Watch this on Rumble: https://rumble.com/v6tkff1-surveilled-the-silent-war-against-the-saints.html
Breaking News
In a world teetering on the edge of transformation, today’s headlines reveal not just events, but patterns—rituals, movements, and messages that point to something deeper than politics. These are not just stories; they are signs. Watch closely as the veil is pulled back, and we uncover not only what is happening, but why—and who benefits from the chaos.
1. Pope Leo XIV’s Emphasis on Ethical AI
Briefing: Pope Leo XIV, recently elected as the head of the Catholic Church, has prioritized the ethical considerations of artificial intelligence. Drawing parallels to Pope Leo XIII’s 1891 encyclical on labor rights, he warns of AI’s potential threats to human dignity, especially concerning employment and social justice. The Washington Post+1New York Post+1
Spiritual Implications: The Pope’s stance underscores the need for spiritual discernment in technological advancements, emphasizing that humanity must not lose its moral compass amid rapid innovation.
Elite Objectives: By positioning the Church as a moral authority on AI, there’s an opportunity to influence global tech policies, ensuring that ethical considerations remain central in AI development.The Washington Post
2. Trump Administration’s Immigration Policies Impacting 2026 FIFA World Cup
Briefing: As Houston prepares to host the 2026 FIFA World Cup, concerns arise over the Trump administration’s stringent immigration policies. Tightened visa requirements and reduced federal staffing may hinder international fans’ ability to attend, especially those from countries outside the U.S. Visa Waiver Program. Houston Chronicle
Spiritual Implications: The situation highlights the tension between national security and global unity, challenging the notion of sports as a unifying force across cultures.
Elite Objectives: These policies may serve to reinforce nationalistic sentiments and control over international interactions, potentially reshaping global perceptions of the U.S.
3. World Pride 2025 in Washington, D.C., Amidst Political Tensions
Briefing: World Pride 2025 is set to commence in Washington, D.C., amidst tensions due to the Trump administration’s policies limiting transgender rights and restricting federal funding for gender-affirming care. These actions have led to travel advisories and potential boycotts by international LGBTQ+ groups. AP News
Spiritual Implications: The event becomes a symbol of resilience and the ongoing struggle for equality, reflecting the broader spiritual battle for acceptance and human rights.
Elite Objectives: The administration’s stance may aim to consolidate conservative support, influencing cultural narratives and potentially affecting international relations.
4. Gaza Conflict and Ceasefire Agreement
Briefing: The Gaza conflict saw intense Israeli airstrikes resulting in significant casualties. A ceasefire agreement was eventually signed in Doha, Qatar, aiming to halt hostilities and facilitate hostage releases. Wikipedia
Spiritual Implications: The conflict underscores the deep-rooted divisions and the urgent need for reconciliation and peace, challenging global communities to seek compassion over retaliation.
Elite Objectives: The ceasefire may serve geopolitical interests, stabilizing the region temporarily while underlying issues remain unresolved, allowing for strategic repositioning.
5. UN Pandemic Prevention Treaty Adoption
Briefing: An international pandemic prevention treaty, three years in the making, is set to be adopted in Geneva. The accord aims to enhance global responses to future pandemics. Global Issues
Spiritual Implications: The treaty reflects a collective acknowledgment of shared vulnerability and the necessity for global solidarity in the face of existential threats.
Elite Objectives: Establishing such a treaty could centralize health governance, potentially increasing the influence of global institutions over national health policies.
6. 2025 G20 Johannesburg Summit
Briefing: The 2025 G20 Summit in Johannesburg focuses on inclusive economic growth, food security, and leveraging artificial intelligence for sustainable development. Wikipedia
Spiritual Implications: The summit’s themes resonate with the ethical imperative to address inequality and promote stewardship of resources for the common good.
Elite Objectives: By setting the agenda, participating nations can influence global economic policies, potentially aligning them with their strategic interests.
7. Expo 2025 in Osaka, Japan
Briefing: Expo 2025, held in Osaka, centers on “Designing Future Society for Our Lives,” with sub-themes focusing on saving, empowering, and connecting lives. The event anticipates approximately 28 million visitors. Wikipedia
Spiritual Implications: The expo presents an opportunity to reflect on humanity’s trajectory, emphasizing the integration of technology and human values in shaping the future.
Elite Objectives: Showcasing technological advancements can bolster national prestige and attract investments, reinforcing Japan’s position as a leader in innovation.
8. NATO Summit in The Hague
Briefing: The 2025 NATO Summit in The Hague will address defense funding, membership status, and plans to bolster NATO’s defense capabilities. Wikipedia
Spiritual Implications: The summit reflects ongoing concerns about global security and the moral responsibilities of nations to protect peace and uphold justice.
Elite Objectives: Discussions may lead to increased military spending and strategic alliances, reinforcing power structures and geopolitical influence.
