{"id":151375,"date":"2020-01-13T12:01:06","date_gmt":"2020-01-13T12:01:06","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=151375"},"modified":"2020-01-13T09:12:31","modified_gmt":"2020-01-13T09:12:31","slug":"becoming-god-controlling-human-ontology-ambitions-of-the-secret-state-confederation","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2020\/01\/becoming-god-controlling-human-ontology-ambitions-of-the-secret-state-confederation\/","title":{"rendered":"Becoming God! \u201cControlling Human Ontology:\u201d Ambitions of the \u201cSecret-State Confederation\u201d"},"content":{"rendered":"<blockquote><p><em>\u00a0\u201cMan is born free, but he is everywhere in chains.\u201d<\/em><br \/>\n&#8212; Jean Jacques Rousseau (28 Jun 1712 \u2013 2 July 1778),\u00a0<em>Social Contract, 1762<\/em><\/p><\/blockquote>\n<h3>Introduction:<\/h3>\n<p><em>9 Jan 2020<\/em> &#8211; This paper is an elaboration of my 5 Aug 2019 publication in <em>Transcend Media Service, <\/em><em><a href=\"https:\/\/www.transcend.org\/tms\/2019\/08\/omnipresent-surveillance-dystopian-society-in-our-global-era\/\" >Omnipresent Surveillance<\/a>. <\/em>The prior publication was written to increase awareness and to provoke citizen activism action.<\/p>\n<p>In the interim, however, I came to better understand the ambitious goal of the secretive \u201cConfederation\u201d (i.e., National Security State Cabals) of individual, government, corporate, financial, military, and media empires and monopolies, was more sinister and perilous than <em>omnipresent surveillance. <\/em><\/p>\n<p>I use the word \u201cConfederation\u201d because I do believe no single group, no single nation, and no single concern is capable of controlling and dominating humanity, nations, and the world.<\/p>\n<p>Defining characteristics of sinister \u201cConfederation\u201d of individuals, groups, and organizations include:<\/p>\n<ul>\n<li>Knowing one another with varying levels of attachment,<\/li>\n<li>mutual organization memberships (e.g., political parties, religions, military alliances, treaties),<\/li>\n<li>attending gatherings and meetings (e.g., Bilderberg, Davos, Bohemian Grove), and<\/li>\n<li>sharing common goals (e.g., wealth accumulation, central banking model, financial investments, suppression of protests or critiques).<\/li>\n<\/ul>\n<p>Use of a \u201cConfederation\u201d identity is, in my opinion, a more realistic description than a single mass group (e.g., totalitarian state); a \u201cConfederation\u201d it is a collection or assemblage of varying ties and mutual obligations. \u00a0Ultimately, some within the \u201cConfederation\u201d may emerge as the dominant groups because of military and financial power.<\/p>\n<p>Under the facade of popularized \u201cState\u201d names (e.g., National Security State, Shadow State, Secret State, Emergency State, Totalitarian State), replete with their code-name programs and projects (e.g., Project Epsilon, Project Blue Bird, Project Ultra-Gard, Project Prism), the intentional \u201cConfederation\u201d engages in mass surveillance and permanent archiving of individual, organization, nation data (e.g., Utah Center).<\/p>\n<p>This information is subjected to mass date-base analyses for nefarious purposes: While mass data can be used to inform and determine government, military, corporate decisions, the ultimate goal of the \u201cConfederation\u201d is to master, control, and own \u201chuman ontology,\u201d to \u201c<strong>Becoming God!\u201d <\/strong><\/p>\n<p>As I came to grasp the goals and consequences of this malevolent \u201cConfederation, visible \u201cimmediate\u201d events and forces (i.e., wars, economy, regime changes, poverty, destructive global events), with their immobilizing fears, anxieties, and uncertainties, were used, tolerated, promoted as part of a greater \u00a0ambitious pursuit of control and domination of human ontology.<\/p>\n<p>Fear levels, propaganda, and xenophobic policies facilitated the imposition of authoritarian control and domination. Through powerful strategies, policies, and tactics, involving developments in technology (e.g., AI, 3-D Printing, Genetic-Code alteration), a future of dictatorial and despotic control and dominance was assured.<\/p>\n<p>The ultimate goal and purpose of \u201cConfederation\u201d control and dominance of mind and behavior is to and shape \u201chuman ontology\u201d (i.e., nature) according to their needs and visions. It is the absolute power for \u201c<strong>Becoming God;<\/strong>\u201d omnipotent, omnificent, and praxeology; all powerful, all knowing, all controlling of thought and behavior! With the assumed power of God, human ontologies can become controlled, including the pursuit of life and death. Eternity becomes a vision.<\/p>\n<p>\u201c<strong>Becoming God<\/strong>!\u201d All other policies, plans, strategies, tactics, actions are consumed within this megalomaniacal goal. <strong>\u201cBecoming God<\/strong>,\u201d or \u201c<strong><em>God Like<\/em><\/strong>\u201d has been the intent of dictatorial national, religious, cult, corporate, financial, and military leaders, all infatuated with their power over life and death. Now a possibility as homogenized cultures and societies yield to their intent.<\/p>\n<p>Hebrew Biblical assertions in Genesis 1:27, states: <strong><em>\u201c<\/em><\/strong><strong><em>So God created man in his own image, in the image of God created he him; male and female created he them.\u201d (KJV).\u00a0 <\/em><\/strong>An inviting belief! A provocative belief! A belief sanctioning the idea of a \u201cChosen People,\u201d endlessly seeking to discover GOD\u2019s nature within and without. The Torah, a study in beginnings; the Talmud, to be studied and lived. These compilations affirm God\u2019s (g\u2014d) existence, and the possibility of recovery, discovery, and a new nature of existence.<\/p>\n<p>\u201cAnd GOD said: <strong><em>Let us make man in our image, after our likeness. And \u00a0let them have dominion over the fish of the sea, and over the fowl of the air, and over the cattle, and over all the earth, and over every creeping thing that creepeth upon the earth.&#8221;<\/em><\/strong> KJV.<\/p>\n<p>A powerful brew of thought, appealing and inspiring different minds, especially those whose wealth, power, and position enables them to pursue and actualize horizons beyond those normally accepted and followed. Why not discover the GOD? Why not assume GOD\u2019s roles and functions? Why not \u201c<strong>Become GOD?\u201d<\/strong><\/p>\n<p>An ultimate belief, untethered by realities of its pursuit and consequence. Religions and philosophical systems have long been content with individual spiritual quests. Imagine if we go beyond to actual control of GOD\u2019s functions. Have we not pursued this possibility with the endless \u201cmind control\u201d successes of National Secret State projects and programs?\u00a0 \u201cIt can be done!\u201d<\/p>\n<p>Now, amid the heady spell of technological developments, and the visions of <strong>\u201cBecoming God,<\/strong>\u201d via unlimited technology opportunities and choices, age-old interpretations of these and their implications, has seized the minds of some men and women. Life and death under your control! Why accept the \u201cnineties,\u201d with its feeble \u201cmind\/behavior\u201d technologies, when we can live forever as \u201csuperhumans\u201d with technology\u2019s help?\u00a0 New forms of life and non-life! It is exhilarating! It is exalting! Imagine eternity!<\/p>\n<p>Who wrote the biblical words requiring, compelling, demanding their acceptance? GOD, priest, rabbi, scribe, prophet. It was by human hand. \u00a0The rest is history! First were sounds; grunts, growls, murmurs! Then repeated sounds assumed meanings! Then sounds became words!\u00a0 Then words ordered life. Then words were inscribed on a medium, moving beyond the moment. Then inscribed words became holy, as they appealed to minds resisting doubt! Then powers sanctioned inscribed words as the required rules of their position. Then came groups, tribes, societies, religions, governance, empires, civilizations . . . unfolding across a million years. Today powerful vestiges of the past remain: Gobekli Tempe, Stonehenge, Mounds, Temples, Pyramids. God, Gods, Priests, Wisemen, Emperors, Saints, Man\/Woman.<\/p>\n<p>This then, is the purpose of this paper. To discuss and illuminate the puzzle and its pieces via discussion of seemingly disparate topics, which, in fact, constitute and support a coming evolution to \u201cBecoming God.\u201d Wealth, power, position facilitate this possibility.\u00a0 It may be impossible to halt this course, unless the world is destroyed by nuclear war (GOD\u2019S Hand), and mere survival comes to dominate behavior. If this occurs, humanity must make it clear no more concentrations of wealth, power, and position. Only a new ethic of mutuality.\u00a0 Even then, I wonder if escape is possible from the human imagination of playing with \u201ceternity,\u201d of \u201c<strong>Becoming God,\u201d <\/strong>and controlling human ontology.<\/p>\n<p><strong>Organization of Paper: \u00a0\u00a0<\/strong><\/p>\n<p>It is my intention to weave together a collection of topical concerns into a logical and coherent discussion of the challenge humanity faces as growing control and domination via mass surveillance and archiving increase to untenable and permanent levels. The \u201cConfederation\u2019s\u201d goal: to control human ontology and to create new beings exceeding imagination. Death could be conquered for a few.