“[G]overnment Tyranny Is Routine In Human History

megaphone-2

Advisory: Be careful of what you read on social media. The algorithms used by these platforms have no regard for Biblical truth. They target your emotions to keep you engaged on their site so their advertisers can drop more ads. These platforms exist to enrich their stockholders. Consider God’s promise to Believers in James 1:5, “If any of you lacks wisdom, you should ask God, who gives generously to all without finding fault, and it will be given to you.”

Featured Story

” No Place To Hide – Facial Recognition Technology, The Beast?…

HNewsWire Logo Bottom Menu

Many people over the years have proposed that there would be an increase in technology as the end times approach. Among those espousing this view were renowned scientists Isaac Newton and Francis Bacon. On the frontispiece of Bacon’s Instauratio Magna, ships of learning were depicted passing by the limits of human knowledge, with a quote in Latin from Daniel 12:4. In more recent times, this belief has been supported in books like Future Shock by Alvin Toffler and The Bible Code by Michael Drosnin.

In Future Shock, first published in 1970, Toffler described the results of the rapid advancement of technology he had observed in the 1950s and 1960s. As technology brought ever faster changes in society, certain people were left on the sidelines, unable to cope with the speed of change. That stress and disorientation in people was dubbed “future shock.” Toffler did not attempt to use the Bible in his work, but the concept of future shock was alluded to in works like Hal Lindsey’s Late Great Planet Earth, which was also published in 1970. Mr. Lindsey has made frequent mention of Daniel 12:4 as a prophecy of this rapid technological advance.

Related image

Facial recognition holds the promise of an incredible leap forward in law enforcement but backwards in individual rights. No longer will oppressive governments need to employ human watchers to monitor video footage. 
Now highly accurate computer algorithms, monitoring tens or even hundreds of millions of video feeds, match patterns of facial geometry to identify individuals, even if beards or makeup are used. A criminal suspect shows his face on a public street, at a shopping mall, in a bank or at a bus stop and an alert can immediately go out to summon police for arrest. 
Tellingly, the same system can be used against terrorists, political dissidents, union leaders, human rights protestors, members of the press, the poor, or ethnic minorities. As Paul Harvey used to say, you can run, but you can’t hide.
Though China has made the hardest push for ubiquitous surveillance through its vast network of cameras linked in real time to computer-based facial recognition, it is far from alone. The NYPD has been attempting to gain access to the state database of facial recognition information collected for driver’s licenses. 
The NYPD’s Real Time Crime Center and Facial Identification Sections are not satisfied with using only the facial scans of those it has arrested but wants to link every driving adult to its camera-equipped system, the vast majority without ever having been arrested. Thousands of cameras now installed at NYC intersections, tunnels and public buildings are feeding data into automatic facial recognition systems similar to those in Communist China.
As a precursor to real-time facial recognition powered by machine algorithms, Georgetown University’s Center on Privacy and Technology revealed in 2016 that 26 states are already sharing facial recognition data collected on driver’s licenses and 16 of those also share with the FBI, meaning that roughly half of the adult population can already be identified through facial recognition, though only upon arrest at this point. Source

As you step out of your apartment in the morning, the camera at the entrance records your departure. Cameras track you as you drive your car to work. As you walk down the street from the car park to your office, cameras track your movements. Monitoring software follows you from one camera to the next. You walk past a police officer. He wears sunglasses, not because it’s bright outside, but because the glasses contain cameras connected to facial recognition software.

Once at the office, a camera outside the building alerts both the government and your employer that you’ve arrived.

As you log on to your computer, the government records your web browsing. The information forms a “citizen score.” Your score suffers when you visit sites that criticize the government, when you leave comments that are insufficiently supportive of government leaders and policies, or if you buy the wrong thing online.

This dystopian total surveillance state sounds far-fetched, like an idea for a fictional Hollywood movie. But it’s not.

Each of these surveillance tactics are being tested in pilot schemes in China right now. And the Chinese aren’t the only ones under surveillance.

