Saturday, August 31, 2024

Backstabbing Weasels- You Know Who You Are Right? You Won't Be Able to Hide Much Longer.... # Tough Love (Watch the Videos Below) How Many of You Phony Religious People Cover Up Classified Technology?

Freemasonry Cannot Be Separated From Israel and the Jews

How many of you are a part of this? You can see Masonic symbolism on everything from intelligence agencies, police, government institutions, corporations, Hollywood, Silicon Valley, technology and computer companies, big oil companies, military contractors and the military. See here for is Zionism/Jewish nationalism a political cult? 

As far as Jesus Christ goes, to me that is not totally important, (if you don't care,) what is important is showing that these people run the world and they are Freemasons. But ask yourself something... who puts all of the bizarre esoteric information in their movies, (Jews,) and who has the only Masonic symbol on their flag? (Israel.) Six lines, six triangles and six corners = 666.  The only flag in the world. Remember, Israel is a Jewish state and on a map it is the center of the earth. So why does it all connect to Israel and Jews?  Does it have something to do with Jesus? 

One mistake I noticed in the first video... he claims one picture is Aleister Crowley when he was younger when in fact it is Nietzsche. Besides that I think it is pretty good. Not all of the individuals that are a part of Freemasonry even go through these rituals, they are just brought in.  This has made it easier for more people to be a part of this.











British Intelligence-
the oldest intelligence agency

CSIS Canada Pyramid shaped headquarters


Facebook and Tubal Cain, beside the Tubal Cain of
the British Intelligence which is 007 (Two Balls and a Cain)
  

Silicon Valley Freemasonry All
 Connected to Intelligence Agencies

Wednesday, August 21, 2024

Watch Losers- This is Who You Are Right?

 See here for blog about me being set up, they know who I am. 



Sam Vaknin is Describing
What Zionist Psychopaths Do 



Learn from the master himself, the great scumbag Sam Vaknin, a diagnosed narcissistic psychopathFormer criminal and Israeli citizen born April 21, or 111 days into the year and 254 days remaining, (what a surprise hey Sam!) He is probably still working for the Mossad because he still follows me around and reads my blog all the time. He also know about this, and of course, he will not talk about it like many psychologists and psychiatrists. One of the first people to put up videos regarding narcissists, gaslighting, gang stalking, stalking by proxy, smearing campaigns, torture etc. His earliest info is the best.  See here for my list about narcissism. 


On Torture 


Thursday, August 15, 2024

New Blog With List of Classified Technology

Those who desire to give up freedom in order to gain security will not have,
nor do they deserve, either one 
 ---  
Benjamin Franklin

Click Below For a List of Classified Technology: 


https://listoftechnology.blogspot.com



Friday, August 9, 2024

The Psychology of Narcissists and Psychopaths

See here and here for psychopaths. See here for narcissistic supply. See here for why the CIA only hires narcissists and sociopaths.  See here for a Mossad agent talking how they think they are God, this equally applies to the Five Eyes Intelligence agencies

B.A.I.T.E.R (Backstabber, Abuser, Impostor, Taker, Exploiter and Reckless)

1. Arrogant entitlement 2. A complete lack of empathy 3. No remorse or guilt 4. Irresponsible and self destructive 5. They thrive on drama 6. They brag about out smarting people 7.  A lot of short term relationships or high levels of infidelity... they almost always claim to be the victim 8. They are con artists and liars  9. Use comedy, praise or charm to bring down your guard 10. Use of gaslighting 

2. Another category - Phony religious people, phony humanists and human rights activists, phony "law enforcers", phony law makers, and phony politicians 


You Know Who You Are - Your Day Will Come


Here is a Movie You People
Might Like to Watch Called the Box 
Involves the NSA, CIA and NASA takes place in 1976 (Year I Was Born)
The Box is about the Cube and Judas Iscariot (Stabbing People in the Back) 
Judas and his money bag, the kiss of betrayal, those complicit in murder and theft
Satan is a slanderer, deceiver, temper, leads people astray, but also an accuser and judge
(All Stalking Losers Watch This)

 

Thursday, August 8, 2024

Targeted Individual Program is US Special Operations Command’s “Continuous Clandestine Tagging, Tracking, and Locating Hostile Forces


Click on Links Below to Read the
 Government Documents


The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program." 

