Archive for the 'Espionage' Category

05
Jun
10

Obama expands “secret war” against cowardly Islamic terrorists

It has been almost nine years since America was traumatized by Islamic barbarians hell-bent on destroying our freedoms. Three days after September 11th, 2001, President George W. Bush climbed upon the rubble of the fallen WTC towers and made a vow to the American people to avenge the senseless deaths orchestrated by third-world cave people. Despite his valiant efforts to command-in-chief a two-front war, sign the USA PATRIOT ACT, and push for telecom immunity for terrorist eavesdropping,  Bush was weak, and did not take enough fight to the enemy.

Thank God for President Barack Obama.

[T]he Obama administration has significantly expanded a largely secret U.S. war against al-Qaeda and other radical groups, according to senior military and administration officials. Special Operations forces have grown both in number and budget, and are deployed in 75 countries, compared with about 60 at the beginning of last year. (Washington Post)

To the bleeding-hearts lefties, the weak-kneed Quaker pacifists, and the dope-smoking, anti-war, college crybabies, the phrase “secret war” has troubling implications. They decry the extra-judicial death-squad assassinations, the CIA drone attacks killing hundreds of non-combatants, rendition disappearances, and other necessary unpleasantries in the Global War of Terror (GWOT). But, they must be reminded of the fact that WE did not start this fight and sometimes you have to play dirty to win.

War is never perfect, or clean, or fair. The scraggly camel fuckers who outwitted the most technologically advanced air defense system and cunningly planned the 9-11 attack on the same day that numerous NORAD war game scenarios were scheduled punched below the belt. Osama and his boys awoke a sleeping giant that day. Unfortunately, America had to wait almost a decade before we had a ballsy and decisive leader who was willing to exact the brutal revenge that the people required.

Obama, one senior military official said, has allowed “things that the previous administration did not.”

The quote above speaks volumes. The clear implication is that by vetoing available extraterritorial and aggressive GWOT measures, Bush’s promise to “take the battle to the enemy” fell short. In contrast,  President Obama is a man who refuses to allow international law (which is thoroughly anti-American) or the pesky opinions of the international community to dictate the manner in which justice must be served. One condemnation coming from a United Nations report “questioned the administration’s authority under international law to conduct such raids, particularly when they kill innocent civilians.” Must the  feckless U.N. diplomats be reminded that it was the U.S. financial center and the Pentagon that was attacked on 9-11, and not their shitty Turtle Bay monolith full of stuffed shirts and foreign accents.

Now, America has a brave and dedicated leader who not only grasps the existential threat posed by the Moslem cave people, but is willing to cut them off at the knees. President Obama has not forgotten the scores of Koran-thumping sleeper cells in this country patiently awaiting their bomb mission orders.  He is also cognizant of the ever-present urban center dirty nuke threat that could make 9-11 look like a rookie outing. Soon, America will know true peace, once Islamic terrorism (and all other anti-American sentiment) is dealt the knockout punch.

I’ve got two daughters, nine and six years old. I am going to teach them first of all about values and morals. But if they make a mistake, I do not want them punished with a baby ~ President Barack H. Obama (America’s 44th President)

05
May
10

Cancer-Causing Monkey Viruses in Polio Vaccines and the U.S. Covert Bio-Weapons Project

How did the discovery of cancer-causing monkey viruses in polio vaccines trigger a covert bio-weapon research project involving Lee Harvey Oswald, Fidel Castro, and the brutal murder of Dr. Mary Sherman?

In 1960, medical studies determined that the Salk injectable polio vaccine (IPV) contained the  Simian Virus 40 (SV40). SV40 is a cancer-causing virus originating from minced rhesus monkey kidney cells that were used to manufacture the polio vaccine.

From the mid-50s until 1960, the SV40-tainted vaccine had been administered to about 98 million adults and children. After 1960, millions of more of the tainted vaccines were being manufactured and administered. Federal regulators did not recall the affected polio vaccine until 1963. Dr. Sabin, who developed the first working polio vaccine, had this to say about the cover-up:

“…Theres too much scaring the public unnecessarily. Oh your children were injected with a cancer virus and all that. That’s not very good!”

Medical researchers attribute the elevated rise in soft-tissue cancers in the last 50 years, many of which were almost unknown before the introduction of the polio vaccine, to the SV40 virus contamination.

Clandestine medical research specializing in engineering deadly cancers as a bio-weapon

Soon after the discovery of the cancer-causing virus, the U.S. Government commissioned covert projects with the purpose of weaponizing cancer.  Dr. Alton Ochsner, who pioneered early studies linking smoking to cancer, was instrumental in overseeing the cancer-causing virus project in New Orleans. His hospital was one of the 159 covert research centers established by the CIA.