Sharp Eyes

It may be hard to take the idea of such centralized control seriously; after all, we’ve heard warnings about it for years. George Orwell described “Big Brother,” the all-seeing government, way back in 1949. His book is titled 1984, but in 2018, Big Brother is still not here.

Those who lived behind the Iron Curtain, however, had a different experience. In East Germany, 2.5 percent of the population spied on the rest. Germans had to watch what they said in public, and even in private, in case the Stasi was listening. Say the wrong thing or hang out with the wrong people, and you could find yourself the victim of a government-sponsored harassment campaign. Or worse, in jail.

Now, however, we have reached a new era where technology has made mass surveillance easier than ever before.

1984-style surveillance state requires the linkage of millions of cameras and the transmission and storage of masses of data. Fiber-optic networks send data at light speed, and petabytes of information are stored with ease. Facial recognition software and machine learning means that one person can track thousands.

And China is leading the way.

“Surveillance technologies are giving the government a sense that it can finally achieve the level of control over people’s lives that it aspires to,” said Adrian Zenz, a German academic who writes about China.

“Sharp Eyes” is the Chinese government’s most ambitious initiative. It aims to link up the millions of security cameras already present in China into a single nationwide surveillance platform. This includes the government cameras already on streets and shops, as well as private cameras. Official documents state that they aim for an “omnipresent, fully networked, always working and fully controllable” surveillance system by 2020.

China is running a pilot scheme for this “omnipresent” system in Chongqing. There, housing complexes unlock with a facial scan. The resident doesn’t have to fumble with his keys, but this means the government is tracking who goes in and out. Policemen at computer screens follow citizens as they walk through the streets, using cameras and facial recognition software. They track criminals—and anyone who associates with them.

“Police Cloud” is a related project that aims to collect citizens’ online information and government data, and link it to their ID cards and their faces. An individual’s shopping receipts, browsing history, medical and criminal records, and social media comments are all collated and linked to his or her face.

According to Chinese government documents, these surveillance tactics will be used to monitor criminals, which include those who undermine Chinese stability or have “extreme thoughts.”

Another pilot scheme ties a lot of this data into a “citizen score.” A high score could result in better government services and more travel opportunities. And who determines the threshold below which the government may begin taking punitive measures?

The face-recognizing sunglasses are real, too. Railway police are testing them in Zhengzhou.

The Washington Post wrote in January that “the Chinese government is working hand-in-glove with the country’s tech industry, from established giants to plucky start-ups staffed by graduates from top American universities and former employees of companies like Google and Microsoft, who seem cheerfully oblivious to concerns they might be empowering a modern surveillance state.

“China seeks to achieve several interlocking goals: to dominate the global artificial-intelligence industry, to apply big data to tighten its grip on every aspect of society, and to maintain surveillance of its population more effectively than ever before” (January 7).

In December, China demonstrated this technology to the bbc. In the city of Guiyang, police have the face of every resident on record. The police found and mock-arrested the bbc’s reporter: It took them only seven minutes.

This surveillance reaches its most extreme form in the Muslim-majority province of Xinjiang. Here the Chinese government struggles with some dissent. Xinjiang authorities have not implemented some of these measures, but they have cameras everywhere. In the provincial capital of Ürümqi, security checkpoints and id scanners guard the roads and train station. Cameras track citizens’ movements everywhere. Police carry devices to access residents’ smartphones and search them for dissenting content or banned chat apps. To fill up with gas, you must swipe your id card and look into a camera. To buy a knife, your identification information must first be stamped into the blade in the form of a qr code.

Fall afoul of the authorities and you could be barred from traveling or sent to one of the “study and training centers”—behind barbed wire, concrete walls and watchtowers.

A Danger to the West

When a government possesses this kind of power, it is certain to abuse it. Orwell described his dystopian future as “a boot stamping on a human face—forever.” The increasing use of surveillance technology in China is curtailing freedoms, and indications are the trend will continue. How can there be real freedom of thought or association when the government tracks what you say and who you associate with, and punishes you if it does not approve?

