In a geo-strategic sense, the War on Terror has been a spectacular failure for the United States. In both Afghanistan and Iraq, the United States has been subject to a strident series of regional defeats often inflicted on it by nothing more than peasants wielding sticks. It is no longer the case (if it ever was!), that the United States military is seen as the toughest, most well equipped, and the most disciplined military super state in the world.

Cheek by cheek, jowel by jowel!

Cheek by cheek, jowel by jowel!

The United States is a continuance of European imperialism and very similar to British Imperialism as it existed from the 16th century onwards. In the British imperial model, object oriented segmentation of the merchant interests of various corporations allowed for the modularisation of para-legal and para-corporate systems of government, commerce and law.

The British Empire did not rule its territories by centrally commanded diktat, but by creating modular petit-governments in those territories in which it managed the imperial crown dependants. Each territory was a modular component fashioned with the imperial clay of the British union. The modern United States Empire too, is a unionised imperial model in which its own imperial domestic outlook is modularised and exported abroad for commercial effect.

Like all Empires of the past, this entails the exportation of military and coercive forces to force obedience, but unlike all empire of the past, also entails the exportation of an imperial global surveillance program. In 2013, major, wideranging and vast quantities of private data are being sequestered for tactical and strategic use by all instruments of American control.

Picture: World War 1 Propaganda.

The similarities between the British Victorian Empire1. and the older Empires of the past are difficult to see and as time passes, become more and more opaque. The direction of history through the mechanism of time points always toward the darkness. In our own modern period, we have only the National Socialist Nazi Empire to compare our own Victorian Empire with. Between the British Victorian Empire and the General Government of Nazi Germany, there are few similarities.

The British Victorian Empire was a longer lasting and more legally coherent entity in which the various territories under the yoke of various British 'mandates' were first subjected by force, then subjected by economy, and lastly subjected by the law. In each territory, the British Victorian Empire understood that a territory could not be governed by London acting as a central authority, but by a localised form of territorial government with a fully blown polity all its own. Periodically, centralisation did occur but only where a corporation attempted to govern a territory, found the job irredeemably impossible, and then crawled to the British Government for help. In more cases than were not, this nearly always entailed seeking financial help as a result of corporate maladministration.

Over the course of the British Victorian Empires rule, the localised real-politik of the autonomous imperial crown dependant sprang up with its own economy, its own military and its own judiciary to seal its complacency to the crown. For the British, a coercive polity was the mark of savage authoritarianism; a native must be prepared to consume mother England's industrial goods by choice.

As the Empire's chest proudly expanded to fill itself with air, the imperial crown dependent filled with a new para-legal and para-corporate mongrel class of opportunists keen to make a life for themselves within the newly found colonies. In each territory in which they settled, new corporate and legal interests sprang into life adding new weight to the autonomous territories real-politik. Over the course of the decades, the full weight of that real-politik settled into its stride to maintain the Empires holdings. On a daily basis, the British Victorian Empire saw its interests settled in British colonial courts, by British colonial para-legals, representing British colonial para-corporate merchants. As the years passed by, the weight of legislation within these courts grew as did the domestic interests of these para-legal classes. The bulk of that legislation was geared toward further enforcing the localised real-politik of that imperial crown dependant.

Throughout the entirety of the building, development and maintenance of this British imperial order, private interests swearing allegiance to the British crown clamoured for the right to exploit the new imperial reality. Incorporated businesses led the way not just in terms of trade and industry, but also in providing the logical merchant structure in which other professions could work. Para-legals were self-contained entities - and so were judges and Magistrates. In each territory in which the Empire had an interest, private Magistrates sat in matters of local tax revenue to enforce the crowns financial and economic interests. The means by which they achieved their jurisdiction, and the mechanism by which they maintained that jurisdiction, was borne from an imperial polity in which the private merchant incorporated interest was the dominant faction of the period.

In the modern day and age, the veneer of this old imperial merchant order remains in place as a systemic part of the modern British crown. The devices this merchant order used in its foreign territorial heyday, largely remain intact in the domestic territorial present day. Curiously however, it is more visible than it would otherwise be, were it not for a secondary imperial order, in the shape of the United States Empire.

Priori Assumption

The privatised corporate courts of the United Kingdom.

In British law, the criminal and civil courts sit in judgement of criminal and civil matters respectively. In the criminal court, a judge or Magistrate is a Justice of the Peace and acts under an oath to the Queen or King. In the civil court no oath exists; the Magistrate or judge is sitting as a private citizen. His judgement can only stand if he has proven he had jurisdiction in the civil court at the time the judgement was made.

Outside the criminal law, the court, its Magistrate and those who work in the court, do so for profit. In matters of taxation, the Magistrate is a private individual who levies on behalf of the Queen or King for payment.

The civil court when levying a matter of taxation, is a fully privatised entity in which all persons in the court in any technical capacity are privateering commissioners for profit.

In this highly unusual and rare footage a privateering Magistrate along with his compliment of 'staff' fails to impose his jurisdiction and is forced to abandon the court. Common law being the only remaining authority steps forward to dismiss the tax levy case before the court. Were the Magistrate to have successfully imposed his jurisdiction in the court, as a result of the public in the court following his orders, he would have had a financial imperative to find in favour of the Queen or King, irrespective of the facts of the matter.

The concept of Priori Assumption2. is a legal device in law in which a statement may be taken as the truth because there is an assumption that no reasonable person would contest it. The notion is obviously troubling in any logical sense but from the point of view of a prosecuting authority, it has recognisable traction when dealing with matters in which a state entity wishes to dominate. A statement such as "The sun will come up in the morning" does not need to be proven at a specific place because it is widely assumed to be true.

A statement such as "The sun will always come up in the morning" is slightly more troublesome and can be reasonably contested as there is sufficient lack of consensus regarding the lifetime of a given star in any given solar system. The means by which this contest could be settled in this particular case, would be the skill with which an absolute scientific argument could be made to dominate the working assumption of the court. Science being an abstract means to logically repeat a known quantity naturally lends itself to control by a well-resourced external entity. In this case, government wins not by the quality of its argument, but by the resources it has available to fund the domination of that argument over the working assumptions of the court.

Priori Assumption is a routine amendment to many legal matters when contested in court and in its ordinary usage, will form the kernel of many an injustice. Any given state authority, in any given territory, and at any given time, will place a tremendous degree of importance on the formation of working assumptions which it can use in the courts of the land. In a territory in which there is a widely held assumption that an unjust authority is just, Priori Assumption in all its forms is the mechanism by which the abuse of that authority can be maintained.

A Priori Assumption in a court of law is in practice comprised of little more than the current working prejudice of the land, that being the mechanism by which a Priori Assumption has most chance of engineering its survival.

Voluntary Supply

The notion of voluntary supply3. on the other hand is not a legal device and has no abstract status in law. Informally, the concept of voluntary supply can still be attached to Priori Assumption in order to gain a layman's understanding of the goals and aims intended when Priori Assumption is used in the public realm. In a court setting, a working assumption if accepted by the court to be a statement of a non-contestable truth, must go from being presented, to being accepted. Whether this acceptance is articulated by the Judge, a jury, a prosecution, a defence or even an appellant; the act of accepting the argument as a statement of the truth requires that the accepter is acting voluntarily. Voluntary supply is therefore an act in which a working assumption is voluntarily accepted.

In the video above, British Magistrates acting in their private capacities attempt to assert their jurisdiction in a non-criminal court in which they are not acting on oath. The Magistrates fail because neither the defendant nor his council, or the members of the public sitting in the public gallery, stand to signal to the Magistrates that they have jurisdiction in the court. By refusing to voluntarily stand and signal the Magistrates jurisdiction, the Magistrates fail to gain jurisdiction in the court and cannot therefore discharge any matter currently before the court.

