Technology and Prophecy

"Explore the Word. Change the World"
 Home  | Contact  | Become a Christian  | Lessons  | 700+ New Messianic Prophecies  | Modern Science In The Bible
One Language 1790 1945 No Language or Geographical Barriers
Ark Babel Bulb Bomb Bomb Computer Computer Phone Phone Plane Travel Space Shuttle Money Finance Satellite Internet Spy Spy DNA Biotech 2001
Primitive Knowledge Increases
Prophecies Computers Databases Spying and Surveillance Biotechnology
Personality and Interrogation Modern Inquisition Laws Controlling the Media Surviving Persecution

Some prophecies described in Revelation require a certain level of sophistication and technology. The ability of Antichrist systems to effectively capture God's people or deny services can be easily achieved through current technology.
"Ask and you shall receive"
Father, may I understand the forces at work. May I see the developments in human history through your eyes. And may I be encouraged by the fact that you are still in control so that I may face the future with courage. Thank you.

The Final Frontier
In the days of Noah people used their technology to increase their wickedness. After the flood wiped out all scientific knowledge, they used the assets of common language and common community to set up a system to defy God. Today we have overcome language barriers and we have a common community of scientists and educators who have joined together to defy God in their theories of evolution and social reconstruction. The general public seem eager to accept any theories that do not condemn their behavior.

This section is dedicated to describing the use of the technology now and under a end-time scenario. As such, the precautions seem premature, the guidelines may seem extreme because you cannot see humans, governments and churches in such a vicious light. Therefore, I have included examples where the exact scenario has or is happening and show current laws that threaten to make the scenario a possibility.
I am using my education and expertise to describe the potential of these systems and to extrapolate about innovations in the future. I am surprised at how quickly some features are being deployed and I am reminded that the end will come rapidly and unexpectedly.

None of these systems are intrinsically evil, but evil men are now plotting to use them. They provide convenience, efficiency, safety and new answers to old problems. So avoid the prophetic paranoia, but embrace them with prophetic wisdom.
I believe the end time battles will be on such a scale of magnitude and horror that it will make Hitler's group look like Girl Scouts on a picnic. This is the final war where the evil forces will hold no barriers. So anything that is possible will be possible.
I must warn you that what I am about to present may be frightening - but God is in control. Remember this. So, instead of being frightened about the capabilities of the enemy, be happy that it shows that the coming of our precious Lord is closer than you believed.

Prophecies Related To Science And Technology
Technology Summary
Radio Spread the Gospel
  • Printing
  • Radio
  • Television
  • Video Recorders
  • Telephone
  • Computer
  • Internet
  • Satellites
  • Solar energy
Radio Tracking
  • Night Vision
  • Thermal image
  • Traffic Camera
  • Mobile phones
  • GPS receivers
  • Indoor GPS
  • Micro RFID
  • Data Networks
  • Satellite Photography
  • Pattern Recognition
  • Vehicle Identification
  • TIA (Total Information Awareness)
Radio Identification
  • Biometrics
  • RFID tags
  • Digital Angel
  • National Identification (Real-ID)
  • Social Security Numbers
  • Tiny GPS receivers
  • Face Recognition Cameras
  • Gait Recognition (how you walk)
Radio Economic Boycott
  • Bank records
  • Tax records
  • Social Security Numbers
  • Direct Deposit
  • Credit and Debit Cards
  • Credit Verification services
  • Know your Customer Law
  • Driver's License
Radio Surveillance
  • Traffic Control Systems
  • Vehicle Recognition
  • Remote Photography
  • Parabolic receivers
  • Body Scanning
  • Public Cameras
  • Government databases of habits
  • Internet traffic and e-mail
Radio Listening Devices
  • Carnivore
  • Calea
  • Echelon
  • Baby monitors
  • Oasis and Fluent
  • Telephone off hook
  • Electronic devices
Radio Interrogation
  • Psychological techniques
  • Personality evaluation
  • The Lie Machine
  • Body language analysis
  • Coercive techniques
Radio Laws
  • USA Patriot Act
  • Know your Customer Law
  • Financial Regulations
Prophecy indicates the extent of technology at the end of time.