But surely such a thing could never happen in the West?

China is and always has been different from the West in fundamental ways. Its 20th-century embrace of communism has given the government of the world’s most populous nation enormous powers over the populace. Freedom of speech, popular sovereignty and individual rights are not a part of Red China’s mode of operation. Because of this, the government directly or indirectly runs most of the nation’s big businesses.

China claims to have facial recognition software far more sophisticated than that used by the Federal Bureau of Investigation. According to the Washington Post, experts believe this is probably true. “More than anything else, experts say, deep learning technologies need huge amounts of data to come up with accurate algorithms,” it wrote. “China has more data than anywhere else in the world and fewer constraints about mining it from its citizens.”

But in terms of surveillance hardware, the West is ahead of China. America has more cctv cameras per head than China does. The United Kingdom stores 30 million to 40 million images of vehicle license plates every day, tracking the movements of most of the country’s population.

The biggest difference in the U.S. and UK is that surveillance is not used in the same heavy-handed way China does, even though your government may already be spying on you through your webcam, running facial recognition, and tracking your car far more than you realize (see Robert Morley’s article “Is the Government Reading Your E-mail?

Throughout history, governments have wanted to control their citizens—and have used every possible tool to do so.

As far back as ancient Rome, Cicero complained about the government reading his mail. Caligula and Nero both used surveillance as part of their reigns of terror over the Roman aristocracy. It’s easy to imagine either of these tyrants becoming a Joseph Stalin if he had Stalin’s highly organized state and the technology at his disposal.

“[G]overnment tyranny is routine in human history,” writes Trumpet editor in chief Gerald Flurry in his booklet America Under Attack. “Let’s not be naive and think something like that could never happen here. Our forefathers weren’t stupid. They wanted to guarantee Americans’ freedom. They really knew that God is a God of freedom; He wants us to be free. That’s a gift from God, and they understood that!”

Man has never invented a weapon he has not used. And man has never invented a surveillance technique that governments have not used.

America’s Founders designed a Constitution that limited government power. They knew that the human heart is naturally evil, and that those who hold the most power over other people’s lives would quickly turn this power into tyranny if they are not held in check by law. But most of that constraint has eroded. The philosophical, political and technological potential for a surveillance state exists in nations throughout the West.

‘The Mark of the Beast’

History and an understanding of human nature tell us that these techniques could be used anywhere. But biblical prophecy gives a more specific warning.

It tells of a time coming when no man can “buy or sell” without the approval of a central government (Revelation 13:17).

The Bible calls this stamp of approval “the mark of the beast.” It is a mark of religious observance—compliance with the state-approved religion.

It is easy to see how a China-style surveillance state could enforce such a policy. Refuse this mark, and you appear on the list of people not permitted to hold a job and unable to buy goods or food at the shops.

Herbert W. Armstrong wrote, “In this scriptural usage, the expression ‘buy or sell’ more literally indicates being able to buy—not that stores or those from whom one might make purchases of the necessities of life would refuse to accept the money, but that the one refusing the ‘mark’ would not be able to buy, would not be able to earn a living, to earn a wage or salary, or to engage himself in business” (Who or What Is the Prophetic Beast?). So this prophecy could be fulfilled without a surveillance state. But mass surveillance would make it much easier. And when you see how European powers have acted throughout history, a surveillance state is likely.

History is full of religions using surveillance to enforce their beliefs. The bbc even noted in its history of government spying, “In the Middle Ages, the Roman Catholic Church was more powerful than most governments—and it had a powerful surveillance network to match” (Nov. 1, 2013).

Nothing brings out a government’s passion to control what people say and think like religion does.

In A History of Christianity, Paul Johnson describes the Catholic Church’s dogged pursuit of “thought crimes”—another term popularized by Orwell. In this pursuit, the church violated “town charters, written and customary laws, and virtually every aspect of established jurisprudence,” he writes.

What would such an organization do with modern surveillance technology?