9. Global Conflicts and Shifts in Power Dynamics
Briefing: Ongoing conflicts in Ukraine, Gaza, and the potential fall of the Syrian regime indicate a reshaping of global influence, particularly in the Gulf region. The Guardian+2CIDOB+2Global Issues+2
Spiritual Implications: These conflicts challenge the global community to confront the consequences of power struggles and the human cost of political ambitions.
Elite Objectives: Shifts in power dynamics may be leveraged by emerging powers to redefine international norms and assert their interests on the global stage.
10. Climate Crisis and Global Cooperation
Briefing: The climate crisis remains a critical issue, with global emissions needing significant reductions by 2025 to adhere to the Paris Agreement. The Guardian
Spiritual Implications: The urgency of climate action calls for a collective moral awakening to protect the planet for future generations, emphasizing stewardship and responsibility.
Elite Objectives: Climate initiatives may be used to drive economic reforms and technological innovations, potentially benefiting those positioned to capitalize on green economies.
What seems political is often prophetic. What appears chaotic is sometimes coordinated. As always, we urge you to seek wisdom, not just information. Pray for discernment. Ask the Father to reveal the truth behind the headlines. Because in these final days, the greatest battle isn’t just for territory or power—it’s for your soul. Stay vigilant, stay awake, and remember: the truth has already won.
Surveilled: The Silent War Against the Saints
Most people know about the NSA, FBI, and CIA, but beneath the surface are lesser-known or virtually unknown agencies and programs—some buried under innocuous names, others hidden within military and corporate structures. Beneath the surface of democratic law and public accountability lies a hidden judicial chamber—the Foreign Intelligence Surveillance Court—where decisions are made in secret, cases are heard without opposition, and the lives of countless citizens are quietly intercepted and catalogued. Empowered by legislation like Section 702 of the FISA Amendments Act, this system has enabled an unprecedented expansion of state power under the guise of national security. What was once framed as a shield against foreign threats has now become a sword pointed inward, cutting through constitutional protections and redefining privacy in the age of digital omnipresence. This is not just a legal loophole—it is the spiritual infrastructure of a surveillance beast rising in silence.
Here are several entities and arrangements involved in domestic surveillance that most Americans rarely hear about, but should.
1. NGIA (National Geospatial-Intelligence Agency):
Ostensibly focused on satellite imagery and mapping for military use, the NGIA plays a growing role in tracking human movement patterns across U.S. territory using geolocation data, heat maps, and behavioral modeling. It can monitor protest activities, crowd formations, and even vehicle routes.
The National Geospatial-Intelligence Agency (NGA), formerly known as the National Imagery and Mapping Agency (NIMA), is one of the most secretive and technologically advanced components of the U.S. intelligence community. Officially, the NGA is tasked with collecting, analyzing, and distributing geospatial intelligence (GEOINT) in support of national defense, disaster response, and security planning. Its origins trace back to Cold War-era reconnaissance efforts, but the modern agency, renamed in 2003, represents the full merger of satellite surveillance, digital cartography, and data analytics into a global system of tracking and control. Though it operates under the Department of Defense, the NGA serves a broader network that includes the CIA, NSA, DIA, and DHS, with deep integration into the Five Eyes intelligence alliance and private-sector contractors.
While the public face of the NGA suggests its operations are limited to foreign theaters or natural disaster response, in reality, its reach quietly extends into domestic territory. Through disaster pretext missions like Hurricane Katrina, COVID-19 response, and urban planning initiatives, NGA has mapped U.S. cities, built 3D digital replicas of neighborhoods, and monitored civilian movement through satellite and aerial reconnaissance. Their “Map of the World” and “GeoQ” platforms are capable of layering satellite imagery with real-time geolocation data from cell phones, vehicle trackers, and social media posts, creating dynamic behavioral models of entire populations. This goes far beyond simple satellite mapping; it becomes a living mirror of human activity, emotion, and potential resistance.
A major concern with NGA operations is its increasing reliance on AI. Through programs like “Sentient” and “GEOINT AI Tasking,” NGA satellites are no longer just passive collectors—they are active observers capable of initiating their own targeting protocols based on behavior detection and environmental changes. These tools can identify deviations in traffic patterns, energy usage, even emotional clustering at public gatherings, all without human oversight. Such systems are training themselves to recognize anomalies in human life that might signal political unrest or noncompliance with state narratives. These AI-enabled surveillance systems can flag individuals for further monitoring or inclusion in shadowy databases shared with law enforcement and intelligence partners.
Despite its supposed focus on foreign intelligence, NGA’s ties to domestic surveillance are extensive. It feeds data to DHS fusion centers, assists ICE and Border Patrol with geolocation intelligence, and has been involved in monitoring mass gatherings, including Black Lives Matter protests and January 6th participants. Under the guise of “public safety,” NGA can circumvent restrictions by working through joint task forces, foreign partners in the Five Eyes network, or private contractors like Palantir. This outsourcing allows intelligence gathering on American citizens without direct accountability or constitutional constraints.
