One World Digital Dictatorship

ENVIRONMENT, IN FOCUS, ANALYSIS, MILITARISM, MEDIA, WHISTLEBLOWING - SURVEILLANCE, 27 Jan 2020

Soren Korsgaard | Crime and Power – TRANSCEND Media Service

Introduction

5 Jan 2020 – Dystopian classics are back into the spotlight, like Aldous Huxley’s Brave New World and George Orwell’s 1984. They have roared back onto bestseller lists due to whistleblowers’ exposés of government imperialism and totalitarian surveillance of their citizens and foreigners. While the kakistocracy and dystopian surveillance state depicted in 1984 undoubtedly reflected, to some extent, contemporary sociopolitical realities, Orwell extrapolated worst-case scenarios set as warnings for future generations. Nonetheless, his book and implicit warnings seem to have been ignored as an authoritarian surveillance state is now a reality for most people in first and second world countries. In lieu of accountability for criminal mass-surveillance or these revelations deterring or limiting the prying eyes of government-sponsored spy programs, the establishment in conjunction with their media platforms has used it to their full advantage, almost as if they, themselves, masterminded the leaks. Rather than being dismantled, the establishment has openly added advanced surveillance technology to their arsenal in their cataclysmic War on Truth.

The mainstream media now parallels Orwell’s Ministry of Truth that broadcasts official explanations, while it effectively neutralizes those who venture outside the parameters of government-approved thinking, which so often equates to threatening their interests. While the current Western population control via advanced surveillance technology and social engineering is unparalleled in history, China has nevertheless rolled out a system that sets new standards for government control, the so-called social credit system. In a few decades from now, if the Chinese government succeeds, those who are imprisoned by the social crediting system will have no reference point or conception of freedom; digital tyranny will have become the norm. To some extent, Western policymakers have been apprehensive of the Chinese program, but as we shall see, it is nevertheless evident that they themselves are working diligently behind the scenes to implement the same technology that makes the Chinese digital prison possible.

The Social Credit System

The Chinese Communist Party implemented the world’s first social crediting system in 2014, a dystopian and Orwellian surveillance-based program that rates citizens according to a set of rules defined by the government; for example, one will be punished for playing too much video game, eating food in the metro, criticizing the government, failing to sort personal waste correctly, swearing in public, and other offenses. On the other hand, one will be rewarded for spying on one’s fellow citizens and reporting to the authorities if people use profane language. At this time, the system has been rolled out in selected cities and declared a success by the government. Before the end of 2020, the Chinese government intends to have assigned a credit score to all of China’s citizens and private businesses, and, at this time, there is, therefore, some variability in the imposed set of regulations and rewards.

If you lose too many points, you become a “blacklisted” individual. Violations, for example, red-light violations, caught on video and mugshots, and personal information of those who are blacklisted are openly displayed on LED screens in public, and even in cinemas as a substitute for commercials. Chinese authorities have also released an app showing “a map of deadbeat debtors” within a 500-meter radius [1]. Users of the app are then encouraged to report if they think a particular debtor could repay his outstanding loans. Rules and regulations cover almost every aspect of human behavior and interaction. For example, if dog owners forget to keep their pet on a leash, disturb other people, or if their leftovers are not removed by the owner for a total of three times, government employees will forcefully remove the dog, and the person will be banned from keeping any dog for five years [2]. Senior citizens may sue their children if they do not visit them regularly; the courts can force the family members to visit them more often [3].

Violations can result in blacklisting. Blacklisted individuals become personae non-gratae: they and their children are banned from a long list of services, like getting out of the country, from specific schools, have their banking accounts frozen, and other people will by force not associate with them as it causes their rating to drop [4]. It is evident that getting blacklisted puts restrictions on movements to such an extent that it effectively amounts to house arrest. It, therefore, seems likely that a blacklisted individual could suffer from starvation and malnutrition as a result of the imposed restrictions. It is important to note that the punishments can – as all other government rules and laws – be changed at any time for the worse. Individuals who have a high credit ranking can receive a list of rewards, including a greater chance of employment, a variety of discounts, and less waiting time at hospitals.

The social crediting system is made possible by extensive and intrusive surveillance, such as video-surveillance and facial recognition technology. The newest technology being rolled out to isolate, control, and modulate people’s behavior parallels science-fiction action thrillers from the 20th century, such as John Carpenter’s They Live from 1988. State-of-the-art technology currently being deployed includes gait recognition technology (they can identify you by the way you walk), robotic birds that hover in the sky monitoring people on the ground, and facial recognition sunglasses for police officers [5]. The surveillance is taken to such an extreme that by 2022 the total number of CCTV installments is projected to increase to 2.76 billion [6].

The Internet also plays a vital role in the edification, the alleged rationale behind the social crediting system, as it is subjected to oppressive control by the Internet Police, a sophisticated unit which monitors online behaviors and punishes government critics, people who watch porn, or somehow else violates the thousands of rules. The Chinese authorities have a well-developed profile of each citizen to the extent that they can find out how often you open your refrigerator, go to the toilet, when you get up in the morning and go to bed as smart meters installed in people’s homes give them that capability. The data is submitted to a variety of analyses, including predictive and behavioral analytics. The end result is a dynamic profile of each citizen. Government workers and artificial intelligence can, at any time, access a file and impose restrictions.

In a blatant propaganda piece on the social credit system by the American NBC News, it was stated that “it pushes you to become a better citizen” and “you are not going to be punished if you haven’t done anything wrong [7].” The terms used in this sentence are obviously subjective; a good citizen from the perspective of the social crediting system is one who never questions authority, always follows the rules, in essence, an aspiring drone controlled by a set of external rules that may at any time be changed. There is no room for individuality, liberty, and creativity within the digital prison. The second assertion has religious connotations as it assumes that the Chinese government and its social crediting system are all fair and just, which is provably false.

The Chinese government and judiciary system are notorious for their criminality, blood lust, corruption, and extreme bias. In 2013, Chinese prosecutors had a conviction rate of 99.93%, yet it was a typical year for them [8]. Provably wrongful convictions and executions are abundant. In 1989, a Chinese executioner put a rifle to the head of Teng Xingshan and pulled the trigger for the murder of Shi Xiaorong. In 2005, however, Shi resurfaced, alive and well. In 1996, 18-year-old Hugjilt was executed 68 days after sentencing despite an abundance of evidence attesting to his innocence. When the Chinese courts finally had to admit that the state had executed an innocent teenager, they compensated the parents with 30,000 Yuan ($4300) [9]. The US justice system is likewise notorious for executing innocent people and forcing innocent people to plea bargain to avoid an overly harsh sentence; in fact, 97% of federal criminal convictions end in a plea bargain while state criminal convictions are at 94% [10, 11]. Nonetheless, in 2015 the average US death row inmate waited 15 years between sentencing and execution, allowing plenty of time for further analysis of the alleged crime committed, and many innocent individuals have been released from death row [12]. In China, execution sometimes takes place immediately after sentencing [13].

Capital punishment is a lucrative business, as organs from executed prisoners are harvested and sold to the highest bidder. For years, the Chinese government denounced the allegations but admitted in 2005 that organ harvesting indeed took place, but asserted in January 2015, they had stopped this practice. Their claim has been met with intense skepticism. The Independent Tribunal into Forced Organ Harvesting from Prisoners of Conscience in China (China Tribunal) has disputed this claim, and presented evidence to the UN that there is “no evidence that the significant infrastructure associated with China’s transplantation industry has been dismantled [14].“ The tribunal concludes, “Forced organ harvesting is of unmatched wickedness even compared – on a death for death basis – with the killings by mass crimes committed in the last century [14].” The International Coalition to End Transplant Abuse in China has concluded that the number of organ transplants may exceed the official government statistics by 1000% [15].

