Additional Titles








The Giant Sucking Sound in
Washington, D.C.

Is "The Giver" On Your Horizon?

Is The Chamber of Commerce an UN Front?












By Betty Freauf
January 1, 2011

In Part 1 I told readers about this marvelous 1949 book by John T. Flynn. Called The Road Ahead, America’s Creeping Revolution. As time permits during this busy Christmas season, I’ve been reading a few more pages. It is interesting to see the correlation between England during that time period and America right now. Flynn, however, is far more benevolent than I am going to be regarding the “planned economy” by the Fabian socialists. He felt the blunders by the British “misleaders” could be excused because the mind of man is a very limited instrument and utterly inadequate for comprehending the vast amount of data that all the innumerable conditions which would have to be grasped in order to make plans for a whole nation. I might add, perhaps a whole world.

He said it simply can’t be done in a society of “free men” where criticism cannot be silenced and where compliance cannot be enforced. However, while the Wikileaks is huge, the evil doers we are up against today have been there a long time as explained in Part 1 but now they are taking off the masks. They must control all parts of our lives as they did in England when Flynn wrote his book. Everything they do today is to “protect” us so President Obama has three votes on the FCC against two who oppose what they are calling “network neutrality.” Conservatives recognize it is nothing more than to muzzle conservative media pundits who have been exposing the Obama Marxist agenda.

I explained in Part I how gradually that “free man” baloney was being ever so quietly taken from Americans and how the media was complicit in the cover up. In fact, the symbol for Fabian Socialism is a turtle! Of course, the most recent strategy is President Obama and his socialist/Marxist administration wanting to control the Internet. People are waking up and in a dictatorship, this cannot be. Power is held by those who control the flow of information. A conference speaker at a 1969 Pediatric meeting prophesied about the computers and said anybody who wanted Computer access, or access to books that were not directly related to their field of study, would have to have a very good reason for so doing. Otherwise, access would be denied. Is that what is coming our way?

As Flynn was describing the limited capacity of men to plan the future, the invention of computers came to my mind and the space program. As the professionals were preparing to launch men into space and planning to bring them back safely, it was discovered they were off one day in their calculations. This was a grave mistake and had to be corrected. Then perhaps a Christian man on the team remembered about the one missing day referred to in the Bible. Joshua 10:12-14 “And the sun stood still, and the moon stayed, until the people had avenged themselves upon their enemies.” The computers were adjusted accordingly and the first space trip was successful. Flynn had no telescope into the future at that time but the Bible did so if the Bible was reliable in that one important point, can we assume it is accurate on our future as well?

Today little Johnny’s progress at school is tabulated by computers combined with a team of psychologists, programmers, expert teachers of everything from arithmetic to zoology, remedial specialists and guidance counselors. Neither Johnny nor anyone else knows what grade he’s in and he proceeds at his own pace. Behavioral Assessment Surveys by the system detects any deficiency so the student is recycled until he has been indoctrinated sufficiently to be successfully “dumbed down” so he may be turned loose in society as being “politically correct.”

The usefulness of computers to forge a bond between teachers and children is also seen in a statement by Dustin Heuston, chairman of the World Institute for Computer Assisted Learning (WICAT), said, “Wouldn’t it be wonderful when the child in the smallest country in the most distance area or in the most confused urban setting can have the equivalent of the finest school in the world on that terminal…”

Former contributor to NewsWithViews, Alan Stang, now deceased, said the criminal psychopath conspirators don’t care about “money.” They want power. To them it is just a computer entry, nothing more. That is the nature of scam.

A letter to our local paper in November 1996 from a teacher said the classroom standards were edging out the teachers and she feels as though she’s obsolete in today’s classroom and that “big brother” would prefer a computer in front of the class. She resigned her teaching job effective December 20. This was after Oregon’s 1991 “educational restructuring” legislation when GOP House Speaker, Larry Campbell, put on fast track at the behest of former House Speaker Democrat Vera Katz, the first woman House speaker. This legislation was reminiscent of Pavlov’s children. Ten plus years later this boondoggle was discovered to have no academic value and it was very costly. I have a cartoon showing two little boys looking at an old typewriter in 1999. One says to the other, “That typewriter is really old. It doesn’t even have a window.”

The consummate whistleblower, Charlotte Iserbyt has a five part series called The Death of Free Will. Iserbyt served as Senior Policy Advisor in the Office of Educational Research and Improvement (OERI), U.S. Department of Education, during the first Reagan Administration and a former school board director in Camden, Maine and was co-founder and research analyst of Guardians of Education for Maine (GEM) from 1978 to 2000. Her book “The Deliberate Dumbing Down of America” should be on the shelf of every parent.


Information on computers once considered safe and secure has now been compromised by a variety of sources. What started out as experimental “hackers” has grown into full-blown “Electronic Warfare.” Hacking became an addiction. After spending five years in jail when caught by the FBI for hacking, Kevin Mitnick now consults and tells people how to protect themselves and gets paid to hack and he made money writing a book but all of the advice didn’t stop the Australian, Julian Assange currently in the news from releasing thousands of pages of once classified documentation but he had a little help from alleged “Don’t Ask, Don’t Tell” homosexual with a security clearance in the Department of Defense whose name is Private Bradley Manning. The record shows Manning allegedly betrayed the United States because of anger over what he perceived to be the Army’s failure to accommodate his peculiar “sexual orientation,” which he advertised on Facebook. Manning’s Facebook brings me to the next point. Why are there millions of people with Facebooks giving away information about their personal lives that very well may be tracked and placed in computers for future reference? It’s beginning to look like narcissism gone wild! They all want to be in movies.

