ARE WE THERE YET – Part 27 – Silent Weapons, The Web, and The Mark Of The Beast

Silent Weapons for Quiet Wars was an interesting bit of information found on a computer drive some time ago and that computer was formally owned by a major corporation. Silent Weapons is actually about a silent WAR, and this WAR is what is being used to bring the American people down to their knees and to bring them into the MARK OF THE BEAST SYSTEM and also explains WHY the NSA VACUUM CLEANER is gathering of every bit of data they can get on everyone. It also proves that NSA and the CIA and other government agencies are LYING THROUGH THEIR TEETH to the people of America and the world about their true intentions, for the Lord of ALL knows the intents of the HEARTS.  THE AGENDA OF “MYSTERY” is to enslave everyone via ECONOMICS, something the Bible warned us about several thousand years ago.

First let’s look at Deuteronomy 28 to get the DRIFT of what happens when a nation or the world forgets THE LORD and is turned into HELL:

Deut 28:43-45

43 The stranger that is within thee shall get up above thee very high; and thou shalt come down very low.

44 He shall lend to thee, and thou shalt not lend to him: he shall be the head, and thou shalt be the tail.

45 Moreover all these curses shall come upon thee, and shall pursue thee, and overtake thee, till thou be destroyed; because thou hearkenedst not unto the voice of the Lord thy God, to keep his commandments and his statutes which he commanded thee:


Notice that these STRANGERS that are within the nation, RISE UP AND TAKE CONTROL OVER THE PEOPLE, and they are bankers, for only BANKERS LEND MONEY TO NATIONS, and only INTERNATIONAL BANKING CARTELS lend to the nations – like the ROTHSCHILD BANKING INTERESTS, ETC. They did so via the FEDERAL RESERVE SYSTEM, a PRIVATE BANKING CORPORATION OWNED BY THE RICH MEN. They set that up years ago, along with the fraudulent INCOME TAX SYSTEM.  This laid down the preliminary foundation for what was to come. FIRST AMERICA, THEN THE WORLD. Remember that.

Now we go to PSALM TWO for more information for it is basically the SAME PEOPLE:

Psalms 2:1-3

Why do the heathen rage, and the people imagine a vain thing?

2 The kings of the earth set themselves, and the rulers take counsel together, against the Lord, and against his anointed, saying,

3 Let us break their bands asunder, and cast away their cords from us.


 The Kings of the Earth, the RULERS OVER THE MASSES OF THE WORLD, take counsel AGAINST THE LORD, and AGAINST HIS SON, and this economic WAR has but one real goal – FIRST ENSLAVE, THEN DEMAND OBEDIENCE, THEN DESTROY ALL VESTIGES OF CHRISTIANITY FROM THE PLANET. This is why the Christians in America and around the world are being attacked and marginalized. The Kings and the rulers ARE IN FACT RULES OVER BY THE RICH MEN of Deuteronomy 28, and they are working TOGETHER with the rich men for world domination.

Now we turn to Revelation 18 and find something more:


Rev 18:23-24

23 And the light of a candle shall shine no more at all in thee; and the voice of the bridegroom and of the bride shall be heard no more at all in thee: for thy merchants were the great men of the earth; for by thy sorceries were all nations deceived.

24 And in her was found the blood of prophets, and of saints, and of all that were slain upon the earth.


And then finally, we have James and what he says about the LAST DAYS and the RICH MEN:

James 5:1-8

Go to now, ye rich men, weep and howl for your miseries that shall come upon you.

2 Your riches are corrupted, and your garments are motheaten.

3 Your gold and silver is cankered; and the rust of them shall be a witness against you, and shall eat your flesh as it were fire. Ye have heaped treasure together for the last days.

4 Behold, the hire of the labourers who have reaped down your fields, which is of you kept back by fraud, crieth: and the cries of them which have reaped are entered into the ears of the Lord of sabaoth.

5 Ye have lived in pleasure on the earth, and been wanton; ye have nourished your hearts, as in a day of slaughter.

6 Ye have condemned and killed the just; and he doth not resist you.

7 Be patient therefore, brethren, unto the coming of the Lord. Behold, the husbandman waiteth for the precious fruit of the earth, and hath long patience for it, until he receive the early and latter rain.