Spiritually, the NGA represents more than a spy agency—it is a symbol of the counterfeit omniscience the elites seek. In God’s kingdom, His eyes roam the earth to strengthen those whose hearts are loyal to Him. In contrast, the NGA’s eye monitors without compassion, tracking not to redeem, but to control. It mirrors the Watchers of ancient apocryphal texts—fallen beings who sought forbidden knowledge and tried to remake man in their own image. The NGA’s ambition to map every street, read every pattern, and predict every movement is part of the Antichrist infrastructure—a surveillance beast that seeks to replace trust with tracking, prayer with profiling, and the Holy Spirit with artificial intelligence.
The elite use NGA’s reach to prepare for a world governed by digital governance, climate lockdowns, biometric identification, and behavioral conformity. Its maps will form the foundation of future smart cities, where every movement is logged, every transaction scored, and every citizen categorized by loyalty to the system. These are the eyes of Babylon, scanning for rebellion and marking the saints. What was once reserved for the throne of God—the right to search the heart and know all paths—has now become the devil’s counterfeit through satellites and sensors. And yet, it is not invincible. For though the NGA may map the earth, it cannot map the soul.
2. NCTC (National Counterterrorism Center):
Though not often discussed, the NCTC has a large domestic intelligence mandate post-9/11. It maintains dossiers and “pattern-of-life” profiles on Americans flagged in its datasets, often using fusion center inputs. It runs TIDE (Terrorist Identities Datamart Environment), which contains hundreds of thousands of names, many U.S. citizens wrongly listed.
The National Counterterrorism Center (NCTC) is one of the most pivotal yet publicly obscure agencies within the U.S. intelligence framework. Established formally in 2004 under the Intelligence Reform and Terrorism Prevention Act, the NCTC was a direct response to the intelligence failures surrounding the 9/11 attacks. Though it operates under the Office of the Director of National Intelligence (ODNI), the center draws from across the intelligence community—including the CIA, FBI, NSA, DIA, and Department of Homeland Security—making it one of the most deeply integrated and data-rich institutions in the federal system. Its mission is to analyze and integrate all intelligence pertaining to terrorism and counterterrorism operations, both foreign and domestic. While this may appear noble on the surface, the breadth and depth of its access raise deep constitutional, ethical, and spiritual questions.
At its core, the NCTC maintains what is known as the Terrorist Identities Datamart Environment (TIDE), a massive database containing detailed personal information on over a million individuals, many of whom are U.S. citizens or lawful residents. These entries are not limited to active threats; they include people with suspected associations, relatives, travel companions, or even those mentioned in social media posts flagged by keyword algorithms. What makes the NCTC especially concerning is that it can store and analyze this information even when there is no evidence of wrongdoing. Unlike traditional law enforcement which requires probable cause, the NCTC operates on predictive threat modeling, which can label someone a “potential extremist” based solely on behavior patterns, speech, or associations deemed suspicious.
Following a 2012 revision of its guidelines, the NCTC was given authority to access, store, and analyze vast troves of government-held data on U.S. citizens for up to five years—without a warrant or suspicion of a crime. This includes data from tax records, flight information, immigration records, military service, education history, and even health and banking information. These powers were expanded quietly and met with little resistance, despite internal DHS and DOJ officials raising red flags about civil liberties violations. In practice, this means the NCTC can create comprehensive psychological and behavioral profiles on Americans and feed them into broader fusion centers or law enforcement databases to flag potential “pre-criminal” threats.
One of the more disturbing aspects of the NCTC’s work is its partnership with social media surveillance companies and machine-learning algorithms designed to detect “radicalization indicators.” These indicators often include religious language, political dissent, skepticism of government narratives, and even support for constitutionally protected ideals such as gun rights or limited government. In this way, the NCTC blurs the line between legitimate counterterrorism efforts and ideological policing. Programs such as “Countering Violent Extremism” (CVE) have been implemented in schools, religious centers, and online forums under the guise of community safety, yet they often disproportionately target conservative Christians, Muslims, and minority activists, labeling them as risks based on worldview rather than action.
Spiritually, the NCTC represents a new type of priesthood—one that claims to discern the intentions of the heart through data. Like the Watchers described in the Book of Enoch who taught forbidden knowledge to mankind, the NCTC seeks to peer into the soul using analytics, AI, and predictive modeling, rather than discernment, mercy, or truth. Its growing reach into churches, schools, and homes reflects a false messianic authority—a system that attempts to save the world through control, not transformation. Its surveillance mirrors the spirit of antichrist, where the inner man is measured not by faith but by compliance to a digital moral code established by the state. It watches for heresy as Rome once did—only this time, the inquisitor is an algorithm, and the judgment is databased exile.
The elite see the NCTC as a behavioral firewall. It functions as a filter, weeding out dissent before it can grow into resistance. By assigning risk scores to individuals and communities, it pre-conditions law enforcement to treat certain groups as threats before any crime has occurred. This predictive infrastructure is critical to the coming global governance model. It doesn’t just react to crime—it attempts to prevent independent thought, spiritual awakening, and prophetic defiance. The goal is to silence those who would speak the truth before they ever do. That is why many Christians, whistleblowers, and seekers of truth find themselves watched, questioned, or digitally flagged—because the spirit within them opposes the system, and the system knows it.
