Powered By Christian Gifts

Sunday, January 18, 2009

Frankenstein Vs. The Americans

Pat Dollard again. I tell ya the guy is on a roll....

” …sit down with your FBI/NSA/whoever contacts and have them bring you up to speed on something I’ve termed “Frankenstein.” Use that name and they’ll know what you’re talking about. They’ll also know it came from me.

Frankenstein is a comprehensive surveillance system of such scope that it is vacuuming up every bit of electronic intelligence generated within the USA. Emails, blog postings, web searches, phone calls, faxes, “Letters to the Editor” of newspapers, credit card receipts. Everything all of us generate in the course of a day. The data is then analyzed to (1) determine whom all of us communicate with, and (2) to update our computerized psych profiles in real-time.

Frankenstein was begun under Bush 41, but it was Clinton who recognized its value for domestic political espionage and pruned it like a Bonzai tree into that direction. Bush 43 failed to remove Clinton’s sycophants from the beauraucracy, and so it continued to grow and entrench itself during his tenure.

In fact, so powerful and far-reaching is Frankenstein, so key is it to the successful overthrow of the Constitution, that one might be tempted to theorize that 9/11 was an “inside job” for purpose of getting Americans accustomed to the idea of “government surveillance for the public good.”

“Conspiracy theories” notwithstanding, understand this: If Frankenstein can be used to track the movement of the Muslim Brotherhood, if it can be used to discern patterns of behavior suggestive of sleeper-cell agents, it can — and will — be used to identify patriots who are likely to rise up in revolt against the “ruling class” in order to PRE-EMPT their threat to the holders of power. Because that’s really what Frankenstein was all about: Tilting the balance of power away from the will of the governed and towards the ruling class.

To this end, I offer this warning to all of you who are organizing: Learn the lesson from the 9/11 hijackers, and become so “low tech” in your organizing that you “fly under the radar” of Frankenstein, to where your activities leave no electronic receipt. Otherwise, you stick your head into Frankenstein’s radar and it’ll nail you instantly.

And don’t rely upon consumer-grade encryption software to protect your communications. The NSA has entire departments whose only job is to develop short-cut attacks on block or stream ciphers. They can break your “encrypted” communications in real-time.

If you don't grasp the significance of "Frankenstein", do some research on the "Echelon" and "Carnivore" programs.

"All your base are belong to us."