Only governments know how the internet really works.

Surveillance - Comment on 2012 May 30 (3)

Home | Comments | Creation | Redemption Period | Miscellaneous
Home > Comments > 2012 > Comment on 2012 May 30 (3)

2008 | 2009 | 2010 | 2011 | 2012 |

2012 May 30 (3)

Go to the end of this webpage:

The government now simply collects everything. Read more:

Last year we had the webpage 2011 Feb 17 (2) – The control of the internet on this website and there it was about Egypt and how the government there interfered with the internet and today I read an article that also brings information about the influence of governments on the internet and will bring excerpts from it later on this webpage.

Other webpages related to this subject can be found towards the end of this webpage.

I now bring an excerpt from the webpage "The control of the internet" which is also a suitable comment for what I read today:

First of all the above information gives the impression that the freedom of the internet depends completely on governments. When they want this freedom then it exists, and when they do not want this freedom then they have sufficient means to limit it or to switch it off completely.

For the coming age of Antichrist, to whom the governments will then give sufficient authority, this means that he will have complete power of decree over the internet, and that he will determine which kind of freedom will be given and which exactly not.

This situation will make it possible for him to execute total control over the internet.

But the above information gives also the impression that the knowledge of computer experts is limited and that only governments know how the internet really works. Interesting is also the mentioning that “most traffic passes through vast centralized exchanges - potential choke points that allow many nations to monitor, filter or in dire cases completely stop the flow of Internet data.” So most probably all information gets monitored and stored and when the state wants to investigate a certain individual then all material related to him gets sorted out by a search engine and is available for examination. And when the law of a country does not allow this then the government allows another country to do this for them and in exchange receives from them the needed information. So all discussion and laws about keeping things private, internet and phone and mobile phone, are just empty talk.

Now out of the information I read today I add the following: A man might encrypt something and one or several governments might steal this information and might not be able to read it, but they will still store it because there might come a time when they can break the code and that might also be exactly the time when they get interested in that man and then this information is also useful to them. So they simple steal and store everything they can lay their hands on.

The information below is mainly about one county, the USA, but the whole thing is definitely not restricted to that country and other countries might be even more advanced than the USA.

But we must not forget that all that what these governments are doing is just a quite poor imitation of what is really the perfect method of storing information and that is the Book of Life.

So now some excerpts from what I read today:


Spy center

Secret surveillance network that will intercept and store your phone calls, emails, Google searches.

Watch what you say.

It will store intercepted communication from all over the world.

Yottabytes of data – including yours – will be stored there.

Secretly capturing, storing, and analysing vast quantities of words and images hurtling through the world’s telecommunication networks.

To intercept, decipher, analyse, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails – parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program.

This is more than just a data center.

The center will have another important and far more secret role that until now has gone unrevealed. It is also critical for breaking codes. And code-breaking is crucial, because much of the data that the center will handle – financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications – will be heavily encrypted.

… made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US.

“Everybody’s a target; everybody with communication is a target.”

… has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net.

… is more interested in the so-called invisible web, also known as the deep web or deepnet – data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and non-commercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community. Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.”

… will at least have the technical capacity to store, and rummage through, all those stolen secrets.

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers … they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. …these highly secured spaces are where the agency taps into the US communication networks.

The broad outlines of the so-called warrantless-wiretapping program have long been exposed … secretly and illegally bypassed the Foreign Intelligence Surveillance Court., which was supposed to oversee and authorize highly targeted domestic eavesdropping: how the program allowed wholesale monitoring of millions of American phone calls and email.

… automating the agency’s worldwide eavesdropping network.

… breaking codes and finding new ways to channel billions of private phone calls and email messages from around the world into … databases.

… intercept international and foreign communications.

… could have installed its tapping gear at the nation’s cable landing stations – the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore.

Instead it chose to put the wiretapping rooms at key junction points throughout the country – large, windowless buildings known as switches – thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.

… given the massive new storage facility … it now simply collects everything.

… they’re storing everything they gather.

Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, … is able to paint a more and more detailed picture of someone’s life.

Scientists, computer engineers, and other staff work in secret on the cryptanalytic applications of high-speed computing and other classified projects.

It was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms. Like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code breaking effort was up and running.

They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.

What can’t be broken today may be broken tomorrow. Then you can see what they were saying in the past.

The danger is that it’s not only foreign government information that is locked in weaker algorithms, it’s also a great deal of personal domestic communications, such as Americans’ email intercepted in the past.

… storing an ever-expanding archive of intercepts until that breakthrough comes along.


So these were the excerpts from the article I read. Now some comments:

Just these days we had the following news which gives an insight into today’s communication possibilities: “Stuxnet” and Iran: Obama ordered cyber-attack on atom installations. US President Obama has ordered the Stuxnet attack against Iran. The attack paralyzed about thousand atom centrifuges. The virus is so complex it was agreed that it can originate from secret services only.

One sign that Obama is Antichrist is also that he pays tribute to the destructive principle. He gave the command to kill the terrorist leader. This command to destroy the installations in Iran is a further example. An example that is running for years is his argument with Mrs Merkel, who wants financial stability, and he wants to destroy this stability by propagating indebtedness of his country and of other states.

Now if the current American president is really the coming Antichrist and when we consider the power he now already has, then it is easy to see the power he will have in future and how easy it will be for him to persecute all his opponents.

Now we must not forget that all these efforts and achievements are just poor imitations of God’s ways. All the information gathered by human efforts is basically very little compared to the information gathered in the spiritual archive – the Book of Life. Only God has really a comprehensive information system available to him. He knows everything. Only God has really all possible actions available to him. He is the creator and sustainer of all physical things and actions. So whatever Antichrist might plan and do, there will always be plenty of ways of counter-actions. No weapon formed against us shall prosper.

Here still links to other webpages of the subject surveillance:
2010 Jun 08 – Seizure of power
2010 Aug 16 – Preparations to take over world dominance are in full swing
2010 Aug 25 – The ultimate revolutionist
2010 Sep 03 – US judgement: Authorities are allowed to fix GPS direction devices to private cars
2010 Sep 28 – US wants right to police online services
2011 Feb 17 (2) – The control of the internet
2011 Feb 25 – The deleting of data
2011 Mar 10 – Internet access blocked in Libya and Egypt
2011 Mar 31 (2) - Taliban cut cell phone service
2022 May 29 - Egypt: Mubarak sentenced – for an internet blockade
2011 Jun 18 – Hacker attacks a fact of life

Finally a quote from the last link: The bottom line is that any sophisticated state in the 21st century has formidable powers to read almost any electronic information it wishes.


Back to: 2012 May 30 (3)


Go to the top of this webpage:

2008 | 2009 | 2010 | 2011 | 2012 |

Home | Comments | Creation | Redemption Period | Miscellaneous

For an overview of this website and for access to the individual webpages go to:
Site Map

The web address of this webpage is: