Friday, March 4, 2016

The Anti-Defamation League: Covering Up Racism and Israeli War Crimes For Nearly A Century

Note: See here, here and here for past posts on the ADL and its questionable connections.



The Anti-Defamation League (ADL) was founded in 1913 after Leo Frank, a Jewish executive who raped and strangled a 13-year-old girl, was taken from jail and hung by angry citizens appalled at the governor’s decision to commute his sentence. Many American Jews believed the conviction and subsequent lynching was motivated by anti-Semitism. In response, the Anti-Defamation League was founded with the express purpose of combating anti-Semitism.
Although the ADL was supposedly formed with noble intentions, its subsequent history has been anything but honorable. The Anti-Defamation League has been marred with mob ties almost since its founding, including a close relationship with notorious Jewish mobster Moe Dalitz, who provided funding for the ADL and was rewarded with the league’s highest honor, the Torch of Liberty Award. The Anti-Defamation League also had a close connection to Jewish mob boss Meyer Lanksy, even employing his granddaughter Mira Lansky as their legal liaison today. Following in her grandfather’s footsteps, Mira paid for the luxurious vacations of the Anti-Defamation League spies who perpetrated the infamous 1993 ADL spying scandal, which will be addressed later in the article.
The noble intentions of fighting anti-Semitism and racism were completely corrupted in the 1940′s when, according to Robert Friedman in The Village Voice, May 11, 1993, Vol. XXXVIII No. 19, the ADL began destroying American gentile lives by spying on “leftists” and “communists” and sharing that information with Senator Joseph McCarthy’s House Un-American Committee. As many Americans would like to forget, this communist witch hunt was used as an excuse to destroy American’s careers and reputations based on little to no evidence.
In 1967, Israel purposefully attacked the American naval ship USS Liberty with the intention of murdering every sailor on board and then blaming the attack on Egypt. Israel thought that this “hostile action by Egypt” would get America to change its neutral status on the Israeli-Arab war and form an alliance with Israel to defeat its neighbors. Unfortunately for Israel, a few survivors managed to radio the US command and tell them that Israel was the aggressor, not Egypt. Israel claimed it was an accident; although every survivor of the USS Liberty attack rejected Israel’s mistaken identity story. And Lt. General Marshall Carter, the director of the NSA, told congress the attack, “couldn’t be anything else but deliberate.” The evidence that the attack was deliberate is so overwhelming it is literally an insult to reason to suggest otherwise. The ADL became a propaganda arm of the Israeli government in the 1970′s and 80′s when it was at the forefront of the movement to keep incriminating documents about the USS Liberty Attack confidential. Even to this day the ADL still attempts to cover up the USS Liberty incident on their website, in which they claim it was an accident and call anyone who suggests otherwise, anti-Semitic.