<\/p>\n<p>The paper is divided into the following sections:<\/p>\n<ol>\n<li><em>Introduction <\/em><\/li>\n<li><em>Authoritarian Control Domination Rule; <\/em><\/li>\n<li><em>Governance: An \u201cOld\u201d Policy and Practice; <\/em><\/li>\n<li><em>National Security Abuses (Technologies, Sources, Behavior Control); <\/em><\/li>\n<li><em>Government Agencies and Offices Involved; <\/em><\/li>\n<li><em>Sources of Totalitarian Secret State Emergence; <\/em><\/li>\n<li><em>How Did We Get to This Point? <\/em><\/li>\n<li><em>What Can Citizens Do? <\/em><\/li>\n<li><em>Ontology: Changes in Human Nature; <\/em><\/li>\n<li><em>Concluding Thoughts. <\/em><\/li>\n<\/ol>\n<p>Patience with the length of paper; it is essential because of the complexity and gravity of concerns. Even so, length is still inadequate to the task. Voluminous scholarship, exceeding my age and time, is required. It is, however, a start!\u2019<\/p>\n<p>What emerges amid the fog, smog, haze, and daze of visible and disguised events and forces,\u00a0 in the USA and World, driven by concentrations of wealth, power, and position among \u201coligarchic\u201d control, emerges omnipresent surveillance, monitoring, and archiving of massive databases is the sinister agenda: tyrannical and totalitarian motivated individuals, groups, and organizations, seeking total control of human ontology via concentrations of wealth, power, and position by a \u201cConfederation\u201d of recognized and unknown forces.<\/p>\n<p>Unless dramatic changes occur, human ontology will accede to maniacal demands for creating and controlling human ontology including chimera, cyborgs, humanoids, hybrids, robots, synths via the processes of Cloning, AI, Nanotechnology, Stem Cells, 3-D Printing, and other emerging technology processes. Imagine human life controlled by a limited number of people with a common goal of \u201c<strong>Becoming God.<\/strong>\u201d It is happening, now, before our eyes.<\/p>\n<h3>II. Authoritarian Control, Dominate, Rule: Course of Human History<\/h3>\n<p>Fictional accounts of compelling dystopian societies, including,\u00a0<em>Brave New World, 1984, The Handmaiden\u2019s Tale, Fahrenheit 451<\/em>,\u00a0<em>The Matrix<\/em>, and scores of apocalyptic movies, are proving prescient.<\/p>\n<p>Once confined to popular reading, entertainment, and college seminars, fictional accounts of dystopian societies have assumed a frightening reality as government, military, corporate, and private sectors, impose oppressive surveillance strategies, methods, techniques, and tactics on citizens. These impositions are destroying the last semblances of legal and moral individual \u201cprivacy,\u201d freedoms, civil rights, and USA Constitution First and Fourth Amendment rights, especially those guaranteed by the Bill of Rights.<\/p>\n<p>Citizen fears for personal safety and security are encouraged and promoted media collaborators with governments, military, and corporate beneficiaries of violence and war; a pervasive sense of peril, danger, and jeopardy is normal. This sense of fear sanctions and authorizes authoritarian national security sectors imposing egregious abuses of citizen rights and privileges with oppressive and punitive measures.<\/p>\n<p>Playing upon Western nation fears of being overrun by invasions, occupation, and exploitation by international migrants, especially from Islamic, Sub-Saharan African, and Central American nations, European citizens in many countries have elected right-wing populist governments determined to implement draconian immigration and refugee policies, limiting or blocking immigration to selective groups and conditions.<\/p>\n<p>USA President Donald Trump announced all \u201cillegal\u201d resident immigrants will be expelled from the USA beginning June 24, 2019, under the auspices of the United States Immigration and Customs Enforcement (ICE) by the Department of Homeland Security. President Trump considers illegal immigrants are a threat to national security as sources of violence, crime, disease, and competing cultural traditions.<\/p>\n<p>A convincing \u201cxenophobia\u201d has found its way into minds and hearts of citizens and officials resulting in the emergence of widespread \u201chate\u201d cultures: \u201cWe hate broccoli, rival schools, politicians, cats, coyotes, foreign countries. \u00a0We accept gun violence. \u00a0Our nation is under attack by dangerous foes seeking our demise and collapse!\u201d This is the thematic effort of those seeking power, control, and domination of citizen masses: it is appeal to fear and \u201cheroic\u201d nationalism, using media and digital propaganda.<\/p>\n<p>Condemnation of the violations of citizen privacy and rights, once guaranteed in the Fourth Amendment of the USA Constitution, is drawing urgent attention from legal and NGO sources, but with little legal consequence.<\/p>\n<p>Government, police, military, and corporate and private agencies are supporting numerous laws and regulations legitimizing pervasive surveillance, monitoring, and storage of citizen information for potential prosecution.<\/p>\n<h3>III. Governance: An \u201cOld\u201d Policy and Practice<\/h3>\n<blockquote><p><em>\u201cExperience has shown that even under the best forms of\u00a0 government, those entrusted with power have in time, and by slow operations, perverted it into tyranny.\u201d<\/em><br \/>\n&#8212; Thomas Jefferson (1743-1826), <em>Preamble to a Bill for the More General Diffusion of Knowledge, Fall 1778, Papers 2: 526-527.<\/em><\/p><\/blockquote>\n<p>Control, domination, and rule of citizen thought, behavior, and identity by authorities and ruling classes is the story of human history; it is the logical outcome when States, Nations, Empires, and Colonial rulers, especially dictatorships royalty, assume disproportionate power.<\/p>\n<p>Protests and rebellions are quelled by a variety of oppressive measures, including arrests, imprisonment, torture, as well as murder, beatings and crowd control tactics. Assassinations and disappearance of rebel leaders is common, as desperate authorities oppress contention.<\/p>\n<p>Never before in history, have the vast means of citizen control, domination, and rule been as total and complete as now exists because of the uses and abuses of technology. Romantic notions of citizen heroes leading uprisings against abusive and corrupt governments and authorities are the stuff of past myths.<\/p>\n<p>Tragically, continued use of effective media and digital propaganda have resulted in citizen widespread concurrence and acceptance of oppression and violation of Constitutional rights and privileges.\u00a0 A paradox!\u00a0 \u201cYes, oppress and control me; I need your protection in a dangerous world.\u201d (\u201cEscape from Freedom. . . Fromm\u201d)<\/p>\n<p>Governance is needed! This reality cannot be contested! \u00a0Contestations of\u00a0 \u00a0abuses of power, however, as manifested in the expansive <strong>Government-Congressional-Corporate-Military-Educational-Media Complex<\/strong><strong>,<\/strong> is required and essential.<\/p>\n<p>As national elections approach, why are no candidates willing to risk the tolls of exposing the situation? Where are accusations and prosecution of encroaching and visible oppressions? Who is speaking about the national and global situation and promising to address the problem? Candidates and individuals in power have failed to speak against the challenge, even as awareness of its destructive implications outweighs many concerns for other issues.<\/p>\n<p>A challenge for citizens is the harsh reality \u201csociety\u201d often hides, distorts, and represses concerns for freedom. Openness, transparency, participation, are required in a democracy. Past presidential candidates have won on a platform of these admirable goals, only to find upon election, they succumb to shadow powers, and conform to traditional agendas using war and violence to achieve unwarranted goals. Who controls the leaders? Hidden governments? Be silent! If you do, you will have a library glorifying your life and office tenure!<\/p>\n<p>In the USA, most citizens never imagined government would \u201cbetray\u201d citizens given the protections of the USA Constitution. Today, however, surveys indicate less than 10% of USA citizens trust the government, and often see the government as biased in favor of special interests via lobbyists.<\/p>\n<p>\u201cNational Security State,\u201d \u201cSecret State\u201d and \u201cShadow State\u201d groups of powerful and positioned individuals assumed power and control, betraying their oaths and loyalty in favor of personal agendas keeping them in power.\u00a0 Much of the \u201cSecret State\u201d individuals are ensconced in Justice Department offices and agencies (i.e., CIA, FBI, DHS, FISA Courts, NSA). Crimes and abuses of these groups continue to unfold daily revealing a tragic story of corruption, collusion, cronyism, conspiracy, complicity, and crime.\u00a0 Learn the \u201cC\u201d words, they control your life!<\/p>\n<p>When societal institutions breakdown and collapse under pressures of corruption, cronyism, special interests, and inadequate funding, citizens are bereft of resources for protection and security. In an open and democratic society, transparency, social responsibility, and voting are keys to citizen awareness and empowerment. What happens, however, when these too are lost to political interests? Voter registrations are cut, gerrymandering occurs, voting machines are stacked and hacked, and propaganda thrives.