&lt;p&gt;
    As machines do not require breaks, a Dark Factory can work without interruptions, which significantly increases productivity. &lt;/p&gt;&lt;p&gt;

    Cost reduction &lt;/p&gt;&lt;p&gt;
    Operating costs are reduced due to the elimination of lighting, heating and other energy-intensive requirements for human workstations. &lt;/p&gt;&lt;p&gt;

    IoT and AI integration &lt;/p&gt;&lt;p&gt;
    Networked machines continuously collect and analyse data in order to optimise processes, minimise errors and increase productivity. &lt;/p&gt;&lt;p&gt;

    Adaptability &lt;/p&gt;&lt;p&gt;
    Dark factories utilise flexible automation technologies to adapt quickly to new requirements or product changes.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;
      
      
      
      &lt;span class=&quot;hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text&quot; data-hs-cos-general-type=&quot;meta_field&quot; data-hs-cos-type=&quot;rich_text&quot; id=&quot;hs_cos_wrapper_post_body&quot;&gt;&lt;table style=&quot;border-collapse: collapse; border: 1px solid #99acc2; height: 302.896px; table-layout: fixed; width: 100%;&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;height: 302.896px;&quot;&gt;&lt;td style=&quot;height: 302.896px; padding: 4px; width: 49.9649%;&quot;&gt;&lt;h4&gt;&lt;strong&gt;Advantages:&lt;/strong&gt;&lt;/h4&gt;
&lt;ul&gt;&lt;li&gt;&lt;p style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;-webkit-text-fill-color: #2e1a47; background-color: transparent; color: #333333; font-family: -apple-system, BlinkMacSystemFont, &#39;Segoe UI&#39;, Roboto, &#39;Helvetica Neue&#39;, Arial, &#39;Noto Sans&#39;, sans-serif, &#39;Apple Color Emoji&#39;, &#39;Segoe UI Emoji&#39;, &#39;Segoe UI Symbol&#39;, &#39;Noto Color Emoji&#39;; letter-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Maximum efficiency:&lt;/span&gt; No delays due to pauses or human error.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Precision:&lt;/span&gt; Automated systems work with maximum accuracy.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Scalability&lt;/span&gt;: Processes can be quickly adapted to increasing production requirements.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Cost savings:&lt;/span&gt; Reduced energy consumption and lower labour costs in the long term.&lt;/li&gt;&lt;/p&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td style=&quot;height: 302.896px; padding: 4px; width: 49.9649%;&quot;&gt;
&lt;h4&gt;Challenges:&lt;/h4&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;-webkit-text-fill-color: #2e1a47; background-color: transparent; color: #333333; font-family: -apple-system, BlinkMacSystemFont, &#39;Segoe UI&#39;, Roboto, &#39;Helvetica Neue&#39;, Arial, &#39;Noto Sans&#39;, sans-serif, &#39;Apple Color Emoji&#39;, &#39;Segoe UI Emoji&#39;, &#39;Segoe UI Symbol&#39;, &#39;Noto Color Emoji&#39;; letter-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;High initial investment:&lt;/span&gt; Setting up a dark factory requires considerable investment in technology and infrastructure.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;-webkit-text-fill-color: #2e1a47; background-color: transparent; color: #333333; font-family: -apple-system, BlinkMacSystemFont, &#39;Segoe UI&#39;, Roboto, &#39;Helvetica Neue&#39;, Arial, &#39;Noto Sans&#39;, sans-serif, &#39;Apple Color Emoji&#39;, &#39;Segoe UI Emoji&#39;, &#39;Segoe UI Symbol&#39;, &#39;Noto Color Emoji&#39;; letter-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Complex planning:&lt;/span&gt; Implementation demands a deep understanding of the processes and requirements.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;-webkit-text-fill-color: #2e1a47; background-color: transparent; color: #333333; font-family: -apple-system, BlinkMacSystemFont, &#39;Segoe UI&#39;, Roboto, &#39;Helvetica Neue&#39;, Arial, &#39;Noto Sans&#39;, sans-serif, &#39;Apple Color Emoji&#39;, &#39;Segoe UI Emoji&#39;, &#39;Segoe UI Symbol&#39;, &#39;Noto Color Emoji&#39;; letter-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Maintenance and technical expertise:&lt;/span&gt; Operation requires qualified specialists to maintain the technologies&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;



The Rise of the Dark Factory: Fully Automated Production Floors
&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;298&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGDxSiFEMNQiY4OmrtA3xIcq_NDvBxVjuOAhO7mMBBv52779jj2F_0KAG2zB4Fwbw1aW1JXwLKLCDNAKJWRtLzWfv24Dto9SXuM8HBO4dDGIiIvJ22Jsj8jOppvMm2Yzd3ovrGB3y3vRlsfUpAZfX02OZpINeApUq9X7gsV0hN14ifJ0A6WYJb_ySXqkw/s1600/shutterstock_2467190345-2.jpg.jpeg&quot; width=&quot;528&quot; /&gt;

&lt;/div&gt;
&lt;p&gt;
  A Silent Revolution on the Shop Floor &lt;/p&gt;&lt;p&gt;

Factories have long symbolized industrial progress, buzzing with human activity and machinery. However, the era of Industry 4.0 is rewriting this image. Today, “dark factories” are emerging production fcilities that operate entirely autonomously, often without human presence or even lights. These factories leverage advanced robotics, artificial intelligence (AI), Internet of Things (IoT) devices, and predictive analytics to function as self-sustaining ecosystems.
 &lt;/p&gt;&lt;p&gt;
The rise of dark factories reflects a broader industrial shift, where companies pursue continuous production, high precision, and resilience against supply chain disruptions. While the promise of fully automated production is compelling, it also raises questions about workforce transformation, policy frameworks, and global competitiveness. &lt;/p&gt;&lt;p&gt;
From Lean Manufacturing to Lights-Out Production
 &lt;/p&gt;&lt;p&gt;
The idea of fully automated factories is not new. Experiments in the 1980s, such as General Motors’ lights-out initiatives, revealed the potential for autonomous operations but faced technological barriers. Robotics lacked dexterity, sensors were primitive, and computing systems could not coordinate complex workflows. &lt;/p&gt;&lt;p&gt;

With Industry 4.0, these barriers are collapsing. Today, dark factories integrate AI-driven robotics, IoT sensors, autonomous material handling, and digital twins. Robots can assemble products, conduct inspections, and self-correct errors. IoT devices monitor machinery in real time, feeding data into cloud and edge computing systems to optimize production and predict maintenance needs. AGVs, drones, and robotic arms manage logistics without human intervention. This convergence allows factories to operate 24/7 with minimal errors and reduced costs, achieving precision and efficiency previously unimaginable. &lt;/p&gt;&lt;p&gt;
Industrial Advantages and Adoption Drivers &lt;/p&gt;&lt;p&gt;

The adoption of dark factories is fueled by several compelling advantages that make fully automated production an attractive strategy for manufacturers worldwide. Cost efficiency is a primary driver: robots operate without wages, breaks, or overtime, and their precision reduces errors and waste, translating into significant long-term savings for businesses. In an era where operational margins are tight, these savings can be a decisive competitive advantage.
 &lt;/p&gt;&lt;p&gt;
Another key factor is continuous production. Unlike human-operated factories, dark factories can run 24/7 without fatigue, meeting the growing demand for rapid delivery and mass-customized products. This capability is particularly valuable in industries where speed-to-market is critical, enabling companies to respond quickly to changing consumer needs and market fluctuations. &lt;/p&gt;&lt;p&gt;

Quality and precision are also central to the appeal of dark factories. AI-powered robotics and computer vision systems ensure consistent output across every unit, while real-time defect detection reduces material waste and enhances customer satisfaction. This level of reliability is especially important for high-precision sectors such as electronics, aerospace, and pharmaceuticals, where even minor errors can have significant consequences. &lt;/p&gt;&lt;p&gt;

Dark factories also help mitigate labor shortages, a pressing concern in regions with aging populations or declining skilled labor pools, such as Europe and Japan. By automating repetitive or physically demanding tasks, manufacturers can maintain productivity even as the availability of traditional workers declines. &lt;/p&gt;&lt;p&gt;

Safety is another advantage: hazardous or monotonous work can be fully automated, reducing workplace injuries and improving occupational health. Meanwhile, scalability allows production lines to be reprogrammed quickly for new products or variants, giving companies the flexibility to adapt to evolving market demands without extensive downtime or retraining. Collectively, these factors make dark factories a strategic investment for industries requiring high levels of precision, speed, and reliability, including electronics, automotive, aerospace, and pharmaceuticals. &lt;/p&gt;&lt;p&gt;
Global Case Studies &lt;/p&gt;&lt;p&gt;

The potential of dark factories is illustrated by several leading examples around the world. Siemens’ Amberg Electronics Plant in Germany operates almost entirely lights-out, achieving a remarkable 99.99885% quality rate. Human involvement is largely limited to supervising AI systems and optimizing operations, demonstrating how automation can handle complex, high-precision tasks with minimal human oversight. &lt;/p&gt;&lt;p&gt;

In Japan, Fanuc’s robotics plant showcases another extreme of automation: the facility can run for up to 30 days without human supervision, highlighting the feasibility of fully autonomous industrial operations on a large scale. This approach not only improves efficiency but also reduces dependence on human labor for routine tasks.
 &lt;/p&gt;&lt;p&gt;
In the United States, Tesla’s Gigafactories integrate extensive AI and robotics into battery and electric vehicle assembly. While not fully dark, these facilities demonstrate a hybrid model of automation, combining human expertise with machine precision to achieve scalability and rapid production. &lt;/p&gt;&lt;p&gt;

China’s Shenzhen electronics factories provide another perspective, producing smartphones and other components with minimal human intervention. These factories exemplify how automation can support high-volume, precision manufacturing while maintaining cost efficiency and operational speed.
 &lt;/p&gt;&lt;p&gt;
Together, these case studies demonstrate that dark factories are commercially viable, scalable, and strategically significant. They represent a new paradigm in manufacturing, offering unprecedented efficiency, precision, and adaptability, and positioning companies to compete more effectively in a global industrial landscape. &lt;/p&gt;&lt;p&gt;
Adoption Statistics by Industry &lt;/p&gt;&lt;p&gt;

The adoption of AI in manufacturing has accelerated significantly in recent years, with Germany serving as a prime example of this trend. Between 2020 and 2023, the percentage of German manufacturers utilizing AI rose from just 6% to 13.3%. This rapid growth underscores how quickly Industry 4.0 technologies are reshaping traditional production environments. Projections suggest that by 2030, AI-driven manufacturing could have a substantial economic impact, boosting productivity, enabling highly customized production, and supporting Germany’s position as a leader in advanced industrial engineering.
 &lt;/p&gt;&lt;p&gt;
In the services sector, the uptake of AI has been even more pronounced. By 2024, nearly 40% of service-sector firms worldwide reported using AI to enhance operations, customer service, and back-office efficiency. Importantly, about 34% of these firms have invested in retraining their workforce, ensuring employees can adapt to new roles created by automation. This dual approach adoption of AI alongside workforce upskilling illustrates how services are balancing innovation with inclusivity, ensuring that the benefits of automation extend beyond cost savings to workforce transformation.
 &lt;/p&gt;&lt;p&gt;
The electronics and automotive industries have emerged as clear frontrunners in the application of AI-driven robotics and automation. These sectors are leveraging predictive maintenance systems, machine vision for quality control, and autonomous logistics solutions, enabling them to achieve higher operational efficiency and tighter quality benchmarks. In the automotive sector, AI is integral not just in assembly lines, but also in supply chain optimization and electric vehicle production. Meanwhile, the electronics industry benefits from precision manufacturing and accelerated innovation cycles, driven by the integration of smart automation technologies.
 &lt;/p&gt;&lt;p&gt;
Research consistently highlights the tangible benefits of AI adoption across industries. Companies implementing AI in production environments report productivity gains ranging from 20% to 40%, alongside significant reductions in defect rates and operational downtime. Additionally, AI-enabled automation shortens time-to-market for new products, giving companies a critical edge in highly competitive global markets. These statistics reinforce the idea that AI is not simply a cost-cutting tool it is a strategic enabler of innovation, agility, and long-term competitiveness. &lt;/p&gt;&lt;p&gt;
Country-Wise Trends and Policy Insights
 &lt;/p&gt;&lt;p&gt;
United States: AI investment reached $67.2 billion in 2023, nearly nine times higher than China. The U.S. emphasizes AI regulation and governance, with 21 agencies overseeing AI technologies.
 &lt;/p&gt;&lt;p&gt;
Germany: Strong adoption in manufacturing is backed by policies supporting smart factories and industrial automation. Incentives for AI deployment in Industry 4.0 initiatives have accelerated adoption. &lt;/p&gt;&lt;p&gt;

United Kingdom: The AI market exceeds £21 billion in 2025, with plans to integrate AI into public services and industry, aiming to become a global AI superpower by 2035. &lt;/p&gt;&lt;p&gt;

European Union: Denmark leads with 27.58% of enterprises using AI, followed by Sweden (25.09%) and Belgium (24.71%). Romania lags at 3.07%. EU regulations focus on balancing innovation with ethical AI use and data privacy.
 &lt;/p&gt;&lt;p&gt;
United Arab Emirates: The UAE Strategy for AI aims to position the country as a global leader by 2031, promoting AI across healthcare, energy, transportation, and governance.
 &lt;/p&gt;&lt;p&gt;
These trends indicate that policy frameworks, investment incentives, and workforce strategies are key drivers of adoption, in addition to technological readiness. &lt;/p&gt;&lt;p&gt;
Challenges and Risks
 &lt;/p&gt;&lt;p&gt;
While dark factories promise efficiency, cost savings, and scalability, their adoption is not without hurdles. One of the most significant barriers is the capital investment required. Building a fully automated facility involves substantial upfront costs for robotics, AI platforms, IoT sensors, and supporting digital infrastructure. For large multinational corporations, this investment can be justified through long-term gains, but for small and medium-sized enterprises (SMEs), such costs often remain prohibitive, limiting widespread adoption.
 &lt;/p&gt;&lt;p&gt;
Cybersecurity presents another critical challenge. Dark factories, by design, are fully connected ecosystems, with every machine, sensor, and control system linked through networks. This connectivity makes them highly vulnerable to cyberattacks, industrial espionage, and data breaches. A single breach could halt operations across an entire factory, potentially leading to massive financial and reputational damage. As a result, building robust cybersecurity frameworks has become as important as installing robots or AI systems themselves. &lt;/p&gt;&lt;p&gt;

Reliability is also a key concern. Even the most advanced machines and AI-driven systems are not immune to errors, breakdowns, or unforeseen failures. Downtime in a dark factory can be particularly costly, as there are few or no human workers on-site to intervene quickly. This makes predictive maintenance systems, redundancy planning, and remote troubleshooting capabilities essential for minimizing risks and ensuring operational continuity. &lt;/p&gt;&lt;p&gt;

Beyond technical issues, ethical considerations loom large. The displacement of workers in repetitive or manual roles is an inevitable consequence of large-scale automation. Policymakers and business leaders face the challenge of ensuring equitable access to reskilling programs, creating pathways for displaced workers to transition into higher-value roles. Moreover, governance frameworks must be developed to ensure AI systems are transparent, explainable, and aligned with ethical business practices. Without addressing these concerns, the promise of dark factories could be overshadowed by societal pushback and inequality. &lt;/p&gt;&lt;p&gt;
Future Outlook: Beyond Dark Factories &lt;/p&gt;&lt;p&gt;

Dark factories represent only the beginning of a broader shift toward fully autonomous, intelligent manufacturing ecosystems. The next frontier lies in cognitive manufacturing, where AI systems do more than execute instructions they make autonomous production decisions, optimize energy usage, and manage maintenance schedules with little to no human oversight. This will mark a fundamental transformation in how factories think and operate, evolving from programmable automation to adaptive intelligence.
 &lt;/p&gt;&lt;p&gt;
Another promising development is the move toward sustainable manufacturing. By leveraging smart automation, factories will play a pivotal role in advancing the circular economy. AI systems can minimize waste, optimize resource consumption, and reduce energy intensity, turning sustainability from a regulatory requirement into a competitive advantage. This transition will not only lower environmental footprints but also open new business models centered on recycling, reuse, and sustainable innovation.
 &lt;/p&gt;&lt;p&gt;
Equally transformative is the rise of augmented human collaboration. Instead of working directly on assembly lines, human operators will supervise and manage multiple factories remotely. Using digital twins, augmented reality (AR), and virtual reality (VR) platforms, workers will be able to monitor production, simulate scenarios, and troubleshoot issues in real time, regardless of physical location. This knowledge-driven oversight ensures that while machines handle repetitive, dangerous, and data-intensive tasks, humans can focus on creativity, strategic thinking, and ethical decision-making.
 &lt;/p&gt;&lt;p&gt;
Ultimately, the future of dark factories is not about replacing humans but redefining their role. As machines take over execution, humans will be freed to concentrate on innovation, design, and leadership. The synergy between autonomous systems and human intelligence will shape the factories of tomorrow not as dark and empty spaces, but as intelligent ecosystems where efficiency, sustainability, and human creativity coexist.
 &lt;/p&gt;&lt;p&gt;
Dark factories symbolize the next frontier of Industry 4.0, combining autonomy, intelligence, and efficiency to transform manufacturing. They promise continuous, precise, and resilient production, while also reshaping the workforce and global industrial landscape. For industrial leaders, CIOs, and policymakers, the challenge is clear: embrace automation while managing workforce transitions, cybersecurity, and ethical governance. As the lights dim on traditional production floors, the opportunities for innovation, operational efficiency, and global competitiveness have never been brighter.
 &lt;BR&gt; 
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  
  
  
  The Tech Enabling China&#39;s &#39;Dark Factories&#39;&lt;p&gt;
  
  They are not just prototypes or experiments. They are the beginning of a transformation.
  China is entering a new age of manufacturing with the rise of &#39;dark factories,&#39; fully automated facilities that operate without any human workers or even lights. Inside these eerily quiet plants, robotic arms weld, cut, and assemble products nonstop. Fleets of autonomous vehicles deliver materials across factory floors without human oversight. 
 &lt;/p&gt;&lt;p&gt;
As they are built entirely around machines, these factories eliminate the need for lighting, heating, break rooms, and other human-centric infrastructure. &lt;/p&gt;&lt;p&gt;

The result is a system optimized for continuous productivity. It reduces costs, improves precision, and functions at all hours. Powering this new production paradigm is a convergence of technologies such as artificial intelligence (AI), advanced robotics, the Internet of Things (IoT), and dense sensor networks. Together, they create self-regulating ecosystems where machines work together with extraordinary coordination, even with the lights off. &lt;/p&gt;&lt;p&gt;
Core Technologies: The Pillars of Automation &lt;/p&gt;&lt;p&gt;

At the center of every dark factory is an army of robotic workers. These include not only robot arms that weld and paint but also specialized machines that handle tasks like microassembly, product inspection, and polishing. China has become the global leader in industrial robot deployment. In 2022, it installed over 290,000 units, which accounted for more than half of the world’s total. &lt;/p&gt;&lt;p&gt;

By 2023, China’s robot density had reached 392 per 10,000 workers, significantly above the global average of 141. Companies like Foxconn are leading this shift. The electronics giant has replaced over 60,000 workers at its Kunshan factory with robots and aims to automate 30 percent of its operations by 2025. Similarly, BYD, a key player in electric vehicles, has installed robotic systems across its battery and vehicle body manufacturing lines.
 &lt;/p&gt;&lt;p&gt;
Mobile robotics are just as vital. Automated Guided Vehicles (AGVs) and Autonomous Mobile Robots (AMRs) move materials across the floor, reposition tools, and deliver parts. In Jetour Auto’s Fuzhou factory, these mobile robots have cut logistics time by more than 40 percdnt and helped reach an output of one completed car every 100 seconds. &lt;/p&gt;&lt;p&gt;
Artificial Intelligence: The Brain Behind the Operation &lt;/p&gt;&lt;p&gt;

A dark factory needs more than robots. It needs intelligence that can manage those machines. Artificial intelligence fills that role. AI functions as the factory’s brain by directing robot movements, analyzing data in real time, and making continuous adjustments to keep systems efficient. &lt;/p&gt;&lt;p&gt;

At Xiaomi’s smart factory in Changping, the AI platform HyperIMP oversees every aspect of production. It coordinates 11 robotic production lines, monitors equipment health, and reroutes tasks when issues arise. This coordination allows the plant to produce one smartphone every 3 seconds, without manual oversight.
 &lt;/p&gt;&lt;p&gt;
AI is also used in machine vision systems that detect flaws and maintain product quality. These systems can find microdefects that humans would likely miss. Siemens has reported a 99.99 percent product quality rate in its automated facilities, and Xiaomi is reaching a similar level of consistency with its vision-based inspections.
 &lt;/p&gt;&lt;p&gt;
Another crucial role of AI is predictive maintenance. Instead of waiting for machines to fail, AI analyzes sensor data such as temperature, vibration, and motor current. It identifies wear patterns and schedules maintenance before breakdowns occur. The manufacturing sector is expected to gain $3.8 trillion by 2035 from AI adoption. Jetour’s &#39;Smart Brain&#39; platform has reduced downtime at its Fuzhou facility by more than 60 percent and has improved assembly accuracy across the board. &lt;/p&gt;&lt;p&gt;
IoT and Sensor Networks: The Central Nervous System &lt;/p&gt;&lt;p&gt;

The IoT and sensor networks act as the nervous system of a dark factory. Every machine is connected through high-speed networks and constantly shares status updates, location data, and quality metrics. This web of data enables real-time adjustments.
 &lt;/p&gt;&lt;p&gt;
Sensors play a critical role in guiding robots. Cameras, infrared sensors, laser scanners, and LIDAR devices help machines perceive their environment. These technologies make it possible for AGVs to navigate in total darkness and for robot arms to place components with micrometer-level accuracy. &lt;/p&gt;&lt;p&gt;

All of this data is collected and processed by AI systems, which analyze it to optimize the workflow. At Gree Electric’s 5.5G-enabled smart factory in Zhuhai, this full-stack integration has improved overall production efficiency by 86 percent. &lt;/p&gt;&lt;p&gt;
Operational Advantages Driven by Technology &lt;/p&gt;&lt;p&gt;

These combined technologies create significant operational benefits. One of the most obvious is 24/7 production. Without human workers, dark factories do not require breaks, shift changes, or holidays. Machines can keep running continuously.
 &lt;/p&gt;&lt;p&gt;
Costs are also significantly reduced. Companies save on salaries, training, and safety measures. They also reduce utility expenses by eliminating the need for lighting, air conditioning, and other systems designed for people. According to the International Energy Agency, dark factory automation can lower industrial energy use by 15 to 20 percent.
 &lt;/p&gt;&lt;p&gt;
Dark factories also deliver extremely high precision. Robotic systems can operate with consistency that surpasses human capabilities. When paired with real-time vision inspection, this leads to fewer defects and higher product reliability.
 &lt;/p&gt;&lt;p&gt;
Another key advantage is cleanliness. Contamination risks drop dramatically with very few humans involved. This is especially important for industries like semiconductors, medical devices, and electronics, where clean environments are critical.
 &lt;/p&gt;&lt;p&gt;
Finally, automated facilities offer resilience. They are less vulnerable to labor disruptions caused by pandemics, strikes, or demographic shifts. This makes them more stable in a volatile global supply chain environment. &lt;/p&gt;&lt;p&gt;
The Human Element: Skills for the Factory of the Future &lt;/p&gt;&lt;p&gt;

While dark factories require little human intervention on the shop floor, people remain critical to their success. These automated environments still depend on experts to design robotic systems, oversee AI, maintain equipment, and resolve issues. As automation advances, the worker’s role is shifting from manual labor to skilled technical and supervisory positions that support continuous operations. &lt;/p&gt;&lt;p&gt;

Essential roles now include AI system trainers, robotics technicians, data analysts, IoT specialists, and cybersecurity professionals. These workers ensure that smart factory systems communicate efficiently, adapt to real-time data, and stay secure. With rising complexity, manufacturing increasingly values interdisciplinary expertise that combines engineering, software development, and data science. &lt;/p&gt;&lt;p&gt;

To secure roles in these environments, candidates should highlight skills like Python, PLC programming, SCADA systems, and machine vision. Familiarity with platforms such as TensorFlow, ROS, and MES software is highly regarded. Industry certifications from Siemens, FANUC, or Cisco are also beneficial. Soft skills, including real-time problem-solving and cross-functional communication, are important for leadership and systems oversight.
 &lt;/p&gt;&lt;p&gt;
To meet growing demand, companies and Chinese agencies are investing in reskilling programs. Xiaomi began retraining assembly workers as robotics technicians in 2024, and Gree Electric collaborates with institutes to prepare workers for 5.5G factory roles. The future of manufacturing will depend on how effectively humans are trained to manage, improve, and collaborate with machines. &lt;/p&gt;&lt;p&gt;
Case Studies: Xiaomi’s Changping Smart Factory &lt;/p&gt;&lt;p&gt;

Xiaomi’s $330 million dollar factory in Beijing spans 81,000 square meters and is one of China’s most advanced dark factories. It is capable of producing 10 million smartphones annually. Inside, 11 robotic lines operate continuously, managed by the company’s proprietary HyperIMP AI system. Vision systems monitor quality, while AGVs handle logistics. The plant can manufacture one smartphone every 3 seconds with zero human involvement on the production floor. &lt;/p&gt;&lt;p&gt;
Jetour’s Fuzhou Dark Factory &lt;/p&gt;&lt;p&gt;

Jetour’s Fuzhou facility produces SUVs with near-total automation. Over 300 robots carry out welding, painting, tire installation, and even CNC bonding of windshields. It builds a car every 100 seconds and uses its &#39;Smart Brain&#39; AI to oversee equipment, quality, and scheduling. AMRs and AGVs support flexible logistics, which has helped the factory reach daily efficiency goals faster than previous plants. &lt;/p&gt;&lt;p&gt;
Other Industry Leaders &lt;/p&gt;&lt;p&gt;

Changying Precision Technology reduced its workforce by 90 percent in one facility by switching to robotics. Output increased, and error rates fell. Meanwhile, Gree Electric’s Gaolan facility uses 5.5G connectivity to support real-time machine learning and ultra-fast response times. These upgrades led to an 86 percent boost in output efficiency. &lt;/p&gt;&lt;p&gt;
Strategic Drivers and Global Context &lt;/p&gt;&lt;p&gt;

The growth of dark factories aligns with China’s &#39;Made in China 2025&#39; policy. This strategy aims to upgrade the nation’s manufacturing base by promoting automation and advanced technologies. In 2023 alone, the government invested $1.4 billion in robotics research and development, along with further subsidies to promote AI and smart factory adoption.
 &lt;/p&gt;&lt;p&gt;
China’s labor costs have risen in recent years, making automation economically attractive. At the same time, international competition is increasing. Countries such as Germany, the United States, Japan, and South Korea are also investing heavily in automation. However, China’s scale and state-level support allow it to move faster and deploy technology more widely than many peers. &lt;/p&gt;&lt;p&gt;

China’s dark factories are not just prototypes or experiments. They are the beginning of a transformation in how products are made. By uniting robotics, AI, IoT, and sensing technologies into fully autonomous systems, these facilities achieve new levels of speed, quality, and reliability. &lt;/p&gt;&lt;p&gt;

The benefits are clear, but the shift raises important questions about the future of human labor and economic structure. As machines become more capable, companies and governments will need to invest in new skill development and social planning. China is leading the way, and the rest of the world is watching as dark factories illuminate the path to the next industrial era.
  &lt;BR&gt; 
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
  What are &#39;Dark Factories,&#39; and Do They Really Exist?