In 1985, it was discovered that a Jewish American named Jonathan Pollard was stealing American secrets and giving them to Israel for money. The wife of Pollard’s handler, Avi Sella, worked for the ADL, and Pollard later admitted that a prominent ADL member was deeply involved in the spying. Like AIPAC, the ADL does not register under the Foreign Agent Registration Act as per the law, even though it works closely with the Mossad, and has been caught spying on Americans for Israel. Through political donations, the ADL has remained above prosecution for these documented crimes. Amazingly, the ADL even had the gumption to shamelessly appeal to President Clinton in 1993 to commute their spy’s sentence.
In 1993, San Francisco newspapers broke the story that the ADL had been paying police officers for confidential information, illegally wire-tapping phones, and even dumpster diving to acquire  private information on American citizens. The Anti-Defamation League later sold the information to the Israeli and South African governments. Among the individuals, the ADL spied on were civil rights activists deemed “anti-Israel”, Congressmen such as Nanci Pelosi, reporters, labor unions, the NAACP, African National Congress, and the Rainbow Coalition. Presumably, the ADL was going to use any damning material acquired during their spying efforts to blackmail these politicians and influential people into changing their stances on Israel. Just one of their spies, Roy Bullock, had compiled files on more than 9,800 Americans and 950 organizations spanning three decades. After the search of the ADL offices, the San Francisco District Attorney said the ADL was conducting a “national spy network.” A few months later, the DA mysteriously retracted the statement.
Robert Friedman reports that, “more than a few Jewish officials privately say the ADL has to decide whether it is a human rights group or a secret police.”
It was later revealed that the ADL was gathering private files on American businessmen of Arab descent and handing them over to the Israeli government, which subsequently harassed and detained these businessmen when they traveled to Israel. In one such case, the ADL actually spied on Arab Americans’ funerals and gave that footage to Israeli intelligence officials who later detained the innocent Arab Americans when they traveled to Israel.
The Israeli lobby in America exploited the events of September 11, 2001 in order to ship thousands of top American law enforcement officials to Israel for counter-terrorism training. The Anti-Defamation League has also boasted on their website of training more than 45,000 American police about Jewish history and even lobbying the FBI to require all new agents and analysts to attend their Jewish history course and visit the US Holocaust Memorial Museum.
Due to the Anti-Defamation League’s distrust of black people, black American academics like Tony Martin and religious figures like Louis Farrakan have been labeled anti-Semitics and threatened for merely exposing Jewish historical records that proved Jewish people actually dominated the African slave trade. The ADL has become an organization that smears people who state facts which happen to be negative to Jewish people rather than an organization that fights racism. The following site describes the anti-gentile racism professor Martin suffered at the hands of the ADL for merely assigning a text book about the African slave trade: See here
In 1975, the ADL published a report titled “Target USA: The Arab Propaganda Offensive,” which smeared peaceful Pro-Arab groups. The ADL then published the book: Pro-Arab Propaganda: Vehicles and Voices, an enemies list of 31 organizations and 34 individuals, which put an “academic hit list” on university professors and student organizations that were opposed to Israel’s treatment of the Palestinians. As a result of the book, many of the professors listed were fired or passed over for promotions. Given that nearly 80% of the top administrators at Ivy League schools are Jewish (as this article proves), the consequences of being put on the ADL’s hit list can be quite severe.
The ADL also puts the names of reporters, activists, and others who speak out about Israel’s human rights abuses on discriminatory lists. Because Jewish Americans control many of the most powerful positions in America, this can be a death sentence for a career in banking, politics, or the media.
Even ardent Jewish organizations have criticized the ADL for inhibiting free speech. The Republican Jewish Coalition (RJC) Executive Director Matt Brooks said:
“This effort to stifle debate on US policy toward Israel runs counter to this American tradition. Accordingly, the RJC will not be silenced on this or any issue.”
The Emergency Committee for Israel, one of the most despicable Israeli lobbies in America who launched a massive advertising campaign accusing the OWS movement of anti-Semitism and calling Ron Paul a bad politician, issued the following statement:
“You must be kidding.” It promised that “this attempt to silence those of us who have questioned the current administration’s foreign policy approach vis-a-vis Israel will reenergize us.” ”Directors Harris and Foxman need a refresher course on the virtues of free speech and robust debate in a democracy. Their effort to stifle discussion and debate is unworthy of the best traditions of America, and of Israel.”
In 1990, a former Mossad agent, Victor Ostrovsky, came out and admitted that he worked with the ADL to label people who criticized Israel legitimately as anti-Semitic so they would be discredited and no one would listen to them. Ostrovsky gave an example of a reporter who criticized Israel for cluster bombing Lebanon, which was true. Victor made a call to the New York ADL office and asked them to label the reporter anti-Semitic, which the ADL promptly did. Ostrovsky’s first book sold 8 million copies worldwide, yet his second book was not reviewed in any newspaper in North America because it revealed the truth about the Mossad and its relationship to the ADL. This censorship set a world record in the book publishing industry.
The ADL came under heavy controversy in 2006 after it made a concerted effort to get the Polish Consul General to cancel a speech by civil rights activist Tony Judt that was to be held on their land. The ADL immediately denied having any role in the cancelation of the speech, which would have discussed the Israeli-Palestinian conflict. The Polish Consul General later told The Washington Post that the ADL had put concerted pressure on him to cancel the event.
The Anti-Defamation League has turned into the exact type of hate group that it was designed to prevent. A former ADL spy, David Gurvitz, actually admitted his involvement in the Anti-Defamation League’s support of the Apartheid in South Africa. Apparently the ADL was illegally obtaining information on anti-apartheid activists and selling that information to the South African government. The ADL’s support for apartheid regimes in the past may explain why they have consistently supported and covered up Israel’s apartheid policies of separating Jewish and Palestinian children in separate and unequal schools. Palestinian schools receive far less funding than Jewish schools. The ADL also supports Israel’s policy of giving Jewish Israelis five times greater access to water than their Arab neighbors and limitations on Palestinians ability to travel and attend sporting events that Jewish Israelis are allowed to attend.
It is surprising that the Anti-Defamation League would cover up an association for civil rights in Israel (ACRI) poll that highlights incredible, rising rates of anti-Arab attitudes in Israel given the ADL’s propensity to publish polls demonstrating anti-Semitism. In 2007, The Association for Civil Rights in Israel (ACRI) took a poll which found that 66% of Israeli teens believe Arabs are less intelligent, uncultured, and violent. Fifty percent of the Israelis taking the poll said they would not share an apartment with an Arab, befriend an Arab or let their kids befriend Arabs, or even let Arabs into their homes. A poll taken by the ACRI in 2008 found that these trends were increasing. Another poll taken in 2007 by the Center Against Racism found that 75% of Israeli Jews did not approve of Jews living in the same apartment buildings as Arabs, and that more than 50% of Jews would not have an Arab boss and thought that marrying an Arab was tantamount to national treason. Fifty percent of Israelis also thought Arabs should not be allowed in the same entertainment sites, and 40% wanted Arab’s voting rights rescinded.
The truth is that most Jewish people are not really Semites at all and therefore, this Jewish racism should be called anti-Semitism and fall under the official mandate of the ADL. Some Jewish scholars estimate that 85-95% of modern day Jews are descendants of Khazars, who aren’t Semites. The mere fact that the ADL labels people who they deem against Jews as anti-Semitic is in itself anti-Semitic because it is insinuating that Arabs, who are clearly Semitic, are not real people and are undeserving to be included in their Semitic rhetoric. The article, Jewish Israelis are the worst Anti-Semites On The Planet explains this argument in depth.

