nor do they deserve, either one --- Benjamin Franklin
Click Below For a List of Classified Technology:
https://listoftechnology.blogspot.com
Exposing Intelligence Agency Human Rights Abuses, Government and Corporate Corruption Along with the Problems of Zionism. The Foundation of Freedom is Freedom of Thought and Freedom of Speech
https://listoftechnology.blogspot.com
See here for a collection of posts about mental illness diagnosis and how people in political power abuse it.
Freemasonry Cannot Be Separated From Israel and the Jewish State
How many of you are a part of this? You can see Masonic symbolism on everything from intelligence agencies, police, government institutions, corporations, Hollywood, Silicon Valley, technology and computer companies, big oil companies, military contractors and the military. See here for is Zionism/Jewish nationalism a political cult?
As far as Jesus Christ goes, to me that is not totally important, (if you don't care,) what is important is showing that these people run the world and they are Freemasons. But ask yourself something... who puts all of the bizarre esoteric information in their movies, (Jews,) and who has the only Masonic symbol on their flag? (Israel.) Six lines, six triangles and six corners = 666. The only flag in the world. Remember, Israel is a Jewish state and on a map it is the center of the earth. So why does it all connect to Israel and Jews? Does it have something to do with Jesus?
One mistake I noticed in the first video... he claims one picture is Aleister Crowley when he was younger when in fact it is Nietzsche. Besides that I think it is pretty good. Not all of the individuals that are a part of Freemasonry even go through these rituals, they are just brought in. This has made it easier for more people to be a part of this.
Click on Links Below to Read the
Government Documents
The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program."
These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”
The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment.
Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:
These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.
I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)
by Doug Richardson SOAL-T WSO, Sept. 5, 2007
Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.
Highlights From PPT:
p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)
– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets
- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)
- Forces Require an Ability to Apply and Monitor Tags
- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.
p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army
- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR
- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.
p. 7: CTTL– Key Enabling Technologies
- Nanotechnology
Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting
- Biotechnology
Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID
- Chemistry
Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures
p. 8: CTTL– Partnership for Transition–
- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition
PEO-Special Projects
PEO-Intelligence and Information Systems
- Collaborative Execution of S&T
DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories
p. 13: CTTL — Human Signature Detection
- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later
Goal: Verification of Capability and Operational Value Within 2 Years
Human Thermal Fingerprint at Long Distance
p. 14: CTTL –Human Signature Detection —
Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years
Synthetic Dog’s Nose Sensor
p. 15: CTTL — Signature Amplification/Translation
Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years
Current Capability – Bioengineered Signature Translation
p. 16: CTTL — Nano-scale Devices
Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna
See here for how I contacted Prime Minister Justin Trudeau with no reply. See here for how I contacted Head of Public Safety Canada Marco Mendicino and received no reply.
-Violation of the Charter of Rights and Freedoms of Canada
- Violation of the Bill of Rights of Canada
Criminal Code of Canada
- Possession of weapon for dangerous purpose
- Drug Trafficking (many of my stalkers are involved in drugs, probably some of the police and intelligence agents too)
- Human Trafficking (look up the definition of human trafficking)
-Criminal Harassment
- Torture
- Illegal Surveillance
- Espionage
International Law
- Violation of the Geneva Conventions of human experimentation and torture
- Nuremberg Laws and Code on human experimentation and torture
UN Treaties
- International Covenant on Civil and Political Rights
- Convention against torture and other cruel and inhuman or degrading treatment or punishment
- Universal Declaration of Human Rights
There you go. No more rights. Here is the wikipedia of the guy that is featured in the top video below. In the bottom video is Sergey Brin, the co-founder of Google along with Klaus Schwab, the founder of the World Economic Forum. Have you ever seen the movie the Circle, which is loosely based upon Google? Remember the Google Chrome circle? Do you remember in the movie how they were following the guy around? This is organized stalking!
The guy in the top video is Dr Yuval Noah Harari, see interviews with him here, here, and here with James Altucher. I have written previously about James Altucher here, here, and here, The video proves what I am saying. James is a computer scientist, Yuval isn't, but he knows about this. (It is worth mentioning, James is not the only one covering this up.)
See past video with Steve Hoffman here. Some one in Silicon Valley that actually tells some of the truth. Think of how many of them know this and say absolutely nothing.
See here for more about nanotechnology. (Scroll down and read all the articles.) This is also what I have been saying about using viruses to get this in your body. (Also see here.) It has become so sophisticated it can also be introduced with dust. See the movie "Gamer" when they talk about this. Also, see this video about injecting a brain-computer interface into your body through your leg (starting at 4:32 into the video,) also see here.