<\/p>\n<p>Tragically, many \u201csecret state\u201d societies around the world have already destroyed or denied citizen rights, enabling groups with special interests and concerns to exist, and to exact their toll in a coordinated manner \u2013 the \u201cConfederation\u201d lives. Under these circumstances, citizen wellbeing and welfare yield to special interests and the advancement of control in favor of mega-groups pursuing their own interests.\u00a0 Citizens are no longer players; when they attempt to act against control, they are promptly subdued as \u201cEnemies of the State.\u201d<\/p>\n<p>Citizens look to government to protect them, but corrupt governments are too closely linked and connected to secret and known \u201cpower\u201d groups, to offer citizen protection. In the process, citizens lose trust in governments and societal institutions; this raises the threshold for both protests and repression. A conundrum! What is at hand?<\/p>\n<p>Within the context of institution collapse, and the rise of special interest and concerns, citizens become identified with certain groups at the cost of a society\u2019s democratic identity and membership. They seek the comfort and security of identity with fringe elements offering simple solutions and ready identification of obvious enemies among minorities, immigrants, and radical revolution members. Heroes, calling for change, become victims, of their own protests and hopes.<\/p>\n<h3>IV. National Security Abuses and Excesses<\/h3>\n<blockquote><p><em>\u201cThere is no greater tyranny than that which is perpetrated under the shield of the law and in the name of justice.\u201d<\/em><br \/>\n&#8212; Baron de Montesquieu (1689-1755) <em>The Spirit of Laws<\/em>, 1748<\/p><\/blockquote>\n<p><strong>This Section Provides<\/strong><em>:<\/em><\/p>\n<ul>\n<li>A reasonably comprehensive list of technologies used for gathering information on all There are certainly other top secret technologies in use;<\/li>\n<li>A list of information sought for monitoring and storage in government Fusion Centers and private vaults, including those of foreign nations;<\/li>\n<li>A list of behavior control and abuse methods related to technologies and information.<\/li>\n<\/ul>\n<p><strong>Materials and items in the three lists often overlap with one another. All materials and items are in the public domain.<\/strong><\/p>\n<ol>\n<li><strong>Technologies:<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Bill-Board Photography and Monitoring of Automobile Drivers<\/li>\n<li>Airport Body Scans (Gizmodo writes):<\/li>\n<\/ul>\n<p>Within the next year or two, the U.S. Department of Homeland Security will instantly know\u00a0everything\u00a0about your body, clothes, and luggage with a new laser-based molecular scanner fired from 164 feet (50 meters) away. From traces of drugs or gun powder on your clothes to what you had for breakfast to the adrenaline level in your body\u2014agents will be able to get any information they want without even touching you. And without you knowing it.\u00a0(Gizmodo, July 10, 2012).<\/p>\n<ul>\n<li>Brain Wave (EEG) Readers<\/li>\n<li>Bugs (intrusive car, phone)<\/li>\n<li>Bugs (intrusive computer)<\/li>\n<li>Collaboration between massive corporations (e.g., Amazon, Face Book, Google) and government agencies (Algorithms for sharing information)<\/li>\n<li>Drones (Use to photograph, monitor house odors, disable equipment)<\/li>\n<li>Facial Recognition<\/li>\n<li>Finger Prints, Hand Prints, Footprints<\/li>\n<li>Genetic DNA sampling<\/li>\n<li>House-Air Sampling (Drones)<\/li>\n<li>Monitoring, copying, and retaining all phone, email, texting communications:<\/li>\n<li>Source number<\/li>\n<li>Target number<\/li>\n<li>Time of communication,<\/li>\n<li>Date of communication,<\/li>\n<li>Precise location of source and target numbers,<\/li>\n<li>Record conversation,<\/li>\n<li>Permanent archive data in Fusion Centers<\/li>\n<li>Neuroimaging Technologies (e.g., CAT, PET, EMR, SPECT, X-Ray)<\/li>\n<\/ul>\n<p>Medical imaging information gathered via CAT scans, nuclear magnetic resonance, SPECT, and other methods reveal the distinct and unique pattern of electromagnetic radiation (EMR) from your various organs.\u00a0 Everyone has a distinct pattern, and knowing that pattern makes one vulnerable to specific controls using low radio wave frequencies and other invasive technology methods.\u00a0 This is especially a source for abuse using brain information.<\/p>\n<ul>\n<li>Radio-Frequency Identification Inserts (RFID)<\/li>\n<li>Satellite Monitoring<\/li>\n<li>Vision Data<\/li>\n<\/ul>\n<p>Vision data is an example of control. Consider the simple and habitual act of going for a vision examination.\u00a0 As is well known, each person\u2019s eyes have a unique and distinct display and can be sued for flawless identification.\u00a0 Vision identification is more accurate than fingerprints. Thus, when you stare into optometric equipment to determine both your visual equation and your eyes disease, a permanent record is photographed and maintained.<\/p>\n<p>The ubiquitous camera at many traffic intersections has already recorded your face and upper body for security reasons. If you wear sunglasses, efforts will be made to affirm your visual identification.<\/p>\n<ol start=\"2\">\n<li><strong>Sources of Information:<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Brain Wave (EEG) Readers<\/li>\n<li>Catholic Confessional (Bugging &amp; Taping)<\/li>\n<li>Medical Information (EKG, Blood Tests)<\/li>\n<li>Face-Book Data<\/li>\n<li>Fake Photos and Videos<\/li>\n<li>False Accusations, requiring Court and Legal Responses<\/li>\n<li>Finger Print Data Base<\/li>\n<li>Foreign Nation Surveillance (e.g., USA, UK, China, Russia, Israel)<\/li>\n<li>Garbage Analysis<\/li>\n<li>Google, Amazon, Facebook Monitoring<\/li>\n<li>License Plates Readers on Streets and Highways<\/li>\n<li>Neighbor &amp; Friends as Informants\u00a0<em>(Project Infra-Gard)<\/em><\/li>\n<li>Photographs<\/li>\n<li>Political Ideology Organization Surveillance (e.g., AIPAC, Anti-Defamation League, Southern Poverty Legal Fund, Anti-Boycott, White and\/or Black, Latino, Islamic Extremists and Radical Groups)<\/li>\n<li>Private Investigators (Elude Laws. PI can be ruthless and relentless in acquiring data; bugging cars and phones, planting rumors, calling police)<\/li>\n<li>Project INFRA GARD, FBI, 1997, Cleveland, Ohio, (Recruitment of Stores, Malls, Professions, etc. to report on targets. This similar to the STASI policy in East Germany, in which everyone became a target and an informer. There was a justified national paranoia.<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\"><strong><em>Project Infra-Guard<\/em><\/strong> expands FBI data-gathering system. Numerous sources of information regarding individuals or groups are now available to local, national and foreign security groups via:<\/p>\n<p style=\"padding-left: 80px;\">(1)\u00a0shopping expenditures,<\/p>\n<p style=\"padding-left: 80px;\">(2)\u00a0restaurant preferences and expenses,<\/p>\n<p style=\"padding-left: 80px;\">(3)\u00a0hair stylists &amp; barber conversations,<\/p>\n<p style=\"padding-left: 80px;\">(4) grocery purchases,<\/p>\n<p style=\"padding-left: 80px;\">(5)\u00a0gasoline purchases,<\/p>\n<p style=\"padding-left: 80px;\">(6)\u00a0automobile information,<\/p>\n<p style=\"padding-left: 80px;\">(7)\u00a0travel information,<\/p>\n<p style=\"padding-left: 80px;\">(8)\u00a0hotel records,<\/p>\n<p style=\"padding-left: 80px;\">(9)\u00a0publishers, and<\/p>\n<p style=\"padding-left: 80px;\">(10)\u00a0medical\/mental health services.\u00a0Yes, what you say to your physician and\/or therapist is grist for the mill we have created.<\/p>\n<ul>\n<li>Pupillometry (Eye parameters)<\/li>\n<li>Radio Frequency Identification Device (RFID)<\/li>\n<li>Records Acquisition: HIPAA, Medical, School<\/li>\n<li>Records: Family history, pedigree, family tree mapping<\/li>\n<li>Smart and Interactive TV\u2019s<\/li>\n<li>Smart Medicines (Track Use)<\/li>\n<li>Smart Meters (Utility Usage)<\/li>\n<li>Store Security Officials (While you shop, photos are taken, your preferred products identified, your shopping behavior; recall FBI Project Infra-Gard.<\/li>\n<li>Sting-Ray Computer EMAIL Monitor: (Obtains your email from a close distance. Illegal but uses by authorities, foreign nations, and suspicious neighbors)<\/li>\n<li>Subliminal Perception on TV and EMR messages (Can also be used for behavior control)<\/li>\n<li>Television Program Monitoring<\/li>\n<li>Use of consultants, collaborators, cooperatives, cronies, informants, plants, shils, and other forms of collusion to gather info, and to assess or create risk for investigation \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 and persecution\/prosecution (East German\u00a0<strong><em>STASI<\/em><\/strong>).<\/li>\n<li>Use of Law (e.g., Section 215 of Patriot Act authorizes FBI to interview friends, family, professionals, and\u00a0<strong><em>to swear all parties to silence<\/em>)<\/strong><\/li>\n<li>Video Records<\/li>\n<li>Window Vibration Decoding of Conversations<\/li>\n<li>Wire Taps (Proximal and Distal)<\/li>\n<\/ul>\n<p>This image displays the functions of the massive <strong>UTAH DATA CENTER<\/strong>.\u00a0 As the image indicates, citizen data is gathered and saved in permanent storage. The storage capacity is in beyond our comprehension.