“It is well that the people of the nation do not understand our banking and monetary system, for if they did, I believe there would be a revolution before tomorrow morning.”
— Henry Ford
How the Federal Reserve’s central banking system works
King James Version (KJV)
15 Then went the Pharisees, and took counsel how they might entangle him in his talk.
16 And they sent out unto him their disciples with the Herodians, saying, Master, we know that thou art true, and teachest the way of God in truth, neither carest thou for any man: for thou regardest not the person of men.
17 Tell us therefore, What thinkest thou? Is it lawful to give tribute unto Caesar, or not?
18 But Jesus perceived their wickedness, and said, Why tempt ye me, ye hypocrites?
19 Shew me the tribute money. And they brought unto him a penny.
20 And he saith unto them, Whose is this image and superscription?
21 They say unto him, Caesar’s. Then saith he unto them, Render therefore unto Caesar the things which are Caesar’s; and unto God the things that are God’s.
22 When they had heard these words, they marvelled, and left him, and went their way.
In this segment Chuck Missler discusses life-like imagery and the mark of the beast. This segment comes from the “Technology And The Bible” briefing pack published by Koinonia House.
“Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them, and these will continue till they are resisted with either words or blows, or both. The limits of tyrants are prescribed by the endurance of those whom they oppress,” Frederick Douglass.
With that in mind, a new form of enslavement may be gradual under way, but it’s in a small device that can be implanted in an assortment of products and entities, and is just one of many of the Big Brother technologies we are subjected to.
In the 2006 tome, Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watch Your Every Move, privacy rights activists Dr. Katherine Albrecht and Liz McIntyre illustrate what radio frequency identification technology (RFID) may be used for.
There are two main elements of an RFID tag. The first is a small silicon computer chip that includes a unique ID number. The second part of the RFID tag contains a flat antenna, which is hooked up to the miniature chip.
This is how the tags and readers work: “When an RFID tag gets within range of a reader, the tags antenna picks up the reader’s energy, amplifies it, and directs it to the chip. The energy stimulates the chip to beam back its unique number, say 345678…, along with what other information it was programmed to relay. The reader device captures this information and processes it.”
What was just described is a “passive” RFID and that is just dependent on the reader for a power source.
However, “active” tags can contain an internal power supply. An example of uses would be toll collection systems such as FasTrack and EZ-Pass.
While understanding the functions of RFID is essential, knowing how the chips will be used amongst the populace is also critical to evaluate.
On March 14, 2012, the Connecticut Senate Transportation Committee unanimously passed a bill requesting the Department of Motor Vehicles to produce a report regarding the implementation of RFID for motor vehicle registration no later than January 1, 2013.
The reason why Connecticut legislators are considering a plan to implant spy chips on license plates is due to RFID industry lobbyist and former astronaut, Paul Scully-Power.
If Connecticut decides to adopt the technology, Scully-Powell will likely make a significant profit, since he is a former CEO of Mikoh Corporation and SensorConnect Inc., which sell RFID solutions.
The core attraction of Senate Bill 288 is in the fact that the legislation would generate an automated ticket for drivers whose vehicle registration, emissions or insurance certification when it lapses, even just for a couple of days.
Also, the chips would enable real-time monitoring of all vehicles by positioning tracking stations in key locations throughout the state.
“There are two main reasons for the Department of Transportation to adopt this type of program,” Scully-Power wrote in his testimony. “One, to validate that every vehicle conforms to state regulations. Two, to provide considerable income to the state by identifying vehicles that are violating the existing laws of Connecticut…. The state would collect $29,619,500 per year or $79,858,500 in the same three-year period compared to the $594,000 it was able to collect.”
“An RFID program would be phased in gradually and then expanded to accomplish other policing tasks without having to change equipment,” Scully-Power stated. “The second phase would be to implement speeding violations.”
Besides RFID having the propensity to be used for license plates, the technology could also lead school administrators to track students.
An Associated Press article by Stan Lehman, on March 22 illustrates this more in depth.
In Vitoria da Conquista, Brazil, grade-school students are wearing uniforms with an embedded locator chip, which will alert parents if their child or children are cutting classes.
Secretary Coriolano Moraes said that twenty thousand students in 25 of the city’s 213 public schools are now using T-shirts with a tracking device.
Moraes went on to say, by 2013 the city’s 43,000 students, aged 4 to14 whom attend public school, will be wearing chipped T-shirts.
When the students enter the school, the chip will inform a computer and then the computer will send a text message to the cell phones of parents.
The sophistication of the chip does not stop there, as parents will be notified if their child or children are not in class 20 minutes after it begins with this message: “Your child has still not arrived at school.”
“We noticed that many parents would bring their children to school but would not see if they actually entered the building because they always left in a hurry to get to work on time,” Moraes said. “They would always be surprised when told of the number times their children skipped class.”
Another advantage in the Moraes view is that the T-shirts are washable, can be ironed and not be damaged in the process.
Moraes said the chips have a “security system that makes tampering virtually impossible.”