  1. Creation. Call it superstition or ignorance, but before 1800 everyone believed in God. Obeying Him was a different challenge. The Bible predicted a time when unbelief was the norm. The final message urges the world to worship God as the Creator. This suggests that there will come a time when this is an issue for most people.
    Worship Him who made the heaven and the earth and the sea and the springs of waters. (Revelation 14: 7)
    In December 2008, God gave me the information to prove that Moses was given a pattern of the periodic table on Mount Sinai. The Periodic Table has the same structure and number of rows and columns for each of its four blocks as the structure and number of rows and columns (boards) in each section of the sanctuary. The information also explains particle physics and quantum electrodynamics. I may have even found the elusive "God particle" which explains mass.
  2. Knowledge Increases. Although this refers primarily to an increase in spiritual knowledge, at the same time scientific knowledge exploded. It was as if the physical world benefited from the spiritual.
    "... conceal these words and seal up the book until the time of the end; many will go back and forth and knowledge will increase". (Daniel 12:4)
    Scientific knowledge began around 1700.
  3. Communications. The people who were scattered by geography and language need to overcome those barriers at the end of time so that they can unite to fight God. A global communications system and fast travel network have eliminated these barriers.
  4. Fast Travel. Passenger transportation speed suddenly changed from about 6 mph (10 kph) over the last 6000 years to within 1700 mph (2700 kph) in 100 years (Daniel 12: 4). In 1819 a steamship took 30 days to cross the Atlantic from New York to London. Now an aeroplane takes three hours.
  5. Worldwide Economic Boycott. Those who do not accept the mark of the beast will be cut off from all trade. There must be technology that links the world instantaneously to transmit economic information.
    "And he provides that no one will be able to buy or sell, except the one who has the mark, either the name of the beast or the number of his name. (Revelation 13: 17) Businesses are punished because they become an integral part of the persecuting system.
  6. Mark Of The Beast. Since many Christian groups believe it to be only a literal mark, we will see how technologies can be used. But, while I believe it is more than a literal mark and may not necessarily include any such real marks, there is nothing that prevents the beast power from physically marking the people of God. Past persecuting powers have used marks to separate people. Jews were forced to wear outward signs in Nazi Germany and in the crusades. The Taliban forced people who were not of the Moslem faith to wear a sign on their forehead or on their sleeves.
    And he causes all, the small and the great, and the rich and the poor, and the free and the slaves to be given a mark on their right hand or on their forehead. (Revelation 13: 16)
  7. Worldwide Economic Globalism. There will be a time when the world's economic systems will be so enmeshed that a collapse in the major economic center will have worldwide repercussions. But this is a prophecy for the very end. Current economic downturns are not the sign. However, as the economy keeps bouncing back it does give a sense of false security, luring more and more people from the world into these global investments. In 1929 the stock market crash in the United States triggered a worldwide financial crisis and led to the Great Depression.
    And the merchants of the earth weep and mourn over her, because no one buys their cargoes any more. (Revelation 18: 11-20)
  8. Persecution Technologies. Systems for tracking and finding people.
    ... And there shall be a time of trouble ... (Daniel 12: 1)
    A combination of technologies and laws will be used to harass, track and locate people.
    » Vulnerabilities. In the end, the technology cannot be used against us. During the seven last plagues the wicked will have a mounting series of problems. Satellites and electrical grids are vulnerable to military weapons, terrorism, sunspot activity and meteor showers. Satellites and digital technology are vulnerable to rain and atmospheric disturbances. Electrical systems are vulnerable to electromagnetic interferance. Relay stations and repeaters are vulnerable to earthquakes. Computer systems are vulnerable to hackers, fires and power outages. All systems are vulnerable to power outages. By the time of the seven last plagues, our technology may be reduced to the stone age. Short wave and analog signals may be the only reliable technologies but we are quickly replacing analog, and short wave is in too short a supply to mount a global persecution. But before then, we are vulnerable. After that the wicked have to personally get their hands dirty with the business of torture and murder which they have previously supported through slogans and silence and imaginary worst case threats.
  9. Space Exploration. After the people built the tower of Babel, God imposed a limit because He foresaw greater rebellion when they settled in Babylon and reached outer space.
    One Language. Now the whole earth used the same language and the same words. It came about as they journeyed east, they found a plain in the land of Shinar and settled there.
    Space Tower. They said, "Come, let us build for ourselves a city, and a tower whose top will reach heaven, and let us make for ourselves a name, otherwise we will be scattered abroad over the face of the whole earth".
    One Global Community. The Lord came down to see the city and the tower which the sons of men had built.Then the Lord said, "Behold they are one people and they have the same language. And this is what they began to do, and now nothing which they purpose to do will be impossible for them." Come, let Us go down and there confuse their language, so that they do not understand one another's speech.
    (Genesis 11: 1-2,4-7)
    We have sent probes into outer space and landed on distant planets and plan on building a space elevator that will reach into outer space (Tsiolkovsky Tower). We already have a space station where astronauts live for several months. We have fulfilled the dreams of our ancestors at Babel. We are now Babylon the Great who will reach the skies (Jeremiah 51: 53), unsuccessfully trying to flee from the long arm of God.
  10. Military Technologies. God comes to destroy those who are destroying the earth (Revelation 11: 18-19). We have the capability to destroy the earth within one week with nuclear weapons. Our biological weapons could destroy life in less than one month and our chemicals are slowly poisoning the environment. However, we are most capable of slowly destroying the natural systems of our planet with our industries and technologies within the next generation. We are being destroyed by our search for and use of energy through fossil fuels and our genetically modified farming technologies and poor harvesting of the land and its resources.
  11. Biotechnologies. There will be famine and disease during the seven last plagues. These will be traced back to human activity so that God can mock our gods.
    Through a prophet, we suspect that the antedeluvians had superior technology. The destruction of the world by a flood followed immoral genetic experiments that seem to resemble the current cloning, gene splicing and recombinant DNA technologies that is crossing the genetic material of species that could never be combined naturally.
  12. Gospel To The Whole World. Given the current population, secularism, and the physical impossibility of reaching all people, several inventions make it possible for spoken or written words to be seen by billions.
    The gospel of the kingdom shall be preached in the world as a testimony to all nations and then the end will come. (Matthew 24: 14)