\u00a0 Access: <a target=\"_blank\" href=\"http:\/\/nsa.gov1.info\" >http:\/\/nsa.gov1.info<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-151597\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-FigureUtah.png\" alt=\"\" width=\"659\" height=\"260\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-FigureUtah.png 659w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-FigureUtah-300x118.png 300w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><\/p>\n<ol start=\"3\">\n<li><strong>Behavior Control and Harassment Methods<\/strong><\/li>\n<\/ol>\n<ul>\n<li>Annoyance Phone Calls<\/li>\n<li>Baiting (Monitoring open purses, money on floor, wheel-chair elderly, flirtations to facilitate arrest)<\/li>\n<li>Behavior Control (Manchurian Candidate)<\/li>\n<li>Control of Brain Waves<\/li>\n<li>Develop and Foster Hostility for Certain Groups (e.g., Target Muslims, African-American Protest Groups, Drug Cartels)<\/li>\n<li>Develop \u201cPseudo\u201d Face Book, Twitter, and Other Social Network Members to Entrap Individuals or Groups<\/li>\n<li>Drugs: Depression, Mania, Confusion (LSD), Dulling, Stoned, Amnesia<\/li>\n<li>Defamation of Character<\/li>\n<li>Entrapments (Use of Authority Promises of Reduced Prosecution)<\/li>\n<li>FISA COURT Abuses. Designating critics of government or political candidates as warranting FISA COURT listing as terrorist, criminal, \u00a0\u00a0\u00a0\u00a0 or spy.<\/li>\n<li>Harassment: Planting False Evidence to Facilitate Arrest<\/li>\n<li>Harassment, Abuse, Prosecution of Whistleblowers<\/li>\n<li>Hypnosis<\/li>\n<li>Identification Implants<\/li>\n<li>Infiltration of List Servs, Media Services, Groups<\/li>\n<li>Informants (Use of Prior Offense People to Entrap)<\/li>\n<li>Microwave Stun Gun (Proximate &amp; Distance)<\/li>\n<li>Rumor Planting and Monitoring: Plant rumors with friends, neighbors<\/li>\n<li>Use of paid private investigators to stalk and harass individuals<\/li>\n<li>Use of citizens as research subjects (injections, drugs, sprays) without consent (hundreds of examples by government agencies)<\/li>\n<li>Use of Toxins (Spraying)<\/li>\n<li>Use of spoiled or toxic foods when shopping. Exchanging similar foods in shopping carts with toxic foods.<\/li>\n<li>Voice Recognition (Monitoring, samples and recreating offensive messages)<\/li>\n<\/ul>\n<p>Data from mass-surveillance technology methods and techniques are distributed to DHS\/NSA State Fusion Centers, and a Computer System named AQUAINT, standing for \u201c<em>Advanced Question Answering for Intelligence.\u201d<\/em><\/p>\n<h3>V. What Government Agencies and Organizations Are Involved?<\/h3>\n<p>According to Wikipedia (2019):<\/p>\n<p>The\u00a0<strong>United States Intelligence Community<\/strong>\u00a0(<strong>IC<\/strong>) is a federation of 17 separate\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Federal_government_of_the_United_States\" ><strong>United States government<\/strong><\/a> intelligence agencies, that work separately and together to conduct <a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Intelligence_assessment\" ><strong>intelligence activities<\/strong><\/a>\u00a0to support the\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Foreign_policy_of_the_United_States\" ><strong>foreign policy<\/strong><\/a>\u00a0and\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/National_security_of_the_United_States\" ><strong>national security<\/strong><\/a>\u00a0of the United States.<\/p>\n<p>Member organizations of the IC include\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Intelligence_agency\" ><strong>intelligence agencies<\/strong><\/a>,\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Military_intelligence\" ><strong>military intelligence<\/strong><\/a>, and civilian intelligence and analysis offices within\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_federal_executive_departments\" ><strong>federal executive departments<\/strong><\/a>. The IC is overseen by the\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Office_of_the_Director_of_National_Intelligence\" ><strong>Office of the Director of National Intelligence<\/strong><\/a>\u00a0(ODNI) \u00a0 making up the seventeen-member Intelligence Community, which itself is headed \u00a0 by the\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Director_of_National_Intelligence\" ><strong>Director of \u00a0National Intelligence<\/strong><\/a>\u00a0(DNI), who reports to the\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/President_of_the_United_States\" ><strong>President of the United States<\/strong><\/a>.<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Intelligence_Community#cite_note-latimes_17-1\" ><strong>[1]<\/strong><\/a><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Intelligence_Community#cite_note-Members_of_the_IC-2\" ><strong>[2]<\/strong><\/a><\/p>\n<p>The IC is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the\u00a0<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/ODNI\" ><strong>Office of the Director of National Intelligence<\/strong><\/a>\u00a0(ODNI). The other 16 members of the IC are:<a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Intelligence_Community#cite_note-9\" ><strong>[9]<\/strong><\/a><\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>AGENCY <\/strong><\/td>\n<td><strong>PARENT AGENCY<\/strong><\/td>\n<td><strong>FEDERAL DEPARTMENT<\/strong><\/td>\n<td><strong>DATE EST.<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Twenty-Fifth_Air_Force\" ><strong>Twenty-Fifth Air Force<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Air_Force\" ><strong>United States Air Force<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Department_of_Defense\" ><strong>Defense<\/strong><\/a><\/td>\n<td><strong>1948<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Army_Intelligence_and_Security_Command\" ><strong>Intelligence and Security Command<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Army\" ><strong>United States Army<\/strong><\/a><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1977<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Central_Intelligence_Agency\" ><strong>Central Intelligence Agency<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Independent_agencies_of_the_United_States_government\" ><strong><em>Independent agency<\/em><\/strong><\/a><\/td>\n<td><strong>1947<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Coast_Guard_Intelligence\" ><strong>Coast Guard Intelligence<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Coast_Guard\" ><strong>United States Coast Guard<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Department_of_Homeland_Security\" ><strong>Homeland Security<\/strong><\/a><\/td>\n<td><strong>1915<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Defense_Intelligence_Agency\" ><strong>Defense Intelligence Agency<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1961<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Office_of_Intelligence_and_Counterintelligence\" ><strong>Office of Intelligence and Counterintelligence<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Department_of_Energy\" ><strong>Energy<\/strong><\/a><\/td>\n<td><strong>1977<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/DHS_Office_of_Intelligence_and_Analysis\" ><strong>Office of Intelligence and Analysis<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><strong>Homeland Security<\/strong><\/td>\n<td><strong>2007<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Bureau_of_Intelligence_and_Research\" ><strong>Bureau of Intelligence and Research<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Department_of_State\" ><strong>State<\/strong><\/a><\/td>\n<td><strong>1945<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Office_of_Terrorism_and_Financial_Intelligence\" ><strong>Office of Terrorism and Financial Intelligence<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Department_of_the_Treasury\" ><strong>Treasury<\/strong><\/a><\/td>\n<td><strong>2004<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Office_of_National_Security_Intelligence\" ><strong>Office of National Security Intelligence<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Drug_Enforcement_Administration\" ><strong>Drug Enforcement Administration<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Department_of_Justice\" ><strong>Justice<\/strong><\/a><\/td>\n<td><strong>2006<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/FBI_Intelligence_Branch\" ><strong>Intelligence Branch<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Federal_Bureau_of_Investigation\" ><strong>Federal Bureau of Investigation<\/strong><\/a><\/td>\n<td><strong>Justice<\/strong><\/td>\n<td><strong>2005<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Marine_Corps_Intelligence_Activity\" ><strong>Marine Corps Intelligence Activity<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Marine_Corps\" ><strong>United States Marine Corps<\/strong><\/a><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1978<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/National_Geospatial-Intelligence_Agency\" ><strong>National Geospatial-Intelligence Agency<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1996<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/National_Reconnaissance_Office\" ><strong>National Reconnaissance Office<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1961<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/National_Security_Agency\" ><strong>National Security Agency<\/strong><\/a><strong>\/<\/strong><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Central_Security_Service\" ><strong>Central Security Service<\/strong><\/a><\/td>\n<td><strong><em>none<\/em><\/strong><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1952<\/strong><\/td>\n<\/tr>\n<tr>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/Office_of_Naval_Intelligence\" ><strong>Office of Naval Intelligence<\/strong><\/a><\/td>\n<td><a target=\"_blank\" href=\"https:\/\/en.m.wikipedia.org\/wiki\/United_States_Navy\" ><strong>United States Navy<\/strong><\/a><\/td>\n<td><strong>Defense<\/strong><\/td>\n<td><strong>1882<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>There are an extensive number of \u201cIntelligence\u201d gathering and utilization organizations, involving hundreds of thousands of employees and an unknown, but obviously considerable, amount of money.