Dr. Mary Sherman, an expert in cancer research, was selected to supervise the secret research related to the SV40 virus. The monkey viruses were radiated by a linear particular accelerator to alter the genetic components in the virus. The monkey viruses would then be injected into mice to study the developing tumors. In 1964, Dr. Sherman was found brutally murdered in her apartment (she had been stabbed multiple times and her right arm and rib cage had been burnt away). Her fascinating story is detailed in the book Dr. Mary’s Monkey.

Judyth Vary Baker and Lee Harvey Oswald’s involvement in the program

Judyth Vary Baker at work

In the spring of 1963, 19-year-old Judyth Vary Baker was invited to join Dr. Ochsner in New Orleans. Baker was an exceptionally gifted student from Florida dedicated to cancer research. Soon after arriving in New Orleans, she began a romantic relationship with Lee Harvey Oswald, who informed her of his role as an intelligence agent.

Oswald introduced Baker to David Ferrie, who according to Jim Garrison, was a key figure in the JFK assassination and “one of history’s most important individuals.” Ferrie revealed information to Baker about a secret government assassination plot directed against Fidel Castro. By injecting Castro with cancer, the U.S. Government would avoid the usual suspicion that a violent assassination would generate.

Baker and  Oswald were assigned cover jobs at the Reily Coffee Company (confirmed by Baker’s pay stubs and tax statements). Her real work was in Ferrie’s apartment, portions of which had been converted into a laboratory. Baker worked with 50-60 mice at a time, which had developed tumors due to cancer injections.  Baker would kill the mice, and then cut off and weigh the tumors. The excised tumor material would then be blended together. Baker would then make tissue cell cultures from the most vigorous and deadly cancers. She would then compile reports on the tests and take them to Dr. Mary Sherman to review. Oswald acted as a go between for the covert program participants, among other assigned clandestine activities.

Baker learned that prisoners from the Angola Penitentiary were to be used as guinea pigs for testing the weaponized cancer-causing virus. In a written letter, Baker stated ethical objections to the testing that made her an enemy of Dr. Ochsner. As a result, she left the project and  returned to Florida with her husband. Soon after, Oswald embarked upon  a failed attempt to secure a transit visa to Cuba via Mexico City to transport the weaponized cancer virus.

The below clip focuses on Judyth Vary Baker’s role in the New Orleans bio-weapon project and her relationship with Oswald. It is from a documentary titled The Men Who Killed Kennedy which aired on the History Channel. It has since been banned from rebroadcast.

More information can be found at the following links:

Judyth Vary Baker in New Orleans – Jim Fetzer

Interviews with Baker on Jim Fetzer’s Podcast (April 30 and May 1, 2010)

Edward Haslam – Dr. Mary’s Monkey – Jim Fetzer

Edward Haslam – Dr. Mary’s Monkey – Part II – Jim Fetzer

Simian Virus 40 (SV40): A Cancer Causing Monkey Virus from FDA-Approved Vaccines (Excerpt) -Michael E. Horwin, M.A., J.D.

Documentary evidence relating to Baker and Oswald in New Orleans

Me & Lee, Judyth Vary Baker’s recently released book

11
Nov
09

Robert Anton Wilson on “National Security” and the Empedoclean Knot Infinite Regress

prometheusFrom Robert Anton Wilson’sPrometheus Rising“:

Every authoritarian structure can be visualized as a pyramid with an eye on top. This is the typical flow-chart of any government, any corporation, any army, any bureaucracy, any mammalian pack. On each rung, participants bear a nescience  in relation to those above them. That is, they must be very, very careful that the natural sensory activities of being conscious organisms – the acts of seeing, hearing, smelling, drawing inferences from perceptions, etc. – are in accord with the reality-tunnel of those above them. This is absolutely vital; pack status (and “job security”) depends on it. It is much less important – a luxury that can be easily discarded – that these perceptions be in accord with objective fact.

For instance, in the FBI under J. Edgar Hoover, the agent had to develop a capacity to see godless communists everywhere. Any agent whose perceptions indicated that there were actually very few godless communists in this country at that time would experience cognitive dissonance – his or her reality-tunnel was at variance with the “official” reality-tunnel of the pyramid. To talk about such perceptions at all would be to invite suspicions of eccentricity, intellectual wiseactreing or of being oneself a godless communist.

As Paul Watzlawick notes, that which is objectively oppressed soon becomes subjectively repressed (unthinkable). Nobody likes to feel like a coward and a liar constantly. It is easier to cease to notice where the official tunnel-reality differs from existential fact. Thus SNAFU accelerates and rigiditus bureaucraticus sets in – the last state before all brain activity ceases and the pyramid is clinically dead as an intellectual entity.