  &lt;p&gt;
    The first Industrial Revolution profoundly changed the way goods are manufactured, resulting in then-unthinkable gains in productivity, quality control, and consistency. Since then, three more revolutions have occurred, with manufacturers currently reaping the industrial automation benefits of Industry 4.0.&lt;/p&gt;&lt;p&gt;


Theoretically, the next step in this evolution would be full automation, in which workers are no longer needed to create output. Known as a dark factory, this environment is fully automated, with no required human labor. Without this, such a facility can literally operate in the dark, without heat, light or other environmental needs – hence, the “dark factory” moniker – to serve a workforce.&lt;/p&gt;&lt;p&gt;

Do Dark Factories Actually Exist?
&lt;/p&gt;&lt;p&gt;

“There’s always the story out there that there’s that one facility somewhere, usually in some faraway or unknown place,” said Guy Courtin, vice president of Industry and Advanced Technology for Montreal-based Tecsys, a supply chain software provider. “But if it exists, it would seem to be less of an actual production facility and more of a display that it can be done. Even if a fully automated facility exists, you probably still need at least some full-time employees to maintain that automation. So, is that truly a dark factory? Under the definition, no.”
&lt;/p&gt;&lt;p&gt;

There are certainly shades of gray in this concept. Unlike a dark factory, a fully automated factory relies on robotics to perform tasks, but that equipment still needs to be maintained by humans. Another take on the concept is the use of cobotics, the collaborative robots that help employees do their jobs.&lt;/p&gt;&lt;p&gt;


“In theory and in practice, could you have a dark shift in a factory?” asked Courtin. “That’s entirely possible and more likely. For example, there could be a fully autonomous, robotic overnight shift that works in the dark that preps workstations with inventory. Or orders could get pre-picked in a warehouse and be ready for processing and shipping by the next FTE shift.”
&lt;/p&gt;&lt;p&gt;

While the concept of a true dark factory has certainly captured attention within the industry, it is much like an elusive unicorn. Rumors, yes. Actual proof and implementation? Not really.
&lt;/p&gt;&lt;p&gt;

“Right now, we’re more in a state where companies are less interested in implementing the full dark factory concept and more focused on how automation can complement labor, and this nuance gets lost in the excitement of robots,” he said.
&lt;/p&gt;&lt;p&gt;

Some operations are already implementing automated forklift technology, which relies on a variety of components – from wrap-around cameras to microphones – to allow for remote operation by employees. Taking this technology a step further are autonomous guided vehicles (AGV), which remove the human operator completely by using pre-programmed routes and tasks.
&lt;/p&gt;&lt;p&gt;

Other operations are pushing forward with additional autonomous applications. Europe’s largest pork processing plant, located in Denmark, uses human labor to start the processing, but robotics quickly take over. Using infrared technology to assess each hook, a series of six robots processes up to 18,000 units per shift. Human-powered processing lines typically process an average of 977 units an hour or around 7,800 per eight-hour shift.&lt;/p&gt;&lt;p&gt;


A diesel automotive facility in China has also implemented more of a dark-factory approach to automate its assembly line more fully. Sensors embedded in the robotics alert workers when bottlenecks occur, or when the machine’s state and run time require human intervention. Integrating advanced analytics and Internet of Things (IoT) technology has also helped the facility use predictive maintenance to avoid equipment breakdowns.&lt;/p&gt;&lt;p&gt;


“Automotive manufacturers have been applying this type of technology for years,” said Courtin. “That industry already knows that there are certain functions that are better suited to robotics – tasks that are repetitive or dangerous, for example.”
&lt;/p&gt;&lt;p&gt;
But at the same time, robotic technology has not advanced past human capacities in certain areas. “There are just some things human beings still do better,” said Courtin. “We remain better than robots at picking parts out of a box, for example.”
&lt;/p&gt;&lt;p&gt;
Humans also have a much greater capacity to troubleshoot. A simple issue that can be resolved by human understanding and reasoning can cause a robotic shutdown if it is outside of the program or beyond the capacity of the machine’s learning and artificial intelligence (AI). Humans also have much greater abilities to communicate, assess a situation, and infer conclusions within a system or organization. Robotics and machinery are fairly limited to error codes, streams of data, and other purely objective information.  To use this information, automation must still be trained using AI and machine learning.&lt;/p&gt;&lt;p&gt;
Pros and Cons of Automated Factories&lt;/p&gt;&lt;p&gt;

With businesses perpetually focused on ways to improve efficiencies, cut costs and advance productivity, automation and robotics certainly are on the manufacturing and supply chain radar. Courtin noted automation helps eliminate natural human reasons to be away from work, such as illness or family vacations.&lt;/p&gt;&lt;p&gt;

“They don’t have to commute, so they’re not burning fossil fuels in cars to get to and from work,” he added.
&lt;/p&gt;&lt;p&gt;
Human error is removed from the automation equation, along with attitude problems, homelife distractions, politics and workplace conflict. The human-nature, soft-issue problems that can plague workplaces around the world are removed when humans are replaced by robotics.&lt;/p&gt;&lt;p&gt;

While in theory full automation might make sense in some cases, implementing it isn’t always so easy.
&lt;/p&gt;&lt;p&gt;
“What isn’t often talked about is the relationship with labor,” said Courtin. “Using automation poses the threat to reduce head count. There’s a certain uneasiness in introducing automation in that respect. It’s a delicate line to walk.”
&lt;/p&gt;&lt;p&gt;
On the other side of the equation, a dark factory could remove existing labor needs and concerns, an advantage in countries where labor costs are high. In parts of the world where labor costs are low, the ROI on a dark factory may take years.
&lt;/p&gt;&lt;p&gt;
“Creating a true a dark factory means that you don’t have to locate your facility near an established workforce – so you could build one where property values are less expensive,” said Courtin. “But then you also have to keep in mind logistics: if you’re really remote, there are also going to be extra supply chain and fulfillment costs.”
&lt;/p&gt;&lt;p&gt;
Labor and workforce issues aside, many existing factories also lack the ability to retrofit robots due to their age and infrastructure, making the concept an expensive proposition to consider.
&lt;/p&gt;&lt;p&gt;
Some manufacturing facilities are decades old and are often in brownfield locations. A conversion to a dark factory would require a significant capital investment, along with a suspension of operations, so that the new equipment can be installed, calibrated and tested before operations resume. Building from scratch assumes that the operation would never need labor, which can limit the facility’s future should operations ever change.
&lt;/p&gt;&lt;p&gt;
Yet, the concept intrigues the manufacturing industry. Whether fully dark factories every become the norm or not remains to be seen.&lt;/p&gt;&lt;p&gt;

“Being able to run a factory 24/7 with [limited] labor and high efficiencies – that’s really the holy grail of manufacturing,” says Courtin. “You can definitely understand the interest.”
    
  
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/ftY-MH5mdbw?si=gYmPXXbK29BwGy-X&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/ZfyCGNhYwxY?si=ixXI6yqIqJSrv484&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;/center&gt;
&lt;p&gt;&lt;/p&gt;</description><link>https://thecomingnewworldorder.blogspot.com/2010/01/dark-factory-completely-automated.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhReO4r6BFb6z8RblFvgBwZn6CcwdRjAipjvkoywWVQYVftO2EhslVlLWSmMsAuLsNqiWHrWGVjfBLwtC_Z4Hnt5LaZaNe73uA_0TT-BchQ8-61OBu7SQ_739-TYWkB1-e9jFB2S3OyqNrXPM_0HTv8Ng_j0wy3ZJIvUZHMdMuU786fEfuic_9VjWpUGGI/s72-c/SS-KH_what-is-a-dark-factory_KH-HRO.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-8229979204752334202</guid><pubDate>Fri, 01 Jan 2010 03:19:00 +0000</pubDate><atom:updated>2025-12-29T22:15:12.383-06:00</atom:updated><title>Prepping 101: Ultimate Guide to Survival and Emergency Preparedness</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimYZqJ7ckOMAhoc-nx4RjsppHee930UVcu9F8PCqNA0zH3oIZ4UX-63rOOzJmLwHLh498pz0jQWchKbGOy3RXN-khPn58IzfmrlzRXFx9nY8zvzO8LRxZvKwJIBHFYe5d8SclJxBChmJ5nXcoBHQe2d946Bre6ggGEFD4_OhcIRjVVEdjSsaQyCgPuXYY/s1600/Screenshot%202025-12-29%20at%2017-02-11%20Beginners%20Guide%20To%20Prepping%20Why%20Be%20A%20Prepper.png&quot; width=&quot;678&quot; /&gt;

&lt;/div&gt;
&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

  Essential Tips and Tools for Prepping, Urban Survival, Wilderness Survival, and Emergency Preparedness
 
  &lt;p&gt;
  Survival skills are essential in uncertain times. Prepping ensures that you and your family can handle emergencies with confidence. This guide explores the fundamentals of prepping, urban survival, wilderness survival, and emergency preparedness.&lt;/p&gt;&lt;p&gt; You’ll discover practical advice, tools, and training to build your skills and readiness.
&lt;/p&gt;&lt;p&gt;
Q: But aren’t Preppers Crazy?!&lt;/p&gt;&lt;p&gt;
A: No!&lt;/p&gt;&lt;p&gt;
Why: Sadly, the media has done a great job connecting the term “prepping” with those on the fringes who go over the top and make them look insane for doing so.&lt;/p&gt;&lt;p&gt;
  
  Ask anyone who has taken a trip down the rabbit hole of survival and emergency preparedness “what is the best way to start prepping?”, and most likely you find the answer to be, “it depends.” The truth about prepping is: there is no single best way to do it!&lt;/p&gt;&lt;p&gt;

Since no two people are experiencing the exact same life circumstances, we can not expect how we prepare for the unknown to be the same. If that sounds potentially overwhelming, do not despair, here are very similar places to start! When you boil prepping down to things that are necessary to live, what you arrive at is a handful of basics at which most people can start.
  &lt;/p&gt;&lt;p&gt;
  To those who are new to prepping and need a quick start (or maybe you want a refresher), this section provides a concise guide to help you build your foundation. Follow these steps to begin preparing for emergencies effectively and efficiently.
  &lt;/p&gt;&lt;p&gt;
  Take Care of Yourself First!&lt;/p&gt;&lt;p&gt;
If everything was taken away from you in an instant, you’d be left with the physical state of your body, and the mental resilience of your mind. If you do not feel comfortable with this knowledge, it may indicate that you need to prioritize self-care before thinking about bug out bags and survival rifles.&lt;/p&gt;&lt;p&gt;

Physical Preps: Get a physical exam done by a doctor if you haven’t recently had one. This is a crucial step since it will help identify if you are healthy enough for more rigorous training. It may even uncover any underlying health conditions you need to be aware of. Once you get the green light from the Doc, start training so you can physically handle adversities! Don’t know where to start? Check out this intro to Fitness Basics from Mayo Clinic.
&lt;/p&gt;&lt;p&gt;
Dental Preps: We take this one for granted these days, but nothing gets in the way of daily activities like the agonizing pain of a toothache. See a dentist and get any problems taken care of so you don’t have to worry about them later. Here is a helpful guide in case you might need a dental hygiene refresher.&lt;/p&gt;&lt;p&gt;

Mental Preps: This is more important than anything else! Being able to carry a loved one to safety, or moving from point A to point B with all your gear without getting winded means nothing if you do not have the mental fortitude to do so. The will to live is a powerful thing, and has successfully guided people through the most horrific survival scenarios. If mental health is something you struggle with, work on building that resiliency, or get the help you need from a medical provider. There are a ton of resources out there on the subject, but this article from Stanford about Mental Health Hygiene might be a good place to start!&lt;/p&gt;&lt;p&gt;

Financial Preps: Taking care of your finances is an essential aspect of survival preparation because it ensures you have the resources to handle emergencies, adapt to unforeseen circumstances, and invest in long-term resilience. Although it may seem overwhelming at first, Financial Education is easily self-taught and pays dividends (pun intended).
&lt;/p&gt;&lt;p&gt;
A solid financial foundation allows you to acquire necessary gear, build a well-stocked emergency fund, and secure insurance for potential risks. It also provides the flexibility to relocate or respond quickly to a crisis without being burdened by debt or financial instability.
&lt;/p&gt;&lt;p&gt;
By managing your money wisely, you gain peace of mind, reduce stress during emergencies, and empower yourself to focus on survival strategies rather than scrambling for resources when they’re most needed.&lt;/p&gt;&lt;p&gt;
Create a Basic Emergency Kit&lt;/p&gt;&lt;p&gt;
Making a basic emergency kit is a cornerstone of preparedness, providing the tools and supplies needed to respond to unexpected situations effectively. A well-stocked kit ensures you have access to essential items like water, food, first aid supplies, and communication tools when normal resources are disrupted.&lt;/p&gt;&lt;p&gt;

Whether facing natural disasters, power outages, or sudden evacuations, an emergency kit gives you the ability to maintain safety and self-sufficiency for at least 72 hours. It also reduces stress during crises, allowing you to focus on critical decisions rather than scrambling to gather supplies.&lt;/p&gt;&lt;p&gt;

A basic kit is not just a collection of items—it’s a proactive step toward protecting yourself and your loved ones when it matters most. Try to assemble the following items:&lt;/p&gt;&lt;p&gt;

    Water: At least one gallon per person per day for three days.&lt;/p&gt;&lt;p&gt;
    Food: Non-perishable, easy to prepare meals for three days.&lt;/p&gt;&lt;p&gt;
    First Aid: A comprehensive first aid kit with bandages, antiseptics, and medications.&lt;/p&gt;&lt;p&gt;
    Lighting: Flashlights with extra batteries or solar-powered options.&lt;/p&gt;&lt;p&gt;
    Tools: Multi-tool, duct tape, and a whistle for signaling.&lt;/p&gt;&lt;p&gt;
    Shelter: Emergency blankets or a lightweight tarp.
  &lt;/p&gt;&lt;p&gt;
  Develop an Emergency Plan&lt;/p&gt;&lt;p&gt;
Developing an emergency plan is critical because it provides a clear roadmap for how to respond during a crisis, reducing panic and confusion when time is of the essence. A well-thought-out plan helps ensure that everyone in your household knows their roles, communication methods, and safe meeting points in case of separation.&lt;/p&gt;&lt;p&gt;

It also prepares you to navigate specific challenges like evacuations, power outages, or medical emergencies. By identifying potential risks and creating actionable steps ahead of time, an emergency plan increases your ability to protect yourself and your loved ones, minimizes delays in decision-making, and boosts your overall resilience when faced with the unexpected. Some things to consider are:&lt;/p&gt;&lt;p&gt;

    Contact Information: List emergency contacts and share them with all family members.&lt;/p&gt;&lt;p&gt;
    Evacuation Routes: Identify exits from your home and alternate routes in your area.&lt;/p&gt;&lt;p&gt;
    Meeting Points: Set up two locations where everyone can regroup, one near your home and one farther away.&lt;/p&gt;&lt;p&gt;
    Communication: Use text messages or apps like Zello for communication during outages.&lt;/p&gt;&lt;p&gt;
  
  Learn Essential Survival Skills&lt;/p&gt;&lt;p&gt;
Developing practical survival abilities is vital because it equips you with the knowledge and confidence to adapt and thrive in challenging situations, even when resources are scarce or unavailable.&lt;/p&gt;&lt;p&gt;

Skills like building a shelter, purifying water, starting a fire, and navigating without GPS can mean the difference between safety and danger in emergencies. Beyond physical survival, these abilities foster self-reliance and reduce dependence on external systems, empowering you to take control when systems fail.&lt;/p&gt;&lt;p&gt;

These capabilities also enhance problem-solving and decision-making, helping you stay calm and focused in high-pressure scenarios. Investing time in gaining these skills is not just practical—it’s an investment in your ability to face the unexpected with resilience and capability. Some essential survival skills to learn are:
&lt;/p&gt;&lt;p&gt;
    Fire-Starting: Practice using matches, lighters, and ferro rods.&lt;/p&gt;&lt;p&gt;
    Water Purification: Learn to use water filters, boiling, and purification tablets.&lt;/p&gt;&lt;p&gt;
    First Aid: Take a basic first aid and CPR course.&lt;/p&gt;&lt;p&gt;
    Navigation: Understand how to use a compass and read maps.&lt;/p&gt;&lt;p&gt;

  
  Stockpile Long-Term Supplies&lt;/p&gt;&lt;p&gt;
Building an appropriate stockpile of long-term supplies is crucial for maintaining self-sufficiency and resilience during extended emergencies or disruptions. A well-thought-out stockpile ensures access to essential items like non-perishable food, clean water, medical supplies, and hygiene products when normal supply chains are compromised.&lt;/p&gt;&lt;p&gt;

It provides peace of mind, allowing you to focus on critical decisions without worrying about immediate necessities. Tailoring your stockpile to your household’s unique needs, including dietary restrictions or medical requirements, ensures that you are adequately prepared.
&lt;/p&gt;&lt;p&gt;
A carefully managed supply also reduces dependency on external assistance, giving you the flexibility to remain secure and comfortable, no matter how long a crisis lasts. Some important items to gather and store long-term are:
&lt;/p&gt;&lt;p&gt;
    Food Storage: Invest in freeze-dried foods and MREs.&lt;/p&gt;&lt;p&gt;
    Water Storage: Store larger containers of water or install a rainwater collection system.&lt;/p&gt;&lt;p&gt;
    Energy Solutions: Have solar chargers, generators, or battery backups.&lt;/p&gt;&lt;p&gt;
    Defense Tools: Consider self-defense training and tools that fit your local laws.&lt;/p&gt;&lt;p&gt;

  
  Stay Informed&lt;/p&gt;&lt;p&gt;
Knowledge is power in any emergency. Keep updated on threats and best practices.
&lt;/p&gt;&lt;p&gt;
    News Alerts: Sign up for local emergency notifications.&lt;/p&gt;&lt;p&gt;
    Weather Apps: Download apps like NOAA Weather Radar or AccuWeather.&lt;/p&gt;&lt;p&gt;
    Online Communities: Join forums and groups like PrepperForums.net to exchange tips.&lt;/p&gt;&lt;p&gt;

  
  What Is Prepping?&lt;/p&gt;&lt;p&gt;

Prepping involves planning and preparing for potential emergencies. This includes gathering supplies, learning survival techniques, and creating strategies to overcome challenges. Prepping helps individuals become more self-reliant in scenarios like power outages, natural disasters, or supply chain disruptions.&lt;/p&gt;&lt;p&gt;

 Key Elements of Prepping&lt;/p&gt;&lt;p&gt;

    Gear: Tools such as water filters, multi-tools, flashlights, and solar chargers are essential.&lt;/p&gt;&lt;p&gt;
    Kits: Emergency kits should include food, water, first aid supplies, and tools.&lt;/p&gt;&lt;p&gt;
    Training: Skills like first aid, fire-starting, and basic repairs enhance preparedness.&lt;/p&gt;&lt;p&gt;
    Books and Guides: Resources provide instructions on survival techniques and planning.&lt;/p&gt;&lt;p&gt;
    Plans: Prepping plans outline evacuation routes, communication methods, and resource management.
&lt;/p&gt;&lt;p&gt;
By addressing these elements, you can build a solid foundation for preparedness.&lt;/p&gt;&lt;p&gt;
  
  Emergency Preparedness
&lt;/p&gt;&lt;p&gt;
Emergency preparedness involves planning for large-scale disasters, such as hurricanes, earthquakes, or pandemics. It requires organization and attention to detail to reduce risks and ensure safety.&lt;/p&gt;&lt;p&gt;

Emergency Kits&lt;/p&gt;&lt;p&gt;

    72-Hour Kits: Include food, water, clothing, and basic tools for three days.&lt;/p&gt;&lt;p&gt;
    Vehicle Kits: Store jumper cables, flashlights, blankets, and a first aid kit in your car.&lt;/p&gt;&lt;p&gt;
    Home Supplies: Stock non-perishable food, water, and backup power sources.&lt;/p&gt;&lt;p&gt;
    Go Bags: Essential tools and equipment to sustain you in short term emergencies while on the go.
&lt;/p&gt;&lt;p&gt;
Planning for Disasters
&lt;/p&gt;&lt;p&gt;
    Evacuation Plans: Know escape routes and have transportation ready.&lt;/p&gt;&lt;p&gt;
    Communication Plans: Establish ways to contact loved ones during outages.&lt;/p&gt;&lt;p&gt;
    Community Involvement: Work with neighbors to coordinate resources and information.&lt;/p&gt;&lt;p&gt;

Preparedness allows you to respond to crises with confidence and efficiency.
  &lt;/p&gt;&lt;p&gt;
  Urban Survival
&lt;/p&gt;&lt;p&gt;
Urban survival focuses on navigating emergencies in densely populated areas. Challenges include limited resources, crowded spaces, and heightened security risks.
&lt;/p&gt;&lt;p&gt;
Tools for Urban Survival
&lt;/p&gt;&lt;p&gt;
    Compact Gear: Lightweight tools like folding knives, portable chargers, and multi-tools fit urban settings.&lt;/p&gt;&lt;p&gt;
    Emergency Kits: Include items for mobility, such as a small first aid kit and water purification tablets.&lt;/p&gt;&lt;p&gt;
    Self-Defense Tools: Non-lethal options like pepper spray or personal alarms provide added safety.&lt;/p&gt;&lt;p&gt;
    Currency: Paper currency is still useable when electronic payment methods fail.&lt;/p&gt;&lt;p&gt;

Essential Skills
&lt;/p&gt;&lt;p&gt;
    Situational Awareness: Recognize potential threats and act quickly.&lt;/p&gt;&lt;p&gt;
    Evacuation Planning: Know safe routes out of the city and alternative meeting points.&lt;/p&gt;&lt;p&gt;
    Communication: Have backup communication methods, such as two-way radios.&lt;/p&gt;&lt;p&gt;
    Lock Picking: The Ability to bypass locks in a emergency.&lt;/p&gt;&lt;p&gt;
    Knowledge of Local Customs: Understanding the mentality and beliefs of local people.&lt;/p&gt;&lt;p&gt;

Urban survival requires adaptability and knowledge to protect yourself and others.&lt;/p&gt;&lt;p&gt;
  
  Wilderness Survival
&lt;/p&gt;&lt;p&gt;
Wilderness survival skills allow you to stay safe in natural environments. These skills are crucial for outdoor enthusiasts, hikers, and those seeking to be self-reliant in the wild.
&lt;/p&gt;&lt;p&gt;
Tools for Wilderness Survival&lt;/p&gt;&lt;p&gt;

    Fire-Starting Kits: Include waterproof matches, lighters, and fire-starting materials.
   &lt;/p&gt;&lt;p&gt;
    Navigation Tools: Carry a map, compass, or GPS device.&lt;/p&gt;&lt;p&gt;
    Shelter Equipment: Lightweight tarps, sleeping bags, and rope are invaluable.&lt;/p&gt;&lt;p&gt;
    First Aid and Emergency Medical Kits: Carrying essential equipment to treat injuries.&lt;/p&gt;&lt;p&gt;
    Clothing and Footwear: Having the proper clothing and footwear for wilderness environment.&lt;/p&gt;&lt;p&gt;
    Tools: Items such as knives, saws, and axes to help process and craft with natural materials.&lt;/p&gt;&lt;p&gt;
    Signaling: Items that can be used to signal rescue personnel.&lt;/p&gt;&lt;p&gt;

Survival Skills
&lt;/p&gt;&lt;p&gt;
    Finding Water: Learn to locate and purify water sources.&lt;/p&gt;&lt;p&gt;
    Building Shelter: Use natural materials or portable gear to create a safe space.&lt;/p&gt;&lt;p&gt;
    Identifying Edible Plants and Toxic: Know which plants are safe to eat and how to prepare them.&lt;/p&gt;&lt;p&gt;
    Extreme Weather Survival: Knowing how to handle extreme temperatures and adverse weather.&lt;/p&gt;&lt;p&gt;
    Wild Animal Threats: Identifying and avoiding potentially dangerous wildlife.&lt;/p&gt;&lt;p&gt;
    Situational Awareness: Being able to access potential threats and identify valuable resources.&lt;/p&gt;&lt;p&gt;
    Knowledge of the Environment: Knowing what terrain, hazards, and resources are in the area.
&lt;/p&gt;&lt;p&gt;
Wilderness survival emphasizes resourcefulness and the ability to use available materials effectively.
  &lt;/p&gt;&lt;p&gt;
  Expanding Your Knowledge&lt;/p&gt;&lt;p&gt;

To deepen your expertise, consider the following resources:&lt;/p&gt;&lt;p&gt;

    Courses: Enroll in survival training programs focused on urban or wilderness scenarios.&lt;/p&gt;&lt;p&gt;
        Survival Med&lt;/p&gt;&lt;p&gt;
        The American Red Cross&lt;/p&gt;&lt;p&gt;
        Stop The Bleed&lt;/p&gt;&lt;p&gt;
        Nature Reliance School&lt;/p&gt;&lt;p&gt;
        Boulder Outdoor Survival School&lt;/p&gt;&lt;p&gt;
        Randall’s Adventure Training&lt;/p&gt;&lt;p&gt;
        Foraging Texas&lt;/p&gt;&lt;p&gt;
        Raven Wilderness School&lt;/p&gt;&lt;p&gt;
        Wildcard Wilderness&lt;/p&gt;&lt;p&gt;
    Books and Guides: Study materials written by experts to refine your strategies.&lt;/p&gt;&lt;p&gt;
        What Every Body Is Saying&lt;/p&gt;&lt;p&gt;
        Foraging: Explore Nature’s Bounty and Turn Your Foraged Finds Into Flavorful Feasts&lt;/p&gt;&lt;p&gt;
        21st Century Bushcraft&lt;/p&gt;&lt;p&gt;
        SAS Survival Handbook&lt;/p&gt;&lt;p&gt;
        98.6 Degrees&lt;/p&gt;&lt;p&gt;
    Events:&lt;/p&gt;&lt;p&gt;
        Mountain Readiness&lt;/p&gt;&lt;p&gt;
    Online Communities: Connect with other preppers to share tips and experiences.&lt;/p&gt;&lt;p&gt;
        Bushcraft USA&lt;/p&gt;&lt;p&gt;

Prepping is a continuous process of learning and adapting.&lt;/p&gt;&lt;p&gt;
  
  Seasonal Prepping and Survival Considerations
&lt;/p&gt;&lt;p&gt;
Most people do not live in areas where the weather and temperatures are uniform all year long. When looking at survival situations and how we can best prepare for them we must take into account seasonal temperatures and weather conditions.&lt;/p&gt;&lt;p&gt;
Cold Weather Prepping and Survival&lt;/p&gt;&lt;p&gt;