8 Be ye also patient; stablish your hearts: for the coming of the Lord draweth nigh.


In all cases the Lord points His finger directly at the RICH MEN OF THE EARTH, whom He calls the LORDS OF THE EARTH, the International Banking Cartels, the International Corporations and the Military-Industrial-Pharmaceutical-Government Complex. They are all in it together, rising up in these last of the last days. They will wish they had never been born, that they never saw the light of day.

So that is the Biblical foundation of it all in the prophetic sense. The Book of Enoch and the Book Of The Kolbrin all agree. It is a CURSE from the Lord because of apostasy and defection from His Word. Now let’s take a look at the HOW AND WHY of this economic slavery that will cause millions to perish:

First of all a short look at SILENT WEAPONS:

“Descriptive Introduction of the Silent Weapon”


“Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in its own manner of functioning.

It shoots situations, instead of bullets; propelled by data processing, instead of chemical reaction (explosion); toriginating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of a marksman; under the orders of a banking magnate, instead of a military general.

It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone’s daily social life.

Yet it makes an unmistakable “noise,” causes unmistakable physical and mental damage, and unmistakably interferes with the daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.

The public cannot comprehend this weapon, and therefore cannot believe that they are being attacked and subdued by a weapon.

The public might instinctively feel that something is wrong, but that is because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.

When a silent weapon is applied gradually, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological warfare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.”


This then is the FOUNDATION from which Silent Weapons operates – by stealth, by slowly and craftily infiltrating every area of life, a bit at a time until they have total control over every aspect of a persons life.


“Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage, to shift economic inductance to those economic positions which would encourage the greatest economic instability and oscillation.

The final key to economic control had to wait until there was sufficient data and high-speed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits – paper inductance/inflation.”

Notice that the final key to total economic control is HIGH SPEED COMPUTING AND DATA. Are we there yet? What was the final outcome to be?

Eventually every individual element of the structure comes under computer controlthrough a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code, UPC; zebra-striped pricing codes on packages) with identified consumers (identified via association with the use of a credit card and later

a permanent “tattooed” body number invisible under normal ambient illumination).”

Here is what the Bible says:


Rev 13:15-18

15 And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.

16 And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads:

17 And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.

18 Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six.


So then we have total agreement with Silent Weapons for Quiet Wars, do we not? The END RESULT of this system of MAMMON is to MARK every man, woman, child and baby with a DIGITAL MARK, and if you refuse it, you cannot obtain any goods or services of any kind, especially any governmental services, like Medicare, Medicaid, Social Security, Food Stamps, etc. This is why OBAMACARE WAS RUSHED THROUGH BY THE COMMUNISTS AND MARXISTS, for it has a ton of hidden controlling items buried within it  – for the end system is a combination of COMMUNISM, MARXISM, FABIEN SOCIALISM, NAZIISM, AND FASCISM. It is also why the Immigration Bill is so important for them to pass – it contains a NATIONAL ID CARD SYSTEM. All of this is socialism and part of the socialist agenda.

What the RICH MEN, also known as the ILLUMINATI or “MYSTERY” of the Bible have done, is to take the best controlling parts of each “experimental politcal system” and forge a whole new system – for total and complete control over everyone on planet Earth. Notice that the beast in Revealtion 13 is a COMPOSITE beast. It is brilliant really, and only a diabolically controlled human brain could come up with it, or even want to do it in the first place.


In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.

This is becoming increasingly difficult to control because more and more businesses are making demands upon their computer programmers to create and apply mathematical models for the management of those businesses.

It is only a matter of time before the new breed of private programmer/economists will catch on to the far reaching implications of the work begun at Harvard in 1948. The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.”


 OK, so that means they KNOW they have to move faster than planned as more and more people catch on, and when one moves TO FAST, well, errors are made, miscalculations occur, and it appears from James that eventually the people DO IN FACT  discover they have been “had”, and “had big time”.


“The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy: at first the American economy, and then the world economy.It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such has proven to be the case. Moreover, the economy has been transformed into a guided missile on target.

The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well-organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption.