We also propose that “national security” is another semantic spook, an Empedoclean knot; that the search for national security is the chief cause of national insecurity and a potent anti-intellegence mechanism.

As Leary writes:

Secrecy is the original sin. Fig lead in the Garden of Eden. The basic crime against love… The purpose of  life is to receive, synthesize, and transmit energy. Communication fusion is the goal of life. Any star can tell you that. Communication is love. Secrecy, withholding the signal, hoarding, hiding, covering up the light is motivated by shame and fear.

As so often happens, the right wing is half right for the wrong reasons. Thy say primly: if you have done nothing wrong, you have no fear of being bugged. Exactly. But the logic goes both ways. Then FBI files, CIA dossiers, White House conversations should open up to all. Let everything hang open. Let government be totally visible. The last, the very last people to hide their actions should be the police and the government.

What my eminent colleague states so poetically can be stated more functionally as follows:

Every secret police agency must be monitored by an elite corps or secret-police-of-the-second-order. This is because of (a) infilitration of the secret police, for purpose of subversion, will always be a prime goal of both internal subversives and hostile foreign power, and (b) secret police agencies acquire fantastic capacities to blackmail and intimidate others, in and out of government. Stalin executed three chiefs of the secret police in a row because of this danger. As Nixon so wistfully said in a Watergate transcript.

Well, Hoover performed. He would have fought. That was the point. He would have defied a few people. He would have scared them to death. He had a file on everybody.

securityThus, those who employ secret police agencies must monitor them, to be sure they are not acquiring too much power.

Here a sinister infinite regress enters the game. Any elite second order police must be, also, subject to infiltration, or to acquiring “too much power” in the opinion of its masters. And so it, too, must be monitired, by a secret-police-of-the-third-order.

In brief, once a government has n orders of secret police spying on each other, all are potentially suspect, and to be safe, a secret police of order n plus 1 must be created. And so on, forever.

In practice of course, this cannot regress to mathematical infinity, but only to the point where every citizen is spying on every other citizen or until finding runs out.

National Security, in practice, must always fall short of the logically Empedoclean infinite regress it requires for perfect “security.” In the gap between the ideal of “One Nation under surveillance with wire taps and urine tests for all.” and the strictly limited real situation of finite resources and finite funding, there is ample encouragement for paranoias of all sorts to flourish, both among the citizens and among the police.

Thus, the USSR after 62 years of Marxist secret police games reached the point where the alpha males were terrified of painters and poets.

secret policeIn spying-and-hiding transactions, worry leads to more worry and suspicion leads to more suspicion. The very act of participating, however unwillingly, in the secret police game – even as victim, or citizen being monitored – will eventually produce all the classic symptoms of clinical paranoia.

The agent knows who he is spying on, but he never knows who is spying on him. Could it be his wife, his mistress, his secretary, the newsboy, the Good Humor man?

If there is a secret police at all, in any nation, every branch and department of government, and institutions which are not even admitted parts of government, becomes suspect in the eyes of the cautious and intelligent people as a possible front for, or tunnel to, the secret police. That is, the more shrewd will recognize that something bearing the label of HEW or even International Silicon and Pencil might actually be the CIA or NSA in disguise.

In such a deception network, conspiracy theories proliferate. Rumor is necessary, it has to be found, when people cannot find “official” news sources that can be trusted to tell that them what is really going on. The present author, having worked in the civil rights movement, the anti-war movement, the legalized-pot movement and other dissident causes, has repeatedly been approached by friend A with dire warnings that friend B is almost certainly a secret police agent, only to be told later and independently by friend C that friend A is a secret police agent. It requires delicate neurolological know-how to keep one’s sense of humor in the secret police matrix.

The more omnipresent the secret police, the more likely it is the intelligent men and women will regard the government with fear and loathing.

The government, on discovering that growing numbers of citizens regard it with fear and loathing, will increase the size and powers of the secret police, to protect itself. The infinite regress again appears.

The shock of discovering that most of the power in the world is held by ignorant and greedy people can really bum you out at first; but after you’ve lived with it a few decades, it becomes, like cancer and other plagues, just another problem that we will solve eventually if we keep working at it.”~ Robert Anton Wilson

03
Sep
08

Go Back to Sleep America – the Government is in Charge

For the U.S. government, it is crucial that Americans never forget that our fundamentalist Muslim enemies are continually plotting our violent extinction. While we fearfully monitor the DHS color-coded threat level index, the enemy is bunkered down in caves with antique Soviet AK-47s, rocket-propelled grenade launchers made in the 80’s, and a rudimentary knowledge of how the Internets work.