The organ harvesting industry is not only targeting executed prisoners, but is also aimed at “prisoners of conscience,” such as Falun Gong, Uyghurs, Tibetans, and House Christians, and has been “practiced for a substantial period of time involving a very substantial number of victims [14].” In 2001, a whistleblower, Dr. Wang Guoqi, gave testimony to the US House Committee on International Relations. He described in detail how he had been paid $40 for every prisoner he had stripped of organs. He had, however, quit the job in 1995 when he had observed doctors removing the kidneys from a man who was still alive. He had survived his execution. Dr. Wang Guoqi had then inquired whether “the man should be shot again,” but he was informed that it was not necessary “because the man would die after the organ harvest anyway [16].”

Many of China’s “prisoners of conscience” are kept in “concentration camps,” allegedly for re-education purposes; eyewitness testimony and evidence from a variety of sources, however, suggest otherwise [17]. Human rights lawyer Arsalan Iftikhar has called their concentration camps, “a completely Orwellian system of ethnic cleansing, where China is acting as big brother [18].”

Considering China’s long history of causing harm when no harm was merited, it is a distinct possibility that the social crediting system will be used to harvest organs of dissenters who have lucrative, well-kept organs and rare blood types as medical and dental records are a part of each citizen’s digital profile.

Big Brother Is Watching You

Government officials who have commented on China’s social credit system have offered mild criticism of it. For example, in 2018, US Vice President Mike Pence, surrounded by teleprompters, stated, “China has built an unparalleled surveillance state,” but his main point seemed to be that they allegedly often had used US technology to achieve their “Orwellian” state [19]. Deputy Prime Minister of Russia, Maxim Akimov, has stated that Russia “currently” has “no such projects [20].” The adverb, “currently,” signifies that the situation may change in the future.

However, there is no need to analyze their statements rigorously, as the evidence is abundant that governments have systematically and deliberately undermined our liberties and secretly geared up their respective states for a tyrannical, digital prison. As will be shown in this article, the same types of surveillance technology deployed in China are being set up by government agencies or in conjunction with private companies,  in numerous countries, such as USA, France, Australia, Germany, Canada, India, United Kingdom, Russia, and soon they will have the capability to create a digital prison. Additionally, there exists an unmistakable propensity toward crediting systems by private companies. Dr. Gerd Gigerenzer, a director at the Max Planck Institute for Human Development and researcher of the Chinese social crediting system, has warned that western countries are sleepwalking in the same direction, and we are much closer to an Orwellian social crediting system than what it may appear [21].

A variety of crediting systems gauging citizens’ trustworthiness have already been put in place. For instance, Germany is using the universal credit rating system, SCHUFA, which is analogous to FICO, an American version, affecting the majority of those populations and millions of companies. SCHUFA tracks your entire credit history, and by means of classified algorithms, they give you a score. Additional variables also come into play. One of these is “geo-scoring,” meaning that neighbors’ credit ratings can affect yours [21]. If the score is below a certain threshold, you will not be able to acquire a loan, get a phone subscription, etc. This trustworthiness record follows “you everywhere as [a]consumer in your everyday life [22].” Dr. Gigerenzer has warned, “If we don’t do anything, then one day a corporation or a government institution will pull all the information from different data banks together and come up with a social credit score,” and “at the end, we will be in the same state as the Chinese [21].” He concludes, “We live in a world where judgment is being replaced by numbers – by scores that calculate the value of a human being, with the help of algorithms,” and “It would be tragic if somebody’s life was destroyed just because others put blind faith in a commercial algorithm [21].”

In 2018, the Moscow Times reported that by 2025 four out of five Russians will have received a “personal development trajectory [23],” a digital file which Dmitry Kuznetsov, head of IT at Russia’s Pension Fund, has clarified will contain, “Every achievement in a person’s life – the misses, mistakes, big projects [23].” This personal digital file is a part of Russia’s multibillion-dollar program that aims to digitize the economy and roll out digital technologies nationwide. One of these is fifth-generation wireless technology (5G) that is expected to cover 80% of the population by 2025 [24]. Despite overwhelming safety concerns with numerous scientific studies pointing to cancer and other adverse effects at levels “well below most international and national guidelines,” 5G is being rolled out in most advanced countries across the globe [25].

If governments are to create a “smart” or “digital” prison for all of us, it follows that as much as possible of human behavior and interaction with physical devices must be readily quantifiable and internet accessible, preferably connected to large databases; this is often referred to as the Internet of Things (IoT). Government agencies that can process vast amounts of data, such as the National Security Agency (NSA), will then intercept the data to evaluate our interaction with the world. 5G network technology is essential for IoT. One of the devices that can transform physical activity into quantifiable data is a smart meter [26]. Country after country has embraced smart meters and, despite evidence that these devices can be hazardous and carcinogenic, often made their installment compulsory [27]. A smart meter digitizes nearly everything in your household by registering when you do what, for example, when you turn on your computer and when it is off. Old-fashioned measuring devices of electricity were limited to measuring the aggregate consumption of energy, but smart meters can collect data every minute, allowing for “consumer profiling” with high accuracy [26].

Surveillance is essential for the workings of a social credit system, in particular, facial recognition technology or biometric face scanners and similar technology [28]. Numerous governments have embraced the technology. In addition to facial recognition technology, governments have successfully implemented several other types of live surveillance technology such as automated license plate readers, which are mounted on street poles, streetlights, highway overpasses, and attached to police cars. These devices record your license plate, and thus governments will have a well-developed profile of your regular movement pattern, irregularities, where you are, and at what time [29].

Although the implementation of biometric face scanners has been challenged and banned to some extent in a few US cities, the FBI has been working diligently behind the scenes by scanning millions of drivers’ license photos from DMV databases, and in all probability from social media accounts and other sources [30]. According to a report from Georgetown Law’s Center on Privacy and Technology, “law enforcement face recognition affects over 117 million American adults. It is also unregulated. A few agencies have instituted meaningful protections to prevent the misuse of the technology. In many more cases, it is out of control [31].” In March 2017, President Donald Trump issued an executive order mandating a “biometric entry-exit system” for top 20 US airports by 2021 [32]. According to a declassified report by the Department of Homeland Security, all travelers, including US citizens, will be subject to facial recognition technology and other methods of identification [33].

A British court ruled in 2019 that biometric face scanners do not violate privacy and human rights, and it is acceptable that the police use them [34]. Private stores, totaling hundreds if not thousands, use facial recognition technology to scan their customers to detect “subjects of interest” and determine if customers are old enough to buy beer and cigarettes [35]. In August 2019, Big Brother Watch, a British civil liberties and privacy campaigning organization, issued a statement that they had uncovered a “collusion between police and private companies [36].” Law enforcement had allied themselves with private companies, such as the owners of the Sheffield’s Meadowhall, one of England’s largest shopping centers, and secretly used facial recognition technology to scan an estimated two million visitors [36]. One year prior to this revelation, it was revealed that the owners of the Trafford Centre, another popular shopping mall, had in collusion with the Greater Manchester Police scanned around 15 million visitors [37]. Big Brother Watch has characterized the situation as an “epidemic,” and the organization has warned that “facial recognition surveillance risks making privacy in Britain extinct [36].”

The usage of automated live identification systems in Canada is similar to the other countries described in this article, but with one exception. Wei Chengyi, the owner of the Foody Mart grocery chain, has stated that the company is planning to introduce “payment by Chinese-made facial recognition devices [38].” Rather than using a credit card or cash, the facial recognition system identifies the customer and links his face to his account, enabling the person to make purchases by simply looking into a camera.

Reportedly, “Russia is building one of the world’s largest facial recognition networks” and that “according to some projections, it may even be bigger than China’s [39].” In particular, strategical places are targeted since the Russian government knows that people will enter these facilities or use these services at some point, like social security payments and passport renewals, to ensure that virtually no one can escape having their face measured, analyzed, and recorded in an instant.

