Coming Next: TSA Electric Shock Bracelets? [videos included]
DHS seriously explored idea of forcing travelers to wear torture compliance device
By Paul Joseph Watson
Infowars.com
October 10, 2012
The TSA’s security policies are getting more and more bizarre, from testing people’s drinks for explosives to ordering all travelers to freeze on command, but could a frightening policy that was seriously explored by the DHS be resurrected – forcing people to wear shock bracelets that would deliver an electric shock if they got out of line?
The story sounds like it belongs in a South Park episode or on an urban myths website – but it was actually true.
In 2008, the Washington Times reported on how DHS official Paul S. Ruwaldt of the Science and Technology Directorate, office of Research and Development, wrote to Lamperd Less Lethal, Inc. indicating that the Department of Homeland Security was ready to purchase devices from the company that would be used to deliver incapacitating shock s to airline passengers, all of whom would be mandated to wear the shock bracelet once they checked in for their flight.
The so-called “safety bracelet,” also known as the Electronic ID Bracelet, was designed to replace a boarding pass and be capable of tracking the passenger through the airport by means of GPS technology.
The device would also contain details about the passenger and their flight plans.
The primary function of the device was to allow airport officials and flight crews to deliver an incapacitating electric shock to travelers by means of Electro-Muscular Disruption (EMD), completely immobilizing the individual for minutes.
The bracelet would be worn by all travelers until they disembarked at their location. The patent for the device admits that all passengers could be incapacitated if the devices are activated.
“Upon activation of the electric shock device, through receipt of an activating signal from the selectively operable remote control means, the passenger wearing that particular bracelet receives the disabling electrical shock from the electric shock device.
Accordingly, the passenger becomes incapacitated for a few seconds or perhaps a few minutes, during which time the passenger can be fully subdued and handcuffed, if necessary.
Depending on the type of transmission medium used to send the activating signal, other passengers may also become temporarily incapacitated, which is undesirable and unfortunate, but may be unavoidable,” reads the patent for the device.
In his letter to Lamperd Less Lethal, Inc., DHS official Ruwaldt also noted how the bracelet could be used as a “method of interrogation,” in other words a torture device. He also raised the prospect of using the device against protesters to allow the temporary “restraint of large numbers of individuals in open area environments by a small number of agents or Law Enforcement Officers.”
The letter stated that the DHS was “interested in…. the immobilizing security bracelet” and that it was “conceivable to envision a use to improve air security, on passenger planes.”
Other letters made it clear that the DOD, the CDC, Department of Interior, Department of Agriculture Forestry service, as well as unnamed law enforcement agencies were also keen on acquiring the device.
Following a wave of negative publicity, the DHS pulled the plug on its interest in the torture bracelet, and Lamperd Less Lethal, Inc. set about removing the letters from Ruwaldt it had previously proudly displayed on its website.
However, given that the TSA is already doling out punishments for people who do not display the proper level of obedience, by either preventing them from flying, stealing their cash, or simply punching them in the balls, how far away are we from the hideous idea of the shock bracelet being resurrected?
Especially given the heights of absurdity the TSA has already scaled by introducing its ludicrous “all stop” policy and its testing of drinks purchased inside the secure area of the airport?
The fact that the torture bracelet was ever seriously considered at all should send chills down the spine of every American who values their dignity, especially given the endless train of TSA abuse stories that pour in on a weekly basis.
Imagine a TSA goon not only having the power to squeeze your junk if you so much as look at them the wrong way, but also having the capability to deliver an electric shock to anyone who speaks out of turn.
It’s a nightmare scenario, and another clear indication that the TSA is an odious insult to the very notion of America as a free country and needs to be defunded and ultimately abolished.
Given a recent survey which found that a majority of travelers were happy with the TSA’s performance and also In the interests of discovering exactly what level of indignity Americans will tolerate, Infowars is set to commission a poll to find out what passengers will tolerate when going through TSA checkpoints.
One of the questions will ask if Americans, given the apparent threat posed by terrorists who implant bombs in their own bodies, are willing to submit to an anal cavity search in order to fly.
Although this sounds bizarre, we feel confident that a sizeable number would agree to it.
Likewise, the idea of forcing travelers to wear a shock bracelet capable of delivering an electric shock is another question that will be included in the poll – which will be conducted by a professional polling agency.
Watch a Fox News report on the shock bracelet below.
Infowars is launching the national Opt Out and Film Week during Thanksgiving, November 19-26. Click here for more details or click here for the campaign’s Facebook page.
*********************
Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a regular fill-in host for The Alex Jones Show and Infowars Nightly News.