3. DHS Fusion Centers:
Across the U.S., there are over 70 fusion centers run by the Department of Homeland Security in partnership with local law enforcement. These centers collect and analyze information on ordinary citizens, from license plate readers to social media monitoring, often bypassing Fourth Amendment protections.
The Department of Homeland Security (DHS) Fusion Centers are among the most overlooked yet critical nodes in the modern American surveillance apparatus. Created after the attacks of September 11, 2001, these centers were designed to facilitate real-time information sharing between federal agencies like DHS, FBI, and NSA, and local or state law enforcement agencies. The premise was to “connect the dots” between suspicious activities at the local level and broader terrorist threats. However, over the years, fusion centers have evolved into sprawling intelligence hubs that collect, process, and disseminate information not just about terrorism, but about virtually every aspect of civilian life—from religious gatherings and political protests to online speech and biometric data.
There are over 70 fusion centers spread across the United States, each strategically positioned in urban and high-population areas. Their power lies in their flexibility and their partnerships. Unlike federal agencies that may be restricted by laws like the Posse Comitatus Act or the Fourth Amendment, fusion centers operate in a legal gray zone, often combining local law enforcement with federal intelligence tools and databases. These centers receive data from license plate readers, facial recognition systems, traffic cameras, drones, financial transaction databases, and increasingly, artificial intelligence systems that monitor social media for “threat indicators.” This allows them to track individuals in real time and build extensive dossiers—without a warrant and often without probable cause.
One of the most controversial elements of the fusion centers is their collection and distribution of “Suspicious Activity Reports” (SARs). Citizens are encouraged to report anything they perceive as unusual, and those tips—no matter how vague or unfounded—can end up in federal databases. The SAR system has led to countless instances of racial profiling, religious discrimination, and political targeting. People have been reported for taking photographs, speaking foreign languages, or simply expressing critical views online. Once in the system, individuals may find themselves unable to board flights, obtain security clearances, or avoid persistent law enforcement scrutiny, all without any formal charges or legal recourse.
Fusion centers are also the operational front lines for federal programs such as Countering Violent Extremism (CVE), which often focus on ideologies rather than actions. This means that individuals can be flagged for harboring views considered “extreme” by government standards—views that might be conservative, libertarian, Christian, anti-globalist, or simply skeptical of vaccines or federal authority. Fusion centers have coordinated with local pastors, teachers, and community leaders under the banner of “public safety” to report on youth behavior, church sermons, or political speech that veers from accepted narratives. These tactics mimic the internal surveillance methods of authoritarian regimes, where loyalty to the state is measured by ideological conformity.
Spiritually, fusion centers represent a demonic inversion of the Church’s mission to shepherd the flock. Where pastors are meant to care for souls and discern spirits, fusion centers scrutinize communities not to protect, but to predict and preempt resistance. They are watchtowers erected not by the Spirit of God, but by a state that increasingly fears its own citizens. In biblical terms, these centers function like the watchers of Babylon—recording, measuring, and reporting all who do not bow to the golden image of centralized control. They form a digital priesthood whose gospel is safety through submission and whose sacraments are fear, suspicion, and surveillance.
The elite use fusion centers to entrench the surveillance state at the community level.
By fusing federal intelligence with local enforcement, they effectively bypass constitutional protections that once separated national security from daily life. The centers are instrumental in piloting social credit systems, targeting faith-based dissent, and establishing behavioral monitoring that conditions populations for compliance. In the larger prophetic timeline, fusion centers are part of the infrastructure of the Beast—a system designed not only to observe the external man, but to crush the inner conviction that defies it. They do not merely enforce law; they precondition thought, suppress prophecy, and make war against the remnant who will not bow.
4. INSCOM (U.S. Army Intelligence and Security Command):
INSCOM has domestic capabilities through cyber-intelligence and “human terrain mapping.” They conduct joint operations with NSA and Special Operations Command, gathering intelligence through both public and covert sources. They can work through shell organizations and partner with private contractors.
The United States Army Intelligence and Security Command, known as INSCOM, is one of the most powerful and secretive military intelligence organizations within the Department of Defense. Headquartered at Fort Belvoir, Virginia, and reporting directly to the U.S. Army’s Deputy Chief of Staff for Intelligence (G-2), INSCOM serves as the nerve center for the Army’s global intelligence, surveillance, and electronic warfare operations. Its mission extends across tactical battlefield support, cyber warfare, psychological operations, signals intelligence, and direct coordination with the National Security Agency (NSA), the Central Intelligence Agency (CIA), and the Defense Intelligence Agency (DIA). Though it operates under a military banner, its reach extends far beyond the battlefield and deep into civilian life.
