Surveillance State? Nah, Can’t Happen…Because it Happened Already

by | Mar 26, 2018 | Headline News | 21 comments

Do you LOVE America?


    Many have argued that there is neither a surveillance state, nor a concerted effort to disarm the public door-to-door, house by house, etc. Some of these are far-leftists, masquerading as conservatives…trying to appear “skeptically cynical.” We’ll “game” the thought, to bring everyone back from opacity to transparency.

    1. The Communists, Marxists, Leftists, Progressives, Liberals, Democrats, and their ilk deliberately try to disguise the true objectives as outlined in the Planks of the Communist Party…passing themselves off as “middle-ground” in their stances.
    2. By denigrating the concept of an imminent surveillance state and ridiculing it, they draw conservatives who are still undecided (“fringe elements”) out of being proponents of the idea…further weakening and obfuscating people’s awareness.
    3. The movement of the groups mentioned never ceases: It hasn’t ceased with the fall of the Berlin Wall and subsequent reunification of Germany in 1990, nor the fall of the Soviet Union…more a “restructuring” than a fall…in 1992. The Communists are alive and well, operating within the United States at the lowest levels of society, and at the highest levels of government. We’ll stay with “Communists” as the label, as they are the end-state and will purge all the others who aren’t in complete lock step with them. They are Communists.

    That being mentioned, as they craft their narratives and lie openly upon the television, radio, and within the newspapers, there is a subtle, devious operation going on right before your eyes:

    The emplacement of a complete surveillance state of cameras and listening devices, all a part of the “wondrous internet of things.”

    For that last paraphrase, thank David Petraeus…former head of the CIA (in name only) yet without the technical alacrity to avoid the very thing he lauded…and hence, his downfall via Paula Bridewell. Thanks, Dave, for your erstwhile contribution to crafting the surveillance state. Dave serves as the prime example: no matter how much of a “big hitter” toward the NWO (New World Order) a globalist or establishmentarian one is, they are always expendable.

    The surveillance state has just been proven with the recent string of bombings in Austin, Texas where the protagonist blew himself up when he was tailed and cornered. This article was released by AP, written by Paul J. Weber on 3/22/18, and it seems to have escaped much notice. I am providing an excerpt that is almost the full article. When you read it, you will see why it is so important. Here it is:

    How Police Finally Found the Austin Bomber

    AUSTIN, Texas (AP) — The suspected Austin bomber is dead after terrorizing Texas’ capital city for three weeks. And in the end the manhunt wasn’t cracked by hundreds of phoned-in tips, the big pot of reward money or police pleading to the bomber through TV.

    One of the largest bombing investigations in the U.S. since the Boston Marathon attacks in 2013 came to an intense close early Wednesday when authorities say they moved in on Mark Anthony Conditt at an interstate hotel. Austin Police Chief Brian Manley said Conditt blew himself up after running his sport utility vehicle into a ditch.

    Here is what’s known about how authorities finally zeroed in on the suspected bomber after 19 days, two dead victims and more than 1,000 calls of suspicious packages around the city:



    Conditt had been careful to avoid cameras before entering a FedEx store in southwest Austin this week disguised in a blond wig and gloves, said U.S. House Homeland Security chairman Michael McCaul. The Austin congressman had been briefed by police, the FBI and the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives.

    McCaul said going into the store was Conditt’s “fatal mistake.” He said authorities previously had leads on a red truck and that the surveillance video from the FedEx store — where Conditt is believed to have dropped off an explosive package destined for an Austin address — allowed investigators to identify him and the truck.

    Said Texas Gov. Greg Abbott, “I’m not sure how much they narrowed him down to an exact person of who he was before he went into that FedEx store.”



    At the FedEx store, McCaul said investigators got from surveillance the truck license plate that linked the vehicle to Conditt, which in turn gave authorities a cellphone number they could track. McCaul said Conditt had powered down his phone for “quite some time” but that police closed in when he switched it back on.

    “He turned it on, it pinged, and then the chased ensued,” McCaul said.

    Abbott said police were able to closely monitor Conditt and his movements for about 24 hours before his death. The governor said the phone number was used to tie Conditt to bombing sites around Austin.

    “The suspect’s cellphone number showed up at each of the bombing sites as well as some key locations that helped them connect him to the crime,” Abbott said.



    Authorities say they also tracked down Conditt, a 23-year-old unemployed college dropout, through witness accounts and other purchases, including at a Home Depot where McCaul said the suspect bought nails and other bomb-making materials.

    Abbott said Conditt’s purchases at the Home Depot also included five “CHILDREN AT PLAY” signs, one of which was used to rig a tripwire that was set off by two men Sunday in a southwest Austin neighborhood. One of them was walking and the other was riding a bike.

