Why do government and independent organizations want to conduct such comprehensive mass surveillance and invest so heavily in it? In fact, a great many people seem to believe this is a given and seem to be willing to accept this, on the basis that mass surveillance is for the greater security of the nation, or that even if they were monitored, they had nothing to hide or at least, nothing extraordinarily incriminating.
We all have secrets, things we are ashamed of – “petty” crimes and misconduct at work or play that many others commit and therefore seem unimpressive. But they are the stuff that wreck homes, destroy careers and businesses, and cause irreparable reputation damage. These risks relating to family, social circles and careers that people take for granted are the very foundations of human life, the loss of which can spell immeasurable despair and long-term sorrow for the individual and their loved ones. Countless video and audio recordings have become material for blackmail, cyber-bullying and forced compliance with devastating result of suicide, fear and depression.
Why would anyone want to harm seemingly unimportant average people like you and me, if we never did anything particularly heinous to others? Why do rapists rape, thieves steal and murderers kill? It’s about exerting power over others by any means.
The world has a lot of well-intentioned people but there is Real, insidious evil that we do not understand or want to acknowledge, that exists – and it works in ways that seem harmless, even innocently beautiful and pleasurable. As it has been written, the love of money is the root of all evil, and that may well be the truth. But a threatened person would also kill another for his or her own survival. Evil begets more of it and by causing harm to one, produces bitterness that yields more evil and negativity.
On that premise, I invite you to look at content obtained from mass surveillance with no assumptions of how it will be used. Besides spying for national security reasons, in the hands of powerful private entities and individuals, the footage can be used for blackmail. Video footage can be turned into entertainment material (pornography), reality TV entertainment and related gambling over outcomes, theft of intellectual property or business secrets. It can be used as surveillance for kidnapping and human trafficking purposes – or any possible crime imaginable. It can be used to spy on family members, lovers, friends, co-workers and competitors. Surveillance footage can be used to do market research to find out buying behaviour and to target advertising at an individual from all angles and media. It can be turned into psychology experiment and research material for observational analysis. It can drive a dating agency for the elite, with the selling point of unlimited monitoring of partner prospects.
I filled in an online form inviting volunteers to participate in a Beta test for an online dating agency, called piccee, thinking nothing much of entering my e-mail address and hitting ‘OK’ in 2013. I received no communication or confirmation from the dating agency, nor was I invited to take any action, but coincidentally or not, it was not long after this sign-up that I became aware I was being monitored 24/7 electronically.
The technology has already been developed in various forms and reported in media. Drones for air surveillance may seem cutting-edge but could you imagine they already exist in the size of insects? Gnats, houseflies, or mosquitoes with night vision capability.
With literal/figurative bugs that come in minuscule sizes, imagine the access to audiovisual footage that would be made available to the individuals and organisations running mass surveillance programs.
The insect drones I have observed personally were in the form of three insects – gnats, houseflies and mosquitoes. The gnats I have personal experience with come in two types. One type is a crimson/brown colour when sighted in flight. These gnats are slightly larger than the black type and also seem to be a little slower due to their weight. The smaller black gnats are tinier and more nimble. There are also houseflies and like the gnats, the flies ooze that crimson/brown-coloured liquid, when crushed, but not so much of this is evident in the mosquitoes. Also, the mosquitoes and houseflies do not appear to have the red tint in flight.
A black powder-like dust like specks of black peeled paint, which may be a carbon-based substance, is left as a sediment in all of these bugs, when crushed. Bugs that were no crushed completely but immobilized with part of the wings crushed, for example, will have the red eyes from the liquid intact. This is very unusual from normal houseflies in the region I live in. Also, the most baffling this is that stored bugs I did not crush completely but had immobilized and stored in plastic or foil for observation somehow “disappear” or vaporize – with no visible trace. These bugs may follow you around, stay and hover around the people who live with you and even explore your dark closet. I have had siblings tell me they have observed these gnats, which they had never seen prior.
The bugs like natural ones move very quickly and are difficult to capture. They also do not hover around consistently but “park” themselves in strategic locations when not in use. I have reason to believe that they hide in our hair when the monitored subject is in motion, which can cause unexplained feeling of movement on the scalp. At other times, they can park on objects in different places. This kind of “parking” or resting longer than usual in a specific location or on walls can be irregular behaviour for certain species of insects.
One seemingly odd behavior among these bugs is that they may land on a body part, like a hand, and walk around or pause for a full 8 seconds as if to “stare” directly at the subject being watched. Most natural bugs (or bugs not under any kind of “influence”) will not land on a human being for longer than a split second out of a danger reflex. Yet another strange behavior is what may seem like deliberate rubbing of the hind legs in the subject’s direction. While all of this may seem like a strange fascination with insects, my fascination is really that these are unnatural behavior.