A Magistrate can operate in the criminal court in which she is under oath to the crown as a Justice of the Peace4. who has been sworn to keep the peace. In a non-criminal court, the oath to the crown does not exist and so no Justice of the Peace is present. The Magistrate in this circumstance is a private citizen seeking jurisdiction by whatever means she can muster.

The key requirement needed here on the part of the Magistrates is the single act of voluntary supply from the defendant, his council, or members of the public sitting in the public gallery. It is assumed by the Magistrates that all persons in the court are voluntarily accepting of the Magistrates jurisdiction. The means by which this assumption of voluntary supply takes place initially involves nothing more than parochial symbolism such as standing in honour of the Magistrates as they enter the court, or responding to the threats made by the clerk of the court on behalf of the Magistrates. More seriously, threats to gaol, imprison, detain or even carry out acts of assault and forced removal may be made. In each case, the working assumption of the Magistrates of the court is that of an expectation of voluntary supply is accepted by the public in the court.

There is a clear and demonstrable link between the legal concept of Priori Assumption, aka the working assumptions of the court, and the act of voluntary supply which allows those working assumptions to become a judgement of the court. In the video above, the Clerk to the Magistrates works hard to engineer an act of voluntary supply on the part of the defendant, his council and the public gallery for the purpose of engineering the working assumption that everybody in his jurisdiction wishes to pay taxes to the state5.. To that end, the Magistrates hope to further engineer some profit at the behest of that assumption. In this specific case above, the Clerk to the Magistrates resorts to threatening behaviour, threats to imprison, threats to evict from the courthouse and finally threats to commit assault by ordering first the security guards in the courthouse and then secondly police officers, to commit to assaulting the defendant and his council if they do not submit to the Magistrates jurisdiction. Throughout, the Magistrates are nothing more than private citizens. In the video above, the threats made by the Clerk to the Court fail and the Magistrates abandon the court. In the absence of a purported Magistrate, common law being the law of the court is used to dismiss the case before the court.

The mechanism of Priori Assumption when used to elicit voluntary supply is an abusive practice in that Priori Assumption would normally be used corpus juris and not by the court to its own end.

Priori Assumption, Voluntary Supply and Industrial Surveillance.

Electronic Crusade

Electronic Crusade

For many around the world, it is scarcely to be believed that a President with such high moral currency could fail to achieve so many of his goals as they were articulated in 2008. In this image, the agenda of Empire is written far larger than the agenda of liberalism, liberty or freedom. Among the nonsense of the episodal propaganda represented in this image, a more comprehensive representation of advanced surveillance capability can be seen. In this sense, what is supposedly happening in this room, is not nearly as important as how its is happening.

Advanced technical surveillance and global signal distribution in real-time supposedly allow for a means to enable the United States Empire to cast its federal hand throughout the world at leisure. As is usual in the imperial toolset, multiple narratives are taking place here.

The first is that a foe of the United States Empire is being punished for transgression of the Empires corporate diktat, the second is that the Empire has the technology to enable that punishment all over the globe, and the third is that the United States Empire has the capacity to renovate global public thinking using a carefully crafted, and carefully timed, form of real-politik in real-time. All these narratives, are far stronger than the emotive concept of an ethical, and ethnic, based Presidency. In 2013, the only narrative which survives is that the Office of the Presidency of the United States, is largely immaterial and redundant no matter which political party possesses it.

Picture: Peter Souza.

Priori Assumption when used in conjunction with the notion of voluntary supply can and is used in an imperial setting to elicit deference and obedience toward a judicial authority. However, being that the modern corporation is itself a legal entity which is bound by contract law, the notion of Priori Assumption and voluntary supply has the potential to be used outside of its ordinary usage in a corporate setting, in the same way that it has been used outside of its ordinary usage in the corporate court. This is, however, not simply a matter of how Priori Assumption and voluntary supply are used by corporations in a legal sense and within a legal setting, but more how Priori Assumption can be used in order to elicit voluntary supply for the purpose of engineering the logical framework and substance of a corporate endeavour such as industrial surveillance. In a corporate court with an imperial heritage, Priori Assumption is used informally and out of context to elicit a public consensus, even from a defendant in the court who has little to gain from it. If this essential concept is further examined, one can begin to see the kernel of the logic.

A defendant before the court has little to gain in himself by being subject to convoluted sanction often engineered as a means to rid him of his earned income. It is up to the court under its own cunning and guile to bring the defendant under sufficient control to realise its goal. Priori Assumption is the mechanism by which the court enables that goal.

In the modern period, any global corporate surveillance program6. cannot be undertaken by force, but must be enabled by cunning and guile in order that the corporation's goals of data coagulation can be achieved convincingly . In reality, this is achieved by taking the concept of Priori Assumption as it is used in a court setting, and simply enabling that concept within a technological setting. The user of a computer, whether it is a laptop, a desktop or a cellular handset device, must be assumed to be voluntarily willing to provide detailed and private information about herself at the point at which she downloads or otherwise prompts the use of any software component designed to initiate surveillance7.. The act of using or downloading software along with installing the software onto a device, carries within it a corporate assumption that the user does not exercise a preference for privacy - in exactly the same way a defendant before a corporate court does not exercise a preference for the common law.

In practice, this will entail a browser installed onto a user's computer in which configuration settings are normalised toward gathering private data; third party vendor applications downloaded onto hand-held devices which are normalised toward accessing the GSM [Global System for Mobile Communications], email and GPS [Global Positioning System] services of the device; web application services in which browsing history, form data and location user data is held by default; difficulty in changing or otherwise disabling a devices data gathering tendencies; installation of third party software vendor products in which routine access to the devices privacy settings is routinely demanded; installation of third party software vendor products in which private data is being removed and stored on a remote server and not on the device itself and finally the practice of installing several applications to perform different tasks that would otherwise be easily done by one application. This last practice is certainly likely to take place because each individual application has been designed to gather a particular piece of data and is attempting to evade possible suspicion were it to attempt to ask for additional types of data.

Within the 'Android' system owned and operated by the Google Corporation, it is almost impossible to use the cellular device without entailing a degree of routine surveillance. Indeed, if a user uses an 'Android' device for a period before attempting to remove these surveillance services, the device will threaten to destroy the entirety of all the users data by wiping the device clean! This 'behaviour' serves as a strong deterent to the user should she attempt to address her own privacy concerns.

Throughout the entirety of the corporate system located within the United States itself, and within server systems under the control of the United States in other countries, U.S. corporations are using the concept of Priori Assumption to engineer voluntary supply of technical personal data for the purpose of gathering global quantities of surveillance data.

Entrapment doctrine and global networked communications

A modern consumer grade computer with a clock speed of 2GHTZ (two gigahertz) can process 120 billion simple instructions per minute. An instruction is the ability to add a positive number to another number, to move a number from its positive to negative form, or to place a number into memory for processing at a later point. Frequently, the computer may simply wait 1 billionth of a second for some other action to occur. Given this clear and demonstrably obvious fact, the same computer can process 7,200 billion (seven thousand two hundred billion) instructions per hour. As a full day is commonly understood to have 24 hours in it, a consumer grade modern computer can process 172,800 billion (one hundred and seventy two thousand eight hundred billion) instructions per day. If these instruction were single bits of information stored in a computer, that computer would have a hard drive capable of storing 172,8 terabytes of data.

If the total amount of data traversing the internet is 494 exabytes per day8., then 2,858,796 [two million eight hundred and fifty eight thousand seven hundred and ninety six] consumer grade 2GHTZ computers would be needed to flush the traversing data through their processors at such a rate that the data could be then said to be surveilled in real-time. The flushing would entail taking the traversing bit, and placing it onto the processor as a simple calculation.