France has launched a nationwide ID app that strongly parallels one of the most essential aspects of China’s social crediting system. The app gives access to a host of public services; however, you can only access them if you let it scan, analyze, and store your facial characteristics. The only way to verify your identity is by means of a facial recognition scan, which is then compared to your passport photo, and undoubtedly used for a wide range of other classified purposes [40]. The usage of facial recognition technology is similarly on the rise in Germany, and from 2010 to 2017, its usage by law enforcement increased by over 1600% [41].

For years, the government of Australia has been creating a massive database of photographic material from a variety of sources, such as passport photos. The database will be available for “government agencies and private businesses to access facial IDs held by state and territory traffic authorities, and passport photos held by the foreign affairs department [42].” The Australian Privacy Foundation has voiced its concerns and stated that Australia is just steps away from “automated and real-time surveillance of public spaces [43].” Measures strongly paralleling China’s surveillance system were taken in 2019, when the government proposed that facial recognition software should be used to verify users’ identity on certain websites [44].

In 2019, the National Crime Records Bureau (NCRB), an Indian government agency, released a 172-page document. It was announced that the NCRB had started working toward making India the world’s epicenter of facial recognition software, permeating the country’s 29 states [45]. The document urges private companies to submit a proposal to help them build the system. When the contract has been signed, it has been ambitiously estimated that it will take less than one year for the system to go live in the world’s second most populated country [46]. Eventually, there will be a single, centralized database comprised of images from “social media accounts, newspapers, CCTV cameras, passport photos, publicly available pictures, and criminal records. Even artists’ sketches of suspects will be part of the database [47].” Law enforcement will be equipped with “hand-held mobile devices enabling them to capture a face in the field and search it instantly against the national database, through a dedicated app [48].”

According to the NCRB, “This is an effort in the direction of modernizing the police force, information gathering, criminal identification, verification and its dissemination among various police organizations and units across the country [45].” On the other end of the spectrum, Apar Gupta, a lawyer and the Executive Director of the Internet Freedom Foundation, has voiced strong concerns over India’s plans to roll out a national facial recognition database, saying, “political opponents, civil rights activists, government critics, and journalists could become potential targets for surveillance [47].” In January 2009, India launched Aadhaar, which has become the world’s largest biometric ID system, containing details of more than 1.2 billion Indians as of October 2019. Gupta fears that the national facial recognition network might be linked up to Aadhaar, resulting in India becoming a “total, permanent surveillance state [49].” Gupta concludes, “These kinds of technologies will be used not toward satisfying the needs of national security, but to enforce a system of social control, like in China” [47].

In addition to the type of technology that is engineered to identify you swiftly, like biometric face scanners, massive data centers are essential to a social crediting system or digital prison. These centers harvest the most private and sensitive data and use it to create individual profiles that include people’s call history, medical records, school records, employment history, purchase history, network of friends via social media monitoring, movement history through GPS signals, and through sophisticated analyses, it is determined whether or not a person is a threat. Newer cell phones give the user the option to lock and unlock it using one’s fingerprint, or via a facial recognition scan, such data is also collected by these data centers.

Additionally, smart TVs, computers, iPads, cell phones, which are present in millions of homes, record user activity, conversations, movements, and certain video games employ facial recognition software. It has been shown that this data is being intercepted by western governments [50]. The NSA is well known at this time due to the media-friendly whistleblower Edward Snowden who revealed that the US engages in the activities specified above. Specifically, the NSA is the American part of the Five Eyes Alliance, a conspiratorial network designed to intercept data, share it between them, and thus commit espionage on as many people and governments as possible [51]. The other four countries are the United Kingdom, Canada, New Zealand, and Australia. These countries are the main players, but governments have also formed the Nine and Fourteenth Eyes Alliances comprising major and minor European countries [52].

Collectivism and Censorship

While the technology is already available or will soon be to most advanced countries, it can be argued that its availability does not necessitate a rollout of a digital prison. However, for years governments have preconditioned the masses with the ideological underpinnings paramount to a totalitarian digital prison, namely collectivism and the related idea of free-speech restraints via political correctness, brute force, and censorship. By preconditioning the masses, they will slowly be guided into acceptance or compliance with such a system as it is being gradually rolled out.

The Chinese social crediting system is rooted in collectivism and thereby is individualism sacrificed at the expense of the “greater good.” The collectivistic notions that underline this system are similar to these ideas: “A social crediting system is to help us all become better citizens,” and “We need government to protect us.” While collectivistic propaganda runs rampant in socialistic/communistic countries, like Denmark, Sweden, Norway, and many others, it has similarly been integrated into the legal framework, culture, and public awareness of supposedly “liberal” countries like the USA. For example, vaccination has successfully been transformed into an aggressive collectivistic idea by the psychopharmaceutical complex with the assistance of a government-enforced monopoly [53]. While inoculation used to be a personal choice, it has now become mandatory by law in numerous countries and States, and in those places where an individual choice is still possible, dissenters and those who even question the safety of vaccines are targeted for harassment and exclusion. Mandatory vaccination is a collectivistic and social crediting related concept.

Another important collectivistic idea is that of “gun control,” but only for the masses, not for the government personnel (law enforcement, military, etc.). Removing firearms or making them extremely difficult to be obtained has been achieved in numerous socialistic/communistic countries, and effective strategies have been implemented in supposedly “liberal” countries [54]. In a digital prison, it is important that the citizens are unarmed in order to make the population virtually powerless.

Silencing whistleblowers, government critics, and free thinkers is an essential component of any tyrannical regime in order to terrorize the public into compliance, and to keep them isolated from information that runs contrary to official dogmas; the greater the ignorance of human rights violations the lower is the chance of resistance and opposition. The digital revolution has equipped us with lightning speed communication, but ruling elites have weaponized the digitization to control, manipulate, and destroy information that is contrary to their interests. For example, as far back as 2003 and 2004, Internet activists were tracked down, and Chinese judges imposed extremely harsh sentences [55]. With its massive resources, China conducts real-time Internet censoring through artificial intelligence and their cyber police squads. Western governments are no better and spy on their citizens in blatant violation of privacy rights, all enabled by the events of September 11, 2001. Subsequent to September 11, the US government launched the draconian PATRIOT Act, limiting and nullifying laws governing civil liberties [56]. England, France, Germany, and other countries followed in the American footsteps and implemented similar laws [57]. These legislative steps served as the first steps toward an Orwellian digital prison.

In addition to imposing restrictions via legislation, governments have also allied themselves with the corporate juggernaut of Facebook, Google, Twitter, and YouTube for the purpose of censorship and social engineering. YouTube’s CEO, Susan Wojcicki, admitted in 2019 that 10,000 Google employees and artificial intelligence had succeeded in reducing the “amount of time Americans watch controversial content by 70%” and that instead of referring users to “controversial content” they would be directed to government-approved sources, like CNN [58]. Furthermore, there has been a strong move toward punishing intellectuals and public figures for voicing dissent of official narratives and a variety of ideologies, such as questioning the official 9/11 dogma and the transgender ideology, to the extent that such criticism has been codified into law as a criminal offense [59].

Diversity of thought, especially notions that exist outside of the imaginary boundaries established by governments, is no longer accepted in supposedly advanced countries. Even more illuminating is that whistleblowers have been severely punished, tortured, and made an example of in blatant violation of international law, sending a clear message to potential whistleblowers that exposing government corruption might entail grave consequences. For instance, Chelsea Manning (born Bradley Manning) leaked documents exposing horrendous US war crimes, and for her service, she was sent to prison while the perpetrators walked free [60]. The editor-in-chief of WikiLeaks, Julian Assange, despite protests from human rights organizations and the public, has been subjected to arbitrary confinement, harassment, humiliation, and torture, not for spreading false information, but for exposing government corruption, war crimes, and other information. Professor Nils Melzer, the UN’s Special Rapporteur on torture and other cruel, inhuman or degrading treatment or punishment, and a team of medical experts visited the Wikileaks editor in a UK prison.

