-Caveat Lector-
http://www.williamcooper.com/ IAO’s role in the New World Order! by John Doyel Shamley Veritas News Service - Exclusive, July 18, 2002 -- The federal government has revamped another agency to bring about a socialist, totalitarian, one world government. The agency is not new but taking on a new role to bring us under a world dictatorship. The agency is the Defense Advanced Research Projects Agency (DARPA) and is the central research and development organization for the Department of Defense (DoD). It manages and directs selected basic and applied research and development projects for DoD, and pursues research and technology where risk and payoff are both very high and where success may provide dramatic advances for traditional military roles and missions. DARPA has been granted Experimental Personnel Hiring Authority for eminent scientists and engineers from outside government service to term appointments with our agency. This authority significantly streamlines and accelerates the hiring process. The true nature of the beast can be gotten straight from their own words. Here is the mission statement from their new office, the Information Awareness Office (IAO) which will be the key entity and main culprit in this scheme. This mission statement is straight from their very own literature; "IAO Mission: The DARPA Information Awareness Office (IAO) will imagine, develop, apply, integrate, demonstrate and transition information technologies, components and prototype, closed-loop, information systems that will counter asymmetric threats by achieving total information awareness useful for preemption; national security warning; and national security decision making." Please note the section, "achieving total information awareness useful for preemption; national security warning; and national security decision making", in the above text. This is an admission to the gestapo-like, secret police tactics used by them in shaping and steering this once great republic into a socialist cesspool. The excuse of course is the threat of terrorism. However, terrorism is really just part of a grand Hegelian dialectic scheme to bring about their desired change and the end result that the illuminati want, a New World Order. Now let us look at their "vision", again from their very own words and writings. "IAO Vision: The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define. IAO plans to develop technology that will allow understanding of the intent of these networks, their plans, and potentially define opportunities for disrupting or eliminating the threats. To effectively and efficiently carry this out, we must promote sharing, collaborating and reasoning to convert nebulous data to knowledge and actionable options. IAO will accomplish this by pursuing the development of technologies, components, and applications to produce a proto-type system." Again, lets take a closer look at their own words. "a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify or define". Does this mean that your casual shooting club that doesn't seek charter under some parent organization is a target? Does this mean that if you and your loved ones seek the right to privacy are you the next target? The only answer to that is an emphatic YES. The next part to look at is, "actionable options". This is really just a doublespeak way of saying door to door searches and raids without due process and the further curtailing of our constitutionally guaranteed rights to be protected from illegal search and seizure. Now look at some of the technologies that they are boasting about when they are outlining their various methods of execution, again taken from their very own text. Statements in italics are the authors explanation of their stated goals and technologies. Please note that the below scenarios and technologies have ALL been covered on the Hour of the Time. 1) Collaboration and sharing over TCP/IP networks across agency boundaries This means the blurring of lines between agencies and their due charters under law. Also the violation of jurisdictional issues between municipalities, states and federal levels of agencies. 2) Large, distributed repositories with dynamic schemas that can be changed interactively by users An orwellian system of record keeping that can be manipulated to reach goals that the socialist desire. 3) Foreign language machine translation and speech recognition A way to go about singling out peoples based on what they may have said and then cross referencing it with stored files. 4) Biometric signatures of humans We told you so. A bio-metric implant to follow you wherever you go and to check on whatever you do. Also retinal scan, face recognition and DNA technologies used to track you and create dossier files. Look at all of the cameras going up in public places and the requirements to obtain some sort of license or I.D. 5) Real time learning, pattern matching and anomalous pattern detection Again, using dossier and loosely interpreted trends to set up patterns to be used to generate classifications of groups or peoples. The ultimate segregation is yet to come. 6) Entity extraction from natural language text Use of body language to define next action. 7) Human network analysis and behavior model building engines. A process of leftist socio- psychology wherein the subjects being studied are grouped into loosely defined strata. This would include the tracking of purchases via "club cards", again already covered on the Hour Of The Time. 8) Event prediction and capability development model building engines See above. 9) Structured argumentation and evidential reasoning This is the use of conjecture, not facts to get to a desired goal or judgment. 10) Story telling, change detection, and truth maintenance Remember the Orwellian writers using their double speak dictionaries to redefine history, current events and the future. Also the use of psycho politics and interrogation tactics to bring about the answer desirable to the one world government crowd and their dupes. 11) Business rules sub-systems for access control and process management Again, violation of due process and protection from illegal search and seizure. Used in one hand to probe into private matters and in the other hand to filter the facts and keep the truth from getting out. 12) Biologically inspired algorithms for agent control Formulas to try and find the most useful dupes to work for the furtherance of socialism. 13) Other aids for human cognition and human reasoning This is just another allusion to mind control. Remember, all of the above technologies and scenarios were already exposed and proven by the Hour Of The Time. Now look at some of their other goals and agendas, taken from their very own text. "It is difficult to counter the threat that terrorists pose. Currently, terrorists are able to move freely throughout the world, to hide when necessary, to find unpunished sponsorship and support, to operate in small, independent cells, and to strike infrequently, exploiting weapons of mass effects and media response to influence governments. This low-intensity/low-density form of warfare has an information signature, albeit not one that our intelligence infrastructure and other government agencies are optimized to detect. In all cases, terrorists have left detectable clues that are generally found after an attack. Even if we could find these clues faster and more easily, our counter-terrorism defenses are spread throughout many different agencies and organizations at the national, state, and local level. To fight terrorism, we need to create a new intelligence infrastructure to allow these agencies to share information and collaborate effectively, and new information technology aimed at exposing terrorists and their activities and support systems. This is a tremendously difficult problem, because terrorists understand how vulnerable they are and seek to hide their specific plans and capabilities. The key to fighting terrorism is information. Elements of the solution include gathering a much broader array of data than we do currently, discovering information from elements of the data, creating models of hypotheses, and analyzing these models in a collaborative environment to determine the most probable current or future scenario. DARPA has sponsored research in some of these technology areas, but additional research and development is warranted to accelerate, integrate, broaden, and automate current approaches." What the above quote means is the one world government crowd needs some more programs put into place to fulfill their goals. Tracking of people from cradle to grave. Tracking of people in their daily lives via public imaging, information sharing and bio-metric implants, whether they be in the form of actual devices or chemicals planted in the body. Also the collusion of all agencies at all levels into an omnibus agency or so called law enforcement. Also the use of mind control in the areas of getting people to respond a certain way to a given situation or scenario. As well as the use of mind control and futuristic technologies to segregate people and turn them away from the real issues threatening them and getting them behind the "cause" to acquiesce and agree to an end as determined by the illuminated ones. Everyone reading this needs to get educated very quickly. You need to get educated on the tactics used by the enemies of the Republic and to their plans for our future. The best way to do that is to stay informed through such outlets as the Hour of the Time and the Veritas News Service. Here, you can find the very best tools for education and research through the HOTT shop. Then spread the word of truth to as many people as you can. This is the only way we will be able to stop this menace and restore our Constitutional Republic. If we do not, then we are destined to live in the worst socialist prison system every devised by man. <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om |