from the slaves in the production unit. The slaves receive constant propaganda messages thru the controlled media to program them to believe that the only purpose of their existence is materialproductivity. They must expand. The economy must expand. They must create jobs. The gross national product must constantly increase. Industrial development must increase. Increasing the materialwealth of the nation is the purpose of human life, etc.

This compartment is further compartmentalized with a view towards control of the slaves. A key principle is "need to know". A slave should only need to know what is necessary to do his slave labor. Themain sub compartments of the central compartment are defined by the four basic security clearance levels which are 1. no clearance, 2. confidential, 3. secret and 4. top secret. There are need to know subcompartments within each of the four main compartments. All people with security clearances are slaves but, to paraphrase from Orwell's "Animal Farm", all slaves are equal but some slaves are moreequal than others. The ruling elite have free access to all knowledge without restriction. They live the way everyone would live if this were a "normal" planet.

Secrets of Corporations

US corporations have recently been granted secrecy rights. A corporation can't just "walk up and kill you" if it thinks you know too much like the government does but it can proclaim information to be a"trade secret" and use legal measures to keep anyone from learning the information. A good recent example would be the electronic voting machines. They are all capable of being easily programmed to rigan election. In fact, documentaries have been made which show the machines and show how they can be rigged. However, the machines and the software that operates them - which allows the votes to bealtered in favor of whoever is in control of the process - are "proprietary" or secret and are protected by US law. So, even though it has become common knowledge that the machines are easily fixed to rigan election and even though it has been shown that this has actually been done and continues to be done, nothing can legally be done to stop it. This is because, in order to go into court and prove themachines are rigged, you would have to admit that you reverse engineered the machines and/or software which would be illegal under the trade secrets laws. So, as usual, US law protects criminals andscrews honest people who now have totally lost their constitutional right vote for leaders of their choice.

Espionage and Surveillance Secrets

This is an area where you practically need to write an encyclopedia size document to adequately explain all the techniques and tricks. Sometime back, the United States allowed Russian contractors to workon a new embassy building in the Soviet Union. When they checked the building before moving in, they found that it had so many spy devices built into the construction that the building was unusable andit was suggested that the only safe course of action was to demolish the place and start over using security checked American workers.

The United States places a higher value on technology than it does on (slave class) human life. Apparently the reasoning is that technology is "stable and predictable" whereas people are "temporary andemotional". For example, the people who operate the spy planes for the national security agency must agree to blow up the plane - and themselves with it - rather than let the secret technology be capturedby "enemies".

The average person is most likely to encounter so called "trojan devices" which they buy and take into their homes not knowing their true abilities. The cell phone is the best example. It can be turned onremotely and used as a "bug" to transmit conversations of anyone close to it. It will also report any special information stored in it such as phone numbers or pictures. Other cute gadgets include papershredders with built in document scanners which scan whatever you are shredding first and send the information over the power lines to a concealed receiver. Of course, we all should know by now aboutthe government's secret agreement with the makers of color printers whereby the printers secretly print their serial number on all documents using weird colors that can only be seen using special filters sothat government spies can tell who printed the page. Let's not forget, also, the classic "hidden camera in the copy machine" which was popular when copy machines were rare and costly and were foundmainly in stores and malls. Whatever you copied was photographed and stored on a film cartridge in a special locked compartment. When the machine was serviced, the film was collected and sent to thegovernment.

The grand prize winner for "best trojan device" is the personal computer. Not only does it allow the government to "profile you", but it allows anyone else who is clever to learn about you and steal yourpersonal information. Technology for remotely knowing everything stored on your computer is so effective that business travelers to the Beijing Olympics were advised to buy a new computer with nothingstored on it to take to the games to prevent the Chinese government from learning anything sensitive. Besides governments, private groups make extensive files on you. Google stores every search you doforever and links it to you. The file they have on you can be used as evidence against you in court. In other countries, information about citizens reported to their government by search engine providers inthe United States may have resulted in some people being killed by more repressive governments.

On a global level, the government does its best to record and store all telephone calls which are placed anywhere on the planet. This task is made easier because it is cheaper for developing countries tobase their phone system on cell phones rather than to actually string up physical cables everywhere. So, spy satellites can easily intercept all the phone calls made in such a country.

Secrecy in Private Groups

In practice, the rules for private groups appear to be as follows: As long as you "keep your house in order", have some system in place to make sure what you do "stays within the group" and are able tomaintain a level of deniability so that no one on the outside can prove what you are doing, you can do pretty much anything you want.

A good example is the Catholic church. Obviously, any government with any kind of intelligence service has always known that the church was raping and abusing children. Pretty much anyone else who