However, the total processing power of a computer's processor is measured in the simplest of calculations only; adding 1 to the processor is of no use in any task on its own. The bit must be stored in memory, compared to another bit, interrogated to determine what its quantity is, whether it is a negative or positive and so on. Carrying out a multitude of simple calculations like these involving vast quantities of numbers is needed just to bring about the simplest of screen displays. It takes the completion of many thousands of instructions just to render the simplest of individual characters on the screen. The ASCII character 'a' as you see it on this screen for instance, requires a 48 by 48 grid of bits to represent the character itself, multiplied by 3 to produce the character in red, green and blue bits to make a colour display. In total 6,192 bits are required to represent the character 'a' on your computer screen, this does not include the single quotes which surround it! The ability of any given computer to surveill a data stream as it traverses the internet is determined not only on its ability to catch the data as it passes, but its ability to interrogate the data once it has been caught. This interrogation may involve thousands of separate sponsored instructions being performed in order to determine if the data in question is of interest to the surveilling script. If the data is of interest, many more thousands of instructions would need to be performed to pass that data on for further analysis.

In order to surveill internet communication data in real-time, a vast multi-million station networked array of computers with commercial grade processors would need to be deployed in synchronised fashion at multiple points on the globe each running permanently and without pause. The logistical problems associated with linking this network together in a synchronised form alone would easily defeat any nation states resource capabilities, let alone attempting to provide that quantity of machines along with a managed backup system. As the programming detail of the surveilling scripts increased in complexity to make more complex appraisals of the data stream in question, the numbers of surveilling computers would need to increase exponentially well beyond what is currently possible anywhere in the world.

A surveillance network of arrayed computers joined together by a private and secure network would need millions if not hundreds of millions of computers within the array to achieve real-time dominance of the current digital thoroughfare. A change to the scripts of any one of those computers in such a way that extra processing power would need to take place would immediately entail the loss of thousands of clock cycles and large quantities of extra machines would need to be added to the array instantaneously.

Real-time surveillance of internet communications is not possible with modern computing resources from a logical, technological, tactical, strategic or resource deployment point of view.

Entrapment doctrine and global server communications

The Global Entrapment Doctrine - Facebook

The Global Entrapment Doctrine - Facebook

The U.S. based Facebook corporation is now responsible for the industrial surveillance of around one quarter of all networked internet communications globally. Facebook has hundreds of server systems running in territories around the world which are almost certainly being used to gather information which is electronically transposed toward the United States Security and Intelligence Services [U.S.S.I.S.].

It is extremely unlikely that the corporation offers accounts to its users for free because it has some spurious and juvenile notion that it is "doing good". In an age of terror within the empire, it is highly unlikely that the owners of Facebook would survive for very long with such a useful tool at their private disposal. Logically, the Facebook surveillance network encourages users to voluntarily make contact with persons of interest inviting them to join Facebook in order to communicate through Facebooks surveillance server systems.

Within the Facebook server system, these communications are routinely made available to the U.S.S.I.S. At its heart, this inter-sector system of surveillance uses Priori Assumption and voluntary supply to impose the entrapment technology on a given computer system which then mines the device for data. This data can then be used by the U.S.S.I.S. for a whole range of uses from articulating supposed terror threats to the U.S. government during times of confusion, though to simply inventing terror threats when public-sector budget assessments are being performed at the end of the financial year.

Picture: Facebook Corporation.

Communications which arrive at a server system9., which are then converted to a solid state form, and which are then stored permanently for use at a later time are eminently suitable for surveillance. This is obviously because the data is no longer traversing within a network in which it is only momentarily available. Data which is out of a traversing state and which has been stored on some solid state device can then be de-referenced at any time as long as the device itself is available. Therefore, a global surveillance system will entail the positioning of server systems across multiple territories10. in order to entrap data. Once that data is entrapped, it may be stored for later use at any time by a whole host of private individuals positioned at any point within the overall chain of privilege. It is unlikely to be the case that the sole recipient of the use of that data will be the highest public authority. As is now clearly the case, the United States Empire is infested with nationalist elements all keen to enable their own malevolent agenda's11. at every conceivable opportunity. These nationalists are predominantly stationed within the Empires military systems and so have a clear line of sight toward the end product of the U.S.S.I.S. [United States Security and Intelligence Services] various intelligence gathering provisions12..

In terms of the scale of that entrapment doctrine, it must be assumed that all known U.S. corporate communications activity is likely to have either taken part in the surveillance program, has been approached to take part in the surveillance program, or are actively engaged in the surveillance program. It is highly likely that financial incentives continue to be made to various Silicon Valley start-up companies with the aim of eventually converting those companies toward inclusion in the global communications program13..

At present it is certainly clear that beyond a given user base, such as those companies able to command the attention of substantial percentages of the overall internet architecture, inclusion within the U.S.S.I.S. program will be a given. Google's Gmail14., Google+ & YouTube products, Facebook, MySpace, Yahoo, Hotmail, AOL and an assortment of email providers will all fall within the architectural domain of the United States domain awareness programs in its various forms. For many, considerable confusion has existed for many years regarding the ability of these corporations to generate active profits from their products given that they are offered for free15, 16. 17. For many more, the lack of a clear business strategy with an equally clear forward plan for economic growth has also been of interest. If these corporations had started with the best of business intentions and had simply failed as the reality of offering free products resulted in a lack of profit, then all of these companies would have rightly failed by now under the shareholding model, as should always the case. But if a company starts and goes on to achieve a staggering rate of growth with that exact same "free" product line, without being able to demonstrably monetise that product line, then a suspicion of foul play must inevitably be entertained as and when that company moves into a period of existence beyond its natural lifetime. Persistently across the whole sector, U.S. corporations fail to provide any evidence at all that they are ongoing operable businesses with a shareholding equity that isn't wholly derived from bulk investment from external actors.

It is likely, that the free products which make these corporates products so alluring to the public, are subsidised by the U.S.S.I.S. and other various occluded business interests acting in collusion with the United States Imperial government.

Entrapment doctrine and cellular 'Android' communications

We will share personal information with companies, organizations or individuals outside of Google if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to:1. meet any applicable law, regulation, legal process or enforceable governmental request. 2. detect, prevent, or otherwise address fraud, security or technical issues. 3. protect against harm to the rights, property or safety of Google, our users or the public as required or permitted by law.

- Google Corporation Terms and Conditions - 11th August 2013.

In every conceivable area in which these routine surveillance abuses have taken place, no coherent attempt has been made to deal with the underlying structure of the abuses18..

In every area in which an abuse can take place, it routinely does take place. In the case of the Google Corporation, the company clearly states in its terms and conditions that it will routinely make available, on request, all information it has on a given user of its services in any matter relating to the security of itself as a corporation, or any of its users worldwide. Under the terms of the United States Patriot Act, any given domestic corporation will and must make available any data it has collected and which it has stored on any system under its control in whatever territory it operates in, domestic or foreign. In all territories in which Google operates, using either its desktop or cellular surveillance technology, Priori Assumption and voluntary supply are in routine use throughout all its products.

Priori Assumption and voluntary supply clearly form the bulk of the marketing of these surveillance products. In the case of the Google Corporation, its surveillance products have been built into the cellular technology of various cell-phone manufacturers operating worldwide. Within the 'Android' operating system [O.S.], variously marketed under the juvenile monikers of "Jelly Bean", "Ice Cream Sandwich", "Honeycomb", "Gingerbread", "Froyo" and "Eclair" mass marketing terms, chronic and histrionic data mining activity is being undertaken routinely. Within the 'Android' system, the abuses take place by Priori Assumption and voluntary supply. At the first point, Priori Assumption determines that an assumption is made that the user of the Android system is happy to allow the installation of third party software in which access to the devices geographic location, GSM services and email communications are assumed. By gaining access to these device services, the third party software package is routinely able to carry out detailed surveillance of the devices user.