If one thinks RFIDs have over stepped their bounds with automobiles and clothing, then the real nightmare, as if it wasn’t already nightmarish enough, is the possibility of having humans be chipped.
As Albrecht McIntyre point out, this scenario has already occurred.
In 2004, the Food and Drug Administration approved an RFID implant device, known as the Verichip or VeriPay, for medical purposes.
The chip (which will be surgically implanted into one’s arm) would store a unique ID number, which would be linked to patient health information.
Applied Digital Solutions (Verichips parent company) would maintain subscribers’ health records in a central database.
The patient’s information could be made available to hospitals and paramedics who are equipped with VerChip handheld readers.
This may seem worthwhile to some, especially since ones medical history could quickly be determined.
Who wouldn’t want to sacrifice individuality and autonomy for the illusions of temporary safety?
There are some hazards, as revealed by Albrecht and McIntyre.
After snooping around the SEC filings of Digital Angel Corporation, they found a letter the FDA sent explaining the risks of the implantable radio frequency transponder system.
“The potential risks to health associated with the device are: adverse tissue reaction; migration of implanted transponder; compromised information security; failure of implanted transponder; failure of inserter; failure of electronic scanner; electromagnetic interference; electrical hazards; magnetic resonance imaging incompatibility; and needle stick.”
Could our government perhaps be on the verge of creating a policy where it is mandatory for citizens to be surgically implanted with a chip?
Yes, unfortunately this is a very real possibility.
According to a report, by March 23, 2013, we will be required to have an RFID chip embedded underneath our skin and the chips will be linked to our bank accounts and will have tracking abilities built into it as revealed by Obama’s health care legislation, often referred to as “Obamacare.”
H.R. 3200 section 2521, Pg. 1001, paragraph 1.
“The Secretary shall establish a national medical device registry (in this subsection referred to as the ‘registry’) to facilitate analysis of postmarket safety and outcomes data on each device that— ‘‘is or has been used in or on a patient; ‘‘and is— ‘‘a class III device; or ‘‘a class II device that is implantable, life-supporting, or life-sustaining.”
“A class II implantable device is an “implantable radio frequency transponder system for patient identification and health information.” The purpose of a class II device is to collect data in medical patients such as “claims data, patient survey data, standardized analytic files that allow for the pooling and analysis of data from disparate data environments, electronic health records, and any other data deemed appropriate by the Secretary.”
Page 503, section E Lines 13-17 reads:
“[E]ncourage, as appropriate, the development and use of clinical registries and the development of clinical effectiveness research data networks from electronic health records, post marketing drug and medical device surveillance efforts”.
Page 58 Lines 5 through 15 reads:
“(D) enable the real-time (or near real time) determination of an individual’s financial responsibility at the point of service and, to the extent possible, prior to service, including whether the individual is eligible for a specific service with a specific physician at a specific facility, which may include utilization of a machine-readable health plan beneficiary identity detection card; (E) enable, where feasible, near real-time adjudication of claims.”
“The Secretary of the Health Human Services, acting through the head of the Office of the National Coordinator for Health Information Technology, shall adopt standards, implementation specifications, and certification criteria for the electronic exchange and use in certified electronic health records of a unique device identifier for each device described in paragraph 1 (National Medical Device Registry), if such an identifier is required by section 519(f) of the Federal Food, Drug, and Cosmetic Act (21 U.S.C. 360i(f)) for the device.”
Let’s know look into the culprits of RFID technology.
RFID Corporate and Government Supporters
The below information comes from spychips.com.
The involvement does not stops there.
Corporate and Government Patents
Albrecht and McIntyre reveal other startling details regarding the possible usage of these spychips.
Patent Application #20020165758 (Identification and Tracking of Persons Using RFID-Tagged Item) – Assigned to IBM, filed Nov. 2, 2002. This application will allow IBM to determine the identity of any person and used to monitor one’s movements through the stores.
IBM explains, “Previous purchase records for reach person who stops at a retail store are collected by [cash register] terminals and stored in a transaction database. When a person carrying or wearing items having RFID tags enters the store or other designated area, a RFID tag scanner located therein scans the RFID tags on that person and reads the RFID tag information. The RFID tag information collected from the person is correlated with transaction records stored in the transaction database according to known correlation algorithms. Based on the results of this correlation, the exact identity of the person or certain characteristics about the person can be determined. This information is used to monitor the movement of the person though the store and or other areas…Instead of determining the exact identity of the person, some characteristics such as demographics (e.g., age, race, sex etc.) about the person may be determined based on certain predetermined statistical information. For example, if items that are carried on the persons are highly expensive name brands, e.g., Rolex watch, then the person maybe classified in the upper-middle class income bracket. In another example, if the items that are carried on the person are “female” items typically associated with women e.g., a purse scarf, pantyhose, then the gender of the person can be determined as a female.”
Patent Application #6,659,344 (Automated Monitoring of Activity of Shoppers in a Market) – Filed by Jerome A. Otto and Dennis J. Seitz of National Cash Register Company on December 6, 2000 and granted December 9, 2003.