To make a short story of it all, it was discovered that an economy obeyed the same laws as electricity and that all of the mathematical theory and practical and computer know-how developed for the electronic field could be directly applied in the study of economics.”


Notice the word MANIPULATE. Everything that happens is the result of the UNSEEN HAND, the UNSEEN HAND OF “MYSTERY”, and the UNSEEN HAND OF SATAN HIMSELF, who is manipulating the RICH MEN to his own ends. They are dupes, easily controlled by a higher intelligence.


“The social welfare program is nothing more than an open-ended credit balance system which creates a false capital industry to give nonproductive people a roof over their heads and food in their stomachs. This can be useful, however, because the recipients become state property in return for the “gift,” a standing army for the elite. For he who pays the piper picks the tune.

Those who get hooked on the economic drug, must go to the elite for a fix. In this, the method of introducing large amounts of stabilizing capacitance is by borrowing on the future “credit” of the world. This is a fourth law of motion – onset, and consists of performing an action and leaving the system before the reflected reaction returns to the point of action – a delayed reaction.”


This is why Obama and his minions want to destroy the economy, and this is why Congress has no thought of ever paying off the National Debt. They are all working in concert to destroy the MIDDLE CLASS OF THE WORLD, destroy the dollar and the present world system, and force them into the POOR CLASS, making all of them subservient to the RICH MEN. That is really what the Mark of the Beast is all about – the final end result of the total manipulation of the economy for only ONE PURPOSE, and that is total slavery.


“Economic engineers achieve the same result in studying the behavior of the economy and the consumer public by carefully selecting a staple commodity such as beef, coffee, gasoline, or sugar, and then causing a sudden change or shock in its price or availability, thus kicking everybody’s budget and buying habits out of shape.

They then observe the shock waves which result by monitoring the changes in advertising, prices, and sales of that and other commodities.

The objective of such studies is to acquire the know-how to set the public economy into a predictable state of motion or change, even a controlled self-destructive state of motion which will convince the public that certain “expert” people should take control of the money system and reestablish security (rather than liberty and justice) for all. When the subject citizens are rendered unable to control their financial affairs, they, of course, become totally enslaved, a source of cheap labor.”


The question then is, how does all of this tie into the recent discovery of all of the NSA programs and to the so-called non-existent TOTAL INFORMATION AWARENESS PROGRAM? It has to do with PEACE AND SECURITY, DATA COLLECTION OF EVERY SORT, PROFILING EVERYONE and so on. The NSA is merely the vacuum cleaner for all of this, as are the banks, the merchants, the credit card companies, etc. Take a look at what Silent Weapons says about this need to vacuum up EVERY BIT OF PERSONAL DATA THEY CAN FIND:


Short List of Inputs

Questions to be answered:

o    what

o    where

o    why

o    when

o    how

o    who

General sources of information:

o    telephone taps

o    analysis of garbage

o    surveillance

o    behavior of children in school

Standard of living by:

o    food

o    shelter

o    clothing

o    transportation

Social contacts:

o    telephone – itemized record of calls

o    family – marriage certificates, birth certificates, etc.

o    friends, associates, etc.

o    memberships in organizations

o    political affiliation

The Personal Paper Trail

Personal buying habits, i.e., personal consumer preferences:

o    checking accounts

o    credit-card purchases

o    “tagged” credit-card purchases – the credit-card purchase of products bearing the U.P.C. (Universal Product Code)


o    checking accounts

o    savings accounts

o    real estate

o    business

o    automobile, etc.

o    safety deposit at bank

o    stock market


o    creditors

o    enemies (see – legal)

o    loans

Government sources (ploys)*:

o    Welfare

o    Social Security

o    U.S.D.A. surplus food

o    doles

o    grants

o    subsidies

* Principle of this ploy — the citizen will almost always make the collection of information easy if he can operate on the “free sandwich principle” of “eat now, and pay later.”

Government sources (via intimidation):

o    Internal Revenue Service

o    OSHA

o    Census

o    etc.

Other government sources — surveillance of U.S. mail.