Supposedly, on 9/11, radical jihadists penetrated America’s air defense system, defied previously accepted notions of aircraft physics and architectural engineering principles, and transformed the FBI and the CIA into an band of clue-dropping Keystone cops. Although 9-11 Commission Report makes for great fictional reading, as long as the “official” narrative is embraced by a majority of the public, the government can justify its murderous and genocidal foreign land-grab policies unabated.

For the most part, Americans have short attention spans and a limited grasp of the intricacies of international geopolitics. Instead of investing the time it takes to research the long term consequences of U.S. instigated regime change (i.e., Iran 1953, Guatemala 1954, Chile 1973, Iraq 2003), or understanding the impact of black-op destablization operations (including the immeasurable unintended blowback effects), it is easier to just have a bad guy (or people) to hate. The proles need an evil benchmark for comparison in order to define their patriotic decency and morality. For governments, the employment of an existential bogey-man menace (the CIA funded and trained Mujahideen) is extremely effective in building cohesion and support for policies that ultimately jeopardize the national and economic security of the country and violate domestic and international laws.

With the end of the Cold War, a new formula was necessary to sow panic and fear as a means to boost defense spending and to justify future foreign entanglements. The “clash of civilizations” narrative was employed as a divide and conquer strategy using religion and nationalism to spark post 9-11 enmity with the evil jihadist as public enemy #1. The Hegelaian dialectic is invoked to pit the noble and just “Us” versus the evil and diabolical “Them”. The result the perennial war of terror on unsuspecting foreigners and forfeited individual rights and liberties at home. Instead of the red under every bed, we get the neighborhood al Qaeda cell terrorist who is awaiting secret orders from Islamabad to strike the local shopping plaza.

Operation Mockingbird, a CIA program that was used for decades to illegally influence domestic media, is alive and well in 21st century America. Overt and subliminal social conditioning propaganda is beamed into millions of homes and is absorbed into the brains of the great unwashed. The corporate media and intelligence agencies have long worked hand-in-hand to massage and censor information having the potential to undermine Americans blind allegiance to their political masters (and their nefarious agendas). By exerting gate-keeper control over the information that Americans may access, those that oppose the policies and actions of our handlers are kept to a fairly harmless minimum.

The conformity-inducing educational and pharmacological super structure acts as a deterrent to individualism and to those predisposed to authority questioning. A herd mentality is fostered in the government indoctrination centers (schools) which undermines the student’s critical thinking skills. If the environmental forces are not sufficient to suppress the emerging free-thinker, there is a battery of powerful psychotropic drugs to further nullify the victim. In addition to years of fluoride poisoning, daily doses of psycho-stimulants, anti-depressants, mood stabilizers, and other dangerous and harmful chemicals are employed to interdict those that stray too far from the mind control plantation. After 12 years of inadequate instruction by self-interested bureaucrats who promote rigid conformity and blind obedience to the state, the skulls of mush are then turned over to their corporate overlords or a secondary education indoctrination center.

If the media propaganda, miseducation, and chemical lobotomy mix isn’t enough, more severe methods are employed to suppress information sharing, and to punish those engaged in constitutionally protected exercises of free speech. Whether through COINTELRO style group infiltrations, or through direct violent suppression, the message is clear – shut up. The brutal tactics employed by law enforcement officers at the Republican National Convention underscore our handler’s fear of an enlightened citizenry.

The arrest of photographers, journalists, and individuals peacefully assembled documenting the 2008 Republican convention is a sign of a oppressive government that does not tolerate free speech, the 4th Amendment, or individual rights. Thankfully, many brave citizens and journalists (including I-Witness contributors and Democracy Now host Amy Goodman) have documented the government’s illegal activities.

In a deceptively brilliant Orwellian strategy, those that question the government are identified as unpatriotic America loathers, anarchists, or Marxist agitators. The obedient masses operate in the expected knee-jerk fashion. Unable to contain their disgust, they spit and curse at the sounds and political propaganda images beamed into their brains via Fox News and CNN. Why do the protesters hate America so much? Why can’t they just settle down, get a job, and appreciate living in the greatest country that God gave to the Adamic race? Why can’t everyone think, feel, and act just like me?

I’ll be long gone before some smart person ever figures out what happened inside this Oval Office. –George W. Bush, Washington, D.C., May 12, 2008

06
Apr
08

Government Thought Policing: The NSA and Remote Neural Monitoring (RNM)

Your Brain On Government Privacy Invasion

[Addendum dated 9-19-2010: The blog post comment below perfectly encapsulates the content of this post with regards to the claims in Mr. Akwei’s lawsuit against the NSA.]