“The invention monitors the items. The invention determines whether each item is located in one of three positions, namely, (1) in the basket, (2) on shelves, or (3) neither the basket nor on the shelves. For example, an item may take the form of Brand X canned corn. If the shopper removes a can of Brand X corn from a shelf, and holds the can in the hand, the invention will detect that a can of Brand X corn has been removed from the shelf, and also that the can is not in the basket. The inference may be raised that the can is held in the hand of the shopper at that time… The data just obtained is recorded.
…[A] detailed record of the successive occupations of positions [baskets, shelf, or neither]…can be recorded, together with the time-of-day for each position.”
Patent Application # 20040174258 (Method And Apparatus For Locating And Tracking Persons) – Filed August 29, 2003, by Peter Seth Edelstein and Benjamin Theodore Nordell II, of Persephone Inc. This application will allow for the surgical implantation in the head, the torso, the deep muscle limbs, and the lumen of organs like the gastrointestinal tract and the uterus. “Removal of the implanted device by a runaway juvenile would be impossible. Even if possible, such removal would likely place the runaway at the significant medical risk, which is counter to the runaway’s goal of safe escape and survival from parents or guardians.”
Other excerpts of the patent include:
- “Because the device is implanted in the person, it can also provide a shock, vibration, or other warning.. [that] may be progressive, such that a person is subjected to a shock of increasing magnitude as he leaves a zone of confinement or enters a forbidden zone.”
- “An alert can also be broadcast to the person when urgent contact is required. Thus, the device may vibrate or provide other notices when an emergency occurs that requires the person’s immediate attention.”
- “The device may…include a microphone or similar device for monitoring acoustic information, thereby permitting the person to talk to a remote location.”
Patent Application #20040129781 (System and Method for Utilizing RF Tags to Collect Data Concerning Post-Consumer Resources) – Assigned to BellSouth’s Intellectual Property Corporation, filed on July 8, 2003. The title of the patent in laymen’s terms, will allow BellSouth to sell data on your trash.
BellSouth elaborates: “Information concerning a post-consumption item [i.e., a piece of trash] may be linked (by serial number, for example), with information concerning the pre-consumed [i.e., a brand new] item collected by other data collection systems… By combining captured pre-consumer information with post-consumption information, the entire life cycle of an item may be tracked. This information may be useful to any number of entities, including retailers, manufacturers, distributors and the like … The collected and processed data may be helpful to track consumer purchases versus use patterns. A pet owner who lives in Atlanta but has a cabin in the mountains may choose to purchase pet food in the mountains because pet food is less expensive there… A recycling facility may find it useful to know where the items dropped off at the recycling center were originally purchased. Grocery stores, pharmacies and retailers may find it useful to know how long it takes a particular item to go from being stocked on the shelf to being placed in a waste or recycling receptacle… The information collected may be…valuable to particular industries.”
Patent Application # 20020149468 (System and Method for Controlling Remote Devices) – Funded by the U.S. government. As stated in the patent application, “weapons lost on a battlefield can be easily tracked and enabled or disable automatically or at will.”
With all these patents being granted or filed by major corporations as well as government, one has to wonder if a city could be completely designed on RFID technology.
“The Auto-ID Center has a clear vision-to create a world where every object – from jumbo jets to sewing needles – is linked to the internet. Compelling as this vision is, it is only achievable if the center’s system is adopted by everyone everywhere. Success will be nothing less than global adoption,” said Helen Duce, former Auto-ID Center associate director, who is now a Senior Partner at Effective Brands, which a global marketing consultancy company. Auto-ID has now become EPCglobal.
A ubiquitous city or U-city is a city or region where virtually all aspects of information systems are basically linked through wireless technology and RFID tags.
New Songdo, South Korea – Is a man-made island with 1,500 acres off the Incheon coast and will be the largest ubiquitous city in the world. The city is set to be complete in 2014 and the project is being estimated at 25 billion. The island will be home of 65,000 residents and 300,000 people will work there.
Dayton, Kentucky – The location is on Manhattan Harbour and is expected to span 142 acres of waterfront property and will be divided into 6 areas (The Commons, The Look Out, The Bend, Harbour Pointe, Manhattan Flats and The Vistas Estate Homes). The total cost of the riverfront project will be $900 million.
As one can see, there should be some cause of concern and hopefully, a complete surveillance civilization does not have a realistic chance of occurring.
“Could a technology like RFID enslave us?” asks McIntyre. “Theoretically, yes. Is the RFID implant the prophesied method of controlling humans and forcing beast worship? I don’t think so. Could I be wrong? Yes. I don’t believe anyone here on earth knows definitively what the future holds and exactly how events will unfold.”
She adds, “There are many smart people–people much smarter than myself–Christians and non-Christians–who hold very strong contradictory beliefs on most matters of religion. I take this as a clue that I should remain humble and reverent when it comes to the mysteries of the universe. It’s one thing to explore possibilities and keep a watchful eye. It’s quite another to claim a hotline to God and infer that others have an inferior connection to the Almighty.”
By Brent Daggett
Edited by Madison Ruppert
Categories: RFID technology