Satellite Technology
& the Internet
The Antichrist's activity would be severely hampered, however, without the satellite technology that gave us this little thing called the Internet. This inter-connectivity of the Internet is an essential part of this whole process. Keeping track of some seven billion people has to be done with the assistance of a massive computer network. This process must be in place before the Antichrist can implement it for his purposes.
Don’t you find it interesting that a battle is being waged to liberate the Internet from the control of the United States? The people doing that are not only members of other countries; former President Obama was lobbying for it as well. There is an overriding agenda at work here. These people know the endgame even if you do not. You look at this activity in wide-eyed amazement thinking at a very base level that these people must be crazy. But you would be wrong. There is a government behind the government with a clear and defined agenda at work, and they know exactly what they are doing. Of that, you can be sure.
Computer-Controlled Cars
Several years ago, Toyota was sued by numerous people claiming that their cars would arbitrarily accelerate for some unknown reason. Drivers would lose control, end up in terrible accidents, and sometimes die as a result. At the time, no one seemed to know what the reason could be. Even though I have no idea what caused it, I am no less concerned that a laptop computer from the other side of the world can now control my car.
Cell Phones
If you think your phone is private and tamper-proof, you are sadly mistaken. Your conversations are not your own. That phone can tell the world everything about you. Someone with the knowledge and skillset can access your phone—even while it's charging on your nightstand—turn it on, take control of the camera and microphone, and watch and listen to whatever is going on, anytime they choose.
It is a complete fantasy to believe our communications are private. Edward Snowden, a former government employee, showed us that. Remember him? He was the former Central Intelligence Agency employee who in 2013 leaked classified, even secret information from the National Security Agency.
I find one of his remarks particularly interesting. Before he was interviewed by journalists who flew to Hong Kong to meet him, he said the only way the interview would take place was if all of them put their cell phones in his refrigerator. He knew that privacy would be non-existent otherwise. It was only then that he revealed how the government was collecting data on its citizens.
Your smartphone has a GPS chip that can show precisely where you are at any given time—it gives away your specific coordinates. The NSA can also use that same phone to monitor and record your telephone calls. No one will admit the truth about the recordings, but they exist—all calls are recorded. Do not hear me say that every single call is listened to and scrutinized by a team of agents, but they are all digitally recorded—every single call.
Biometric Screening and Facial Recognition
We are all somewhat familiar with biometric screening, but probably not in all the ways it is used. For instance, it is used in the healthcare industry to track a person’s health over a specified period. According to the CDC—Centers for Disease Control and Prevention—it tracks height, weight, body mass index, blood pressure, blood cholesterol, blood glucose, and aerobic fitness used as part of a workplace health assessment to benchmark and evaluate changes in employee health status over time.
Another part of the biometric equation is biometric verification or identification. Biometric verification, defined by “WhatIs.com (www.whatis.techtarget.com),” is “any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures.”
Biometric screening is now using a great deal of facial recognition. While researching this area, I spent a great deal of time looking into Great Britain in general, and the city of London, England, in particular. In those areas, video cameras are everywhere. A person can leave home in the morning, drive to work, take the kids to school, go to lunch with friends, shop at Harrods in Knightsbridge, and never be off camera the entire time.
Many of those cameras not only can record your image but can also hear you. Moreover, if you do something the people monitoring the cameras don't like, the camera has the technology to allow the monitor to talk back to you. They will let you know you were seen throwing a cigarette butt on the ground and then they will tell you to pick it up. “Hey, you just littered, sir,” it says. “Please pick it up and dispose of it properly.” Big Brother is watching you. That isn’t some futuristic idea. It exists right now.
We are now seeing increasing numbers of cameras being utilized here in the United States. The facial recognition capabilities of these cameras give certain government agencies the ability to run your image through several facial recognition databases to identify you. They can screen you to acquire information about you. That technology can tell them who you are, where you're from, as well as a wealth of other information.
Remember that these intrusions into our personal lives that people are willing to put up with have their roots in combating terrorism. That is what makes it palatable for people. People become willing to give their freedoms away because they are fearful of what the terrorists may do. Meanwhile, in the name of capturing these radical extremists, the government is looking into everything you do.