Of this photo, the US ambassador wrote, “Scenes like this were common all over the Armenian provinces, in the spring and summer months of 1915. Death in its several forms –massacre, starvation, exhaustion– destroyed the larger part of the refugees. The Turkish policy was that of extermination under the guise of deportation.”
In 2007, The director of the ADL, Abe Foxman, claimed the Armenian genocide was a mere massacre and not a real genocide. He publicly lobbied the American government not to recognize the event as a genocide. The racist ADL leader wanted Jewish people to be the only ones who have suffered from a genocide and therefore, able to monopolize the sympathy that comes with that status. As Peter Beinart, a former zionist, wrote in The Crisis of Zionism, “in the 1970s, American Jewish organizations began hoarding the Holocaust.” After receiving significant national pressure, Foxman recanted his racist comments and changed his mind.
In 2010, the ADL joined hate groups such as the Ku Klux Klan in its opposition to the building of a Muslim community center several blocks away from the September 11, 2001 Ground Zero site. The Muslims had every right to build there, but the ADL opposed the move because of its bigoted attitude towards Muslims.
One has to remember that it was non-gentile organizations like the mainstream media and the ADL that laid sole responsibility of the September 11, 2001 attacks on “Muslim extremists.”  The only ones arrested on 9-11 however were Israeli Mossad agents who were caught filming the attacks and celebrating afterwards (Also, see this article.) It was later concluded by the FBI that Israel had to have known about the attacks beforehand and purposefully did not warn the US, or had a direct role in the attacks. (Please see here, this is a larger problem than Israel alone.) In addition, the person who profited most from the attacks was Larry Silverstein, a Jewish American with close ties to the current and former Israeli Prime Ministers. Silverstein landed a 99-year lease for the world trade center shortly before the attacks and immediately doubled the insurance specifically for a terrorist attack. The Anti-Defamation League has tried mightily to keep this information out of the mainstream media and has also attempted to censor this information by calling people who state these facts, anti-Semitic.
On a side note, the ADL is a strong supporter of destroying the second amendment right for Americans to own guns. The ADL supported the District of Columbia in the District of Columbia vs Heller, in which the government was arguing that the Second Amendment does not prevent a city from banning firearms even when they are being used in the defense of one’s home. The ADL’s actions to deprive fellow Americans of their constitutional rights has been so egregious that other Jewish groups like Jews for the Preservation of Firearms Ownership has claimed that the ADL promotes “Nazi based laws.”

Monday, February 29, 2016

How Phony is the War on Terror? You Couldn't Even Begin to Imagine...

People have no idea how psychopathic and insane some of the individuals in power are. As a start, please see here and here about smearing political dissidents. Next, look at this collection of posts.

Also, see here and here for more information about what the ADL is and how they are working with Law Enforcement and Intelligence.

Now, you won't believe what I am going to show you. Do you think it is just a coincidence that one of the "supposed" terrorists had a father on the board of the ADL?

Oh but it gets worse. What about ISIS? You ever wonder what it stands for or who is really behind it?  Watch the videos below. Once again, do you think this is just a coincidence? See here for what group of people are most likely to be terrorists. See here for their campaigns against global free speech. See here for the relationship with the United States that they don't want you to see.

The truth is... they are laughing in your face because they think you are stupid fools.

Now watch the videos below!


Here is a short video clip that should make you wonder about who I.S.I.S really is:




Now, here is the full video if you would like to watch it:

The Complete History of Israel's Intelligence Community:
Mossad, Aman, and Shin Bet (1990)



Israel’s Connections to ISIS:



Paris Attackers Fought In Syria, Trained In Israel: Report - http://www.activistpost.com/2015/11/p...

France laying the groundwork to recognize ‘Palestine’ - http://www.jpost.com/Arab-Israeli-Con...

ISIS threatens Hamas – but move could bring Israel & Palestine closer to fight a common enemy - https://www.rt.com/news/270952-hamas-...

ISIS Claims Responsibility for Attack on Hezbollah Stronghold That Left 43 Dead in Beirut - http://www.haaretz.com/middle-east-ne...

UN Report: Israel in Regular Contact with Syrian Rebels including ISIS - http://www.ibtimes.co.in/un-report-is...

Jewish owners recently sold Paris’s Bataclan theater, where ISIS killed dozens - http://www.timesofisrael.com/jewish-o...

