Thomas Jefferson, the principal author of the Declaration of Independence (1776), the third President of the United States (1801–1809), and and founder of the University of Virginia, once said the following… “The strongest reason for the people to retain the right to keep and bear arms is, as a last resort, to protect themselves against tyranny in government.” “When the people fear their government, there is tyranny; when the government fears the people, there is liberty.”
Let’s have a look at tyranny and compare with what’s going on today…
Government tyranny is an unrestrained exercise of power, an oppressive and despotic abuse of authority, unjustly severe, burdensome and difficult to bear, and weighs heavily on the senses or spirit of man.
It could be said that unless restrained, ALL governments devolve to tyranny.
A democracy needs informed citizens if it is to thrive, or ultimately survive.
When Adolf Hitler was building up the Nazi movement in the 1920s, leading up to his taking power in the 1930s, he deliberately sought to activate people who did not normally pay much attention to politics. Such people were a valuable addition to his political base, since they were particularly susceptible to Hitler’s rhetoric and had far less basis for questioning his assumptions or his conclusions.
“Useful idiots” was the term apparently coined by Lenin to describe similarly unthinking supporters of his dictatorship in the Soviet Union.
When a largely uninformed populace can be easily led, controlled and manipulated, it opens the gates for tyranny to walk right through.
Tyranny In Stages
A tyranny does not just ‘happen’. It evolves in stages.
First, the people are dumbed-down and stripped of individualism by the state and their proxies and accomplices in the school systems, the media, and social programs and policies which breed dependence – enabling the easy manipulation of the people at large by their ‘shaped’ thought processes, their dependence and their subsequent lack of clear judgement and critical thinking.
Second, the state identifies those who are not complying to the dumbing-down process – those who remain independent and critical self-thinkers who ‘dare’ to speak out, who organize, and who question the state. Lists are created. A police state develops.
Third, the state through it’s media and propaganda proxies – publicize, demonize, label, and penalize those who engage in anti-government anti-state thoughts, speech, or behaviour so that the public at large will be deterred or feel threatened – silenced in effect.
Fourth, the state takes forceful action, prosecution and incarceration against those who are resisting the tyranny.
What is a Police State?
A police state is a totalitarian state controlled by a political police force that secretly supervises the citizens’ activities.
Sound familiar? Can you say “NSA”? DHS?
It is fairly plain to see (if you are breathing), that our individual liberties have been substantially trampled upon during recent years.
Here is a randomized list of thoughts as they come to my mind:
NSA super-computers that are profiling you.
Listening to your phone calls in search of ‘key words’.
Reading your emails in search of ‘key words’.
Monitoring and profiling your internet activity.
Logging the products that you electronically purchase.
Logging the groups that you associate with.
Logging the magazines that you receive.
Monitoring your travel movements for patterns.
Interconnecting your communication web with others.
Using license plate ‘readers’ to track your driving movements.
Logging your cell phone metadata, time, location, etc.
RFID tracking chips in debit & credit cards, licenses, license plates, passports.
Facial recognition technology across social platforms to identify ‘you’.
NSA ‘PRISM’ data collection allegedly including email, video and voice chat, videos, photos, voice over IP conversations, file transfers, login notifications and social networking details.
NSA compromise of Google, Yahoo, Facebook, Microsoft, Apple, and Skype via PRISM. It is unclear as to the the acceptance and/or willing involvement of the companies themselves.
This one government agency can apparently do the following:
It can track numbers of both parties on a phone call, location, time and duration.
It can hack Chinese phones and text messages.
It can set up fake internet cafes.
It can spy on foreign leaders’ cell phones.
It can tap underwater fiber-optic cables.
It can track communication within media organizations.
It can hack into the UN video conferencing system.
It can track bank transactions.
It can monitor text messages.
It can access your email, chat, and web browsing history.
It can map your social networks.
It can access your smartphone app data.
It is trying to get into secret networks like Tor, diverting users to less secure channels.
It can go undercover within embassies to have closer access to foreign networks.
It can set up listening posts on the roofs of buildings to monitor communications in a city.
It can set up a fake LinkedIn.
It can track the reservations at hotels.
It can intercept the talking points for Ban Ki-moon’s meeting with Obama.
It can crack cellphone encryption codes.
It can hack computers that aren’t connected to the internet using radio waves.
It can intercept phone calls by setting up fake base stations.
It can remotely access a computer by setting up a fake wireless connection.
It can install fake SIM cards to then control a cell phone.
It can fake a USB thumb drive that’s actually a monitoring device.
It can crack all types of computer encryption and is building more of this capability.
It can go into online games and monitor communication.
It can intercept communications between aircraft and airports.
It can physically intercept deliveries, open packages, and make changes to devices.
It can tap into links between Google and Yahoo data centers to collect email and other.
Then there are government agents that will do the following:
Search your body / property at airports if the agent is TSA.
Search your body / property at NFL games if the agent is Homeland Security.
Search your vehicle if you look ‘suspicious’ on an Interstate road if the agent is TSA.
On a whim, declare an American citizen an “enemy combatant”, and:
Detain without charge, in secret.
Deny legal representation.
Deny the right to question his detention.
Be shipped to a foreign country for interrogation, in secret.
Be tortured, in secret.
Be tried by a military tribunal, in secret.
NOT be granted access to the secret evidence against him.
Convicted based on that secret evidence.
The government spy agencies also apparently input all sources of social media, human intelligence reports, biometrics, signal intelligence from any related sources including geo-location tracking/monitoring/cell-phones, IP-location, voice, electronic signature bread crumbs, etc., and cyber (internet) data — for the purpose of determining “patterns of life”. “De‐Anonymization of Large Data Sets to Detect/Match Behaviors and Patterns”
They are “Continuously & Always Correlating All Data into the Entity Database” and use cross-intelligence correlation to determine…
-people who are or have been in the same place at the same time
-and/or in a location that may be ‘important’ (or flagged?)
-people tagged as having shared a location with someone else
-people classified to have relationships with others at various points
The IRS has apparently recently assembled a $350 million high-tech tool ‘Neural Network’ which they use as a massive automated parallel computer system that can analyze data from different networks to find irregularities, “suspicious” activities, or unusual behavior patterns.
They sort and screen data in 32,000 categories of metadata and 1 million unique “attributes” while the system “learns” across “neural” networks.
They can quietly create a DNA-like code to understand the economic behavior of any individual.
DHS purchases of billions of rounds of bullets.
DHS acquisition of thousands of Armored Vehicles.
DHS molecular laser scanners
DHS terrorist classification of Constitutionalists, Patriots, Militias.
DHS domestic military force
They, via a Presidential executive order (EO) has “the authority to seize private facilities when necessary, effectively shutting down or limiting civilian communications.”
I could go on and on and on… (feel free to add your input)
It is clear to most Americans that we have devolved into living under a very corrupt government – corruption permeating all branches and all levels. Those who enter the halls of government who remain uninfluenced and uncorrupted are quickly ostracized and demonized – powerless to create effective change for the good of Americans, especially given the main-stream media being in bed with the corrupt system at large.
Is it beyond the point of repair? Are we too far gone?
Does the government fear the people? Or do the people fear the government?
The answer will reveal whether we are already under tyrannical control.
“Freedom is not bestowed upon by other men, but a right that belongs to us by the laws of God and nature.” -Benjamin Franklin.
“All that is necessary for the triumph of evil is that good men do nothing.” -Lord Acton.
“A Republic, if you can keep it.” -Benjamin Franklin.