RFID chip: Foundation of the electronic jail
Many new technology is often used first by the army. Sometime later, the technology (in a diluted version then) becomes available to the people. This also applies to the Internet, GPS systems, and finally chipping everything and everyone. Vehicles and soldiers are now equipped with GPS systems. Soldiers still carry a chip on/in their clothing. But the danger of loss or abuse of the chip by the enemy, for example, after killing a soldier, makes the reality to chip the soldiers themselves, a bit closer. One obstacle could be that the costs of such operations are too high.
In 2002, A family in America was the first family in the world who had a VeriChip implanted. The reasons were the unstable health of man and the fear that arose after 9/11. Now I will be the last person who would ban a chip to take it when his/her health or safety can benefit from it. But when will the governments, banks and insurance companies impose on the masses? Under the disguise of bringing down the cost of medical care, economic facilities, or the occurrence of hysteria? It is also not known what the effects of a continuous chip is or can be.
But also companies are starting to consider chipping their employees, also chipping in the nightlife seems to be a trend with such a chip to pay. As in the Baja Beach Club in Rotterdam.
This payment option is now offered with the iPhone and Web browser. IBM will make it especially easy for the consumer or as another way to put it: for the benefit of the buyer (Arent they nice, IBM, the inventors of the Holleriths Gascamp Jew Registration system)
At several schools in England and America children already pay with a type of chip system. And let’s not forget: the Colleges in the Netherlands, were you can only pay with a “chipknip” this is to condition everyone (young and young adults) to the idea that electronic payment is normal. That the youngsters are being pushed toward electronic payment, is obvious. In Belgium, at some childcare centre’s its only possible to enter, after having your fingerprint scanned.
The history of marking people
Wanting to register and mark all humans is older than the road to Rome. A road to totalitarian control or just for prosperity and ease? That remains to be seen. But people have always been branded or maimed to make their status or the being-in-service-of (slavery) clear.
For many people, the Holocaust is know as one of the most extreme forms of registration. The Jewish prisoner workers were marked with a code on their arms. This code fits a system created by IBM. Although IBM denies any involvement or to have known anything of the purpose for which their registration system was used, the facts show something else.
However you put it, the Nazis could have never tracked down, divide and execute the Jews so fast without computer giant IBM. But IBM was not unique in their special collaboration with the Nazis. So you can also include steel Krups, IG Farben, Shell and people like seniors Prescott Bush and Rothschild. Why IBM was not subsequently prosecuted? For example, during the Nuremberg trials. Well just because they were part of the elite that the war had supported and encouraged. The fact is that many companies were pardoned after the war. The fact that they were wrong was concealed. Perhaps one reason that IBM has been slipping thru the hoops of the law is, the fact that they had invented a simultaneous translation system, in which the Nuremberg trials could be conducted in a language understood by all, yet. The same company (IBM) and other companies are now on the eve of a further Executive system: the chipping of humans. IBM has used the latest techniques in creating a system that not only can track someone’s every move, but it can also predict it, then secretly send that information to company’s for use, for example, by giving you ads based on a given profile.
Author Edwin Black, known for the book “IBM and the Holocaust”, presents his findings in the next documentary about IBM and the Holocaust. Ask yourself why you never had this taught in schools? The system IBM has made is actually still used today. Only then smarter, faster and more unnoticed in driving an authoritarian totalitarian state. The coding system that IBM then used, is today among the people known as the barcode. The barcode has already been replaced by the RFID-chip: a chip where all data can be stored and can be read remotely. Is this a danger, or are the people who are against the chip are afraid of change? A common defense by too gullible people. VeriChip is one of the biggest driving forces behind the chipping of humans. They propagate the chip under the banner of freedom, human rights and free will. But what’s behind? Quite the opposite. The reversal technique: war is peace, love is hate, truth is falsehood. Any technique which can help people in their progress may, in the wrong hands, bring total tyranny and misery
The dangers of the VeriChip.