In this regard the Google Corporation is not only carrying out surveillance on behalf of the U.S.S.I.S. itself, but is also providing a cellular environment in which the abusive 'Android' operating system is creating new environments for surveillance by the U.S.S.I.S. covertly operating as third party software vendors.

Where third party software U.S.S.I.S. 'applications' are being installed on a device, and where it is being installed using an initial software configuration that is abusive using the para-legal abuse of Priori Assumption and voluntary supply, the user is supposedly protected from herself by her ignorance. This is the mechanism by which Google, and other U.S. surveillance actors, are able to claim that a degree of consensus exists under which that surveillance can be made.

The 'Android' operating system is owned and controlled by the Google corporation and facilitates access to the hardware components of the cellular technology such as geo-location GPS [Global Positioning System], GSM, email and GPRS [General packet radio service]. Using these aspects of the devices hardware, Google is able to map and surveill a user's location, mobile data and web based communications with ease. The installation of third party software components, including those from corporation's set-up and operated by covert elements of the U.S.S.I.S then becomes a straightforward practice and can be realised strategically in direct correlation to the ability of the user to activate their privacy protections. In the vast majority of cases, technical handicap, lack of specialist knowledge, illiteracy and deficit of technical proficiency will allow that surveillance to go on unnoticed to such a degree that routine surveillance on a global scale becomes normalised.

The global digital security state

The Global Entrapment Doctrine.

The Global Entrapment Doctrine.

The United States Empire in its modern form is simply the natural outcome of a pre-existing imperial tendency. It is the nature of Empire to expand and dominate and in a world in which information is a key commodity, then Empire will want to dominate that information in service to its expansive doctrine. In this image, the current Democratic incumbent, Barack Obama, raises a glass with the United States Empire's information oligarchs at a time when the Empire is in an accelerated pattern of expansion.

This is often and confusingly mistaken for Globalisation. The antagonists in this image would be in place irrespective of the political domestic party in power because the political domestic party in power is not the mechanism by which the United States Empire is primarily motivated. For the Empire, a separate legal entity exists.

From left to right in a clockwise direction (starting from far left) are: Eric Schmidt; Chairman of the Google Corporation, Art Levinson; Chairman of Genetic Engineering Technology, Inc, John T. Chambers; Chairman of Cisco Networking Systems, Inc, L. John Doerr; Kleiner Perkins Caufield & Byers, Lawrence Joseph Ellison; CEO ORACLE Corporation, Wilmot Reed Hastings, Jr; CEO Netflix, John LeRoy Hennessy; President of Stanford University, Carol Ann Bartz; CEO Yahoo (dismissed in September 2011), Dick Costolo; CEO Twitter, Valerie Bowman Jarrett; Senior advisor to President Barack Obama (obscured), Mark Elliot Zuckerberg; CEO Facebook Inc, President Barack Obama, Steven Paul Jobs; CEO Apple Inc (deceased), Steven Paul Westly; Political Capitalist and the spouse of John Doerr, Ann Doerr.

Together, this small group constitute complete control over the entirety of the electronic communications infrastructure of the domestic United States from the software driven social media platforms used to surveill the population of the United States, to the hardware servers and systems on which that software runs and onto the Universities and academics who have articulate this system into existence. Over the course of the past decade, that surveillance has been rolled out by the Empires dependencies as a Global Surveillance Nexus [G.S.N.].

Picture: Peter Souza.

The primary method under which the global digital security state is articulated is not surveillance of the world's population as is often claimed, but an entrapment doctrine in which a globally reaching domain awareness system has been put into place to entrap information with the intention of gaining assets with which to expand the Empires doctrine. For the Empire, Socialism, Capitalism, Communism and other hard one political platforms are of little use to the Empire, the agenda of Empire is only Empire. Throughout the period from the 3rd to the 5th century AD, the 'western' Roman Empire was scarcely concerned with its political assets but only concerned with its survival. In the 5th century AD, the 'western' Roman Empire collapsed and upon its failure, was liberated all of the material assets it had taken ownership over. This was considered a great and compelling period of freedom throughout the European petit-continent.

However, in Eastern Europe, the old imperial order remained and became the Byzantine Empire. For another 900 years, the Byzantine Empire consolidated these previously liberated assets until it too was finally overrun by European nationalists in the form of the Ottoman Turks in 1453AD. As the old imperialist order fell away and into dereliction, an imperial exodus began with the departure of its advocates away from Europe and toward the America's. There was no political, cultural, economic or ideological mechanism in play anywhere on the European petit-continent capable of arresting this exodus. From that time to this, while the United States domestic unitary states of the Union have toyed with various political schools of thought to enable strident representation of the rights of the domestic populace, no coherent or cogent articulation of that political narrative has ever formed conclusively at the federal government level. From 1945 to present, the federal government has become weaker as each Presidency has waned further under the yoke of a more and more visible American internecine imperialism.

As this governmental and democratic failure takes hold, it is becoming increasingly obvious that the domestic polity among the federal governmental institutions of the United States are becoming governed by paranoia and mistrust of a whole welter of external foreign actors19, 20, 21, 22, 23, 24, 25, 26, 27.. It is here, that the actual reality of the Empire at this present time is most especially evident. It is here within this occluded paranoia, that we can see further into the Empires imperial and tenacious insistence that its domestic security situation, must form the basis for the rest of the world's freedoms. This insistence, is routinely liable to form at periods of corporate or anti-imperial stress.

There has never been an argument more clumsily made, nor an agenda more ruthlessly postulated for international diplomacy, than this.

The fundamental properties of the global digital security state are contained within a networked system of servers and routing protocols in which composite information is collected and converted to solid state format (saved to a hard drive device). The purpose of this networked system is to attract persons of interest to the U.S.S.I.S. This is unlikely to be for the purpose of carrying out prosecutions or combating terrorism or any other criminal detection endeavour, but is more likely to be for the purposes of gathering human intelligence assets for later use28.. Only in cases where the most clumsily and poorly articulated assaults against the Empires holdings have taken place29, 30, 31. will a public prosecution be staged, and only then if there is no material benefit to be had by taking any other course of action. In every case, the United States will be looking for a vector to re-direct to some other aim in which the Empire's expansive doctrinal goals are served.

The agenda of Empire, is Empire.

This data collected within this imperial corporate framework, can be described as User Supplied Data [U.S.D] in which a prior assumption has been made regarding the data's importance to the U.S.S.I.S. The voluntary use of the technology by hapless social media users constitutes an act of voluntary supply in the eyes of the U.S.S.I.S.

User Supplied Data

Government Communications Head Quarters. U.K. S.I.G.I.N.T.

Government Communications Head Quarters. U.K. S.I.G.I.N.T.

The British government is widely known throughout the world as being a bland and largely timid dependent of the United States Empire, for these reasons it can scarcely be expected to take the lead when issues of the national security of the British people is concerned.

Worryingly, this is extended to the other partners within the Union such as Scotland, Wales and Northern Ireland. Over the course of the previous months, the British Government has been rightly accused of turning a blind eye to the United States Empire's surveillance of the British populace and has further been accused of actively encouraging this form of surveillance by taking part in a shared surveillance responsibility.

The British Government's primary purpose here is clearly to exploit the U.S. surveillance network for no other reason than being able to claim that the British people are not being spied on by the British Government itself!

Picture: GCHQ/Crown Copyright

User Supplied Data [U.S.D.] is data that has been supplied by, unsurprisingly, a human user. The data can be any data the user has created on a computer by any means. There is, on the part of the U.S.S.I.S., an assumption that data which has been created in this way, has been created by a human user and not an automated software component which is computing an automated data signal. Data which has been created by a human user and which has been submitted to a server, either through http header protocol or direct submission through a network, arrives at a server port and is then processed. This will ordinarily involve being converted to a solid state in order to allow the data to be retrieved at a later time. From the moment the data has been converted to solid state, it will be available for retrieval by surveillance technology and can be stored within a separate retrieval system usually in the form of a database. Depending on the nature of the assumptions the U.S.S.I.S. will have made about that data, the data may be stored for any period of time, in a high or low level U.S.S.I.S. system.