Habit Patterns — Programming

Strengths and weaknesses:

o    activities (sports, hobbies, etc.)

o    see “legal” (fear, anger, etc. — crime record)

o    hospital records (drug sensitivities, reaction to pain, etc.)

o    psychiatric records (fears, angers, disgusts, adaptability, reactions to stimuli, violence, suggestibility or hypnosis, pain, pleasure, love, and sex)

Methods of coping — of adaptability — behavior:

o    consumption of alcohol

o    consumption of drugs

o    entertainment

o    religious factors influencing behavior

o    other methods of escaping from reality

Payment modus operandi (MO) — pay on time, etc.:

o    payment of telephone bills

o    energy purchases

o    water purchases

o    repayment of loans

o    house payments

o    automobile payments

o    payments on credit cards

Political sensitivity:

o    beliefs

o    contacts

o    position

o    strengths/weaknesses

o    projects/activities

Legal inputs — behavioral control (Excuses for investigation, search, arrest, or employment of force to modify behavior)

o    court records

o    police records — NCIC

o    driving record

o    reports made to police

o    insurance information

o    anti-establishment acquaintances

National Input Information

Business sources (via I.R.S., etc):

o    prices of commodities

o    sales

o    investments in

§  stocks/inventory

§  production tools and machinery

§  buildings and improvements

§  the stock market

Banks and credit bureaus:

o    credit information

o    payment information

Miscellaneous sources:

o    polls and surveys

o    publications

o    telephone records

o    energy and utility purchases

Short List of Outputs

Outputs — create controlled situations — manipulation of the economy, hence society — control by control of compensation and income.


79.                        allocates opportunities.

80.                        destroys opportunities.

81.                        controls the economic environment.

82.                        controls the availability of raw materials.

83.                        controls capital.

84.                        controls bank rates.

85.                        controls the inflation of the currency.

86.                        controls the possession of property.

87.                        controls industrial capacity.

88.                        controls manufacturing.

89.                        controls the availability of goods (commodities).

90.                        controls the prices of commodities.

91.                        controls services, the labor force, etc.

92.                        controls payments to government officials.

93.                        controls the legal functions.

94.                        controls the personal data files — uncorrectable by the party slandered.

95.                        controls advertising.

96.                        controls media contact.

97.                        controls material available for T.V. viewing

98.                        disengages attention from real issues.

99.                        engages emotions.

100.                   creates disorder, chaos, and insanity.

101.                   controls design of more probing tax forms.

102.                   controls surveillance.

103.                   controls the storage of information.

104.                   develops psychological analyses and profiles of individuals.

105.                   controls legal functions [repeat of 15]

106.                   controls sociological factors.

107.                   controls health options.

108.                   preys on weakness.

109.                   cripples strengths.

110.                   leaches wealth and substance.

Table of Strategies


Do this:                        To get this:


Keep the public ignorant        Less public organization


Maintain access to control      Required reaction to outputs (prices,

points for feedback             sales)


Create preoccupation            Lower defenses


Attack the family unit          Control of the education of the young


Give less cash and more         More self-indulgence and more data

credit and doles


Attack the privacy              Destroy faith in this sort of

of the church                   government


Social conformity               Computer programming simplicity


Minimize the tax protest        Maximum economic data, minimum 

                                enforcement problems


Stabilize the consent           Simplicity coefficients


Tighten control of variables    Simpler computer input data — 

                                greater predictability


Establish boundary              Problem simplicity / solutions of

conditions                      differential and difference equations


Proper timing                   Less data shift and blurring


Maximize control                Minimum resistance to control


Collapse of currency            Destroy the faith of the American 

                                people in each other.



So you see this why the NSA scandal had to be swept under the rug, so to speak, by DIVERSIONARY TACTICS, that is the Syrian threat of war, and why our Senators and Representatives will NEVER tell you the real truth of it all – they cannot, because of they did, the public would hang them for high treason, and you can rest assured, that will not happen soon.

Now read this carefully, for what happens in England will soon happen here:

Global Smart ID For All UK Citizens


 Julie Beal
Activist Post

I hope by now I’m starting to get through to people about online identity management, because here in the UK a whole lotta folk are about to be forced to sign their life over to an Identity Provider. The UK government has decided to host all of its public services online, to fulfill the ‘Digital by Default’ strategy. The Government Digital Strategy is now expected to be up and running by April 2014. Five companies have been chosen to provide identity management for UK citizens, one of which, the Post Office, will serve as registration centers for biometric smart ID enrollment.