Animals have already been chipped so that their owners are easy to trace back: by loss or for veterinary medical information needs. But how safe are these chips and what after studies have been done? You would expect from the Dutch Party for the Animals, to be strongly against this, given that the animal eventually will be severely suffering. From an extensive research in the U.S, where the research was blocked by the manufacturer VeriChip, chipping of animals has serious implications for the health of the animal, such as: an increased risk of cancer. But of course there is little to be found about this on their website. The people of the Party for the Animals, apparently know nothing of such. Maybe time for an email? The leak of the investigation (by an employee) was in fact almost the bankruptcy of Verichip. Ultimately, the company was taken over and they put their deceptive activity’s under the name “PositiveID.” Exactly people, everything is positive and will benefit your convenience and sense of security……..
In response to the abuses during the Second World War, many European countries changed their national legislation accordingly. There were provisions in the legislation that everyone has the right of self-determination over their own bodies. But with this there is already a discussion about co-compulsory vaccinations, abortion and donor registration. There are already several websites and organizations engaged on this issue. We will therefore approach and support in every way imaginable. One such organization is “We the People Will Not be chipped”. Another important step is to inform people early before the authority’s and their
propaganda deceptions are being unleashed upon us.
The History of RFID Technology
Radio frequency identification has been around for decades. Learn how it evolved from its roots in World War II radar systems to today’s hottest supply chain technology.
By Mark Roberti
It’s generally said that the roots of radio frequency identification technology can be traced back to World War II. The Germans, Japanese, Americans and British were all using radar—which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson-Watt—to warn of approaching planes while they were still miles away. The problem was there was no way to identify which planes belonged to the enemy and which were a country’s own pilots returning from a mission.
The Germans discovered that if pilots rolled their planes as they returned to base, it would change the radio signal reflected back. This crude method alerted the radar crew on the ground that these were German planes and not Allied aircraft (this is, essentially, the first passive RFID system).
Under Watson-Watt, who headed a secret project, the British developed the first active identify friend or foe (IFF) system. They put a transmitter on each British plane. When it received signals from radar stations on the ground, it began broadcasting a signal back that identified the aircraft as friendly. RFID works on this same basic concept. A signal is sent to a transponder, which wakes up and either reflects back a signal (passive system) or broadcasts a signal (active system).
Watson-Watt with the first radar apparatus
Advances in radar and RF communications systems continued through the 1950s and 1960s. Scientists and academics in the United States, Europe and Japan did research and presented papers explaining how RF energy could be used to identify objects remotely. Companies began commercializing anti-theft systems that used radio waves to determine whether an item had been paid for or not. Electronic article surveillance tags, which are still used in packaging today, have a 1-bit tag. The bit is either on or off. If someone pays for the item, the bit is turned off, and a person can leave the store. But if the person doesn’t pay and tries to walk out of the store, readers at the door detect the tag and sound an alarm.
The First RFID Patents
Mario W. Cardullo claims to have received the first U.S. patent for an active RFID tag with rewritable memory on January 23, 1973. That same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A card with an embedded transponder communicated a signal to a reader near the door. When the reader detected a valid identity number stored within the RFID tag, the reader unlocked the door. Walton licensed the technology to Schlage, a lock maker, and other companies.
The U.S. government was also working on RFID systems. In the 1970s, Los Alamos National Laboratory was asked by the Energy Department to develop a system for tracking nuclear materials. A group of scientists came up with the concept of putting a transponder in a truck and readers at the gates of secure facilities. The gate antenna would wake up the transponder in the truck, which would respond with an ID and potentially other data, such as the driver’s ID. This system was commercialized in the mid-1980s when the Los Alamos scientists who worked on the project left to form a company to develop automated toll payment systems. These systems have become widely used on roads, bridges and tunnels around the world.
At the request of the Agricultural Department, Los Alamos also developed a passive RFID tag to track cows. The problem was that cows were being given hormones and medicines when they were ill. But it was hard to make sure each cow got the right dosage and wasn’t given two doses accidentally. Los Alamos came up with a passive RFID system that used UHF radio waves. The device drew energy from the reader and simply reflected back a modulated signal to the reader using a technique known as backscatter.
Later, comanies developed a low-frequency (125 kHz) system, featuring smaller transponders. A transponder encapsulated in glass could be injected under the cows skin. This system is still used in cows around the world today. Low-frequency transponders were also put in cards and used to control the access to buildings.
