June 6-9: Bilderberg Meeting behind Closed Doors. On the Agenda: Domestic Spying, Diffusing Social Protests, War on Syria and Iran
Its four-day meeting occurs annually. It’s a rite of spring. British political economist Will Hutton calls the group the “high priests of globalization.”
Powerful movers and shakers have their own agenda. They discuss key issues.
They do it year round. Once annually they meet face-to-face. They plot strategy to exploit the world’s riches. They want them for themselves.
They try to keep meeting dates, locations, and issues to be discussed secret. Word gets out. It’s official. Britain’s five-star Grove Hotel is this year’s venue. It’s a Hertfordshire, England hotel resort. It calls itself “London’s cosmopolitan country estate.”
It’s 18 miles from London. It’s 30 minutes from Heathrow Airport. It’s ideal for secluded meetings. Great pains are taken to keep journalists, activists, and other uninvited guests away.
On May 13, Infowars reporters Paul Joseph Watson and Jon Scobie visited the Grove Hotel. They claim to have “groundbraking” information.
Google’s CEO Eric Schmidt is a regular Bilderberg attendee. Watson and Scobie said his company is “merging” with Bilderberg.
“Google’s annual Zeitgeist conference, which has been based at the Grove since 2007, immediately precedes the Bilderberg Group conference by a matter of days.”
“Backed up by prior research, we were able to confirm in conversations with hotel managers and others that the Grove is now a central base for Google’s agenda to control the global political and technological landscape.”
Bilderberg’s “being recast as ‘Google-Berg’ – partly because of efforts on behalf of activists to tear away the veil of Bilderberg’s much cherished secrecy, and partly as a means of re-branding authoritarian, undemocratic secret gatherings of elites as trendy, liberal, feel-good philanthropic-style forums like Google Zeitgeist and TED.”
In May 2012, London’s Telegraph headlined “Google invites the best and brightest into its Big Tent.”
It’s Google’s annual Zeitgeist conference. The Telegraph compared it to annual Davos World Economic Forum meetings. Major global figures participate in both.
Eric Schmidt thinks “privacy is a relic of the past,” said Infowars. He “plans to turn Google into the ultimate Big Brother.”
He and Bilderberg members share a common agenda. In part, it reflects a “collectivist, permanently networked world (without) individuality and privacy.”
Bilderberg’s grand design is one-world government comprised of rulers and serfs. It wants total unchallenged global control.
Infowars said its “inside source” listed the following June issues for discussion:
- destroying Iran’s nuclear facilities within three years;
- prolonging war on Syria by arming anti-Assad elements;
- the threat of a global pandemic;
- controlling 3D printing;
- Internet control through “cyber resilience;”
- establishing a ministry of truth; Orwell explained its mission and more, saying:
“The Ministry of Peace concerns itself with war, the Ministry of Truth with lies, the Ministry of Love with torture and the Ministry of Plenty with starvation.”
“These contradictions are not accidental, nor do they result from from ordinary hypocrisy: they are deliberate exercises in doublethink.”
Other Bilderberg topics include:
- smart cities for mass surveillance;
- diffusing austerity induced social protests;
- preventing Britain from leaving the EU;
- propping up the euro to keep the Eurozone intact;
- minimal 2013 economic growth;
- increasing central bank power;
- transferring more wealth from ordinary people to corporations and super-rich elites; and
- preventing a growing credit bubble from popping.
In 2007, Privacy International’s “Race to the Bottom” report addressed privacy rankings of Internet service companies. A previous article discussed its comments on Google, saying:
“….throughout our research we have found numerous deficiencies and hostilities in Google’s approach to privacy that go well beyond those of other organizations.”
It’s “an endemic threat to privacy. This is in part due to the diversity and specificity of Google’s product range and the ability of the company to share extracted data between these tools, and in part due to Google’s market dominance and the sheer size of its user base.”
“Its aggressive use of invasive or potentially invasive technologies and techniques” is unmatched.
It’s able to “deep drill into the minutiae of a user’s life and lifestyle choices.” It has no qualms about doing it irresponsibly.
It retains volumes user information. No limitations are placed on its subsequent use or disclosure. Users aren’t able to delete or withdraw it.
It retains all “search strings and associated IP-addresses and time stamps for at least 18 to 24 months, and does not provide users with an expungement option.”
It has other personal information on hobbies, employment, addresses, phone numbers, and more. It retains it after users delete their profiles.