When I try to tell people about this, and how it’s a global scheme, they just don’t seem to hear me. I can only think that the power of the media is responsible – they simply aren’t informing the public properly about this matter, so because you’re only hearing it from me, it perhaps doesn’t seem as real?

Well, it is.

Horribly so.

There aren’t any glossy adverts for it yet, but if you wade through the documents, and listen to lectures and webinars aimed at industry professionals, it’s all there on the Web.

Educating the public seems to have been ruled out, and instead, people are being drawn in by only being able to access certain services by using an Identity Provider (IdP) – this rules out debate, and the right to be informed. In the US, Obamacare and access to personal electronic health records will kick off national IdM take-up, while in the UK, it’s beginning with access to government services. No matter how private you’re told IdM makes you, there will always be an audit trail, and a host of exemptions from peeking.

Maybe you’re already one of the many victims of the transition to AI government – those wishing to claim Jobseeker’s Allowance must already make their claim online. It is not possible to do this by interacting with a human in any way.[1]

The thing is, the next stage is forcing people to sign up with an Identity Provider (IdP) to prove they are who they say they are, when they use government services which are only available online. It was supposed to start next month, i.e. the transition to Universal Credit (the new benefit which will replace most of the current ones) was meant to introduce identity management to the UK, by requiring all claimants to authenticate themselves online by using an IdP.

However, the plan has now changed, and the latest news is that instead of starting with Universal Credit, there will be 25 government departments moving their services online, and to access these, citizens will need to sign up with an Identity Provider. The services include online driving licences, and other DVLA documents; State benefits, redundancy payments, and tax matters; civil claims; visa applications; electoral registration; and booking prison visits.

In June, the government announced, HM Revenue & Customs (HMRC) will become the first central government department to use Identity Assurance (IDA), one set of secure login details to access all online public services, and will be a key component of Pay As You Earn Online (PAYE Online) which is to move to pre-launch mode in October 2013 with ‘wider IDA capabilities becoming available from October 2014′. 


The Government Digital Service (GDS), which is developing IDA, has described it such: “Identity assurance is about providing users with a simple, trusted and secure means of accessing public services, so we are working hard to ensure that privacy is at the heart of the service we will provide to users.” 


According to, “IDA is set to become the default service for all government departments providing public digital services which require the citizen to confirm their identity.” 


The move comes as part of the Cabinet Office’s strategy to move all government services online in order to save between £1.7bn and £1.8bn a year.”

They don’t want to provide staff to man phonelines, or offices –everything will be digitised, and for that you need smart ID.

The UK government (Government Digital Services, or GDS) announced this month they have contracted the services of five companies, and we get to choose which one to sign up with! Gosh, thanks! The five IdPs chosen by GDS for the UK are Experian, Verizon, the Post Office, Mydex, and DigIdentity; the first/beta phase is just about to start. There were supposed to be eight IdPs, but PayPal and Cassidian have deferred their involvement for the time being.

It was reported last week that a government spokesperson has stated, Universal Credit remains part of the future delivery plans for the cross-government IDa Service in development at the Cabinet Office.”

Last year, (September, 2012), the UK Cabinet Office published the Local Authority Review of Citizen Online Identity Assurance which acknowledged one of the issues in enforcing the system is that “citizen trust may be difficult to achieve”. Too right!!! It’ll be even harder once people realize how easily they can be spied on, the fact that biometrics aren’t reliable enough, and that many things can go wrong when allowing a third party to handle your ability to live a life. If your global ID doesn’t work, you can’t do a thing.


In June the Government and the UK’s National Technical Authority on Information Assurance (CESG) also published new guidance on ‘identity proofing’ and verification. The guide sets out how businesses tasked with verifying the identity of individuals using Government services can achieve various levels of assurance about the identity of such users.