    William Grote told The Associated Press that his grandson was one of the victims and had nails embedded in his legs from Sunday’s explosion.

    The batteries to power the bomb were purchased through the internet, McCaul said.



    The initial bomber profile sketched out by FBI behavioral scientists was that he was most likely a white male, McCaul said. And while that part was right, the congressman said, a full psychological profile won’t come together until investigators have time to comb through Conditt’s writings and social media posts.

    Conditt’s motive is not clear. But on Wednesday, police discovered a 25-minute video recording on a cellphone found with Conditt, which Manley said he considers a “confession” to the bombings. Manley said it described the differences among the bombs in great detail.”

    Obviously, someone made a big mistake in revealing this information to the stultified, oblivious public…that selfsame public of “We the People” that has the right to know, and yet doesn’t understand what is happening.  Worse: The public doesn’t care what’s happening. Let’s summarize what these main points mean, for those of you who do care:

    1. The cellular telephone is nothing more than a tracking device…as mentioned, it “pings” its position and gives away the location of the owner…along with all of his vital information in the file… every four seconds.
    2. The cell phone’s location is tied into the location of every camera, public and private that has a tie-in to the CCTV system monitored by law enforcement in the fusion centers…from the Happy Burger parking lot cameras to the cameras mounted at the intersections in cities, towns, and suburbs. As the happy cell phone passes these locations, the movement is tracked in real time, and recorded.
    3. Granted, they had a suspect, but they can review all of the cameras at any business at any given time…to show what Joe the Plumber-turned-bomber may be purchasing at the friendly store…and they can tie that film in with real-time with the cell phone.
    4. The vehicle is also the “buddy” of the police and the surveillance establishment. They take pictures and film of the license plate, the car, and glimpses of Joe the Plumber driving it…corroborated by the happy, ever-pinging cellular telephone (the tracking device).
    5. All this data for everyone’s movements is recorded, catalogued, and stored…stored away for an indefinite period of time (forever) until the information is needed as evidence or in an investigation. Investigation!  Doesn’t that sound exciting?  Guess what?  Everyone is being investigated, and all of the data on everyone is kept.
    6. Purchases! Everybody has to buy things, stuff, etc.  Every time you pull up to the gas pump, the car is photographed.  The POS (point of sale) at the register tabulates and inventories everything, tying it in to the gas pump, with a picture of Joe and whatever form of fiat he used to pay for the gas and bag of chips.  Purchases track in real time, access whatever form of payment you use, tying you in with others…if you use your spouse’s credit card, for example.
    7. Cops have license plate/tag readers that can read hundreds of different plates, categorizing all of them in accordance with sensitive data that may have nothing to do with driving upon the roads or their record with the vehicle.
    8. Every Internet search, every purchase, every query, every e-mail is saved and read/tabulated into the overall matrix that assesses the potential for an individual to be “harmful” and stored…to be matched against the subject’s behavior and movements at a later date. Systems are already in place that analyze keystrokes for the comparison and narrowing down of who the typist is.
    9. Every library sign-out…film, music, or book…is saved and kept for future reference.
    10. Biometrics are making the “fingerprint” even more specific…with eye to eye distances, ear shapes, and gaits measured.  Any exposed portion of the skin, and the movement and function of the limbs is analyzed and recorded.
    11. Every piece of mail is scanned to save sender and recipient’s addresses and (of course) purchases are recorded within the company and matched against what is sent out and to whom.
    12. Satellites can target and surveil in real time and tie in to all of the little devices just mentioned.
    13. Laptop computers can be traced in accordance with the purchaser’s information from the POS and onward…and the laptops record, photograph, and film as well as putting forth a “ping” of their own…especially when connected to the Internet. All laptop use is matched and corresponded to other places of business (their cameras, etc.)
    14. Association: when you’re on your laptop, and here come Smiling Sam and Brother Bob, each with pinging cell phones…letting the authorities know that in that moment of time (Whitney Houston’s “One Moment in Time”) Sam and Bob were right in front of you. Later they can haul both of them in to corroborate that you were on your laptop in front of HappyBurger at whatever date or time they have on record.

    This excerpt shows that all of these items are in place. Yes, they are surveilling you…are watching all of us. The surveillance is not ubiquitous yet. Not yet. It will be, and soon. They utilized every feature mentioned above to find the bomber. Great. Society has triumphed, and the mad bomber has met his end.

    But has society really triumphed? That article gives you insight into how the cage is almost completed…the construction is just about finished. What requires further thought is what they will do with this surveillance once it is in place and ubiquitous. Just a few further thoughts for your consideration. You may want to watch what you place into your e-mails and comments. There are techies in the Puzzle Palace and at Ft. Meade whose function is identifying the commenters.