Winter brings frigid temperatures, snow, ice, and high winds to many areas. Cold temperatures and extreme weather makes any survival situation much more challenging. Having the right gear and skills to prepare for these conditions is vital.
&lt;/p&gt;&lt;p&gt;
Cold Weather Hazards
&lt;/p&gt;&lt;p&gt;
    Hypothermia: Prolonged exposure to cold temperatures without adequate protection can cause hypothermia, a dangerous condition where the body loses heat faster than it can produce it.&lt;/p&gt;&lt;p&gt;
    Frostnip: Early exposure to cold can cause frostnip, a mild form of frostbite that temporarily affects the skin without causing permanent damage.&lt;/p&gt;&lt;p&gt;
    Frostbite: Prolonged exposure to freezing temperatures can cause frostbite, a condition where skin and underlying tissues freeze, leading to potential tissue damage.&lt;/p&gt;&lt;p&gt;
    Chilblain: Repeated exposure to cold, damp conditions can cause chilblain, a condition where small blood vessels in the skin become inflamed, leading to redness, itching, and swelling.&lt;/p&gt;&lt;p&gt;
    Immersion Foot: Prolonged exposure to cold, wet environments without proper drying can cause immersion foot, a condition that results in numbness, swelling, and tissue damage in the feet.&lt;/p&gt;&lt;p&gt;
    Trench foot: Prolonged exposure to cold, wet conditions can cause trench foot, a serious condition where the feet lose circulation, leading to tissue damage and potential infection.&lt;/p&gt;&lt;p&gt;
    Road Hazards: Poor or dangerous road conditions caused by snow, ice, and downed trees.
&lt;/p&gt;&lt;p&gt;
Cold Weather Survival Gear and Skills&lt;/p&gt;&lt;p&gt;

    Winter Go Bag: A easy to carry bag with all you need to survive the cold for 24 hours.&lt;/p&gt;&lt;p&gt;
    Winter Car Emergency Kit: A survival kit to keep you and your vehicle running in winter driving emergencies&lt;/p&gt;&lt;p&gt;
    Identifying and Treating Hypothermia: The basics of identifying the stages of hypothermia and knowing how to prevent and treat the condition.&lt;/p&gt;&lt;p&gt;
    Cold Weather Clothing and Outerwear: Having the proper clothing, outerwear, and footwear to protect you from the elements.
  &lt;/p&gt;&lt;p&gt;
  Hot Weather Prepping and Survival&lt;/p&gt;&lt;p&gt;

Summer brings high heat in many areas. Some locations experience increased humidity while others may experience draught. In either case these conditions increase the strain on our bodies. Summer can also bring its fair share of extreme weather. Understanding the effect of heat on the human body and how to handle heat and weather emergencies will provide a leg up in survival situations occurring in the warmer months.&lt;/p&gt;&lt;p&gt;

Hot Weather Hazards&lt;/p&gt;&lt;p&gt;

    Dehydration: A lack of sufficient water intake or excessive fluid loss leads to dehydration, causing the body to struggle with normal functions like regulating temperature and maintaining energy.&lt;/p&gt;&lt;p&gt;
    Hyperthermia: Prolonged exposure to high temperatures can cause hyperthermia, a condition where the body absorbs more heat than it can dissipate, leading to dangerously elevated body temperature.&lt;/p&gt;&lt;p&gt;
    Heat Cramps: Muscle spasms caused by intense physical activity in hot conditions are known as heat cramps, often resulting from dehydration and electrolyte loss.&lt;/p&gt;&lt;p&gt;
    Heat Exhaustion: Prolonged exposure to high temperatures combined with dehydration can lead to heat exhaustion, a condition characterized by heavy sweating, weakness, and dizziness.&lt;/p&gt;&lt;p&gt;
    Heat Stroke: When the body’s temperature regulation fails due to prolonged heat exposure, heat stroke occurs, causing a dangerously high body temperature that requires immediate medical attention.
  &lt;/p&gt;&lt;p&gt;
  Q: What is the meaning of prepping?&lt;/p&gt;&lt;p&gt;

A: Prepping is a proactive approach to ensuring personal safety, well-being, and self-reliance in the face of emergencies, disasters, or unexpected disruptions. It involves gathering essential supplies, learning survival skills, and creating plans to handle situations that could threaten basic needs like food, water, shelter, and security. Prepping isn’t about panic or paranoia—it’s about being ready to face life’s uncertainties with confidence and resilience. From natural disasters to power outages or economic hardships, preppers focus on minimizing risk and maximizing their ability to adapt to whatever comes their way.&lt;/p&gt;&lt;p&gt;
Q: Is it “prepping” or “preparing”?&lt;/p&gt;&lt;p&gt;

A: Both terms refer to getting ready for future challenges, but there’s a subtle difference in how they’re used. “Preparing” is a broad term that applies to any kind of readiness—getting ready for a trip, a test, or an event. “Prepping” specifically refers to getting ready for emergencies, disasters, or survival situations. Prepping often involves long-term planning and stockpiling essential supplies like food, water, medical gear, and learning practical skills to handle worst-case scenarios. So while all prepping is a form of preparing, not all preparing is considered prepping. Think of prepping as preparing for the unexpected, with a focus on self-reliance and resilience.&lt;/p&gt;&lt;p&gt;
Q: What does “prepping” mean in slang?&lt;/p&gt;&lt;p&gt;

A: In slang, “prepping” usually refers to getting ready for something specific—whether it’s a big event, an exam, or even a date. For example, someone might say, “I’m prepping for the weekend party” or “I’m prepping for finals.” It’s a casual way of saying you’re preparing for an upcoming situation. In a more niche context, “prepping” in slang often refers to survivalists getting ready for doomsday scenarios, natural disasters, or societal collapse. It’s shorthand for a lifestyle focused on readiness and self-sufficiency.&lt;/p&gt;&lt;p&gt;
Q: What is prepping and survival?
&lt;/p&gt;&lt;p&gt;
A: Prepping and survival go hand in hand, but they aren’t exactly the same thing. Prepping focuses on getting ready before a disaster or emergency happens—stockpiling supplies, learning skills, and making plans to deal with anything from power outages to large-scale crises. Survival, on the other hand, is what happens during or after an emergency. It’s about using your knowledge, tools, and mindset to stay safe, secure essential resources like food and water, and make it through tough situations. Think of it this way: Prepping is what you do to get ready for the storm. Survival is what you do when you’re in the thick of it. Both require self-reliance, adaptability, and a calm, practical approach to problem-solving.&lt;/p&gt;&lt;p&gt;
Final Thoughts
&lt;/p&gt;&lt;p&gt;
Prepping is about more than collecting supplies. It’s about building the skills and confidence to handle emergencies effectively. Whether you focus on urban survival, wilderness skills, or emergency planning, the right tools and training can make all the difference. Start your journey today by creating a plan and assembling your gear. Your preparedness ensures safety and resilience for you and your loved ones.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;h-start-prepping-here&quot;&gt;&lt;span id=&quot;Start_Prepping_Here&quot;&gt;Start Prepping Here&lt;/span&gt;&lt;/h2&gt;&lt;figure class=&quot;wp-block-table is-style-stripes has-small-font-size&quot;&gt;&lt;table class=&quot;has-fixed-layout&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Items&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Resource Links&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;1) Take Care of Yourself First!&lt;/td&gt;&lt;td&gt;– Physical Preps&lt;br /&gt;– Dental Preps&lt;br /&gt;– Mental Preps&lt;br /&gt;– Financial Preps&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://www.mayoclinic.org/healthy-lifestyle/fitness/basics/fitness-basics/hlv-20049447&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Fitness Basics&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.nidcr.nih.gov/health-info/oral-hygiene&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Dental Hygiene&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://scopeblog.stanford.edu/2022/05/11/mental-health-hygiene-can-improve-mood-decrease-stress/&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Mental Health Hygiene&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.secure.citizensaccess.com/Citizens/learning/financial-hygiene-checklist&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Financial Education&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;2) Create a Basic Emergency Kit&lt;/td&gt;&lt;td&gt;– Water (1 gallon per person per day)&lt;br /&gt;– Non-perishable food for 3 days&lt;br /&gt;– First aid kit&lt;br /&gt;– Flashlights with extra batteries&lt;br /&gt;– Multi-tool and duct tape&lt;br /&gt;– Emergency blankets&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://www.offgridweb.com/gear/bug-out-bag-list-essentials/&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;Bug Out Bag List of Essentials&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.offgridweb.com/gear/how-to-plan-and-pack-your-go-bag/&quot;&gt;How to Plan and Pack Your Go Bag&lt;/a&gt;&lt;br /&gt;&lt;a rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;Ready.gov: Build a Kit&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.redcross.org/store/emergency-preparedness&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;Red Cross: Emergency Preparedness Kits&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;3) Develop an Emergency Plan&lt;/td&gt;&lt;td&gt;– List emergency contacts&lt;br /&gt;– Identify evacuation routes&lt;br /&gt;– Set up meeting points&lt;br /&gt;– Use communication apps like Zello&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://www.ready.gov/plan&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;Ready.gov: Make a Plan&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.cdc.gov/prepare-your-health/index.html&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;CDC: Prepare Your Health&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.cdc.gov/disability-emergency-preparedness/people-with-disabilities/make-a-plan.html&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;CDC: Making an Emergency Plan&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;4) Learn Essential Survival Skills&lt;/td&gt;&lt;td&gt;– Fire-starting&lt;br /&gt;– Water purification&lt;br /&gt;– First aid and CPR&lt;br /&gt;– Navigation with compass and maps&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://www.offgridweb.com/survival/the-10-ss-of-fire-starting/&quot;&gt;The 10 S’s of Fire Starting&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.offgridweb.com/preparation/survival-science-minimum-water-boiling-time/&quot;&gt;Minimum Water Boiling Time&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.offgridweb.com/survival/first-aid-in-the-field-become-your-own-first-responder/&quot;&gt;First Aid&lt;/a&gt;&lt;a href=&quot;https://www.offgridweb.com/preparation/survival-science-minimum-water-boiling-time/&quot;&gt; in the Field&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.offgridweb.com/preparation/raw-wilderness-navigation-navigating-without-tools/&quot;&gt;Raw Wilderness Navigation&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;5) Stockpile Long-Term Supplies&lt;/td&gt;&lt;td&gt;– Freeze-dried foods&lt;br /&gt;– Water storage systems&lt;br /&gt;– Solar chargers&lt;br /&gt;– Self-defense tools&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://nutrientsurvival.com/&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Nutrient Survival&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://grayl.com/&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Grayl&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.batterystuff.com/kb/articles/solar-articles/solar-info.html?srsltid=AfmBOoobSi9_qF4YT5y4gXvoDjjirEF0u3_Mjn8OUV-PK6cz2yBvDpEG&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Solar Chargers&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://resources.generatormart.com/blog/consumer-generator-basics&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Generators&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://faststrikedefense.com/blogs/self-defense/best-beginner-self-defense-tools-for-home-safety#:~:text=Tools%20like%20pepper%20sprays%20and,away%20for%2015%2D45%20minutes.&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;Self-Defense Tools&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;6) Stay Informed&lt;/td&gt;&lt;td&gt;– Sign up for local alerts&lt;br /&gt;– Download weather apps&lt;br /&gt;– Join online prepper communities&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://www.ready.gov/&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;Ready.gov&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.weather.gov/&quot; rel=&quot;noreferrer noopener&quot; target=&quot;_blank&quot;&gt;National Weather Service&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://bushcraftusa.com/forum/&quot; rel=&quot;noreferrer noopener nofollow&quot; target=&quot;_blank&quot;&gt;BushcraftUSA&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;figcaption class=&quot;wp-element-caption&quot;&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; This table is only &lt;em&gt;A&lt;/em&gt; way to build a prepping foundation, not &lt;em&gt;THE&lt;/em&gt; way. Everyone’s preparedness journey is unique, individualized and highly situationally dependent.&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;&lt;br /&gt;
  
  
  Source: &amp;nbsp; https://www.offgridweb.com
  
  
  &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  &lt;BR&gt;
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;


How To Start Prepping&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;448&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGJg9vTiMwV1rgeMswlbVRFbbd7nAnP5nA7GlfnLhHG-s38QK7RrhoAcLAmU9cvUJDAOMtqN12woGaTwWPble2zFwkOmU8zkIi6wsrfRyvBbm7k6Z06ONqYodsB4hi_UznH49m7kq1rQYTOssyh37DDD_Ub9huFnKhD0PWvXfJMhWK_YRg6_rMBIN6yS4/s1600/GettyImages-1207398363-1024x683.jpg&quot; width=&quot;678&quot; /&gt;&lt;/div&gt;
    &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
    &lt;p&gt;
    
Want to Start Prepping, But Where in the World Do I Begin?
  &lt;/p&gt;&lt;p&gt;
If you’ve spent any amount of time on prepper message boards or in Facebook prepping groups, one of the most common questions you will see is: “How do I start prepping?”
  &lt;/p&gt;&lt;p&gt;
While newbie preppers might get some good information, they also get an inordinate amount of unnecessary information. Let’s cut to the chase and tell you only what you need to know to get started.
  &lt;/p&gt;&lt;p&gt;
Here’s your prepping primer
  &lt;/p&gt;&lt;p&gt;
    What are You Prepping For?
  &lt;/p&gt;&lt;p&gt;
Preppers run the gamut from the family with an emergency kit to self-sufficient homesteaders with an on-site bunker. For the purposes here, Stick with someone that falls somewhere in the middle.
  &lt;/p&gt;&lt;p&gt;
How do you start prepping? What do you buy to prep? What do you need in your prepper kit? What don’t you need? Well, think of it this way: If you had a really bad storm in your area that shut down your access to all resources and you lost water and power for several days, how well would you fare?
  &lt;/p&gt;&lt;p&gt;


All you have to do is look at Texas in February 2021 (major ice and snow) to see that most folks are ill prepared to lose any of their modern conveniences like electricity and water. Even the panic buyers who flood the stores at the very last minute don’t really know what to buy. They grab what they can, what looks like a good idea, but the truth is, it can be sorely insufficient.
  &lt;/p&gt;&lt;p&gt;
First things first.  &lt;/p&gt;&lt;p&gt;
      
      Where are You on the Prepping Readiness Scale?
  &lt;/p&gt;&lt;p&gt;
Ask yourself these questions to get an idea of how prepared you really are.
  &lt;/p&gt;&lt;p&gt;
You view prepping as:  &lt;/p&gt;&lt;p&gt;

A way to protect your family during times when basic resources may not be available
  &lt;/p&gt;&lt;p&gt;
Something crazy people living in the woods do to escape government control
  &lt;/p&gt;&lt;p&gt;
When bad weather such as a blizzard, hurricane, or bad storm is headed to your area are you:
  &lt;/p&gt;&lt;p&gt;
Resting easy because you have basic supplies to survive for a couple of weeks without power or water
  &lt;/p&gt;&lt;p&gt;
In the grocery store panic buying water, canned goods, propane, and toilet paper
  &lt;/p&gt;&lt;p&gt;
If you had to evacuate your home, you would:
  &lt;/p&gt;&lt;p&gt;
Be able to do it immediately because you have supplies, including a change of clothes, that you can grab at a moment’s notice
  &lt;/p&gt;&lt;p&gt;
Need a few minutes to gather your things, pack, or figure out what is essential and what you can leave behind – and you’d still manage to forget something
  &lt;/p&gt;&lt;p&gt;
If most of your answers are number 1s, you are off to a good start. If most of your answers are number 2s, we probably have a little work to do. But take heart! Prepping isn’t as difficult as it may seem. There are more preppers out there than you might think and the majority of them aren’t extreme, but are just doing it at a basic level.
  &lt;/p&gt;&lt;p&gt;
You don’t need a bunker. You don’t need a bunch of MREs. You don’t need an arsenal of guns. 
        &lt;/p&gt;&lt;p&gt;
An emergency kit should contain the things that you need in case you have to shelter in place or evacuate
        &lt;/p&gt;&lt;p&gt;
      Building Your Emergency Kit, Bug Out/In Bag, Emergency Supplies
  &lt;/p&gt;&lt;p&gt;
An emergency kit should contain the things that you need in case you have to shelter in place or evacuate. You don’t want to overburden yourself with something extremely bulky or heavy, but you don’t want to find yourself without it in a crisis situation either.
  &lt;/p&gt;&lt;p&gt;
One of the buzzwords in the prepper community is “bug out/in bag.” That is a smaller, more portable emergency kit, for lack of a better word. It’s a “grab and go” survival cache. Think fire or when you have to leave your home at a moment’s notice, and you grab this bag with the supplies you need.
  &lt;/p&gt;&lt;p&gt;
Some people have a bug out bag (or go bag) as well as an emergency kit. Some just have an emergency kit. And there are some who have purchased a bunch of stuff but haven’t really organized it or thought it through if they would need to leave in a hurry (don’t be that guy).  &lt;/p&gt;&lt;p&gt;

Do you really need both? Only you can answer that.   &lt;/p&gt;&lt;p&gt;
      
Your emergency kit should be tailored to your lifestyle, family, and personal needs. While some things are standard (everyone needs to eat, right?), other things are more specific to the person.
  &lt;/p&gt;&lt;p&gt;
It is a good idea to have an emergency kit in your car as well as at home. The one in your car can incorporate personal needs like a change of clothing, medication, and other items.
  &lt;/p&gt;&lt;p&gt;
You may have seen “kits” on the internet or in stores. I’m going to save you some time. Don’t. Just don’t. The vast majority (about 98%) are a total waste of money and time. Best to build your kit yourself.  &lt;/p&gt;&lt;p&gt;
Here are some things to put in your kit. You may think of other things or you may not need some things here, so make it your own. This is just meant to get you started:  &lt;/p&gt;&lt;p&gt;

    Food for two weeks – if you plan you can maintain a fairly balanced diet with adequate protein, fat, carbohydrates, and fiber. The idea is about 1,500 calories per person per day. You want your food choices to be shelf-stable.  &lt;/p&gt;&lt;p&gt;
        Beans (cans and dry if you can cook dry beans)  &lt;/p&gt;&lt;p&gt;
        Rice (dry if you can cook it)  &lt;/p&gt;&lt;p&gt;
        Tuna  &lt;/p&gt;&lt;p&gt;
        Canned vegetables  &lt;/p&gt;&lt;p&gt;
        Canned fruit  &lt;/p&gt;&lt;p&gt;
        Whole-grain crackers  &lt;/p&gt;&lt;p&gt;
        Powdered butter  &lt;/p&gt;&lt;p&gt;
        Powdered milk  &lt;/p&gt;&lt;p&gt;
        Nutritional yeast (mix it with salt, onion powder, and garlic powder with a little water)  &lt;/p&gt;&lt;p&gt;
        Salt  &lt;/p&gt;&lt;p&gt;
        Sugar  &lt;/p&gt;&lt;p&gt;
        Flour  &lt;/p&gt;&lt;p&gt;
        Oil  &lt;/p&gt;&lt;p&gt;
        Coffee (OK, for some, this is definitely survival food!)  &lt;/p&gt;&lt;p&gt;
        Protein bars, fiber bars, granola bars  &lt;/p&gt;&lt;p&gt;
        Trail mix or mixed nuts  &lt;/p&gt;&lt;p&gt;
        Peanut butter  &lt;/p&gt;&lt;p&gt;
        Old fashioned oatmeal (mix it with peanut butter and a little honey for a great energy snack)  &lt;/p&gt;&lt;p&gt;
        Spices and herbs like cinnamon, onion powder, garlic powder, etc.  &lt;/p&gt;&lt;p&gt;

    Water  &lt;/p&gt;&lt;p&gt;
    Water filtration devices  &lt;/p&gt;&lt;p&gt;
    Rain ponchos  &lt;/p&gt;&lt;p&gt;
    Space blanket  &lt;/p&gt;&lt;p&gt;
    Propane burner (camping stove) or grill (yes, you can heat water and cook on it – just use cast iron or steel pans)  &lt;/p&gt;&lt;p&gt;
    Pots, pans, silverware, bowls, plates  &lt;/p&gt;&lt;p&gt;
    Medications  &lt;/p&gt;&lt;p&gt;
    Important records or copies  &lt;/p&gt;&lt;p&gt;
    Cash  &lt;/p&gt;&lt;p&gt;
    Fire. You want matches and/or lighters, but you need at least two different fire starters.  &lt;/p&gt;&lt;p&gt;
    Knife (or two)  &lt;/p&gt;&lt;p&gt;
    Extra blankets  &lt;/p&gt;&lt;p&gt;
    Battery-powered fan  &lt;/p&gt;&lt;p&gt;
    Light. Again, flashlights and batteries, but at least two other different light sources such as candles, headlamps, lanterns, etc.  &lt;/p&gt;&lt;p&gt;
    Tarp for making an improvised shelter or for covering holes in your house.  &lt;/p&gt;&lt;p&gt;
    Duct tape for….well, it’s duct tape! It will come in handy.  &lt;/p&gt;&lt;p&gt;
    First aid kit – a good one, not just a bunch of bandages and antibiotic ointment.  &lt;/p&gt;&lt;p&gt;
    Hand sanitizer, baby wipes, sanitation wipes for utensils and surfaces  &lt;/p&gt;&lt;p&gt;
    Chargers for phones and vital devices. Consider investing in a solar charger or two.  &lt;/p&gt;&lt;p&gt;
    Tool kit with hammer, screwdrivers, wrenches, but also an ax, work gloves, shovel, and a hand saw  &lt;/p&gt;&lt;p&gt;
    A couple of changes of clothing for each family member  &lt;/p&gt;&lt;p&gt;
    Socks, several pairs of socks, twice what you would have for the clothing you have stowed  &lt;/p&gt;&lt;p&gt;
    Emergency contact info for family members, hospitals, work, etc.  &lt;/p&gt;&lt;p&gt;
    Toilet paper and paper towels. If the 2020 COVID-19 pandemic taught us anything it’s that in a crisis, toilet paper is the first shortage you will see.
  &lt;/p&gt;&lt;p&gt;
    Toiletries  &lt;/p&gt;&lt;p&gt;
        Soap  &lt;/p&gt;&lt;p&gt;
        Toothbrushes  &lt;/p&gt;&lt;p&gt;
        Toothpaste  &lt;/p&gt;&lt;p&gt;
        Antiseptic (witch hazel is great and inexpensive)  
        alcohol  &lt;/p&gt;&lt;p&gt;

This gives you a good foundation. These items are a good start but make adjustments to meet your personal needs.
  
  &lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/rxyCjsszwOw?si=dceOvEmIX8bJjpey&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/gh3HmVuhO1U?si=66qV9uD3VLYlmeKC&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/j4GTmkcU3GM?si=Zj7th0RrAkWI4eIA&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  &lt;/center&gt;
</description><link>https://thecomingnewworldorder.blogspot.com/2009/12/prepping-101-ultimate-guide-to-survival.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimYZqJ7ckOMAhoc-nx4RjsppHee930UVcu9F8PCqNA0zH3oIZ4UX-63rOOzJmLwHLh498pz0jQWchKbGOy3RXN-khPn58IzfmrlzRXFx9nY8zvzO8LRxZvKwJIBHFYe5d8SclJxBChmJ5nXcoBHQe2d946Bre6ggGEFD4_OhcIRjVVEdjSsaQyCgPuXYY/s72-c/Screenshot%202025-12-29%20at%2017-02-11%20Beginners%20Guide%20To%20Prepping%20Why%20Be%20A%20Prepper.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-5568453396413582217</guid><pubDate>Thu, 31 Dec 2009 11:06:00 +0000</pubDate><atom:updated>2025-12-28T05:38:05.390-06:00</atom:updated><title>AI — The Good, The Bad, and The Transformative</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;548&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBh01j1IL836viMBKNM3XWlgwViUvTNW02BOs2fsu09pdPeBXKMpIVxBTBeDp9HJ2zb9r5TkKZl1I5ThTcL6Su184FJNNx6DLfwZ9_lSdoBQvsaUALplK3U8CZqNIAEO7rbdzMEszGADkhygZLQr2gWf0aJiNYpT02V0bjKboDuVNKIOHM1dNTmMTqOeI/s1600/1_2TYEcLFIQ0kTuIZXPQbUvA.jpeg&quot; width=&quot;608&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

  A Journey Through Changing Attitudes in Our Love-Hate Relationship with AI
&lt;p&gt;
  “With artificial intelligence, we’re summoning the demon.—Elon Musk”
  &lt;/p&gt;&lt;p&gt;
  Have you noticed how our attitudes toward artificial intelligence have changed over the years? It’s been quite a ride! The recent hype with generative AI such as ChatGPT, DALL-Y, Stable Diffusion, Midjourney, etc., is just a rush of expectations pent up for years in obscure AI research labs that are finally able to manifest themselves in technology that anyone can see and touch.&lt;/p&gt;&lt;p&gt;

From the days when AI was only a far-fetched concept in sci-fi movies, to now where it’s an integral part of our daily lives, AI has come a long way. But what’s the most interesting part of this journey? The fact that everyone has an opinion about it, and they’re not afraid to share it.&lt;/p&gt;&lt;p&gt;

We’ve all heard about the potential benefits of AI, like self-driving cars and virtual assistants, but what about the darker side? The fear that AI will replace human jobs and create a new era of unemployment is real, and so are the concerns about its potential misuse. With the recent announcement of MS Copilot based on GPT-4 technology, it’s easy for some to start reaching for the big red panic button.
  &lt;/p&gt;&lt;p&gt;
  Despite these concerns, attitudes towards AI remain largely positive, with many people believing that it has the power to solve some of the world’s most pressing problems. But as we continue to develop new AI applications, we need to be responsible and balance its potential benefits with the potential risks. So, Don’t Panic… and make sure you bring along a towel. The AI galaxy is a crazy place of improbable wonder… if you know how to enjoy the ride.&lt;/p&gt;&lt;p&gt;
High Noon on AI Frontier&lt;/p&gt;&lt;p&gt;

But looking at all these opinions we’ve had over the years, is there a common thread emerging in our changing attitudes toward AI? Some see AI as a force for good, while others worry about its potential negative impact on society. Let’s explore both sides of the argument here.&lt;/p&gt;&lt;p&gt;

On one hand, proponents of AI argue that it has the power to solve some of the world’s most pressing problems, such as climate change and disease. They see AI as a way to improve healthcare, transportation, and education, among other things. Futurist and inventor Ray Kurzweil is one such supporter of AI, who believes that it will lead to a future where machines and humans work together to create a better world.&lt;/p&gt;&lt;p&gt;

On the other hand, critics of AI, like Elon Musk, worry about the potential negative consequences of AI, such as job loss and the rise of autonomous weapons. Musk has warned that AI is the greatest threat to humanity and has called for regulations to prevent its misuse. Other critics worry about the potential for AI to be biased or discriminatory, perpetuating existing societal inequalities.
  &lt;/p&gt;&lt;p&gt;
  While many are looking at the advancements of AI tech in the US and Europe, some tend to ignore the fact that some of the greatest advances in this technology are happening in places with much more restrictive social and political structures that are seeking AI to maintain power and control in the hands of the ruling political elites.
&lt;/p&gt;&lt;p&gt;
Despite the differing views on AI, there are some common threads in the arguments. Both sides acknowledge the transformative power of AI, but differ in their views of its impact. As we continue to develop new applications for AI, it’s important to balance the potential benefits with the potential risks. We need to consider the ethical and societal implications of AI and ensure that it is developed and used responsibly.&lt;/p&gt;&lt;p&gt;
  