The ‘Privacy and Consumer Advisory Group Draft Identity Assurance Principles’ were also published in June, and were actually endorsed by Big Brother Watch and No2ID, but all pretense of privacy is washed away by the exemptions (the “Exceptional Circumstances Principle”), which mean privacy can be violated for the following reasons:

  • in the interests of national security;
  • public safety or the economic well-being of the country;
  • for the prevention of disorder or crime;
  • for the protection of health or morals,
  • for the protection of the rights and freedoms of others.

This list kinda covers every excuse under the sun don’t ya think? Besides, there’s always the audit trail, and a whole variety of types of data about you that will be looked at. According to Mike Bracken, director of the Government Digital Service unit (GDS) in the Cabinet Office,


“IA data includes “Personal data”, “Audit data, “Attribute data, “Identity data”, “Relationship data”; “Transactional data” and other “General data”…. 


“Processing” in the context of IA data means “collecting, using, disclosing, retaining, transmitting, copying, comparing, corroborating, aggregating, accessing”… etc 


… Subject to any audit or legal requirement, the Minimisation Principle requires any aggregation, correlation or corroboration to be of a transient nature. Any decision that requires a risk assessment of the Service-User will need the correlation of data from possibly a number of sources.”

The UK has contracted its e-Gov services to one company, owned by only one man, who will host the services in the cloud, using software it has contracted from EMC Global Services, an American corporation. Does this mean the UK government is granting control of all her citizens to a private US company?

Identity management enables full personality profiles for each of us, with a unique ID number, which works worldwide, using, for instance, the standards of the Open Identity Exchange (OIX) and ISO certification.

Chris Ferguson, the man in charge of ‘Identity Assurance’ here in the UK, is on the board of directors of the OIX.

In a workshop called ‘Comparing and Contrasting NSTIC with EU Approaches’ at this year’s World eID Congress, Chris Ferguson is due to give a presentation with the provisional title of “UK, a Laboratory for NSTIC in Europe”. this aligns with Ferguson’s commitment to working with his counterparts on his trip to the White House Colloquium on the NSTIC in May of last year, when the Cabinet Office noted,


The internet doesn’t stop at national borders and nor will the identity ecosystem. Identity services and the technical and legal environments in which they work will need to align internationally over time even if there are differences from one country or business context to another. A step closer, perhaps, to an International Strategy for Trusted Identities in Cyberspace?


In March, the Open Identity Exchange held a summit at the Microsoft headquarters in London, where Stephen Ufford, the founder of Trulioo (partnered with Verizon to deliver IdM in the UK, the US, and elsewhere) discussed the “problem” in the UK of the five million “unbanked” people – mainly the young and the old – who are classed as being “thin-file” people. Ufford also stated that instead of trying to “educate the public”,


citizens could be “eased in” by getting them to use government services online. Trulioo specialises in social ID verification, and Ufford insists the government intends for us to use “social sign-ins” to begin with, such as through Google or Facebook, which would allow them to, “leverage existing consumer behaviour …. to make the verification process more simple”. The social (identity) file, he says, can include an email address, phone number, and even the device ID, and is, “created and aggregated just like a credit file. It’s reported from different identity providers, different instances of your social behaviour….”.

Speaking at the Japan Identity and Cloud Summit , Ufford said that only 5% of e-commerce websites use social log-ins at present, but experts expect that over the next three years, this number will rise to over fifty per cent. He also assured the corporate attendees that they needn’t worry about using Trulioo’s product (called ‘Profile Plus’) because, he said, “… this process (the data we’re using to verify the identities) is completely unregulated so you don’t have to worry about the various types of privacy legislation around the world.” Trulioo gathers all of the bits and pieces of your digital footprint and assembles them as an ID, to provide “internet life verification”, i.e. to ‘prove’ the person is still alive.

Don Thibeau, Founder of the Open Identity Exchange, and involved in setting up the NSTIC, believes the global identity ecosystem could use social and transactional information from the web and “repurpose it for other applications”. Perhaps he’s thinking of how much identity profiles are worth to marketers, financiers, researchers, and politicians.

A webinar by a company (Janrain) partnered with Trulioo (see above), called ‘Leveraging Rich Social Profile Data for Advanced Segmentation’, stated Janrain could get rich profile data, e.g. photo, address, and psychographics, as well as relationship status, declared interests, movies, sports, and even “explicit access to their friends graphs”- this would give marketing companies “close to a 360 degree view” of customers and “could enable one to one marketing” using “centrally stored personality data”.