From their examination, it was clear that Assange displayed “all the symptoms typical for prolonged exposure to psychological torture [61].” Melzer subsequently sent an appeal to the UK government demanding that they adhere to international law, immediately release him, and bar his pending extradition to the US. However, in their considerably delayed response, the UK government “flatly rejected” the appeal, “without indicating any willingness to consider my recommendations, let alone to implement them, or even provide the additional information requested,” Malzer later said [61].

The Special Rapporteur on torture concludes:

“While the US Government prosecutes Mr. Assange for publishing information about serious human rights violations, including torture and murder, the officials responsible for these crimes continue to enjoy impunity [61].”

And:

“The blatant and sustained arbitrariness shown by both the judiciary and the government in this case suggests an alarming departure from the UK’s commitment to human rights and the rule of law. This is setting a worrying example, which is further reinforced by the Government’s recent refusal to conduct the long-awaited judicial inquiry into British involvement in the CIA torture and rendition programme [61].”

And:

“In my view, this case has never been about Mr. Assange’s guilt or innocence, but about making him pay the price for exposing serious governmental misconduct …. Unless the UK urgently changes course and alleviates his inhumane situation, Mr. Assange’s continued exposure to arbitrariness and abuse may soon end up costing his life [61].”

Cognitive Spyware

Surveillance technology follows the trend of other computing technologies, and its cost will decrease while accuracy, size, and speed will improve concomitantly. Governments prioritize control of the masses, and unless significant changes happen to the status quo, scientific development will continue unabated due to sizable government grants. Advanced cameras will eventually reach a size that is nearly unperceivable to the human eye, but even more important is the opportunities advances in technology will provide in regards to monitoring people. Today’s most advanced cameras can monitor physical activity, identify a person, and via advanced algorithms, cameras can outline general characteristics of a person’s appearance, detect if someone is in possession of a gun, and even “detect motions that are commonly used to commit a crime [62].” Although advanced, cameras are nonetheless limited to the physical realm, and while the behavior of a person will reveal a lot about that person’s intentions, mannerisms, etc., the person’s mind can nevertheless hold secrets, engage in “thought crimes,” and plot and outline “crimes” against government or others. In the near future, the mind might not be the refuge it has been hitherto.

A long list of studies found in the PubMed literature deal with decoding human brain activity, for example, by extracting images or thoughts. As early as 2011, Professor Jack Gallant et al. were able to decode brain activity associated with watching movies on YouTube and digitally reconstruct the dynamic mental images using fMRi technology and advanced algorithms [63]. Gallant would later say, “We are opening a window into the movies in our minds [64].” In 2016, in the Journal of Neuroscience, Hongmi Lee and Brice A. Kuhl showed that they could decode information from neural activity in the angular gyrus, a region of the brain associated with memory, and digitally reconstruct a face a person had been instructed to think about [65]. Neuroscientist Divya Chander concludes, “We can now look into the brain and actually see what it is you are seeing,” and “imagine where this technology is taking us … We can now read brains without opening them [66].”

During that same year, Dr. Toshimasa Yamazaki and his team of the Kyushu Institute of Technology in Japan found a connection between sound waves and brainwaves, and they were able to read certain words from people’s minds without them saying anything [67]. Yamazaki has stated that this technology could empower people who are speech impaired. He did not address the more sinister potential of the technology that governments will have the potential to spy on people’s minds. We may call this type of intrusive surveillance for “cognitive spyware.” In the future, cognitive spyware will likely be able to decode intent before an action has been undertaken, and thus we could be punished for thought crimes and crimes without any physical component based on intent.
At the University of California, researchers have developed a “Brain Decoder Device [68].” Although the device is far from being rolled out globally, the objective is clear: it is to monitor what people are thinking. The lead author of the study, Dr. Brian Pasley, has stated, “If you’re reading text in a newspaper or book, you hear a voice in your own head,” and “We’re trying to decode the brain activity related to that voice [69].”

The Defense Advanced Research Projects Agency, or DARPA, has been given considerable government grants to develop Next-Generation Nonsurgical Neurotechnology. Although the majority of their projects are kept in the dark, it has been revealed that they are working on “a nonsurgical interface between the human brain and technology [70].” The goal is to develop a way for humans to “brain control” machines, i.e., an interface between humans and artificial intelligence in order to control robots, cybersecurity systems, weapons systems, drones [70].

In addition to large corporations and the military, Tesla founder Elon Musk through his company Neurolink is also working toward creating a brain-machine interface system, connecting the human brain to an external device via implants. Musk envisions that brain implants could lead to a future of “superhuman intelligence” by means of symbiosis with artificial intelligence [71]. “Over time I think we will probably see a closer merger of biological intelligence and digital intelligence [72],” he has also said.

As animal experimentation has been successful, and monkeys can now control computers with their brains, human trials will begin in 2020 [73]. Elon Musk has warned that super-powerful computers could soon overtake humans, and in order to safeguard us against such a scenario, human biology must be merged with artificial intelligence [74]. Facebook, Inc. is similarly investing heavily in this domain. One of the projects they are working on is “smart glasses” that “superimpose computer-generated images over the real world” [75]. Mark Zuckerberg has stated, “The goal is to eventually make it so that you can think something and control something in virtual or augmented reality [76].” Eventually, this type of technology will enable us to control devices with our minds rather than, for example, type a message on a smartphone or check emails on a laptop. Perhaps smartphones will even be replaced entirely by wearable technology.

If we can control machines with our minds, we are approaching a domain in which machines may also control our minds directly or indirectly. It is well established that people change their behavior when they know or believe there is a chance they are being monitored. It follows that people will modulate their thinking patterns and thoughts if they know or expect that government agencies are eavesdropping on their minds.

Albeit brain decoding technology is still considered “extremely primitive [77],” in some years or decades from now, it will most likely mature, and the cost, efficiency, and accuracy will diminish considerably. When or if that happens, police officers may start to be equipped with “cognitive spyware” glasses, just as today where Chinese police officers wear glasses with facial recognition software. Thought reading software might even become as abundant as cameras are today and perhaps be integrated into smart glasses, smartphones, and found on light poles, in airports, on street corners, in government buildings, etc. Thought reading software is simply an extension of the technology embraced by the majority today. For example, Microsoft’s digital assistant, Cortana, is enabled on millions of computers and smartphones. The digital assistant will appear and be ready to assist whenever its name is said in proximity to the device [78]. In order to accomplish this task, it registers all sounds and conversations.

Getting the majority to embrace new technology and even pay for their own surveillance does not appear to be difficult. Usually, certain benefits are offered by using a particular technology. These benefits are often a veneer covering the true intentions behind the software. In the case of the Pokémon GO game, a highly successful surveillance software, millions of people were actually paying for their own surveillance; surveillance can be made trendy if disguised as a game [79]. Smart meters are touted as devices that are more accurate than analog meters; in reality, a smart meter can act as a surveillance system [80]. The success in regards to smartphones is unparalleled, and billions of people now have one. Surveillance cameras and other equipment are advertised as needed for capturing criminals, but regular people are treated as criminals, and the technology can be used for excessive mental and physical control. The efficiency of a social crediting system largely depends on advanced technology. It follows that advances in brain decoding technology and other types of spying equipment will be integrated into social crediting systems to monitor as much of physical and mental activity as possible.

Blockchain Technology

Cryptocurrencies are reported on in the mainstream news on a daily basis, and most people have heard of bitcoin and possibly even ethereum, the second-largest cryptocurrency by marketcap. The obscure, underlying technology of cryptocurrencies is called blockchain technology or distributed ledger technology. Chinese President Xi Jinping has called the technology for an “an important breakthrough” and allocated extra funding for it [81]. A growing list of countries, China, Russia, Venezuela, Estonia, Japan, and others, has announced their intention of launching a national cryptocurrency [82]. Futurists have predicted that blockchain technology will have a considerable impact upon a long list of industries, including banking, real-estate, healthcare, voting, copyright information, and journalism. Some have ambitiously touted it to be the “new Internet [83].” Blockchain technology eliminates the need for a middleman and trusting a centralized management, as protocols, computer code, and cryptography ensure trust in the network. With middlemen eliminated, blockchain technology enables people to interact with large peer-to-peer networks, and it has the capability to transform and reshape society and economy by making the world more decentralized.