Netanyahu warns of 'grave mistake' if France recognizes Palestine: https://web.archive.org/web/20150118040713/https://www.businessinsider.com/afp-netanyahu-warns-of-grave-mistake-if-france-recognises-palestine-2014-11

ISIS Declares War On Palestine, Kills Top Hamas Commander- https://web.archive.org/web/20170607071129/https://americans.org/2015/06/02/isis-declares-war-on-palestine-kills-top-hamas-commander

The Five Worst CIA Operations Ever: the Precursor to Homeland Security is MKUltra and the Phoenix Program


In the video located below, you will see some of what I am describing in this article. Much of the alternative media on the internet is set up to be like flypaper to attract the people they are looking for in the new Phoenix Program. See also this article here. The internet is about a wider agenda in itself. The internet (at least the publicly available internet, including VPN's,) right from its very inception, has always been connected to DARPAIntelligencemilitary intelligence etc. Don't let them fool you.  Understand that among other things, one of the goals of the internet is to find people that criticize those with political and economic power. (See this document and this video to see for yourself what official government documents are saying, that we will see an increase between the "haves" and the "have-nots,"and that that the "haves" are going to start seeing the "have-nots" as a potential problem.) Also, see here, here and here for what they do when they identify you as a threat.

It is part of a bigger plan. One of creating a global surveillance brain. It's a eugenics and Transhumanist project. (See here, herehereherehere, here and here for more about this.)


Now, as for the video below ---- the first major problem with it is that it understates how evil MKUltra really was and is, (for example, they only talk about mind control with drugs.)

Even the Wikipedia write-up acknowledges the use of electronics. (Update: it used to, someone went into Wikipedia and edited the MKULTRA article, I wonder why? I have now put up the old link that refers to it that they took down.) 

The reality is, they quickly learned that using brain chips, nanotechnology, electromagnetic stimulation, and electromagnetic weapons are the most effective way to influence, discredit, and destroy targets. They can now perform no-touch torture, this way it is done in a plausibly deniable way. See here and here for information about this. Add along with this active slander campaigns, organized stalking, and other Stasi techniques.

The next major problem with the video is it says that MKUltra and the Phoenix Program ended... they didn't. Both of them are precursors to Homeland Security and the Stasi system that has been put into place since September 11, 2001. You have to understand that people who criticize Zionist power, the policies of NATO, Israel or those who sympathize with the supposed enemy, (i.e. the Palestinians,) are the new Viet Cong that have to be discredited or neutralized before their "memes" can influence others.

But not just these issues. This is a political agenda run by fascist psychopathic control freaks that hate your freedom. They are rolling out the list of people they are keeping tabs on. See here and here for more. Once you understand this, you begin to see the very sinister nature behind some of the classified technology that I have been talking about on this blog. See here, here and here.

Now, watch the video:

Sunday, February 28, 2016

5 Most Shocking CIA Experiments of Project MKULTRA

If you have read any of my previous posts,(herehere, here, here, here and here,) you know all of this is true. These people are complete psychopaths. If you pay close attention to Number 4 in the video below, which is Subproject 54, you will see them using weapons to produce concussions on human beings. This is very similar to what I am talking about.

Now, look how long ago that was.... what do you think they have now? Also, please see this post about Edward Snowden being a fake, mind control and Electromagnetic Weapons along with this post about being hooked up to a Supercomputer at the NSA and the CIA.


How Covert Agents Infiltrate The Internet To Manipulate, Deceive, And Destroy Reputations

Introductory note: Below is an article by Glenn Greenwald that pretty much describes what the intelligence agencies are doing to discredit people. Though, because he's a phony cover for the controlled media, (see here and here,) he leaves out how they have technology to influence human behavior, (see here,) or what they call "influencing the human domain." So, the worst of our problems are not internet and phone data collection etc. They also have the capability to kill or maim you from a remote location. (See here for more on this.)

A couple other points to make, Edward Snowden is not a real person. It is interesting and noteworthy that Glenn Greenwald has played an instrumental role in releasing the supposed "classified" Snowden documents. Don't be fooled. No real spy is going to be invited on NBC, by TedTalk or by a comedian named John OliverUnfortunately, it is even worse than what Snowden says because they have access to your brain and body. This is why Snowden is a phony, he is a liar by omission as I say here. He is also, if you can believe it, a character from a book and a movie! It is almost like these lying Zionist intelligence psychopaths are throwing it in your face and laughing at you. They want to see if you are awake to their lies. 

Also, the supposed "Hacktivist" group Anonymous isn't real either. Real in the sense of being a true threat to the people in power. Why? Because only hackers that work for intelligence cannot be caught... especially ones that release videos then put them on the internet and are interviewed by supposed "journalists." You have to understand that it is very challenging to go onto the internet and not be found. Once they find you, they would have your brain and body under constant surveillance. The internet (at least the publicly available internet, including VPN's,) right from its very inception, has always been connected to DARPA, Intelligence, military intelligence etc.