<\/p>\n<p>All of this in the name of domestic and national security.\u00a0There are numerous issues regarding duplication, competition, communication, hierarchies, strengths and weaknesses, costs, among these known groups. There is reason to believe there are also unknown groups which function independently.<\/p>\n<p>There is irony and paradox here! The approved protectors and guardians impose constraints and abuses on citizens in the name of national security, however, in doing so, they impose control, domination, and rule constraints.<\/p>\n<p>This is a bewildering anomaly, and one from which there may never be an escape given the secrecy and depth of penetration of governance and private surveillance groups. Can we really expect military intelligence to give up its roles, methods, and ties to weapons manufacturers like Lockheed Martin, Boeing, BAE Systems, Raytheon, Northrop Grumman, United Technologies, General Dynamics.\u00a0 Trillions are spent for the perpetuation of a war industry.\u00a0 Some, with no concern for the consequences, claim \u201cemployment\u201d is the arbiter. It must be asked whether other \u201cemployment\u201d options should be pursued as war industries become entrenched.<\/p>\n<p>There are powerful connections among Silicon Valley corporations, military weapons manufacturers, and the Defense Department.\u00a0They support one another in a \u201csilent\u201d conspiracy of financial relations and ties. Numerous retired military officials and officers go to work for Silicon Valley and weapon industry corporations as consultants and executives. The fix is on!\u00a0 Will this system harvest what it sows? Military capitalism lives.<\/p>\n<p>The <strong>Government-Congressional-Corporate-Military-Educational-Media Complex <\/strong>lives, at least for now; too many people and agencies on the take, too few lack essential conscience! Too many are \u201cWolves of Wall Street,\u201d waiting for opportunities to purse their interests. If a dollar is to be made, seize the moment.\u00a0 Worry about morality later. Money is the arbiter for life in military capitalism and neo-liberal capitalism.<\/p>\n<h3>VI. Foundations of the National Security State (Secret State, Shadow State)<\/h3>\n<p><strong>\u201cWe do it to protect you!\u201d <\/strong>\u00a0\u201cOr nation and the world,\u201d they claim, \u201care in danger from those who seek our destruction.\u201d Thus, we \u201cmust\u201d use the full extent of our national powers and our available technologies to engage in universal surveillance, monitoring, and archiving of information.<\/p>\n<p>It is ironic! To preserve national security, we must become the <strong><em>National Security State,<\/em><\/strong> and deprive you of all your rights and privileges. Doesn\u2019t this make our nation a \u201cterrorist state?\u201d Our presidents and leaders\u2019 \u201cfailures\u201d gave impetus to the National Security State. The National Security State becomes part of a global \u201cConfederation\u201d of concentrated wealth, power, and position.<\/p>\n<p>Sources of the rise, dominance, and control of the national security state can be identified. There are a number of sources, and it is important to consider them as reciprocal. The sources include:<\/p>\n<p><strong>Collaboration and Cooperation of Biased and Compromised Media,<\/strong> which is, arguably, the most important societal check and balance against the abuses, violations, and identification of government \u00a0\u00a0 and private criminal actions;<\/p>\n<p><strong>Development of Vast Complex of \u201cEscape\u201d Clauses<\/strong> within our executive, judicial, and congressional systems permitting\u00a0 individuals to lie, distort, misrepresent, and speak with impunity without fear of prosecution. In brief, a privileged and oligarchic \u201cgroup\u201d is \u201cfree\u201d to engage in illegal actions without accountability, transparency, or risk;<\/p>\n<p><strong>Economic Forces<\/strong>:\u00a0 Monopolies, Federal Reserve System, National Central Banks, Dollar Global Currency via Bank of International Settlements in Switzerland;<\/p>\n<p><strong>\u00a0Military Arms Manufacturing<\/strong> <strong>and Military Capitalism<\/strong> (e.g. Lockheed Martin, Boeing, Raytheon, others);<\/p>\n<p><strong>Empowered Individuals<\/strong>: Presidents Harry Truman, Eisenhower, Bush(s), Barack Hussein Obama, Donald Trump; David Ben-Gurion, Benjamin Netanyahu; Great Britain, Vladimir Putin;<\/p>\n<p><strong>Global Challenges:<\/strong> Climate Change, Energy, Water, Population Growth, Criminal States, Unstable States, Migration, Refugees;<\/p>\n<p><strong>Hard Technologies<\/strong>: Computers, Nano-Technology, AI, DARPA Creations (e.g., HAARP), Sensors, Robotics, Drones, Military Weaponry, IPhone;<\/p>\n<p><strong>Institutional Creation<\/strong>: National Security Act-1947, Central Intelligence Agency, National Security Agency, Foreign Intelligence Services (e.g., GHQC, KGB, Mossad, Nakan);<\/p>\n<p><strong>Institutional Failures<\/strong>: Violation of Separation of Powers, Failed \u00a0\u00a0 Democracy; Legal Enforcement: Patriot Act, Department of Homeland Security, Militarization of Police;<\/p>\n<p><strong>Lust for Power, Wealth, Position and the Domination and Control <\/strong>accompanying these impulses. Selfish motives from troubled minds.<\/p>\n<p><strong>Nation Conflict:<\/strong> USA-USSR, USA-China, USA-North Korea, Colonial Collapse, Israel-Palestine, India-Pakistan;<\/p>\n<p><strong>Oligarchy: Location and Control of Power within a small group of individuals (oligarchy<\/strong>) who by stained temperament, disposition, position, and financial \u00a0 interests seek to increase, sustain, and protect USA state terrorism policies, actions, and organizational structures;<\/p>\n<p><strong>Organized Projects\/Programs: e.g., <\/strong>Project Prism, Project Echelon, Project Minerva, Project Artichoke, Project Bluebird;<\/p>\n<p><strong>Political Ideological Conflicts:<\/strong> Democracy-Communism, Democracy-Dictators, Rich-Poor, Colonial-Sovereign, Democracy-Hypocracy;<\/p>\n<p><strong>Political\/Ideological Beliefs:<\/strong> Exceptionalism, White-Man\u2019s Burden, Project for a New-American Century (PNAC), Militarism; Capitalism;<\/p>\n<p><strong>Soft Technologies: <\/strong>Game Theory, Computational Modeling, Algorithms, Behavior Control, Brain Mapping, Social Media;<\/p>\n<p><strong>Suppression and condemnation of protests<\/strong>, including harassment, persecution, and \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 prosecution of those speaking out against the \u00a0\u00a0\u00a0 National Security State;<\/p>\n<p><strong>Technological developments <\/strong>(e.g., Big Data) permit mass surveillance, monitoring, and archiving of all information on citizens;<\/p>\n<p><strong>Use of Congressional Acts and Secret Agreements<\/strong> to justify and protect abuses including <em>The Patriot Act, The Department of Homeland Security and Fusion Center authorizations, the Foreign Intelligence Surveillance Act (FISA),<\/em>\u00a0and\u00a0<em>Authorization to Use Military Force (AUMF);<\/em><\/p>\n<p><strong>World War II and Others:<\/strong> USA Domination, Cold-War Hysteria, Korea War, Vietnam War, Iraq War, Afghanistan War, Endless Wars.<strong>\u00a0 <\/strong><\/p>\n<p>Marc Slavo (2019), points out the nefarious security cooperatives among countries with mass surveillance systems. He writes:<\/p>\n<p>Many countries have surveillance systems, but the countries in the Five Eyes, Nine Eyes, and 14 Eyes alliances, work together to share data on a massive scale, <a target=\"_blank\" href=\"https:\/\/www.cloudwards.net\/five-eyes\/\" >according to a report by<strong>\u00a0<em>Cloud Wards<\/em>.\u00a0<\/strong><\/a><\/p>\n<p>Innocent people are spied on every day. The Five Eyes, Nine Eyes, and 14 Eyes groups are big players in the global surveillance game. Each country involved can carry out surveillance in particular regions and share it with others in the alliance.<\/p>\n<p>The Five Eyes are the U.S., UK, Canada, Australia, and New Zealand. The Five Eyes alliance, also known as FVEY, was founded on Aug. 14, 1941, and can be traced back to the WWII period. During the second world war, the exchange of intelligence information between the UK and the U.S. was important, and the partnership continued afterward.<\/p>\n<p>The Nine Eyes alliance consists of the Five Eyes countries, plus Denmark, France, the Netherlands and Norway. Though there is \u00a0<a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/world\/2013\/nov\/02\/nsa-portrait-total-surveillance\" ><strong>evidence<\/strong><\/a>\u00a0 the Nine Eyes and 14 Eyes exist, little is known about what they can and can\u2019t do.<\/p>\n<p>The 14 Eyes alliance is made up of the Nine Eyes countries, plus Germany, Belgium, Italy, Spain and Sweden. It\u2019s an extension of the Five Eyes and Nine Eyes alliances, but its actual name is\u00a0<a target=\"_blank\" href=\"https:\/\/electrospaces.blogspot.com\/2013\/12\/14-eyes-are-3rd-party-partners-forming.html\" ><strong>SIGINT Seniors Europe<\/strong><\/a>.