Monday, February 17, 2025

Human Trafficking Awareness Day- Is Anyone Going to Tell the Truth?


Here is my email for anyone who wants to contact me: shanerussellhurren76@gmail.com 

Human Trafficking Awareness Day Started in 2007 the Year I Was Put in These Towers
January 11 or 1-11 
Wear Blue For Mary Magdalene (Nurses) 
Agatha of Sicily-saint against rape & torture- died when she was 20 or XX - 9/11

Join the Blue of Mary, the baby and Jesus
Baby the Leo / Mary the Virgo
Leo/Virgo Cusp
(My Birthday) August 24th-236th day -1976
24th day + 8th month =32 = One Tower and Jesuit Sign
1+9+7+6=23 = Second Tower (23 Latin) 
I was on the 13th floor in the building with 23 floors = 36 - above Jesus head
There is a quote from Da Vinci at these towers
Address of Towers: 1200 + 1288 = 1488 = 1+4+8+8=21 = 
John 21 -153 Vesica Piscis Eclipse
Didymus (means twin) 3 times in the Gospel of John,
Thomas (means twin) 8 times in the Gospel of John


9 Halo Rays on left Tower Top-Shaped like a C
11 openings shaped like a reverse J beside the right tower

J-Jesus
C-Christ

Monday, February 3, 2025

Organized Stalking is Psychological Torture = Article 32 of the Geneva Conventions = US Inventions Secrecy Act, 1951


See here and here for little known technology that is used for torturing people.  See here for slavery by satellite, geo-slavery. See here for gang stalking and smearing techniques.  


See here for more info about technological human rights abuse. See here for more about gang stalking.

Psychological torture is considered a war crime under Article 32 of the Geneva Conventions, which has a maximum sentence of the death penalty. The United States has been in a declared state of war, since October 2001, which invokes the Geneva Conventions. 

In the United States, it is also a serious felony charge – to conspire to violate the civil rights of thousands of U.S. citizens - a possible sentence of life in prison. Numerous state and federal laws are being broken every day by these criminals. It is disturbing to even consider that government tax payer supported individuals get up every morning, and gladly plan for the torture of thousands of people in the United States. 

I am alarmed at the thought of even asking this question: How sick and disturbed does someone need to be, to willingly torture people every day? These are acts of violence that are beyond comprehension and beyond murder, in my opinion. It is planned and deliberate, every day. This site contains information relating to advanced satellite surveillance and “harassment” technologies which are made available to covert government agencies and organized crime syndicates.

The secret technologies in question are covered by military/agency secrecy orders, mostly obtained under the US Inventions Secrecy Act, 1951. There are currently over 5,000 hidden devices, many computer – based and satellite facilitated, all with military / criminal applications. A list of known patents is available under the 'Mind Control Patents' and 'Classified & Hi-Technology' categories (also see here,) of this blog. Neurophones, brain scanners, and brain wave vocabulary software, directed energy and EM weapons. Undemocratically, and to protect powerful criminals from scrutiny, various secret National Security and Defamation legislation has been enhanced in recent years.

The US Patriot Act, for example, protects governments and connected criminals from criticism and/or detection and prosecution. Under this act anyone whistleblowing or fighting the system on a major concern is arbitrarily deemed to be unpatriotic (when it’s the criminals they criticize who betray us). They can then be listed (by a senior politician or at the request, through them, of a connected criminal) as a security risk and harassed covertly; using secret technologies. 

In fact a Department Of Defense Directive, Directive 5240 1-R, 1994, gives open permission for those under surveillance to be used for remote experimentation. It’s no coincidence that this particularly undemocratic and evil move was followed in 1996 by a significant increase in the number of satellites deployed for the purpose of civilian surveillance and harassment. Over 20,000 satellites currently target and silence countless people worldwide (est. 500,000 plus) as a result of such terrible laws. 

The victims are not openly confronted as that would remove any feigned excuses and leave the perpetrators open to all manner of accusation. Instead the methods used are covert; employing high tech’ to remotely torture, torment, hurt, and deceive victims without leaving evidence.  This technology is also capable of mind control, altering brain states and emotions. This leaves them discredited as they vainly seek help from ignorant or complicit authorities (police, MPs, doctors, media etc). This leaves them neutralized and possibly even silenced on the issue they originally raised. This, along with various research aspects, is the purpose of the exercise.

The situation is getting worse not better with more and more secretive, undemocratic legislation being sneaked past the unwary public all the time. State treachery and terrorism are behind it yet it is all hidden under the guise of “the war on terror”. For example, the US gov’t just passed the National Defense Authorization Act, 2012, giving the President (and others) the power to target and silence anyone questioning State corruption. When this is done openly in other countries the US is the first to condemn such evil yet when they are guilty of the same they do it in secret and no-one dares to criticize lest they join the ranks of those they persecute. So much for gov’t of the people, for the people and by the people. The criminals who do such things abuse their authority, betray our trust and secretly mock the democratic ideals they publicly support. They don’t serve us, they simply help themselves and their criminal associates. By using stealth they can feign ignorance and hide their true nature from most.

Eg. In the USA over 300,000 NSL’s (National Security Letters) have already been issued. These allow the agency targeting of innocent civilians whose objections to corruption / crime in high places have been deliberately skewed or misinterpreted as a threat to powerful people. Once placed in a program people can be abused and experimented on, from a distance (using satellites / high tech’). This effectively silences and discredits them while providing agency researchers with guinea pigs for experiments in control, brain function, health, robotics and much more. Post 9/11, $750 billion per year has been spent on satellite weapons used for human experimentation / targeting. Most of this has found it’s way from gov’t coffers to about 80 defense contractors who are also culpable for the crimes against humanity that are addressed on this site.