Several years ago when John St. Clair Akwei’s lawsuit against the NSA was first published on the Internet virtually no one took this information seriously. However, since the attacks on 9-11-2001, the U.S. Federal Government’s denial at having any part in these attacks (as well as their refusal to answer any pertinent questions in regard to 9-11), as well as the Intelligence Community’s precedent setting attacks on our civil liberties, John Akwei’s lawsuit against the National Security Agency is being now being read by millions of Americans who are openly discussing this covert and unconstitutional technology over the Internet. In doing so, they accept that the NSA’s ability to remotely track a person by way of their body’s own unique EMF frequency is occuring, as is the use of computer to brain interface of millions of American citizens, who are being illegally tracked by NSA satellites, while their thoughts are being electronically intercepted and decoded by this domestic spy agency.

The following information was evidence provided in a civil suit against the federal government in the case Akwei v. NSA (92-0449). John St. Clair Akwei is a former National Security Agency employee and whistle-blower who exposed the use of neural monitoring to spy on individuals. The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies.

(Source)

How The National Security Agency (NSA) Illegally And Unconstitutionally Harasses Law-Abiding Americans Everyday. How, you ask? Quite simply, actually. It’s done by EMF or ELF Radio Waves, and a technology known as “Remote Neural Monitoring”. Haven’t you ever wondered about that ringing in your left ear? Well, here are the reason(s). And just why should the NSA do this, you ask? To silence any who who dare to speak out against them or any other agency, or the Government or simply to think for themselves, and “outside the box”, if you will. Think not? Then, read on……….

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960’s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs. With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare. Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control. Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.” Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain. NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. An example of EMF Brain Stimulation:

Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation
Motor Control Cortex 10 HZ Motor Impulse Co-ordination
Auditory Cortex 15 HZ Sound which bypasses the ears
Visual Cortex 25 HZ Images in the brain, bypassing the eyes
Somatosensory Cortex 09 HZ Phantom Touch Sense
Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.
b) [Information missing from original]
c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.
b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.
c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief Overview of Proprietary U.S. Intelligence/Anti-Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.
All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980’s.

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times: where there are no secrets from the government” ~ William O. Douglas (U.S. Supreme Court Justice)


03
Apr
08

The Incremental Loss of Liberty

all-seeing-eye.jpg

Here is yet another news article that details how the government is doing grave violence to the U.S. Constitution and individual liberty. By incrementally eroding your rights (i.e. the fundamental right to privacy), the government is breathing life into George W. Bush’s famous words“Stop throwing the Constitution in my face, it’s just a goddamned piece of paper!” (source)

Intelligence centers run by states across the country have access to personal information about millions of Americans, including unlisted cellphone numbers, insurance claims, driver’s license photographs and credit reports, according to a document obtained by The Washington Post. One center also has access to top-secret data systems at the CIA, the document shows, though it’s not clear what information those systems contain.

Through MSM articles detailing the daily assault on your individual rights, the feds seek to reduce your expectation of privacy. Their agenda is deliberate, and rooted in Supreme Court jurisprudence. In Katz vs. United States, so long as an individual can justifiably expect that his conversation would remain private, his/her conversation is protected from “unreasonable search and seizure” by the Fourth Amendment.

As articulated in Katz, The Fourth Amendment has a subjective component. The individual must personally expect that his communications would remain private. By slow-dripping news stories detailing the government’s Fourth Amendment violations, you become accustomed to their snooping into your private affairs. By beating down your expectations of privacy, the government’s goal is to deprive you of any legal claim against their Big Brother intrusions.

The full frontal attack on the individual expectation of privacy has an aggregate effect in the long run. The continual bombardment on your individual rights, coupled with the media’s dutiful reporting on these violations, will numb you to your loss of liberty. It is your obligation to keep them in check.

Dozens of the organizations known as fusion centers were created after the Sept. 11, 2001, terrorist attacks to identify potential threats and improve the way information is shared.Though officials have publicly discussed the fusion centers’ importance to national security, they have generally declined to elaborate on the centers’ activities. But a document that lists resources used by the fusion centers shows how a dozen of the organizations in the northeastern United States rely far more on access to commercial and government databases than had previously been disclosed.

Since 9-11, the federal government has consistently relied on third-party contractors to do their dirty work (i.e., Haliburton, Blackwater, and Applied Research Associates, Inc.). Given that they are not formal government entities, it is difficult to hold the government accountable for their violations. One such company, Entersect, calls itself:

[t]he silent partner to municipal, county, state, and federal justice agencies who access our databases every day to locate subjects, develop background information, secure information from a cellular or unlisted number, and much more.

The state has an insatiable hunger for information about the serfs in its feudal pen. 9-11 was the predicate event that they desperately needed to justify surveillance of your communications and movements. When are we finally going to feel safe?

“There is never ever enough information when it comes to terrorism” said Maj. Steven G. O’Donnell, deputy superintendent of the Rhode Island State Police. “That’s what post-9/11 is about.”