These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”

The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment. 

Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:

1) Tagging, Tracking, and Locating Human (High-value) targets aka “hostile forces” to support the Global War On Terrorism (GWOT)
2) Technologies include:
Nanotechnology (including Quantum Dot and Self-assembled Photonic Antenna)
Biotechnology (including “biomimetic devices for detection and identification at long distances” and “Taggants for Biological Signature Amplification, Translation,”)
Chemistry (including “signature enhancing Taggants” and “chemical/biochemical sensors for natural signatures”)
3) Participating agencies include: DARPA, Army Research Lab, NSA, DIA, CIA, Homeland Security, FBI,  Air Force Research Lab, DOE, and Industry
4) Human signature detection via skin spectral emissivity's, thermal fingerprints at long distance
5) fieldable “bio-electronics”
6) bio-engineered signature translation and bio-reactive taggant (implant)
7) self-assembled photonic antennae
8) biometrics and tactical site exploitation (forensics)
9) Operation “Silent Dagger” 
10) Ground SIGINT (Signals Intelligence) Kit (GSK)
11) Joint Threat Warning Systems from the Air, Land, and Sea
12) RF (radio-frequency) and non-traditional (eg., optical/multi-band) Tags and R/Xs
13) “synchronize acquisition of signals intelligence (SIGINT) capabilities across the air, ground and maritime (warfare) domains”
14) SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION
15) Blue Force Tracking (BFT)
16) Special Operations Tactical Video Systems (SOTVS)
17) Sensitive Site Exploitation (SSE)
18) tiny satellites that keep tabs on targets from above (SpaceX rocket carrying the CubeSats—inexpensive satellites so small they can fit in the palm of your hand)
19) tracking satellites are part of the growing Special Operations focus on “high-value target” missions
20) tracking tags on enemies including radio frequency identification devices, quantum dots that could be used to track a singe molecule, and tagging measures such as insect pheromones
To acquire the high-value human “targets” needed to test and develop these clandestine weapons systems, the US government, through the FBI-DHS Fusion Centers and Neighborhood Watch Programs among others, has mislabeled innocent citizens as “terrorists” and “hostile forces.” Thus, ALL involved in these operations are complicit in “crimes against humanity,” “war crimes,” murder, attempted murder, torture, terrorism, and TREASON. These individuals and institutions are the real terrorists and they are TRAITORS!

These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.

I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)


by Doug Richardson SOAL-T WSO, Sept. 5, 2007

Also at: Continuous Clandestine Tagging, Tracking, and Locating (CTTL) Mr. Doug Richardson SOAL-T WSO5 September 2007 US Special Operations Command

Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.

Highlights From PPT:

p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)

– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets

- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)

- Forces Require an Ability to Apply and Monitor Tags

- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.

p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army

- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR

- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.

p. 7: CTTL– Key Enabling Technologies

- Nanotechnology

Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting

Biotechnology

Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID

Chemistry

Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures

p. 8: CTTL– Partnership for Transition–

- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition

PEO-Special Projects
PEO-Intelligence and Information Systems

- Collaborative Execution of S&T

DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories

p. 13: CTTL — Human Signature Detection

- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later

Goal: Verification of Capability and Operational Value Within 2 Years

Human Thermal Fingerprint at Long Distance

p. 14: CTTL –Human Signature Detection —

Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years

Synthetic Dog’s Nose Sensor


p. 15: CTTL — Signature Amplification/Translation

Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years

Current Capability – Bioengineered Signature Translation

p. 16: CTTL — Nano-scale Devices

Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna

II. UNCLASSIFIED Mr. Douglas Richardson Program Executive Officer SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION

III. SPECIAL RECONNAISSANCE Mr. David Breede, Program Executive Officer SPECIAL OPERATIONS FORCES INDUSTRY CONFERENCE EXPANDING THE COMPETITIVE SPACE