Key Technologies, Inventions And Applications
Several key technologies and discoveries have made these systems possible. Any changes in these areas will affect the future prophetic landscape.
Historical Records Key You Tracking Real Time Tracking Activities P
Government Traffic, Tax, Spy Espionage Social
Money Phone GPS RFID Tolls, Licenses
Employer WorkMoney Income, Taxes
Bank Financial institutions, credit agencyMoney Purchases, Accounts, StatusStatus
Retailer Mailing Lists, Loyalty Programs, ZipEMail Phone GPSMoney Spy On/Off-Line, E-Receipt LikesPurchase
Search Engine Google, Bing, Yahoo Computer
IP Address
Browsing History, Likes Web Page Visits
Internet (ISP) Cable, Phone Companies Likes Web Page Visits, Likes Activities
Gaming Gaming Software Companies Likes Sees and hears all private actions
Software Software Companies, Games,
Operating Systems, Programs
Agree Consent agreements, automatic updates, apps
Phone Verizon,AT&T, Skype, Cable,Google E-Mail
Email contents, contacts, address book, voice, voice mail, VOIP service
E-Mail Service Google, Yahoo
Social Media Facebook, Twitter, Youtube, Google+ Reality TV voting Likes "LIKES", "Pins", Friends, Relatives, Acquaintances, videos, photographs, Likes TV Voting
Spy Spyware. Money Credit. GPS GPS. Phone Phone. RFID RFID. Likes LIKES Agree Consent
Status Buying And Selling. All companies link to the financial institutions who can implement the order to boycott a person

The Spies: Who is collecting this information?

