- THE
SPIDER SPINS AND EVERMORE INTRICATE WEB
-
- Peoples greatest
fear of technology has always been the spectre of George Orwell's
'1984' totalitarian state becoming fact, with its prediction
of people being branded with bar codes and the ever watchful
Big Brother.
- But hey it was
only a story, right.
-
-
- The fact is
today George Orwell's piece of fiction has become reality in
many respects.
- The advent of
computer technology has moved the cloak and dagger world
of yesterday into a realm of hi-tech snooping that even science
fiction writers would find hard to believe.
- Bar-codes, who
needs bar-codes to track people! People can be tracked using
their mobile phones / computers / Internet tv's / CCTV / Geo-positioning
systems / credit cards and ATM transactions, basically any piece
of hardware that interconnects to the communications super highway
is a means of tracking an individual, and the more reliant individuals
become on computer technology the easier it is to track them.
-
- PLEASE
CLICK ON THESE IMAGES FOR A LARGER PICTURE
-
- IMAGES
COURTESY OF CHRISTIAN DE SOUSA'S PORTFOLIO
-
- 20 years ago
all the government agencies from health to tax in the western
and technologically advanced countries of the world, started
transferring their paper records to computerised ones.
- All these agencies
created huge databases relating to the lives of the people contained
on it and disposed of large amounts of the then thought of as
redundant paper.
- "The
computer would create the paperless office" was a pivotal statement
from all sources connected with the computer industry.
- This led to
some concerned individuals questioning the security of these
databases and the uses the Spider could put them to.
- The governments
of the US and the UK brought out 'Data Protection Acts' to
placate these concerns with the promise that the merging of these
databases for the utilisation of prying into personal individuals
or groups would not occur.
- Well it is happening
now anyway.
-
- Groups of people
by race / creed / sexually / age / gender and any other distinguishing
factors are held on various government databases and on so called
Mailing Lists which are sold to financial institutions
/ direct advertisers etc.
- Where do you
think all those junk mail people get your details from.
- Credit referencing
agencies also hold information on all individuals above the age
of 18 years old. The information they hold is not always correct,
but the information is used by banks and stores when you apply
for credit.
- Ever been refused
credit as a bad risk when you have never owed a penny to anyone
in your life?
- Well the reason
is that you have no credit history. If you have never had credit
it is extremely hard to get credit based on the rating system
employed by these credit agencies.
- The way your
bills are paid and the frequencies of payments both early and
late, are used to construct a credit profile along with the way
your bank account is being managed.
-
- The Spider
is driving everyone to pay all their bills electronically and
away from using hard currency.
- The traceability
of hard cash is neigh on impossible, where as the accountability
of electronic transactions is controllable, and if you control
the money, you control the people.
- 20 years ago
most people were paid in cash and credit cards were for the few.
- Nowadays most
people are paid by direct transfer into their bank accounts and
people being paid by cash is nearly nonexistent, apart from people
working in the 'Black Economy' (moonlighters and part
time shop employees..etc).
-
- The way people's lives are being
controlled today is not by coercion, it is by food and finance.
- The developing world is controlled
by food aid or the lack of it, supplied by the Western nations.
- If the Spider deems a
nation unfriendly then no aid is sent.
- The Ethiopian famines of the
1970's and 1980's which were widely predicted by the West, are
cases in point.
- Millions of people were starving
and if it wasn't for the concerted efforts of independent aid
agencies and individuals bringing the plight of these people
to worldwide attention, then it is my belief that the Spider
would have let them suffer.The sole reason being that the government
of Ethiopia was communist and deemed unfriendly.
-
- Financial control is applied
to Third World countries by the repayment of 'Third World
Debt'.
- In it's simplest form it is
the money loaned to a third world country by the West to improve
its infrastructure and the interest which these countries have
to repay on that loan. Which in some cases is greater than that
country's 'Gross National Product'.
- The goods and services in the
form of medicines and technology to build water purification
plants / schools / roads and hospitals
is supplied by the West.
- The West will not loan money
to a unstable government, so the West insists on its own people
being in power to protect its financial investment or at least
being one of the candidates in a 'free election'.
-
- This scenario was inflicted
on Jamaica in the 1970's and resulted in Edward Seaga (rumoured
CIA puppet), being pitted against Mr Manley (elected prime minister
of Jamaica) in the election campaigns.
- Over 900 people were murdered
by JLP (Jamaican Labour Party) and PNP (People's National
Party) gun gangs.