A blockchain is a digital concatenated record of transactions. The name derives from the fact that information is stored in a series of blocks, whereas a block typically contains a predetermined amount of data, for instance, one megabyte of transactions. These blocks of data are connected to form a chain, hence the name “blockchain.” A peer-to-peer network of computers validates transactions against the previous blocks. This means that to alter a particular record, for example, in order to put a spurious bitcoin into existence, it would require altering all subsequent blocks. Because data is spread out over a peer-to-peer network, single points of failure are eliminated; thus, blockchains are decentralized.

The concept of blockchain was put onto paper by a person or group using the name Satoshi Nakamoto, and in 2009 he or they created bitcoin, a decentralized and pseudo-anonymous cryptocurrency that has since become extremely valuable [84]. Cryptocurrencies have provided an outlet for circumventing the conventional banking system and government restrictions. However, a public cryptocurrency is simply one implementation of blockchain technology, and it appears to be an ideal tool for enabling totalitarianism, especially if IoT, blockchain technology, and a social credit system are combined.

Blockchain technology, if embraced by world governments, may become an integrated part of social crediting systems through tokenization and monetary control. For instance, the Chinese government may create a national, digital currency, and by means of facial recognition linked to one’s virtual cryptocurrency wallet, the need for physical cash is eliminated. Proponents of a cashless society could argue that it would eliminate a country’s shadow economy, and put an end to funding of illegal activities and terrorism as every record of every transaction is stored in the blockchain. A government-enabled blockchain-permeated society also fosters social engineering as dissenters, lawbreakers, and others could, in an instant, be cut off from services, if they venture outside the government established parameters.

Blockchain tokenization is a process by which real-world objects or certain types of behaviors can be digitally represented on a blockchain. For instance, a $30 million real estate property was tokenized in 2018 [85]. A token is a unit of value that is recorded on the blockchain. A token economy may be introduced in a social credit system to “build vibrant ecosystems through the use of tokens that can incentivize behavior [86].” Blockchain technology could, therefore, “create something that might enable the coordination of human activity at a much larger scale than has been possible before [86].”  For example, a climate token where anyone who engages in climate-friendly behavior is rewarded, and those who do not contribute to the maintenance and provision of the climate are punished by losing tokens. Unemployed people could receive unemployment tokens for carrying out certain activities, but also have tokens removed from their digital wallet for not sending out enough job applications, etc. Perhaps a certain amount of tokens needs to be earned before a person is qualified for certain jobs.

The applications of blockchain technology are considerable as even industry leaders BMW, Mercedes-Benz, Ford, and Toyota are developing blockchain technology for their products, especially for autonomous vehicles [87]. In 2018, Daimler AG, the parent firm of Mercedes Benz, experimented with a small-scale token-based rewards system to encourage eco-driving. Those who followed the rules were rewarded with MobiCoins, which the driver could then use for a variety of services, like VIP access to DTM Race events [88]. Token economies open up for a combination of blockchain technology, IoT, and a social credit system. Modern blockchains are fast, efficient, and operating in real-time, and are considered superior to traditional methods of storage. Therefore, if blockchain technology is connected to IoT, the result could be a near-complete, digital record of one’s interaction with the world. In conclusion, blockchain technology may enable decentralized and autonomous totalitarianism.

Centralized Government

In favor of a social crediting system, it can be argued that extensive surveillance may reduce violent crime and overall improve people’s moral character, and if the rules, regulations, and punishments are codified into law by a democratically elected government, then a social crediting system is sound. However, as we shall see in the following section, these arguments do not stand scrutiny or justify a totalitarian regime.

Murders and other violent crimes committed outside the law are relatively rare phenomena compared to the violence meted out by governments. In fact, history profusely demonstrates a distinct correlation between the power of a government and atrocities [89]. The more powerful a government is, the more capable it is, and more likely it is to kill its own citizens or foreigners. Throughout history, Chinese governments, like most other governments, have systematically killed their own or other populations through violence or deprivation. For the past century alone, Dr. Rudolph Rummel, whose specialty was democide or death by government, has calculated that the Chinese governments murdered more than 80,000,000 unarmed civilians, while governments murdered 262,000,000 worldwide [90].

This massive and staggering figure is nonetheless deceptively conservative as Rummel ignored numerous democides by successive US governments and other governments he favored, such as the approximate 30% of the North Korean population that was killed by US bombing and chemical warfare [91]. The reason for this neglect can presumably be traced to his palpable American jingoism and his unshakable adoration for democracy. Having not learned from studying the history of government-sanctioned democides, genocides, and holocausts, Rummel vehemently supported President George Bush, who told 935 lies about Iraq between 9/11 and the war of aggression against Iraq in March 2003 [92].

Notwithstanding this “technicality” and that the Iraq war violated international and US law, he labeled the War on Terror, “George Bush’s democratic peace foreign policy [93, 94].” He, furthermore, advocated destabilizing the North Korean regime through assassinations and military force, even if it would kill a million people, in order to democratize the country [95]. Thus, in 2014 when it was well known that the War on Terror had killed millions through violence and war-imposed deprivation, Rudolph Rummel died as a warmonger and as an inciter and intellectual facilitator of genocides and democides [96]. Rummel, despite having a profound knowledge of state-sanctioned violence, never questioned the institution of government and naively went along with the fallacious and widespread notion that we need democracy and elect the right people in order to prevent wars, genocides, holocausts, and democides [97]. In any event, Rummel’s overall conclusion cannot be challenged: “Power kills, absolute power kills absolutely [98].”

Governments, whether they are democratic or dictatorial, have a monopoly on violence, lawmaking, and money printing. Corporations, in particular, the top players of what constitutes the psychopharmaceutical complex and the industrial-military/security complex, control by economic means the force of government in order to create or protect their monopolies. Corporations are able to bribe, coerce, or manipulate governments into granting them unparalleled powers, which without government would not have been possible, for instance, the power to enforce fluoridation and vaccination by law, and inflate military spending and in the process make war and related matters very profitable businesses. In 2018, the world’s military expenditures approximated two trillion dollars worldwide [99].

War is so profitable that the British have invaded 193 countries, Australia 85, France 82, the US 72 (52 after WW2), Germany 39, Japan 30, Russia 25, Canada 25, and Israel 12 [100]. The so-called democratic peace theory, which holds that liberal democracies exercise peaceful foreign relations, is empirically false. While war is profitable for corporations, governments force taxpayers to give up their property in order to finance wars. Government is a control mechanism used to extract wealth from the masses. The well-being of voters or humanity, in general, is not a priority of governments. For instance, since September 11, 2001, about 29 million Americans have died avoidably from “all kinds of ‘life-style’ or ‘socio-political choice’ reasons (smoking, vehicle crashes, alcohol, etc.);” yet, US governments have spent about $6 trillion on wars in Iraq and Afghanistan [100, 101]. In lieu of trying to save the lives of 29 million Americans at home, the industrial-military/security complex has been enriched, and millions have been murdered in the Middle East and North Africa.

Even if elected officials paid heed to the opinion of the majority (an impossibility due to diversity of opinions), their existence is nonetheless illegitimate as it is made possible through taxation without consent, which enables them to maintain power. However, taxation is never a sufficient revenue source for governments, so massive loans are necessary. In 2019, the total world government debt surpassed $70 trillion, around $10,000 for every person in the world [102]; the government is the most economically irresponsible institution in history. Taxation without consent is theft as it violates people’s property rights, but becomes robbery when the instrument of force is introduced. In an essay on taxation, professor of philosophy, Michael Huemer, describes what it means when a government “taxes” citizens: “[It means] that the government demands money from each citizen, under a threat of force: if you do not pay, armed agents hired by the government will take you away and lock you in a cage [103].” Lysander Spooner, a 19th-century philosopher, is noted for saying, “If taxation without consent is not robbery, then any band of robbers have only to declare themselves a government, and all their robberies are legalized [104].”