Much has been made about government snooping, but in the wake of 911 when we "didn't care" about a "few rights" and accepted torture without much ado, I am surprised at this reaction. Phone companies carry and store tons of data relevant to providing service and billing for a period of time necessary to do business. Phone companies are not in the business of recording and storing your private communications unless you pay them.

Does the government need it?
Suppose there are 20 companies who save their records 6 months to one year after a bill is paid but the government needs to keep at least 5 years of data to track useful trends. As a former database administrator, much as I hate to say this, the government is correct about the need to store this information for the following reasons.

Privacy Strategies
What you should be worrying about is corporate spying. Here are a few strategies to help to keep your information private. Since all your strategies can be linked to one computer or one internet provider box, every strategy can be defeated if they take the time or if you become the target of an investigation.

Computer Computers And Data Networks
Computer systems are the brains that drive all the other technological devices. With the advent of miniaturization, coupled with telecommunications a whole range of applications became possible.

Databases are files of related information residing on one or more computers. With a correctly organized database one can maintain all types of information that can be retrieved instantly. If a unique personal Identification number is attached to all these bits of information, then systems can start sharing information about you more readily.

Several important database systems from a combination of government and private sector systems are being used to collect data on citizens. In our times and the immediate future, these are some of the organizations responsible for collecting, organizing and implementing these systems:

Money Databases: Financial Institutions

Satellite Information Brokers
These companies capture personal information to sell to advertising agencies and financial institutions.

Satellite Databases: Internet
The internet is like a fuzzy database hub that is a giant data wharehouse, global marketplace and virtual assembly. It was started by the USA defence department in 1969 and became available for public use in 1998.

The vast amount of information stored and shared have become a treasure box of information for marketing and government interests. Your searches, sites visited, visitors, mailing lists and e-mail are stored. They give information about interests and connections and are used by others to gather personal profiles and to install spyware, malicious software.
If you believe in the future persecution, guard certain information carefully and beware of "free" services which collect this data.

Databases: Government Agencies

Other Private Databases
There are many databases and systems in the private sector that capture information about you that can be used in tracking your habits or movements:

The Beast: A Global Financial Information System.
Pertinent Identification
Information Agency ID Type
Employer Employer ID Money
Name, Address -
Direct Deposit -
Photograph ?
Financial Accounts Bank
Stock Broker
Credit Agency
Money ID
Credit ID
Identification Number Government
Tax Agency
Family List ID Spy
Searches Google
Links, Visits -
School, ClassmatesFacebook -
Job History ?
Likes, Interests ?
Friend List
Family List
Friend List Communications
Phone Company
e-mail List -
Internet Logon -
Text Messages -
Voice Mail -
Phone GPS
Phone NumberID Tracking
Phone Number Grocery Store
Loyalty Club
Name, Address - Money
Financial -
Photograph ?
Purchases Stores ?
Books ? Spy
Books Library?
Driver's Liscense Government ID Tracking
Photograph -
Vehicle GPS
Traffic Cameras GPS
Property records -
ID Government Identification number links information to all these agencies.
Facebook uses your email address
GPS GPS. Real time location systems
Type Of Persecution.
Money Financial. No buying or selling. No income
TrackingLocate. Identify. Tracking and trailing
Spy Spy Data. Locates you and others like you
Goldman Sachs owns a computer that is located in the same data center as the New York Stock Exchange computers. It is linked to all global stock exchanges and has access to all stock activity.
It is nicknamed "the beast" by the author from "Wall Street Insiders". This same article goes on to say that national sovereignty is being surrendered to the IMF and the World Bank who are being controlled by the EU and certain rich groups. In the seventies and eighties Evangelicals talked about a computer owned by the EU named "The Beast". At that time we did not have the data linkages necessary to conduct a financial persecution in near real time. Now we do.