The I.R.S. computers are vulnerable. Computer glitches have caused war veteran widows to be denied payments and trillions of dollars can be cleaned out of the currency markets just with some “computer glitch.” Former Minnesota governor, Jessie Ventura in his documentary said Defense Secretary, Donald Rumsfeld said on the day before 9-11 that two trillion dollars had mysteriously disappeared from the Department of Defense and then Ventura shows a picture of a missile (no airplane) that just happened to end up in the area of the Pentagon where all those computer records were stored and the film from all the cameras around the Pentagon were confiscated. The only pictures shown to the public were a couple frames of the fire. The computer can always be blamed even though it is “garbage in, garbage out” by the computer programmer but Ventura says, “No Plane, No Way, Not Even Close” and as the video shows, not even a highly trained airline pilot was capable of the maneuvers claimed. Besides, there was no wreckage, no bodies, no luggage. Items claimed to have been taken to Dover Air Force base, bodies, plane parts, were never at the Pentagon as both video and testimony prove and government has threatened witnesses telling them to support the “aircraft scenario.” Google Jesse Ventura’s ConspiracyTheory. Jude in the Bible says man has become nothing in the world but a sort of robot or an IBM computer and Daniel 12:4 says many will be running to and fro and knowledge will have been increased.

While computers have been an asset in catching child pornographers, drug smugglers, Muslim terrorists but groups like the ACLU cry foul and invasion of privacy and police entrapment. And then we have the lap tops stolen from cars and personal records of millions have been accessed in computer espionage. In the 70’s public relations campaigns began to surface to sell products or a candidate for public office but then came the computer and the Internet with its vastly facilitated identification, data-capturing and cross-matching capabilities. Computers in countries with dictators are located in centers where use is carefully monitored. However, the Internet has become the home to hundreds of public terrorist chat rooms. The world-wide web and the hundreds of millions of computers interacting in it are the very electronic brain of the satanic beast mentioned in Rev. 13:15-17. We live in a strange time when computers have changed everything including the changing of pictures into numbers called digital technology and under Republican President G.W. Bush’s Food and Drug Administration (FDA) approved computer chips for humans and medical chips in the arms of patients can speed vital information about a patient’s medical history to doctors and hospitals and robots controlled by computers can do the surgery.

The Bible predicted this over 2,000 years ago. The June 14, 2006 Evening Sun in Harrisburg, PA told about the “starter-interrupt” device that won’t allow you to start your car if you miss a payment. And what about the possibility of computer fraud voting? The powers of darkness are seizing upon such technology, which will be able to read thoughts and thus eliminate the last remnant of privacy from our lives. The prophecies of the Scripture are converging to complete fulfillment so quickly and with such precision. Yes, the “birth pains” mentioned in scripture are getting closer and closer and most of the world is dying in its slumber. Perhaps this is why the Lord wrote down the Ten Commandments on stone tablets and not on a computer chip! He didn’t want Moses choosing just his favorite six.

So why are terrorists slipping through the cracks? The Department of Homeland Security in 2004 rolled out its Computer Assisted Passenger Prescreening System II program, which was to check data on all airline passengers against existing government and private databases to establish what threat level a traveler presents. This was to potentially involve checking credit records, gun ownership, magazine subscriptions, outstanding child-support obligations and other information about us floating in the “datasphere.” Once again what sounded like a good idea has been reduced to patting passengers down at airports and x-raying bodies and individual travel is now under attack.

Subscribe to the NewsWithViews Daily News Alerts!

Enter Your E-Mail Address:

It’s never been about “safety,” it’s always been about “control.” The August 13, 2002 Milwaukee Journal Sentinel carried a story about selected grocery stores around the country testing the “fingerprint pay system.” Participants register with the store by placing one finger on an electronic screen that records a digital image or template that is connected to their debit or credit card, loyalty card and picture I.D. The transactions take 20 seconds and it was reported that people loved it. Their body biometrically interfaced with the computer enabling them to buy food and the grocery to sell. Is this more Bible prophecy? Our every move is watched using these super snooper computers. Centralized government databases and new invasive technologies threaten our system of checks and balances, presenting an unprecedented potential for tyranny.

And how about cloning? It’s already been done. It opens the way to create a finished man by computers! Who needs creator God? Yes, John T. Flynn didn’t have a clue what could happen in the future when he wrote his book in 1949. For part one click below.

Click here for part -----> 1,

� 2011 Betty Freauf - All Rights Reserved

Share This Article

Click Here For Mass E-mailing

Sign Up For Free E-Mail Alerts
E-Mails are used strictly for NWVs alerts, not for sale

Betty is a former Oregon Republican party activist having served as state party secretary, county chairman, 5th congressional vice chairman and then elected chairman, and a precinct worker for many years but Betty gave up on the two-party system in 2004.

Betty is a researcher specializing in education, a freelance journalist and a regular contributor to
[email protected]









He said it simply can’t be done in a society of “free men” where criticism cannot be silenced and where compliance cannot be enforced. However, while the Wikileaks is huge, the evil doers we are up against today have been there a long time as explained in Part 1 but now they are taking off the masks.