In this sense, nothing has changed. Don't let them fool you. But that's not the worst of it... they also have the ability to mine brains with their surveillance technology. They can set up "thought" alerts from brains the same way they can do with internet comments, emails, or phone calls. Understand that one of the goals of the internet is to find people that criticize those with political and economic power. It is part of a bigger plan. One of creating a global surveillance brain. It's a eugenics and Transhumanist project. (See here, herehere, herehere and here for more about this.) I also recommend reading the article below in light of this extremely important post.

============================================================================

by Glenn Greenwald

One of the many pressing stories that remain to be told from the archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked to publish a series of articles about “dirty trick” tactics used by GCHQ’s (GCHQ is the U.K. version of the NSA,) previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:


Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:



Then there are the tactics used to destroy companies the agency targets:


GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”


Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:


No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:




Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:










The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:




We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Documents referenced in this article:





DARPA's Artificial Intelligence Control Grid

Must See Video at the Bottom of This Page!

In addition to the video below, see here for more about classified technology and patents. These videos can give you a good introduction to artificial intelligence

It is worth mentioning that everything in the video below is from official government documents. Also, see this here. A quote from the document: "we will see an increase between the "haves" and the "have-nots," and that that the "haves" are going to start seeing the "have-nots" as a potential problem.")


It is important to realize that one of the goals of Homeland Security is protecting the one percent. See herehereherehere and here for more about who the one percent are.


How are they doing this? In a number of ways, one is having a bunch of  "alternative" media websites that are fronts working with intelligence. All of the popular and semi-popular alternative media are a part of the New Phoenix program. What is the Phoenix Program? (See here for a quick video.) It is basically like Mao's Hundred Flowers Campaign. In other words, it is a form of COINTELPRO. (See here for more about Counter-intelligence.) It is a way to bring the "snakes" out of their den. What better way to find potential political dissidents of the policies of NATO and Israel?


In May 25, 2007, the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still images produced by programs such as Google Earth. See here and here for more. 


They also have access to technology that can find oil and mineral deposits underground with up to 99% accuracy. That includes diamonds! See this ad from Shell and this video here as examples. They can rape the planet and hoard all its resources. (Who do you really think is behind the conglomerates that have consolidated the mainstream and alternative media? The same people that are behind the banks. The financiers and the corporations that sell the resources that are being pulled out of the ground. Incidentally, the FBI works with these corporations too! Many of the large mining companies have access to technology that most people do not know about, like this and this.) This is why Africa is being held down. This is what AFRICOM is truly about.

But that is far from all they can do.  In a nutshell, they can put you under horrible crippling surveillance and they can shoot you and your family with space-based weapons. See here for more about electronic warfare. See here for more about microwave weaponry.

Ever wonder what they do at the NSA and CSE in Canada with Signals Intelligence?  Or better yet, who has access to it? It is pretty much class warfare. It is being used by wealthy criminals against the general public for surveillance, entertainment (reality TV-like torture and voyeurism,) weaponization that can injure or kill someone in a plausibly deniable way, intellectual property theft, drug running, human trafficking and insider trading. 

Echelon is involved in Signals Intelligence. Please also see here for radiation intelligence and TEMPEST. See this video and this video for an example using a computer. It is important to realize that Signals Intelligence covers everything from intercepting signals to surveillance and electronic warfare

Please see Earth-Penetrating TomographyInterferometryEarth's Field NMRNuclear Magnetic Resonance and Electron Paramagnetic Resonance. The imagers are multi-purpose, the imaging transmitters serve to target locations, areas, and living animals with directed energy. There are passive and active modes, the active mode requires the transmission of signals into the target where passive mode allows imaging with illumination occurring by other means like spying through leaking electrical emanations, including unintentional radio or electrical signals, sounds, and vibrations. 

Do you know what else has unintentional leaking electrical signals and vibrations? You! (See here, where the physicist Dr. John Morgan says 2 minutes and 10 seconds into the video, that all natural things emit radio waves. Watch this video with Michael Persinger where he talks about how light and photons can be measured. Also, take notice in this video when the physicist mentions that the brain "radiates" radio.)

What You Are:
4. The human body has resonance frequencies

You also have magnetite in your brain. Magnetite is the most magnetic of all the naturally-occurring minerals on Earth and is also used in the creation of the hard drive in your computer. Now, realize that the earth's magnetic field allows for information storage too, see this video about the Earth's magnetic field and information storage. Learn about magnetism and information storage: same as your computer hard drive. Taking this information into consideration, it can be used with nanotechnology for holography and synthetic telepathy(See here and here for examples of holography, here for more about nanoparticle imaging and here for more about molecular imaging.)  