These computers are not the fulfillment of the beast, but a global financial computer system like this will be used to enforce the laws of the beast of prophecy. The financial linking of these computers also guarantees that the global economy will crash in one day as Revelation 18 prophecies. We have already had several dress rehearsals.
Data brokers simply need to merge data from this computer, banks, credit verification services, voice and communications, social networks like facebook or systems with personal information about friends and tastes and Google searches. Governments simply need to tie employment and tax information in to have access to all pertinent data.

» Pertinent Identification Information Rarely Changes. Static information is revelant because the important information rarely changes. Your job, address, phone number, email address, financial accounts, credit card numbers, driver's liscence, vehicle registration, social security or government ID number rarely change. All this information can be used to stop your financial activity immediately. The only other useful information will be to know where you are right now. If they cannot wait until you go home or go to work then they can locate you in real time by your GPS phone or car.
» Pertinent Personal Information Rarely Changes. Your religious affiliation, friends, e-mail, photograph and preferences can be obtained through social networking.

Finally, all the systems exist which will make all financial prophecies come through speedily. As a former database administrator I can see how to tie information together quickly from all these systems, even if some information is static or is updated irregularly.
The fact is that the only reason one would want real time data is to catch people on the run and static information about mobile phones will provide that information. Even one year old information will give sufficient information to stalk you electronically because bank and payroll activity will give pertinent information quarterly or weekly.

The agencies required to conduct a persecution or terrorist hunt are the government, all financial institutions and the communications companies. All other businesses and organization will use this information to report to these agencies.

Spy Spying: Science of Identification and Surveillance Technologies
The Technology Noose is Tightening
Law Enforcement Purchases
Military (Government)

Laws Databases
(Economic Systems)

Credit Verification
Private Security Employment
Recent trends and innovations which allow bugging, telephone monitoring, visual surveillance during night or day over large distances and the emergence of new forms of local, national and international communications interception networks, and the creation of human recognition and tracking devices are already available and in operation.

Systems that infringe on your rights have already been secretly and covertly deployed. This section covers only the surveillance, identification and networking systems. There are other good articles which examine the militarization of the police technologies and advances in the technologies of political control.

Several scientific discoveries or convergence of applications can be used to allow the technology related prophecies to be fulfilled
These technologies may include active or passive devices. The active devices will work with your cooperation. If you are always required to show identification or if you are using a device that is constantly communicating your location to a satellite or ground-based antennae, then your movements can be monitored.
But there are passive devices and other strategies that can be used without your knowledge.

Other Technology

Most of the surveillance systems were created to target and track certain groups. If your group becomes a threat, then these systems can be targeted towards you.

Product Identification Systems
This intelligence is possible because of databases which work because of a unique identification system. Manufacturers have an identification system that identifies them as the maker, the type of product and possibly a unique ID for each individual product. These help to identify manufacturers and product sources such as manufacturing plant and date manufactured. These also help to identify the distributer who sold the product and the owner.

DNA Biotechnology: Genetic Engineering
In the seven last plagues, God ridicules our false gods. So I expect that science will fail us in certain areas or actually be the agent that causes these tragedies.

DNA Biotechnology: Medical Implants and Miniaturization
It is the science of verifying a person's identity by comparing physical characteristics of his or her body with a stored pattern in a law enforcement or private database.
It is an emerging technology destined to be the basis of information security technology, because it is well suited to replace passwords and smart card Personal Identification Numbers, because biometric data cannot be forgotten, lost, stolen or shared with others.
The science of identification is based on something unique that you have, or something that you know or what you are. Whereas cards or passwords or personal identification numbers can be forged or compromised, what you are is totally unique to you.

Identity Recognition and Biometrics. Biometric Identification methods consist of several main groups:

Miniaturization. A cellular phone has become a de-facto detached personal identifier. Miniaturization has made the transmitters cheaper and easier to use. They also have the ability to make the system a permanent part of the human. Older systems are just identifying a device that is in close proximity to the human to whom it was assigned. So you could not be assured that the device was not lost or stolen and does not identify a particular user.

