Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Big Brother is Watching You

Big Brother is Watching You

Ratings: (0)|Views: 6|Likes:
Published by Day of Repentance
Satan's counterfeit response to God's all-knowing Sovereignty
Satan's counterfeit response to God's all-knowing Sovereignty

More info:

Published by: Day of Repentance on Jul 14, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





What will the Jewish people's acceptance of Yeshua result in but life from the dead? 
(Romans 11:15)
“His eyes keep watch on the nations” (
Psalm 66:7 
In 1949 the British novelist George Orwell published his novel „1984‟, a dystopian view of the future.
Orwell laid out a nightmarish vision of a totalitarian state which controlled its people‟s every action and
thought through propaganda, secrecy, constant surveillance and harsh punishment. One of the most
famous lines in the book is the slogan “Big Brother is watching you.” At that time the Western world was
shocked by the concept that a government could monitor the conversations and communications of itscitizens. However, in Communist China, the U.S.S.R. and East Germany there was no great shock;government surveillance there was a daily reality.
News headlines have been made recently over leaks by purported whistleblowerEdward Snowden, a former National Security Agency (NSA) consultant. Snowden hadpreviously worked for the CIA (2005-2009) in Switzerland as an IT security tech, for Dell(2009-2013) in Japan as a private contractor at an NSA Facility, and in 2013 in Hawaiifor less than three months as a Booz Allen Hamilton defense contractor inside the NSA,at a SIGINT (signal intelligence) Operations Center.
Snowden disclosed hard evidence about classified intelligence programs carried out bythe NSA and the British GCHQ(
), includingnew details about worldwide interception of telephone metadata and internetsurveillance programs:
) Snowden's leaks are one of th
e NSA‟s most significant breaches ever. Snowden saidhis leaks were an effort “to inform the public as to that which is done in their name andthat which is done against them.” He explained his actions, “I don't want to live in a
society that does these so
rt of things … I do not want to live in a world where everythingI do and say is recorded” (
The Guardian, June 9, 2013
Sales of Orwell‟s centennial edition of 1984 have risen by more than 7,000% on Amazon.com since Snowden‟s leaks –
from 13,074 on their list to 193 and rising. Itseems that people are watching (and reading about) Big Brother.
The NSA is painfully aware that it collects more intelligence that it can actual process or
analyze. “„Sometimes I think we just collect intelligence for the thrill
of collecting it, to
show how good we are at it,‟ said former CIA director Robert Gates. „We have the
capacity to collect mountains of data that we can never analyze. We just stack it up. Ourelectronic collection systems appear to produce far more raw intelligence data than our
analysts can synthesize and our policymakers can use‟ ” (
Body of Secrets
, JamesBamford, Anchor, 2002,
 p. 520
Big Brother is still watching you
Snowden‟s exposures pull back another curtain on national security and intelligence i
ssues, thefoundations of which go back to World War One. A brief historical context may help here.At the close of World War One the British government compelled American telegraph companies to handover all cable traffic (including U.S. government communications), in an effort to obtain intelligence on theflow of guns and money to Irish nationalist groups as well as about Communist revolutionary activities.
When the U.S. Senate found out, a law was passed by Congress in 1920, making it illegal to interceptdiplomatic or telegraphic communications.
During WWII the British Secret Service obtained President Roosevelt‟s permission for Sir William
Stephenson to set up an illegal wiretap unit in New York City. This unit would spy on Americans who werecollaborating with Nazi intelligence. Stephenson simultaneously played a key role in the founding of theCIA, and he was deeply admired by Ian Fleming (the author of the James Bond series) who worked withhim in NYC during that time.As early as 1944 the illegal British wiretap unit also focused on other tasks
collecting intelligence aboutAmerican Jewish advocates for the establishment of a Jewish state. England was opposed to theestablishment of the State of Israel, and used its American connections to impede
the Jewish state‟sformation. “In file after file, the FBI put the Jews under surveillance and worked with the British to identifythose Americans who were supporting Israel, either financially or otherwise” (
The Secret War against the Jews: How Western Espionage Betrayed the Jewish People
; abbreviated
; John Loftus and Mark
 Aarons, St. Martin‟s; 1994;
 p. 185
). One example of many such documents is found in the National
 Archives, “British Intelligence authorities have advised that the above captioned individual … leftPalestine for the United States November 21, 1947 … British authorities reported that his address in theUnited States will probably be in care of …” (
SWATJ, p. 185
).After WWII officially ended, President Truman issued a directive on August 15, 1945 (which becameExecutive Order 9031 on September 28, 1945) abolishing the office and activities of the Office of theCensor (their mandate included supervision of wiretapping). Defense Secretary James Forrestal, no
friend of Truman‟s, operated behind the President‟s back, secretly transferring the wiretapping activities tothe Army Security Agency. The ASA continued the bugging under the code name “Operation Shamrock”
until May 26, 1975. Senate Intelligence Committee chairman Frank Church called
this “probably thelargest governmental interception program affecting Americans ever undertaken.” What had started as an
operation against Nazis quickly moved to focus on Jews, and then on to an increasing spectrum ofAmericans.
“And you will be as eyes for us” (
Numbers 10:3
 On May 17, 1943 the intelligence agencies of Britain and the United States signed the BRUSA agreement(Britain-USA), merging the sharing of Communications Intelligence (COMINT) of both countries. In 1947the cooperation was expanded