Should we be concerned about the wide-spread abuse of civil liberties and privacy in the post-9/11 era? Let us see what the experts think.

“Fusion centers have grown, really, off the radar screen of public accountability,” said Jim Dempsey, vice president for public policy at the Center for Democracy and Technology, a nonpartisan watchdog group in the District. “Congress and the state legislatures need to get a handle over what is going on at all these fusion centers.”

From 2004 to 2007, state and local governments received $254 million from the Department of Homeland Security in support of the centers, which are also supported by employees of the FBI and other federal law enforcement agencies. In some cases, they work with the U.S. Northern Command, the Pentagon operation involved in homeland security.

Well at least somebody is making money off our fears. That will help to grow the economy and vault us out of the impending depression, right? Should we not question our government and their motives? Whenever men organize, collude, and conspire in positions of power, they surely must have the little people’s best interests at heart, I promise you.

Hilarious quote of the day:

I don’t want to suggest we are going to sit on the internet and watch what everyone does ~ Michael Chertoff (Secretary of Homeland Security)

31
Mar
08

America’s Spook-in-Chief Warns of the Everyman “Terrorist”

Justin Raimondo from Antiwar.com is one of this country’s most gifted journalists. As such, he is relegated to a low position on the media’s political analysis totem pole. Truth is dangerous when it is absorbed by the masses. Those who disseminate it are a grave threat to our handlers. This is an excerpt from his latest article.

It was shocking, hearing CIA director Michael Hayden tell Tim Russert on Sunday morning that we’re wide open to another 9/11-style terrorist attack. Al-Qaeda, he said, is turning to operatives who “look Western” and “wouldn’t attract your attention if they were going through the customs line at Dulles with you.” These new recruits, he averred, “would be able to come into this country … without attracting the kind of attention that others might.”

The cryptic underlying message is – fear everyone. Since the hidden al Qaeda terrorist cells have not come to fruition, a more desperate strategy must be employed to sow fear and panic in the populace. Could the enemy be your neighbor? Your grocer? Your co-worker? It could be anyone and everyone. Desperate measures must be employed to safeguard us from this pervasive looming presence. The underlying message is that I should cry out for the government to protect me from the artfully crafted “terrorist” menace and the ominous threats that they desperately need me to fear.

patriotism-means-no-questions.jpg

I can think of no faster way to unite the American people behind George W. Bush than a terrorist attack… I believe George W. Bush will quickly unite the American people through his foreign policy ~ Henry Kissinger (War Criminal) in 2000.

28
Mar
08

Satanic Ritual Child Sex Abuse: The McMartin Case Revisited

satanism.jpgcia-seal-plaque.jpg

The rampant sexual abuse and emotional traumatization of children by the U.S. government, or at its direction, is one of the country’s best kept secrets. Government-directed mind control cults specialize in dissociative conditioning, a regimen of physical and psychological beatings that give birth to a cluster of alter personalities.

MONARCH programming was a government funded mind control experiment included under the larger CIA operation MKULTRA. Operation Monarch involved using severe electro-shock trauma, sexual abuse, and other sadistic methods designed to split the subject’s mind into alternate personalities. The methods were conducted primarily on children because they are easier to break down psychologically, due to their primitive stage of emotional and cognitive development.

Child pornography rings have operated for decades to satiate our Luciferian official’s carnal desires. They are also employed as a means to blackmail potential threats to the power elite. The Emporer’s Club, a Mossad run operation that brought down New York Governor Eliot Spitzer, is a more recent example of the use of sex to control our leaders, and to purge them when it is deemed necessary.

The Finder’s Cult and Franklingate were cases of CIA affiliated child sex abuse/dissociative conditioning operations run in the United States. Dr. Nahman H. Greenberg, is a prominent child abuse psychiatric consultant who designed a psychological profile to identify the personality characteristics of abused children. He was a expert witness in the McMartin trial, and was later used by the government to discredit his own work, and the claims of young sex abuse victims. The CIA created a front group called The False Memory Syndrome Foundation (FMSF) to debunk, ridicule, and defame victims of Satanic Ritual Abuse, pedophilic sexual abuse, and CIA cult mind control activities. The board members of FMSF reads like a Who’s Who of CIA contractors and “consultants”.

mcmartinschool.jpg

The widespread reporting of sexual abuses occurring in child daycares flooded our newspapers and televisions in the 1980’s. The most infamous example was the McMartin Preschool case out of Manhattan Beach, California. Over 350 of the children who attended the McMartin daycare indicated that they had been sexually abused. The accounts included: animal sacrifice, ritualistic sexual abuse, underground tunnels, necrophelia, corprophelia, bestiality, and the photographing and videotaping of the children while being sexually abused.