Canaries in the Technology Minefield
Signs that allow you to evaluate the technology that will be introduced to the public are those that are being deployed to soldiers, parolees and prisoners.

Threatening Signs
So instead of chip implants, I see the following trends as more critical and ominous:

Avoiding The Data Web
Your greatest weapon will be too much information. This means that there is nothing unique about you among the crowd.

The restrictions that currently exist are enough to cripple a group of law-abiding, moral, persecuted people. However, individual terrorists can still get around the system with false identification and the network of people supporting them. I have problems advocating false identification because it is lying, but I have no problems breaking a law against evangelism where you cannot express your beliefs in public.

Recent Developments and Legislation
The following are legislation that I believe are significant laws that will affect end time activities. You might find laws buried into other laws which are totally unrelated. This is not a mistake. One wonders why law makers have to go to such subterfuge to hide these laws. Here is a list of United States laws (enacted before September 11, 2001) that can enable persecution.

Laws before September 11, 2001

Indefinite Detention. As of September 11, 2001 we have learned that people can be held indefinitely as 'material witnesses' without a charge and a trial. So much for your right to a speedy trial guaranteed by Amendment VI of the constitution, even Amendment V says you cannot be forced to testify against yourself. Indefinite detention seems to be designed to force people to 'talk'. It also assumes that they know something to 'talk' about. So much for the presumption of innocence.

U.S.A. Patriot Freedom Act (2001)
The government is now pretending to enact these kinds of laws for the first time, because it has overwhelming public support to do so. The fact that these provisions were made law without your knowledge during the last 6 years demonstrates that you cannot wait for official knowledge of these events before you realize that prophecy is being fulfilled. In every historical case that I have seen - such legal trappings were done in secret and it was too late by the time the victims realized it.

But when they hand you over, do not worry about how or what you are to say; for it will be given you in that hour what you are to say. For it is not you who speaks, but it is the Spirit of your Father who speaks in you. Matthew 10: 19-20
Greater love has no one than this, that one should lay down his life for his friends. John 15: 13
Time: 200 minutes
Print: 52 pages
Copyright     Updated : October 18, 2004. June 2013
Author: Laverna Patterson. Editor: Raj S. (2004). Patterson (March 2008)
Credits: The information was compiled from various sources.
Education and Work Experience. Over 25 years as computer programmer and database management. BS. Biochemistry. BS. Computer Information Systems. MS. Telecommunications Management. MS. Computer Systems Management.
How the Terminator Terminates. Martha L. Crouch. (href="http://general.forums.commentary.net/view/y2kchaos/s35p796.htm)
Why has Google been collecting Kids' Social Security Numbers under the Guise of an Art Contest? Bob Dowdon. 22 February 2011. URL: http://www.huffingtonpost.com/bob-bowdon/why-has-google-been-colle_b_825754.html
The NSA Is Building the Country�s Biggest Spy Center (Watch What You Say) James Bamford. URL: http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
Hitachi �Powder�/�Dust� μ-Chip Ultra-Small Micro RFID. URL: http://www.defensereview.com/hitachi-powderdust-%C2%B5-chip-ultra-small-micro-rfid-chip-with-embedded-antenna-for-military-and-clandestine-intelligencesurveillance-applications-u-s-military-law-enforcement-and-inte/
11 Body Parts Defense Researchers Will Use to Track You URL: http://www.wired.com/dangerroom/2013/01/biometrics/?pid=1775&viewall=true
List of Secure Email Providers that take Privacy Serious. Brandon Stosh. URL: http://freedomhacker.net/list-of-secure-email-providers-that-take-privacy-serious/#.UyBpLsso7mI
House Penetrating Radar. http://www.usatoday.com/story/news/2015/01/19/police-radar-see-through-walls/22007615/