The Beast Has Awoken — Part 3, Some Form of a National ID is Inevitable
Prophecy warns us of a time that is fast approaching, when a new digital surveillance system may corrupt our government with absolute powers and enslave us using what the Bible calls "the mark of the beast."
Most wonder what form this mark will take, but computer experts already see the foundations of this intrusive new system in place and they also know that some form of a national ID "mark" is inevitable. Yet,
there is still time for hope. This is because we have a narrow window of opportunity to control this thing before it controls us, and the deciding point will be who owns this identification information.
If the government becomes the owner of this information at the behest of self-serving interests, then we are certainly doomed to a dark and foreboding future as this system slowly destroys our constitutional form of
government. If this seems to be an alarmist position, then consider what Supreme Court Justice Antonin Scalia has to say:
AP, November15, 2001
Scalia: Thumbs Down on ID Card
COLUMBIA, Mo. -- Supreme Court Justice Antonin Scalia said that if Americans were asked to vote on creating a national identification card, he would probably cast his ballot against the idea.
Scalia offered remarks after a speech at the University of Missouri on Wednesday, expressing skepticism about an ID card.
During the question-and-answer session after the speech, Scalia was asked whether a national identification card would violate citizens' privacy rights. He replied that the Fourth Amendment doesn't mention a national ID
But he reminded the audience that citizens are always free to propose constitutional amendments.
think it's a bad idea to have an identity card, persuade your fellow citizens" through the amendment process, rather than asking courts to make policy, he said.
such a popular vote were held on allowing national ID card, "Personally, I'd probably vote against it," Scalia told the audience of about 350.
Justice Scalia is right. If Americans of vision can rally together to demand a Private Digital Persona (PDP) amendment to the Constitution, we can preserve America's constitutional way of life as it enters the
information age. If enacted, a PDP amendment will equitably balance the security needs of the state with privacy needs of the individual and ensure both harmony and prosperity.
But regardless of what Justice Scalia thinks, there is nonetheless, a far-reaching movement already underway for instituting a national ID without the protections of a constitutional amendment. Led by U.S. Sen.
Dianne Feinstein, D-California, this ongoing process to institute a national ID without the protections of a Constitutional amendment represents the single greatest internal threat to our Constitutional form of
government in the history of the country.
A National ID or Something
Like it is the Order of Things
A national ID card is not a new idea. Despite perestroika, Russia still uses Soviet-era Government-issued Prospekas (internal passports) in Moscow
and St. Petersburg to identify citizens authorized to live in those cities. In America, we have the Social Security Card. Try opening a bank account or getting a job without one.
What makes the national ID card proposed by Oracle CEO Larry Ellison (who first proposed the national ID card scheme) different, is that it will use
digital automation via the power of the Internet. This will make it a more powerful control mechanism than a Russian Prospeka or an American Social Security Card and likewise, far more corruptible and subject to
Why A Computerized
National ID is Dangerous
The national ID card proposed by Oracle CEO Larry Ellison will use the Internet, the most prominent component of the information age. Unlike the
lifeless paper used to create a Russian Prospeka or an American Social Security card, a computerized national ID will use the most human-like invention man has ever created — the Internet.
Like the human body, the Internet is organized chaos. In the body, a big toe has no idea that an eardrum shares the same body, and nor could it care
less. Yet, both rely on the same organs for nourishment and other vital functions. With the Internet, we send requests to a black hole on the other
side of our modem to all points in the world, and the answers come back to us following a myriad of unfathomable routes through the same black hole.
When a virus invades a body, the first thing it wants to do is to dominate and control. Consequently, the body moves quickly to attack the invader. If it
wins it lives, if not, it weakens or dies.
The Internet has a similar response mechanism. Why most people think of viruses as being those pesky little E-mail attachments that muck up the their
personal computers, the real viruses are firms like Microsoft who are trying to monopolize and dominate the Internet for their own purposes. Having just
accepted an out of court offer to settle the DOJ anti-trust case against it, Microsoft has clearly been judged as being predatory and monopolistic.
This is why 80% of computer virus attacks are targeted against Microsoft. Because of its heavy-handed tactics, the firm is reviled by many the rest of
the computer industry. For many, it has become the company people just love to hate. Consequently, self-styled Jedi knights are conjuring up new
viruses to cause the firm harm. The grief inflicted on its customers is, as the military would say, regrettable collateral damage. Simply put, from the
viewpoint of many in the Internet body as a whole, Microsoft is the virus and they are the noble anti-bodies. Given that Microsoft's poor security track
record (as compared with UNIX) the attacks will just keep on coming.
If the United States Government creates a national ID system using the Internet, it will become the biggest virus ever to hit the net, making Microsoft
look as aggressive as Dr. Suess. Consequently, every gun toting Jedi hacker on the planet will go gunning for it and they will become popular
heroes to silent majority in America, who will have to suffer the humiliation and abuses of national ID system gone amok.