INSCOM was created in 1977 as a consolidation of various military intelligence commands, but its roots trace back to the post-World War II reorganization of American intelligence. Over time, it has absorbed not only traditional intelligence gathering but also cyber operations, satellite coordination, and advanced information warfare. It oversees a network of subordinate commands, including the 704th Military Intelligence Brigade (cyber intelligence), the 902nd Military Intelligence Group (counterintelligence), and the 66th MI Brigade (European theater), among others. These groups specialize in everything from intercepting enemy communications to identifying and neutralizing insider threats—often interpreted broadly enough to include whistleblowers, journalists, and dissident voices within the military.
One of INSCOM’s most notorious capabilities is its control over tactical signals intelligence (SIGINT) on both foreign and domestic soil. In partnership with the NSA, INSCOM operates field-deployable listening units, airborne surveillance platforms, and underground fiber-optic taps capable of extracting communication data in real time. Through this partnership, INSCOM analysts can tap into the NSA’s massive XKEYSCORE system, providing them with access to emails, phone calls, and social media activity. While legally intended for use against foreign threats, the blurred legal boundaries in the post-9/11 intelligence environment have allowed INSCOM operations to cross into domestic territory, particularly when tracking “radicalized” soldiers, contractors, or veterans.
INSCOM is also heavily involved in what the military refers to as “Human Terrain Mapping.” This concept, developed during counterinsurgency campaigns in Iraq and Afghanistan, involves the collection of cultural, religious, political, and psychological data on local populations in order to shape and predict behavior. This data is then used to guide psychological operations, influence campaigns, and military governance strategies. However, similar models have been quietly implemented domestically through “Red Teaming” and scenario-based exercises in American cities, where military intelligence officers assess how urban populations might respond to civil unrest, economic collapse, or martial law declarations.
Furthermore, INSCOM plays a key role in supporting the Joint Special Operations Command (JSOC) and secretive units like the Intelligence Support Activity (ISA), also known as “The Activity.” These elite teams operate outside the standard chain of command and conduct black-ops surveillance, targeted assassinations, and digital disruption. INSCOM provides the data backbone for these missions, using advanced tracking systems, real-time geospatial intelligence, and biometric tagging to support operations that are rarely acknowledged, even within the military. Many of these missions blur the lines between defense and preemptive attack, foreign target and domestic dissenter, soldier and civilian.
Spiritually, INSCOM represents the military incarnation of the surveillance beast. It is not merely a tool of national defense, but a spiritual principality cloaked in uniform—a guardian of Babylon’s data empire. It watches not to protect but to preempt, operating in the shadows where accountability does not reach. Its obsession with predictive behavior, cultural modeling, and information dominance reveals a deeper war against free will itself. The tactics once used on insurgents abroad are now quietly turned inward, targeting the American population with the same suspicion and analysis once reserved for foreign combatants. In this light, INSCOM becomes a symbol of the end-times military structure that will ultimately support the Antichrist system—where war is not just fought with bullets, but with algorithms, psyops, and spiritual warfare masked as national security.
For the elite, INSCOM is indispensable. It is the sword and shield of the digital panopticon. While the NSA and CIA may collect and interpret intelligence, INSCOM is the enforcement engine that carries out the will of the shadow government—be it through psychological operations, targeted narratives, or operational command over rogue military elements. Its role in domestic preparations for civil unrest, political resistance, and dissident suppression places it at the heart of any future martial law scenario. Whether in the name of biosecurity, terrorism, or insurrection, INSCOM is prepared to act swiftly, decisively, and invisibly. It is the unseen commander in a war where the battlefield is the mind, and the enemy is often the very citizen it claims to protect.
5. IARPA (Intelligence Advanced Research Projects Activity):
While technically a research agency, IARPA develops predictive behavioral algorithms and sentiment analysis software used to detect “radicalization” in social media and online forums. These tools often flag domestic users and feed data into law enforcement and intelligence pipelines.
The Intelligence Advanced Research Projects Activity (IARPA) is one of the most strategically important yet publicly obscure agencies within the U.S. intelligence community. Often described as the “DARPA of spying,” IARPA was created in 2006 under the Office of the Director of National Intelligence (ODNI) to fund and oversee high-risk, high-reward research that could radically improve intelligence collection, analysis, and predictive capabilities. Unlike DARPA, which focuses on military and defense innovation, IARPA is concerned with information—how it is gathered, processed, manipulated, and anticipated. It is the brain of the future surveillance state, operating with the resources of the CIA, NSA, and other agencies without the same public scrutiny or transparency.
IARPA does not run operational programs itself; instead, it funds cutting-edge research in artificial intelligence, neuroscience, linguistics, behavior modeling, cryptography, and biometric recognition. It partners with elite universities, tech firms, and defense contractors to explore technologies years—if not decades—ahead of public adoption. Its goal is to make the U.S. intelligence community omniscient in real time, able to predict not only geopolitical threats but also human behavior at the individual and societal level. In its own words, IARPA seeks to “anticipate the future” by developing tools that can outthink, outguess, and outmaneuver any adversary—foreign or domestic.