In his book The Constitution of no Authority, he elaborated on taxation as robbery regardless of the pretensions and number of people involved: “Taking a man’s money without his consent, is also as much robbery, when it is done by millions of men, acting in concert, and calling themselves a government, as when it is done by a single individual, acting on his own responsibility, and calling himself a highwayman. Neither the numbers engaged in the act, nor the different characters they assume as a cover for the act, alter the nature of the act itself [105].”

When we take a closer look at taxation, it becomes clear that it is the greatest single facilitator of most democides, genocides, and wars as these are primarily financed through taxation or even used as the active agent to starve populations to death. For example, under British occupation, the Indians were overtaxed and “despite a very high birth rate, the Indian population did not increase between 1860 (292 million) and 1934 (292 million),” and it has been estimated that 745 million Indians died avoidably from deprivation in this period [106]. It gets worse because the British occupation started in 1757 and ended in 1947, during which “1.8 billion Indians died avoidably from egregious deprivation” pursuant to Dr. Gideon Polya, one of the world’s leading experts on avoidable mortality [106]. Similarly, through taxation, world governments have financed their obsession with holocaust-weapons. In 1986, governments had an estimated 70,300 active nuclear weapons ready to be launched enough to kill all humans on earth multiple times; taxation is not for the benefit of the people, but for the enrichment of the elite [107].

Making matters worse is that governments are dedicated to secrecy. For example, between October 1, 2013, and September 30, 2014, the Obama administration classified 77.5 million documents, despite promises of transparency [108]. Similar trends are apparent in other countries, with the difference being that the US is relatively forthcoming regarding their secrecy. You will never fully know or understand what your government is doing behind the scenes.

With the possible exception of religion, if any other institution had murdered more than 262,000,000 people in one century alone (democide only concerns unarmed civilians, not soldiers), it would have been abandoned by now; yet, people ignore the atrocious history of governments that continues to the present and proclaim their faith in elected officials to solve problems, the most dangerous of all beliefs.

If we make the false assumption that democratic governments represent the prevailing opinion of their respective populations, then the people should, technically speaking, be held accountable for actions undertaken by these officials. For example, in 2016, the US dropped at least 26,171 bombs (a “low” estimate admittedly) in Iraq, Syria, Afghanistan, Libya, Yemen, Somalia, and Pakistan [109]. These 2016 atrocities were committed under the authority of Barack Obama, the 2009 Nobel Peace Prize winner who during his presidency oversaw the bombing of “wedding parties, funerals, kid’s soccer games, hospitals, schools, people in their homes and walking their streets, and farmers tilling their fields [110-115].” If populations started being personally responsible for the actions of state officials, such as spending time in prison for war crimes, then the institution of government would presumably be abandoned rapidly.

Governments’ abysmal humanitarian track record should be ample evidence for us to conclude that a social crediting system will, with little doubt, lead to atrocities. If, on the other hand, we believe that our elected government can and will solve problems for the benefit of the masses, an absurd belief, then as Voltaire said, “we shall commit atrocities [116].”

References:

1. “Chinese app offers map of “deadbeat debtors” near you” https://boingboing.net/2019/01/24/chinese-app-offers-map-of-de.html
2. “Forget to leash your dog? Chinese credit scoring system for owners means you could lose your pet” https://www.scmp.com/tech/policy/article/2170400/forget-leash-your-dog-chinese-credit-scoring-system-owners-means-you
3. “上海新规:子女拒不回家看看或影响当事人信用” www.finance.sina.com.cn/sf/news/2016-04-07/101626350.html
4. “Debtors in China are placed on a blacklist that prohibits them from flying, buying train tickets, and staying at luxury hotels” https://www.businessinsider.com/chinas-tax-blacklist-shames-debtors-2017-12?r=US&IR=T
5. “China launches ‘spy bird’ drone to boost government surveillance” https://www.independent.co.uk/life-style/gadgets-and-tech/news/china-spy-bird-drone-government-surveillance-a8415766.html
6. “IDC predicts China to have 2.76 billion surveillance cameras by 2022” https://kr-asia.com/idc-predicts-china-to-have-2-76-billion-surveillance-cameras-by-2022
7. “A Look Inside China’s Social Credit System | NBC News Now” https://www.youtube.com/watch?v=0cGB8dCDf3c
8. “China scored 99.9 percent conviction rate last year” https://www.washingtonpost.com/news/morning-mix/wp/2014/03/11/china-scored-99-9-percent-conviction-rate-last-year/
9. “Executed Chinese teenager found innocent 18 years on” http://www.hurriyetdailynews.com/executed-chinese-teenager-found-innocent-18-years-on-75633
10. Gross et al. ”Rate of false conviction of criminal defendants who are sentenced to death.” National Academy of Sciences (2004) https://doi.org/10.1073/pnas.1306417111.
11. “Prisons are packed because prosecutors are coercing plea deals. And, yes, it’s totally legal.” https://www.nbcnews.com/think/opinion/prisons-are-packed-because-prosecutors-are-coercing-plea-deals-yes-ncna1034201
12. “The National Registry of Exonerations” https://www.law.umich.edu/special/exoneration/Pages/Exonerations-in-the-United-States-Map.aspx
13. “Immediate executions follow 15 death sentences in China” https://www.irishtimes.com/news/immediate-executions-follow-15-death-sentences-in-china-1.439360
14. “SHORT FORM of THE CHINA TRIBUNAL’S JUDGMENT” https://chinatribunal.com/wp-content/uploads/2019/06/Short-Form-Conclusion-China-Tribunal.pdf
15. “The International Coalition to End Transplant Abuse in China” https://endtransplantabuse.org
16. “Doctor Says He Took Transplant Organs From Executed Chinese Prisoners” https://www.nytimes.com/2001/06/29/world/doctor-says-he-took-transplant-organs-from-executed-chinese-prisoners.html
17. “China putting minority Muslims in ‘concentration camps,’ U.S. says” https://www.reuters.com/article/us-usa-china-concentrationcamps-idUSKCN1S925K
18. “Secret papers reveal workings of China’s Xinjiang detention camps” https://www.aljazeera.com/news/2019/11/secret-papers-reveal-workings-chinas-xinjiang-detention-camps-191125004212642.html
19. “Remarks by Vice President Pence on the Administration’s Policy Toward China” https://www.whitehouse.gov/briefings-statements/remarks-vice-president-pence-administrations-policy-toward-china/
20. “Chinese-Style Social Credit System Is a ‘Threat’ to Russia, Deputy PM Says” https://www.themoscowtimes.com/2018/11/12/chinese-style-social-credit-system-is-threat-to-russia-deputy-pm-says-a63462
21. “Germany edges toward Chinese-style rating of citizens” https://www.handelsblatt.com/today/politics/big-data-vs-big-brother-germany-edges-toward-chinese-style-rating-of-citizens/23581140.html?ticket=ST-33429918-GVpfKPrTyukpP07CqGGM-ap1
22. “What is SCHUFA: your credit record” https://www.settle-in-berlin.com/what-is-schufa/
23. “80% of Russians Will Have State-Gathered ‘Digital Profiles’ by 2025, Official Says” https://www.themoscowtimes.com/2018/09/28/80-percent-russians-will-have-state-gathered-digital-profiles-by-2025-official-says-a63027
24. “Russia Spending Billions on National Digital Economic Development Programs” https://www.russia-briefing.com/news/russia-spending-billions-national-digital-economic-development-programmes.html/
25. “Scientists warn of potential serious health effects of 5G” https://ehtrust.org/wp-content/uploads/Scientist-5G-appeal-2017.pdf
26. Ramyar Rashed Mohassel et al., “A Survey on Advanced Metering Infrastructure,” International Journal of Electrical Power & Energy Systems. http://www.sciencedirect.com/science/article/pii/S0142061514003743.
27. ” Health Experts Caution About Smart Meters ” https://www.saferemr.com/2015/02/health-experts-caution-about-smart.html
28. “FIND FACE” https://findface.pro/en/
29. “In just two years, 9,000 of these cameras were installed to spy on your car” https://qz.com/1540488/in-just-two-years-9000-of-these-cameras-were-installed-to-spy-on-your-car/
30. “FBI, ICE find state driver’s license photos are a gold mine for facial-recognition searches” https://www.washingtonpost.com/technology/2019/07/07/fbi-ice-find-state-drivers-license-photos-are-gold-mine-facial-recognition-searches/
31. “Unregulated Police Face Recognition in America” https://www.perpetuallineup.org
32. “Executive Order Protecting The Nation From Foreign Terrorist Entry Into The United States” https://www.whitehouse.gov/presidential-actions/executive-order-protecting-nation-foreign-terrorist-entry-united-states-2/
33. “Biometric Entry-Exit Program” https://epic.org/foia/dhs/cbp/biometric-entry-exit/Concept-of-Operations.pdf
34. “Police Use of Facial Recognition Is Accepted by British Court” https://www.nytimes.com/2019/09/04/business/facial-recognition-uk-court.html
35. “Almost 30% of retailers use facial recognition technology to track consumers in store” https://www.computerweekly.com/news/4500253499/Almost-30-of-retailers-use-facial-recognition-technology-to-track-consumers-in-store
36. “Facial Recognition ‘Epidemic’ in the UK” https://bigbrotherwatch.org.uk/all-media/facial-recognition-epidemic-in-the-uk/
37. “Greater Manchester Police monitored every visitor to Trafford Centre for SIX MONTHS using controversial technology until they were told to stop” https://www.manchestereveningnews.co.uk/news/greater-manchester-news/gmp-trafford-centre-camera-monitored-15278943
38. “Businessman with Beijing ties looks to bring face-recognition tech to Canadian stores” https://nationalpost.com/news/pay-with-your-face-ontario-grocery-chain-looks-at-paying-via-facial-recognition
39. “Russia Is Building One of the World’s Largest Facial Recognition Networks” https://www.themoscowtimes.com/2019/11/12/russia-building-one-of-worlds-largest-facial-recognition-networks-a68139
40. “France to become first EU country to use nationwide facial recognition ID app” https://www.telegraph.co.uk/news/2019/10/03/france-become-first-eu-country-use-nationwide-facial-recognition
41. “German police expand use of facial recognition software: report” www.xinhuanet.com/english/2018-03/21/c_137055203.htm
42. “Plan for massive facial recognition database sparks privacy concerns” https://www.theguardian.com/technology/2019/sep/29/plan-for-massive-facial-recognition-database-sparks-privacy-concerns
43. https://twitter.com/apf_oz
44. “Australia proposed using facial recognition technology for online gambling and pornography age verification” https://www.privateinternetaccess.com/blog/2019/11/australia-proposed-using-facial-recognition-technology-for-online-gambling-and-pornography-age-verification/
45. “Request For Proposal To procure National Automated Facial Recognition System (AFRS)” ncrb.gov.in/TENDERS/AFRS/RFP_NAFRS.pdf
46. “India is trying to build the world’s biggest facial recognition system” https://edition.cnn.com/2019/10/17/tech/india-facial-recognition-intl-hnk/index.html
47. “India setting up world’s biggest facial recognition system” https://www.dw.com/en/india-setting-up-worlds-biggest-facial-recognition-system/a-51147243
48. “India aims to build world’s biggest facial recognition system: Report” https://www.bgr.in/news/india-aims-to-build-worlds-biggest-facial-recognition-system-report-854992/
49. “India is trying to build the world’s biggest facial recognition system” https://edition.cnn.com/2019/10/17/tech/india-facial-recognition-intl-hnk/index.html
50. “Vault 7: Projects” https://wikileaks.org/vault7/
51. “5 Eyes, 9 Eyes And 14 Eyes Alliance Explained” https://www.privacyend.com/5-eyes-9-eyes-14-eyes-intelligence-alliance/
52. “Five Eyes, Nine Eyes, 14 Eyes – Explained” https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/
53. “Mandatory vaccinations: The international landscape” https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3216445/
54. ” Timeline of Gun Control in the United States ” https://www.thoughtco.com/us-gun-control-timeline-3963620
55. “Communication in China: political economy, power, and conflict” https://books.google.dk/books/about/Communication_in_China.html?id=WUMcAQAAIAAJ&redir_esc=y
56. “Text of the USA PATRIOT Act” https://www.aclu.org/other/text-usa-patriot-act
57. ” Exporting the Patriot Act? Democracy and the ‘War on Terror’ in the Third World ” https://www.jstor.org/stable/20454977?seq=1
58. “YouTube CEO Wojcicki: We’ve Cut Amount Of Time Americans Watch “Controversial Content” By 70%” https://www.realclearpolitics.com/video/2019/12/02/youtube_ceo_wojcicki_weve_cut_amount_of_time_americans_watch_controversial_content_by_70.html
59. “NYC Commission on Human Rights Announces Strong Protections for City’s Transgender and Gender Non-Conforming Communities in Housing, Employment and Public Spaces” https://www1.nyc.gov/office-of-the-mayor/news/961-15/nyc-commission-human-rights-strong-protections-city-s-transgender-gender
