Under the Guise of Tolerance :: By Dan Payne

I would like to begin this article by expounding upon the topic of surveillance technology. Some of you may have already read about this subject in previous articles, but I aim to provide some new information. Some of this information was gained through firsthand knowledge during my almost 20 years of various technical experiences in the software industry.

Man has always longed to be like God. Even though he can never achieve such fantasy, the fantasy never stops. Collectively, all human beings know that God holds all power. The power necessary to accomplish anything has to be allowed by God in order for anything to get accomplished. Yes, even the power to accomplish evil. Just because God is incapable of committing evil does not mean man isn’t. As long as God gives mankind the power to breathe, walk, talk, lift objects, etc., evil can be accomplished.

Satan is currently providing the power necessary for man to achieve what only God should: The ability to judge “every idle word that men shall speak” (Matthew 12:36). Satan’s goal is total control, and all under the guise of tolerance, no less.

It’s not just Internet communication that the government is currently eavesdropping on. Does your car have Bluetooth? Does your phone have a camera? Does your desktop, laptop, or tablet computer have a camera or microphone? Did you know that the microphones contained within all of these devices can be remotely activated without you even knowing it? At least as far back as 2006, the FBI had eavesdropping programs in place, like “roving bug” for example.

Massive Amounts of Data

Amazing leaps in technology are allowing storage capacity to soar to levels thought impossible just a few years ago. Now, newer and farther reaching surveillance programs like “Optic Nerve” have the capability to store even more mass amounts of data. Construction of the NSA’s Utah Data Center was recently completed in 2013. The facility has the ability to store massive amounts of data. Over 100,000 square feet is dedicated to housing just the database servers.

Some reported estimates of the facility’s capacity, which is classified, ranges from exabytes or zettabytes. An exabyte is equivalent to 100,000 times the size of printed material held by the Library of Congress, while a zettabyte is 1,000 times that amount. The ZFS file system, designed by Sun Microsystems, allows for a maximum storage capacity of 256 quadrillion zettabytes. Just think about these facts for a moment.

Obviously the media outlets that reach the largest audience devote as little coverage to these programs as possible. However, certain headlines posted by smaller media outlets tell the tale:

“Ex-NSA Executive Says Utah Data Center a Symbol of Agency’s Unbridled Power.” (CBS, Sacramento)

“Why Does the NSA Want to Keep its Water Usage a Secret?” (Wired.com)

The NSA’s Water Bill

Why does the NSA want to keep its water usage a secret? Why does it claim that not releasing the details of its water usage is a matter of national security? Could it be that if it revealed just how much water it’s using at its Utah Data Center we might get a good idea of the scope of NSA surveillance? Here is a quote from the article listed above:

By computing the water usage rate, one could ultimately determine the computing power and capabilities of the Utah Data Center,’ wrote the NSA’s associate director for policy and records, David Sherman, in an undated letter filed with Bluffdale in response to the Tribune’s public records request. ‘Armed with this information, one could then deduce how much intelligence NSA is collecting and maintaining.’ [1]

The bear is concerned that the paw prints he’s leaving behind are deep enough to show just how big he really is. That’s pretty special, isn’t it?

Surveillance Technology

To give you an idea of just why such a massive data storage facility was built by good ole’ Uncle Sam, ponder the following:

Think about all of the locations you engage in audible conversations with others. Do you ever engage in audible conversation in your car or truck? How about in your home or at work? Do you, or those with whom you converse with use computers or cell phones? About the only place I can think of where your cell phone or other microphone equipped devices are not kept near your person is in the shower. (At least I hope you don’t bring your iPad in the shower with you.)

Again, almost every device that you use every day is equipped with at least a microphone and most likely with a camera. Your laptop, desktop, or tablet pc, your cell phone, your vehicle, even a growing number of new TVs come equipped with cameras for social networking.

Check out a quote from an article titled: “Your TV Might Be Watching You.” (See below.) [2]

“The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs’ built-in cameras without leaving any trace of it on the screen. While you’re watching TV, a hacker anywhere around the world could have been watching you.”

You don’t think the NSA knows how to “hack” into the cameras and microphones on your digital devices? Of course they do and they’re certainly not going to share that fact with you. It’s called “covert” for a reason – “not openly acknowledged or displayed.”

Connecting the Dots

To make a long story short, the technology to convert speech to text has been around for years. As to its exact effectiveness, that’s up for debate, but suffice to say certain speech-to-text programs exist that are so effective, they are not released to the public, (kind of like that satellite imaging thing).