in the UKUSA Agreement, bringing “together under a single umbrella theSIGINT organizations of the Unites States, Britain, Canada, Australia, and New Zealand” (
The PuzzlePalace: Inside the National Security Agency 
, James Bamford, Penguin, 1982; abbreviated
 p. 391
“Under the theory that two ears are better than one, the NSA and GCHQ, through their BRUSA
pacts, agreed to share the wealth of each other‟s cable intercept programs” (
ibid., p. 418
). “The UKUSA Agreement … specified the total exchange of SIGINT intelligence between NSA and GCHQ” (
Peter Wright, Viking, 1987;
p. 148
In Bamford‟s ground
breaking book about the NSA, he notes that “it is possible for GCHQ to monitor the
necessary domestic or foreign circuits of interest and pass them on to NSA through the UKUSAAgreement. Once they were received, NSA could process the communications through its own computersand analysts targeting and watch-
listing Americans with impunity… That such action is far from
improbable can be seen b
y the way NSA processed its domestic civil disturbance watch lists.” Accordingto a still classified Justice Department investigation into illegal NSA surveillance, “MINARET intelligence
ed., a wiretapping operation targeting American citizens
]… was obtai
ned incidentally in the course of
NSA‟s communications and the receipt of GCHQ
acquired …cable traffic SHAMROCK)” (
ibid., pp. 468-69
).To put in simply, from the day that BRUSA and UKUSA were signed, Britain and USA have been able to
“spy on each other‟s citizens, without search warrants, by establishing „listening posts‟ on each other‟sterritory” (
SWATJ, p. 188
). “Among the most critical elements of cooperation between the two nations,
especially with regards to the United States, was the right to establ
ish listening ports on each other‟sterritory” (
PP; pp. 401-3
). “Here is how the game is played. The British liaison officer at Fort Meade typesthe target list of „suspects‟ into the American computer. The NSA computer sorts through its wiretaps and
gives the British officer the recording of any American citizen he wants. Since it is technically a
 target of surveillance, no
warrant is necessary. The British officer then simply hands the results
over to his American liaison officer… Of cour 
se, the Americans provide the same service to the British in
return… This …arrangement disguises the most massive, and illegal, domestic espionage apparatus inthe world” (
SWATJ, p. 190
It is worth remembering that the foundations of this intelligence framework have been in place since 1943 and 1947 
far before 9/11 and al- 
Qa‟eda. The information on which Snowden focused aspotlight recently has actually been „open site‟ information since 1967 (David Kahn, The
Codebreakers, MacMillan), 1982 (Bamford), 1994 (Loftus), 2006 (USA Today and Bloomberg News scoops about MAINWAY), 2012 (NY Times and Wired about Operation Stellar Wind), etc., though many average citizens were not really aware of these easily available facts.
It is also worth remembering that this intelligence framework has continued to function smoothly regardless of whether Republicans or Democrats held the reigns in the USA, or whether 
Conservatives or Labour held sway in Britain. The “news” Snowden has leaked is for the most 
part definitely 
not “new” news.
“The eyes of the
are in every place, watching the evil and the good” (
Proverbs 15:3 
The NSA is not the only intelligence agency involved in spying. For example, in 1969the KGB residency in NYC (codenamed Operation PRESSING)
“succeeded in
concealing remote-controlled radio transmitters in UN offices used by the chairman of
the Security Council … Simultaneously, Operation KRAB … succeeded in bugging the
secretariat of the UN secretary-
general, U Thant (codenamed BROD)” (
The Sword and the Shield: The Mitrokhin Archive,
Christopher Andrew and Vasili Mitrokhin, BasicBooks, 1999,
p. 344
). So protestations by countries like France and Germany about thelong reach of the NSA are somewhat hypocritical. The SIGINT agencies of these
countries have long been aware of the NSA‟s abilities and activities.
These facts remind us that intelligence is a necessary foot-solder in a very real cloakand dagger war. There are real enemies on the other side, and they also make use ofSIGINT against us. There are also very real casualties in this war. We should notquestion the strategic importance of intelligence. It is the scope and directed use of thatintelligence which is being considered.
Everyone who is patriotic understands that defending
one‟s country means that theenemies of one‟s country may need to be weakened, impeded or perhaps even
removed. The majority of Westerners have agreed that Nazism, Communism or jihadiIslamism all have the potential to present clear and present dangers to the security ofWestern countries. The goal of intelligence agencies is to defend their country bygaining accurate, timely and meaningful intelligence.
However, pervasive surveillance comes with some not-so-hidden dangers,and they revolve around the ethical morality and spiritual condition of those who make use of that intelligence.
„Ethical morality‟ touches on how intelligence is used
is it used to control people, to crush freedom of expression, to illegally make profit through the 
misuse of one‟ 
s office, etc.
„Spiritual condition‟ relates to the question –
is the intelligence available 
being used to violate God‟s word and biblical principles. From a biblical point of 
view, one of the most important aspects here would be if intelligence is used to weaken or destroy the Jewish people and undo or impede their restoration to their Promised Land as prophesied by the Hebrew prophets.
Years ago the late Senator Frank Church spoke serious words about the two-edged
sword of NSA‟s SIGINT technology:
“At t
he same time, that capability at any time could be turned around on the Americanpeople and no American would have any privacy left, such [is] the capability to monitor
everything: telephone conversations, telegrams, it doesn‟t matter. There would be no
place to hide. If this government ever became a tyranny, if a dictator ever took charge of

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->