Over time, companies commercialized 125 kHz systems and then moved up the radio spectrum to high frequency (13.56 MHz), which was unregulated and unused in most parts of the world. High frequency offered greater range and faster data transfer rates. Companies, particularly those in Europe, began using it to track reusable containers and other assets. Today, 13.56 MHz RFID systems are used for access control, payment systems (Mobile Speedpass) and contactless smart cards. They’re also used as an anti-theft device in cars. A reader in the steering column reads the passive RFID tag in the plastic housing around the key. If it doesn’t get the ID number it is programmed to look for, the car won’t start.
In the early 1990s, IBM engineers developed and patented an ultra-high frequency (UHF) RFID system. UHF offered longer read range (up to 20 feet under good conditions) and faster data transfer. IBM did some early pilots with Wal-Mart, but never commercialized this technology. When it ran into financial trouble in the mid-1990s, IBM sold its patents to Intermec, a bar code systems provider. Intermec RFID systems have been installed in numerous different applications, from warehouse tracking to farming. But the technology was expensive at the time due to the low volume of sales and the lack of open, international standards.
Early app: cattle tagging
UHF RFID got a boost in 1999, when the Uniform Code Council, EAN International, Procter & Gamble and Gillette put up funding to establish the Auto-ID Center at the Massachusetts Institute of Technology. Two professors there, David Brock and Sanjay Sarma, had been doing some research into the possibility of putting low-cost RFID tags on all products made to track them through the supply chain. Their idea was to put only a serial number on the tag to keep the price down (a simple microchip that stored very little information would be less expensive to produce than a more complex chip with more memory). Data associated with the serial number on the tag would be stored in a database that would be accessible over the Internet.
Sarma and Brock essentially changed the way people thought about RFID in the supply chain. Previously, tags were a mobile database that carried information about the product or container they were on with them as they traveled. Sarma and Brock turned RFID into a networking technology by linking objects to the Internet through the tag. For businesses, this was an important change, because now a manufacturer could automatically let a business partner know when a shipment was leaving the dock at a manufacturing facility or warehouse, and a retailer could automatically let the manufacturer know when the goods arrived.
Between 1999 and 2003, the Auto-ID Center gained the support of more than 100 large end-user companies, plus the U.S. Department of Defense and many key RFID vendors. It opened research labs in Australia, the United Kingdom, Switzerland, Japan and China. It developed two air interface protocols (Class 1 and Class 0), the Electronic Product Code (EPC) numbering scheme, and a network architecture for looking up data associated on an RFID tag on the Internet. The technology was licensed to the Uniform Code Council in 2003, and the Uniform Code Council created EPCglobal, as a joint venture with EAN International, to commercialize EPC technology. The Auto-ID Center closed its doors in October 2003, and its research responsibilities were passed on to Auto-ID Labs.
Some of the biggest retailers in the world—Albertsons, Metro, Target, Tesco, Wal-Mart—and the U.S. Department of Defense have said they plan to use EPC technology to track goods in their supply chain. The pharmaceutical, tire, defense and other industries are also moving to adopt the technology. EPCglobal ratified a second-generation standard in December 2004, paving the way for broad adoption.
BIOMETRIC ID TO BE ISSUED TO ALL INDIA
Control Grid: The Prison Without Bars
1984 was a picnic compared to modern day leviathan surveillance cage
Paul Joseph Watson | January 18 2006
Recent revelations of the NSA spying on American citizens re-awakened debates about big brother and when state surveillance of its citizens goes too far.
The fact is that the modern implementation of the prison planet has far surpassed even Orwell’s 1984 and the only difference between our society and those fictionalized by Huxley, Orwell and others, is that the advertising techniques used to package the propaganda are a little more sophisticated on the surface.
Yet just a quick glance behind the curtain reveals that the age old tactics of manipulation of fear and manufactured consensus are still being used to force humanity into accepting the terms of its own imprisonment and in turn policing others within the prison without bars.
All over the United States, Canada and Britain, surveillance camera systems are being installed on street corners, in public bathrooms, in residential neighborhoods, and even in parks and forests. We are asked to trust the government underlings who control them that they are working for our best interests as said underlings are caught using the cameras to spy on naked women in their homes.
In the UK, government programs encourage citizens to spy on their neighbors and report suspicious activity as part of a CCTV channel subscriber package.
