Tuesday, January 27, 2015

Homeland Security and the Alternative Media



Watch The Video At The Bottom!

Forward Note:  It is important to realize that one of the goals of Homeland Security is protecting the one percent. See herehereherehere and here for more about who the one percent are. (See this document and this video to see what official government documents are saying, that we will see an increase between the "haves" and the "have-nots," and that that the "haves" are going to start seeing the "have-nots" as a potential problem.) At the bottom of this article, I have posted four audios for you to listen to along with one video to watch. Please take the time to do so. But, before you do this ... make sure you read the article! Please also read these articles when you have time:

1. Homeland Security - Organized Stalking and Militant Zionism
2. Zersetzung - The Origins of Modern Day Homeland Security and the Police State
3. Zersetzung - The Origins of Modern Day Homeland Security and the Police State Part 2
4. Zersetzung Part 3 - The New Homeland Security
5. FBI Memo Labels Patriots, Truth-Seekers as Potential 'Terrorists'
6. The ADL That Works With the RCMP and the FBI - and it's Ties to Organized Crime
7. An Interesting Video About Smearing Political Enemies
8. 72 Types That Are Considered “Potential Terrorists” In Official Government Documents
9. Learning About the Origins of "Homeland Security"
10. Full-Spectrum Dominance and No-Touch Reality TV Torture

===========================================================================

What does the alternative media have to do with drugs, real estate, and mining companies? Most of the alternative media is a part of the New Phoenix program. What is the Phoenix Program? It is basically like Mao's Hundred Flowers Campaign. In other words, it is a form of COINTELPRO. It is a way to bring the "snakes" out of their den. What better way to find potential political dissidents of the policies of NATO and Israel? 

This is why you see some alternative media websites selling gold and silver. It is a vicious system, with connections between organized crime, intelligence agencies, silicon valley, the media and corrupt individuals and banks in the financial industry. They also have front companies in various guises because over 50% of intelligence is now being outsourced. Some of these front companies are even drug dealing operations. (See here for more information about connections between the CIA and drugs.)


These front companies are involved in gathering intelligence and using Stasi stalking techniques to ruin people's lives. They can pose as a variety of different businesses and professions. Some that I know about are writers, escorts, mining companies, trading education businesses, hedge funds, prop trading firms, martial arts businesses, CrossFit-gyms, yoga centers, property management, real-estate agents, mortgage brokers, landscaping and gardening businesses, home renovations (especially mold or mildew from grow operations,) graffiti removal and pest control.


Watch the video at the bottom of this page, then listen to the audio interviews that are located below the video.  What you will find is that the Phoenix program was the precursor to Homeland Security and its Canadian equivalent.


When you think about Homeland Security, see herehere, herehereherehere and here.


In May 25, 2007, the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still images produced by programs such as Google Earth. See here and here for more.


But that's not all, these people have access to technology that can find oil and mineral deposits underground with up to 99% accuracy. (See this ad from Shell as an example. Also, see here for an example of synthetic aperture radar satellites.) That includes diamonds! That is why so many of the alternative media radio show hosts sell gold and silver etc. They can rape the planet and hoard all its resources. (Who do you really think is behind most of the mainstream and alternative media? The same people that are behind the banks. The financiers and the companies that sell the resources that are being pulled out of the ground.) This is why Africa is being held down. This is what AFRICOM is truly about. 

But that is far from all they can do.  In a nutshell, they can put you under horrible crippling surveillance and they can shoot you and your family with space-based weapons. See here for more about electronic warfare.

Ever wonder what they do at the NSA and CSE in Canada with Signals Intelligence?  Or better yet, who has access to it? It is pretty much class warfare. It is being used by wealthy criminals against the general public for surveillance, entertainment, (reality TV-like torture and voyeurism,) weaponization that can injure or kill someone in a plausibly deniable way, intellectual property theft, drug running, human trafficking and insider trading. 

Echelon is involved in Signals Intelligence. Please also see here for radiation intelligence and TEMPEST. See this video and this video for an example using a computer. It is important to realize that Signals Intelligence covers everything from intercepting signals to surveillance and electronic warfare

Please see Earth-Penetrating Tomography, Interferometry, Earth's Field NMR, Nuclear Magnetic Resonance and Electron Paramagnetic Resonance. The imagers are multi-purpose, the imaging transmitters serving to target locations, areas and living animals with directed energy. There are passive and active modes, the active mode requires the transmission of signals into the target where passive mode allows imaging with illumination occurring by other means like spying through leaking electrical emanations, including unintentional radio or electrical signals, sounds, and vibrations. Do you know what else has unintentional leaking electrical signals and vibrations? You! You are an antenna!

What You Are:

(See here, where the physicist Dr. John Morgan says 2 minutes and 10 seconds into the video, that all natural things emit radio waves. Watch this video with Michael Persinger where he talks about how light and photons can be measured. Also, take notice in this video when the physicist mentions that the brain "radiates" radio.)

You also have magnetite in your brain. Magnetite is the most magnetic of all the naturally-occurring minerals on Earth and is also used in the creation of the hard drive in your computer. Now, realize that the earth magnetic field allows for information storage too, see this video about the earth's magnetic field and information storage. Learn about magnetism and information storage: which is the same as your computer hard drive. Taking this information into consideration, it can be used along with nanotechnology, for holography and synthetic telepathy(See here and here for examples of holography, here for more about nanoparticle imaging and here for more about molecular imaging.)  

You are exactly like this says, your mind has no firewall: https://www.docdroid.net/mmsy/mind-no-firewall.pdf.html you are surrounded by wireless communication and that immerses you in the background or the "shadow" of communications systems. So, besides all of us being embedded in the earth's magnetic field, (something that is EXTREMELY important because of the Schumann Resonance and its relation to the brain and the mind and specifically, the Hippocampus which is the gateway to consciousness, memory and information storage. If you access the Hippocampus you can garner all of the information that is being consolidated in an individuals experience.) We are all embedded in a homogeneous secondary field called the communications system, and, much of it is pulsed in the range of the brain. We are quite literally, living in the shadow of a massive electromagnetic field that is generated by our communications systems. 

Beyond what I have explained, foot soldier intelligence operatives and criminals have technology that is similarly displayed in these videos (also see here, here and here.) that can influence people at a distance. Light can be measured, (photons,) minds can be read, thoughts can be sent. If you can think it, you can send it. Just like writing an email with your mind. Zuckerberg is saying it here, he is just not telling you the whole story. Also see here for another article with Mark Zuckerberg referring to synthetic telepathy. See here for a Cisco ad that talks about this technology.

So, essentially they have access to your vital signsthe EEG readouts of your brainwaves to know what you are thinking, the ability to see out of your eyes and hear out your ears. This is called Total Information Awareness, (also see here,) meaning they will soon have access to every piece of information on this planet. (See herehere and here for more.) They can also put thoughts in your head and hook you up to another individual's brain. When engaging in the latter, if an individual changes the EEG of his or her brain,  that individual can change the EEG of another brain that they are hooked up to. Or in other words, two brains can effectively become one.

NOW FINALLY...

After you watch the videos and listen to the audio interviews below, ask yourself this question ... why are none of the hosts on these podcasts talking about space-based weaponry and the level of surveillance that I'm talking about on this blog?



1. American Government Is Conducting Covert Warfare On Citizens Says Researcher
2. Vietnam, the Phoenix Program, the CIA/DEA Connection
3. The New Homeland Security Phoenix Program
4. Phoenix Program a Precursor to the Department of Homeland Security in the post-9/11
5. The CIA’s “Phoenix Program” in Vietnam and the “War on Terror”


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.