Let’s now connect some dots. The dots are very easy to connect between the microphones on your “smart” devices, and the government’s very effective speech-to-text software. The final dot to be connected is the facilities currently being put in place, like the Utah Data Center, to collect the massive amounts of resulting speech-to-text data. Connect all the dots and you have the following:

Every audible word you speak, when near any of your “smart” digital devices, can be captured and stored for retrieval at a later date. Both the actual audio and the resulting text document created by the speech-to-text software will be stored. Once the government decides it has had enough of you and wants you silenced, all it has to do is a simple database search for any word that can connect you to having broken the hate crimes law of its choice.

You Are So Busted

For example, the Bible calls homosexuality an abomination. The government calls homosexuality a civil right that is to be protected at all costs. Let’s say that last week you read aloud the following verse in Sunday School: “You are not to sleep with a man as with a woman; it is detestable” (Leviticus 18:22). After you read the verse you made the following statement, “God is not mocked. He is very clear in His Word, homosexuality is an abomination.”

What if the government decides to expand on the hate crimes law, signed by president Obama in 2009, and makes it illegal to verbally condemn homosexuality? If, after this, the government decides it wants to put you in jail for this crime, all it would have to do to condemn you would be the simple database search mentioned above. It would be as easy as someone sitting at a courthouse computer, (or using their iPhone while standing at your front door), to enter “homosexuality” in the search bar that links to the database file housed out in Bluffdale with your name on it.

The results returned for all who have access to your file to see, will resemble the common Google search results that you’re used to. All of the surrounding words that you spoke on either side of the word “homosexual” will be returned, along with the original word. The user will be able to scroll and choose the result that best fits with breaking the hate crimes law. Just one click and the audio file stored on the day that you spoke those words will begin to play for all to hear. Busted!

Even Demons Appear to Know Better

As I mentioned before, all of the laws and technologies used to enforce this power are being put in place under the guise of tolerance for the homosexual lifestyle. The weirdest thing of all is that it appears that even demons do not favor homosexuality. I offer no proof of this however, only the following conjecture. Once fallen angels take on the form of men, they do not appear to want to try to procreate with each other.

“That the sons of God saw the daughters of men, that they were beautiful; and they took wives for themselves of all whom they chose” (Genesis 6:2).

Sure, they absolutely inspired the men of Sodom to take part in the filth of “sodomy”, and they continue to inspire men of today, but there is no record that I know of that describes demons sexually engaging with men. It is my opinion that most men who claim to like men more than women started out by liking women more than men (uh oh, I’m in trouble now). Even though they later fell into their depraved state of homosexuality, the same does not hold true for demons. For how much more depraved can one get than to actually be a demon?

As far as I know, one cannot get more depraved than demons, yet it appears that even they know better than to take part in the abomination that is homosexuality. I assume they are smarter than that. On second thought, maybe the most depraved creatures in the known universe are indeed wicked men.

Natural Attraction vs. Unnatural Attraction

Comparing attractive women to attractive men is like comparing a rose to a thorn, there really is no comparison. It makes me wonder why the exact opposite is true in the animal kingdom. Could it have something to do with that “most depraved creatures in the universe” thing?

Women measure attractiveness in men very differently than men measure attractiveness in women. As far as I have witnessed, women find attractiveness in a man’s ability to manage the particular circumstances in life that require varying types and degrees of strength. Some ladies value physical strength over all else, some may prefer mental strength while others prefer spiritual strength, but most prefer meekness, which is strength under control.

One can almost surmise that for the most part, women look within while men look without. (Look without what? Usually, without thinking I guess.)

On other hand, naturally speaking, attractiveness in women is viewed in a much different way. No further interpretation upon this point is necessary in this day and age of pop-culture mass media, is it?

When one ponders how men and women naturally view each other’s attractiveness, it becomes obvious just how backwards and contrary to nature it is when men find each other attractive. Just the thought of trying to reason out such logic makes my skin crawl.

Satan is just using those who have fallen so far into spiritual depravity that they proudly propagate the unnatural lifestyle of homosexuality. He is using them as a means to gain total control over our lives under the guise of “intolerance” (and climate change). If it wasn’t so dangerous it might be funny.

getraptureready@gmail.com


Endnotes

[1] http://www.wired.com/2014/03/nsa-water/

[2] http://money.cnn.com/2013/08/01/technology/security/tv-hack/