As economic depression, war and other system perturbations occur; great powers will be attempting to seduce humanity to embrace abominable solutions. The Bible teaches that the battle against the deceit of the powers at play is ultimately a spiritual battle. The endgame of this wrestling match is the “United States of the World” and the mark of the beast economy. This global economic system will require everyone to identify themselves as a supporter of the global beast kingdom in order to buy and sell. Those refusing to submit to the will of the global beast kingdom will be killed. (Revelation 13:15-18)
Forcefully marking individuals
How close are we to the implementation of this fierce antichristian global economic system?
According to the website link, http://www.biometrics.dod.mil/About/mission.aspx, The Biometrics Identity Management Agency leads Department of Defense (DoD) activities to program, integrate, and synchronize biometric technologies and capabilities and to operate and maintain DoD’s authoritative biometric database to support the National Security Strategy. Since it’s used within the U.S. military, the system maintains a global presence.
It’s worth noting that a recent DoD report demonizes futurist bible believing Christians as security threats.
The DoD’s use of a biometric ID system in Iraq proves that a global system exists which is capable of marking individuals for the purpose of controlling access to employment, financial transactions, health care and education in the name of peace and security. Those refusing to be tagged are killed as terrorists for refusing to integrate.
The link http://www.biometrics.dod.mil/References/biometricusecases.aspx presents the following case studies which illustrate how the marking system is being used in the war on freedom.
An Army civilian is scheduled to visit a U.S. military installation. Notification for approval for the visit has been sent to the installation’s access control office roster. At the installation’s main gate, the base access control system scans the visitor’s official biometric-enabled identification token, collects a biometric sample, and verifies the visitor’s credentials and authorization based on a positive match with the appropriate access roster. The access control office grants installation access privileges based on the visitor’s identification data, DoD affiliation, and the current threat level. Upon completion of in-processing, the visitor is granted access to specific parking lots and buildings on the installation. The identity validation process is repeated in a layered security procedure using the individual’s specific biometric-enabled identification token processed by network security access control devices. The visitor’ identity and access authorization is confirmed at each access location. This system can be used for physical and network access control throughout the installation.Biometrics can help ensure that only authorized personnel have access to installations, buildings, and networks.
Access to services for non-U.S. personnel
When operating in a foreign country, the U.S. often contracts with local nationals to provide labor and services. As a condition of employment, the laborer must provide individual identity information and biometric samples for screening and background check purposes. Biometric samples are taken and matched against both host nation and U.S. authoritative sources. Both positive and negative matches result in the update and enrollment of individual biometric files, respectively. Additionally, once stored, these biometric files are shared with the host nation and U.S. non-DoD parties for subsequent analysis and fusion of applicable biometric and associated information (e.g., criminal records). Based on this exhaustive research, the U.S. military decides whether to offer employment and issue a biometric-enabled identity card to the job applicant. Biometric matching of all laborers is conducted on payday to confirm identity prior to payment. Biometrics can help prevent unauthorized personnel from gaining access to services resulting in fraudulent payments.
Common Access Cards
Nearly two generations ago Hitler’s’ Third Reich and International Business Machines (IBM) Thomas J. Watson strategically aligned enabling IBM subsidiary Dehomag to deploy Hollerith punch card systems across Europe. Punch card systems facilitated data gathering and analysis of local populations for the purpose of identifying people to be eliminated by the Third Reich. Unlike the coming mark of the beast economic system, IBM’s Hollerith punch cards and machine technology wasn’t globally interoperable. Punch card technology couldn’t provide immediate point of sale personal identification and funds transfer from buyer to seller. It simply allowed government to crunch and analyze census data and target undesirables with new efficiency. 
Today, however, another marking system exists which is capable of handling the immense task of marking the global population for efficient and secure economic processing. The scriptures warn humanity about a global system that would be designed and implemented for this purpose.
The final form of this mark of the beast system remains a frequent subject of discussion and debate among professing Christians. Amidst the vast amount of speculative teaching regarding the technological details of the mark of the beast there lies a risk of someone getting lost in the forest as they focus on its trees. Whether or not the mark will entail a microchip implant or an RFID tattoo is really a mute point. To avoid being deceived what really matters is that we understand that the main purpose behind the mark of the beast is identification. The mark will identify people as supportive members of the Global Economic Community, the global beast kingdom and its political head Antichrist. (Revelation 13:15-18)
The scripture teaches that the eternal fate of every person will be determined by their decision concerning this mark. The Bible teaches that the saints belonging to the kingdom of God; those who obey the commands of their Lord Jesus Christ, would rather be killed than submit to Antichrist’s Order by marking themselves. (Revelation 13:15-18; Revelation 20:4) Those taken captive by deceitful political rhetoric and fraudulent government activities will believe the lie and embrace the evil mark of the beast system as good. Around the globe, deluded masses will approve of evildoing and injustice. They will follow the global beast nation and worship its image. (2 Thessalonians 2:8-12; Revelation 13:11-18)
The U.S. military already uses a globally interoperable ID card that is technically capable of functioning as the mark of the beast. It’s known as the Common Access Card (CAC).
Take a peek at this card and its contents at the following links.
George W. Bush’s 2004 Homeland Security Presidential Directive 12/HSPD-12 mandated a common identification standard for federal employees and contractors. The CAC meets the requirements of this directive. It’s engineered for global interoperability and is currently used world-wide.