User Supplied Data is tactical in pieces and strategic by mass.

In all cases where data can be submitted by local, intranet or internet means; the user may or may not be aware that they have submitted the data. On local systems, key-logging software or interventionist scripts may be running within the user's software which may submit data quietly without the user's knowledge. While using intranet and internets, the user may find that data is being quietly submitted via spying software in the case of intranet use, and AJAX scripting in the case of internet use. Indeed, it is highly likely that U.S. servers which are already co-opted to gather data for the U.S.S.I.S., will be under the control of corporations which will employ any and all techniques in service to gathering as much data as is technically possible.

The majority of U.S.D. which has been collected in the past has required an act on the part of the user and this has been amended by an assumption that the user has undertaken that act voluntarily. When operating software on a computer, the user has a number of potential options open to her to prevent assumptions being made about how much privacy she wishes to maintain while using her computer. In the case of software which emanates from corporations that are now known to be collecting data on behalf of the U.S.S.I.S., such as the Google web browser Google Chrome, configuration settings which assume that the user has a limited understanding of her privacy are routinely set when the browser is installed. Most commonly, this can be seen in the practice of conditionally separating private browsing from normal browsing and imposing on the user the notion that privacy must be enabled, rather than being present by default. This is certainly done to help ensure that data which is submitted to U.S.S.I.S. controlled servers, contains as much information about the user as is technically possible.

However, this situation has rapidly and disturbingly changed for the worse over the previous 5 year period as the number of cellular devices running internet capable software has increased. Within these devices, Priori Assumption has begun to overtake voluntary supply as the primary mechanism by which the user's identity can be established. Google's Android system for cellular handheld devices has been configured in such a way that the device is largely inoperable unless the user specifically permits a configuration regime in which a compelling quantity of data is being removed from the device in every instance where U.S.D. is being submitted to a remote server. In this case, Priori Assumption has been engineered into the device to over-rule the user's ability to act voluntarily. This practice not only exposes the innocent user to the surveillance program undertaken by the U.S.S.I.S., but also exposes the user's identity and data to foreign nation states that have learned to convert U.S.S.I.S. tools toward their own ends.

The use of the para-legal devices of Priori Assumption and voluntary supply within the para-corporate environment of United States Empire information systems manufacturing is routinely used to shepherd as much data as is technically possible into the surveillance Domain Awareness Program [D.A.P.] of the United States. The claim that this system is exclusively concerned with terrorism and the prevention of terrorism is highly unlikely excepting within territories in which there is a standard suspension of disbelief in the existence of the Empire32, 33, 34..

The Global Domain Awareness Program [G.D.A.P.]

Private sector cyber espionage

Private sector cyber espionage

In this corporate private sector image taken by an employer of the corporation, and then handed out through the Reuters Corporation as a news image, employees of the Lockheed Martin Defence contractor are staged in front of a bank of computers in order to advertise the corporations proximity to the U.S. Government.

This is a common feature of the private sector not just within the United States Empire itself, but among the Empires dependants where U.S. Free-Trade regimes have been invoked, often by direct and indirect force.

In reality, away from these sorts of advertising initiatives, the United States employs corporations such as Lockheed Martin to engage in acts of foreign commercial espionage under the auspices and currency of the Campaign Against International Terrorism.

Picture: Reuters.

The Global Domain Awareness Program [G.D.A.P.]35 describes a collection of spurious systems casually linked together in order to provide for a universal networked system of surveillance technologies all operating to bring about complete dominance of surveillance for an on behalf of the U.S.S.I.S. The systems operate tactically in both the private and public sector and encase all known mechanisms by which information of any type can be generated, transmitted and disseminated. The system as a whole is object oriented and designed to operate at a profit. In some areas, the various technologies can, have and are being used under the auspices of fighting international terrorism, but are mostly used for dissemination of propaganda against the United States perceived foes and for the gathering up of information linked to corporate espionage36.

The Domain Awareness System [D.A.P.] is comprised in the first part by a technological mechanism by which data can be gathered, followed by in the second part a secure mechanism in which the data can be stored, followed by in the third part by a mechanism by which the data can be disassembled in practical form for carto-graphical analysis. These systemic attributes cannot be gathered in real-time due to the technical limitations of gathering and processing the required amount of data with current technology. Ergo, the D.A.P. will have no value except in tracing points of information that have already been stored in a solid state system (saved from temporary memory to a device). Due to the technological limitations of current computing technology, and the inability to monitor global communications in real-time, the D.A.P. will have no material benefit in an anti-terrorism capacity, excepting where an investigation of an already existing event would need to take place.

In logical terms, the D.A.P. will entail the commission and organisation of data in logical organised form which can be saved to a solid state system for carto-graphical analysis at a later point in time. This statement is irredeemably complex given the resources that have been enabled to allow for its use by the empire and its dependants. Not only does this data regime allow for surveillance, but allows for enhancements to propaganda initiatives initiated not only by government, but by the numerous private contractors and private interests connected to those contractors. For many around the world, the tone of modern broadcasting within the media in the United States domestic territory and beyond, often carries within it a suspicion that all is not what it seems! This public angst certainly has a number of components.

In the first part, the commission and organisation of data in logical organised form when relating to the surveillance operations being operated inside the United States, and within its dependants relates directly to commissioning data from the global communications network by articulating the public mind with pre-rehearsed cues designed to elicit a voluntary type response which can be engineered toward the empires strategic ambitions. This ordinarily will entail flooding media corporations with pre-rehearsed stories across a range of media outlets which are intended to serve as a prompt to elicit an organised public response. After prompting, the resultant data can be saved into a solid state by a range of security corporations for use at a later date. Presumably, prompted alter-narratives that cut across the grain may form the basis of the empires immediate tactical interest. By this mechanism, is the empires horizon adjusted for potential threats that may emerge from as yet unknown quantities.

In the second part, carto-graphical analysis of the data will present the collected information into geo-strategic format for processing of alter-narratives by geographic region. By this mechanism, is the United States Empire able to segment its material interests into territories in which resources can be more finely targeted to enable region specific obedience.

These points are tremendously important for all peoples and all governments given that a global surveillance network which is created outside the mature control of centralised government, has no means by which it can be removed except by violent force, strident intervention or economic collapse. If a global surveillance network is created by incorporation in which the ultimate determinant is profit and economic stridency, then rigid permanence is built into the public and corporate mind by default. If that surveillance is global and being used to enable regional obedience under a single imperial crown, then the situation is clear and unequivocal.

The United States Empire can only ever guess at what might be in store in the future. Ultimately, a U.S.S.I.S. surveillance network is highly unlikely ever to be of any real use.

The Terror polemic and corporate strategy

Dr Aafia Siddiqui framed for fabricated terror offences.

Dr Aafia Siddiqui framed for fabricated terror offences.

In 2003, a Pakistani nueroscientist was arrested by U.S. nationalists desperate to engineer evidence of terrorism among Arab nationals for dissemination among domestic U.S. media. Dr Aafia Siddiqui was arrested and tortured by five male U.S. nationalists at a secure facility in Afghanistan.

Her only crime had been to have been married to the nephew of a man U.S. nationalists claimed had been involved in the 9/11 atrocity.

Sidduiqi was certainly tortured by security staff at the facility and during these events, the male U.S. Army nationalists claimed she had disarmed one of the soldiers, and fired the gun repeatedly in a closed space. Despite this, Sidduiqi was herself shot and then charged with attempted murder of her torturers. It is highly unlikely that the version of events given by the U.S. nationalists is true and far more likely that this woman had a pre-existing relationship with an Arab national that had propaganda capital which was usable in an imperial context for propaganda purposes against the American people and the empires dependants.