You are exactly like this says, your mind has no firewall: https://www.docdroid.net/mmsy/mind-no-firewall.pdf.html you are surrounded by wireless communication and that immerses you in the background or the "shadow" of communications systems. So, besides all of us being embedded in the earth's magnetic field, (something that is EXTREMELY important because of the Schumann Resonance and its relation to the brain and the mind and specifically, the Hippocampus which is the gateway to consciousness, memory and information storage. If you access the Hippocampus you can garner all of the information that is being consolidated in an individuals experience.) We are all embedded in a homogeneous secondary field called the communications system, and, much of it is pulsed in the range of the brain. We are quite literally, living in the shadow of a massive electromagnetic field that is generated by our communications systems. 

Beyond this, foot soldier intelligence operatives and criminals have technology that is similarly displayed in these videos that can influence people at a distance. Light can be measured, (photons,) minds can be read, thoughts can be sent. If you can think it, you can send it. Just like writing an email with your mind. Zuckerberg is saying it here, he is just not telling you the whole story. Also see here for another article with Mark Zuckerberg referring to synthetic telepathy. See here for a Cisco ad that talks about this technology.

So, essentially they have access to your vital signs, the EEG readouts of your brainwaves and your brain states to know what you are thinking, the ability to see out of your eyes and hear out your ears. (
See this old clip of a scientist looking out of a cat's eyes. What they have now is even more advanced.)

They can also put thoughts in your head and hook you up to another individual's brain. When engaging in the latter, if an individual changes the EEG of his or her brain,  that individual can change the EEG of another brain that they are hooked up to. In other words, two brains can effectively become one. Also, see this TedTalk video for another example

This is called Total Information Awareness, meaning the goal is to have access to every piece of information on this planet. (See herehere and here for more.) Very soon, every object on earth will be collecting data. So, it would be wise to learn more about big data and artificial intelligence.  


Transhumanist Documentaries That Are a Must Watch

Please also see my past posts on this topic located here, here, here, here, here and here.








Friday, February 26, 2016

Racist Jew to Anthony Weiner: "You are Married to an Arab" @ 03:54 (ish)

Whatever you think of Anthony Weiner, he is in the right here. As you can see here and here, this is a part of the mentality of some Jews. Please watch the video below, and realize  ---- this is all that I am trying to do with all of my posts against Talmudic Jewish identity. You cannot let them call you a racist or an anti-Semite for speaking out against them, they are the racists and the anti-Semites. The reality is, the Palestinians are Semitic. (See here and here about the Talmud.)

What you see him say in the video about Anthony Weiner's wife is a perfect example. What most Jews will not tell you is this mentality is endemic to the state of Israel and Talmudic Jewish identity. See here, here and here for some of my past posts on this matter. The reality is, the same could be said against Mark Zuckerberg's wife who is Asian and isn't Jewish. I would be very surprised if he agreed with a country that would not allow him to marry his wife. (This would be the case in Israel. He would not have been allowed to marry his wife, see this video for more on this topic.)

So why doesn't he say anything about it? Is he bound? Maybe that should tell you something about the truth in the bible and the time we are living in.


Thursday, February 25, 2016

The Future Jewish Utopia

Did you know that there is a future Jewish Utopia in the works? Read this book about the future Jewish utopia.

Many people don't know about this, but, many of the Jews do. The question is, what does this "Jewish Utopia" mean to a non-Jew? What will it be like? 

Well, that really depends on who you talk to. Some Orthodox Jews essentially think that gentiles (non-Jews,) are here to be slaves for the Jews. 

If you would like to learn more about this, I suggest learning more about Transhumanism, (see hereherehere and here.) In addition, watch this video about becoming a human node in a world surveillance network. Also, see this about the problems of Facebook and Google.

The reality is, this is already happening!



PATENT# 6470214 – USAF – Device for Implementing RF Hearing Effect 10.22.2002

I published this in an earlier post located hereBut I think it would be good to republish it once again. Please also see this post hereIn addition, this is also a good video to watch about becoming a human node in a world surveillance network. The reality is, this is already happening.

~Synopsis ~ 


ABSTRACT: 

A modulation process with a fully suppressed carrier and input preprocessor filtering to produce an
encoded output; for amplitude modulation (AM) and audio speech preprocessor filtering, intelligible
subjective sound is produced when the encoded signal is demodulated using the RF Hearing Effect.
Suitable forms of carrier suppressed modulation include single sideband (SSB) and carrier suppressed amplitude modulation (CSAM), with both sidebands present.

(Note: In other words, using remodulated signals for speech from your 'brain map' they can put 'voices (speech) into your head' by sending these signals to the inner ear which then sends them to the acoustic brain via the auditory nerve.)