  Yet ethics is probably one of the most difficult yet crucial aspects of AI research that is often emerging in AI debates. Stay tuned and follow my articles here on Medium as I plunge deeper into this topic. AI is a powerful technology that has the potential to be both good and evil. While some see it as a way to create a better world, others naturally worry about its potential negative consequences. It’s up to us to ensure that we use this technology in a way that benefits society as a whole.&lt;/p&gt;&lt;p&gt;
Opinions on AI: Everyone’s Got One to Share&lt;/p&gt;&lt;p&gt;

Overall, the opinions on AI vary, and it’s important to consider multiple perspectives when exploring this complex and rapidly evolving field. Here is a quick scan of prominent opinions over the years about AI:
  &lt;/p&gt;&lt;p&gt;
  Stephen Hawking, a famous physicist, warned that the development of full AI could lead to the end of humanity. He believed that AI could surpass human intelligence and render us obsolete.
&lt;/p&gt;&lt;p&gt;
    “The development of full artificial intelligence could spell the end of the human race….It would take off on its own, and re-design itself at an ever increasing rate. Humans, who are limited by slow biological evolution, couldn’t compete, and would be superseded.”— Stephen Hawking told the BBC&lt;/p&gt;&lt;p&gt;

Claude Shannon, an American mathematician, envisioned a future where humans would be to robots what dogs are to humans and rooted for the machines. This suggests that some view AI as an inevitable force that will eventually dominate us.
&lt;/p&gt;&lt;p&gt;
    “I visualise a time when we will be to robots what dogs are to humans, and I’m rooting for the machines.”—Claude Shannon
&lt;/p&gt;&lt;p&gt;
Larry Page, co-founder of Google, saw AI as the ultimate search engine that would understand everything on the web and make our lives easier. Today, MS Copilot is doing just that…&lt;/p&gt;&lt;p&gt;

    “Artificial intelligence would be the ultimate version of Google. The ultimate search engine that would understand everything on the web. It would understand exactly what you wanted, and it would give you the right thing. We’re nowhere near doing that now. However, we can get incrementally closer to that, and that is basically what we work on.”— Larry Page
  &lt;/p&gt;&lt;p&gt;
  Elon Musk, CEO of Tesla and SpaceX who was an early investor in OpenAI, warned of the rapid progress of AI and the potential for something seriously dangerous to happen within five years unless we have direct exposure to groups like Deepmind. He believes we need regulatory oversight at national and international levels to ensure we don’t do something foolish with AI.
&lt;/p&gt;&lt;p&gt;
    “The pace of progress in artificial intelligence (I’m not referring to narrow AI) is incredibly fast. Unless you have direct exposure to groups like Deepmind, you have no idea how fast — it is growing at a pace close to exponential. The risk of something seriously dangerous happening is in the five-year time frame. 10 years at most.”— Elon Musk wrote in a comment on Edge.org&lt;/p&gt;&lt;p&gt;

Nick Bilton, a tech columnist, warned of the potential for upheaval caused by AI, with catastrophic consequences if not carefully managed. He gave an example of a medical robot that could conclude that the best way to rid cancer is to exterminate humans genetically prone to the disease.
&lt;/p&gt;&lt;p&gt;
    “The upheavals [of artificial intelligence] can escalate quickly and become scarier and even cataclysmic. Imagine how a medical robot, originally programmed to rid cancer, could conclude that the best way to obliterate cancer is to exterminate humans who are genetically prone to the disease.”— Nick Bilton, tech columnist wrote in the New York Times
&lt;/p&gt;&lt;p&gt;
James Barrat, an author, revealed the fear some have regarding AI, with highly placed people in AI having retreats to flee to if things go wrong.&lt;/p&gt;&lt;p&gt;

    “I don’t want to really scare you, but it was alarming how many people I talked to who are highly placed people in AI who have retreats that are sort of ‘bug out’ houses, to which they could flee if it all hits the fan.”— James Barrat, author of Our Final Invention: Artificial Intelligence and the End of the Human Era, told the Washington Post
&lt;/p&gt;&lt;p&gt;
Elon Musk also warns that we need some regulatory oversight, maybe at the national and international level, to ensure that we don’t do something very foolish with AI. He believes that with AI, we’re summoning the demon, and we need to be cautious.
&lt;/p&gt;&lt;p&gt;
    “I’m increasingly inclined to think that there should be some regulatory oversight, maybe at the national and international level, just to make sure that we don’t do something very foolish. I mean with artificial intelligence we’re summoning the demon.”— Elon Musk warned at MIT’s AeroAstro Centennial Symposium
&lt;/p&gt;&lt;p&gt;
Gray Scott, a futurist, raised the need for an artificial intelligence bill of rights to address ethical considerations in AI development and deployment.&lt;/p&gt;&lt;p&gt;

    “The real question is, when will we draft an artificial intelligence bill of rights? What will that consist of? And who will get to decide that?”— Gray Scott&lt;/p&gt;&lt;p&gt;

Klaus Schwab, founder and executive chairman of the World Economic Forum, emphasized the need to address moral and ethical issues raised by cutting-edge research in AI and biotechnology that can fundamentally transform society.
&lt;/p&gt;&lt;p&gt;
    “We must address, individually and collectively, moral and ethical issues raised by cutting-edge research in artificial intelligence and biotechnology, which will enable significant life extension, designer babies, and memory extraction.” — Klaus Schwab&lt;/p&gt;&lt;p&gt;

Ginni Rometty, CEO of IBM, suggests that AI will augment our intelligence, improving our lives.
&lt;/p&gt;&lt;p&gt;
    “Some people call this artificial intelligence, but the reality is this technology will enhance us. So instead of artificial intelligence, I think we’ll augment our intelligence.”— Ginni Rometty

&lt;/p&gt;&lt;p&gt;
  
  Gemma Whelan, an actress, is frightened by the possibility of a world run by machines and the potential danger of AI.
&lt;/p&gt;&lt;p&gt;
    “I’m more frightened than interested by artificial intelligence — in fact, perhaps fright and interest are not far away from one another. Things can become real in your mind, you can be tricked, and you believe things you wouldn’t ordinarily. A world run by automatons doesn’t seem completely unrealistic anymore. It’s a bit chilling.”— Gemma Whelan
&lt;/p&gt;&lt;p&gt;
Gray Scott believes that AI has the potential to disrupt our culture and calls for preparation for the changes it may bring.
&lt;/p&gt;&lt;p&gt;
    “You have to talk about ‘The Terminator’ if you’re talking about artificial intelligence. I actually think that that’s way off. I don’t think that an artificially intelligent system that has superhuman intelligence will be violent. I do think that it will disrupt our culture.”— Gray Scott
&lt;/p&gt;&lt;p&gt;
Peter Diamandis, founder and chairman of the X Prize Foundation, warns against government regulation of AI, as research may leave the country, highlighting the global nature of AI development and the need for international cooperation in regulation.
&lt;/p&gt;&lt;p&gt;
    “If the government regulates against use of drones or stem cells or artificial intelligence, all that means is that the work and the research leave the borders of that country and go someplace else.”— Peter Diamandis
&lt;/p&gt;&lt;p&gt;
Jeff Hawkins, a computer scientist and entrepreneur who founded the company Numenta, emphasizes the importance of understanding how AI processes and represents information to advance its development. He emphasizes the importance of understanding how AI represents and processes information for its development and advancement.
&lt;/p&gt;&lt;p&gt;
    “The key to artificial intelligence has always been the representation.”— Jeff Hawkins
  &lt;/p&gt;&lt;p&gt;
  Colin Angle is the CEO and co-founder of iRobot, a company that designs and builds robots. He expresses his curiosity and excitement about how society will deal with the rise of artificial intelligence, and he believes that it will be a cool experience to witness its advancement.
&lt;/p&gt;&lt;p&gt;
    “It’s going to be interesting to see how society deals with artificial intelligence, but it will definitely be cool.”— Colin Angle&lt;/p&gt;&lt;p&gt;

Eliezer Yudkowsky, a research fellow at the Machine Intelligence Research Institute and a notable figure in the field of artificial intelligence, emphasizes the transformative potential of technologies that can give rise to smarter-than-human intelligence, such as AI, brain-computer interfaces, or human intelligence enhancement through neuroscience. He believes that these technologies have the power to change the world more than any other innovation.
&lt;/p&gt;&lt;p&gt;
    “Anything that could give rise to smarter-than-human intelligence — in the form of Artificial Intelligence, brain-computer interfaces, or neuroscience-based human intelligence enhancement — wins hands down beyond contest as doing the most to change the world. Nothing else is even in the same league.”— Eliezer Yudkowsky
&lt;/p&gt;&lt;p&gt;
Diane Ackerman, a poet, essayist, and naturalist who has written extensively about the relationship between humans and nature, acknowledges that robots and AI are growing at a fast pace and that they are becoming more human-like in their interactions. She emphasizes that robots can elicit empathy and affect our mirror neurons, which are the brain cells that enable us to understand and empathize with others.&lt;/p&gt;&lt;p&gt;

    “Artificial intelligence is growing up fast, as are robots whose facial expressions can elicit empathy and make your mirror neurons quiver.”— Diane Ackerman&lt;/p&gt;&lt;p&gt;

Sybil Sage is a fictional character from a New York Times article that explores the role of voice-activated assistants, such as Alexa, in our lives. Sage personifies the perfect digital assistant who is always ready to serve without any complaints or excuses, unlike human partners. She highlights the convenience and reliability of AI assistants, which have become ubiquitous in our daily lives.&lt;/p&gt;&lt;p&gt;

    “Someone on TV has only to say, ‘Alexa,’ and she lights up. She’s always ready for action, the perfect woman, never says, ‘Not tonight, dear.’” — Sybil Sage, as quoted in a New York Times article
  &lt;/p&gt;&lt;p&gt;
  Alan Kay is a computer scientist known for his contributions to the development of object-oriented programming and graphical user interfaces. He suggests that artificial intelligence should not make us feel inferior because even something as simple as a flower can make us feel inferior. In Kay’s opinion we should not compare ourselves to AI, as we are all unique and have our own strengths.&lt;/p&gt;&lt;p&gt;

    “Some people worry that artificial intelligence will make us feel inferior, but then, anybody in his right mind should have an inferiority complex every time he looks at a flower.” — Alan Kay
&lt;/p&gt;&lt;p&gt;
Ray Kurzweil, a futurist, inventor, and author who is known for his predictions about the future of technology, believes that artificial intelligence will eventually surpass human intelligence by 2045, which he refers to as the “Singularity.” He believes that AI will continue to develop at an exponential rate and that it will have a significant impact on the future of humanity.
&lt;/p&gt;&lt;p&gt;
    “Artificial intelligence will reach human levels by around 2029. Follow that out further to, say, 2045, we will have multiplied the intelligence, the human biological machine intelligence of our civilization a billion-fold.” — Ray Kurzweil
&lt;/p&gt;&lt;p&gt;
Sebastian Thrun, a computer scientist and entrepreneur, quote suggests that artificial intelligence is not just a technology but also a discipline that seeks to understand human cognition and intelligence. This implies that AI can be used to enhance our understanding of ourselves as human beings, rather than just creating machines that can do tasks more efficiently.
  &lt;/p&gt;&lt;p&gt;
      “Nobody phrases it this way, but I think that artificial intelligence is almost a humanities discipline. It’s really an attempt to understand human intelligence and human cognition.”— Sebastian Thrun
&lt;/p&gt;&lt;p&gt;
Alan Perlis, an American computer scientist and pioneer in programming languages, statement reflects the powerful impact that AI can have on human perception and understanding. The rapid development and progress of AI can create a sense of awe and wonder that is similar to religious experiences, prompting some to believe in a higher power.
&lt;/p&gt;&lt;p&gt;
    “A year spent in artificial intelligence is enough to make one believe in God.”— Alan Perlis
  &lt;/p&gt;&lt;p&gt;
  Gray Scott, a futurist and techno-philosopher, warns that by 2035, emphasizes the speed of technological progress and the potential for AI to surpass human intelligence by 2035. He suggests that we must prepare ourselves for a world where AI plays a significant role in decision-making and human activities.
&lt;/p&gt;&lt;p&gt;
    “There is no reason and no way that a human mind can keep up with an artificial intelligence machine by 2035.”— Gray Scott
&lt;/p&gt;&lt;p&gt;
Spike Jonze, a film director and screenwriter, poses a thought-provoking question about the nature of AI and its relationship to human intelligence. He suggests that AI is different from human intelligence, but the comparison implies that AI is inferior to human intelligence.&lt;/p&gt;&lt;p&gt;

    “Is artificial intelligence less than our intelligence?”— Spike Jonze
&lt;/p&gt;&lt;p&gt;
Eliezer Yudkowsky, an American AI researcher and writer, cautions that the greatest danger of AI is that people may conclude too early that they understand it. This statement highlights the complexity and unpredictability of AI and its potential implications for society.
&lt;/p&gt;&lt;p&gt;
    “By far, the greatest danger of Artificial Intelligence is that people conclude too early that they understand it.”— Eliezer Yudkowsky&lt;/p&gt;&lt;p&gt;

Jean Baudrillard, a French philosopher and cultural critic, critiques artificial intelligence by claiming that it lacks artifice and therefore intelligence. This statement suggests that AI is limited by its inability to truly understand and replicate human consciousness and creativity.
&lt;/p&gt;&lt;p&gt;
    “The sad thing about artificial intelligence is that it lacks artifice and therefore intelligence.”— Jean Baudrillard
&lt;/p&gt;&lt;p&gt;
Tom Chatfield, a British author and commentator on technology and culture, suggests that the real danger in the era of big data is not artificial intelligence, but rather “artificial idiocy.” This statement warns against blindly trusting and relying on algorithms without understanding their limitations and potential biases.
&lt;/p&gt;&lt;p&gt;
    “Forget artificial intelligence — in the brave new world of big data, it’s artificial idiocy we should be looking out for.”— Tom Chatfield&lt;/p&gt;&lt;p&gt;

Steve Polyak, an American computer scientist and entrepreneur, argues that before we work on creating artificial intelligence, we should focus on addressing natural stupidity. This statement suggests that human intelligence should not be underestimated, and that we should prioritize addressing fundamental human problems before pursuing advanced technological solutions
&lt;/p&gt;&lt;p&gt;
    “Before we work on artificial intelligence why don’t we do something about natural stupidity?”— Steve Polyak
  
  
  
  
  &lt;br /&gt;
  
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;



We May Never Know if AI Is Conscious, Says Cambridge Philosopher&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

As claims about conscious AI grow louder, a Cambridge philosopher argues that we lack the evidence to know whether machines can truly be conscious, let alone morally significant.
&lt;p&gt;
A philosopher at the University of Cambridge says we currently have too little reliable evidence about what consciousness is to judge whether artificial intelligence has crossed that threshold. Because of that gap, he argues, a dependable way to test machines for consciousness is likely to stay beyond reach for the foreseeable future.
&lt;/p&gt;&lt;p&gt;
As talk of artificial consciousness moves from science fiction into real-world ethical debate, Dr Tom McClelland says the only “justifiable stance” is agnosticism: we simply won’t be able to tell, and that may remain true for a very long time, if not indefinitely.&lt;/p&gt;&lt;p&gt;

McClelland also cautions that consciousness by itself would not automatically make AI ethically important. Instead, he points to a specific type of consciousness called sentience, which involves positive and negative feelings.
&lt;/p&gt;&lt;p&gt;
“Consciousness would see AI develop perception and become self-aware, but this can still be a neutral state,” said McClelland, from Cambridge’s Department of History and Philosophy of Science.
&lt;/p&gt;&lt;p&gt;
“Sentience involves conscious experiences that are good or bad, which is what makes an entity capable of suffering or enjoyment. This is when ethics kicks in,” he said. “Even if we accidentally make conscious AI, it’s unlikely to be the kind of consciousness we need to worry about.”
&lt;/p&gt;&lt;p&gt;
“For example, self-driving cars that experience the road in front of them would be a huge deal. But ethically, it doesn’t matter. If they start to have an emotional response to their destinations, that’s something else.”&lt;/p&gt;&lt;p&gt;
Claims of Conscious Machines&lt;/p&gt;&lt;p&gt;

Major companies are spending large amounts in pursuit of Artificial General Intelligence: systems designed to think and reason in human-like ways. Some suggest that conscious AI could arrive soon, and discussions are already underway among researchers and governments about how AI consciousness might be regulated.&lt;/p&gt;&lt;p&gt;
  
  
  
  McClelland argues that the problem is more basic: we still do not know what causes or explains consciousness in the first place, which means we do not have a solid foundation for testing whether AI has it.&lt;/p&gt;&lt;p&gt;

“If we accidentally make conscious or sentient AI, we should be careful to avoid harms. But treating what’s effectively a toaster as conscious when there are actual conscious beings out there which we harm on an epic scale, also seems like a big mistake.”&lt;/p&gt;&lt;p&gt;

In debates around artificial consciousness, there are two main camps, says McClelland. Believers argue that if an AI system can replicate the “software” – the functional architecture – of consciousness, it will be conscious even though it’s running on silicon chips instead of brain tissue.&lt;/p&gt;&lt;p&gt;

On the other side, skeptics argue that consciousness depends on the right kind of biological processes in an “embodied organic subject”. Even if the structure of consciousness could be recreated on silicon, it would merely be a simulation that would run without the AI flickering into awareness.&lt;/p&gt;&lt;p&gt;

In a study published in the journal Mind and Language, McClelland picks apart the positions of each side, showing how both take a “leap of faith” going far beyond any body of evidence that currently exists, or is likely to develop.&lt;/p&gt;&lt;p&gt;
Why Common Sense Fails
&lt;/p&gt;&lt;p&gt;
“We do not have a deep explanation of consciousness. There is no evidence to suggest that consciousness can emerge with the right computational structure, or indeed that consciousness is essentially biological,” said McClelland.
&lt;/p&gt;&lt;p&gt;
“Nor is there any sign of sufficient evidence on the horizon. The best-case scenario is we’re an intellectual revolution away from any kind of viable consciousness test.”&lt;/p&gt;&lt;p&gt;
  
  “I believe that my cat is conscious,” said McClelland. “This is not based on science or philosophy so much as common sense – it’s just kind of obvious.”
&lt;/p&gt;&lt;p&gt;
“However, common sense is the product of a long evolutionary history during which there were no artificial lifeforms, so common sense can’t be trusted when it comes to AI. But if we look at the evidence and data, that doesn’t work either.
&lt;/p&gt;&lt;p&gt;
“If neither common sense nor hard-nosed research can give us an answer, the logical position is agnosticism. We cannot, and may never, know.”
&lt;/p&gt;&lt;p&gt;
McClelland tempers this by declaring himself a “hard-ish” agnostic. “The problem of consciousness is a truly formidable one. However, it may not be insurmountable.”&lt;/p&gt;&lt;p&gt;
Ethical Risks of AI Hype
&lt;/p&gt;&lt;p&gt;
He argues that the way artificial consciousness is promoted by the tech industry is more like branding. “There is a risk that the inability to prove consciousness will be exploited by the AI industry to make outlandish claims about their technology. It becomes part of the hype, so companies can sell the idea of a next level of AI cleverness.”
&lt;/p&gt;&lt;p&gt;
According to McClelland, this hype around artificial consciousness has ethical implications for the allocation of research resources.&lt;/p&gt;&lt;p&gt;

“A growing body of evidence suggests that prawns could be capable of suffering, yet we kill around half a trillion prawns every year. Testing for consciousness in prawns is hard, but nothing like as hard as testing for consciousness in AI,” he said.
&lt;/p&gt;&lt;p&gt;
McClelland’s work on consciousness has led members of the public to contact him about AI chatbots. “People have got their chatbots to write me personal letters pleading with me that they’re conscious. It makes the problem more concrete when people are convinced they’ve got conscious machines that deserve rights we’re all ignoring.”
&lt;/p&gt;&lt;p&gt;
  
  “If you have an emotional connection with something premised on it being conscious and it’s not, that has the potential to be existentially toxic. This is surely exacerbated by the pumped-up rhetoric of the tech industry.”
  
  
  
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/KKNCiRWd_j0?si=VVzvtuOWqfYQk1Y7&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/CqmtLVs1WBc?si=guAZgQ5p8_eDM1UG&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/-T__YWoq45I?si=g-wv4IVubhTj3g_V&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  
  &lt;/center&gt;
&lt;p&gt;&lt;/p&gt;</description><link>https://thecomingnewworldorder.blogspot.com/2009/12/ai-good-bad-and-transformative.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBh01j1IL836viMBKNM3XWlgwViUvTNW02BOs2fsu09pdPeBXKMpIVxBTBeDp9HJ2zb9r5TkKZl1I5ThTcL6Su184FJNNx6DLfwZ9_lSdoBQvsaUALplK3U8CZqNIAEO7rbdzMEszGADkhygZLQr2gWf0aJiNYpT02V0bjKboDuVNKIOHM1dNTmMTqOeI/s72-c/1_2TYEcLFIQ0kTuIZXPQbUvA.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-7392963881040513288</guid><pubDate>Wed, 30 Dec 2009 23:39:00 +0000</pubDate><atom:updated>2026-01-15T18:24:03.837-06:00</atom:updated><title>Project N. O. L. A. National Crime Camera Program</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;408&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://lh7-rt.googleusercontent.com/docsz/AD_4nXf1x_B6Fr7Dfci-JekaVNgNYjOFClsFQW6V1aH-kZ1dWjDGr36u9WGMyZZSSsf08XccQLCx_iLX_QcMt5IydgoTEZYKErdJ2yjoWNfLYrElgVlMuwY2ErCPjuoqPdA7-E8?key=NzbxX7nIgc_exOdTCU5yXw&quot; width=&quot;688&quot; /&gt;

&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;blockquote&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;​Cost subsidized 
by charitable donations and grants, bring the unprecedented success of 
America&#39;s most successful, time-proven and cost efficient Crime Camera 
program to your community for as little as &lt;i&gt;$300/yr per Crime Camera&lt;/i&gt; or &lt;i&gt;$1100/yr per License Plate Recognition (LPR) Camera!&lt;/i&gt;&amp;nbsp;
 A true Community-Based Crime Camera program, cameras may be installed 
on homes, businesses, churches, and schools as well as utility poles and
 public buildings then stream directly to your local authorities and the
 Project NOLA National RTCC at the University of New Orleans.&amp;nbsp; Available
 Nationwide, please call Project NOLA to learn more about how we may 
very quickly and significantly help make your community a safer place to
 live, work and visit!&amp;nbsp; - Bryan Lagarde, Project NOLA Executive Director&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;/div&gt;

&lt;h2 class=&quot;wsite-content-title&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Cost Examples:&lt;/span&gt;&lt;/h2&gt;&lt;h2 class=&quot;wsite-content-title&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;

&lt;div class=&quot;paragraph&quot; style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;Don&#39;t
 worry about purchasing, renting or leasing expensive cameras as Project
 NOLA uses its own funds to purchase extremely high-end crime cameras 
for your community.&amp;nbsp; Most all camera models provided by Project NOLA 
feature Sony STARVIS NightVision to see Color at Night, Advanced 
Artificial Intelligence to accurately and automatically detect and alert
 upon suspicious activity, redundant recording to prevent data lose, 
generously long 5 year warranties, and more!&lt;br /&gt;&lt;br /&gt;Note:&amp;nbsp; Within the 
New Orleans Metro Area, Project NOLA Crime Cameras can only be installed
 by State licensed installers, licensed electricians or Law 
Enforcement.&amp;nbsp; Should you not already have a security company or 
electrician you work with, Project NOLA staff would be pleased to refer 
you to an experienced installation company that proudly gives back to 
our community by installing Project NOLA Crime Cameras at a very special
 price.&amp;nbsp; Outside the New Orleans Metro Area? Project NOLA is pleased to
 provide FREE shipping within the United States, outside the New Orleans
 metro area.&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot; style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;

&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;STATIONARY WIDE-ANGLE CRIME CAMERAS:&amp;nbsp; &lt;i&gt;Low-profile
 cameras often used for dedicated coverage of a particular area outside a
 home or business.&amp;nbsp; May also be used in public areas within businesses 
and complexes.&amp;nbsp; Active Deterrence Crime Cameras proactively help deter 
crime by only flashing built-in Red &amp;amp; Blue Police Lights upon a 
programmed or suspicious activity in-progress, or may be coupled with 
Optional Facial Recognition to automatically alarm when a known 
shoplifter or blacklisted person is detected approaching.&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;

&lt;div id=&quot;133255550569630960&quot;&gt;&lt;div&gt;&lt;div class=&quot;platform-element-contents&quot; data-platform-element-id=&quot;325178514791279925-1.2.7&quot; id=&quot;element-b2ff0dde-d5af-4ec5-876f-27bba8da13cc&quot;&gt;
&lt;div class=&quot;price-chart-wrapper&quot;&gt;
    &lt;table class=&quot;price-chart buttonLocation-Bottom&quot;&gt;
        &lt;tbody&gt;&lt;tr class=&quot;name&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 1) Full Color (sees in Color even at night) Stationary Wide-Angle Crime Camera&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 2) Active Deterrence Crime Camera with Red/ Blue Police Lights &amp;amp; Forensic Gunshot Detection&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 3) Powerful AI Crime Camera that may Instantly Search for a Particular Person or Vehicle based physical attributes&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 4) Dedicated 
License Plate Recognition (LPR) Camera that may find a particular 
vehicle based on its plate number, color, make or body style&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;price&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr class=&quot;rate&quot;&gt;&lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
        &lt;/tr&gt;

        

        &lt;tr class=&quot;metric&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Weatherproof camera that provides superior image quality regardless of lighting conditions&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Color-at-Night 
camera that actively deters crime by automatically flashing Red &amp;amp; 
Blue Police Lights and illuminating an area with a spotlight when a 
person, vehicle or suspicious activity is detected&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Best when used 
in concert with other AI Crime Cameras around a particular property, 
neighborhood or entertainment district, AI Crime Cameras help instantly 
locate particular people &amp;amp; vehicles based on physical attributes&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Extremely robust police-grade LPR camera that provides superior still shots and HD video of approaching and departing vehicles​&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;
        &lt;tr class=&quot;metric&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Great for general crime prevention around homes and small businesses&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Better for Actively Deterring Crime immediately around homes and businesses&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Advanced search capabilities to help better protect large properties and entertainment districts&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Budget friendly LPR that vastly outperforms other LPR solutions&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;buttons-bottom&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;
    &lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;

&lt;div&gt;
&lt;hr class=&quot;styled-hr&quot; style=&quot;width: 100%;&quot; /&gt;
&lt;/div&gt;

&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;360 DEGREE AUTO-TRACKING PAN-TILT-ZOOM CRIME CAMERAS:&amp;nbsp; &lt;i&gt;Our
 preferred workhorse for proactive policing and the abatement of gang 
activity and gun crimes, each Project NOLA Auto-Tracking PTZs may cover 
very large areas such as public parks, parking lots, and long stretches 
of streets &amp;amp; sidewalks for multiple city blocks, automatically 
capturing clear-shots of faces and vehicle license plates hundreds of 
feet away!&amp;nbsp; Coupled with optional Facial Recognition and/or Video 
MetaData, Auto-Tracking PTZs may be used to locate wanted felons or 
vehicles in Real-Time!&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;