\u00a0<a target=\"_blank\" href=\"https:\/\/www.cloudwards.net\/five-eyes\/\" ><strong><em>Cloud Wards<\/em><\/strong><\/a><\/p>\n<p><strong><em>\u201cLegal\u201d authorizations serve to increase control, and to limit and restrain citizen rights and privileges needed to question and to protest.<\/em><\/strong><\/p>\n<p>A recent CIA sponsored Bill, Intelligence Authorization Act\u201d (SB: 3153; HB 3194) garnering Congressional support would criminalize whistle blowers and reporters. Imagine, citizens are to be criminalized and punished for engaging in citizen expected responsibilities of complaint.<\/p>\n<p>Daniel Schuman (July 25, 2019), policy director of <em>DEMAND PROGRESS<\/em>, writes:<\/p>\n<blockquote><p><em>\u201cHouse Intelligence Committee Chair expansion of the Intelligence Identities Protection Act beyond all reason will effectively muzzle reporting on torture, mass surveillance, and other crimes against the American people \u2014 all at the request of the CIA.\u201d<\/em><\/p><\/blockquote>\n<p>Dagny Taggart (2019), a pseudonym for a seasoned reporter fearful of retaliation, based on Pew Survey, results, writes:<\/p>\n<blockquote><p><em>\u201cAmericans Don\u2019t Trust the Govt, the Media, or Each Other: Fading Trust is \u201cSign of Cultural Sickness and National Decline.\u201d<\/em><\/p><\/blockquote>\n<p>Is this any wonder? Years of corruption, cronyism, and crime by government, private corporations, military, and other societal institutions make \u201ctrust\u201d a foolish and unwarranted action. \u00a0This is nothing new!<\/p>\n<p>In the Seventeenth Century, Thomas Hobbes\u2019 (1588-1678), proposed the idea of a <em>Leviathan<\/em> (1651), an oppressive master\/monster over lives to quell brutalities of life imposed upon the people of the day.\u00a0 Hobbes described a world envisioned giving rise to the need for totalitarian control:<\/p>\n<blockquote><p><strong><em>\u201cLeviathan\u201d<\/em><\/strong><\/p>\n<p>. . . there is no place for Industry, because the fruit thereof is uncertain: and consequently no Culture of the Earth, no Navigation, nor use of the commodities that may be imported by Sea;\u00a0 no commodius (commodious) Building; no Instruments of moving and removing such things as require force, no knowledge of the face of the Earth; no account of Time; no Arts; no Letters; no Society; and which is worst of all, continual feare, and danger of violent death; and the life of man, solitary, poore, nasty, brutish, and short (Thomas Hobbes, <strong><em>Leviathan<\/em><\/strong>, 1651).<\/p><\/blockquote>\n<h3>VII: How Did We Come to This Point?<\/h3>\n<p>There are a number of classic sources for understanding how we came to this point of of abuse: Priest &amp; Arkin, 2011; PBS Frontline Documentary: The United States of Secrets: Parts I and II); The<em>\u00a0Emergency State: America\u2019s Pursuit of Absolute Security at All Costs\u201d<\/em>\u00a0(David Unger, 2012; \u00a0<em>\u201cThe Short American Century: A Post Mortem\u201d\u00a0<\/em>(Andrew Bacevich , 2012; <em>The Power Elite (<\/em> CW Mills, 2000), <em>The Watchers<\/em>\u00a0(\u00a0Shane Harris, 2010);\u00a0<em>Police State USA <\/em>(Chumley, 2014;\u00a0<em>Battlefield America <\/em>(John Whitehead, 2017). Scores of others deserve mention and response.<\/p>\n<p>Answers to this question are complex, and involve historical, economic and sociopolitical, and moral explorations.\u00a0 Perhaps, however, there is something to be studied and known about the very individuals who developed and administered this mass surveillance and behavior control system.<\/p>\n<p>In the end, these people had choices, and chose . . . Who are they? What are their names? Should photos be posted?<\/p>\n<p>Volumes addressing this topic include <em>Blue Bird: Deliberate Creation of Multiple Personalities<\/em> (Colin Ross,2000); <em>A Question of Torture: CIA Interrogation, From the Cold War to The War on Terror.<\/em> (Alfred W. McCoy, 2006); <em>A Nation Betrayed: Cold War Experiments Performed on Our Children <\/em>and Other Innocent People (Carol Rutz, 2001); <em>The Manchurian Candidate <\/em>(Condon, R., 2003); <em>Mind Control Information and Facts <\/em>(Peers Want To Know).<\/p>\n<p>Revelations of the national and international mass surveillance, monitoring, and archiving complex are overwhelming in implication and consequence.\u00a0 Claims of disbelief can no longer be dismissed.\u00a0 Events have been unfolding for decades even as USA citizens continue daily life activities, and honoring government leaders who betrayed the Constitution.<\/p>\n<p>As the mass surveillance system becomes better known, what opinions will citizen have of their government, nation, morality.<\/p>\n<p>Figure 2 displays examples of the many government projects and programs designed under the auspices of national security. Each of these projects and programs have required and implemented constraints on citizen freedoms under the guise of security. Whose security?<\/p>\n<p>In my opinion, McMaken (2019), provides a thorough summary of the rise of the <em>National Security State <\/em>and its connection to a \u201cConfederation\u201d seeking absolute control. What emerges is the tragic reality, both chance and choice, have shaped this \u201cLeviathan.\u201d<\/p>\n<p>Family names (e.g., Rockefeller, Bush, Carnegie, Rothchild) re-appear again and again in discussions of those advocating a \u201cnew world order, as do institutions including the Pilgrim Society, Moses Institute, Vatican, Royalty, and corporations (e.g., Amazon, Google, Apple). The unraveling remains a complex and perhaps, dangerous, task. Billionaires exert power because of their wealth (e.g., Bezos, Gates, Zuckerberg, Buffet, Adelson, Icahn, Soros).<\/p>\n<p style=\"text-align: center;\"><strong>Figure 2: USA National Security Projects and Programs<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-151596\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-Figure2.png\" alt=\"\" width=\"436\" height=\"440\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-Figure2.png 436w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-Figure2-297x300.png 297w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2020\/01\/BecomingGod-Figure2-150x150.png 150w\" sizes=\"auto, (max-width: 436px) 100vw, 436px\" \/><\/p>\n<h3>VIII. What Can Citizens Do?<\/h3>\n<p>There have been many suggestions regarding a needed response to the growing totalitarian national security state of the United States.\u00a0 Responses have come from around the world, and many names are now familiar (e.g., Noam Chomsky, Mairead McGuire, Amy Goodman, Johan Galtung, Richard Falk, John Whitehead, Chris Hedges). Protests will arise and be oppressed, participants will be brutalized, imprisoned, and subjected to torture; there are, however, other options for building a more enduring and effective response:<\/p>\n<p><strong>Informed:<\/strong>\u00a0Become informed and educated about the scope and sources of the national security state threats to privacy and behavior control. This can only be done by reading credible sources, reading beyond popular media, and questioning sources with specific hidden agendas (i.e., corporate, military).<\/p>\n<p>This will require learning across different sectors and disciplines. A single profession or discipline is inadequate to understand the complexities of our challenges.<\/p>\n<p>Multisectoral, multidisciplinary, multicultural, multinational learning is required. <strong>Multiplicity is essential! <\/strong>We must move beyond confines of disciplines, sectors, and nations.<\/p>\n<p><strong>Activism:<\/strong>\u00a0Become as active as your circumstances permit in peaceful protests that may include opinion writing, letter writing, petition signing, phone calls to elected representatives, and joining discussion groups via the internet or in real time. Become as active as your circumstances permit with regards to supporting alternative information sources (e.g., Transcend Medial Service, Truthout, Guardian), and with supporting pathways to prosecution for those violating Constitutional and civil rights.<\/p>\n<p><strong>Non-Violence:<\/strong>\u00a0Become committed to non-violence and <strong>nonkilling,<\/strong> as viable pathways for bringing about change. This may well make change a slow and arduous process, and it may never be completely successful. Yet, the course of violence, insurgency, and revolt can only lead to destruction and death, as we are witnessing in the United States and around the world.<\/p>\n<p><strong>Table 1<\/strong> offers a summary of some of the steps and processes required if the National Security State and its connection to the \u201cConfederation\u201d are to be neutralized and eliminated in favor of a citizen-based democracy and peace culture. While many changes are needed, Table 2 lists possibilities. A more complete list is available in Marsella (2013).<\/p>\n<p style=\"text-align: left;\"><strong>Table 1: Brief List of Actions for Neutralizing \u201cConfederation\u201d of National Security State Power and Control<\/strong><\/p>\n<ul>\n<li>Build museums, monuments, holidays, and tributes to peace. Stop glorification of war;<\/li>\n<li>Call a Constitutional Convention to address and correct abuses and offenses;<\/li>\n<li>Choose and support non-violence and nonkilling beliefs and actions across varying religions and life philosophies;<\/li>\n<li>Circulate <strong>UDHR <\/strong>(Universal Declaration of Human Rights) to all schools and \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 governments as an accepted and legal guide;<\/li>\n<li>Condemn and prosecute apartheid in USA and across the world. Fences eliminate possibilities for cooperation and interaction;<\/li>\n<li>Develop alternatives to <strong>Military Capitalism<\/strong> as a dominate economy for expenditures and employment;<\/li>\n<li>Develop Department of Peace as a standing cabinet office, separate from \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Departments of State or Defense.