[hat tip: The Intel Hub]
Google Account as Official Virtual ID!? Yikes! [video]
The Truther Girls
October 11, 2012
The UK government is working on a new system that would allow you to use your social media and other accounts as official virtual ID for accessing government services. Am I the only one who find this scary?!
http://www.independent.co.uk/news/uk/politics/national-virtual-id-card-scheme…
India’s Universal Biometric ID program:
http://www.bbc.co.uk/news/world-asia-india-18141584
http://www.bbc.co.uk/news/world-asia-india-18156858
UN E-Government Readiness Program- survey 2012
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan048065.pdf
New Border Regime is Taking the U.S.-Canada Partnership to the Next Level
by Dana Gabriel
BE YOUR OWN LEADER
October 9, 2012
The Beyond the Border deal announced in December 2011 represents the most significant step forward in U.S.-Canada cooperation since NAFTA. Dual action plans are further transforming trade, regulatory and security relations between both countries. Over the next few years, various cross-border initiatives will be rolled out, with some beginning as pilot programs. The U.S. and Canada have laid the framework for a new border regime which is taking their partnership to the next level and pushing the continent closer to a fully integrated North America security perimeter.
The Department of Homeland Security and Canada Border Services Agency recently announced the Phase I pilot of the Entry/Exit program which is part of the Beyond the Border action plan. It will include collecting and exchanging biographic information of third-country nationals, permanent residents of Canada, and lawful permanent residents of the U.S. at four selected land border ports of entry. A fact sheet stressed how this, “is an important step as both countries move towards a coordinated entry/exit system that will strengthen border and immigration programs, support law enforcement, and accelerate the legitimate flow of people and goods into Canada and the United States and across our common border.” The Canadian government is also advancing plans to use biometrics for immigration and border security that would bring them in line with the U.S. and other countries. The perimeter security agreement called for implementing, “systematic and automated biographic information-sharing capability by 2013 and biometric information-sharing capability by 2014.” A North American biometric identification system could be used to restrict, track and trace our movements.
On October 4, Transportation Security Administration (TSA) and Transport Canada officials announced the extension of the expedited screening initiative, TSA Pre✓™ which will now include lanes for Canadian NEXUS members at 27 participating U.S. airports. Canadian Minister of State For Transport Steven Fletcher explained that, “The Government of Canada and the United States are delivering on commitments to include Canadian NEXUS members in designated TSA Pre✓™ lanes as part of the Beyond the Border Action Plan.” He went on to say, “This will mean smarter and faster air travel for Canadian NEXUS members traveling within the U.S., while maintaining a high level of aviation security.” TSA Administrator John Pistole acknowledged that, “The inclusion of Canadian NEXUS members in TSA Pre✓™ is an important step in further harmonizing the security screening process between the U.S. and Canada.” Under NEXUS, pre-screened travelers are granted expedited access across the border, by air, land or sea. As part of the perimeter security deal, both countries are expanding and integrating trusted traveler programs.
The Next-Generation pilot project which would permit U.S. agents on Canadian soil is on hold while legal issues are being resolved. The security perimeter agreement stated that both countries would, “create integrated teams in areas such as intelligence and criminal investigations, and an intelligence-led uniformed presence between ports of entry.” The plan which is a land-based version of the Shiprider program was scheduled to be deployed this summer. Allowing U.S. agents to cross the border and pursue suspects into Canada poses a threat to sovereignty and could infringe on personal privacy laws. The pilot project is part of the process of acclimating U.S. policing activities in Canada and could later be expanded.
Last month, the USDA’s Food Safety and Inspection Service and the Canadian Food Inspection Agency established a pre-clearance initiative pilot project on import re-inspection activities for fresh meat. This is tied to the Beyond the Border deal and is aimed at streamlining meat inspections at the U.S.-Canada border. Just as the joint program was being rolled out, XL Foods in Alberta, Canada announced a massive recall of meat products due to E. coli contamination. This came on the heels of a letter from the Safe Food Coalition to the USDA citing concerns that food safety could be compromised and requesting that the border inspection pilot be halted. Some of the potential tainted meat could have been shipped to at least eight U.S. states. In a press statement, the Executive Director of Food & Water Watch, Wenonah Hauter pointed out that, “the Obama Administration and the Harper Government in Canada have been plotting to eliminate the very border inspection program that tipped off authorities that there was a major problem brewing with the products originating from the XL plant.” Plans to further deregulate food safety inspections could lead to more trouble in the future.