It “collects all search results entered through Google Toolbar, and identifies all Google Toolbar users with a unique cookie that allows Google to track the user’s web movements.”
Information is retained indefinitely. It provides a permanent record. Doing so spurns OECD Privacy Guidelines and EU data protection law provisions.
Users can’t edit or delete records and information. They can’t access log information generated through various Google services, such as Google Maps, Video, Talk, Reader, or Blogger.
In 2004, Google also acquired the CIA-linked company Keyhole, Inc. It maintains a worldwide 3-D spy-in-the-sky images database.
Its software provides a virtual fly-over and zoom-in capability. It does so within a one-foot resolution.
It’s supported by In-Q-Tel. It’s a venture capital CIA-funded firm. It “identif(ies) and invest(s) in companies developing cutting-edge information technologies that serve United States national security interests.”
In 2003, its CEO, John Hanke, said:
“Keyhole’s strategic relationship with In-Q-Tel means that the Intelligence Community can now benefit from the massive scalability and high performance of the Keyhole enterprise solution.”
In 2006, former CIA clandestine services case officer, Robert Steele, said:
“I am quite positive that Google is taking money and direction from my old colleague Dr. Rick Steinheiser in the Office of Research and Development at CIA, and that Google has done at least one major prototype effort focused on foreign terrorists which produced largely worthless data.”
“I think (Google is) stupid to be playing with CIA, which cannot keep a secret and is more likely to waste time and money than actually produce anything useful.”
On April 29, 2009, Willem Buiter’s Financial Times article headlined “Gagging on Google,” saying:
“Google is to privacy and respect for intellectual property rights what the Taliban are to women’s rights and civil liberties: a daunting threat that must be fought relentlessly by all those who value privacy and the right to exercise, within the limits of the law, control over the uses made by others of their intellectual property.”
It should be strictly regulated, “and if necessary, broken up or put out of business.” It “lays the foundations for corporate or even official Big Brotherism.”
Google Street View’s addition to Google Maps, “provides panoram(ic) images visible from street level in cities around the world.”
“The cameras record details of residents’ lives.” They do so without permission. Personal privacy is violated.
It’s also done through tracking cookies or “third-party persistent cookies.” They assist interest-based advertising. It’s known as behavioral targeting.
In the wrong hands, information can be used “to put a commercial squeeze on people, but also to extort and blackmail them.”
In government hands, it enhances “a pretty effective and very nasty police state.”
Can Google be trusted to use this information responsibly? “Of course not.” It’s a business run by “amoral capitalists.” It seeks profits by any means.
Google and other Internet search engines “should not be trusted because they cannot be trusted.” Because of its size and dominance, Google’s “the new evil empire of the internet.” It’s a menacing “Leviathan.”
If true, partnering (merging) with Bilderberg enhances the threat. Institutionalized spying endangers everyone. Today’s technology exceeds the worst of what Orwell imagined.
Big Brother isn’t fiction. It’s watching everyone all the time for any reason. It does so with sweeping technological effectiveness. It makes Bilderberg’s ideal world more possible.
Stephen Lendman lives in Chicago. He can be reached at firstname.lastname@example.org. His new book is titled “Banker Occupation: Waging Financial War on Humanity.” http://www.claritypress.com/LendmanII.html. Visit his blog site at sjlendman.blogspot.com.
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
- Slaughter Central
- Denis Halliday: A Voice of Reason in an Insane World
- The Kafkaesque Nightmare of Attorney Steven Donziger, a Literal Prisoner of the Chevron Corporation
- Six Days in Fallujah: Another Video Game That Refuses to Question US Militarism?
- Quad Summit Consolidates US-Led Military Bloc to Prepare for War against China
- Our Four Nations Are Committed to a Free, Open, Secure and Prosperous Indo-Pacific Region
- Collateral Crucifixion – Pressuring for Julian Assange’s Release!
- The European Council against the Trade in Instruments of Torture
- The “Defender-Europe”-- US Army Arrives
- Personal Reflections on Exposing the Myths of Money
- Appropriator Financial Fabric, the Case of BlackRock
- Why Bitcoin Is Not a Socialist’s Ally – Reply to Ben Arc
- Corporate Versus Public Control of Science and Technology: Forging a Framework for the 21st Century
- Institutionalized Greed: Shareholders and Large Investment Funds
- Capital, Science, Technology