<\/li>\n<li>Development Peace Universities and Peace as an academic major;<\/li>\n<li>End \u201c<strong>Citizen United\u201d<\/strong> as a source of corporate election influence, control, and dominance;<\/li>\n<li>Forgive international loans and student loans;<\/li>\n<li>Limit monopolies: e.g., Big Ag, Big Pharm, Big Health, Big Transportation, Big \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Education, Big Military, etc. Monopolies \u00a0 concentrate power and control;<\/li>\n<li>Limit Presidential terms of office to six years, and Congressional terms of office to eight years. End the seniority system of power which enables congressional members to remain powerful for years;<\/li>\n<li>Prosecute members of Government offices (Justice, CIA, FBI) who have engaged in criminal betrayal of Constitution;<\/li>\n<li>Reform FISA Court Act (Foreign Intelligence Surveillance Act);<\/li>\n<li>Restore balance of power across executive, congressional, and justice sectors;<\/li>\n<li>Restrict Central Banking Model of financial control over nations\u2019 debt;<\/li>\n<li>Support the USA Peace Memorial Foundation;<\/li>\n<li>Teach Peace Across the Curriculum in schools and colleges;<\/li>\n<li>Understand pressing global challenges as reciprocal, rather than independent and isolated. For example, Climate Change is a \u00a0\u00a0 function and determinant of other natural and Anthropogenic \u00a0\u00a0\u00a0 problems<\/li>\n<li>Vote and Fight Voter Fraud<\/li>\n<\/ul>\n<h3>IX. Ontology:\u00a0 Changes in Human Nature<\/h3>\n<p>In the face of massive socio-political, economic, and moral issues, there remains a pressing challenge regarding advances in technology which promise to alter current view of human ontology.<\/p>\n<p><strong>Ontology\u2019s<\/strong> \u201ctruths\u201d can never be static because of human evolution. As time passes, and ions separate millennia, era\u2019s, centuries, and the present, the lessons of history become obvious. Truths of one time period or \u201cera\u201d become recognized by limitations in knowledge present in theological systems, political systems, and socio-cultural systems.\u00a0 It is a time of liberation from existing views, and expansion of what we know and how we know.<\/p>\n<p>Human ontology has always been a varied view, as efforts to explore and seal human-animal possibilities. Today, there is a new reality based on technology and in the control of National Security State forces.<\/p>\n<p>Humanity needs to grasp dramatic and profound accommodation and compromise to new forms of existence, human nature (ontology), and life will be required. There will be a conflict between developing uniformity\/homogenization in cultures and societies, asserting \u00a0diversity\/variation (Marsella, 2014).<\/p>\n<p><strong>Ontological<\/strong> models related to free-choice, spirituality, and religious\/theological models, especially regarding to the nature of morality are being challenged by developments in information processing, artificial intelligence, genetics, subatomic quantum, and astrophysical\/cosmic models.<\/p>\n<p>There will be fundamental challenges to views of human ontology. Of special note is technological survival of the fittest may be confined to those possessing the wealth, power, and position to exploit and to utilize resources for personal privilege and control (e.g., bio-technologies involving mass population cloning, use of bio-mechanical parts, storage of embryos and gametes, and inter-planetary colonization) (Marsella, 2016).<\/p>\n<p><strong>Ontology Implications: Emerging Mechanisms and Procedures for Technological Changes <\/strong><\/p>\n<ul>\n<li><strong>Artificial intelligence (AI);<\/strong><\/li>\n<li><strong>Analytics<\/strong> (information processing methods and procedures capable of informing the state or status of an object, including humans, even as great distances);<\/li>\n<li><strong>Algorithms <\/strong>(Ordered chain of decision processes to resolve a problem);<\/li>\n<li><strong>Brain-Internet Interface Implanted;<\/strong><\/li>\n<li><strong>Commercial Patents (Knowledge restrictions and protections);<\/strong><\/li>\n<li><strong>Mass Data Bases;<\/strong><\/li>\n<li><strong>Mathematical Procedures <\/strong>(Predictive models, computational models, sorting and classifying algorithms, exploring);<\/li>\n<li><strong>New Materials and Substance Creations; <\/strong><\/li>\n<li><strong>Nanotechnology <\/strong>(Existing capacity within ICT industries to reduce the size of information-communication technologies to miniscule sizes; this permits building of complex systems. A nano is 10 <sup>-9<\/sup> in size. Nano-technologies enable development of complex systems simultaneously capable of processing and holding vast amounts of content);<\/li>\n<li><strong>Robotic Humanoids: (<\/strong>How about spare organs?<strong>); <\/strong><\/li>\n<li><strong>Sensors <\/strong>(Materials capable of informing the status or state of an object, and thus enabling feedback to a control system);<\/li>\n<li><strong>Reconstructive Surgeries; <\/strong><\/li>\n<li><strong>Storage:<\/strong> Enormous storage capacities for information and data (units of terabytes, yotabytes, endlessbytes, or larger, not mega or gigabytes). It all started with a \u201cbit\u201d (0.1);<\/li>\n<li><strong>Three-D Printing.<\/strong><\/li>\n<\/ul>\n<p>Mary Shelley\u2019s classic 19<sup>th<\/sup> century book, <em>Frankenstein<\/em>, loomed as a prophetic recognition of the unlimited possibilities of humans crossing known thresholds in the creation of alternative human forms and processes.\u00a0 Mary Shelley, like many others, saw the unfolding of industries and technologies, along with a human impulse to push the limits of imagination and creation. What could be imagined (e.g., flying), could be pursued with unknown and untold consequences! A new day is upon us! The issue is who will control these powerful technologies?<\/p>\n<h3>X. Concluding Thoughts<\/h3>\n<p><strong>Attention!\u00a0<\/strong>We are living in a dysfunctional surveillance state, akin to those written in fictional novels and shown in science fiction movies.\u00a0 Do not dismiss this harsh reality! There is no privacy! Mass surveillance technologies, including satellite spy systems linked to ground surveillance systems, gather, monitor, and archive data on every person and organization. As the System is proud to claim: \u201cWe know more about you, than you know about yourself.\u201d<\/p>\n<p>While this mass surveillance reality may be accepted passively, amid a felt sense of helplessness to contest this \u201cLeviathan,\u201d its acceptance compels recognition of evolutionary changes in epistemology, ontology, and praxeology. Past comforts and conveniences from religions and political belief systems are deceptions, serving to calm fearful minds.<\/p>\n<p>Advent of Artificial Intelligence (AI) technologies resulting in major changes in robotics, forewarns human life is not sacred. Robots, capable of assuming many human tasks and responsibilities without protests, complaints, or risks, will replace humans.\u00a0 Perhaps new species of human-robot interfaces will emerge amid the massive data bases, permitting specific human beings to be duplicated and interfaced with robotic qualities and potential.<\/p>\n<p>New ontologies of human nature are upon us.\u00a0There never was a single human ontology, but rather a spectrum of ontologies defined by culture, place, and situation.\u00a0Biblical notions of God making man in his image failed to grasp God\u2019s image as \u201cnature,\u201d now capable of creating evolutionary species connecting humanity with AI technological capabilities and potential.<\/p>\n<p>The human and life form cycle of <strong>\u201csurvival, adaptation, adjustment, becoming, and evolving,\u201d<\/strong> is present, and always has been occurring, blind to human understanding and aspirations. Certainly, amidst decline and destruction of planet Earth by connections across (1) climate change, (2) air-land-ocean pollution, (3) noise-vision-taste pollution, (4) poverty-malnutrition-toxicity, (5) violence-aggression-war, (6) greed-inequality-capitalism, and (7) nuclear-plastics-garbage waste, a new milieu has developed, prompting \u201celite\u201d to consider \u201c<strong>Becoming God<\/strong>.\u201d<\/p>\n<h3>A Personal Note . . .<\/h3>\n<p>I love the United States of America.\u00a0 My country has offered me, and hundreds of millions of others, opportunities that could not be imagined or considered in any other nation.\u00a0 It is because I love the United States of America, however, and because I am grateful for its Constitution and its history of righting wrongs, and challenging injustices, I have been compelled to write this commentary.<\/p>\n<p>While some may disagree with what I have said, and the passion with which I write, they must not silence the voices of those who seek to promote our heritage and our rights by questioning the abuses occurring. A common method used to dismiss a commentary is by using the term \u201cconspiratorial.\u201d\u00a0 Yet another is by asking the commentator to defend each of their comments.\u00a0 So be it!