Friday, November 1, 2024

The Psychology of Narcissists and Psychopaths

See here and here for psychopaths. See here for narcissistic supply. See here for why the CIA only hires narcissists and sociopaths.  See here for a Mossad agent talking how they think they are God, this equally applies to the Five Eyes Intelligence agencies. See here for all the different agencies and how they are violating the rights of individuals all over Canada and the USA. See here for all of the laws they are violating. 

B.A.I.T.E.R (Backstabber, Abuser, Impostor, Taker, Exploiter and Reckless)

1. Arrogant entitlement 2. A complete lack of empathy 3. No remorse or guilt 4. Irresponsible and self destructive 5. They thrive on drama 6. They brag about out smarting people 7.  A lot of short term relationships or high levels of infidelity... they almost always claim to be the victim 8. They are con artists and liars  9. Use comedy, praise or charm to bring down your guard 10. Use of gaslighting 

2. Another category - Phony religious people, phony humanists and human rights activists, phony "law enforcers", phony law makers, and phony politicians 


Thursday, October 3, 2024

New Blog With List of Classified Technology No More Denying it Scumbags- it is Real

Those who desire to give up freedom in order to gain security will not have,
nor do they deserve, either one 
 ---  
Benjamin Franklin

Click Below For a List of Classified Technology: 


https://listoftechnology.blogspot.com



Friday, September 27, 2024

Saturday, September 21, 2024

An Interesting Video About Smearing Political Enemies- This is What Zionists Love to Do - WWW Internet = 666 In Hebrew - Connected to Finding Political Dissidents

Internet = WWW = 666


First off, go here to read the Wikipedia entry on COINTELPRO. In addition to watching the video below, you absolutely MUST see the articles below the video. Also, see here, is Zionism/Jewish nationalism apolitical cult?

Doug Christie exposes the attacks on freedom
 in Canada from Ritual Defamation 

1. Torture, Discrediting With Slander and Organized Stalking
2. Examples Of Counter Intelligence Phonies Who Know About Stasi Organized Stalking & Classified Technology And Keep Quiet About It
3. Zersetzung: The Origins of Modern Day Homeland Security and the Police State
4. Zersetzung: The Origins of Modern Day Homeland Security and the Police State Part 2
5. Zersetzung Part 3 - The New Homeland Security
6. Homeland Security - Organized Stalking and Militant Zionism
7. How to Discredit Someone With  Hi-Technology
8. How Covert Agents Infiltrate To Manipulate, Deceive, And Destroy Reputations
9. Front Groups and Intelligence Agents
10. Learning About the Origins of "Homeland Security"
11. Download STASI book
12. Noam Chomsky on COINTELPRO
13. A Perfect Example of a Cointelpro Website
14. Phony Cointelpro Front Websites and the Liars That are Behind Them
15. COINTELPRO and the Phoenix Program
16. COINTELPRO Part 2
17. Gaslighting: What Intelligence and Informant Stalkers Participate In
18. Video Example of Stasi "Anchoring" Techniques
19. How Easy is it to Get People to Engage in Organized Stalking? A Perfect Example of The Naivete of the Public and Putting Too Much Trust in Authority Figures
20. 'Couple Harassed with Organized Stalking Noise Harassment Campaign'
21. Homeland Security Made in Israel
22. Homeland Security is Connected to Zionism
23. Homeland Security: The Strong Connections Between Israel, Canada and the United States
24. CSIS and the RCMP dealing with Political People
25. FBI Infragard and Private Outsourced Intelligence Agents
26. InfraGard: An Unhealthy Government Alliance
27Proof FBI Snitching & Organized Stalking Program
28. The Current FBI, NSA, CIA, RCMP, CSE, CSIS, and the Canadian Human Rights Commission Leadership That Should Be Prosecuted & Thrown In Jail


Monday, September 16, 2024

Watch the Videos Below, How Many of You People.... Religious Or Not, Are Just Phony Satanists Covering Up This Classified Technology?

Freemasonry Cannot Be Separated From Israel and the Jewish State

How many of you are a part of this? You can see Masonic symbolism on everything from intelligence agencies, police, government institutions, corporations, Hollywood, Silicon Valley, technology and computer companies, big oil companies, military contractors and the military. See here for is Zionism/Jewish nationalism a political cult? 