    Don’t place anything on the Internet that can come back and bite you later. The most effective means of exchange are not on the Internet when it comes to information. Blogs, writers, and commenters have already been “marginalized” and their effectiveness diminished because it is an open source. Your true effectiveness in getting things done is at the “grass roots” level…locally, in small groups for discussion. Your “tool of transmission” is a manual typewriter.  Need copies?  Get back to Carbon paper. There won’t be a recording of what you copied at your FriendlyCopy center…the one with your information in real-time, right under the eye of the happy surveillance camera in the corner.

    The one that superficially is to make sure you don’t take more than 1 or 2 paper clips…but manages to send the fusion centers every bit of data they need to match up their culprit (the copier) to the scene of the crime. They’ll also match up his credit card at the register, tally up his total purchases and copies over a period of time, and get plenty of information as it films him walking through the store and out the door.

    Bottom line: we’re all “guilty” according to laws they haven’t even written yet. It is all about building a case against the average citizen. If you’re not the wolves, then you’re one of the cattle, in their eyes. It will become worse. Much, much worse. If you doubt it and do not take necessary precautions, you may find out it exists when they come knocking on the door. It may already be too late, and their song is “We’ve Only Just Begun,” by Karen Carpenter…. but not to smile. They’ve been doing that for years, as they have taken our taxes to craft the very cages that are almost completed. The next step? Not hard to figure out, and it has happened before…as history repeats itself. Think “Solzhenitsyn,” and think of tomorrow.


    It Took 22 Years to Get to This Point

    Gold has been the right asset with which to save your funds in this millennium that began 23 years ago.

    Free Exclusive Report
    The inevitable Breakout – The two w’s

      Related Articles


      Join the conversation!

      It’s 100% free and your personal information will never be sold or shared online.


      1. It’s all true. As a society of addicts to tech – thinking we need to be able communicate “or life/work just wold be impossible” or “how else would I be able to stay in touch with ‘x’, call for help, text my moronic life to desperately scream to the world, “I exist!!!!” ” To my mind, it would be a wonderful thing to just lose the whole damned mess. Including this infernal machine I’m using right now. To just talk in person to people. To write… on paper with a pen/pencil. To play a game that involved actually being with people in the flesh. To spend time – the only time/life I’ve got – really doing something. Am I Luddite? I guess so. And this article only touches on the obvious parts of this world we’ve created to.

      2. “…our taxes to craft the very cages that are almost completed. The next step? Not hard to figure out, and it has happened before…as history repeats itself. Think “Solzhenitsyn,” and think of tomorrow”
        I feel like shit. ;(

        There already are cages– don’t you remember reading about all the empty prisons (concentration camps) years ago? I thought it was pretend until I researched it and realized they really exist! barbed wire fence, pointing inward at the top, revolving doors that turn inward but don’t lead out, the rail road tracks leading to the site… what are they for??!

        • Beech Grove Indiana , old rail yard. Set up like German prison camp.

          Camp Atterbury, Indiana has 3 FEMA camps built, all on the North end of Camp with a rail spur going to no where just north of Camps main gate.


        The steps to tyranny are always small, incremental and often barely noticed, as Milton Mayer wrote in “They Thought They Were Free: The Germans 1933-1945.” By the time a population wakes up, it is too late. He noted:

        But the one great shocking occasion, when tens or hundreds or thousands will join you, never comes. That’s the difficulty. If the last and the worst act of the whole regime had come immediately after the first and the smallest, thousands, yes, millions would have been sufficiently shocked. If, let us say, the gassing of the Jews in ’43 had come immediately after the “German Firm” stickers on the windows of non-Jewish shops in ’33. But of course this isn’t the way it happens. In between come all the hundreds of little steps, some of them imperceptible, each of them preparing you not to be shocked by the next. Step C is not so much worse than Step B, and if you did not make a stand at Step B, why should you at Step C? And so on to Step D.

        And one day, too late, your principles, if you were ever sensible of them, all rush in upon you. The burden of self-deception has grown too heavy, and some minor incident, in my case my little boy, hardly more than a baby, saying “Jew swine,” collapses it all at once, and you see that everything, everything has changed and changed completely under your nose. The world you lived in—your nation, your people—is not the world you were born in at all. The forms are all there, all untouched, all reassuring, the houses, the shops, the jobs, the mealtimes, the visits, the concerts, the cinema, the holidays. But the spirit, which you never noticed because you made the lifelong mistake of identifying it with the forms, is changed. Now you live in a world of hate and fear, and the people who hate and fear do not even know it themselves; when everyone is transformed no one is transformed. Now you live in a system which rules without responsibility even to God. The system itself

      4. REALLY GREAT ARTICLE at Chris Hedges website– tried to copy but almost impossible to copy anything from his site- he is obviously on the “bad” list of the NSA. Anyhow, the article is called “Building the Iron Wall” about the Nazis… great article because it tells how they turn open societies little by little- turning them into closed societies…

        Please read it: called, “Building the Iron Wall.” tells where we are all headed… unless shit hits the fan and buries the bastards in a mountain of sh—!!

