Act of August 29, 1916 – Authorizes the Secretary of the Army, in time of war, to take possession of any transportation system for transporting troops, material, and any other purpose related to the emergency
National Security Act of 1947 – allows for the strategic relocation of industries, services, government and other essential economic activities, and to rationalize the requirements for manpower, resources and production facilities.
1950 Defense Production Act – Give the president sweeping powers over all aspects of the economy.
International Emergency Economic Powers Act - Enables the President to seize the property of a foreign country or nation. These powers were transferred to FEMA in a sweeping consolidation in 1979.
Rex 84 - short for Readiness Exercise 1984. A contingency plan developed by the US federal government to suspend the US Constitution, declare martial law, place military commanders in charge of state and local governments, and detain large numbers of American citizens who were deemed to be "national security threats"
H.R 645 - National Emergency Centers Establishment Act. To build the FEMA camps which would be run be the Department of Homeland Security.
In the 1990's President Clinton monitored over 2 million calls. He did this under a secret program code named Echelon.
CCA - Corrections Corporation of America. A company owned by Jeb Bush, George W. Bush's brother.
From 1984-1996 private prisons spread like wildfire across Texas. In 1984 the first private prison opened in Texas, and by 96 there were 38 private prisons either operating or soon to be opened.
Carnivore – Software system implemented by the Federal Bureau Of Investigation designed to monitor email and electronic communications. Can monitor a target user's Internet traffic. Implemented in October of 1997 and replaced in 2005 with improved commercial software such as NarusInsight.
Narus – Company now owned by Boeing which produces mass surveillance systems Founded in 1997 by Ori Cohen who had been in charge of technology development for VDONet. Created NarusInsight – a supercomputer system which is used by the NSA (National Security Agency) and other bodies to perform mass surveillance and monitoring of citizens' and corporations' Internet communications in real-time.
USA Patriot Act – Signed into law by George W. Bush in 2001 following September 11th. Allows the government to operate roving wire tips, search for any individuals business, personal, or even library record.
Fox News - A massive database that the government will use to monitor every purchase made by every American citizen is a "necessary tool in the war on terror”, the Pentagon said Wednesday. Nov 21st 2002.
TALON - Threat and Local Observation Notice - database maintained by The US Air Force after Sept 11th. Authorized for creation in 2002 by Deputy Defense Secretary Paul D. Wolfowitz, in order to collect and evaluate information about possible threats to US service members and civilian words in the US and at overseas military installations. The database included lists of anti-war groups, and people who attended anti-war rallies. TALON reports are collected by various US Defense Department agencies including law enforcement, intelligence, counterintelligence and security, and are analyzed by a Pentagon agency, the Counterintelligence Field Activity (CIFA) has existed since 2004 and it's size and budget are secret.
Information Awareness Office (IAO) established by DARPA: Defense Advanced Research Projects Agency, in 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor "terrorists" and other asymmetric threats to national security by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the US, including personal emails, credit card records, phone calls, medical records and other things without requirement for a search warrant. Additionally the program included funding for biometric surveillance technologies. Following public criticism that the development and deployment of such technologies could lead to a mass surveillance system IAO was de-funded by congress in 03. However several IAO projects continued to be funded and merely run under different names.
Tracking a monitoring system TIA to gather information in a "preventative way” about people from tax records, telephone calling records, credit card charges, banking transactions, airline or ship reservations, and various biometric databases, without taking civil liberties into consideration.
Fusion Centers - Wiki defines it as a terrorism prevention and response center created under a joint project between the Department of Homeland Security and the US Department of Justice's Office of Justice Programs. These centers gather information not only from government sources, but also from their partners in the private sector. Designed to promote information sharing at the federal level between agencies such as Central Intelligence Agency (CIA) FBI, Department of Justice and the US Military. Fusion centers may also be affiliated with an Emergency Operations Center. There are currently more than 72 fusion centers in the US. Launched in 2003
ADVISE - Analysis, Dissemination, Visualization, Insight and Semantic Enhancement - research and development program within the Department of Homeland Security. Threat and Vulnerability Testing and Assessment (TVTA) portfolio. Developing a massive data mining system, which would collect and analyze data on everyone in the US and perform a "threat analysis" of them. Everything from financial records, phone records, emails, blog entries, website searches, and any other electronic information that can be put into a computer system.. The information is then analyzed and used to monitor social threats such as community-forming, terrorism, political organizing, or crime. ADVISE is in the 2004-2006 Federal DHS Budget as a component of the $47 million TVTA program. The program was supposedly scrapped in 07 after the internal Inspector General found that pilot testing of the system had been performed using data on real people without required privacy safeguards in place.
The Government claims the power to seize all financial instruments: currency, gold, silver, and everything else if they deem an emergency exists. - Treasury Department Letter, August 12, 2005
Bush signs Military Commissions Act of 2006. American citizens can be secretly arrested, stripped of their citizenship, flown to offshore torture camps and secretly executed. Under Section 802 of the patriot act all misdemeanors are considered terrorism. Bush signed Defense Authorization Act.
In 2006, former CIA case officer, Robert Steele, made headline news when he revealed that Google was "in bed with the CIA”. Proving that the internet's all-seeing eye is more of a US government spy tool than a user-friendly search engine. In 1999 PayPal became the world's first virtual banking system. The idea was conceived and the website founded by US entrepreneur and 2009 Bilderberg attendee, Peter Theil. Facebook is a deliberate experiment in global manipulation,” wrote Tom Hodgkinson.
Homeland Security documents released in March of 2009 reveal that they are going to target citizens that are Christian, or anyone who discusses the New World Order, or sovereign citizens who argue that the government has gotten away from the intent of the constitution, anyone who is Anti-immigration, people who are opposed to the Federal Reserve banking system, people who support Ron Paul, and people with anti-government bumper stickers. You will be considered guilty until proven innocent. In some parts of the UK people are being filmed 24/7 in their homes to "make sure their kids go to school, and go to bed on time, etc" The first targets of FEMA would be Hispanics and Blacks. The FEMA orders call for them to be rounded up and detained. Tax protestors, demonstrators against government military intervention outside U.S borders, and people who maintain weapons in their homes are also targets. In the FEMA plan there is no contingency by which Constitutional power is restored.
CTS - Combat Zones That See - Project of the US Defense Advanced Research project DARPA. Goal is to track everything that moves by linking a massive network of cameras to a centralized computer system.
Biometrics - Methods for recognizing humans upon an eye scan or finger print scan. Biometrics can be divided into two classes. Physiological: body shape, face recognition, DNA, finger print, palm print, iris recognition, and odor/scent. Behavioral: typing rhythm, gait, and voice.
Kraft foods have been installed with RFID chips and Gillette razor products.