As far as Jesus Christ goes, to me that is not totally important, (if you don't care,) what is important is showing that these people run the world and they are Freemasons. But ask yourself something... who puts all of the bizarre esoteric information in their movies, (Jews,) and who has the only Masonic symbol on their flag? (Israel.) Six lines, six triangles and six corners = 666.  The only flag in the world. Remember, Israel is a Jewish state and on a map it is the center of the earth. So why does it all connect to Israel and Jews?  Does it have something to do with Jesus? 

One mistake I noticed in the first video... he claims one picture is Aleister Crowley when he was younger when in fact it is Nietzsche. Besides that I think it is pretty good. Not all of the individuals that are a part of Freemasonry even go through these rituals, they are just brought in.  This has made it easier for more people to be a part of this.




Freemason Sign


Stasi Flag on Top
Flag of Israel on Bottom 




Freemasonry Police USA





British Intelligence-
the oldest intelligence agency

CSIS Canada Pyramid shaped headquarters


Facebook and Tubal Cain, beside the Tubal Cain of
the British Intelligence which is 007 (Two Balls and a Cain)
  

Silicon Valley Freemasonry All
 Connected to Intelligence Agencies

Thursday, August 8, 2024

Targeted Individual Program is US Special Operations Command’s “Continuous Clandestine Tagging, Tracking, and Locating Hostile Forces


Click on Links Below to Read the
 Government Documents


The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program." 

These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”

The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment. 

Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:

1) Tagging, Tracking, and Locating Human (High-value) targets aka “hostile forces” to support the Global War On Terrorism (GWOT)
2) Technologies include:
Nanotechnology (including Quantum Dot and Self-assembled Photonic Antenna)
Biotechnology (including “biomimetic devices for detection and identification at long distances” and “Taggants for Biological Signature Amplification, Translation,”)
Chemistry (including “signature enhancing Taggants” and “chemical/biochemical sensors for natural signatures”)
3) Participating agencies include: DARPA, Army Research Lab, NSA, DIA, CIA, Homeland Security, FBI,  Air Force Research Lab, DOE, and Industry
4) Human signature detection via skin spectral emissivity's, thermal fingerprints at long distance
5) fieldable “bio-electronics”
6) bio-engineered signature translation and bio-reactive taggant (implant)
7) self-assembled photonic antennae
8) biometrics and tactical site exploitation (forensics)
9) Operation “Silent Dagger” 
10) Ground SIGINT (Signals Intelligence) Kit (GSK)
11) Joint Threat Warning Systems from the Air, Land, and Sea
12) RF (radio-frequency) and non-traditional (eg., optical/multi-band) Tags and R/Xs
13) “synchronize acquisition of signals intelligence (SIGINT) capabilities across the air, ground and maritime (warfare) domains”
14) SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION
15) Blue Force Tracking (BFT)
16) Special Operations Tactical Video Systems (SOTVS)
17) Sensitive Site Exploitation (SSE)
18) tiny satellites that keep tabs on targets from above (SpaceX rocket carrying the CubeSats—inexpensive satellites so small they can fit in the palm of your hand)
19) tracking satellites are part of the growing Special Operations focus on “high-value target” missions
20) tracking tags on enemies including radio frequency identification devices, quantum dots that could be used to track a singe molecule, and tagging measures such as insect pheromones
To acquire the high-value human “targets” needed to test and develop these clandestine weapons systems, the US government, through the FBI-DHS Fusion Centers and Neighborhood Watch Programs among others, has mislabeled innocent citizens as “terrorists” and “hostile forces.” Thus, ALL involved in these operations are complicit in “crimes against humanity,” “war crimes,” murder, attempted murder, torture, terrorism, and TREASON. These individuals and institutions are the real terrorists and they are TRAITORS!

These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.

I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)


by Doug Richardson SOAL-T WSO, Sept. 5, 2007

Also at: Continuous Clandestine Tagging, Tracking, and Locating (CTTL) Mr. Doug Richardson SOAL-T WSO5 September 2007 US Special Operations Command

Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.