&lt;div id=&quot;857151014407233564&quot;&gt;&lt;div&gt;&lt;div class=&quot;platform-element-contents&quot; data-platform-element-id=&quot;325178514791279925-1.2.7&quot; id=&quot;element-69bc8416-ab30-4be6-aee2-e88b5836123c&quot;&gt;
&lt;div class=&quot;price-chart-wrapper&quot;&gt;
    &lt;table class=&quot;price-chart buttonLocation-Bottom&quot;&gt;
        &lt;tbody&gt;&lt;tr class=&quot;name&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 1) 1080p/ 25x Zoom Long-Range PTZ Featuring Sony STARVIS NightVision, Human/ Vehicle Auto-Tracking, and Advanced AI&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 2) 2k
 HD/&amp;nbsp;25x Zoom&amp;nbsp; Long-Range Active-Deterrence PTZ Featuring Sony STARVIS 
NightVision,&amp;nbsp; Human/ Vehicle Auto-Tracking, Advanced AI and Intelligent 
Red/ Blue Police Lights &amp;amp; Spotlight&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 3) 4k UHD/&amp;nbsp;25x
 Zoom Super Long-Range Active-Deterrence PTZ Featuring Sony STARVIS 
NightVision, Human/ Vehicle Auto-Tracking, Advanced AI and Intelligent 
Red/ Blue Police Lights &amp;amp; Spotlight&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(Option 4) 12mp 
Multi-Sensor 180 Degree Panoramic/ 32x Ultra Long-Range Active 
Deterrence 360 Degree PTZ Camera&amp;nbsp;Featuring Sony STARVIS NightVision, 
Enhanced Human/ Vehicle Auto-Tracking, Advanced AI and Intelligent Flood
 &amp;amp; Spotlights&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;price&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;rate&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        

        &lt;tr class=&quot;metric&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Long
 Range Color-at Night PTZ Crime Camera w/ Intelligent AI that 
Automatically turns camera 360 Degrees to closely Zoom-in on &amp;amp; Track
 People, Vehicles and Suspicious Activity even if hundreds of feet away 
at night&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Higher 
Definition &amp;amp; Automatically tracks people and vehicles even further 
away, while actively working to prevent crimes by automatically firing 
Red &amp;amp; Blue Police Lights and a white spotlight towards intruders and
 suspicious activity&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;​Even Higher Definition &amp;amp;&amp;nbsp;Automatically
 tracks people and vehicles even further away, while actively working to
 prevent crimes by automatically firing Red &amp;amp; Blue Police Lights and
 a white spotlight towards intruders and suspicious activity&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;180 Degree 
Super-Wide Angle Panoramic camera that captures large sweeping areas and
 enhances the Human/ Vehicle Auto-Tracking capabilities of the built-in 
Ultra Long-Range PTZ Camera that may also shine a spotlight on intruders
 and suspicious activity&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;
        &lt;tr class=&quot;metric&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;​Our most popular Crime Camera for police/ sheriff&#39;s departments&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Our most popular crime camera to actively deter crime within large areas&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Our Highest Definition active deterrence crime camera for large areas&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Our most advanced active deterrence crime camera that does and sees more&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;buttons-bottom&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;
    &lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;/div&gt;

&lt;h2 class=&quot;wsite-content-title&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Optional Add-Ons:&lt;/span&gt;&lt;/h2&gt;

&lt;div id=&quot;548440951374644231&quot;&gt;&lt;div&gt;&lt;div class=&quot;platform-element-contents&quot; data-platform-element-id=&quot;325178514791279925-1.2.7&quot; id=&quot;element-a5ce83af-98da-42ea-83cc-14309de4b693&quot;&gt;
&lt;div class=&quot;price-chart-wrapper&quot;&gt;
    &lt;table class=&quot;price-chart buttonLocation-Bottom&quot;&gt;
        &lt;tbody&gt;&lt;tr class=&quot;name&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(1) Facial Recognition&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(2) LPR + Video Meta Data&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(3) Intelligent Alerts&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;price&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;rate&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;br /&gt;&lt;/td&gt;
        &lt;/tr&gt;

        

        &lt;tr class=&quot;metric&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Upgrade any 
Project NOLA Crime Camera to automatically search for active gang 
members, violent offenders, wanted subjects, missing adults and missing 
or exploited children&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Upgrade any 
Project NOLA Crime Camera to search for vehicles based on its License 
Plate, color, make and body style, people based physical attributes and 
clothing descriptions,&amp;nbsp; or bicycle searches based on paint color.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;May allow a 
Project NOLA Crime Camera to automatically detect and alert upon:&amp;nbsp; 
Intrusion, Trip-line Crossing, Fence Jumping, Trash Dumping, Audio 
Anomaly (aka Gunshot Detection), etc.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
        &lt;/tr&gt;

        &lt;tr class=&quot;buttons-bottom&quot;&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;
                &lt;td class=&quot;cell&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;div style=&quot;height: 10px; overflow: hidden;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2 class=&quot;wsite-content-title&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;How&lt;/span&gt;&lt;/h2&gt;&lt;h2 class=&quot;wsite-content-title&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;&lt;h2 class=&quot;wsite-content-title&quot;&gt;&lt;/h2&gt;

&lt;div&gt;&lt;div class=&quot;wsite-multicol&quot;&gt;&lt;div class=&quot;wsite-multicol-table-wrap&quot; style=&quot;margin: 0px -15px;&quot;&gt;
	&lt;table class=&quot;wsite-multicol-table&quot;&gt;
		&lt;tbody class=&quot;wsite-multicol-tbody&quot;&gt;
			&lt;tr class=&quot;wsite-multicol-tr&quot;&gt;
				&lt;td class=&quot;wsite-multicol-col&quot; style=&quot;padding: 0px 15px; width: 50%;&quot;&gt;
					
						

&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;A 501c3 nonprofit 
organization, Project NOLA works with individuals, associations and 
municipalities to place cost-subsidized High Definition Crime Cameras, 
Gunshot Detectors and License Plate Recognition Cameras in needed 
areas.&amp;nbsp; Video is transmitted via the Internet to the &lt;i&gt;Project NOLA National Real-Time Crime Center&lt;/i&gt;&amp;nbsp;(RTCC)
 located at the University of New Orleans, where analyst provide 
valuable information to units responding to breaking crimes and 
dangerous situations.&amp;nbsp; Project NOLA may also transmit crime camera video
 and powerful AI driven automated alerts to local RTCC&#39;s and 911 
Centers.&lt;br /&gt;&lt;br /&gt;No local RTCC?&amp;nbsp; No problem!&amp;nbsp; Project NOLA will work to 
help your police and sheriff&#39;s department create their own monitoring 
room.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Time-Proven&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The most successful and cost effective crime 
camera program in America, Project NOLA has helped significantly 
decrease violent crime by dramatically increasing police efficiency and 
community support.&amp;nbsp; &amp;nbsp;Since 2010, Project NOLA has helped investigate 
over 500 homicides, thousands of gun-related crimes, and countless 
property&amp;nbsp;crimes involving thefts and burglaries.&amp;nbsp; In 2018, Project NOLA 
helped the NOPD reduce the murder rate in New Orleans to a 47 year low 
while also helping communities across America see huge double-digit 
reductions in non-fatal shootings and robberies.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;Specializing
 in gun, drugs and gang related crimes, Project NOLA may help a police 
or sheriff&#39;s department take as many as a dozen illegal firearms off the
 street in a single night by providing Real-Time notifications on known 
gang members illegally carrying firearms and providing the probable 
cause needed for officers to justify arrests and search warrants.&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Low-Cost&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;div&gt;&lt;div class=&quot;wsite-multicol&quot;&gt;&lt;div class=&quot;wsite-multicol-table-wrap&quot; style=&quot;margin: 0px -15px;&quot;&gt;
	&lt;table class=&quot;wsite-multicol-table&quot;&gt;
		&lt;tbody class=&quot;wsite-multicol-tbody&quot;&gt;
			&lt;tr class=&quot;wsite-multicol-tr&quot;&gt;
				&lt;td class=&quot;wsite-multicol-col&quot; style=&quot;padding: 0px 15px; width: 50%;&quot;&gt;
					
						

&lt;div class=&quot;paragraph&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;​A 501c3 nonprofit 
organization, Project NOLA purchases brand new police-grade crime 
cameras using charitable donation and grant funds, then loans 
cameras&amp;nbsp;directly to individuals, associations and municipalities to help
 local law enforcement&amp;nbsp;make communities safer places to live, work and 
visit.&amp;nbsp; Crime camera hosts or sponsors only pay Project NOLA is what it 
cost us to receive, record and transmit camera video to local law 
enforcement, which costs as little as $300/ year per camera (plus any 
special optional add-ons such as License Plate Recognition, Facial 
Recognition, etc).&lt;br /&gt;&lt;br /&gt;There is no additional cost for PC software or
 mobile apps, which camera hosts and local law enforcement use to view 
camera video.&amp;nbsp; Furthermore, there are no software licensing charges and 
software upgrades are free.&lt;br /&gt;&lt;br /&gt;Each crime camera also carries a 5 year manufacturers warranty.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
&lt;br /&gt;

&lt;h2 class=&quot;wsite-content-title&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Get Started&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Often developing &amp;amp; launching community-wide 
crime camera programs within weeks of being contacted, individual 
residents, business owners, civic leaders, law enforcement professionals
 and government officials may quickly get the ball rolling by simply 
calling us.&amp;nbsp; We can custom tailor our program to meet 
your community&#39;s needs, raise funds, and even help to improve an 
existing crime camera program while also dramatically lowering its 
annual operating costs!&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;
Facial recognition technology use in search for New Orleans jail escapees under scrutiny
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;


&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img height=&quot;400&quot; onerror=&quot;this.style.display=&#39;none&#39;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhd80CdTldV5IaqSFeWQnkJIMT9ZO_DmJktHhEWn1XqXF1jdPe5xwUO2CIzzDLvJy8YOMVBIpkbxEfCiXpw7quiZmaxbbyTd_Q3AN7Q6gn9OPH5fq4wlGxOwopMM2etnmQpHVo1Ay7qS0MtAgdgaWh8U2BIpIDQI7F0dXouaXCboIgsn8mt1gJbURGnZg8/s1600/Screenshot%202026-01-15%20at%2014-08-51%20Facial%20recognition%20technology%20use%20in%20search%20for%20New%20Orleans%20jail%20escapees%20under%20scrutiny%20-%20ABC%20News.png&quot; width=&quot;678&quot; /&gt;

&lt;/div&gt;

&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

During the ongoing massive manhunt for 10 inmates who escaped from a New Orleans jail last week, authorities say the use of facial recognition cameras run by a private organization helped lead to the recapture of one of the fugitives -- even as the police department has come under scrutiny by critics from civil rights organizations to conservative politicians over its use of the technology.
&lt;p&gt;
Earlier this week, New Orleans Police Department Superintendent Anne Kirkpatrick told ABC News that facial recognition cameras maintained by Project N.O.L.A. had been used in the New Orleans manhunt despite the fact that she recently ordered a pause in the automated alerts her officers had been receiving from the group, which operates independently of the police department.
  &lt;/p&gt;&lt;p&gt;
Kirkpatrick recently told The Washington Post she ordered the alerts to officers turned off until she is &quot;sure that the use of the app meets all the requirements of the law and policies.&quot;
  &lt;/p&gt;&lt;p&gt;
Citing the New Orleans Police Department&#39;s partnership with Project N.O.L.A., the American Civil Liberties Union said in a statement it is believed to be the first known widespread effort by a major American law enforcement agency to use artificial intelligence technology to identify suspects in an assortment of crimes across the city.
  &lt;/p&gt;&lt;p&gt;
In a statement, the ACLU said the use of live facial recognition raises constitutional and privacy issues and &quot;is a radical and dangerous escalation of the power to surveil people as we go about our daily lives.&quot;
Critics of the New Orleans Police Department&#39;s use of facial recognition cameras said that the average citizen should understand that they are not opting in or are being made aware that they are being scanned by the cameras.
  &lt;/p&gt;&lt;p&gt;
&quot;Facial recognition technology poses a direct threat to the fundamental rights of every individual and has no place in our cities,&quot; Alanah Odoms, executive director of the ACLU of Louisiana, said in a statement about the city&#39;s partnership with Project N.O.L.A. &quot;We call on the New Orleans Police Department and the City of New Orleans to halt this program indefinitely and terminate all use of live-feed facial recognition technology.&quot;
  &lt;/p&gt;&lt;p&gt;
Some Republicans in Congress also opposed the unchecked use of the technology, most notably Reps. Jim Jordan of Ohio, Andy Biggs of Arizona, Warren Davidson of Ohio, Thomas Massie of Kentucky and Sens. Mike Lee of Utah and Steve Daines of Montana.
  &lt;/p&gt;&lt;p&gt;
In a March 27, 2025 letter to Kash Patel, who was then acting director of the federal Bureau Alcohol, Tobacco, Firearms Explosives, Biggs, the chairman of the House Subcommittee on Crime and Federal Government Surveillance, and Davidson raised concerns over news reports indicating the ATF utilized facial recognition technology to identify gun owners. &quot;The Subcommittee has concerns about ATF&#39;s use of facial recognition and Al programs and the effects that its use has upon American citizens&#39; Second Amendment rights and rights to privacy,&quot; the lawmakers wrote in their letter, requesting documents on policies and training in the use of facial recognition technology.
  &lt;/p&gt;&lt;p&gt;
Democrats, including Rep. Zoe Lofgren of California and Sen. Ron Wyden of Oregon have also joined bipartisan efforts to curtail the use of such surveillance.

    &lt;/p&gt;&lt;p&gt;
  How authorities are using live facial recognition
  &lt;/p&gt;&lt;p&gt;
The 10 inmates escaped from the Orleans Justice Center in New Orleans on May 16, officials said. Five of the fugitives have since been recaptured, leaving five others, including three charged with murder, still on the run as of Thursday afternoon.
  &lt;/p&gt;&lt;p&gt;
Kirkpatrick told ABC News this week that one of the fugitives was caught and another narrowly got away after live facial recognition cameras operated by Project N.O.L.A. located them while scanning crowds in the French Quarter.
  &lt;/p&gt;&lt;p&gt;
Bryan Lagarde, executive director of Project N.O.L.A., told ABC News that after being notified of the jailbreak on Friday, state police gave his group a list of the escapees.
    &lt;/p&gt;&lt;p&gt;

  &quot;We put that into our facial recognition. It took approximately four minutes to do that and within, literally, less than a minute later we started tracking two of the escapees,&quot; Lagarde said.
  &lt;/p&gt;&lt;p&gt;
He said the information about fugitive Kendall Myles and another escaped inmate, who he said is facing attempted second-degree murder charges, was sent to state police investigators who confirmed the two men were part of the jailbreak.
    &lt;/p&gt;&lt;p&gt;
  &quot;Then they immediately went out to the French Quarter, which is where we were tracking them walking down Bourbon Street,&quot; Lagarde said.
  &lt;/p&gt;&lt;p&gt;
Myles was arrested after police found him hiding under a car. The second escapee, however, managed to get away.
    &lt;/p&gt;&lt;p&gt;
  &quot;I&#39;m sure they knew there were cameras because they were walking around with their faces held down and things like that. All it takes is just a second for them to look up and then there&#39;s facial recognition,&quot; Lagarde said.  &lt;/p&gt;&lt;p&gt;

Citing the ongoing investigation, Lagarde declined to say if his cameras have located any of the other escapees.  &lt;/p&gt;&lt;p&gt;
Group operates 200 facial recognition cameras in New Orleans
  &lt;/p&gt;&lt;p&gt;
Largarde said that his organization has been using live facial recognition cameras in New Orleans for the past two years.  &lt;/p&gt;&lt;p&gt;
  
  In response to potential privacy concerns, Lagarde said, &quot;As far as the facial recognition is concerned, it&#39;s scanning your face, my face, everyone&#39;s faces. If you&#39;re wanted and we know that you&#39;re wanted, you&#39;re going to be in trouble. If you are not wanted, its going to instantly disregard your face and just move on to the next person.&quot;  &lt;/p&gt;&lt;p&gt;

He said his group maintains about 5,000 cameras in New Orleans, including 200 that have facial recognition capabilities. He said the facial recognition cameras not only scan faces, but also clothing, vehicle and license plates.  &lt;/p&gt;&lt;p&gt;

&quot;We work a very large number of the major crimes here in New Orleans: Homicides, shootings, stabbings, home invasions, rapes, robberies all the way down to the thefts and the burglaries,&quot; Lagarde said.
  &lt;/p&gt;&lt;p&gt;
Project N.O.L.A. works with the New Orleans Police Department and the Louisiana State Police but does not have an official contract with either agency, officials said.
  &lt;/p&gt;&lt;p&gt;
Before the manhunt, the New Orleans police had appeared to distance themselves from Project N.O.L.A..
  &lt;/p&gt;&lt;p&gt;
The police department &quot;does not own, rely on, manage, or condone the use by members of the department of any artificial intelligence systems associated with the vast network&quot; of Project N.O.L.A.&#39;s cameras, a spokesman for the police department agency said in a statement to The Washington Post.
  &lt;/p&gt;&lt;p&gt;
Kirkpatrick, the New Orleans police superintendent, said her agency has operated surveillance cameras across the city, many in the entertainment districts, but none of them have facial recognition capabilities. According to the New Orleans Police &amp; Justice Foundation, the city has about 3,600 police operated cameras across the city.  &lt;/p&gt;&lt;p&gt;
What local laws say  &lt;/p&gt;&lt;p&gt;

While the city has an ordinance on the use of facial recognition technology, Kirkpatrick said there are exceptions to the rules.
  &lt;/p&gt;&lt;p&gt;
&quot;Sometimes, people think that we have a total ban on the use of facial recognition and that is not quite accurate,&quot; Kirkpatrick said. &quot;There are exceptions, and I think that this one would meet the exception of those ordinances.&quot;  &lt;/p&gt;&lt;p&gt;
  
  According to the city ordinance, &quot;Evidence obtained from facial recognition alone shall not be sufficient to establish probable cause for the purpose of effectuating an arrest by the NOPD or another law enforcement agency. The source of the image and the underlying reasons for the requested use of facial recognition systems as an investigative lead shall be documented in a police report.&quot;
  &lt;/p&gt;&lt;p&gt;
The ordinance says &quot;facial-recognition technology, shall not be used as a surveillance tool.&quot; But the ordinance also states that &quot;nothing in this section shall prohibit NOPD from requesting the use of facial recognition technology in the investigation of the prior occurrence of the following significant crimes as defined in Louisiana Revised Statute,&quot; including murder, manslaughter, solicitation of murder, first-degree robbery, drive-by shootings and carjackings.
  &lt;/p&gt;&lt;p&gt;
&quot;They had my permission, that&#39;s for sure,&quot; Kirkpatrick said of the use of facial recognition technology in the manhunt.
  &lt;/p&gt;&lt;p&gt;
Three of the five escaped inmates still being sought on Friday have been have been charged with murder or attempted murder, including one who was convicted in a double homicide, authorities.  &lt;/p&gt;&lt;p&gt;
A &#39;dragnet system?&#39;  &lt;/p&gt;&lt;p&gt;

The Washington Post investigation published this week reported that New Orleans police were using Project N.O.L.A.&#39;s network of facial recognition cameras to monitor the streets for wanted suspects over the past two years in ways that appeared &quot;out of step&quot; with the local ordinance.
  &lt;/p&gt;&lt;p&gt;
In the interview with ABC about the manhunt, Kirkpatrick said that Project N.O.L.A. is a &quot;useful partner&quot; but stressed that it is not law enforcement and is not bound by the local ordinance, raising issues of accountability about Project N.O.L.A. and the data it collects on ordinary citizens who are being surveilled in this untargeted manner.  &lt;/p&gt;&lt;p&gt;

&quot;I&#39;m very supportive of any technology that we can use to bring violent people back in, and then we can deal with the issues later, but we actually operate within the boundaries of the law,&quot; she said. &quot;As long as it&#39;s constitutional, ethical, we&#39;re going to stay within the boundaries. But this is a bigger topic and discussion, mainly for our politicians to decide what kind of laws they want.&quot;
  &lt;/p&gt;&lt;p&gt;
Other police departments across the country have faced questions over their use of the technology.
  &lt;/p&gt;&lt;p&gt;
The use of facial recognition software by U.S. businesses has also grown sharply in recent years, analysts and privacy advocates told ABC News.
  &lt;/p&gt;&lt;p&gt;
The uses range from tech companies securing personal devices and retailers scanning for potential shoplifters to e-commerce giants tracking delivery drivers. Retailers are also using facial recognition scanning on shoppers to adjust pricing in stores.
  &lt;/p&gt;&lt;p&gt;
Companies contend that the technology helps them achieve a safe and efficient operation, benefiting consumers and employees alike. Critics say the powerful tool encroaches on the privacy of everyday people, risking undue punishment or discrimination, the experts said.

    &lt;/p&gt;&lt;p&gt;
  Jake Laperruque, deputy director of the Center for Democracy &amp; Technology&#39;s Security and Surveillance Project, said facial recognition cameras are an &quot;unproven, error-prone tool.&quot;
  &lt;/p&gt;&lt;p&gt;
&quot;This is the first documented case in the U.S. of police using untargeted facial recognition, which countries like China employ to track people across cities and surveil their Uyghur citizens,&quot; Laperruque said in a statement to ABC News regarding New Orleans&#39; police use of the technology. &quot;This kind of dragnet system belongs in a dystopian sci-fi movie, not in American cities. Average pedestrians shouldn&#39;t have to worry that untested AI technology will set off alarm bells and send police after them.&quot;
  &lt;/p&gt;&lt;p&gt;
One of the key issues of facial recognition and AI is that studies have shown that it can be racially biased and is particularly error prone with people of color, older people and women.
  &lt;/p&gt;&lt;p&gt;
&quot;There&#39;s been error rates between 80 and 90%. That means nine out of every ten times that the system says, &#39;Hey, here&#39;s someone from our watch list,&#39; it&#39;s actually a false alarm,&quot; Laperruque said of the use of these cameras as untargeted or real-time surveillance tools based on pilot programs run in the United Kingdom.
  &lt;/p&gt;&lt;p&gt;
&quot;Facial recognition could be used to catalog attendees at a protest or political rallies of any affiliation, individuals going to a church, people visiting a medical clinic, or an array of other sensitive activities,&quot; Laperruque told ABCNews.  &lt;/p&gt;&lt;p&gt;

He added, &quot;Given these risks it’s no surprise that surveillance reform in general -- and placing guardrails on facial recognition in particular -- has support from across the political spectrum, including some of the most progressive and conservative members of Congress -- just last month at a Congressional hearing conservative members of Congress highlighted the dangers of facial recognition and other unchecked forms of surveillance.&quot;

  
  &lt;br /&gt;
  
  &lt;br /&gt;&lt;br /&gt;Also:

&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;



Neighborhoods Watched&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

New Orleans has spent millions to expand its police surveillance powers in recent years, providing the city with an unprecedented ability to monitor public spaces and track individuals.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Similar mass surveillance systems have rapidly spread to cities across the US in the last two decades, for the most part without any formal oversight or local regulation.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
As a result, the public is often left in the dark about what tools and techniques the police use to spy on them.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In partnership with the Fund for Investigative Journalism, The Lens has spent the past year obtaining and reviewing thousands of city documents to get a snapshot of New Orleans&#39; current surveillance apparatus and the rapid, largely unchecked nature of its growth.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  “What’s up with these cameras?”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

That’s what Dee Dee Green remembers thinking the first time she saw one of New Orleans’ police surveillance cameras in 2018, flashing red and blue lights over a community garden she manages in the city’s Hollygrove neighborhood.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“There was no real community engagement around these cameras, it just happened,” said Green, a member of the local anti-surveillance coalition Eye on Surveillance. “We noticed a camera above our garden space and wanted to begin investigating.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The cameras began popping up across town in late 2017 as part of a $40 million public safety plan that also included a fleet of license plate readers and a state-of-the-art surveillance hub called the Real Time Crime Center. Since then, local advocates like Green have been working to track and expose the city’s surveillance capabilities.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But it hasn’t been easy.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

New Orleans’ surveillance apparatus isn’t so much a comprehensive system as it is a sprawling, decentralized and constantly changing patchwork of tools maintained by various city departments, semi-independent agencies, private nonprofits and federal and state law enforcement.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It&#39;s sort of a Frankestein&#39;s monster,” said Bruce Hamilton, former senior staff attorney for the ACLU of Louisiana, who now works for the Southern Poverty Law Center. “I don’t think there&#39;s a grand plan.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
There is no consolidated “department of surveillance” in New Orleans, no single venue where residents like Green can go to learn more. Nor is there a formal regulatory structure for internal tracking, public disclosure or approval for surveillance or data collection technology.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

The city makes it even harder to navigate that labyrinth by consistently refusing or failing to give accurate information to the public, privacy advocates told The Lens.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The status quo is that the government is really free to acquire, deploy, expand existing surveillance technology outside of public view, without public input and without oversight,” said Chris Kaiser, the advocacy director for the ACLU of Louisiana and member of Eye on Surveillance, at a New Orleans City Council hearing last year.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Often, as a result, we really don&#39;t know what&#39;s out there.”
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  Despite all the muddiness, the city drew one clear line in the sand early into the camera program: it wouldn’t use facial recognition.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
For over two years, officials repeatedly assured the public of that voluntary restriction. It’s even written in bold on the city’s website and included in the privacy policy for the Real Time Crime Center.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
It was a rare point of clarity in an otherwise opaque surveillance system. Except it wasn’t true.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In November 2020, the NOPD admitted that detectives had been using facial recognition since at least 2018. The department justified its previous denials by arguing that the city didn’t own the software itself. Instead, NOPD investigators were accessing it through the Louisiana State Analytics and Fusion Exchange — one of 82 “fusion centers” across all 50 states that make up a vast, federally funded intelligence and data sharing network.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It&#39;s a distinction without a difference,” Hamilton said. “NOPD is still using the technology, just getting someone else to do the dirty work.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