Among its many programs, one of the most telling is “Foresight”, designed to develop software that can accurately predict political instability, social unrest, or economic collapse by analyzing massive quantities of open-source data. Another program, “OSI (Open Source Indicators),” used social media and public data to predict events such as disease outbreaks or riots before they happened. While these programs were sold as public safety initiatives, their underlying capability to monitor, categorize, and flag individual citizens based on online behavior raises serious concerns about thought policing and the erosion of privacy. These systems are now embedded into AI models that interpret sentiment, track ideology, and forecast human intentions.
IARPA has also been at the forefront of neuroscience-based intelligence, funding research into brainwave decoding, mental state inference, and even “brainprint” biometric identification. Projects like “BRAINSAFE” and “MICrONS”attempt to reverse-engineer human memory and decision-making, essentially allowing intelligence agencies to anticipate a person’s thoughts, emotions, or choices. While still in the developmental phase, these initiatives point to a future where human consciousness is not only monitored but mapped and influenced. The spiritual implications are profound: this is not just surveillance—it is a digital dominion over the mind and soul.
In the realm of biometrics and surveillance, IARPA has funded some of the most advanced facial and gait recognition systems known, including systems that identify individuals through partial face images, body heat signatures, and walking patterns. These technologies are used to track persons of interest across cities, borders, and even digital platforms. Once tied into databases and social media, these tools enable full-spectrum tracking—from physical movement to emotional expression to predictive behavior. IARPA’s vision is not merely to know who you are, but to know what you’ll do before you do it.
Spiritually, IARPA embodies a counterfeit omniscience—the kind Satan has always craved. It is man’s attempt to build a tower of Babel in the digital age, one that pierces not the sky but the human mind itself. By striving to predict and manipulate the future, IARPA treads on sacred ground that belongs to God alone. The prophets were given divine insight by the Spirit; IARPA seeks the same power through code, algorithms, and neural data. It is the technocratic priesthood of the Beast system, laying the groundwork for the rise of an Antichrist regime that does not simply rule over flesh but seeks to possess thought.
For the elite, IARPA is a weapon of foresight. It allows them to model dissent, forecast rebellion, and extinguish it before it manifests. It is a tool of pre-crime, a mirror of the surveillance grid described in Revelation where “no man might buy or sell” without being scanned and scored. IARPA’s work converges with DARPA, the NGA, and the NSA to form the unseen machinery of global control—where information becomes the ultimate weapon and man is reduced to a variable in a simulation. In a world where free will is data, the very image of God in man is at stake.
6. JSOC Intelligence Support Activity (ISA):
Also known as “The Activity” or “Grey Fox,” this secretive military unit gathers signals and human intelligence. While meant for foreign operations, its domestic overlap occurs through surveillance of “persons of interest” tied to special mission units, especially under martial law or counterinsurgency pretexts.
The Intelligence Support Activity (ISA), often referred to by its many code names such as “The Activity,” “Task Force Orange,” or “Mission Support Activity,” is one of the most clandestine and elite intelligence units within the United States military structure. It operates under the umbrella of the Joint Special Operations Command (JSOC), alongside Delta Force and SEAL Team 6, but unlike those units, ISA’s primary mission is not direct combat—it is intelligence collection, surveillance, targeting, and operational preparation for high-value missions. ISA provides real-time intelligence and target acquisition to the most sensitive and politically delicate operations conducted by the U.S. government. Its operations are rarely acknowledged, its personnel largely untraceable, and its missions shrouded in deep secrecy.
Formed in the early 1980s in the aftermath of the failed Iranian hostage rescue mission (Operation Eagle Claw), ISA was designed to fill the intelligence gaps that had plagued special operations efforts. From the beginning, its role was to be the eyes and ears of JSOC—capable of penetrating denied environments, conducting human intelligence (HUMINT) and signals intelligence (SIGINT), and preparing the battlefield before the first trigger was ever pulled. ISA operatives are trained in both espionage tradecraft and advanced military tactics. Many are recruited from within the NSA, CIA, or military intelligence units, and they undergo additional special operations training. Their operations have been essential in targeting figures such as Osama bin Laden, Abu Musab al-Zarqawi, and other high-level threats.
ISA operates globally but with a reach that often extends into domestic territory through legal loopholes and joint operations. While its official charter is foreign-focused, it can assist in counterterrorism missions on U.S. soil when attached to Homeland Security, the FBI, or under executive authorization. ISA’s tools include covert wiretaps, cellphone signal interception, electronic eavesdropping, digital surveillance, and biometric tracking. Their presence is rarely known, often embedded within or working alongside CIA paramilitary units or Delta Force teams. Their footprint is intentionally minimal, and their operations are sometimes executed under the flag of other units to maintain plausible deniability.
One of the most controversial aspects of ISA’s mission is its involvement in “preparation of the environment”—a broad term that includes infiltration into civilian populations, creation of false identities, manipulation of foreign (and sometimes domestic) information networks, and the use of psychological operations. ISA teams may set up front companies, penetrate online forums, or conduct surveillance under the cover of NGOs or commercial entities. They often operate without congressional oversight, and because their missions are classified as Special Access Programs (SAPs), even senior military and government officials may not be briefed on their details unless absolutely necessary.