The following excerpt is a letter concerning the McMartin investigation. It was written by Sergeant Beth Dickerson of the Los Angeles County Sheriff’s Department, and sent to Agent Kenneth Lanning at the FBI Academy’s Behavioral Sciences Unit in Quantico, Virginia, dated February 10, 1985:

In all, the victims named seven teachers (six women and one male) at the preschool as having molested them. Also named are about 30 other individuals still uncharged, as well as numerous unidentified ‘strangers.’

Most children state they were photographed in the nude… They mention drinking a red or pink liquid that made them sleepy… Children disclose animal sacrificing (bunnies, ponies, turtles, etc.) and some of this occurred in churches. Victims describe sticks put in their vaginas and rectums and also being ‘pooped’ and ‘peed’ on. Children say that the adults sometimes dressed in black robes, formed a circle around them and chanted.

These children talk of strangers coming to the school and molesting them, being taken off campus and molested, being photographed nude and some talk of animals being abused. The children talk of being hit with sticks and of being ‘peed’ and ‘pooped’ on…

The organization Children’s Institute International conducted a study on the childhood victims from the McMartin school, and two other Manhattan Beach daycares. They determined that “a full eighty percent displayed physical symptoms, including vaginal or rectal scarring, anal bleeding, painful bowel movements, and the ‘anal wick reflex’ associated with violent penetration.”

The McMartin trial was travesty of injustice. Due to procedural matters, and the peculiar deaths (or framed suicides) of ace witnesses, the trial ended with no convictions. The following blocked quotes are from this source.

The older witnesses were not allowed to testify at the McMartin trials, due to statute of limitations issues. Many of the younger witnesses were unable to offer testimony because they were too severely traumatized. Prosecutors had at their disposal “more than a hundred child witnesses as old as eleven and a truckload of medical reports bearing documentation of scarred genitals and anuses.”

District Attorney Ira Reiner inexplicably dropped all charges against five of the seven McMartin defendants on January 17, 1986. Six days before that, he had summarily dismissed two prosecutors on the case. At least three-dozen suspects who had been independently identified by numerous witnesses were never indicted at all.

The deaths surrounding the trial are intriguing. The woman who brought the first charges of her child being abused, a prior Hermosa Beach detective who was investigating the case, and a suspect known as the “Wolfman”, all mysteriously turned up dead.

Judy Johnson, the first McMartin parent to lodge a complaint, never delivered her scheduled testimony. Her body was found sprawled naked on the floor of her home, her death said to be due to complications from her chronic alcoholism (despite having no previous mental or alcohol problems).

Paul Bynum, who had been hired by the parents of victims as a private investigator, turned up dead on the eve of his scheduled testimony. His death by gunshot was ruled a suicide, though those close to Bynum dispute that finding. Among other things, Bynum may have testified about his examination of the tunnel excavation project conducted at the school site (and the findings of animal bones that would have corroborated the children’s claims of animal slaughter).

The suspect known by the children as “Wolfman”, was Robert Winkler. The kids described Winkler as being a frequent visitor to the school, who oftentimes delivered drugs for use in abusive rituals, which were sometimes conducted in churches, a cemetery, or a crematorium. The “Wolfman” turned up dead on the eve of his trial, allegedly of a drug overdose.

Information emerged before the trial verifying the children’s claims that there were tunnels underneath the McMartin Preschool where much of the abuse was alleged to have occurred. Due to a corrupt District Attorney, and a collusive media black out operation, the information was suppressed.

E. Gary Stickel, Ph.D., a highly regarded archaeologist, and a consultant to George Lucas on the Indiana Jones movies, found two underground tunnel complexes, as well as previously unrecognized structural features which defied logical explanation. Both tunnel complexes conformed to locations and functional descriptions established by children’s reports.

Our children our the most vulnerable members of our society. When they are sadistically abused, tortured, and raped, it brings Johnnypeepers great pain. When our elected officials, and their agency henchmen, perpetrate this abuse, it is indicative of a systemic cancer in our government.

I implore you to research our government’s involvement and cover-up of child sex-abuse rings for yourself. The Franklingate files would be an excellent start. On June 29, 1989, The Washington Times broke this story of a homosexual child sex ring being given tours of the Bush 41 White House. I highly recommend the documentary Conspiracy of Silence. Although it was listed in TV guide to air on May 3, 1994, it was censored by our government and did not make it to your living room. See for yourself what the fuss was about.

“The world is governed by people far different from those imagined by the public.” Benjamin Disraeli, Prime Minister of Britain

See related:

The Wizard of Oz and Monarch Slave Programming

Hypnosis in MPD: Ritual Abuse (The Greenbaum Speech)




10
Feb
08

Here Today, Gone tomorrow: The Fox News Memory Hole

wiretap.jpg

You should know by now that the government can easily access your personal voice and data communications. But, are you aware that individuals outside of your country have the same capability? Are these foreign entities listening to your most intimate conversations? Do you think the only one listening is the trusted recipient on the other line?