The U.S. corporate terror polemic had been born.

Picture: Uncredited.

In a geo-strategic sense, the War on Terror has been a spectacular failure for the United States. In both Afghanistan and Iraq, the United States has been subject to a strident series of regional defeats often inflicted on it by nothing more than peasants wielding sticks. It is no longer the case (if it ever was!), that the United States military is seen as the toughest, most well equipped, and the most disciplined military super state in the world. Its military is now seen as incompetent, ill-disciplined and perpetually given to tactical and strategic stupidity in abundance. These failings are not just the failings of the common soldiery, but strident failures of political and military logic enjoined by severe incompetence and deficit of basic experience on the part of U.S. nationalists. Throughout the entirety of all its holdings, the United States Empire is clearly an incorporated entity and so will always find itself easily defeated by the autonomous vapour. Corporations cannot fight conventional wars, but can periodically engage in conflicts in order to win contracts. The United States Empire being a unionised corporation of unitary states is highly unlikely to be concerned with winning a conventional war, but will always be concerned with winning a profitable peace.

In strictly corporate terms, the War on Terror has been a resounding strategic success for the Empire. Very few places throughout the world are now out of the hands of the United States corporate tentacles. The global Visa and MasterCard credit brands are entirely under the control of the United States37 and so are the entirety of the banks and checking accounts that control them. From the 1980's onwards, the United States was already well on its way to global domination as a result of its credit line products and in 2013, the United States can already state categorically that it understands completely the day-to-day movements of a large part of the global populace simply by monitoring its day to day spending regimes through those credit services. The War on Terror has not provided for an extension or expansion of this global financial system, but has certainly provided the mechanism by which spending within that credit system can be steered toward the purchasing of American goods and products. The mechanism by which that spending can be steered now formats the bulk of American activity in its corporate post-war outlook.

From 2001 onwards, The United States Empire engaged in a protracted campaign of proscriptive behaviour in which it routinely articulated ethnic hatred toward the Islamic religion via the polemic of the War on Terror. Throughout every aspect of this polemic, advocates of the war on Terror searched for every conceivable opportunity to refine and renovate the persecution of that war in such a way that the polemic would survive. From 2009 onwards, that polemic has survived well beyond its natural life. From 2004 onwards, the United States Empire had clearly realised that its ultimate long term interests would be served in using the terror narrative to a directed commercial network in which its global credit generation systems (Visa, MasterCard) could be enjoined with its anti-terror systems to create a new focused economic model. This model would provide a global surveillance system in which the buying habits of millions of credit users could be forcefully steered toward activity inside the domestic United States, and presumably for a price, within the domestic territories of the Empires dependencies.

The Global Security Nexus

Commodity of pan-Arabian Terrorism.

Commodity of pan-Arabian Terrorism.

Twelve years after corporate passenger airliners are crashed into private and public sector buildings in the United States, the world is now witnessing a corporate branded form of terrorism emerge from within the ashes of an old post-imperial world.

The new imperialism of the corporate United States Empire has spread a corporate form of industrial surveillance throughout its dependencies using the polemic of an industrialised form of terror polemic in which it now has a home grown component. It can scarcely be believed, that al-Qa'ida ever intended for this! And so of course it can scarcely be believed that this is indeed, the work of an Arabic al-Qa'ida!

Picture: Aaron Tang

The world is now moving toward the full incorporation of its individual economic systems toward an imperial Anglo-Saxon model polity in which the vast bulk of the wealth of the various continental trading blocs is being directed toward the United States Empire. Where the Empire has dependencies, the nexus is fully articulated and near fully operational. In the United Kingdom especially, there is no surviving opposition in any form whatsoever and no national security component to the U.K.'s everyday or ordinary polity. Where this wealth re-direction is being blocked, obstructed or otherwise slowed by any means whatsoever, the United States Empire chooses of its own accord to see terrorist cells each one of which is perpetually linked to the pan-Arabian Mujahedin38. When this is the case, it is always the case that the United Kingdom, Australia, Canada, and Israel, either collectively or individually, will always happen along with the intention of capitalising from the polemic by some means. Where an attempt is made at capitalisation of the polemic, a routine attempt is always made to engineer construction of the polemic through U.S. surveillance technology in order that internal dissidence within the Empires dependencies can be mapped and presumably dealt with by some internal or external means.

Where this is not the case, brazen commercial exploitation is the result to such an extent that substantial profits can be engineered by those corporations acting within the Empires security sectors.

The technology itself often takes the form of social networking corporations placing software components on server systems within those territories in which they operate with the intention of either surveilling the domestic populace with the intention of promoting U.S. propaganda of both a commercial and non-commercial type, or surveilling the domestic populace for signs of internal dissidence which can be used to engineer greater complacency within the dependency itself. In the United Kingdom, a greater number of British citizens39 are now experiencing imprisonment and sanction as a direct result of being entrapped within U.S. imperial corporate systems.

The golden phoenix of this arrangement however, is the potential for entrapment of Arabic Muslim dissidence40 which is directed toward the United States Itself. Serious and very long-standing currency can be engineered over extended periods of time, and across extended geo-graphical territories, if an example of Arabic Muslim dissidence can be found, or engineered.

The social networking component of this newly arrived from of industrialised trans-boundary surveillance, uses the para-legal devices of Priori Assumption and voluntary supply to bring forward the requisite data it needs to be of use to its imperial outlook. This data is generated on technology that is under the control of the corporations of this empire, using software components created by corporations within this empire, distributed freely by the populations of the dependencies of this empire, for the purpose of surveilling and itemising the every-day habits and patterns of the Empire's dissidents for its security, and the everyday user for its profits. There is no controversy here, excepting that proposed and articulated by those who see the Global Security Nexus - but do not see the Empire.


Corporate fanaticism!

In this footage taken in 2006 at a Microsoft Conference, the CEO of Microsoft, Steven Anthony Ballmer gives a striking account of the excitement existing in the U.S. corporate sphere at around about the same time that many U.S. corporate interests began to fall into line with the United States governments surveillance diktat.

Microsoft builds the Windows GUI [Graphical User Interface] assembly language component currently in use throughout the majority of computer systems in place around the world. The Windows system is a variant of the X-Windows system and simply provides for an abstraction layer to enable user use of computer architecture. In the Windows GUI product, tremendous emphasis is placed on consumerism in order to drive systemic surveillance abuses under the Priori Assumption notion that a consumer class is least likely to possess the technical proficiency to prevent data mining of their own computer device.

In 2006, Microsoft was experiencing chronic public dissatisfaction and suspicion regarding its products. Since 2006, Microsoft has seen a reversal of its fortunes and now enjoys a strident market share of the surveillance network put into place by the U.S.S.I.S. On any given day, hundreds of millions of computers running the Windows GUI systems are routinely communicating with Microsoft servers positioned at various strategic points around the globe. It is highly unlikely that this network is not by now routinely enmeshed with the global U.S.S.I.S. surveillance program.

The para-legal concept of Priori Assumption when buttressed to the concept of voluntary supply is the building block of the means by which a sitting entity in a territory can engineer the complacent dependency of a domestic populace toward the authority of that sitting entity. In courts in which the domestic populace believe that the law of order is being enacted, but in which a tax levy is being performed for profit, there is a clear need for that authority to engineer jurisdiction in order to realise that profit. To that end trickery, sleight of hand, threatening behaviour and threats of violence are routinely used to affect jurisdiction to act. This is the way it has always been in the imperial commercial courts and to that end a government is pleased to legislate to derive an income for its loyalists. In defence of that system, the government legislates first for the profit, and then for its survival.