SUMMARY OF THE INVENTION​

1. A method of encoding an input audio signal a(t) to produce a double sideband output signal
having a .omega..sub.c carrier frequency, which when transmitted to the head of a receiving
subject, will by the radio frequency hearing effect induce a thermal-acoustic signal in the
bone/tissue material of the head that replicates the input audio signal and is conducted by the
bone/tissue structure of the head to the inner ear where it is demodulated by the normal
processes of the cochlea and converted to nerve signals which are sent to the brain, thereby
enabling intelligible speech to be perceived by the brain as any other nerve signal from the
cochlea, the method comprising: applying an input audio signal a(t) to an audio pre-distortion
filter with an As(f) filter function to produce a first output signal a(t)As(f); adding a very low
frequency bias A to the first output signal to produce a second output signal a(t)As(f)+A;
applying the second output signal to a square root processor to produce a third output signal
(a(t)As(f)+A).sup.1/2 ; applying the third output signal to a balanced modulator to produce a
double sideband​1 output signal (a(t)As(f)+A).sup.1/2 sin(.omega..sub.c t), where .omega..sub.c
is the carrier frequency; and transmitting the double sideband output signal to the head of the
receiving subject.

2. The method of claim 1, wherein the As(f) filter function step further comprises the step of
de-emphasizing the high frequency content.​
 ​
3. The method of claim 1, wherein the further step of suppressing one of the sidebands of the double
sideband output signal is done resulting in a single sideband modulation transmission.

DETAINED DESCRIPTION OF THE PREFERRED EMBODIMENT​

 With reference to the drawings, FIG. 1 illustrates the RF to acoustic demodulation process of the
invention. Ordinarily and acoustic signal A reaches the outer ear E of the head H and traverses first to the inner ear I and then to the acoustic receptors of the brain B. A modulated RF signal, however,
enters a demodulator D, which is illustratively provided by the mass M of the brain, and is approximated, as shown in FIG. 2, (not available) by a sphere S of radius r in the head H. The radius r of the sphere S is about 7 cm to make the sphere S equivalent to about the volume of the brain B. It will be appreciated that where the demodulator D, which can be an external component, is not employed with the acoustic receptors of the brain B, it can have other forms.

(Note: this external component can be wearable technology or a remote receiver/transmitter device such as nanotechnology or brainchips.)

The sphere S, or its equivalent ellipsoid or similar solid, absorbs RF power which causes an increase in temperature that in turn causes an expansion and contraction which results in an acoustic wave. As a first approximation, it is assumed that the RF power is absorbed uniformly in the brain. Where the demodulator D is external to the brain B, the medium and/or RF carrier frequency can be selected to assure sufficiently uniform absorption.

(Note: This 'sphere S' as defined above would be the skull's bone/tissue matter “of the head” )

For the modulated RF signal of FIG. 1, the power absorbed in the sphere S is proportional to the power waveform of the modulated RF signal. The absorption rate is characterized quantitatively in terms of the SAR (Specific Absorption Rate) in the units of absorbed watts per kilogram per incident watt per square centimeter.​

The temperature of the sphere S is taken as following the integrated heat input from the power
waveform, i.e. the process is approximated as being adiabatic, at least for short term intervals on the
order of a few minutes.

(Note: An adiabatic process is one that occurs without transfer of heat or matter between a system and its surroundings.[1][2] The adiabatic process provides a rigorous conceptual basis for the theory used to expound the first law of thermodynamics, and as such it is a key concept in thermodynamics.  Some chemical and physical processes occur so rapidly that they may be conveniently described by the "adiabatic approximation," meaning that there is not enough time for the transfer of energy as heat to take place to or from the system.[3] Coincidentally, 'adiabatic' in terms of data processing and computing refers to quantum computing.)

The radial expansion of the sphere (or the bone/tissue matter of the head) follows temperature and is
converted to sound pressure, p(t), determined by the radial velocity (U.sub.r) multiplied by the real part of the specific acoustic impedance (Z.sub.s) of the sphere, as indicated in equation (1), below. (Note: not show in this report – go to link provided for entire patent information.)​

The specific acoustic impedance for a sphere of 7 cm radius, on the order of the size of the brain, has a lower cut-off break frequency of about 3,547 Hertz (Hz) for the parameters given for equation (1). The essential frequency range of speech is about 300 to 3000 Hz, i.e., below the cut-off frequency.

(Note: They are talking about firing wireless signals which can penetrate the bone/tissue matter of the head in order to create these desired effects.​)

 In the speech spectrum, which is below the brain cut-off frequency, the sphere S is an acoustic filter
which "rolls off", i.e. decreases in amplitude at -40 dB per decade with decreasing frequency. In
addition to any other demodulation processes to be analyzed below, the filter characteristics of the
sphere will modify the acoustic signal with a 40 dB per decade slope in favor of the high frequencies.​

 Results for an AM Modulated Single Tone​

 The SPL (Sound Pressure Level), in acoustic dB, is approximated as 20 log[p(t)/2E-5]. The standard
acoustic reference level of 2E-5 Newtons per square meter is based on a signal in air; however, the
head has a water-like consistency. Therefore, the subjective level in acoustic dB is only approximate, but sufficient for first order accuracy.​

 Below the cutoff frequency the real part of the impedance varies as the square of the frequency or
gives a boost of 40 dB per decade. Therefore, if the input modulation signal is 1 kHz, the second
harmonic will have a boost of about 4 time in amplitude, or 12 dB, due to the variation of the real part of the specific acoustic impedance with frequency. So the second harmonic pressure term in equation (8) is actually four times the power or 6 dB higher than the fundamental term. If the second harmonic falls above the cutoff frequency then the boost begins to fall back to 0 dB. However, for most of the speech spectrum there is a sever distortion and strong boost of the high frequency distortion components.