Spiritually, ISA represents the hidden dagger of the Beast system. Where other military units function openly, ISA operates in shadows—its silence is its strength, and its secrecy a shield. It is not bound by the same legal and moral constraints as traditional warfighters. Its intelligence operations mirror the nature of deception: seeing without being seen, striking without acknowledgment. In biblical terms, this is the spirit of the serpent—cunning, cloaked, and calculated. The very idea of ISA aligns with a prophetic warning in Ephesians 6:12 that our battle is not only “against flesh and blood, but against rulers… against spiritual forces of evil in the heavenly realms.” ISA does not only fight flesh—it engages in psychological and spiritual war.
To the global elite, ISA is indispensable. It is their scalpel—used when brute force is too obvious or politically costly. ISA’s access to real-time surveillance, preemptive targeting, and behavioral analysis makes it a tool not only of war, but of control. It can neutralize voices before they speak, movements before they march, and threats before they rise. With advances in artificial intelligence, satellite geolocation, and biometric scanning, ISA is now integrating with systems like the NGA’s 3D urban mapping and IARPA’s predictive behavior models, creating a merged intelligence organism that acts faster than any government or court system can respond to. In essence, ISA is becoming the dark hand of a future empire—silent, preemptive, and spiritually blind.
7. Private Contractors (Palantir, Booz Allen, etc.):
Many surveillance tasks are outsourced to private firms, allowing intelligence collection that avoids FOIA and constitutional restrictions. These firms scrape massive amounts of data, including financial, travel, and health records. Palantir, for example, has been used by ICE and local police departments to monitor citizens without warrants.
Private intelligence and defense contractors like Palantir Technologies, Booz Allen Hamilton, Raytheon, Leidos, and SAIC are the hidden backbone of the modern surveillance state. While government agencies like the NSA, CIA, or DHS often occupy the public spotlight, these corporations operate behind the scenes, building and managing the very infrastructure that enables mass data collection, behavioral analysis, and predictive policing. They are the architects of the digital battlefield—profiteers in the war for information, access, and control. Because they exist in the private sector, they are largely immune to Freedom of Information Act (FOIA) requests, shielded from public accountability, and able to perform tasks that government agencies are legally restricted from doing.
Palantir Technologies, originally funded by In-Q-Tel (the CIA’s venture capital arm), is one of the most notorious of these firms. Founded by Peter Thiel, Palantir specializes in integrating vast amounts of data from disparate sources—such as financial transactions, social media, law enforcement databases, surveillance footage, and biometric scans—into a single, searchable platform. Used by police departments, ICE, the Department of Defense, and even the IRS, Palantir’s systems allow users to “connect the dots” between individuals, places, and activities. In practice, this means anyone who interacts with the system can be flagged, tracked, and categorized based on algorithms that assess behavior, language, and associations. Though often justified as tools to combat terrorism or crime, these systems have been weaponized against journalists, protesters, undocumented immigrants, and ordinary citizens unaware they are being profiled.
Booz Allen Hamilton is equally influential. Known for employing Edward Snowden before his NSA leaks, Booz Allen acts as a bridge between military intelligence and corporate strategy. With contracts across the Pentagon, CIA, and DHS, it develops advanced cybersecurity tools, decision-making models, and surveillance technologies. Booz Allen is deeply involved in building artificial intelligence for threat detection and battlefield planning, and it plays a major role in “open-source intelligence” collection—sifting through public data to identify patterns of dissent, activism, or ideological nonconformity. It is one of the firms responsible for building and maintaining the social credit infrastructure quietly forming in the United States through banking flags, predictive analytics, and behavioral scoring.
These contractors often employ former intelligence officers and military operatives, creating a revolving door where public servants become private enforcers of elite agendas. This flow of personnel ensures continuity of mission and loyalty to systems of control rather than to the Constitution or public interest. It also enables plausible deniability. When government agencies outsource surveillance or covert operations to private firms, they can claim legal distance from any civil liberties violations. This tactic has allowed private companies to build databases on U.S. citizens, monitor religious gatherings, manipulate social media algorithms, and even develop psyops strategies for domestic populations.
Spiritually, these contractors represent the mercenary priesthood of Babylon. They are not driven by law or justice but by profit and power. Their systems mimic the omnipresence of God, but without His mercy or moral clarity. They construct false eyes and artificial minds to peer into the souls of men, not to redeem them but to control them. They do not see people—they see data points, risk variables, nodes in a network. This reduction of humanity into code is a form of desecration, stripping away the imago Dei (image of God) and replacing it with the image of the machine. In a prophetic sense, these companies are building the infrastructure for the mark of the beast—systems that will soon determine who can buy, sell, speak, travel, or even be acknowledged as a person.
The global elite rely on these private contractors not only for innovation but for insulation. By contracting out the tools of control, the elite avoid scrutiny while gaining access to cutting-edge technologies that map, monitor, and manage populations. These firms are now deeply involved in everything from pandemic response to election security, from financial compliance to biometric identification. Their systems are merging with smart city grids, digital ID platforms, and central bank digital currencies, forming a unified control system beneath the surface of everyday life. The rise of these contractors signals a shift in power—from elected governments to corporate technocrats who operate above law and beneath awareness.