Within the British Victorian Empire, this form of 'business within the court' is a throwback to an imperial age in which the Empire would alight into a territory, and after a short period of carefully crafted but strategically invisible violence, would begin the process of transposing itself onto the domestic populace through imposition of the imperial courts using the imperial law. The profits that would be derived would generate the income needed by the Empire to survive in the newly complacent territory. For that populace, the court was imposed as the mark of a civilised man and civilised men would, naturally, resort first to the jurisdiction of the court, not to the arms of the man. By this convoluted mechanism, would the empire engineer its survival in a place that it had no legitimate business.

In the modern day long after the British Victorian Empire has collapsed, this corporate court system continues to generate income for the British government but also forms the foundation for Britain's complacent dependency on a new, more modern, imperial order. The United States Empire is itself an imperial entity which shares the history of the United Kingdom and, undeniably, draws its para-legal histrionics from the British imperial system. The corporate courts of the United Kingdom - are one and the same corporate courts of the American Empire. The para-legal devices of Priori Assumption when stirred with the more informal notion of voluntary supply, are the judicial building blocks of today's para-corporate and para-legal imperial order.

The quantities of data which are being delivered into the hands of the United States Empire through the voluntary use of this global para-imperial system are truly staggering. In the priori assumptive mantra of the United States Empires advocates and defendants..."If you have nothing to hide - you have nothing to fear" should have a now familiar imperial ring to it. The assumption of voluntary supply which sits behind this statement demands that an unquestioning imperial obedience must be forthcoming or without it, the hapless disobedient has everywhere to hide - and absolutely everything to fear.

This is neither terrorism nor imperialism - but tyrannical corporate authoritarianism!

In the United Kingdom, domestic national security threats to the security of the domestic populace are daily encouraged by the British Government under the ridiculous notional polemic of protecting the domestic national security of a foreign inter-corporate nation state. In the world of international relations, there is no nation state capable of relinquishing the entirety of its own security to, except that nation state which has been conquered and annexed to its authority. If it is the case that a domestic government seeks to relinquish its domestic security, a national security threat exists. In the United Kingdom, a number of U.S. server systems are positioned to collect domestic User Supplied Data, with the express intention of gathering intelligence on the domestic populace. Where this is claimed by the United States to be for a purpose of combating its own 'terror dilemma', a national security threat to the United Kingdom clearly exists. Where this is claimed to be for some other purpose, domestic commercial and industrial espionage can be reliably suspected.

In all cases in which a suspicion of surveillance exists and is communicated to the various U.S. corporations involved in that surveillance, tactical and strategic denials will present under the umbrella of the U.S.S.I.S. blanket security legislations. A denial made regarding this surveillance practice, will certainly be made itself to protect the national security as it now exists inside the United States. U.S. corporations have no capacity available to them that allows them to fully, honestly and truthfully report the practices they have been and are involved with.

As we move further into the anti-imperial narrative fondly ignored by those at the heart of the United States Empire, its dependants and the clumsier of its dependant's opponents, we are certain to see more examples of Priori Assumption and voluntary supply being articulated by the Empires loyalists as a desperate means to ingratiate the Empire to its consumer base. The meandering and homeless sense of angst and anxiety which infests many throughout the periphery of the Empires diminishing circumference of influence will only consolidate as greater abuses of privacy emanate from the Empire. At each point in each twist and turn of the imperial dilemma, corporate abuses will abound all done under the feeble justification of an attempt to protect the domestic United States, from assaults that are undeniably anti-imperial in tactic and strategy. At each turn of the digital thumbscrew, the virtual global community will be exposed by those engaging in the surveillance to more and more elaborate marketing strategies involving infantile technical terminology and near sociopathic declarations of corporate love and adoration. The imperial United States Empire's global surveillance program was, just a year or two ago, nothing more than a jelly bean that loved and adored you.

Now it is what it should always have been; an invidious global cobweb of nationalist surveillance, undertaken under cover of a murderous and deranged crusade against a non-corporate anti-imperial no man's land.

It has often been claimed that those who claim and demand a strident degree of privacy in their everyday digital communications, and who take steps to limit and abbreviate threats to their security, are themselves secretive, fearful, conspiracy laden and paranoid. From 2001 onwards, there has clearly been in place a large scale U.S. sponsored and paid for propaganda machine capable of infesting all online media with supposedly public commentary regarding the safety of U.S. corporate products together with a rigid insistence that these products are routinely assumed to be safe to use41. In the course of researching and compiling this article, it has been a lamentable thing to see the sight of innocent members of the public posting messages on internet forums alluding to suspected privacy invasions by U.S. corporations. In many of those cases, apparently senior but always anonymous "moderators" of those forum boards have resorted to the most scurrilous accusations and assumptions of wrong-doing in order to bully hapless members of the public into dismissing their own honestly held privacy concerns.

Time and time again, the responsible and free citizen has been bullied, slandered, defamed and in some cases overtly accused of wrongdoing for no other reason than attempting to exercise their own privacy in the corporate sector. This organised electronic bullying is not the conduct of those with a mind toward freedom, but toward the freedom of their empire and that which drives their empire - fear and trans-boundary imperial real-politik.

The U.S.S.I.S. corporate security program which certainly drives and articulates this state of fearsome obedience within the public, has itself brought about a monstrous surveillance system of global proportions every bit in tune with the stark imperialism of the Empires of the past. In each territory in which it alights, the imperial smokescreen of military force is backed and consolidated by the imperial corporate merchants of para-legal and para-corporate self-interest. Priori Assumption, voluntary supply and a corporate system of bullying sequestration are now firmly articulated in all the territories in which the United States Empire falsely and wrongly claims a jurisdiction. In every case, the most infantile terminology is now in full use to spawn greater and greater dependency on the tool-set of empire using whatever works at the basest level.

The Global Security Nexus [G.S.N.] in clear use by the Empires most ardent and fanatical loyalists, derives nothing of freedom from those it placates. Priori Assumption as used by the United States Empire is little more than an old imperial carpet-bagging polity seen in most territories around the world and in each territory in which it has ever been used, it failed after a fashion.

In our world, the current working prejudices of the global marketplace are globalised and borne of racism, terror, fear, belligerence, feeble-mindedness and corporate foolishness. The world's first and leading economy, is now in a state of rigid and irredeemable failure in which the vast bulk of its primary economic systems are bent now heavily toward the destruction of the free liberties of the world.

In a straight contest between those liberties and the rights of the Empire, the Global Security Nexus is as good as a hangman's noose.