The following summary of the U.S. DoD Common Access Card was taken from the following link:
“In 1999 the US Department of Defense (DoD) had began work on a program to issue a common-access identification smart card to 4.5 million active duty, selected reserve, DoD civilian and eligible contractor personnel. The Common Access Card (CAC), is a smart card standard established by the Government Services Administration (GSA), a key purchasing arm of the US government, in conjunction with various military departments. The card is used to enable physical access to buildings and controlled spaces and gain access to the DoD’s computer network and systems.
The solution is based on GlobalPlatform technology to simplify the process of multiple government agencies deploying an interoperable smart card. The ultimate goal is to be able to use a CAC anywhere that the cards are accepted, regardless of which government agency issued it.
As of February 2008, approximately 15 million CAC cards had been issued at over 2,000 issuance stations worldwide.”
“The Department’s approach uses COTS technology following the best industry practices. The card platform and architecture mirror the approach of the card industry with early adopters including Fleet Bank’s “Fusion”, Visa’s credit card, First USA Bank’s “Smart Visa”, as well as American Express’ “Blue” card program. Sun Microsystems “Sun Badge” corporate ID card, issued to all Sun employees worldwide, is also based on the same platform approach. This approach is standards-based utilizing IETF (Internet Engineering Task Force), ISO International Organization for Standardization), ANSI (American National Standards Institute) and GlobalPlatform Specifications, which has allowed for multiple vendors to competitively supply smart cards, readers/encoders, software and other equipment for this program. Furthermore, the DoD is leveraging the economies of scale of these large organizations. As an example, Visa has one billion cardholder accounts worldwide enabling low-cost, common solutions to continue to improve the economies of this program. In addition, the CAC platform supports multiple applications. This allows for additional services to be dynamically loaded after the cards are issued to provide additional capabilities and services. The U.S. Navy and U.S. Marine Corps will use the cards as an ID card and to gain access to the newly emerging Navy-Marine Corps Intranet (NMCI). As requirements change via legislation or policy, the ability to evolve the CAC without reissuance has vast economic benefits.”
The DoD worked closely with ActivCard, Visa and Sun Microsystems to conform to the applications, security and robust design requirements of the GlobalPlatform Card Specification v2.0. (Implementations/Government, 2010)
DoD is a leader in the development of a sophisticated identity management infrastructure. The Common Access Card is at the very center of that infrastructure and is critical to the continued efficient and secure operation of the DoD’s many computer systems and the key to emerging physical access systems.” (Rob Brandewie, Deputy Director DMDC)
Another sign that the mark of the beast is approaching is seen in the May 2010 National Security Strategy (NSS) issued by President Obama.
This document states the general strategic approach of the United States in dealing with what we’re told is the nation’s greatest security concerns. The latest NSS can be accessed at the link below.
Policy papers like the NSS are a product of the National Security Council (NSC). The 2010 NSS emphasizes the global leadership role of the United States in advancing the values and interests of the United States and in shaping a sustainable global international order.
The paper leaves no doubt that the New World Order, the U.S. Dollar’s Novus Ordo Seclorum, exists and that the United States of America is amplifying its intent to lead the international order.
The trend toward transparency regarding the existence of an international order is easy to spot in the side by side comparison of the 49 page 2006 NSS with the 52 page 2010 NSS. The following table contrasts the content of the 2006 and 2010 NSS’s.
|References to the word, phrase or concept in the NSS||
Number of times used in 2006 NSS
Number of times used in 2010 NSS
|U.S. role in leading/shaping the international order||8||65|
|Sustainable international order||0||4|
|United Nations (U.N.)||13||20|
|Global financial/economic system||3||8|
A new international economic system complete with mandatory ID required to buy and sell appears to be in the final stages of its birth cycle. With policy trends like those revealed by the 2006 NSS and 2010 NSS and the perceived need for an interoperable global ID system, won’t you agree that it’s time to say no to PROGRESS of this nature? Isn’t it time to take no steps forward and many steps back from the mark of the beast system?
Global economic collapse, false flag terror attacks, catastrophes, wars, war rumors and executive orders could rapidly accelerate the completion of the womb to tomb birth process of this giant global systems project.
Meanwhile there will be those lurking betrayers who’ll act as Hitler’s willing executioners once did. These “nice”, “normal” people were Hitler’s world servers who patriotically supported the Nazi system and worshipped Der Fuehrer in the name of efficiency and prosperity. Some of these traitors are among the desk devils placed at various levels within the hierarchy working and investing in smart planet corporations like IBM and its global subsidiaries. These are the corporations working like the devil in order to make the global economy work better for the sake of the global elite. They are moldable pawns under the deceitful mind control of higher powers helping manifest the coming nightmare on behalf of the global beast kingdom. Having rationalized their consciences away, these tools feverishly feed off the forbidden fruit of the tree of knowledge of good and evil helping hell to throw its destructive net over earth’s final generation. Those caught in the net will honor the military power of the global beast kingdom. They will worship their new “Fuehrer” Antichrist; the leading front man promoting the interests and work of the global beast kingdom. (Daniel 11:38; Revelation 13:11-18)
If you’re compartmentalized work is supporting the development and use of technology and information systems related to electronically identifying and tracking human beings like cattle, won’t you agree it’s time to give it up and jump ship! Isn’t NOW the time for all of us to help stop the PROGRESS in these fields?
 See IBM AND THE HOLOCAUST BY EDWIN BLACK http://www.ibmandtheholocaust.com/
 1999 was prior to the issuance of George W. Bush’s 2004 Homeland Security Presidential Directive 12/HSPD-12!!!