8. FISC (Foreign Intelligence Surveillance Court) + Section 702 Backdoor:
Though not an agency, FISC authorizes many NSA and FBI actions that sweep up American communications “incidentally.” Through programs like PRISM and XKEYSCORE, even private texts, emails, and cloud data are monitored—often without a warrant when routed through foreign servers.
The Foreign Intelligence Surveillance Court (FISC), often referred to simply as the “FISA Court,” is a secretive judicial body created in 1978 under the Foreign Intelligence Surveillance Act (FISA). Its original purpose was to provide legal oversight of sensitive national security investigations, specifically those involving surveillance of foreign powers or agents operating within the United States. However, after the 9/11 attacks, FISC’s role expanded dramatically—morphing into a rubber-stamp court for sweeping government surveillance programs that now regularly implicate U.S. citizens, often without their knowledge or the ability to challenge their inclusion.
Operating behind closed doors and outside of public scrutiny, the FISA Court is composed of eleven federal judges handpicked by the Chief Justice of the Supreme Court. It meets in secrecy, hears only the government’s side, and almost never denies surveillance requests. For example, from 1979 to 2020, the court approved over 99% of the surveillance applications submitted to it. These include requests for wiretaps, digital tracking, metadata collection, and physical searches. Because the court’s rulings are classified, legal precedents are established that the public and even Congress cannot easily examine or debate. In essence, FISC has created a parallel legal system—one that operates entirely in the shadows.
The most controversial component of FISC’s authority is tied to Section 702 of the FISA Amendments Act of 2008, which grants the NSA and FBI broad authority to collect foreign intelligence without a warrant. While this provision is technically aimed at non-U.S. persons located outside the United States, it has become the legal backbone of a massive “backdoor” through which millions of Americans’ communications are swept up. This happens because the internet and telecommunications infrastructure are globally interconnected, and U.S. citizens frequently interact with foreign persons, websites, and servers. Under Section 702, emails, phone calls, messages, and cloud-stored content can be incidentally—or deliberately—collected, stored, and searched.
Despite being sold as a foreign surveillance tool, Section 702 has been repeatedly abused to conduct warrantless searches on U.S. citizens. The FBI has been caught using this database thousands of times to investigate Americans involved in protests, political dissent, or even routine criminal matters unrelated to national security. These are known as “backdoor searches,” and they circumvent Fourth Amendment protections by using a foreign intelligence authority to bypass warrant requirements. When confronted with this abuse, intelligence agencies often cite “national security” to stonewall inquiries, while the FISA Court merely reprimands them without imposing meaningful limits or consequences.
The implications are profound. Through this mechanism, every phone call, email, file upload, or video conference that passes through a U.S. server—even tangentially—is subject to potential interception, storage, and retroactive examination. It doesn’t matter if the person is innocent, unaware, or even a public servant—once tagged by the algorithm, their data is in the system. And that system includes not only the NSA but also fusion centers, FBI field offices, and private contractors like Palantir and Booz Allen, who build and manage the infrastructure housing these surveillance streams.
Spiritually, the FISC and Section 702 embody a perverse imitation of God’s omniscience. Where Scripture tells us that God sees all and judges the heart, the FISA system watches all and judges by algorithms, association, and suspicion. It grants to men a godlike power to observe, record, and act upon information gathered in secret, without accountability or mercy. These hidden rulings resemble ancient sorcery courts, where judgments were made behind veils, and the accused were not permitted to speak. It is a judicial priesthood of the shadow state, anointed not by justice, but by fear and control.
The elite rely on this structure to preemptively neutralize dissent. By surveilling the population at scale, they can identify movements, messages, and messengers that threaten their narratives. Whistleblowers, pastors, activists, or even curious citizens may find themselves flagged, watched, and silenced without ever knowing why. Section 702 and FISC form the legal justification for the total surveillance grid described in prophetic visions—where buying, selling, traveling, and even speaking become permissions granted or denied by the state. It is not just a tool of espionage—it is the architecture of tyranny, cloaked in legality, baptized in fear, and sealed by secrecy.
What emerges from these hidden agencies, secret courts, and privatized eyes is not security, but a simulation of divinity. It is a system that sees everything yet understands nothing of the soul. In their hunger for control, the architects of this surveillance state have constructed a counterfeit omnipresence—an artificial all-seeing eye that mimics the gaze of God but lacks His justice, His mercy, and His love. They claim to protect us from danger, but in doing so, they redefine truth as suspicion and freedom as threat. This is the beast rising not with horns and fangs, but with code and satellites, with algorithms and silence. And yet, even now, the remnant watches. Even now, heaven records their deeds. For though they map our cities, read our texts, and peer into our patterns, they cannot touch the part of us sealed by the Spirit. The final judgment will not come from a secret court, but from the throne of the Lamb—and no surveillance system will see it coming.
Sources