(Note: An AI system running sophisticated dynamic algorithms can compensate for any 'server distortions' experienced in a signal to signal transference/modulation. A system such as this that sits on a GIG (neural net) that is mapping the Human Nodes on a network can also transmit the signal information instantaneously by satellite to a computer anywhere on the planet.​)

Results for Two Tone AM Modulation Analysis​

 Because of the distortion attending single tone modulation, predistortion of the modulation could be
attempted such that the resulting demodulated pressure wave will not contain harmonic distortion. This will not work, however, because of the non-linear cross-products of two-tone modulation are quite different from single tone modulation as shown below.

(Note: It would appear that there is tech now relating to 'coherent demodulators' ( DSBSC-AM) using a Costas Loop.​2​3​)

Nevertheless, two-tone modulation distortion provides an insight for the design of a corrective process for a complex modulation signal such as speech. The nature of the distortion is defined in terms of relative amplitudes and frequencies.

(Note: The 'corrective process' technology referred to is here.​)

However, the serious distortion problem can be overcome by means of the invention which exploits the characteristics of a different type of RF modulation process in addition to special signal processing.​

AM Modulation with Fully Suppressed Carrier for the Intelligible Encoding of Speech by the
Invention for Compatibility with the RF Hearing Phenomena​

The output of the balanced modulator is applied to a spherical demodulator, which recovers the input
signal a(t) that is applied to the inner ear and then to the acoustic receptors in the brain.

(Note: This is hacking the acoustic center of the brain.​)

The invention provides a new and useful encoding for speech on an RF carrier such that the speech will be intelligible to a human subject by means of the RF hearing demodulation phenomena. Features of the invention include the use of AM fully suppressed carrier modulation, the preprocessing of an input speech signal be a compensation filter to de-emphasize the high frequency content by 40 dB per decade and the further processing of the audio signal by adding a bias terms to permit the taking of the square root of the signal before the AM suppressed carrier modulation process.​

The invention may also be implemented using the same audio signal processing and Single Sideband (SSB) modulation in place of AM suppressed carrier modulation. The same signal processing may also be used on Conventional AM modulation containing both sideband and the carrier; however, there is a serious disadvantage. The carrier is always present with AM modulation, even when there is no signal.

The carrier power does not contain any information but contributes substantially to the heating of the
thermal-acoustic demodulator, i.e. the brain, which is undesirable. The degree of this extraneous heating is more than twice the heating caused by the signal or information power in the RF signal. Therefore conventional AM modulation is an inefficient and poor choice compared to the double side-band suppressed carrier and the SSB types of transmissions.

(Note: So it would appear that this technology can also, at high enough frequencies/power, fry a target's brain. It is also worth restating at this point, that technology exists today to overcome the 'disadvantages' cited above.​)




* * * * * 


The only 1 of 8 images available on US Patent site

Research Links:

President's Commission for the Study of Bioethical Issues letter to respondent 07.27.2011
Patent # 003951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Patent # 6011991 Communication system and method including brain wave analysis and/or use of
brain activity 01.04.2000
Patent # 6470214 USAF RF Hearing Effect for skull/tissue penetrating sound
Patent # 6587729 Similar to Patent # 6470214
Double Sideband Suppressed Carrier Amplitude Modulation and Coherent Detection
Journal of Lightwave Technology  August 1, 2008
Demodulation of AM Signals – Restoring/recovering message signal from the received modulated
waveform that is generally corrupted by noise.

1 The standard AM modulated signal contains a sinusoidal component at the carrier frequency which does not convey any of the baseband message information. This component is included to create a positive envelope which allows demodulation by a simple, inexpensive envelope detector. From an information theory point of view, the power in the sinusoidal carrier component is wasted. In this experiment, you will see that it is not necessary to transmit the carrier component and that the baseband message can be recovered by a coherent demodulator. In fact, it can be shown that
a coherent demodulator performs better than an envelope detector when the received signal is corrupted by additive noise.

The type of modulation that will be studied in this chapter is called double-sideband suppressed-carrier amplitude modulation (DSBSC-AM). A close approximation to an ideal coherent demodulator called a Costas loop will be implemented.

Source:  Springer Link
2 Journal of Lightwave Technology  August 1, 2008
3 Demodulation of AM Signals – Restoring/recovering message signal from the received modulated waveform that is generally corrupted by noise.

"Sadistic & Grotesque": Noam Chomsky on How Israel Limits Food & Medicine in Occupied Gaza