Highlights From PPT:

p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)

– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets

- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)

- Forces Require an Ability to Apply and Monitor Tags

- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.

p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army

- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR

- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.

p. 7: CTTL– Key Enabling Technologies

- Nanotechnology

Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting

Biotechnology

Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID

Chemistry

Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures

p. 8: CTTL– Partnership for Transition–

- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition

PEO-Special Projects
PEO-Intelligence and Information Systems

- Collaborative Execution of S&T

DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories

p. 13: CTTL — Human Signature Detection

- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later

Goal: Verification of Capability and Operational Value Within 2 Years

Human Thermal Fingerprint at Long Distance

p. 14: CTTL –Human Signature Detection —

Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years

Synthetic Dog’s Nose Sensor


p. 15: CTTL — Signature Amplification/Translation

Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years

Current Capability – Bioengineered Signature Translation

p. 16: CTTL — Nano-scale Devices

Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna

II. UNCLASSIFIED Mr. Douglas Richardson Program Executive Officer SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION

III. SPECIAL RECONNAISSANCE Mr. David Breede, Program Executive Officer SPECIAL OPERATIONS FORCES INDUSTRY CONFERENCE EXPANDING THE COMPETITIVE SPACE

Sunday, August 4, 2024

All the Laws That Are Currently Being Violated in Canada and Internationally From the Crimes Mentioned On This Blog

See here for how I contacted Prime Minister Justin Trudeau with no reply. See here for how I contacted Head of Public Safety Canada Marco Mendicino and received no reply. 


-Violation of the Charter of Rights and Freedoms of Canada

- Violation of the Bill of Rights of Canada


 Criminal Code of Canada

- Possession of weapon for dangerous purpose

- Drug Trafficking (many of my stalkers are involved in drugs, probably some of the police and intelligence agents too) 

- Human Trafficking (look up the definition of human trafficking) 

-Criminal Harassment

- Torture

- Illegal Surveillance

- Espionage

International Law

- Violation of the Geneva Conventions of human experimentation and torture

- Nuremberg Laws and Code on human experimentation and torture


UN Treaties

- International Covenant on Civil and Political Rights 

Convention against torture and other cruel and inhuman or degrading treatment or punishment 

- Universal Declaration of Human Rights

Wednesday, July 10, 2024

We are Hackable Animals

There you go. No more rights. Here is the wikipedia of the guy that is featured in the top video below.  In the bottom video is Sergey Brin, the co-founder of Google along with Klaus Schwab, the founder of the World Economic Forum. Have you ever seen the movie the Circle, which is loosely based upon Google? Remember the Google Chrome circle? Do you remember in the movie how they were following the guy around? This is organized stalking

The guy in the top video is Dr Yuval Noah Harari, see interviews with him herehere, and here with James Altucher. I have written previously about James Altucher herehere, and here, The video proves what I am saying. James is a computer scientist, Yuval isn't, but he knows about this. (It is worth mentioning, James is not the only one covering this up.)


Where's the Justice? Silicon Valley Billionaire Scum Along With the CIA and NSA: Must Watch Documentary Below- Learn the History of Manipulation of Human Beings With Classified Technology (Many Silicon Valley Billionaires, Electrical Engineers, Computer Scientists, Neuroscientists, Psychologists, Psychiatrists Know About This & Are Complicit in Covering it Up)


See here for more about Ewen Cameron.  See here for a list of government agencies involved in covering up the human rights abuses and torture that continues now.  

See here and here for more about classified and hi-technology. See here for more about MkUltra. (Be sure to scroll down and go through all of the articles when you click through on the MkUltra link.) See here for more about Transhumanism. (Be sure to scroll down and go through all of the articles and videos when you click on the Transhumanist link.)

The documentary below is an absolute must watch. Be sure to watch the whole presentation. You will learn how long this technology has been around and the massive human rights abuses that have been perpetrated. This is something that is rarely talked about, in fact, it is extremely difficult to find information on this topic. Be sure to watch this old news clip from CNN in the 80's. Also interesting are movies from the 80's like Videodrome and Brainstorm



Monday, July 8, 2024

Brain Computer Interfaces, Mind Control and Surveillance

See past video with Steve Hoffman here. Some one in Silicon Valley that actually tells some of the truth. Think of how many of them know this and say absolutely nothing


Tuesday, July 2, 2024

You Know Who You Are - Your Day Will Come


Here is a Movie You People
Might Like to Watch Called the Box 
Involves the NSA, CIA and NASA takes place in 1976 (Year I Was Born)
The Box is about the Cube and Judas Iscariot (Stabbing People in the Back) 
Judas and his money bag, the kiss of betrayal, those complicit in murder and theft
Satan is a slanderer, deceiver, temper, leads people astray, but also an accuser and judge
(All Stalking Losers Watch This)