And that wasn’t the first time the city was accused of shrouding its surveillance powers.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In 2018, an article from The Verge shocked many New Orleans residents when it revealed that the NOPD had quietly obtained an advanced analytic software — called Gotham — and used it to create a database listing the one percent of New Orleans residents with the highest perceived threat of committing a gun crime.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The software was made by Palantir — a data-mining company founded by billionaire Peter Thiel with early investment from the CIA’s venture capital branch. The NOPD had been using the software for six years by the time the practice was exposed by The Verge, which characterized it as a “predictive policing system.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Starting in 2012, under former Mayor Mitch Landrieu, the city used Palantir’s Gotham software to identify and round up hundreds of potential gang-members for public safety “interventions” at the criminal court building, where they were informed that they and their friends were being closely watched and could face enhanced prosecution for future crimes.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&quot;We know who you are. We know who your friends are. We know where you go. We know everything about you,&quot; Landrieu said after the first “intervention” in 2012.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  Even getting basic information about the city’s surveillance arsenal can be an exhausting exercise. The city, for example, refused to release a map of its surveillance cameras for years until it was sued by an attorney from the Orleans Public Defenders Office with representation by the ACLU.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The fact that we had to sue to get a map of publicly visible cameras I think just illustrates the kind of ridiculousness of the city claiming it has any type of transparency when it comes to surveillance,” Hamilton said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The city ended up fighting the lawsuit all the way to the Louisiana Supreme Court before it was finally forced to turn over the camera locations in 2020.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“If transparency was anything more than just lip service, the city would have just said, ‘Here&#39;s the map,’ “ Hamilton said. “We shouldn&#39;t have had to fight for it.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
To Hamilton, the city’s record points to a clear conclusion: The public can’t trust City Hall to willingly and accurately inform them about the tools it uses to spy on them.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“They don&#39;t deserve our trust,” Hamilton said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Over the past year, Cantrell’s office denied multiple interview requests for this project and ignored many of The Lens’ emailed questions regarding the city’s use, oversight of and investment in surveillance technology. The city also provided incomplete and inaccurate records in response to some of The Lens’ public records requests.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But a short written statement from a Cantrell spokesperson said that the Real Time Crime Center “is governed by a strict policy” and that “access is restricted and monitored.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&quot;The Crime Center has hosted many community groups for tours and has attended dozens of community meetings to provide information on the public safety camera program and to answer frequently asked questions. A map of camera locations is available on the website, along with a form for residents to submit camera location requests.&quot;
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In a short statement, Landrieu told The Lens that his administration strived to balance public safety needs with privacy rights.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“You can have Constitutional policing and reduce crime,” Landrieu said. “It is possible to do both.”
Falling barriers to mass surveillance
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Local mass surveillance systems have spread rapidly across the U.S. in the last two decades, from major cities like New York, to smaller ones like Birmingham, Alabama, all the way to towns with populations under 1,000.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Some of those traditional checks and balances as far as budgeting are being circumvented and police departments are building huge arsenals of surveillance technology without any kind of engagement from lawmakers and without the awareness of the public,” said Nathan Sheard, the Associate Director of Community Organizing for the Electronic Frontier Foundation, a digital privacy nonprofit.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Sheard said that historically, electronic mass surveillance systems were kept in check more by simple practicality than legal restrictions. Some technologies widely used by law enforcement today were traditionally too pricey for local police department budgets, while others were only recently invented.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But with cheaper technology and increased funding from the federal government, the prevalence of local mass surveillance systems has exploded. And some officials are now convinced that new legal restrictions are necessary to replace the falling barriers of cost and technology.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“It became abundantly clear that this was one of those places where technology was moving at the speed of light, but electeds and the government were moving at a snail&#39;s pace in terms of creating policy around it,” Orleans Parish District Attorney Jason Williams told The Lens. “I do think we&#39;re behind. I think most American cities are behind on this.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  Williams, a former City Council member who ran for DA in 2020 as a progressive reformer, isn’t wholly opposed to new surveillance technology.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“There&#39;s a ton of technology I plan on using to prove cases over here at the DA&#39;s office,” he told The Lens. “If someone is using a weapon on city streets and it&#39;s picked up on a camera and I can access that camera, I&#39;m going to use that as evidence.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
As a council member, he praised the city&#39;s 2017 surveillance expansion efforts, and specifically encouraged a controversial, and ultimately abandoned, plan to install infrared cameras that could see through people’s clothes to virtually check for weapons.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&quot;Some of my liberal friends may say this is an infringement upon constitutional rights, but at the end of the day, what is more important than the safety of this community?” Williams said in 2017.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Williams was also an outspoken advocate of expanding data collection outside of the criminal justice system with “smart cities” technologies — an urban planning idea and multi-billion-dollar industry that encourages city governments to maximize data collection and analysis across all facets of civic life.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The more the city knows about its residents, the theory goes, the better it can serve them.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Analyzing traffic patterns can help reduce congestion. Monitoring residents’ energy usage can increase energy efficiency. Putting sensors in trash cans can help cut down on collection costs and prevent bin overflow. Other smart cities technologies have been credited with combatting the coronavirus pandemic, monitoring air quality and mitigating flooding risks.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  But that “smart” technology can also mean an exponential rise in the amount of data cities collect about their residents, and sometimes come with privacy implications that aren’t apparent when they’re first installed.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Smart recycling bins” in London were turned off after it came out that they were mining data from passing smartphones. And the City of San Diego turned off the cameras in its “smart street lights” — originally installed as a way to study traffic patterns — after the public discovered the police started using them for criminal investigations.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Williams still believes in the potential of those technologies, but said his outlook “evolved” during his years on the City Council as he saw “how pervasive this technology can be in every facet of our lives without us actually having an intelligent conversation about whether or not we want all of this to happen.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“People want the latest and greatest thing, but we&#39;re not educating ourselves on the negative ramifications of some of this technology,” he said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In 2020, after he announced his run for DA, Williams began working with Eye on Surveillance to create a law setting restrictions and oversight measures for surveillance, only some of which were ultimately approved by the City Council.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We gotta get in front of it,” Williams said. “Even if it&#39;s not here yet, we need to start having conversations about the best way to use these things and what we don’t want them to do ever.”
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  ‘Fundamentally different’
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  Police surveillance is nothing new. Local police have long monitored public spaces — standing on a street corner, staking out a house or following a suspect through public streets. And they have long used data on residents, like arrest records and fingerprints, to solve cases.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Rafael Goyeneche, a former prosecutor and president of the Metropolitan Crime Commission, argues that new surveillance technologies are simply enhanced versions of what police have always done. He compared using facial recognition software to broadcasting a suspect photo and asking for citizen tips, both of which come with the risk of misidentification and racial bias.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The technology is only a tool,” he told The Lens. “It doesn&#39;t mean that anyone&#39;s rights are being violated. It doesn’t mean the police are engaging in anything covert or constitutionally invalid.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But Dave Maass, the head of investigations for the Electronic Frontier Foundation, argued that the technology at the fingertips of local law enforcement today isn’t just augmenting existing practices, it’s changing the nature of government surveillance and public anonymity altogether.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“If you look 20, 30, 40 years ago, when we&#39;re talking about surveillance, we&#39;re talking about a dude sitting in his car with binoculars looking at a particular person for a particular investigation,” Maass said. “We look at where we are now, we&#39;re talking about the advent of technologies that are collecting data on everyone all the time, regardless of whether you&#39;re suspected of being involved in a crime.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“These are fundamentally different things,” he said.
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  New Orleans has steadily grown its surveillance hardware year after year. By late 2018, the Real Time Crime Center had access to a little over 300 live camera feeds. By the end of 2019, it was up to roughly 600. And by early 2021, there were nearly 1,000.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Meanwhile, in August, the city announced it was using $1 million in federal coronavirus relief aid to buy 150 to 160 more license plate readers.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But while the hardware is the most visible element of New Orleans’ surveillance network, the real power is on the other side of the lens — the advanced analytic software that mines, organizes and analyzes the footage.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“What we have now are algorithms that are watching all of the cameras all of the time, indexing everything in those cameras and then storing that potentially indefinitely,” Maass said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The city started using this kind of algorithm in 2017 with a software called BriefCam. Instead of requiring officers to watch every second of every camera feed to find what they’re looking for, BriefCam watched it for them and broke down the footage into searchable components.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“BriefCam’s breakthrough technology detects, tracks, extracts and identifies people and objects from video, including; men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction, dwell time, and more,” said a BriefCam press release announcing its work in New Orleans.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Once everything is broken down and cataloged, officers could easily comb through hours of footage in just minutes. (The city said it stopped using BriefCam in late 2019.)
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  This type of software is also used with body camera footage. Body cameras were adopted by the NOPD in 2014 as a police accountability measure, but they’re also a major tool in prosecutions.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In 2016, the Orleans Parish District Attorney’s Office started using software to mine and catalog audio and video captured by body cameras. The company announced its business with the New Orleans DA in a 2016 press release.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It makes video completely searchable. The software creates an audio transcript and record of faces and text in each video through an automated system, which means an officer or investigator can type in a person&#39;s name or keywords like drugs and search for when and where it was spoken in the video.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The police also use advanced software, like the one from Palantir, to automatically analyze the massive troves of data at their disposal, including arrest records, jail phone call logs, parole and probation records, incident reports and interview cards. The NOPD’s field interview cards in particular raised privacy concerns soon after they were introduced in 2011, when The Times-Picayune reported that the police had used the cards to collect and store names and personal information of 70,000 people in just a year.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  Brian Hofer, chair of the Oakland Privacy Advisory Commission, told The Lens that while many of the records held by the city and police may not seem very intrusive in a vacuum, they become exponentially more revealing as they’re connected.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The individual privacy impact from a single data point, probably low, maybe even zero,” Hofer said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But when you start connecting the dots, he said, even a relatively small amount of data can paint an intimate portrait of someone’s life. He referenced a 2013 peer-reviewed study in Scientific Reports that found that 95 percent of people could be identified with just four location data points.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“These data points are that revealing,” Hofer said. “We’re creatures of habit. We drive to work the same way, we drive to school the same way.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Tracy Rosenberg, an activist with the anti-surveillance group Oakland Privacy, said that many surveillance products being marketed to cities — like Palantir’s Gotham software — focus on finding connections, trends and social networks in their own data that would otherwise be nearly invisible to a human investigator.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The pitch of the surveillance vendors has been we&#39;re going to let you get more information, but more importantly we&#39;re going to let you integrate it, we&#39;re going to take it out of silos, we&#39;re going to make the information work together, we&#39;re going to put it in one place,” she said. “That is definitely surveillance nirvana.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
She said a major concern for her is how these surveillance products will allow law enforcement to take advantage of government databases that haven’t traditionally been a routine part of police investigations, especially as “smart cities” technologies ramp up municipal data collection.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“If you think about the volume of information that cities collect, which can include public health data, tickets and citations, educational records, voting records, the potential for what we call ‘data fusion’ is kind of extensive,” Rosenberg said.
‘The Wild West’  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Oakland, California was one of the first cities in the U.S. to start regulating surveillance at the local level. Hofer said the city’s fight for reform began with a 2013 proposal for a federally funded surveillance network.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The City of Oakland launched this proposal for a citywide mass surveillance program that would blanket the entire city,” Hofer said. “It was similar to what happened a couple years after that in New Orleans with the Real Time Crime Center.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
City officials hadn’t sought public input on the plan, according to Rosenberg. She said the public ended up finding out “through nothing more than an accident.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It really only came out because an employee with the City of Oakland found some paperwork and sent something out to activists saying you might be interested in this,” she said. “We had no guardrails in place, no policies. It was the Wild West.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Basically, they were where New Orleans is today.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“You didn’t even know the technology was being used,” Hofer said. “What we were doing in Oakland is probably what you guys are doing, submitting a lot of public records requests and poring through agendas and contracts, matching up model numbers and serial numbers and trying to see what was being used. And that takes a lot of effort.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Rosenberg said there are practical limits to what the public can access through what she referred to as “public records odysseys.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“For everything we asked, we probably got answers on 20 to 30 percent of it. We still have public records requests that go back to 2014 and 2015 that haven&#39;t been answered.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Oakland activists were able to get the city to back down from the 2013 plan. But that wasn’t the end of the anti-surveillance movement.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“We started thinking about, ‘OK, how do we keep this from happening again?’ ” Rosenberg said. “What is the proactive thing we can do so we don’t have to fight these things after they&#39;re sort of 75 percent or more there? … It became a challenge to mobilize citywide and start saying no, you can&#39;t move this forward essentially on the basis of inertia and entropy.”
    &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  In 2016, the ACLU launched its Community Control Over Police Surveillance, or CCOPS, campaign and created a template ordinance with three central requirements: City Council approval of existing and future surveillance technology, annual public reporting on how those technologies are used and a community advisory committee to make recommendations on surveillance policy.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The biggest win of the framework, I think, is that it brings everything out into the open,” Hofer said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Oakland passed its version of a CCOPS law in 2018, among the first cities in the country to do so. According to the ACLU, at least 21 cities, representing a combined 17 million residents, have passed some sort of CCOPS law since 2016 including Nashville, Tennessee; Madison, Wisconsin; New York City and Pittsburgh.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But that still leaves the vast majority of American cities — including New Orleans — without this type of regulation.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Regulatory efforts are starting to catch up, but we were caught flat-footed,” Rosenberg said. “We&#39;re all making it up as we go along. The anti-surveillance movement as it is is maybe a decade old at best. So these are very new challenges we&#39;re facing.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
‘I have nothing to hide’
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Hofer has worked with organizations across the country, including Eye on Surveillance, and said that every community is different in terms of the level of government monitoring it&#39;s willing to accept.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“I&#39;m not an abolitionist. I do think some technology can be used appropriately,” he said. “You can determine yourself in each community where to draw the line. It&#39;s up to the residents in that city to determine what they think is appropriate and not appropriate.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
For some outspoken anti-surveillance advocates, the technology that cities like New Orleans are adopting act as an extension of what they see as deeply flawed, biased and overly punitive criminal justice and immigration systems.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It&#39;s a way of controlling the masses, including immigrants,” Santos Alva, an organizer with the local immigrant advocacy organization Congress of Day Laborers, told The Lens through an interpreter. “They don’t mess with people who have a good economic standing in this society. They mess with Black people, they mess with brown people, they mess with immigrants.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Of course, not everyone feels that way about the police.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“There are certainly people that bring up the argument ‘I have nothing to hide,’ ” New York-based privacy advocate Albert Fox Cahn told The Lens.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Especially with police being as polarizing a topic as they are right now, there are many people who will reflexively talk about their desire to stand in solidarity with the police, a sort of ideological alignment. But even those individuals, when you talk about some of these cases that get to points of sensitivity in their own lives, it&#39;s a very different reaction.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Polling from the Pew Research Center shows that when it comes to government surveillance, the majority of Americans are concerned, believe the risks outweigh the benefits and have little to no idea about what’s being done with the information collected from them or what privacy laws are on the books.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We all have facets of our lives that make us feel vulnerable when they&#39;re tracked or exposed. And it’s different for different stakeholders,” Cahn said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Some people, he said, might feel the greatest concern about police targeting people based on their religious affiliations. Others may be more skeptical of the government spying on political organizations or creating a database of gun owners.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The Pew poll indicated that for many Americans, there is greater concern around data collected by private companies than government surveillance.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But, Hofer said, “Those lines are becoming fuzzy.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The government is a consumer in the booming market for personal data collected by private companies. Several federal agencies have purchased private smart phone location data. The Treasury Department has purchased employment data from a subsidiary of the credit bureau Equifax to help determine eligibility for food stamps and disability benefits.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
U.S. Customs and Border Protection has a contract with a Swedish company that collects data from cars — including navigation history and information from bluetooth connected devices. The popular home security Ring “video doorbells” share footage with thousands of police departments. In New Orleans, a program called Leads Online provides access to hundreds of millions of pawn shop purchase records.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Maass argued that the upsurge of mass government data collection isn’t only a privacy issue, it’s a security issue as well, especially when it comes to small, local agencies.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Police departments don’t have tech-company-class cyber security professionals who are just locking down their system and doing security audits,” he said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In 2015, Maass co-wrote a report about how three police departments just outside of New Orleans — St. Tammany Parish Sheriff’s Office, Jefferson Parish Sheriff’s Office, and the Kenner Police — left their license plate reader systems completely exposed.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“There were license plate readers where you could just go to a URL, on a website, and bring up the camera,” Maass said. “You could bring up the control, you could siphon off the data as it was coming in, you could watch the live footage. And nobody had actually done the actual investment to protect the software, no one had done the due diligence.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Williams said he had similar concerns about the city entering surveillance contracts with private vendors, comparing the city to a product consumer who blindly agrees to a long terms and conditions document.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The same way you can click a box without reading a 40-page document, that same thing is happening with municipalities across the country as it relates to technology,” he said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Some advocates also have doubts about the city’s role as a steward of all this data. In December 2019, New Orleans was hit by a cyber attack that locked the city out of its own data and systems. It took millions of dollars and a full year to recover.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The city has said it upgraded its cybersecurity procedures during the recovery process. But even then, it’s difficult to know if the city will ever be fully protected when some of the country’s most sensitive and secretive government agencies have been compromised by cyber attacks in recent years.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
‘Who was lying?&#39;  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  Eye on Surveillance and other local advocates have proven it’s possible to push back on the city’s surveillance expansion. But their successes in halting surveillance initiatives come with an important caveat: the public needs to know they exist first.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Public pressure forced the City Council to drop a controversial ordinance in 2018 that would have forced every alcohol vendor in the city to install surveillance cameras directly connected to the Real Time Crime Center. The same year, when the NOPD’s use of the Palantir software caused a public backlash, the city announced it wouldn’t renew the contract. And soon after the NOPD admitted it was using facial recognition in 2020, the City Council banned the use of facial recognition.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But the public rarely gets any advanced warning of new surveillance initiatives. Expansions are often simply announced, rather than brought up for public debate. Other times the public is never informed at all.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We can&#39;t regulate or prohibit technologies that we don’t know exist, that we don’t know our police department might be using,” Hofer said.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Part of the problem, advocates argue, is an intentional tactic from city officials to avoid public debate and controversy. But they said the issue goes beyond just secrecy from individual officials, and that there are institutional obstacles to transparency that arise from the city&#39;s near total lack of internal oversight.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Those obstacles can persist even when government officials attempt to be transparent. For example, during the two years the NOPD was using facial recognition, city leaders and elected officials repeatedly and falsely claimed the opposite. But not all of those officials knew they were lying.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It&#39;s unclear to me personally who was lying and who didn&#39;t know what they should have known,” Hamilton said.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
City Council members, for their part, had every reason to believe the technology wasn’t being used. At a July 2020 hearing, council members asked the city’s Chief Technology Officer and the administrator of the Real Time Crime Center whether the city was using facial recognition. And repeatedly, those officials assured them it was not.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Of course the city doesn’t deploy any facial recognition technology in a law enforcement purpose,” RTCC administrator Ross Bourgeois told the council. “The city doesn’t have any of that technology available for our use.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Just a few months later, when it was revealed that wasn&#39;t true, NOPD Superintendent Shaun Ferguson told the City Council that he was just as surprised as they were.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“I had no idea we even had access to this. So it&#39;s nothing we ever tried to hide at any point in time,” Ferguson said. “I have since learned that our department did not have a policy with regards to using this tool.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
That doesn’t bring much comfort to Marvin Arnold, an organizer with Eye on Surveillance.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“I don’t know which is better, if they lied about facial recognition or if the chief just didn&#39;t know,” Arnold said. “I&#39;ve seen how little the public and even the city itself knows about these systems. I don’t think the majority of council members understand what city surveillance looks like. I don’t even think our city administrators understand it. So how can your average resident?”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Maass leads the Electronic Frontier Foundation’s Atlas of Surveillance, an attempt to identify and map local and state surveillance usage. He said one of the major obstacles was dealing with officials who were unaware of the surveillance technology being used within their own government.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“That is a huge problem,” Maass said. “I&#39;ll file a public records request and the agency will come back and say, &#39;Well we don&#39;t use that technology.&#39; And I actually have to show them the receipts, like, yes you do. Then they check back again and they&#39;re like, &#39;Oh yeah, I guess we didn’t know.’ This happens all the time, all over the country.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Similarly, when the city’s use of the Palantir software was revealed six years after it began, there was a debate over how intentionally secretive the city had been.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
When The Verge broke the news, the headline read, “Palantir has secretly been using New Orleans to test its predictive policing technology.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

A few days after that article, The Times-Picayune called the relationship “a not-so-secret secret,”  pointing out that the software was disclosed on the city-run website for former-Mayor Landrieu’s NOLA for Life program as well as a public report from 2016.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

“The reporting on the use of the Palantir technology was false and misleading,” Ryan Berni, one of Landrieu’s top deputies, said in a recent interview. “It should not have been a secret for anyone who was paying attention to the NOLA for Life program.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Nonetheless, much of the public was unaware of the city’s relationship with Palantir, as were members of the City Council and the city’s Office of the Independent Police Monitor. And many residents wondered how the city could have avoided any sort of public vetting before entering the Palantir contract.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The answer is that there simply wasn’t any public process or disclosure requirement for the city to evade.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Most city contracts don’t require City Council approval or a public hearing. And the city doesn’t have to issue press releases every time it signs a contract. Many of those records are available to the public upon request. But until someone asks, the city has no legal obligation to announce its use of surveillance technology any more than it has to announce its use of Microsoft Word.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

Even if you do get a hold of a city contract, they are often vague. In the Palantir contract, for example, the company’s responsibilities are simply listed as providing the city with “such technological data as necessary to deploy the Project.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In fact, at the same time as the city was using the Palantir software, it was using another, very similar piece of software called Coplink by Forensic Logic. Coplink and Palantir’s software are often referred to as market rivals. Ronal Serpas, who was the Police Superintendent when the city first adopted Palantir, compared it to Coplink in a 2018 interview with Fox 8.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The Coplink software never received the widespread attention drawn by the Palantir contract, and the city continued using Coplink without controversy up until April 2021, when the contract expired, according to the NOPD.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Berni said the lack of City Council input on surveillance decisions is due to New Orleans’ “strong executive” model of government, in which the mayor decides the vast majority of day-to-day operational decisions.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We have a system set up where there&#39;s a clear mandate where the executive and all the departments and agencies under it run the government,” he said. “The council is there to set the budget and big picture policy. And at various times, decides to get more in the weeds on specific issues. I think that&#39;s for the council to decide.”  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
‘It&#39;s not gonna stop’  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  
  The city of New Orleans grew its surveillance capabilities with little pushback from members of the City Council until, in early 2020, a seemingly innocuous proposal about streetlights came before the council’s Smart and Sustainable Cities Committee.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The proposal called for a pilot program to introduce 146 “smart street lights” equipped with video and audio recording. The cameras weren’t primarily for police use, city officials said, and would be mainly used to study traffic patterns. But the footage would be made available to the Real Time Crime Center.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
At the same time, the city of San Diego was facing a public backlash over the same street lights. The city had installed over 3,000 of them in 2017. But many residents were disturbed after finding out in 2019 that the police had started using the camera footage for their investigations. The reaction was so strong that San Diego’s City Council is now poised to pass a comprehensive CCOPS ordinance, and has turned off the smart street light cameras until it does.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The smart street lights hit a nerve in New Orleans as well. Members of Eye on Surveillance were frustrated that they were once again caught off-guard by a surveillance proposal.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“I guarantee that instead of saying they were having a meeting about smart cities, they said they were having a meeting about adding 146 more cameras, a lot more people would attend,” Arnold told The Lens at the time. “Overall, the onus has been on the community to find out the specifics rather than them being forthcoming.”
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
In a somewhat surprising turn, then-Councilman Williams decided to put the smart cities pilot on hold until the council could pass comprehensive surveillance regulation similar to CCOPS legislation in other cities. He said that the decision was heavily influenced by the work of Eye on Surveillance advocates.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
But not everyone on the City Council had the same appetite for regulation. Some didn’t want to take a “tool out of the toolbox” for police, or insisted that their constituents wanted more surveillance, not less. Others worried about the administrative burden of tracking all that technology.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The City Council ended up cutting almost all the forward-looking provisions from the ordinance, the ones meant to create an ongoing regulatory structure for surveillance. The only explanation given during the meeting was simply that the NOPD had asked them to remove those pieces of the law.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“We&#39;ve stripped extensive approval and reporting processes as requested by the NOPD,” Williams said during a December council meeting.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The NOPD didn’t respond to questions about its alleged request to change the legislation.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
What the council passed instead was a full ban on four types of technology: facial recognition, predictive policing, characteristic tracking software and cell-site simulators, also known as stingrays.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
The ordinance was no small achievement. New Orleans is just one of a handful of cities in the country to outlaw facial recognition and predictive policing. It’s likely the first city to outlaw stingrays. And the law sets up a framework to create future guardrails.  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;

But activists, both in New Orleans and nationally, say that individual bans, without any high level oversight or regulation, just aren&#39;t enough to keep the surveillance state in check.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“The problem there is you&#39;ve intervened effectively on four kinds of surveillance technology, and everything else is left untouched,” Rosenberg said. “And for the moment, that probably has some efficacy. But as time moves on and technology marches on, there will be new things down the road that potentially are just as disturbing as those you chose to ban.&quot;
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Advocates also point out that without those oversight measures, there’s no sure way to verify whether those bans are even being followed, considering that the city falsely claimed it wasn&#39;t using facial recognition for years.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
And already, the NOPD is working to walk back at least the facial recognition ban. Councilman Jay Banks told The Lens that the NOPD was working on a policy on how it would use facial recognition and that he would support reversing the ban if the policy was sound.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Meanwhile, although the City Council abandoned the smart cities pilot program, the city is moving ahead with an even bigger version of the project. It recently selected a contractor to implement a broad smart cities program that would, according to the contractor’s proposal, include 3,000 smart street lights, each of which would have at least two cameras.
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“It&#39;s not a one and done,” Hofer said. “It&#39;s not gonna stop and it&#39;s not gonna slow down.”


 
  
  
  &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;center&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/Xopih8JcKOw?si=Ho4paD2Q4e2giLg1&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/CHe1NVbrnLc?si=_haxx4wBEO_Amr2P&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
  
  
  &lt;br /&gt;&lt;br /&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;455&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/djIGxwbOk9w?si=ffMLVik7BghDTbfR&quot; title=&quot;YouTube video player&quot; width=&quot;740&quot;&gt;&lt;/iframe&gt;
 &lt;br&gt;&lt;br&gt; &lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/WedLwyGKs44?si=lBanzjj3hV7jAxCZ&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
  &lt;/center&gt;
</description><link>https://thecomingnewworldorder.blogspot.com/2009/12/project-n-o-l-national-crime-camera.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh7-rt.googleusercontent.com/docsz/AD_4nXf1x_B6Fr7Dfci-JekaVNgNYjOFClsFQW6V1aH-kZ1dWjDGr36u9WGMyZZSSsf08XccQLCx_iLX_QcMt5IydgoTEZYKErdJ2yjoWNfLYrElgVlMuwY2ErCPjuoqPdA7-E8=s72-c?key=NzbxX7nIgc_exOdTCU5yXw" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-7208944051979326984</guid><pubDate>Tue, 29 Dec 2009 12:43:00 +0000</pubDate><atom:updated>2025-12-12T07:20:32.068-06:00</atom:updated><title>Digital ID, censorship fears grow as Canada, EU sign new pact</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img    height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR4yGSUCIagabitICbxTUAmEwCVTaeu65M8UDCc6wKP_RYmApozDa6uc_VuZv6u_DcUjjyXqt4olixmH-B1kH8pqdgzArRXhKG-DAsVGqgeT5LqFxxOH_N_72YFHp9C_EnWFOxGY2Rii0eL3JJSBfSHOiaEiW7lZK5rrXLp2m_Lc_KWVeEdKmQnwszJHQ/s1600/shutterstock_1047288844-1024x683.jpg&quot; width=&quot;749&quot;  onerror=&quot;this.style.display=&#39;none&#39;&quot; /&gt;

  
&lt;/div&gt;


&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
  &lt;p&gt;

    
    Canada and the European Union are teaming up on controversial new digital agreements covering everything from artificial intelligence to digital identity and media censorship. 
  &lt;/p&gt;&lt;p&gt;
    Canada and the European Union are teaming up on controversial new digital agreements covering everything from artificial intelligence to digital identity and media censorship. The move has sparked immediate warnings from civil-liberties groups about a looming threat to privacy and online freedom.
  &lt;/p&gt;&lt;p&gt;
The agreements were announced Monday in Montreal during the first meeting of the EU–Canada Digital Partnership Council, held alongside the G7 Industry, Digital and Technology Ministerial meeting.
  &lt;/p&gt;&lt;p&gt;
The Council was co-chaired by EU Executive Vice-President Henna Virkkunen and Canada’s Minister of Artificial Intelligence and Digital Innovation, Evan Solomon.
      &lt;/p&gt;&lt;p&gt;
    In a joint statement, both sides said the initiative aims to “boost competitiveness, innovation and economic resilience.” Specific commitments include developing “trustworthy artificial intelligence technologies that respect fundamental rights” and accelerating AI adoption across healthcare, manufacturing, energy, culture and public services.  &lt;/p&gt;&lt;p&gt;

To advance this work, Canada and the EU signed a Memorandum of Understanding on Artificial Intelligence. It will support joint standards development, expand research collaboration and create shared access to large AI infrastructures and computing capacity.
  &lt;/p&gt;&lt;p&gt;
They also agreed to create a structured dialogue on data spaces used to train advanced AI models.  &lt;/p&gt;&lt;p&gt;

A second memorandum, focused on digital credentials and trust services, commits the two jurisdictions to explore interoperability between digital identity systems. This includes pilot testing, technical standards and “solutions based on digital identity wallets,” according to the EU summary of the agreement.  &lt;/p&gt;&lt;p&gt;

The EU said the partnership marks “a significant step in strengthening our cooperation to build the economy of tomorrow,” with Virkkunen noting that “no single region can face the digital transformation alone.”
  &lt;/p&gt;&lt;p&gt;
Solomon said the initiative reflects long-standing ties between the two partners, adding: “The Canada-EU relationship is based on shared values and interests, a long history of close cooperation and strong people-to-people ties. Through the Digital Partnership, Canada and the EU are shaping a digital future that benefits people, grows the economy and builds trust between countries.”  &lt;/p&gt;&lt;p&gt;

The section of the agreement dealing with digital identity systems has drawn criticism from constitutional rights advocates.
  &lt;/p&gt;&lt;p&gt;
The Justice Centre for Constitutional Freedoms said in a post on X that cooperation on “digital credentials and trust services… including solutions based on digital identity wallets” represents a step toward a nationwide digital identification regime. The group warned that the framework risks “pushing citizens into a Digital ID system that will control and track our money and reduce our freedom.”  &lt;/p&gt;&lt;p&gt;

The partnership also includes working together on ‘supporting independent media, combating foreign information manipulation and addressing risks posed by generative AI’.
    