Each new successful attack will only encourage others, and then a feedback loop will emerge creating new Jedi hackers faster than the government can
snuff them out. In return, the government will see the problem, that being its repressive tactics, and move to correct the problem with even more repressive tactics.
This kind of future scenario is hard for most people (especially politicians) to understand, because they only use the Internet. But even if they never have
used the Internet and wouldn't dare to touch a keyboard the doctors who treat them and the police who protect their lives and property do use the
Internet. In short, who uses the Internet is irrelevant because it now permeates the fabric of everyday life in America. And this is why the United
States government is risking its own downfall with a national ID system.
A Myopic View of the Internet
Those who make the Internet work tend to see it at the component level. They make the gizmos and the gadgets that speed Web requests and
replies, and E-mail messages to and from one world citizen to the other with the appearance of effortless calm.
For those who manage the content that moves through those gizmos and gadgets, the Internet is a dynamic world of content. This is why the dot.com
phenomenon was doomed to fail miserably. It failed because it relied primarily on flashy web site designs instead of value and content.
The difference between a flashy web site design and real value and content is the same of that between fools gold and real gold. It was only a matter of
time before Netizens would realize "not all that glitters is gold."
Simply put, content drives the Internet because content — not flashy designs, gizmos and gadgets — is the real gold. Not the content that CNN posts on
its news site, or the content that Amazon uses to promote books and tapes on its retail web site.
The real gold on the Internet is the content generated by people communicating with each other via E-mail, chat rooms, personal web sites, instant messaging and so forth. The content of us, and about us that we
share in confidence with others on the web is the real gold.
In a very organic way, the Internet has become an extension of our conscious minds, thoughts and feelings. It lives, because with it, each of us feels a little less alone in the world.
In the near future, the computers and modems we use today will be seen as the clay tablets of the past, because the Internet will speak to us and with us
with human ease. Our computers will manage our dull and repetitious details leaving us free to pursue what interests us more, freeing us to build an economy such as mankind could never imagine.
In the far future, we will connect with the Internet through a convergence of our expanded paranormal abilities and the further simplification of the
Internet. It will be heralded as a new age of true spirituality and the differences between genders, races and ages will melt even further.
And finally, in the very far future, we will no longer require an Internet at all. Mankind will become like a child who says, "Daddy, I can ride my bike now.
Please take off the trainer wheels." We will become mentally connected in a wholly democratic and respectful way. There will be little or no crime,
because all will witness the crime from the criminal's point of view as well as that of the victim.
The Information Age: Winds of Democracy
The power of the Information Age as a force for democracy was first witnessed in 1989 in Tiananmen Square, China. The peaceful protests of unarmed students demanding more freedom in China was ruthlessly
crushed by the most repressive government in the world at that time that had grown accustomed to its ability to manipulate public knowledge of such events as it pleased.
However, this time the daily hemorrhage of blow-by-blow news accounts of their atrocities were received by the citizens of the world though E-mail, fax
and telephone. Tiananmen Square proved the peaceful power of the information age. The Chinese communists have since adopted a more pragmatic way of managing the unruly nature of the information age as
evidenced by their carefully executed propaganda in support of their violent repression of the Falun Gong movement. While the rest of the world sees
through the propaganda, many Chinese now view the victims as being the evil ones. But then, they too will soon learn what Americans finally came to understand — "not all that glitters is gold."
What was proven in 1989 is that the information age will not be safe place to hide for evil governments who use twisted and hateful propaganda mechanisms to control their own people as well as world opinion. This is
because the information age belongs to the people — not to dictators. The moment a country accepts the Internet, its people become part of a world
body of knowledge: To influence it, and to be influenced by it.
The result of the end of the dot.com phenomenon has been the most horrendous downturn ever seen in the computer industry as thousands of people lose their jobs while countless firms line up and wait their turn at the
bankruptcy court. Yet, the Internet keeps on growing, and growing, and growing.
This is not lost on business and government interests who now see a new and unstoppable dynamic in the history of mankind taking shape before
their very eyes. For those holding the reins of power, the need is simple: to get in front of this immense information wave of humanity and control it,
thereby ensuring their continued advantage.
Rather than finding a way to coexist with it or, in a manner of speaking, to ride the wave, they choose what is most familiar — anonymous manipulation
and control. In the short run, the will enjoy a certain degree of success but in the long run, the wave will engulf them.
If the United States government uses the Internet to implement a national ID program with anonymous manipulation and control, it will sign its own death
warrant as a democracy. However, if it coexists with the most powerful intellectual human event in the history of our species, our government can
become a light unto all the nations of the world. The key to this difference is found in three little words — who am I.