- It was one of the worst blood
baths in the history of Jamaica and the aftermath continues to
the present day.
- This was the birth of the so
called 'Yardies'.
- Edward Seaga won the election
in 1980 and was able to borrow $698 million from the IMF
(International Monetary Fund), plus $100 million from the USA
which would not have been loaned had Mr Manley's party won the
election.
- A condition of the loan was
that Jamaica accept US military assistance in eradicating the
ganja fields, using flame-throwers deployed from helicopters.
- "Police
in helicopter"
- "Bunning
Marijuana"
- Lyrics from a 1985
song by John Holt called 'Police In Helicopter'
-
- It also insists on the country
being able to defend itself from outside interference and to
ensure this requirement is met, it is a condition that the country
buys weapons to bolster its armed forces to ensure its sovereignty
(sic).
- These weapons are purchased
from the West! The money comes out of the economic aid supplied.
- So if money which is intended
for humanitian aid is used to buy guns, then there is not much
left to buy medicines and food.
-
- The West can demand immediate
repayment of all outstanding loans and bankrupt the said country
,because all Third World countries have defaulted
on their loans. Based on the intelligence supplied by its agencies
(Spider) in relationship to the real or perceived (totally
made up by the Spider), threat to the political stability
of the said country.
- If a country has no hard currency
it cannot buy the essential imports it needs like medicines and
pay for doctors and teachers. This makes it totally reliant on
the West and the Spider has control of a sovereign state
and its people.
- The Spider not the Western
governments in effect has life or death control over millions
upon millions of people
-
There is a program called
'Pretty Good Privacy' which is very good at encrypting
your e-mails and securing the content.
- The NSA which
was part of the process which granted this program certification,
would now like it banned because it is having great difficulty
in breaking the encryption with the speed it requires due the
amount of user only variables.
- There are decoding
chips which has been developed by the NSA one of which
is called 'Clipper'.
- 'Clipper'
has the
ability to read encrypted mail in real time and is but one among
many electronic scanner chips being used by the Spider.
-
- When Microsoft
released 'Windows 98' it included a piece of stealth
code called GUID (Global Unique IDentifier)
which when the user logged on to the Microsoft web site
to register the Windows 98 (which they are required to do to
obtain support from Microsoft); uploaded all the software / settings
/ names and configuration on that users pc to a Microsoft database
along with the GUID number. So now Microsoft had the exact
pc configuration of anyone who had registered 'Windows 98'
allied to a GUID number. The name was not chosen by accident
and this is why.
- Global means
just that, because Microsoft also included in the Stealth code
a means by which the GUID number was encoded into any
document / spreadsheet / e-mail / image created on that pc. Even
though Microsoft only admitted that 'Office '98'
documents were encoded. Which meant that say you where asked
by a friend who lived on the other side of the world to create
for them a database template. You create the template, transfer
it to a floppy disk. This disk you send by post to your friend
and they load it on to their computer to use it.
- They take the
completed database to work and it is used by the company that
they work for as a client database.
- If Microsoft
or the Spider gains access to that database they will
be able to tell who originally created that database template,on
what machine and time it was created and more importantly who
created it.
-
- Intel also came up with a
similar idea when it released its 'Pentium 3' chip.
- It included
a 'PSN' (Personal Security Number) encoded into the chip.This
also would have done the exact same thing as the 'GUID'.
Intel said that the PSN was there as a security aid to
track and stop the theft of processor chips.
- Both the above
features now have patches freely available to disable them.
- Oh yes,by the
way when both these features were discovered the companies concerned
denied that they existed, and it was only under
the enormous amount of proof to the contrary that they admitted
it.
- It makes you
wonder who would benefit from being able to track documents this
way doesn't it?
-
- I know that there are those
among you now asking the question;
- "If they knows this
about the Web, why have they got a web site?"
-
- Well if you read the opening
statement of this site you would have seen that we want it to
be a means of education for all, and with the explosion in home
based computer users on the web, what better place to post a
piece of educational material.
- Computers themselves are
not at fault it is the shadowy people in the background you have
to be worried about, and anyway, now you also know!
-
-
-
- To parody one of my own phrases:
- DEEP IN THE HEART OF THE
WEB, THE SPIDER IS WAITING FOR YOU TO ARRIVE!!!!!!!!!
-
Home
Page
ALL
IMAGES AND TEXT COPYRIGHT © Falasha recordings