Homeland Security funding is being utilized to fund this mass expansion of the surveillance state in the US as city and state officials clamor at the teat of Big Brother to milk the cash cow of the police state and win the contracts for installing more and more sophisticated spy cameras. The advances made in camera software have really moved things along. According to the The Spy Software Guide, certain cameras can be equipped with a “brain” of sorts and can record and alert suspicious behaviour. For example, it can detect if a person is pacing nervously or a car has circled the building repeatedly for anomalous amount of time.
The government demands to know everything about our private lives and catalogue, file and index every aspect of our existence, yet government itself becomes more and more secret with each passing day as it engages in escalating criminal activities.
The warning of Rousseau, that “man is born free yet everywhere he is in chains” has come to pass. A majority of Westerners define freedom as the freedom to have a television and shop at Wal Mart. True freedoms, innate freedoms are no longer understood or practiced by a majority.
The most fundamental freedom, freedom of speech, is now subject to free speech zones. Areas that coincidentally preclude anywhere where media would be present, any place that the speech would be heard. The message is clear, you have freedom of speech but only if nobody can hear that speech.
Full body scanners that produce a photo fit of our naked bodies are being introduced into airports and trains.
RFID tracking tags are being added to every item we purchase, sending out a surveillance hum back to Big Brother HQ from the warehouse to the landfill.
Toll roads that read sensors on our license plates are taxing and tracing us across the country. GPS Black boxes in our cars report back to the government on exactly where we have traveled and where we are heading.
Small towns in Florida were already running scans on cars three years ago and that program has vastly expanded across the country.
Security blimps that are used against insurgents in Iraq are soaring high in major cities to report suspicious activity.
Spy satellites are used by the USDA to monitor farmer’s activities and ensure they are complying with federal demands. Police helicopters are used in Arizona to make over flights of private property and check that owners are keeping their swimming pools clean. If he pools are not green the owners face immediate fines and even jail sentences.
Londoners are encouraged by the government to report on their neighbors via a huge poster and radio campaign organized by the Metropolitan Police. They are urged to watch for suspicious activity that could denote terrorist activity. Getting a refund on a credit card purchase, owning a vehicle and living in a house are three potential terrorist red flags according to the government.
Posters at bus terminals inform Londoners that they are ‘secure beneath the watchful eyes’ of Big Brother.
Government and media establishment organs demonize disposable phones and link them with terrorism because the phones can’t be tracked 24/7 by government spy systems.
Our digital cable boxes and TIVO systems are recording what we watch to create psychological algorithms which are stored on government databases. These systems track what we watch, for exactly how long we watch it, and what our psychological score is based on those factors.
The US State Department directs a new program that enables the Mexican government to intercept phone conversations and online messages from every telecommunications network within Mexico.
DNA databases are instituted in Britain to record the DNA of anyone arrested. even if they are not charged their DNA record remains in the database. Laws are then passed with make every offence arrestable. Examples of those caught up in the database include a schoolgirl who threw a snowball at a police car.
Entrepreneurs, industry leaders and former government officials advocate taking the implantable ID chip as it becomes a necessity to access VIP areas in trendy bars and Mexican judicial workers are ordered to take it or lose their jobs.
Remote lie detectors have been developed for use initially in airports in which laser beams are bounced off a by passer’s skin to try and denote signs of stress which could indicate the will to commit acts of terrorism. Brain scanners in Boston Logan airport also target suspicious individuals.
This is the prison without bars. This is the panopticon, a prison so constructed that the inspector can see each of the prisoners at all times, without being seen. This is a portrait of the accelerating movement by western governments to erect giant, powerful, all-pervading mass surveillance, tracking and control grids that will keep all populations firmly under the baleful and watchful gaze of Big Brother.
Orwell’s 1984 was a picnic in comparison to the wielding cogs of the prison planet infrastructure that are being put in place all around us.
The choice is ours. As we hurtle towards the end of the first decade of the new millennium, are we content to accept the terms of our own imprisonment and live as slaves in a high tech rat maze, or, like the ones who went before us, will we cast off the shackles of servitude and serfdom, and reclaim our God given right to life, liberty and the pursuit of happiness?