In September, Transport Canada and the United States Coast Guard launched a pilot project that will include joint Port State Control inspections of non-Canadian and non-U.S. flagged vessels in the Great Lakes St. Lawrence Seaway. Rear Adm. Mike Parks, Commander of the U.S. Coast Guard Ninth District described how, “This initiative is in keeping with President Obama’s and Prime Minister Harper’s Beyond the Border Perimeter Security Initiative protecting the Great Lakes and St. Lawrence Seaway region, which provides common access to the heart of North America. Our goal is to make vessel inspections more efficient and facilitate American and Canadian business on both sides of our shared border.” The program is outlined in the Regulatory Cooperation Council action plan and establishes a, “safety and security framework for the Great Lakes St. Lawrence Seaway that will align the two countries’ regulatory requirements. This pilot project will look for efficiencies in order to reduce duplicate inspections and impediments to trade.” When completed, recommendations will be made on whether to form a permanent binational foreign vessel inspection program.
NAFTA partners, in conjunction with multinational corporations and influential think tanks are pushing for deeper North American integration. As far as the upcoming U.S. election goes, Barack Obama and Mitt Romney are both committed globalists and have no intentions of upholding the constitution or protecting what is left of American sovereignty. The notion of real choice is now even more of an illusion. Minus the Democrat and Republican rhetoric, it’s essentially the same policies, same agenda, and the same team. It doesn’t matter who wins the presidency, the path towards a North American Union will continue.
Related articles by Dana Gabriel
Paving the Way for a U.S.-Canada Economic and Security Perimeter
Laying the Foundation for a North American Security Perimeter
Implementing Beyond the Border Perimeter Security Initiatives
A Perimeter Approach to Security and the Transformation of the U.S.-Canada Border
Dana Gabriel is an activist and independent researcher. He writes about trade, globalization, sovereignty, security, as well as other issues. Contact: beyourownleader@hotmail.com Visit his blog at Be Your Own Leader
The Smart Phone Control Grid And Online Privacy [video]
Press For Truth
September 25, 2012
Technology is a double edged sword that can be used by the government to set up a big brother control grid but this same technology can also be used by concerned citizens who seek to expose corruption in government at all levels.
This poses a problem for TPTB so they are now taking all the necessary steps to ensure that their very own system of surveillance is not used against them.

Everyone Who Attended OWS with a Cell Phone had Their Identity Logged
United States Patent by Apple Inc
Amazing mind reader reveals his ‘gift’
Get updates like this everyday and support independent media by joining Press For Truth TV
We rely on you the viewer to help us continue to do this work. With your help I can continue to make videos and documentary films for youtube in an effort to raise awareness all over the world. Please support independent media by joining Press For Truth TV!
As a Press For Truth TV subscriber you’ll have full access to the site’s features and content including Daily Video Blogs on current news from the PFT perspective and High Quality Downloads of all Press For Truth Films, Music and Special Reports! Subscribe to Press For Truth TV
Japan-China Island Dispute: Conflict or Politics? [video]
Russia Today
September 24, 2012
China plans to use unmanned drones to increase its presence around the islands that are at the center of a volatile dispute with Japan. They will conduct marine surveillance of the area.
Three Chinese patrol vessels still remain very close to the uninhabited – but strategic – archipelago; and have briefly entered waters which Japan considers its territory. The conflict’s seen large-scale protests in both countries turn ugly. The row could be further complicated as Taiwanese boats are now heading to the islands to reassert their fishing rights in the area while all around, the US is increasing its military activity in the region. RT talks to James Corbett, editor of the Corbett Report website, from Japan.
RT LIVE http://rt.com/on-air
Social Media, Smartphones And Police Ctreate A Stasi Web Of Surveillance
by Susanne Posel, Contributing Writer
White Owl Conspiracy
September 21, 2012
Twitter has released a report confirming that the US government leads the world in requesting information on their citizens. The Transparency Report shows the US government has made requests that are infringing on American privacy rights. Twitter states that “we’ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.”
As the US government sifts through the tweets US citizens are making and analyzing information from illegal means, there are decisions about particular citizens being made to justify the construction of an all-encompassing Big Brother network.
Cloud computing is also under surveillance as every conversation is recording and filed. While Microsoft denies this is true, the adherence to their rules and regulations explains that all your personal information is stored within Skype. In section 2 of their user contract explains: “Our primary purpose in collecting information is to provide you with a safe, smooth, efficient, and customized experience. Skype collects and uses, or has third party service providers acting on Skype’s behalf collecting and using, personal data relating to you, as permitted or necessary to . . .”
The Department of Homeland Security’s Delaware Information and Analysis Center (DIAC) “now offers a mobile app to report suspicious activities in real-time by attaching a photo, sending location information, or entering details about suspicious vehicles or persons. In addition, users can choose to make their report anonymously or can include contact information for follow-up by law enforcement.”