The UK government guide for businesses, Identity Proofing and Verification of an Individual’, describes the four levels of identity verification; a social log-in is the lowest level of authentication, as it is only ‘level 1’ and no evidence is obtained to verify the claimed identity; a level 2 identity has “sufficient evidence …. for it to be offered in support of civil proceedings”; a level 3 identity has been physically identified, meaning the owner of that identity has provided “sufficient confidence for it to be offered in support of criminal proceedings”; whilst the highest level of identity verification adds biometrics, “to further protect the identity from impersonation or fabrication.” A level 4 identity biometric is “a measure of a human body characteristic that is captured, recorded and/or reproduced in compliance with ICAO 9303”.

The guide also notes that the following documents may be used, alongside other evidence, to authenticate a level 4 identity:

  • Biometric passports that comply with ICAO 9303 (e-passports) and implement basic or enhanced access control (e.g. UK/EEA/EU/US/AU/NZ/CN)
  • NHS staff card containing a Biometric
  • UK biometric residence permit (BRP)
  • UK asylum seekers Application Registration Card (ARC)
  • EEA/EU Government issued identity cards that comply with Council Regulation (EC) No 2252/2004 that contain a Biometric

The government’s Midata initiative, which requires businesses to compile “consumers’ consumption and transaction data in a portable, machine readable format” is very close to being made compulsory for all businesses.


And so it goes – and will continue to go because the general population has been dumbed down to the point that they have no clue as to what is slowly being done to them. They are slowly closing the gap to the MARK. If you take the mark, you have damned yourself forever. You cannot accept it, and PLEASE, PLEASE, do not believe some of the popular preachers, teachers and evangelists out there who are telling you that a computer chip in your hand FOR ECONOMIC REASONS has nothing to do with the Mark. It does, IT HAS EVERYTHING TO DO WITH IT, and no matter what excuse they give you, REFUSE IT.

The Bible says the RICH MEN will accomplish their goals, but only for a very short time. For all the brilliance of the SILENT WEAPONS there is one factor omitted, and that is the most important factor; THE GOD FACTOR, who knows exactly the agenda the RICH MEN and their MARK OF THE BEAST SYSTEM. It is rapidly coming to the fore. He actually IS WATCHING THEM:

Isa 29:15-16

15 Woe unto them that seek deep to hide their counsel from the Lord, and their works are in the dark, and they say, Who seeth us? and who knoweth us?

16 Surely your turning of things upside downshall be esteemed as the potter’s clay: for shall the work say of him that made it, He made me not? or shall the thing framed say of him that framed it, He had no understanding?

In Part Two we will see just how rapidly this system is coming to the fore. It is already here, SILENT, DEADLY, A WEAPON OF WAR. YOU ARE THE TARGET. GET READY.

It seems that all of this is just another factor that proves how close we are to Daniel’s 70th week, when all of this comes out into the open for all to see.

Comments welcome and desired.







3 thoughts on “ARE WE THERE YET – Part 27 – Silent Weapons, The Web, and The Mark Of The Beast

  1. RIDDLE ME THIS… WHAT DOES PSALM 113 (2013?) AND DANIEL 12 HAVE IN COMMON? psalm 113 says… He raiseth up the poor out of the dust, and lifteth the needy out of the dunghill. and Daniel 12 says… And many of them that sleep in the dust of the earth shall awake, some to everlasting life, and some to shame and everlasting contempt.


  2. Stewart, I just subscribed to your blog which I enjoy very much. Do you post them every day? If so, I may have to unsubscribe since there is so much information in each one of them, I just don’t have enough hours in the day to digest what you’re teaching! I really appreciate the tremendous amount of work it must take you to research all of it but I’m not sure I can keep up! Please advise? Thank you!

    …let us encourage one another—and all the more as we see the Day approaching


    • No, usually not anywhere near this much just a lot of information recently that needs everyone’s attention – we are moving very close to total changes you know the New World Order and Antichrist – all being announced in the heavens.

      Liked by 1 person

Comments are closed.