Mr. Armstrong proved in his booklet Who or What Is the Prophetic Beast?that this “mark” refers to Sunday observance. The religious power in Europe will require everyone to keep Sunday.

Imagine, then, this scenario. Cameras outside of churches record all who attend. Miss a service and you can expect to explain yourself to the authorities. The government monitors mobile phone signals: Too many in an office could mean that some are breaking the law and working on Sunday. Dashcams automatically record anyone spotted working outside.

Get caught, and your bank account is nullified. You lose your job. You cannot buy or sell. Try to get around this and the police will track you down. With cameras everywhere, there is nowhere to hide.

Phone signals are monitored every other day of the week. At large gatherings, the police can remotely turn on the microphone and listen to all that is said. If it’s an illegal religious service, the police are there within minutes.

Does all this sound like a dystopian nightmare? Again, today’s technology makes all of this possible already.Source

In December 2018, the White House announced that President Trump had sent Congress a  classified “National Strategy to Combat Terrorist Travel”.

Two months later, in February 2019, the White House released both this “National Strategy to Combat Terrorist Travel” (supposedly as signed in December 2018, and with no indication that it had ever been classified) and a companion “National Strategy for Aviation Security” (also unclassified and dated December 2018).

Together, these two documents give an overview of both the extent and the manner in which the US government intends — and believes that it has the authority — to surveil all travelers, monitor and log all movement of persons in the US and worldwide, and exercise administrative prior restraint over all such travel based on extrajudicial “pre-crime” predictions.

Nowhere in either of these vision statements is there any mention of the First Amendment, the right of the people peaceably to assemble, the right to travel, or international human rights treaties.

Nor is there any mention of existing legal means for restricting movement through court orders (injunctions or restraining orders), of judicial review of administrative controls, or indeed of any role at all for the courts.

While these documents were signed by President Trump, they express goals that have been pursued by both Republican and Democratic administrations.

Here are some of the main themes in these road maps for government action:

In December 2018, the White House announced that President Trump had sent Congress a  classified “National Strategy to Combat Terrorist Travel”.

Two months later, in February 2019, the White House released both this “National Strategy to Combat Terrorist Travel” (supposedly as signed in December 2018, and with no indication that it had ever been classified) and a companion “National Strategy for Aviation Security” (also unclassified and dated December 2018).

Together, these two documents give an overview of both the extent and the manner in which the US government intends — and believes that it has the authority — to surveil all travelers, monitor and log all movement of persons in the US and worldwide, and exercise administrative prior restraint over all such travel based on extrajudicial “pre-crime” predictions.

Nowhere in either of these vision statements is there any mention of the First Amendment, the right of the people peaceably to assemble, the right to travel, or international human rights treaties.

Nor is there any mention of existing legal means for restricting movement through court orders (injunctions or restraining orders), of judicial review of administrative controls, or indeed of any role at all for the courts.

While these documents were signed by President Trump, they express goals that have been pursued by both Republican and Democratic administrations.

Here are some of the main themes in these road maps for government action:

  • Prohibition of anonymous travel and identification of all travelers: “GOAL 1: IDENTIFY … TERRORISTS BEFORE THEY TRAVEL… Develop and maintain the equipment and technology necessary to validate passenger identities.”  Note that this goal extends to domestic travel, and is not limited to cross-border travel.
  • Dragnet (pervasive and suspicionless) surveillance of all movement of persons. Collect and retain as much information as possible, especially biometric, biographic,  and “derogatory” (but not exculpatory) information: “Improve and expand the collection of suspicious travel indicators and travel patterns; Improve functionality of identity-management systems and expand the collection and use of biometric, biographic, and derogatory data for vetting and screening.” “Domain awareness is heavily dependent on advanced information collection.”
  • Predictive “pre-crime” prior restraint and real-time control of travel: “Enhance and further automate recurrent traveler … vetting processes and capabilities … to accurately detect terrorists’ movements throughout their travel … lifecycle.” (“Vetting” is a euphemism for “fly/no-fly decision-making”.)
  • Seamless integration of government surveillance and control of travel with commercial transportation infrastructure. Sharing and common use of identification, biographic, and biometric data for government and commercial purposes. “[P]ublic and private sector entities must act in concert… [t]ogether, as one integrated system…. Domain awareness requires unprecedented cooperation and action among the public and private sectors.” The strategy documents say that the government should “reduce burdens on the private sector,” but there’s no mention of reducing burdens on individuals.
  • Unlimited extraterritorial jurisdiction over travel and travelers: “Guiding Principles: Identify and interdict terrorists as early as possible in the travel process to extend security efforts beyond the United States border.”
  • Globalization of US travel surveillance and control models: “Encourage and support efforts by foreign partners to bolster traveler screening, data collection, data analysis, and data sharing, including biometric and other traveler data, to improve capabilities to identify or detect terrorists.”
  • Policy laundering through international organizations: “The United States will cooperate with foreign partners to enhance international standards and best practices…. This will include initiatives pursued through international organizations that include private sector participation…. The United States Government will also promote implementation of systems for the use of advance passenger information, passenger name records, and biometrics.” “Watchlisting” in this context is, as usual, a euphemism for blacklisting. Source

The reality is that all our unique facial signatures are likely already in a database, whether government or corporate, and those databases are being linked, slowly at first, to automatic facial recognition systems through cameras popping up around major cities. 
There will soon be nowhere to hide. Comparisons to Orwell’s 1984 have become cliché by now, but what else can really be said except that Orwell never dreamed it would go this far.

Corruption is a state of decay, pollution, or incorrectness. In the Bible, corruption is one of the effects of sin that resulted from the fall of man. In the beginning, God created a perfect paradise, free of sickness, pain, and death. But when Adam and Eve disobeyed God by eating the forbidden fruit, sin entered the world, spoiling its perfection. That sin also brought contamination and decay to Adam and Eve and to the human nature of every person born after that (Romans 5:12). Thus, corruption in the Bible is the state of moral contamination and spiritual decay expressed through disobedience toward God.

Corruption is closely related to spiritual death. God told Adam that, if he ate from the tree of the knowledge of good and evil, he would “surely die” (Genesis 2:17). Adam didn’t die a physical death that day but a spiritual one that involved separation from God (Ephesians 2:1–3).

 Matthew Henry’s Commentary (c. 1700) said, “Then this hidden treasure shall be opened, and many shall search into it, and dig for the knowledge of it, as for silver. They shall run to and fro, to enquire out copies of it, shall collate them, and see that they be true and authentic. They shall read it over and over, shall meditate upon it, and run it over in their minds.” 

Many passages of Scripture refer to what will happen at the end of the age, but no other passage seems to deal with increasing knowledge or technology as a sign for us. A greater sign is the advancement of the gospel which Jesus spoke of in Matthew 24:14 and which He commanded us to proclaim in Matthew 28:19-20. God’s goal for mankind isn’t to advance as far as we can or to know all we can discover, but rather that all should come to repentance (2 Peter 3:9). Source

StevieRay Hansen
Editor, HNewsWire.com

It is impossible to find anyone in the Bible who was a power for God who did not have enemies and was not hated.

“Pedophile priests” have reverberated throughout America. But beneath our anger and revulsion, a fundamental question pulsates: Are those who abuse their positions of trust to prey upon children—a category certainly not limited to those in religious orders—sick … or are they evil? We need the answer to that fundamental question. Because, without the truth, we cannot act. And until we act, nothing will change.

My job is protecting children. It has taken me from big cities to rural outposts, from ghettos to penthouses, and from courtrooms to genocidal battlefields. But whatever the venue, the truth remains constant: Some humans intentionally hurt children. They commit unspeakable acts—for their pleasure, their profit, or both.

https://hnewswire.com/pedophilia-is-a-first-cousin-to-homosexuality-and-they-are-in-full-swing-with-pride-month/

#Antichrist #evildoers #suppressingtruth #birthpains #tribulation #sevenyears #hellonearth #those that have ears, let him hear, those that have eyes let them see!