The Anti-Terrorism Mobile FORCE 1-2 App is designed for iPhone and Android users that create spies out of average citizens for the sake of the State. The information collected by users is funneled to a National Security Agency (NSA) Fusion Center to be disseminated with federal agencies and local law enforcement.
Using terrorism and 9/11 phone calls as a fear-mongering campaign to coerce the general public into participating in this new Stasi, the Delaware government hopes to keep its citizens “ever vigilant in the fight against terrorism and this new app is just one way for our citizens to help.”
Simultaneously, Symantec’s Norton Cybercrime Report states that cybercrimes involving smartphones are costing consumers $110 billion annually as these thieves peruse mobile devices and social networks looking for loopholes. Smartphones are sent fake bills which add to the telecommunications services and rack-up charges as well as implant viruses into devices through apps.
Infected phones infect other phones through sending of information, text messages and emails. Nameless, faceless hackers change segments of code and inject the malware into the smartphone. However, most mobile phone and telecommunications corporations still maintain that mobile applications are safe and there should be no precautions taken when downloading these apps.
The CIA-sponsored AntiSec hacker group was successful in stealing millions of ID numbers from Apple, Inc. from databases where the corporation had been storing user personal data. They then leaked this information out for the general public to see. However this action serves another purpose.
The FBI was also infiltrated by the same state-controlled hacker group wherein a laptop was “compromised and private data regarding Apple UDIDs was exposed. At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.” The bureau’s press office later posted on its Twitter account that it “never had” the information in question and that the reports its laptop was hacked were “totally false.”
While data mining, cell phone corporations are using mobile phone habits to decipher the predictive movements of users. Scientists from the University of Brimingham in the UK have revealed that they can predict the movements of mobile phone users through tracking the network usage in real time with algorithms that forecast probabilities. This means that cell phone corporations, if using this system could predict the future whereabouts of their customers at any time of the day or night.
As our cell phone become weapons of mass surveillance, police departments across the nation are installing more CCTV cameras to better spy on citizens. In Maryland, local police have been using speed cameras at intersections to watch citizens under the guise of mitigating damages caused by car accidents.
Researchers for the Defense Department have created working prototypes of bi-static radar that can utilize WiFi to spy on citizens through walls. In tests, a one foot think brick wall was used and the monitoring radar could send back visual data to be interpreted.
WiFi signals can be extended and are available virtually everywhere which makes the capability of transmitting information easier with radio signals and laptops.
With the siphoning of information from a wireless router, surveillance software can be used as well to see through walls. A person’s whereabouts can be correctly pinpointed by using WiFi signals that bounce off objects which can decipher speed, location and direction of an individual.
Justification for this technology is surmised as: “See Through The Wall (STTW) technologies are of great interest to law enforcement and military agencies; this particular device has the UK Military of Defense exploring whether it might be used in ‘urban warfare,’ for scanning buildings. Other more benign applications might range from monitoring children to monitoring the elderly.”
These surveillance grids are being implemented to compliment the State and Local Anti-Terrorism Traning (SLATT) program that defines for police departments what an extremist is and how to “recognize and report indicators of terrorism/criminal extremism.”
The SLATT’s definition of terrorism is vague and broad. It encompasses “the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” While terrorism is meant to intimidate and coerce a population into submission, the local law enforcement is employed to play an integral part in bringing intelligence to the federal agencies and “international intelligence communities” involved with hindering terrorism.
The SLATT explains that those who use cash, stay in tight-knit groups, repeatedly use the word “God”, carry video or observation equipment and have hand-drawn maps are terrorists. The document goes on to explain that any type of surveillance that is not state-sponsored is terroristic in nature and should be reported.
End the Lie Radio with Madison Ruppert – Episode 25 [audio]
End the Lie Radio with Madison Ruppert
July 28, 2012
Tonight on End the Lie Radio with Madison Ruppert, guests JG Vibes and Curt Williams discuss the ever-encroaching surveillance grid designed to force us into an Orwellian existence and the importance of community, self-sustainability, counter-economics and reaching out to neighbors as a means of surviving outside of those confines. End the Lie Radio is live from 11:00 PM – 1:00 AM EST/8:00 PM – 10:00 PM PST every Sunday evening on OrionTalkRadio.com.
Website: http://EndtheLie.com
Show page: http://EndtheLie.com/Radio
Support us: http://EndtheLie.com/Store
Facebook: http://Facebook.com/EndtheLie
All material(s) used in this video that are not original or are under copyright are used under Fair Use under the Copyright Act of 1976, 17 U.S.C. § 107.