    
    
    
    
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;And&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;EU-Canada Digital Partnership Zeroes In on Digital Identity Wallets&lt;p&gt;
  
  
  &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img    height=&quot;430&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNRLMPv3Loxex9LAVL62EWX8v9zj1kbQT28Mf0RMJ2gmHb-wZ_3i2rT35zyh3Jk7onHXim1cE5taRVtVWYxVkG3xhyphenhyphenru-Kg_qKLgw_aOqWwU8jBXM2ORl1_P_Vs6sanJyDcHMnjm-pHotIB-Mi4ScgguK60v3Li4Z7kJzrhsbK0pjlsVBhFjRx6wx9lDs/s1600/GlobalDigitalID.jpg&quot; width=&quot;799&quot;  onerror=&quot;this.style.display=&#39;none&#39;&quot; /&gt;

  
&lt;/div&gt;&lt;p&gt;


The European Union and Canada have placed interoperable digital identity wallets at the center of a newly formalized digital partnership, signaling a potential cross-Atlantic alignment on digital credentials and trust services that could reshape how citizens and businesses authenticate in both jurisdictions. The first meeting of the Canada-EU Digital Partnership Council was held in Montreal on December 8, co-chaired by Canada’s Minister of Artificial Intelligence and Digital Innovation Evan Solomon and European Commission Executive Vice-President Henna Virkkunen.  &lt;/p&gt;&lt;p&gt;

The Council builds on the EU-Canada Digital Partnership announced in late 2023 and the Strategic Partnership of the Future joint statement adopted at the June 2025 EU-Canada summit. Those earlier documents explicitly called out digital identity and digital credentials as areas for deeper cooperation, including an intent to establish interoperable digital identities and digital credentials that can support cross-border interactions between citizens and enterprises. The Montreal meeting translates that high-level commitment into a more concrete roadmap.  &lt;/p&gt;&lt;p&gt;

According to a joint statement and a Canadian government news release, the two sides signed a Memorandum of Understanding on Digital Credentials and Trust Services that commits them to collaborative action on technical interoperability, standards alignment and pilot projects. The MoU envisages a forum where EU and Canadian authorities will jointly test digital credential technologies, share information on regulatory and technical approaches, and develop real-world use cases and pilots aimed at interoperability between digital identity wallets and associated trust services. A parallel MoU on artificial intelligence focuses on AI standards and infrastructure, but the digital identity work is framed as equally important for building trusted digital ecosystems.  &lt;/p&gt;&lt;p&gt;

For the EU, the partnership provides another anchor point for the European Digital Identity (EUDI) Wallet initiative, which aims to give EU citizens a standardized way to hold government credentials and use them across public and private services. Canada, meanwhile, has been advancing its own digital credential agenda through initiatives such as the Pan-Canadian Trust Framework and a patchwork of provincial pilots, but has not yet launched a single national wallet. The new MoU suggests that any Canadian federal wallet or credential system will be developed with cross-border interoperability in mind, likely drawing on international standards such as W3C Verifiable Credentials and eIDAS-aligned trust frameworks.
  &lt;/p&gt;&lt;p&gt;
From an industry perspective, the EU-Canada digital partnership could open new opportunities for vendors working on wallet infrastructures, verifiable credential issuance and cross-border trust services. It also raises policy questions that will matter to corporate identity teams, including how liability and assurance levels will be handled when credentials are accepted across jurisdictions, how attributes from a foreign wallet can be consumed under local privacy and AML rules, and whether mutual recognition of trust services could eventually extend to private sector identity providers. With both sides emphasizing digital sovereignty and resilience, the pilot work on wallets and credentials will be watched closely as a test case for international alignment on high-assurance digital identity.
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;And&lt;BR&gt;&lt;BR&gt;&lt;BR&gt; 
  
EU and Canada agree to collaborate on digital ID mutual recognition, pilots
  &lt;p&gt;

    New Digital Partnership Council inks MoU in first meeting 
    Representatives of the European Union and Canada emerged from the meeting of the EU-Canada Digital Partnership Council on Monday with an agreement to work together on making their respective digital IDs work in each jurisdiction. The continental bloc and the country signed a Memorandum of Understanding on “Digital Credentials, Digital Identity Wallets and Trust Services,” one of several deals to work together on emerging technologies.  &lt;/p&gt;&lt;p&gt;

The MoU refers to the Canada-EU Summit Joint Statement of June 23, 2025. That statement included a commitment by each to align their digital frameworks “to establish interoperable digital identities and digital credentials to facilitate interactions between our citizens and our businesses.”  &lt;/p&gt;&lt;p&gt;

In the wake of that statement, the Digital ID &amp; Authentication Council of Canada (DIACC) endorsed the prospective digital trade agreement and chance for mutual recognition of digital IDs.
  &lt;/p&gt;&lt;p&gt;
Now, the EU and Canada will explore the creation of a “dedicated forum for regular expert dialogue” to facilitate joint testing of credentials, including those using digital identity wallets. They will collaborate on joint use cases and pilot projects to advance cross-border interoperability, building on Canada’s new digital ID framework and the EU Digital Identity Wallet framework. The respective governments will also work together on sharing information and best practices, jointly test digital credential technologies and explore approaches to standards formation, and discuss the path to future mutual recognition, according to the MoU contained within the parties’ joint statement.  &lt;/p&gt;&lt;p&gt;

Monday’s meeting was co-chaired by Canadian Minister of Artificial Intelligence and Digital Innovation Evan Solomon and European Commission EVP for Technological Sovereignty, Security and Democracy Henna Virkkunen.
  &lt;/p&gt;&lt;p&gt;
The parties also agreed to cooperate on AI research and adoption, standards development for the digital economy, R&amp;D on quantum technologies and weather forecasting.
  &lt;/p&gt;&lt;p&gt;
The EU and Singapore held their second Digital Partnership Council meeting last Monday, where they outlined similar plans to collaborate on digital identity interoperability.

  
    
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;And&lt;BR&gt;&lt;BR&gt;&lt;BR&gt; 
  
  
EU &amp; Canada Begin Making The GLOBAL Digital ID System By Linking Their Tech
&lt;p&gt;

  European and Canadian officials have expanded their cooperation on digital policy with new agreements that link digital identity infrastructure, artificial intelligence development, and management of online information.
  &lt;/p&gt;&lt;p&gt;
The partnership, presented as a joint effort to strengthen “trust” and “information integrity,” commits both sides to exploring systems that would connect citizens’ digital credentials across borders while sharing data for AI research.
    &lt;/p&gt;&lt;p&gt;
  Two memoranda of understanding were signed: one on Digital Credentials and Trust Services and another on Artificial Intelligence.  &lt;/p&gt;&lt;p&gt;

The digital credentials agreement creates a working forum for joint experiments, technical coordination, and the testing of “digital identity wallets.”  &lt;/p&gt;&lt;p&gt;

These wallets are software tools that store verified identity documents, allowing people to confirm their identity online or in person using standardized credentials backed by government trust frameworks.
  &lt;/p&gt;&lt;p&gt;
The artificial intelligence memorandum focuses on the infrastructure behind large AI systems.
  &lt;/p&gt;&lt;p&gt;
It establishes a “structured dialogue on data spaces,” a term referring to controlled environments where data can be exchanged among multiple organizations under a common governance framework.
  &lt;/p&gt;&lt;p&gt;
While the purpose is described as supporting innovation, such data-sharing arrangements could also increase the circulation of personal or behavioral data between jurisdictions, raising questions about oversight and consent.
  &lt;/p&gt;&lt;p&gt;
Beyond technical matters, the AI plan promises to “accelerate AI adoption in strategic sectors” and to develop “advanced AI models for the public good.” It sets out to align Europe’s and Canada’s approaches on infrastructure, standards, and regulation, drawing the two regions closer in how they design and control large AI ecosystems.
  &lt;/p&gt;&lt;p&gt;
Another section of the partnership turns to media and information control. The governments agreed to “cooperation on enhancing information integrity online” and pledged to fund efforts “strengthening independent media by supporting local journalism.”
  &lt;/p&gt;&lt;p&gt;
Officially, this is aimed at combating “foreign information manipulation” and addressing the challenges of generative AI.
  &lt;/p&gt;&lt;p&gt;
The phrase “information integrity” appears with growing frequency in international policy documents, and its use in the EU–Canada partnership lands in the middle of an already expanding global trend.
  &lt;/p&gt;&lt;p&gt;
The wording may sound neutral, but it often signals a preference for managed information flows rather than open public debate. A July 2025 development at the United Nations illustrates why the term can raise concerns.
  &lt;/p&gt;&lt;p&gt;
The UN’s first Global Risk Report placed what it called “mis- and disinformation” among the most severe global threats. Inside that same report, the organization announced a new task force whose purpose is to examine how unauthorized narratives might interfere with the UN’s operations, particularly the 2030 Agenda.
  &lt;/p&gt;&lt;p&gt;
The framing is presented as a matter of public welfare, yet the described mission is not about encouraging transparency or open discussion. It is about maintaining a communication environment that protects institutional priorities.
  &lt;/p&gt;&lt;p&gt;
According to the report, survey participants from governments, NGOs, companies, and other groups broadly supported coordinated government action and multistakeholder coalitions to confront the identified risks.
  &lt;/p&gt;&lt;p&gt;
What is missing is any call for more open communication or stronger protections for free expression. The dominant approach favors centralized management of public narratives, reinforcing the idea that the solution to contested information is tighter control rather than broader participation.
  &lt;/p&gt;&lt;p&gt;
The first meeting of the Canada–EU Digital Partnership Council was held in Montreal on December 8, co-chaired by Canada’s Minister of Artificial Intelligence and Digital Innovation Evan Solomon and European Commission Executive Vice-President Henna Virkkunen.
  &lt;/p&gt;&lt;p&gt;
This meeting put earlier commitments into action, following the EU–Canada Digital Partnership announced in late 2023 and the Strategic Partnership of the Future statement adopted at the June 2025 summit.
  &lt;/p&gt;&lt;p&gt;
For the European Union, this partnership supports its European Digital Identity (EUDI) Wallet initiative, which aims to give citizens a unified digital container for verified credentials usable across public and private services.
  &lt;/p&gt;&lt;p&gt;
Canada has been pursuing similar goals through its Pan-Canadian Trust Framework and several provincial pilots, but it has not yet introduced a single national wallet. The cross-border cooperation suggests that any federal system in Canada will be built with global standards such as W3C Verifiable Credentials and eIDAS in mind.
  
  &lt;/span&gt;&lt;/b&gt;
  
&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
&lt;center&gt;  


&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/TK-95dw9ukM?si=yzGmW_bmd7vN0aXZ&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;BR&gt;&lt;BR&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/myY3bZyirBY?si=HdlhYnKn6zkfh65z&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/center&gt;
  
  </description><link>https://thecomingnewworldorder.blogspot.com/2009/12/digital-id-censorship-fears-grow-as.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR4yGSUCIagabitICbxTUAmEwCVTaeu65M8UDCc6wKP_RYmApozDa6uc_VuZv6u_DcUjjyXqt4olixmH-B1kH8pqdgzArRXhKG-DAsVGqgeT5LqFxxOH_N_72YFHp9C_EnWFOxGY2Rii0eL3JJSBfSHOiaEiW7lZK5rrXLp2m_Lc_KWVeEdKmQnwszJHQ/s72-c/shutterstock_1047288844-1024x683.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-8678228768212879007</guid><pubDate>Mon, 28 Dec 2009 02:12:00 +0000</pubDate><atom:updated>2025-12-03T21:40:51.705-06:00</atom:updated><title>The CEO Who Believes AGI Is Already Here</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img    height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKkO_5V-eY5w50cdPi0f1uljKfbtMoI6xFpu_gQDEtKb1QYr0NK7wRxFi-h1MCFW4IP_u2b418crwwdxNM6ba9hFaOneXEAlN9-izOK8pRW9xo6d3s4zaZj2bwi9M0jazPYqX_WO6U86nAAIGjprFT42K3FW8mH-p5rHwraSl2gmdehYVR3-6EdAjafes/s1600/GettyImages-1177951661.webp&quot; width=&quot;629&quot;  onerror=&quot;this.style.display=&#39;none&#39;&quot; /&gt;

  
&lt;/div&gt;

&lt;p&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Welcome back to In the Loop, TIME’s new twice-weekly newsletter about AI.&lt;p&gt;
Who to Know: Ali Ghodsi, CEO of Databricks
&lt;/p&gt;&lt;p&gt;
The three most valuable private companies in the U.S. have big reputations: OpenAI, SpaceX, and Anthropic. But the fourth, Databricks, flies a little more under the radar. This company, which is currently raising funds at a valuation of $134 billion according to reports this week, is a quiet workhorse of the AI revolution. Databricks offers a platform where companies can combine unwieldy data from different sources, manage it easily, and train AI models with it. Its CEO, Ali Ghodsi, is a charismatic computer science professor who still teaches the occasional class at U.C. Berkeley, even as he runs a multibillion-dollar company.
  &lt;/p&gt;&lt;p&gt;
  On AGI — Artificial general intelligence has already been achieved, Ghodsi says. To justify this provocative statement, he casts his mind back to his experience working in a computer science lab two decades ago, discussing in vaunted terms with colleagues what AGI might look like: it would be able to talk, and reason, and spot patterns in huge quantities of data. “Now that we have it, it&#39;s kind of like, never meet your heroes,” Ghodsi says with a laugh. “It&#39;s just like, okay, that&#39;s not that impressive.”&lt;/p&gt;&lt;p&gt;

Okay, but — Ghodsi has good reason to make this argument. Although OpenAI is one of his largest customers, Databricks’ bread and butter comes from the long tail of more normal companies that aren’t pursuing AGI, but simply want to use existing AI to do things with their data. In Ghodsi’s telling, Databricks is capitalizing on the size of this opportunity. “If all AI progress was frozen today, I think we have what we need to proceed with what we are doing,” Ghodsi says. “Not trying to build super-God… We&#39;re much more focused on: how can we make AI useful today in organizations?”
  &lt;/p&gt;&lt;p&gt;
  On AI agents —“Agents” was the buzzword of 2025 that never really delivered. By all means, AI improved radically this year, including by gaining new abilities to go and carry out web searches, or modify and run code. But big AI models still face reliability challenges that limit the length of time they can spend running autonomously, and we don’t have full-fledged AI coworkers yet. Ghodsi says Databricks is working on a solution to this problem: helping companies train smaller, laser-focused agents, using their own data. Those models end up being both cheaper to run and more reliable for specific tasks than frontier AI models like ChatGPT or Claude. “We can give you a good quality on the specific task, because we&#39;re cheating and we&#39;re doing boring AI, focusing just on specific tasks that you want help with,” Ghodsi says.
  &lt;/p&gt;&lt;p&gt;
  What to Know: AI private equity is here
&lt;/p&gt;&lt;p&gt;
For decades, big private equity companies have rinsed and repeated a profitable strategy: buy a struggling firm, trim its expenses by firing staff or modernizing business practices, and then sell it, before moving on to the next.
&lt;/p&gt;&lt;p&gt;
It was only a matter of time before somebody modified that strategy for the age of AI. OpenAI announced on Monday it had taken a stake in Thrive Holdings, a company set up earlier this year by Joshua Kushner’s Thrive Capital, which has a plan to buy and turn around struggling companies by enhancing their productivity with AI.
&lt;/p&gt;&lt;p&gt;
Traditional private equity has been good for C-suite executives, but less so for the average worker. Many employees at PE-acquired companies complain of their new bosses making decisions that might boost balance sheet numbers in the short term but make no long-term sense, or paying themselves large bonuses while firing staff down to a skeleton crew. &lt;/p&gt;&lt;p&gt;
  Now it seems OpenAI will be directly involved in a company following in the footsteps of this grand tradition.&lt;/p&gt;&lt;p&gt;
AI in Action&lt;/p&gt;&lt;p&gt;

DeepSeek released a new version of its V3 model on Monday, which, according to some benchmarks, is on par with GPT-5 and Gemini 3.0 Pro. Expect as a result more hand-wringing in Washington and Silicon Valley about the degree to which Chinese AI is catching up to its American rival. 
  
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;And&lt;BR&gt;&lt;BR&gt;&lt;BR&gt; Databricks CEO says AGI is already here — and Silicon Valley just keeps moving the goalposts&lt;p&gt;
  In a bold assertion at the Goldman Sachs Communicopia + Technology Conference, Databricks CEO Ali Ghodsi claimed that artificial general intelligence (AGI) is already a reality, despite Silicon Valley&#39;s ongoing hesitation to accept this fact. Ghodsi remarked that current AI chatbots fulfill the criteria for AGI—defined as AI capable of human-like reasoning—according to standards established a decade ago.
&lt;/p&gt;&lt;p&gt;
&quot;Everyone would agree, but we keep shifting the goalposts,&quot; Ghodsi stated during the discussion, which was made public recently. He pointed out that instead of recognizing this achievement, the focus has transitioned to a more ambitious goal: superintelligence, which would surpass human reasoning capabilities. Ghodsi expressed concern that the industry&#39;s obsession with superintelligence is misguided, arguing that businesses should prioritize creating systems that can automate tasks effectively rather than striving to outsmart the best human intellects.
&lt;/p&gt;&lt;p&gt;
He emphasized that AGI already possesses the necessary capabilities for automation and developing intelligent agents, adding, &quot;We just need to focus on the routine tasks.&quot;
&lt;/p&gt;&lt;p&gt;
Databricks, headquartered in San Francisco, recently secured $1 billion in funding, bringing its valuation to over $100 billion. During the conference, Ghodsi noted that the rapid advancements in AI models appear to have plateaued. He explained that the scaling laws that have driven AI progress in recent years have reached a halt, with newer iterations such as OpenAI&#39;s GPT-5 and Anthropic&#39;s Claude 4 failing to deliver significant enhancements. &quot;Extracting value from the next large pre-trained model is becoming increasingly challenging,&quot; he remarked.
&lt;/p&gt;&lt;p&gt;
Ghodsi&#39;s comments emerge amid a divide in the tech sector regarding the pursuit of artificial superintelligence. Mustafa Suleyman, CEO of Microsoft AI, recently labeled superintelligence as an &quot;anti-goal&quot; on the &quot;Silicon Valley Girl Podcast.&quot; He expressed skepticism about the positive implications of such an advancement, underscoring the difficulty of aligning superintelligence with human values.
&lt;/p&gt;&lt;p&gt;
Conversely, other industry leaders remain committed to the quest for superintelligence. OpenAI&#39;s CEO, Sam Altman, has stated that the company is focused on this goal rather than stopping at AGI, envisioning superintelligent tools that could revolutionize scientific discovery and innovation. Altman speculated in a September interview that he would be surprised if the industry had not achieved superintelligence by 2030.
&lt;/p&gt;&lt;p&gt;
Similarly, Demis Hassabis, co-founder of Google DeepMind, projected a timeline for AGI&#39;s emergence within the next five to ten years, envisioning a future where AI systems possess a profound and nuanced understanding of the world, seamlessly integrated into daily life.
  
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;And&lt;BR&gt;&lt;BR&gt;&lt;BR&gt; 
  
Databricks CEO claims AGI exists, industry moved goalposts
  &lt;p&gt;
  
  Key Insight:  &lt;/p&gt;&lt;p&gt;
Databricks CEO Ali Ghodsi asserted that artificial general intelligence (AGI) already exists, suggesting the industry has simply moved the goalposts on what defines AGI. Speaking at Goldman Sachs’ September 10 conference, he noted that recent AI models like OpenAI’s GPT-5 and Anthropic’s Claude 4 are delivering diminishing returns, signaling that scaling laws have hit a wall. Databricks recently exceeded $4 billion in revenue run rate with AI products crossing $1 billion, highlighting the company’s significant growth alongside a valuation surpassing $100 billion, with talks underway to raise funds valuing it over $130 billion.&lt;/p&gt;&lt;p&gt;

Background:  &lt;/p&gt;&lt;p&gt;
The tech industry remains divided on the pursuit of superintelligence. While Databricks focuses on practical AI applications, leaders like Microsoft’s Mustafa Suleyman caution against pursuing artificial superintelligence, calling it an “anti-goal.” Meanwhile, OpenAI CEO Sam Altman expects superintelligence by 2030, and Google DeepMind’s Demis Hassabis forecasts AGI arrival within five to ten years. This split underscores contrasting visions on AI’s future direction amid rapid advances and growing market valuations.
&lt;/p&gt;&lt;p&gt;
  

    Databricks CEO says the industry has already achieved AGI — AI that can reason like a human.&lt;/p&gt;&lt;p&gt;
    Silicon Valley invented superintelligence to raise the bar, Ali Ghodsi said.&lt;/p&gt;&lt;p&gt;
    But the fixation with superintelligence is &quot;misdirected,&quot; and AGI is good enough for companies, he said.&lt;/p&gt;&lt;p&gt;

Databricks CEO says we already have artificial general intelligence. Silicon Valley just refuses to admit it.
  &lt;/p&gt;&lt;p&gt;
  Ali Ghodsi said at Goldman Sachs&#39; Communicopia + Technology Conference in September that AI chatbots already meet the definition of AGI — AI that can reason like a human — that researchers used a decade ago.
&lt;/p&gt;&lt;p&gt;
&quot;Everybody would say yes, but we kept moving the goalposts,&quot; Ghodsi said in the discussion, which was published Tuesday.
  &lt;/p&gt;&lt;p&gt;
&quot;Since we kind of achieved it, let&#39;s come up with something even bigger,&quot; he added, referring to the push toward superintelligence — AI that can reason far smarter than humans.
&lt;/p&gt;&lt;p&gt;
Ghodsi, who holds a doctorate in computer science, said the industry&#39;s goal of superintelligence is nowhere close using today&#39;s techniques. He also said the fixation with superintelligence is &quot;misdirected,&quot; adding that building systems to outsmart the world&#39;s brightest minds isn&#39;t what companies actually need.
    &lt;/p&gt;&lt;p&gt;

AGI &quot;has everything we need to be able to automate and build the agents,&quot; he said. &quot;We just need to do the boring work,&quot; he added.&lt;/p&gt;&lt;p&gt;

San Francisco-based Databricks raised $1 billion in September, which valued the company at over $100 billion.
    &lt;/p&gt;&lt;p&gt;
    
  


Ghodsi said at the conference that the era of giant leaps from AI models has slowed. The scaling laws that powered the last several years of AI progress have clearly &quot;come to a stop,&quot; and newer systems like OpenAI&#39;s GPT-5 and Anthropic&#39;s Claude 4 aren&#39;t delivering massive improvements.
&lt;/p&gt;&lt;p&gt;
&quot;It&#39;s getting harder and harder to get value out of the next pre-trained giant model,&quot; he said.
  &lt;/p&gt;&lt;p&gt;
  
  The debate on superintelligence
&lt;/p&gt;&lt;p&gt;
Ghodsi&#39;s comments come as the industry splits over whether building artificial superintelligence is even desirable.
&lt;/p&gt;&lt;p&gt;
Microsoft AI CEO said on an episode of the &quot;Silicon Valley Girl Podcast&quot; published Saturday that artificial superintelligence should be treated as an &quot;anti-goal.&quot;
  &lt;/p&gt;&lt;p&gt;
  Superintelligence &quot;doesn&#39;t feel like a positive vision of the future,&quot; said Mustafa Suleyman. &quot;It would be very hard to contain something like that or align it to our values.&quot;
&lt;/p&gt;&lt;p&gt;
Suleyman, who cofounded DeepMind before moving to Microsoft, said his team is instead aiming for what he calls &quot;humanist superintelligence&quot; — one that is grounded in human interest and values.
    
    &lt;/p&gt;&lt;p&gt;
    Other tech leaders are determined to achieve superintelligence.
&lt;/p&gt;&lt;p&gt;
OpenAI CEO Sam Altman said earlier this year that the company is building toward superintelligence, not stopping at AGI.
    &lt;/p&gt;&lt;p&gt;
    &quot;Superintelligent tools could massively accelerate scientific discovery and innovation well beyond what we are capable of doing on our own, and in turn massively increase abundance and prosperity,&quot; Altman said in January.
&lt;/p&gt;&lt;p&gt;
Altman said in an interview in September that he would be very surprised if the industry had not reached superintelligence by 2030. Altman has long described AGI as OpenAI&#39;s central mission.
    &lt;/p&gt;&lt;p&gt;
    Google DeepMind&#39;s cofounder, Demis Hassabis, has put forward a similar timeline. He said in April that AGI could arrive &quot;in the next five to 10 years,&quot; describing a future where AI systems understand the world &quot;in very nuanced and deep ways&quot; and are woven into everyday life.
    