“Hate speech” is a completely made-up concept with no actual definition or meaning

https://hnewswire.com/how-divisiveness-will-destroy-americabible-prophecy/

MY MISSION IS NOT TO CONVINCE YOU, ONLY TO INFORM…

HNewsWire Logo Bottom Menu


watchman-on-wall

Tagged In

Newsletter

Must Read

Long-Journey-Home-1
One-Thing
Mark-Cahill-Ministries-1
One-Blinding-Vision

Other Sources

USSANews

Latest News

Watchman: Do Not Comply With This Next Tyrannical Government Move No More Cash in Europe! The Digital Wallet Is Almost Here in the US–The Highway to the AntiChrist

By StevieRay Hansen | November 11, 2023

HNewsWire: Do NOT COMPLY with this next tyrannical government move which just rolled out in Europe…It’s coming to the United States as we speak because…

Read More

Watchman: The United States Is a Credit Risk Moody’s Has Just Cut Its Outlook on US Credit Ratings to Negative From Stable, The Fall is Near

By StevieRay Hansen | November 11, 2023

HNewsWire: by Tyler Durden Who could have seen that coming? After a disastrous 30Y bond auction this week, a collapse in Treasury market liquidity, and…

Read More

Watchman: Declassified Guantanamo Court Document Indicates CIA Recruitment of 9/11 Hijackers Our Trusted Government Is Not on the Side of the People, a 22-Page Unredacted Court Document That HNW Has Copies Of

By StevieRay Hansen | November 11, 2023

Two 9/11 Saudi hijackers were recruited by the CIA, and then afterwards the CIA tried to keep this information secret from the FBI. Declassified Guantanamo…

Read More

Watchman: There’s A Wave of Corporate Bankruptcies Coming–That Will bring Lawlessness to America

By StevieRay Hansen | November 11, 2023

HNewsWire: A wave of bankruptcies and corporate defaults can be imminent as US corporations are being battered by rising loan rates. Experts caution that as…

Read More

“TODAYS RULING OVER ‘THE LAWSUIT TO STOP USING COVID19 EXPERIMENT INJECTIONS ON HUMANS.– COSTA RICA.”  – Interest of Justice

By Dinesh Kaushiva | November 10, 2023

Dinesh Kaushiva November 10 , 2023   A court hearing took place in COSTA RICA where an Independent Group called  INTEREST OF JUSTICE  had filed…

Read More
Focused-Protection-1
Place Your Ad Here

We make every effort to acknowledge sources used in our news articles. In a few cases, the sources were lost due to a technological glitch. If you believe we have not given sufficient credit for your source material, please contact us, and we will be more than happy to link to your article.

StevieRay Hansen

In his riveting memoir, "A Long Journey Home", StevieRay Hansen will lead you through his incredible journey from homeless kid to multimillionaire oilman willing to give a helping hand to other throwaway kids. Available on Amazon.

3 Comments

  1. Patrick Galasso on June 17, 2019 at 8:58 am

    “Verily, verily, I say unto you, He that entereth not by the door into the sheepfold,
    but climbeth up some other way, the same is a thief and a robber.” —John 10:1

  2. old bat on June 16, 2019 at 7:21 am

    and who changed the day of worship to sunday? the catholic church did. i have also read that they founded islam as a backdoor way to attack israel and not get blamed for it. i am seeing calendars that start with monday, not sunday, thereby showing sunday, not saturday, as the seventh day for the sabbath.

  3. Patrick Galasso on June 15, 2019 at 1:47 pm

    1891 – Madame Blavatsky dies. The mantle of leadership for the worldwide theosophical movement falls to Annie Besant, a militant feminist and a member of the Fabian Socialist Society of England. She enthusiastically joins in revolutionary street riots and pens numerous volumes of occultic writings to add to those of Blavatsky.

Leave a Comment