      5. “The steps to tyranny are always small, incremental and often barely noticed…”

        “Freedom, oh, freedom over me!”
        Remember when we used to be free?

      6. I can get rid of the phone easily. Snail mail was always my favorite method of communication. I don’t need no stinking high technology that’s watching everything I do. If everybody threw their phone away then they would open all your mail to make sure you are not plotting payback. More reading jobs.

      7. Remember when we only had land lines?

        Do we really need these 24/7? No.

        We can turn this shit off.

        Do you believe the story about this dude?


        • I still only use a landline phone. It doesn’t go out during storms like everything else does.

      8. For the land that was ( free ), and the home that was BRAVE ????

      9. Jeez. That sent a big icicle chill up my spine.

      10. Did you mention all those happy little lamppost that all the small towns got awhile back??

      11. Well, there you have it all spelled out as pretty as can be and yet here is where we’re at. Remember, no matter where you go, there you are.

      12. -Don’t post anymore. Braveheart is very guilty of future crime.
        -If u get into a gunfight all your posts will be used against u. Justified or not…
        -If u do not use your tracking device very often- turn it on/off at an obscure place and leave it off. Turn on only for legitimate use at different obscure place, then turn off again.
        -Stop posting
        -Stop telling the world on internet all your plans, thoughts, locations, supplies etc.

        • Whether you post or not is of no importance, because you are already guilty of breaking laws that have not been written yet. There’s no way of defending yourself, you are a total slave. Your creator is your only salvation. Better dead than red. GOD is the answer, and the demonic NWO doesn’t like it. Just remember they want to take as many with them as they can to total destruction. Listen to GOD.

          • Do what is just. If GOD be for you, then who can be against you? Do not be afraid of the King of Babylon, whom you are now fearing; do not be afraid of him, declares the LORD, for I am with you.

      13. Everyone is shocked that politicians and their campaigns used data from Face Book. The NSA has been using your info from every electronic communication or purchase you have ever made. The government has an algorithm for every single one of you. It came from many sources including license plate scanners. Retired General Michael Hayden was the guy who started the program. He was head of the CIA and also head of the NSA. You are being assigned a social score just like a credit rating. And when the time comes….well just use your imagination.

      14. I do all my planning on paper and use folders to organise. For my computer I only do official work stuff on it. I never venture an opinion or view I would not also state in public. “To thine ownself be true”.

        I have had a wild life but you will never find photos of me showing that.

      15. It seems most everyone took Jeremiah to heart, and are afraid to post a comment. Big Brother Has Big Ears! Trekker Out.

      16. The surveillance state is the ultimate intellectual property theft structure which is also a form of modern slavery. Everything that you create can be stolen by another, purchased from the tech companies, without your consent. I truly believe that bringing children into this Orwellian, fascist, police and surveillance state is now nothing short of child abuse and child endangerment! A life without liberty is a life not worth living.

        It is not only the Democrats who are pushing this fascism and communism, but Republicans as well. Devin Nunes sponsored HR6393, one of the most sweeping violations of the 1st and 4th amendments. Republican Governor Rick Scott in Florida was also the first governor to start seizing guns from people.

        Don’t be a dolt and think that the Republicans are any better!

        RINOs Calling For Full Blown Communist Military Dictatorship While Shakedown Across Corporate America Is Underway

        Andrea Iravani

      17. Well you have barely scratched the surface on capability.

        * Cell phone has wifi turned on? Laptop same? I can find your cell, it will have an ip address similar to what the laptop is using. I can then do a class search by protocol to find the laptop. Having matched the two, should your laptop have a camera I can WATCH in real time everything you are doing where you currently are.

        * Knowing what services you are using, I can feed you a metasploit package via email. Package loaded I can read everything you type on the keyboard.

        * Have a printer? Give me 5 min and I can have that networked printer forwarding me a copy of everything you print.

        Security begins at the end user. It is where between 40-50% of the security failures occur.

      Commenting Policy:

      Some comments on this web site are automatically moderated through our Spam protection systems. Please be patient if your comment isn’t immediately available. We’re not trying to censor you, the system just wants to make sure you’re not a robot posting random spam.

      This website thrives because of its community. While we support lively debates and understand that people get excited, frustrated or angry at times, we ask that the conversation remain civil. Racism, to include any religious affiliation, will not be tolerated on this site, including the disparagement of people in the comments section.