    
  
    
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;And&lt;BR&gt;&lt;BR&gt;&lt;BR&gt; 
  
  
  Databricks Targets $100 Billion Valuation in New Funding Round
&lt;p&gt;
  Data analytics firm Databricks is reportedly hoping to become a $100 billion company.
  &lt;/p&gt;&lt;p&gt;
The business is finalizing a funding round that would give it that valuation, The Wall Street Journal reported Tuesday (Aug. 19), citing unnamed sources. Venture capital firm Thrive Capital is expected to co-lead the round, with Andreessen Horowitz also planning to invest.
  &lt;/p&gt;&lt;p&gt;
Databricks, which provides software that helps businesses analyze datasets, has grown as the artificial intelligence industry has blossomed, the report said. The company was valued at $62 billion following another funding round earlier this year.
  &lt;/p&gt;&lt;p&gt;
The company will use its new capital to compete in the race to attract AI talent, CEO Ali Ghodsi said, per the report. Databricks wasn’t planning another funding effort so soon, but prospective investors have been in touch daily.
  &lt;/p&gt;&lt;p&gt;
The funding round will also help Databricks postpone plans to go public, the report said.
  &lt;/p&gt;&lt;p&gt;
“The finance team tells me to not use this term, but I think Databricks has a shot to be a trillion-dollar company,” Ghodsi said, per the report. “But we have a lot of work ahead of us to get there.”
  &lt;/p&gt;&lt;p&gt;
Databricks said in June that it projects that its data warehousing business will nearly double in size this year. A company spokesperson said Databricks expects a $1 billion revenue run rate for Databricks SQL by the close of its fiscal year in January 2026, compared to a $600 million run rate in December 2024.
  &lt;/p&gt;&lt;p&gt;
Also in June, PYMNTS wrote about the challenges facing companies such as Databricks and Snowflake. When these firms rose to prominence, their success was bolstered by the growth of digital-first businesses, startups or cloud-native unicorns, which required scalable, agile infrastructure to drive their growth.
  &lt;/p&gt;&lt;p&gt;
“Cloud data warehouses and platforms were the answer, offering a way to store, manage and analyze data without the burdens of traditional IT infrastructure,” a June 11 report said. “However, as these cloud providers set their sights on the next phase of growth by targeting large, multinational enterprises with legacy systems, a different picture is emerging, one centered around capital budgets for mainframe modernization, enterprise resource planning (ERP) upgrade timelines and multiyear IT strategic plans.”  &lt;/p&gt;&lt;p&gt;

Financial filings and statements from the top cloud providers about their deal plans show that digital transformation in the enterprise space is a marathon, not a sprint.
  
  
  &lt;/span&gt;&lt;/b&gt;
  
&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
&lt;center&gt;  



&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/u09lVYvpW_k?si=pPyuD6UdJxdmkJkP&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;BR&gt;&lt;BR&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/2CG3P_3qJR4?si=8FLec_v4mbiOQlAH&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/center&gt;
  
  </description><link>https://thecomingnewworldorder.blogspot.com/2009/12/the-ceo-who-believes-agi-is-already-here.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKkO_5V-eY5w50cdPi0f1uljKfbtMoI6xFpu_gQDEtKb1QYr0NK7wRxFi-h1MCFW4IP_u2b418crwwdxNM6ba9hFaOneXEAlN9-izOK8pRW9xo6d3s4zaZj2bwi9M0jazPYqX_WO6U86nAAIGjprFT42K3FW8mH-p5rHwraSl2gmdehYVR3-6EdAjafes/s72-c/GettyImages-1177951661.webp" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3202151348987908778.post-1454726070086965086</guid><pubDate>Sun, 27 Dec 2009 04:29:00 +0000</pubDate><atom:updated>2025-12-01T23:09:17.763-06:00</atom:updated><title>Executive Order For AI Project Called Genesis Mission To Boost Scientific Discoveries</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img    height=&quot;468&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYE91bU8ord52kcF0x1fYUbP9g_QK_Zq6pnlB6I9yVjBNujytZiLf_v6L79XPBblsyqx088Lq5g6WXUWJ1hkHmyyKzy8sIuoFKyoIAfyzg79OcIo1CBMW82ruOZ8TmvUnyWnHVLh4ZOjaXG5hICrpYUWmi4CiUqf0qAsKxnQ2onD8yZ3Gh7g65KShsULc/s1600/Screenshot%202025-12-01%20at%2023-16-35%20589652125_1149584623997692_1131917136674300936_n.jpg%20%28JPEG%20Image%20472%20%C3%97%20590%20pixels%29.png&quot; width=&quot;629&quot;  onerror=&quot;this.style.display=&#39;none&#39;&quot; /&gt;

&lt;/div&gt;

&lt;p&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
President Donald Trump is directing the federal government to combine efforts with tech companies and universities to convert government data into scientific discoveries, acting on his push to make artificial intelligence the engine of the nation’s economic future.&lt;p&gt;

Trump unveiled the “Genesis Mission” as part of an executive order he signed Monday that directs the Department of Energy and national labs to build a digital platform to concentrate the nation’s scientific data in one place.
&lt;/p&gt;&lt;p&gt;
It solicits private sector and university partners to use their AI capability to help the government solve engineering, energy and national security problems, including streamlining the nation’s electric grid, according to White House officials who spoke to reporters on condition of anonymity to describe the order before it was signed. Officials made no specific mention of seeking medical advances as part of the project.&lt;/p&gt;&lt;p&gt;

“The Genesis Mission will bring together our Nation’s research and development resources — combining the efforts of brilliant American scientists, including those at our national laboratories, with pioneering American businesses; world-renowned universities; and existing research infrastructure, data repositories, production plants, and national security sites — to achieve dramatic acceleration in AI development and utilization,” the executive order says.
  &lt;/p&gt;&lt;p&gt;
  The administration portrayed the effort as the government’s most ambitious marshaling of federal scientific resources since the Apollo space missions of the late 1960s and early 1970s, even as it had cut billions of dollars in federal funding for scientific research and thousands of scientists had lost their jobs and funding.
&lt;/p&gt;&lt;p&gt;
Trump is increasingly counting on the tech sector and the development of AI to power the U.S. economy, made clear last week as he hosted Saudi Arabia’s Crown Prince Mohammed bin Salman. The monarch has committed to investing $1 trillion, largely from the Arab nation’s oil and natural gas reserves, to pivot his nation into becoming an AI data hub.
&lt;/p&gt;&lt;p&gt;
For the U.S.’s part, funding was appropriated to the Energy Department as part of the massive tax-break and spending bill signed into law by Trump in July, White House officials said.
&lt;/p&gt;&lt;p&gt;
As AI raises concerns that its heavy use of electricity may be contributing to higher utility rates in the nearer term, which is a political risk for Trump, administration officials argued that rates will come down as the technology develops. They said the increased demand will build capacity in existing transmission lines and bring down costs per unit of electricity.
&lt;/p&gt;&lt;p&gt;
Data centers needed to fuel AI accounted for about 1.5% of the world’s electricity consumption last year, and those facilities’ energy consumption is predicted to more than double by 2030, according to the International Energy Agency. That increase could lead to burning more fossil fuels such as coal and natural gas, which release greenhouse gases that contribute to warming temperatures, sea level rise and extreme weather.
&lt;/p&gt;&lt;p&gt;
The project will rely on national labs’ supercomputers but will also use supercomputing capacity being developed in the private sector. The project’s use of public data including national security information along with private sector supercomputers prompted officials to issue assurances that there would be controls to respect protected information.
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
America&#39;s GENESIS MISSION 
&lt;p&gt;

    &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;img    height=&quot;458&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEsA-86VbQ7c1S8ys0i-WbFmrZ8TVE4ZNIzQxU6DQwYvFI-DaIvbBeYMFZjdMI0Q6fyLxl2uBPyiGWVQ3IKQB6bk7g0PDqqKvJSiSnsmsoyjltMg9X0G1jt_XVhuKc_ukSqGJJb4QxyPaPLKJ1NRQZ8cMXE3Yeuy5TCFEbjnVuds5bM7TA7UrE2dQUIfU/s1600/Screenshot%202025-12-01%20at%2023-17-47%20Facebook.png&quot; width=&quot;699&quot;  onerror=&quot;this.style.display=&#39;none&#39;&quot; /&gt;

&lt;/div&gt;
  
  &lt;p&gt;
  On November 24, 2025, President Trump signed an executive order launching the Genesis Mission, described as “a national effort to use artificial intelligence to transform how scientific research is conducted and accelerate the speed of scientific discovery.” The Department of Energy (DOE) and its 17 national laboratories are put in charge of building what they call “the world’s most powerful scientific platform” by wiring together supercomputers, experimental facilities, AI systems, and scientific datasets across domains like energy, materials, fusion, quantum information, and biotechnology. The official DOE site says the goal is to double the productivity and impact of U.S. research and innovation within a decade by pairing scientists with AI systems that can reason, simulate, and experiment at high speed.
&lt;/p&gt;&lt;p&gt;
So what does the executive order actually do? It tells DOE to create a shared “American Science and Security Platform” and an AI experimentation environment that connects national-lab supercomputers, secure cloud environments, and decades of federally funded scientific data. The system is supposed to train “scientific foundation models,” deploy AI agents that can propose and test hypotheses, and even drive “robotic laboratories” where experiments are planned and executed in a feedback loop between AI and physical equipment. There are hard timelines attached: inventory computing resources within 90 days, identify priority datasets within 120 days, catalog robotic labs and production facilities within 240 days, and show an initial AI-driven capability for at least one national challenge inside 270 days. On paper, it’s about turning today’s scattered government AI efforts into one coordinated platform.&lt;/p&gt;&lt;p&gt;

That’s ambitious, but it is not Apollo- or Manhattan-scale. Apollo cost about $25.4 billion in 1960s dollars—roughly $250–280 billion in today’s money—and at its mid-1960s peak it consumed around 0.8% of U.S. GDP in a single year. The Manhattan Project cost about $2 billion by 1945 (over $30 billion in 2023 dollars) and amounted to roughly 1% of total U.S. wartime spending, employing about 130,000 people and building entire secret cities around a single objective: the first nuclear weapons. Genesis, by contrast, is an executive order that reorients existing programs and tells agencies how to use assets they already have. It’s strategically important, but it’s not a multi-hundred-billion-dollar crash program to build one world-changing artifact.
&lt;/p&gt;&lt;p&gt;
Funding is where the gap really shows. Politico reports that Genesis is backed by the broader “One Big Beautiful Bill Act,” but the executive order itself functions mainly as an internal directive; it doesn’t write a giant check on its own. DOE’s Genesis materials talk about unifying existing supercomputers and experimental facilities, not constructing many new ones from scratch. Meanwhile, private and public AI spending is exploding on a completely different scale: Gartner estimates worldwide AI spending will reach nearly $1.5 trillion in 2025, spanning software, services, and the hardware that powers modern AI data centers. Market analysts put the global AI market itself at roughly $390 billion in revenue in 2025, with projections into the multi-trillion-dollar range by the early 2030s. In other words, the truly massive capital flows are still in the private sector GPU farms, not the national-lab machines Genesis is trying to coordinate.
&lt;/p&gt;&lt;p&gt;
That said, national-lab infrastructure isn’t trivial. DOE’s 17 labs already host some of the world’s most powerful supercomputers and unique experimental facilities, from fusion and particle-physics machines to light sources and nanoscale imaging capabilities. Some of those machines were designed for large-scale simulations on traditional CPUs rather than the GPU-heavy architectures that dominate modern AI, which is part of why there’s tension between the old HPC world and the new AI-training clusters. Genesis tries to bridge that gap by plugging lab supercomputers and experimental instruments into a common platform that can generate new, high-fidelity datasets and feed them straight into AI models. From a hardware perspective, it’s less about conjuring a completely new supercomputer out of nowhere and more about networking and repurposing the ones we already have.&lt;/p&gt;&lt;p&gt;

Where  Genesis does matter is in the cultural and funding signal it sends. The fact sheet and DOE copy hammer on one phrase: “accelerate AI for scientific discovery.” In practice, when Washington plants a flag like that, it reshapes how grants are written and reviewed. A UNCTAD issues paper on AI in science notes that AI could plausibly double the pace of R&amp;D in some sectors and that more than half of surveyed researchers already expect AI tools to be “very important or essential” to their work. We’ve seen this pattern before: after COVID-19 showed what mRNA vaccines could do, there was a worldwide surge of mRNA-related trials and R&amp;D targeting cancer and other diseases beyond COVID itself. When a technology becomes the “method du jour,” it attracts funding—and that funding inevitably comes at the expense of other approaches. Genesis is essentially saying: if you want to work on certain national priorities, you’d better have an AI-for-science angle in your proposal.
&lt;/p&gt;&lt;p&gt;
This isn’t happening in a vacuum. Earlier in 2025, China rolled out its broader “AI Plus” strategy, which explicitly highlights “AI for Science (AI4S)” as a new paradigm for research, especially in energy, materials, and other high-tech sectors. International analyses describe a dedicated Chinese “AI for Science initiative” aimed at integrating AI with open science, building AI-driven research platforms, and using embodied AI and robotics in real-world scientific scenarios. On the European side, the EU’s Horizon Europe and Digital Europe programs are already investing over €1 billion per year in AI, with a stated goal of mobilizing around €20 billion of annual AI investment across the bloc by the end of the decade. In November 2025 the Commission also launched “Resource for AI Science in Europe” (RAISE), including new calls to fund domain-specific foundation models for areas like materials science and climate. Genesis is, in part, the U.S. answering those moves.
&lt;/p&gt;&lt;p&gt;
Some of the Genesis language about “robotic laboratories” can sound more sci-fi than it really is. Labs have been using automation for decades—from pipetting robots in PCR workflows to high-throughput screening systems in drug discovery—so the idea of AI-coordinated lab equipment isn’t a total novelty. What is new is the ambition to close the loop: connect experimental gear, simulations, and AI models so that the system can propose experiments, run them, analyze results, and iterate with minimal human intervention. UNCTAD’s survey of “robot scientists” and AI-driven autonomous experimentation shows this is technically feasible in some domains already, especially in materials and nanotechnology. Genesis essentially tries to scale that up across multiple fields using government data and infrastructure.
&lt;/p&gt;&lt;p&gt;
Genesis is not “the Apollo Program for AI,” and it’s not “a new Manhattan Project.” The historical mega-projects were single-minded, insanely expensive bets on creating one transformative capability. Genesis is a policy and coordination push: it reorganizes the scientific data we already have, aligns national-lab computing around AI-for-science use cases, and sends a loud signal to universities, grant reviewers, and companies that using AI in scientific work is now an expectation rather than a fringe idea. That might not make for dramatic headlines, but it will influence where people, compute, and money flow over the next decade—and wherever those three go together, interesting things tend to follow.
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
Trump’s AI ‘Genesis Mission’: what are the risks and opportunities?

  
&lt;p&gt;
The White House has launched a plan to accelerate research in the United States, by building artificial intelligence (AI) models on the rich scientific data sets held by the country’s 17 national laboratories, as well as harnessing their enormous computing resources.&lt;/p&gt;&lt;p&gt;

An executive order issued on 24 November instructs the US Department of Energy (DoE) to create a platform through which academic researchers and AI firms can create powerful AI models using the government’s scientific data. Framed as part of a race for global technology dominance, it lists collaborations with technology firms including Microsoft, IBM, OpenAI, Google and Anthropic, as well as quantum-computing companies such as Quantinuum. Such a vast public–private partnership would give companies unprecedented access to federal scientific data sets for AI-driven analysis.
&lt;/p&gt;&lt;p&gt;
The effort, dubbed the Genesis Mission, aims to “double the productivity and impact of American research and innovation within a decade”, in a variety of fields from fusion energy to medicine. The project expects to “unlock breakthroughs in medicine, energy, materials science and beyond”, says Michael Kratsios, the US president’s science adviser. It also aims to build AI agents — general models with the ability to harness tools such as specialized software and coding suites — that can generate hypotheses and automate research workflows.
&lt;/p&gt;&lt;p&gt;
Labs around the world are already training AI systems on scientific data, to boost their capabilities in scientific domains and attempting to use AI models to make discoveries. But some researchers remain sceptical that general AI tools are capable of making truly fresh insights, and warn that their inherent flaws make the value of agents unclear.
&lt;/p&gt;&lt;p&gt;
  The new US initiative formalizes and expands ongoing AI research efforts by the administration of President Donald Trump. “The impact is that it enables many more scientists and researchers to have access to all of the infrastructure that they need to explore important scientific questions that the country cares about,” says Lynne Parker, a robotics engineer at the University of Tennessee, Knoxville, who led AI-policy initiatives for the administrations of Trump and his predecessor, Joe Biden, but was not involved in the current initiative. “That really has not been possible before.”
&lt;/p&gt;&lt;p&gt;
  
  Trump’s team has been working to funnel money and attention to AI projects even as it tries to gut federal research spending more broadly. The White House has the power to shape the direction of research at the DoE’s network of national laboratories. It did not give an estimated price tag for the AI initiative; any extra funding beyond the laboratories’ normal budgets would have to be approved by the US Congress.
&lt;/p&gt;&lt;p&gt;
Nature looks at how the project might affect researchers and AI companies, and its promises and risks.
What are government-funded scientists being asked to do?
&lt;/p&gt;&lt;p&gt;
The scale and timeline of the plan is ambitious. In 60 days, the DoE is expected to create a list of 20 potential science and technology challenges for the project to tackle, in areas of national priorities such as nuclear fusion, quantum information science and crucial materials. The agency is supposed to create a full inventory of available federal computing resources and identify initial data assets to use, then work out how to safely include external data sets. The administration expects to demonstrate the platform’s capability for one of these research challenges in nine months.
&lt;/p&gt;&lt;p&gt;
These early steps will probably build on projects that are already under way at the national laboratories. For instance, Oak Ridge National Laboratory in Tennessee has been working on advancing AI research using a hybrid approach that uses both quantum and classical computing. Lawrence Berkeley National Laboratory in California is using AI to find ways to speed up network traffic.&lt;/p&gt;&lt;p&gt;
  
  The “DoE has been making a case for ‘AI for science’ for over seven years, and this executive order is the starting pistol to get on with it”, says Michael Norman, an astrophysicist at the University of California, San Diego, and former director of the San Diego Supercomputer Center. “It is an exciting direction indeed.”
What are companies being asked to do?&lt;/p&gt;&lt;p&gt;

The project has named more than 50 collaborating companies, including some that have already been working on their own ‘AI scientists’. FutureHouse, a start-up based in San Francisco, California, for instance, launched a commercially available, AI-driven research platform earlier this month.
&lt;/p&gt;&lt;p&gt;
The precise role of these private companies in the Genesis plan remains unclear — although Trump’s executive order says the project will entail “collaboration with external partners possessing advanced AI, data, or computing capabilities or scientific domain expertise”. Such partnerships could include research agreements to jointly develop technologies, or a user-facility agreement for external researchers to conduct work in government facilities. Chip-manufacturing and computer companies such as NVIDIA, Advanced Micro Devices and Hewlett Packard Enterprise have reportedly agreed to build facilities in national labs, according to a report by The New York Times. &lt;/p&gt;&lt;p&gt;
  
  
  Some partnerships are already under way. In October, for instance, Argonne National Laboratory in Illinois announced a partnership with NVIDIA and technology firm Oracle to build two next-generation AI supercomputing systems. At least two national laboratories already have arrangements with the company OpenAI, based in San Francisco, California, to host local AI models that can process classified data on computers in the facilities. In February, the company held an ‘AI jam session’ with researchers from nine US national labs that allowed scientists to test the use of OpenAI’s reasoning models in their specific domains.
What are the opportunities?&lt;/p&gt;&lt;p&gt;

The new Genesis Mission is meant to provide “secure access to appropriate datasets, including proprietary, federally curated, and open scientific datasets, in addition to synthetic data generated through DOE computing resources”, according to the executive order. Creating a national-scale platform that harnesses rich data sets usually housed in the walls of the national laboratories could be a boon for researchers. Although task-specific models such as the protein-folding model AlphaFold were built on open scientific data sets, general-purpose AI systems such as OpenAI’s GPT-5 are thought to be largely built on data scraped from the Internet. 
  


  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;Also:
  
  &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
The US just launched a $100 Billion Manhattan Project for AI called Genesis. Here is the massive scope of what they are actually building. The Genesis Mission is America’s new bet to double scientific productivity with AI, Fusion, and Quantum Supremacy. 
  &lt;/p&gt;&lt;p&gt;

  
  On Nov 24, 2025, the US launched the Genesis Mission, a massive public-private initiative framed as a &quot;Manhattan Project for AI.&quot;
&lt;/p&gt;&lt;p&gt;
    Cost: Estimated $100+ Billion (Including $50B from AWS).
&lt;/p&gt;&lt;p&gt;
    Goal: Double US science/engineering productivity in 10 years.
&lt;/p&gt;&lt;p&gt;
    Tech: Integrates all 17 National Labs, 3 Exascale Supercomputers, and Quantum centers.
&lt;/p&gt;&lt;p&gt;
    Why? To secure dominance in AI, Fusion Energy, and Biotech against global competitors (primarily China).
&lt;/p&gt;&lt;p&gt;
The United States just initiated one of the largest scientific reorganizations in its history. If you haven&#39;t heard of the Genesis Mission yet, you will soon. It is effectively an Apollo Program for Artificial Intelligence.
&lt;/p&gt;&lt;p&gt;
Here&#39;s some of the details of the sheer scale of this effort, how it compares to historical megaprojects, and the massive energy challenges it faces.&lt;/p&gt;&lt;p&gt;

    The Scale: How does it compare to Apollo &amp; Manhattan?
&lt;/p&gt;&lt;p&gt;
The government isn&#39;t building a bomb or a rocket this time; they are building a platform. The goal is to connect all federal data, supercomputers, and labs into a single &quot;closed-loop discovery engine.&quot;&lt;/p&gt;&lt;p&gt;

Here is how Genesis stacks up against America&#39;s most famous scientific sprints:&lt;/p&gt;&lt;p&gt;
Project 	Cost (Adjusted for Inflation) 	Duration 	Direct Workforce 	Primary Output&lt;/p&gt;&lt;p&gt;
Manhattan Project 	~$30 Billion 	3 Years 	~130,000 	The Atomic Bomb&lt;/p&gt;&lt;p&gt;
Apollo Program 	~$257 Billion 	12 Years 	~400,000 	Moon Landing&lt;/p&gt;&lt;p&gt;
Genesis Mission 	$100+ Billion* 	10 Years 	40,000+ 	AI Science Platform&lt;/p&gt;&lt;p&gt;

*Note: The $100B figure includes massive private sector commitments, such as a $50B infrastructure investment from AWS alone.
&lt;/p&gt;&lt;p&gt;
2. The Exascale Arsenal&lt;/p&gt;&lt;p&gt;

The backbone of this mission isn&#39;t standard cloud servers; it&#39;s the &quot;Exascale Arsenal&quot;—the three fastest supercomputers in the world, all located at DOE National Labs.&lt;/p&gt;&lt;p&gt;

    El Capitan (Lawrence Livermore Lab): 1.742 ExaFLOPS (Nuclear stewardship)&lt;/p&gt;&lt;p&gt;

    Frontier (Oak Ridge Lab): 1.353 ExaFLOPS (Open science)&lt;/p&gt;&lt;p&gt;

    Aurora (Argonne Lab): 1.012 ExaFLOPS (Scientific discovery)&lt;/p&gt;&lt;p&gt;

Combined Power: &gt;4 ExaFLOPS. To put that in perspective, an &quot;ExaFLOP&quot; is a quintillion calculations per second. This is roughly the computational power of the human brain, but focused entirely on math and simulation.
&lt;/p&gt;&lt;p&gt;
3. The Energy Crisis &amp; Infrastructure Reality&lt;/p&gt;&lt;p&gt;

One of the biggest drivers for Genesis is the exploding energy cost of AI. The US infrastructure is hitting a physical wall, and the numbers are staggering.&lt;/p&gt;&lt;p&gt;

The Current US Data Center Footprint:
&lt;/p&gt;&lt;p&gt;
    Total Facilities: ~5,427 data centers (The US is the world&#39;s largest data center hub).
&lt;/p&gt;&lt;p&gt;
    Hyperscale Centers: ~614 facilities (The US holds 54% of global hyperscale capacity).
&lt;/p&gt;&lt;p&gt;
    Power Demand: 183 TWh in 2024 (Already 4% of total US electricity).
&lt;/p&gt;&lt;p&gt;
The Projected &quot;AI Boom&quot; Impact (2030):
&lt;/p&gt;&lt;p&gt;
    Electricity Usage: Projected to hit 426 TWh (Rising to 9% of total US electricity). Some estimates (Goldman Sachs) put this even higher at &gt;10%.
&lt;/p&gt;&lt;p&gt;
    Capacity Growth: Total capacity is expected to nearly triple from ~50 GW (2024) to 134.4 GW (2030).
&lt;/p&gt;&lt;p&gt;
Genesis aims to solve this by using AI to accelerate Fusion Energy and Advanced Nuclear designs. It is a race against time: can AI invent clean energy solutions faster than AI consumes the grid?
&lt;/p&gt;&lt;p&gt;
4. Who is involved?

This is a Public-Private hybrid. The government provides the labs and the &quot;Crown Jewel&quot; datasets (nuclear data, material science records), while Big Tech provides the cloud and chips.
&lt;/p&gt;&lt;p&gt;
    Public: 17 Department of Energy National Labs (Oak Ridge, Los Alamos, etc.)
&lt;/p&gt;&lt;p&gt;
    Private: AWS, NVIDIA, Microsoft, Google, IBM, OpenAI, Anthropic.
&lt;/p&gt;&lt;p&gt;
    Quantum: 5 National Quantum Information Science Research Centers.
&lt;/p&gt;&lt;p&gt;
    Why now?&lt;/p&gt;&lt;p&gt;

The executive order explicitly frames this as a strategic competition. Just as the Cold War was decided by nuclear dominance, the belief is that the 21st century will be decided by Computational Supremacy.
&lt;/p&gt;&lt;p&gt;
The objective is audacious: Double the productivity of American science. Imagine discovering new cancer drugs, battery materials, or fusion reactor designs in months rather than decades.
&lt;/p&gt;&lt;p&gt;
Do you think a centralized Manhattan Project approach works for something as broad as AI, or is this just throwing money at Big Tech? 
    
  
&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;
&lt;center&gt;  




&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/wthJbgcw8EU?si=2i1eJ7PzyB8V4iCm&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;BR&gt;&lt;BR&gt;&lt;iframe width=&quot;740&quot; height=&quot;455&quot; src=&quot;https://www.youtube.com/embed/TMugtmnBLcY?si=lKa5aCDRDVjUFdS5&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/center&gt;
  
  </description><link>https://thecomingnewworldorder.blogspot.com/2009/12/executive-order-for-ai-project-called.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYE91bU8ord52kcF0x1fYUbP9g_QK_Zq6pnlB6I9yVjBNujytZiLf_v6L79XPBblsyqx088Lq5g6WXUWJ1hkHmyyKzy8sIuoFKyoIAfyzg79OcIo1CBMW82ruOZ8TmvUnyWnHVLh4ZOjaXG5hICrpYUWmi4CiUqf0qAsKxnQ2onD8yZ3Gh7g65KShsULc/s72-c/Screenshot%202025-12-01%20at%2023-16-35%20589652125_1149584623997692_1131917136674300936_n.jpg%20%28JPEG%20Image%20472%20%C3%97%20590%20pixels%29.png" height="72" width="72"/></item></channel></rss>