60. “Bradley Manning sentenced to 35 years in WikiLeaks case” https://www.washingtonpost.com/world/national-security/judge-to-sentence-bradley-manning-today/2013/08/20/85bee184-09d0-11e3-b87c-476db8ac34cd_story.html
61. “UN expert on torture sounds alarm again that Julian Assange’s life may be at risk” https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=25249&LangID=
62. “Gun Detection” https://athena-security.com/gun-detection
63. “Reconstructing Visual Experiences from Brain Activity Evoked by Natural Movies” https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3326357/
64. “Scientists use brain imaging to reveal the movies in our mind” https://news.berkeley.edu/2011/09/22/brain-movies/
65. “Reconstructing Perceived and Retrieved Faces from Activity Patterns in Lateral Parietal Cortex” https://www.jneurosci.org/content/36/22/6069.long
66. “Brain-Computer Interfaces and Neuroscience ” https://www.psychologytoday.com/us/blog/the-future-brain/201808/brain-computer-interfaces-and-neuroscience
67. “Japanese scientists claim ‘mind-reading’ ability in fresh study” https://www.rt.com/news/328052-japanese-read-thoughts-words/
68. “Reading Mind Technology” www.nanostuffs.com/blog/?p=4701
69. “Penny for your thoughts? Scientists develop mind-reading “brain decoder” that reveals our inner thoughts using sound waves” https://www.cityam.com/mind-reading-possible-new-brain-decoder-can-translate-your-inner-voice-using-sound-waves/
70. “Mind Control of Machines Isn’t Brain Surgery Any More”
https://www.afcea.org/content/mind-control-machines-isnt-brain-surgery-any-more
71. “Elon Musk’s Secretive Brain Tech Company Debuts a Sophisticated Neural Implant” https://www.scientificamerican.com/article/elon-musks-secretive-brain-tech-company-debuts-a-sophisticated-neural-implant1/
72. “Elon Musk: Humans must merge with machines or become irrelevant in AI age” https://www.cnbc.com/2017/02/13/elon-musk-humans-merge-machines-cyborg-artificial-intelligence-robots.html
73. “Elon Musk says he’s tested his brain microchip on monkeys, and it enabled one to control a computer with its mind” https://www.businessinsider.com/elon-musk-neuralink-brain-microchip-tested-on-monkeys-2019-7?r=DE&IR=T
74. “Elon Musk Wants To Connect Human Brains Directly To Computers Next Year” https://www.thedailybeast.com/elon-musk-unveils-neuralink-brain-computer-interface-wants-to-have-human-trials-in-2020
75. “Facebook working on smart glasses with Ray-Ban, code-named ‘Orion’” https://www.cnbc.com/2019/09/17/facebook-enlists-ray-ban-maker-luxottica-to-make-orion-ar-glasses.html
76. “Mark Zuckerberg says brain-reading wearables are coming, but certain functions may require implanted devices” https://www.cnbc.com/2019/10/10/zuckerberg-says-brain-reading-wearables-come-before-implantables.html
77. “New commentary on neuroethics published in Nature” https://gallantlab.org/papers/nature-neuroethics-commentary/
78. “What is Cortana?” https://support.microsoft.com/en-us/help/17214/cortana-what-is
79. “iPhone Users: Pokémon GO Can Spy On Your Entire Google Account — UPDATED ” https://www.forbes.com/sites/thomasbrewster/2016/07/11/pokemon-go-google-privacy-disaster/#391e326a3cde
80. “Calif. utilities yield energy-use data” https://www.sfgate.com/business/article/Calif-utilities-yield-energy-use-data-4611159.php
81. “Crypto Markets Pump As President Xi Calls Blockchain a ‘Breakthrough’” https://bitcoinist.com/china-president-xi-blockchain-breakthrough/
82. “List Of Countries That Have Plans To Roll Out Their Own Cryptocurrencies” https://coinsutra.com/national-cryptocurrencies/
83. “Why are people referring to Blockchain as the New internet?” https://www.blockchain-council.org/blockchain/why-are-people-referring-to-blockchain-as-the-new-internet/
84. “Bitcoin: A Peer-to-Peer Electronic Cash System” satoshinakamoto.me/bitcoin.pdf
85. “A First For Manhattan: $30M Real Estate Property Tokenized With Blockchain ” https://www.forbes.com/sites/rachelwolfson/2018/10/03/a-first-for-manhattan-30m-real-estate-property-tokenized-with-blockchain/#4c25381e4895
86. “Blockchain Technology Explained (2 Hour Course)” https://www.youtube.com/watch?v=qOVAbKKSH10
87. “Real-life Blockchain Use Cases in Automotive” https://openledger.info/insights/blockchain-use-cases-automotive-industry/
88. “Car Manufacturer Daimler AG Launches Crypto Coin as a Reward for Eco-Friendly Drivers” https://interestingengineering.com/car-manufacturer-daimler-ag-launches-crypto-coin-as-a-reward-for-eco-friendly-drivers
89. “Freedom, Democracy, Peace; Power, Democide, and War” https://hawaii.edu/powerkills/welcome.html
90. “20TH CENTURYDEMOCIDE ” https://hawaii.edu/powerkills/20TH.HTM
91. “KNOW THE FACTS: North Korea lost close to 30% of its population as a result of US bombings in the 1950s” https://www.globalresearch.ca/know-the-facts-north-korea-lost-close-to-30-of-its-population-as-a-result-of-us-bombings-in-the-1950s/22131
92. Lewis, Charles (2014). 935 Lies: The Future of Truth and the Decline of America’s Moral Integrity. PublicAffairs.
93. “American Monster: Chris Kyle, the American Sniper” https://www.crimeandpower.com/2019/09/28/american-monster-chris-kyle-the-american-sniper/
94. “All novels/books DOWNLOADABLE and FREE in PDF” https://hawaii.edu/powerkills/NH.HTM#SUPPLEMENT
95. “The Democidal Famine In North Korea” https://www.orthodoxytoday.org/articles4/RummelKorea.php
96. “Paris Atrocity Context: 27 Million Muslim Avoidable Deaths From Imposed Deprivation In 20 Countries Violated By US Alliance Since 9-11” https://www.countercurrents.org/polya221115A.htm
97. “The Democratic Peace” https://hawaii.edu/powerkills/MIRACLE.HTM
98. “POWER KILLS” https://www.hawaii.edu/powerkills/PK.CHAP1.HTM
99. “World military expenditure grows to $1.8 trillion in 2018” https://www.sipri.org/media/press-release/2019/world-military-expenditure-grows-18-trillion-2018
100. “Ongoing Global Avoidable Mortality Holocaust and Horrendous Human Carnage from War and Hegemony” https://www.crimeandpower.com/2019/12/09/ongoing-global-avoidable-mortality-holocaust-and-horrendous-human-carnage-from-war-and-hegemony/
101. “American Holocaust, Millions Of Untimely American Deaths And $40 Trillion Cost Of Israel To Americans” https://www.countercurrents.org/polya270813.htm
102. “World Debt Clock” https://commodity.com/debt-clock/
103. “Is Taxation Theft?” https://www.libertarianism.org/columns/is-taxation-theft
104. “Lysander Spooner” https://www.goodreads.com/quotes/1240517-if-taxation-without-consent-is-not-robbery-then-any-band
105. “The Constitution of no Authority” https://en.wikisource.org/wiki/No_Treason/6#16
106. “Britain Robbed India of $45 Trillion & Thence 1.8 Billion Indians Died From Deprivation” https://www.crimeandpower.com/2019/10/27/britain-robbed-india-of-45-trillion-thence-1-8-billion-indians-died-from-deprivation/
107. “Status of World Nuclear Forces” https://fas.org/issues/nuclear-weapons/status-world-nuclear-forces/
108. “The Government Is Classifying Too Many Documents” https://www.thenation.com/article/the-government-is-classifying-too-many-documents/
109. “How Many Bombs Did the United States Drop in 2016?” https://web.archive.org/web/20170106155853/https://blogs.cfr.org/zenko/2017/01/05/bombs-dropped-in-2016/
110. “Obama The War Criminal Butcherer of Women and Children” https://www.paulcraigroberts.org/2017/01/11/obama-the-war-criminal-butcherer-of-women-and-children/
111. “The Wedding That Became a Funeral: U.S. Still Silent One Year on From Deadly Yemen Drone Strike” https://www.newsweek.com/wedding-became-funeral-us-still-silent-one-year-deadly-yemen-drone-strike-291403
112. “Doctors Without Borders Hospital Bombing: Witnesses Recount Strikes” https://www.nbcnews.com/news/world/doctors-without-borders-hospital-bombing-witnesses-recount-strikes-n438506
113. “U.S. Drone Strike Said to Kill 60 in Pakistan” https://www.nytimes.com/2009/06/24/world/asia/24pstan.html
114. ” Victim of Obama’s first drone strike: ‘I am the living example of what drones are’ ” https://www.theguardian.com/world/2016/jan/23/drone-strike-victim-barack-obama
115. “Most US drone strikes in Pakistan attack houses” https://www.thebureauinvestigates.com/stories/2014-05-23/most-us-drone-strikes-in-pakistan-attack-houses
116. “Voltaire > Quotes > Quotable Quote” https://www.goodreads.com/quotes/544453-if-we-believe-absurdities-we-shall-commit-atrocities

__________________________________________

Danish writer Søren Korsgaard, author of America’s Jack the Ripper: The Crimes and Psychology of the Zodiac Killer, is the editor of www.crimeandpower.com and webmaster of www.paulcraigroberts.org.

Crime and Power is a news organization dedicated to unraveling great crimes and corruption through fearless and uncensored journalism. Our in-depth investigations and uncompromising analyses focus on the psychology of political and individual serial killers, the War on Terror and Drugs, 9/11, fluoridation, avoidable mortality, as well as ignored holocausts and genocides. We also publish personal stories from inmates (current and former) to document their experience with the criminal justice system, solitary confinement, death penalty, and other issues.

Go to Original – crimeandpower.com


Tags: , , , , , , , , , , , , , , , , , ,

Share this article:


DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

Comments are closed.