The above is based on my own observations and experience with these bugs. Here are some links to articles on the insect drone technology in media which even discuss the capabilities of these bugs to implant RFID tags and extract DNA:
Mar 16, 2015 Snopes.com, Insect Spy Drone
Jan 23, 2015 Infowars.com, Harvard Prof: Government Mosquito Drones Will Extract Your DNA – “Privacy is dead,” academic tells Davos elite
Jan 14, 2015 CNN: Robo-wings: Military drones that mimic hawks and insects
Dec 23, 2014 DefenseOne.com, The Military Wants Smarter Insect Spy Drones
Sep 18, 2014 Fox News, Insects inspire military mini drones
Jan 29, 2014 Popular Science, Rise Of The Insect Drones: Nature spent millions of years perfecting flapping-wing flight. Now engineers can reproduce it with machines.
Jan 9, 2014 International Business Times, Here’s What The Future Of Insect And Nano Drones Looks Like [VIDEO]
It does not stop there, however. Capturing external camera footage with minuscule cameras is nothing compared to mind-monitoring, both verbally with full language translation capacity and visual images. Someone can watch and read your thoughts in words and pictures in any language you think in.
How would that work? It would basically mean getting into your bloodstream. I have already discussed the above method of implants/infection through insects.
A second method of entering the human body and the brain, would be through an infection – a virus, bacteria or parasite. Infections occur through various methods but typically through contact or exchange of fluids. Saliva through sharing food, kissing, or other bodily fluids through sexual transmission, sneezing, coughing and contamination of water are some common methods of transmission. These would require human hosts to transmit microbes. Look up this article in the New York Times on toxoplasma gondii. You may be able to infer where all this mass surveillance may be headed. Some other links that suggest more worrying actions against, and experiments involving citizens:
Environment could be another method of transmission. There has been some media discussion of climate engineering and the associated buzzword is “chemtrails”. Whether or not there is deliberate human manipulation of the climate and environment for reasons other than climate change control, this blog post is chiefly concerned with ways that the human brain could be infiltrated through organic/chemical matter. Incidentally, the fuss over chemtrails was not so much lines in the sky as high levels of toxicity and metal poisoning on the people below.
Apr 25, 2015 GeoengineeringWatch.org
Feb 12, 2015 New York Times, The Risks of Climate Engineering
Feb 6, 2015 8NewsNow.com, I-Team: Chemtrails open skies up to debate
Whether with nanoparticles, an implant in the brain or a headset, it is already possible to connect the human brain to a computer, wireless. Don’t take it from me, but hear it from the thought leaders:
Feb 11, 2015 latelier.net (of the BNP Paribas group) Wireless Brain-Computer Interface for the Handicapped: Researchers in the United States have developed a wireless interface designed to enable paralysed people or those with reduced mobility to control computers, wheelchairs and other equipment with their thoughts.
Aug 2, 2013, National Geographic, Portable Brain-Scan Headsets: 4 Incredible Applications: Our brain controls what we think, feel, and do, but scientists have a limited capability to watch it at work outside the lab. National Geographic Emerging Explorer Tan Le hopes to change that while, in the process, fighting neurological disorders, enhancing learning, and even helping the disabled move things in the physical world with the power of the mind.
The above articles jump the gun a little to the mind being able to send messages via wireless devices, not just be rigged up to a computer.
I’d like to invite you to consider the possibilities of being able to access a human mind, or hack into one. Not only would an external individual or organisation read the data in our minds, they would be able to cut/copy/paste/insert/delete information. They would be able to install programs and shut down a mind, just like any old hard drive. What they cannot do yet in mid-2015 based on my experience, is access feelings or spirit, unless these are consciously “thought” – verbalized or visualized in your mind.
So far, we have discussed external audiovisual monitoring and mind monitoring. The third level is a further step from capturing the video footage. I call it 3-D monitoring of physical environments. There is biometric recognition of faces, try 3-D optical character recognition (ability to detect language the way you would ‘Find’ word matches on a page or document). It is one thing to search text online and another to have your full physical environment recorded, with items containing text around you such as printed books or publications, searchable in three dimension (3-D). CDs with digital data can be read (in translation too) whether or not there is an internet connection directly attached to the CD player – playing in a car, for example.
With mass surveillance through satellite images, close-ups by drones, internal and 3-D monitoring, every single thing can be monitored.The next step after surveillance and research is to target individuals – as is common with targeted advertising on social media. But also consider how content can be targeted at an individual to intimidate or threaten them. Another remarkable “targeted content” capacity I have observed is real-time radio and TV content relevant to real-time activities of an individual. This creates the sense of being watched and fed messages from a “big brother”. With available technology, not only are we being targeted through media, we can be fed messages directly in our thoughts and dreams. The ultimate result is 24/7 harassment. Harass a person enough and they will do anything to make you stop.
It takes the strength of the individual to turn away from the barrage of information and messages, but also to empty the mind and filter thoughts in our minds to discern if they are our own, for our good, or whether they seem unorthodox, unlike ‘us’ or strange whims, the way a pregnant woman may have an unusual craving. We can use our own strength to say ‘no’, to ‘override’ the impulses but it takes self-awareness and a strong moral hold to overcome the traps of these seemingly innocent thoughts. We also need strong faith and for believers, a close connection to the Divine to battle these attacks spiritually.