1. 'Colonies and dependencies: further research'. The National Archives. National Archives [U.K.] 2. '(ah-pree-ory) n. from Latin, "an assumption that is true without further proof or need to prove it. It is assumed the sun will come up tomorrow. However, it has a negative side: an a priori assumption made without question on the basis that no analysis or study is necessary, can be mental laziness when the reality is not so certain." 3. 'The concept of voluntary supply while not having formal status within the law, is routinely used by government to manage activity surrounding Freedom of Information requests undertaken by public and private individuals including public sector bodies through to statutory government devices regarding public sector initiatives. In fact, voluntary supply can be seen in any provision in which government requires public or private activity which is supplied by non-salaried public actors. 4. 'Justices of the Peace Act 1997', United Kingdom. Justices of the Peace Act 1997 [U.K.] 5. 'In the United kingdom, a local tax [Council Tax] which is levied by the government on all persons inside its sphere of jurisdiction is made annually via local government factions. However, the tax is routinely over-levied, levied favourably and very often levied incoherently in order to suit and maintain local government accounting irregularities. In many instance where the tax is levied, little or no confidence in the tax levy is found. In some instances, outright corruption is found among local authority factions who utilise the enforcement doctrine in order to balance the local authority accounts by over levying to take account of non payments. In some cases, local authority factions have sought supplementary income from the enforcement of fines as a measure to increase its local revenue. This is a particular problem when a local authority is governed by a political party other than that which is in national government.The Council Tax (Administration and Enforcement) Regulations 1992 [U.K.] 6. 'Bush Lets U.S. Spy on Callers Without Courts.'. By JAMES RISEN and ERIC LICHTBLAU. 16th December 2005.New York Times [U.S.] 7. 'In common usage, downloadable software components from corporations which take part in the Global U.S surveillance program do not make honest assumptions that all users using the internet wish to remain private as should be the case be default, but instead assume that the user will wish to navigate around the internet while having the history of their activity recorded and stored by a browser, which is provided by the surveilling corporation. For this reason, privacy features on browsers and other navigating products that originate from within the United States are supplementary features of the software and have to be enabled separately by the user. In practice, the majority of users will install a browser and will start navigating immediately. This fact is fully understood and exploited by corporations such as Microsoft and Google. Google Incognito mode. 8. 'Building Britains Digital Future', British Government. Department for Culture, Media and Sport & Department for Business, Innovation and Skills [U.K.] [PDF 4.96MB] Please note; in this report, the British government have stated clearly that the total quantity of data which is estimated to traverse the internet in a given day is 494 exabytes of raw data. It is unlikely in the extreme that the British Government would have access to this kind of data due to having no material ability to collect data of this kind in all territories, in all jurisdictions across all known political boundaries. This figure is highly likely to be spurious and its only relevance to an accurate truth is that it is an excessively high, rather than an unreasonably low figure. 9. 'Facebook opens data center filled entirely with servers it designed' by Jon Brodkin. 12th June 2013. ARS Technica [U.S.]. 10. 'Inside the internet: Google allows first ever look at the eight vast data centres that power the online world'. By Mark Prigg. 17th October 2012. Daily Mail [U.K.]. 11. 'Retired US general 'may have leaked Stuxnet cyberattack details''. By Jon Swaine, New York. 28th June 2013.The Daily Telegraph [U.K.]. 12. 'Seventeen Agencies and Organizations United Under One Goal'. WARNING; THIS SITE IS HIGHLY LIKELY TO ENGAGE IN UNWARRANTED SURVEILLANCE. VIEW WITH CAUTION. The Central Intelligence Agency [U.S.] 13 'Twitter Funded by Investors Including T. Rowe Price (Update2)'. By Brian Womack and Joseph Galante. 25th September 2009. Bloomberg [U.S.] 14 'Google Gmail is a free email product in which users are encouraged to carry out communication inside a system in which routine scanning of all emails is undertaken and admitted. Google claim that this is to provide targeted advertising, security toward its own systems and targeted search results. It is highly likely this closed system is being used to gather up industrial quantities of User Supplied Data. Google will be under chronic domestic U.S. judicial pressure not to allow any information into the public domain regarding its proximity to the U.S.S.I.S. This will itself entail a national security threat to the United States. 15 'Facebook makes money, tops 300 million users'. Unattributed. Reuters [U.S.] 16. 'Twitter to Advertisers: You Really Need Us'. Unattributed. 8th August 2013. Bloomberg Business Week [U.S.] 17. 'Can Yahoo avoid 'screwing up' Tumblr and still make money?'. By Martha C. White NBC News contributor. 20th May 2013. CNN [U.S.] 18. 'Obama calls for changes to Patriot Act, surveillance procedures'. By Christi Parsons and Ken Dilanian. 9th August 2013. Los Angeles Times [U.S.] 19. 'Iraq attacks display al Qaeda "hallmarks," State Dept. says'. By Margaret Brennan. 11th August 2013. C.B.S. News [U.S.] 20. 'US security alert belies claim of al-Qaedas demise'. By Geoff Dyer in Washington and Abigail Fielding-Smith in Beirut. 9th August 2013. Financial Times [U.K.] 21. 'Sen. John McCain: Al-Qaida still on the rise. Unattributed. 11th August 2013. U.P.I. [U.S.] 22. 'Did al-Qaida conference call lead to closure of US embassies in Mideast?'. By JPOST.COM STAFF. 7th August 2013. WARNING: THIS PUBLICATION IS DUBIOUS AND SUSPECTED WIDELY OF EXCESSIVE PROXIMITY TO THE ARMY INTELLIGENCE SERVICES OF THE ISRAELI ARMED FORCES. VIEW WITH CAUTION. Jerusalem Post [Disputed Territory] 23. 'U.S. pullback in Lahore another sign of growing al Qaida violence in Pakistan.' By Tom Hussain | McClatchy Foreign Staff. 9th August 2013. McClatchy [U.S.] 24. 'In new recruitment video, the Somali militant group al-Shabab praises 'martyrs' from Minnesota'. By RODNEY MUHUMUZA, Associated Press. 12th August 2013. Star Tribune [U.S.] 25. 'Al-Qaida remains significant threat to west' UN report'. By Jason Burke. 7th August 2013. Guardian [U.K.] 26. 'State Department confirms al Qaeda in Iraq leader has relocated to Syria.' By Thomas Joscelyn. 12th August 2013. Wikipedia [U.K.] 27. 'The CIA: Al-Qaeda Dispatched 16 Tons of Explosives to Lebanon'. By: Hassan Illeik. 11th July 2013. al-Akhbar [Lebanon] 28. 'US president and Turkish prime minister backing terrorism in Syria'. Unattributed. 8th August 2013. Syrian Free Press [Syria]. 29. 'Federal Reserve bomber says he was 'serious stammerer' ahead of sentencing. By John Marzulli AND Stephen Rex Brown / NEW YORK DAILY NEWS. 7th August 2013. New York daily News [U.S.] 30. 'Amine El-Khalifi sentenced to 30 years in Capitol bomb plot.' By The Associated Press. 14th September 2012. New York Daily News [U.S.] 31. 'Moment terror suspect, 25, arrested over 'bomb plot' in Florida was caught on camera brawling with Christian protesters.' By Daily Mail Reporter. 10th January 2012. Daily Mail [U.K.] 32. 'Welcome to #Neuland: Merkel's remark about Internet goes viral'. Unattributed. 19th June 2013. Russia Today [Russian Federation] 33. 'Prism: security services operated within law, says David Cameron'. By Patrick Wintour and Nicholas Watt. 11th June 2013. The Guardian [U.K.] 34. 'France's 'hypocritical' spying claims 'hide real scandal'. By Sebastian SEIBT. 3rd July 2013. France24 [France] 35. 'NYPD's 'Domain Awareness' Surveillance System, Built By Microsoft, Unveiled By Bloomberg '. Unattributed. 9th August 2012. Huffington Post [U.S.] Note: It is almost certainly the case that public sector Domain Awareness System operated by the New York Police Department is the closest proximity to a secretive global surveillance system as it has been designed for the U.S. Government. The reason for this is that any coherent system actually in place in 2013, will certainly act to connect the various public sector security apparatus of the domestic United States with the various intelligence agencies of the U.S.S.I.S. Whatever the actual nature of the operable system in place in the U.S. global system, the system as it is actually operated will certainly be whatever system is in place and being used by domestic U.S. law enforcement. 36. 'Espionagem dos EUA se espalhou pela Amarica Latina.' By Glenn Greenwald, Roberto Kaz e Jose Casado. 9th July 2013. O Globo [Brazil] Note: For the English language audience an English commentary of this Brazilian report is given at the following web address: 37. 'First Data Corporation.'Wikipedia [U.S.] 38. 'Mujahideen.'Wikipedia [U.S.] 39. 'Facebook riot calls earn men four-year jail terms amid sentencing outcry'. By Owen Bowcott. 16th August 2011. Guardian [U.K.] 40. 'How FBI Entrapment Is Inventing 'Terrorists' - and Letting Bad Guys Off the Hook. By Rick Perlstein. 15th May 2012.Rolling Stone. [U.S.] 41. 'how to completely remove google from android phone' - Public question to a public forum. September 2012. Android Central [Commercial Public Forum]