The United States has outsourced the tasks of maintaining telephone hardware and providing wiretapping software to a foreign nation with a history of spying. Could this foreign government have obtained sensitive information through voice data networks and used it against the United States? The Mainstream Media has consciously chosen to evade the issue, and reporting on the matter is virtually non-existent, with one notable exception.

In mid-December of 2001, Brit Hume, anchor of “Special Report” on Fox News, ran a 4-part special detailing the involvement of two Israeli communication-support firms that had contracts in the United States. The broadcast also exposed the exploits of 140 Israeli individuals who were arrested in what the government described as “an organized intelligence gathering operation,” designed to “penetrate government facilities.” The information came from a sensitive Drug Enforcement Agency document that was leaked to an investigative journalist. The paper contained a summary of reports from numerous U.S. Government installations regarding suspicious activities involving “art students” claiming to have studied in Israel. Many of these detained “art students” admitted that they had “served in military intelligence, electronic surveillance intercept, and/or explosive ordinance units.”

The two Israeli firms provided high-tech telephone equipment and eavesdropping software designed to spy on domestic calls. Amdocs Ltd., “generates the computerized billing records and billing data for nearly every phone call made in America.” The firm has been investigated repeatedly by the FBI and the NSA for potential security breaches. The NSA issued a top secret sensitive compartmentalized information report (TS/SCI) warning that records of calls made in the U.S. were getting into Israeli hands.

An internal Amdocs memo indicated that the company used “widespread data mining techniques and algorithms combining both the properties of the customer and properties of the specific behavior.” In other words, a foreign corporate entity admitted to analyzing individual-specific data of U.S. callers, and how they were using the phone (i.e., who they were calling). U.S. counterintelligence sources have warned that the “systems are vulnerable” and “major breaches are possible.”

The other firm, Comverse Infosys, is an Israeli-run telecommunications subsidiary that provides wiretapping equipment for law enforcement operations in the United States. Comverse Infosys is heavily subsidized by the Israeli government. FBI investigations into Comverse software and equipment were halted by superiors before they were able to undergo security breach analysis. A FCC document revealed that several federal agencies were concerned that “unauthorized non-law enforcement personnel had access through the wiretap system.” Under the Fourth Amendment, the government must obtain a warrant to tap an American’s telephone. Foreign governments do not seem to be constrained by this Constitutional privacy protection.

The information contained in the 4-part series is shocking, but what is also intriguing is what happened to it. Evidence of the 4-part series on the Internet is virtually non-existent. The clips have been pulled from the Fox News website, with no explanation. The previously existing link to the story indicates that the “page cannot be found.” The broadcast transcripts are unavailable on the website as well. Who would want this information to disappear and why? Where did it go?

It seems that the story ruffled more than a few feathers. Immediately after the report ran, the investigative reporter on the story, Carl Cameron, stated that individuals from the group CAMERA (Committee for Accuracy in Middle East Reporting) “peppered the shit out of us.” CAMERA is affiliated with the ADL (Anti-Defamation League) and AIPAC (American Israel Public Affairs Committee). Both of these groups are staunch defenders of the state of Israel and are extremely powerful in influencing public, congressional, and executive branch opinion (as compared to other foreign, religious, and ethnic special interest groups). Individuals in the DEA, INS, and FBI questioned about the use of Comverse software for domestic spying in the U.S. stressed that even the suggestion of Israeli spying would be “considered career suicide.”

The broadcast special warranted a personal visit from Abe Foxman, the president of the ADL. According to a source at Fox News, Foxman demanded to meet with executives at the network regarding the 4-part series. Four days after the meeting, video clips, and any mention of the story, were removed from the Fox network servers. Clips that circulated on Youtube.Com, and other video service providers, have been removed, ostensibly on terms of use violations and copyright grounds.

Information can be extremely dangerous, especially to those who are threatened by its revelation. When a journalist’s work-product can be scrubbed from the information landscape, how are we to assess the current and historical record? When mainstream networks, and their reporters, are retroactively gagged through coercion and pressure-tactics, how will we get the truth? Due to the emergence of the Internet, the memory hole is not as powerful as it once was. The scrubbed record is able to be corrected for those who seek the full story.

Here is the transcript of the 4-part Fox News Special Report series.

Get a good night’s sleep and don’t bug anybody without asking me – Richard Milhous Nixon




Johnny Peepers

----> is a socio-pathetic degenerate with a penchant for cheap booze, ruphy-laden broads, and dim sum soup.

a

Blog Stats

  • 1,159,848 hits

Archives