\u00a0 We are required as citizens to question, to inquire, to analyze, and to reach conclusions<\/p>\n<p>If the United States of America is a democracy, (and it is not a \u201cworking democracy,\u201d as former President Jimmy Carter and scores of others note), then the broad spectrum of projects that constitute the history and context of the National Security State abuses need to be identified, and to be reported to the citizenry for public action.\u00a0 Some policies and actions may well be accepted, but they should never be hidden, especially when their acronymic-named projects define our identity as a nation, people, as an ideal and aspiration for the people of the world.<\/p>\n<p>Omnipresent surveillance, monitoring, and archiving represent an anticipatory policy, tactic, strategy for human evolutionary decline as villainous minds, driven by wealth, power, and position seek total control and domination; their goal: <strong>\u201cBecoming God!<\/strong>\u201d<\/p>\n<p>Life forms at all levels are at risk!<\/p>\n<p>***<\/p>\n<h3><strong>Selected References:<\/strong><\/h3>\n<p>Bacevich, A. (2012).\u00a0<strong><em>The short American century: A post-mortem.<\/em><\/strong>\u00a0 Cambridge, MA: Harvard University Press.<\/p>\n<p>Chumley, C. (2014).\u00a0<strong><em>Police State USA: How Orwell\u2019s nightmare is \u00a0\u00a0 becoming our \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 reality.<\/em><\/strong>\u00a0\u00a0 NY: WND.<\/p>\n<p>Condon, R. (2003). <strong><em>The Manchurian Candidate<\/em><\/strong><em> NY: <\/em>\u00a0Jove Books, 1959\/2003<\/p>\n<p>Ceneys-Tunney, A. (July 12, 2012)\u00a0<strong><em>Rousseau shows us there is a way to break the \u00a0\u00a0\u00a0 chains from within.<\/em><\/strong>\u00a0<em>The Guardian,<\/em>\u00a0London, UK.<\/p>\n<p>Harris, S. (2010).\u00a0\u00a0<strong><em>The watchers: The rise of America\u2019s surveillance state.<\/em><\/strong>\u00a0 NY: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Penguin Group.<\/p>\n<p>Hedges, C. (2015). <strong><em>A Nation of Snitches \u2013 Nation of Change.<\/em><\/strong><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.nation\" >http:\/\/www.nation<\/a> of chan.org\/2015\/11\/-nation-of-snitches\/mass privat (July 25, 2019) <a target=\"_blank\" href=\"https:\/\/www.activistpost.com\/2019\/07\/the-cias-intelligence-authorization-act-%09would-criminalize-whistleblowers-and-reporters.html\" >https:\/\/www.activistpost.com\/2019\/07\/the-cias-intelligence-authorization-act-\u00a0\u00a0 would-criminalize-whistleblowers-and-reporters.html<\/a><\/p>\n<p>Hedges, C., &amp; Sacco, J. (2012). <strong><em>Days of destruction, days of revolt.<\/em><\/strong>\u00a0 NY: Nation Books<\/p>\n<p>Marsella, A.J. <a href=\"https:\/\/www.transcend.org\/tms\/2014\/12\/the-epic-ideological-struggle-of-our-global-era-multiculturalism-versus-homogenization\/\" ><strong><em>(2014) The <\/em><\/strong><strong><em>\u00a0Epic Ideological Struggle of our time<\/em><\/strong><\/a><strong><em>: \u00a0 Multiculturalism versus Homogenization. <\/em><\/strong><a href=\"https:\/\/www.transcend.org\/the-epic-ideological-struggle-of-our-global-%09era-%20multiculturalism-versus-homogenization\/\" ><strong>https:\/\/www.transcend.org\/the-epic-ideological-struggle-of-our-global- era- multiculturalism-versus-homogenization\/<\/strong><\/a><\/p>\n<p>Marsella, A.J. (2016). Relinquishing human identity: Unfolding evolutionary changes via \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 bio-metric technologies. Pp. 23-33.\u00a0 <strong><em>Gatherings: A collection of writing genre. <\/em><\/strong>Alpharetta, Georgia: Mountain Arbor Press (ISBN: 978-1-63183-023-5)<\/p>\n<p>McCoy, A. (2006). <strong><em>A Question of Torture: CIA Interrogation: From the Cold War \u00a0\u00a0 to the War on Terror.<\/em><\/strong> NY<strong>: <\/strong>Metropolitan Books\/Holt.<\/p>\n<p>McMaken, R. (2019) <strong><em>The Deep State: The Headless Fourth Branch of \u00a0\u00a0 Government<\/em><\/strong>. <a target=\"_blank\" href=\"http:\/\/www.lewrockwell.com\/the-deep-state-the\" ><strong><em>http:\/\/www.lewrockwell.com\/the-deep-state-the<\/em><\/strong><\/a><strong><em>-headless-fourth-\u00a0\u00a0\u00a0\u00a0\u00a0 branch-of-government\/<\/em><\/strong><\/p>\n<p>Mills, C. W. (2000).\u00a0<strong><em>The Power Elite.<\/em><\/strong>\u00a0NY: Oxford University Press<\/p>\n<p>Priest, D., &amp; Arkin, W. (2011).\u00a0<strong><em>Top secret America: The rise of the new American \u00a0\u00a0\u00a0\u00a0 Security State.<\/em><\/strong>\u00a0NY: Little Brown.<\/p>\n<p>Ross, Colin (2000). <strong>B<\/strong><strong>lue Bird: Deliberate creation of multiple personalities<\/strong>. NY: \u00a0\u00a0\u00a0 Manitou Publications.<\/p>\n<p>Rutz, C. (2001). <strong><em>A Nation Betrayed: Cold War Experiments Performed on Our \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Children and Other Innocent People.<\/em><\/strong>\u00a0 NY: Fidelity Publishing<\/p>\n<p>Silver, T. (2015). Lifting the veil: <strong>An Investigative History of the United States \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Pathocracy. NY: Want to know.info<\/strong><\/p>\n<p>Slavo, M. (July 31, 2019).\u00a0<strong><em>Satellites Have Already Started Watching Your Every \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Movement. <\/em><\/strong><a href=\"..\/..\/..\/..\/..\/..\/..\/Tony\/Desktop\/Satellites%20Have%20Already%20St%2509arted%20Watching%20Your%20Every%20Movement.html\"><strong>file:\/\/C:\/Users\/Tony\/Desktop\/Satellites%20Have%20Already%20St\u00a0\u00a0\u00a0\u00a0 arted%20Watching%20Your%20Every%20Movement.html<\/strong><\/a><\/p>\n<p>Taggart, D. (2019).\u00a0<strong><em>Americans Don\u2019t Trust the Govt, the Media, or Each Other: \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fading Trust is \u201cSign of Cultural Sickness and National Decline. <\/em><\/strong><em><strong>\u201d\u00a0<\/strong><\/em><a href=\"..\/..\/..\/..\/..\/..\/..\/Tony\/Desktop\/Americans%20Don\u00e2\u0080\u0099t%25%0920Trust%20the%20Govt,%20the%20Media,%20or%20Each%20Oth%09er%20Fading%20Trust%20is%20\u00e2\u0080\u009cSign%20of%20Cultu%09ral%20Sickness%20and%20National%20Decline\u00e2\u0080\u009d.html\"><strong>file:\/\/\/C:\/Users\/Tony\/Desktop\/Americans%20Don%E2%80%99t%\u00a0\u00a0 20Trust%20the%20Govt,%20the%20Media,%20or%20Each%20Oth\u00a0\u00a0\u00a0\u00a0\u00a0 er%20Fading%20Trust%20is%20%E2%80%9CSign%20of%20Cultu\u00a0 ral%20Sickness%20and%20National%20Decline%E2%80%9D.html<\/strong><\/a><\/p>\n<p>Unger, D. (2012).\u00a0<strong><em>The emergency state: America\u2019s pursuit of absolute security \u00a0 at all costs.<\/em><\/strong>\u00a0NY: Penguin Press.<\/p>\n<p>Want to Know.info (website) <strong>Mind Control Information and Facts. <\/strong><\/p>\n<p>Peers. 1607 Francisco Street. Berkeley, California.\u00a0 94703<\/p>\n<h3><strong>***<\/strong><\/h3>\n<h3><strong>Endnote 1:<\/strong><\/h3>\n<p>The term \u201comnipresent surveillance\u201d is taken from John W. Whitehead\u2019s recent article, \u201cThe Omnipresent Surveillance State: Orwell\u2019s 1984 is No Longer Fiction.\u201d Information Clearing House. June 11, 2019. See also Rutherford Institute, Virginia, USA<\/p>\n<p><em>__________________________________________<\/em><\/p>\n<p style=\"padding-left: 40px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/08\/anthony-Marsella1-e1507209259161.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-97653\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/08\/anthony-Marsella1-e1507209259161.jpg\" alt=\"\" width=\"100\" height=\"129\" \/><\/a><\/em><em>Anthony J. Marsella, Ph.D., a member of the <\/em><a href=\"https:\/\/www.transcend.org\/\" >TRANSCEND Network for Peace Development Environment<\/a><em>, is a past president of Psychologists for Social Responsibility, Emeritus Professor of psychology at the University of Hawaii\u2019s Manoa Campus in Honolulu, Hawaii, and past director of the World Health Organization Psychiatric Research Center in Honolulu. \u00a0He is known internationally as a pioneer figure in the study of culture and psychopathology who challenged the ethnocentrism and racial biases of many assumptions, theories, and practices in psychology and psychiatry. In more recent years, he has been writing and lecturing on peace and social justice. He has published 21 books and more than 300 articles, tech reports, and popular commentaries. His<\/em> TMS<em> articles may be accessed<\/em> <em><a href=\"https:\/\/www.transcend.org\/tms\/?s=Anthony+j+Marsella\" >HERE<\/a> and he can be reached at <\/em><a href=\"mailto:marsella@hawaii.edu\"><em>marsella@hawaii.edu<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>9 Jan 2020 &#8211; I use the word \u201cConfederation\u201d because I do believe no single group, no single nation, and no single concern is capable of controlling and dominating humanity, nations, and the world. Defining characteristics of sinister \u201cConfederation\u201d of individuals, groups, and organizations include:<\/p>\n","protected":false},"author":4,"featured_media":97653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[1385,75],"class_list":["post-151375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transcend-members","tag-conspiracy-theories","tag-world"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/151375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=151375"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/151375\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/97653"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=151375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=151375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=151375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}