There is a circular / Catch 22 type problem in that governments use “classified” covers to hide criminal activity (esp. if it is an unconstitutional act) but targets can’t prove any of that BECAUSE it has been classified…. Eg. NSA Whistleblower William Binney in an interview points out that Executive Order 13526 section 1.7 (covering classified status allocation) specifically says that **”You cannot classify information merely to cover up a crime”**. Even if devices or procedures are classified this also applies to them and information on them when they are being used for criminal purposes. So, in theory, by misusing devices, abusing authority and so on the administration not only commits crimes but should open up the information relating to that for public scrutiny…(Government of, by and for the people). 

Now Presidents Obama and Bush both signed this executive order 13526 so if any of these hidden crimes was to be presented to the US Supreme Court then any current US leader could be impeached as having breached their oath of office…which includes upholding the constitution. The ECHELON spying system, neurophone harassment, remote neural monitoring, the use of directed energy weapons and more are all clearly crimes against the people and humanity in general and so by classifying the devices the government and it’s leaders are breaching the constitution as well. 

As with any crime the break in the loop between the acts, investigation, trial and incarceration is the lack of proof. “Classifying” information and calling it a matter of National Security negates the need for the criminals involved to even create excuses for their conduct. The ability of government to classify crime is what must be fought.

Also, the US military is supposed to be prohibited by law from targeting US citizens with PSYOPS within US borders under Executive Order S-1233, DOD directive S-3321.1 and National Security Directive 130. Of course there’s no-one to police that especially since Psyops, by their very nature, are difficult to prove. This is particularly so where the secret weapons discussed on this web site are employed. Also nothing stops agencies, US or allied, from doing that dirty work and hiding it under the National Security carpet. 

Also, previously The International Commitee of the Red Cross (ICRC) raised the issue of psychotronic weapons; firstly in 1994, then the 2002 Geneva Forum and then the 2009 5th Symposium on non-lethal weapons. The EUROPEAN PARLIAMENT passed a “Resolution on the Environment, Security and Foreign Policy” – A4-0005/99, January 28th, 1999 which called for “An international convention introducing a global ban on ALL development and deployment of weapons which might enable any form of manipulation of human beings”…”It is our conviction that this ban can not be implemented without the global pressure of the informed general public on governments. Our major objective is to get across to the general public the real threat which these weapons represent for human rights and democracy and to apply pressure on the governments and the parliaments around the world to enact legislation which would prohibit the use of these devices to both government AND private organisations as well as individuals”. (Plenary sessions / European Parliament, 1999). ]

Wednesday, January 29, 2025

June 25h..... Marriage of Two and Mark Mom Wine Glass. Why? Beast Maple Ridge June 25 = 176 Days in 189 Days Left. Don't Forget Jake and Tara and Their "Signs" (Beast, Wine, 666 and Torture Among Others)

 MOOG
Mary O (Moon) O (Sun) Grace
Established 1951
Former CEO Brady

Collogues at where?

TRINITY-21
 2 Come Together to Make 1
111

Jesuit Eclipse Symbol 32 Sun Rays
Eclipse Moon in Front of Sun
John 21 -  153 / 3 = 51


Who worked at Surrey Satellites before current place? Connections to Macdonald Dettwiler and Associates. Marco and Michelle that name sound familiar? 

Does Macdonald Dettwiler and Associates ring a bell? Connects to the Canadian Space Agency and NASA, among other things. (RCMP and CSIS) 

John Trudeau your wife deleted her Facebook, why? She was posting on Marco's Facebook. Marco why are you following Sophie Trudeau? I bet this is all a coincidence. 

See here for how Marco Brugman has interesting connections on his Facebook

Losers Marco and Michelle Brugman know Lori Graham and Billy Graham. Daniel Mate is following Lori Graham's Instagram.  Aaron Mate is his brother, he is a colleague of Max Blumenthal who wrote the 51-Day War about this war that happened over my Mom's birthday and mine. Right losers? Yes. I could put up a bunch of other losers in the community of Maple Ridge too. One was a former Mayor of the town and another a former Mayor of Pitt Meadows who was also a part of the RCMP for over 20 years. All are following Lori Graham and they know what is happening. I could put up a bunch more of you pathetic losers and maybe I will, you are all a fucking joke.


Billy Graham's Company on Marco Brugman's Facebook. Marco is just a lying piece of trash just like the whole Amery family. Marco Brugman, Michelle Brugman, and many others are involved with drugs and work with the CIA. They all live well while they stalk, surveil, and torture innocent people. This is 100% true, take a lie detector test psychos. You all know it is true.


SMITH-CUMMING
Smith (Grandmother Maiden name)
Cumming (Mother Maiden name)
007
British Intelligence and CSIS
and my Loser Family

My  Evil Backstabbing Aunt
Leviticus 16
16 for Scapegoat right? 
In Front of the Cross of Andrew
The Unicorn of Scotland
8+8
Moon in Front of the Sun

Posted 11th Month 9th Day
9/11
(FALL OF THE BERLIN WALL)
Loser Backstabing Cousin


The Book Takes Place During the Fall of the Berlin Wall in 1989

1989: The fall of the Berlin Wall is imminent and the Cold War will soon be over.
But for BOX 88, a top-secret spying agency known only to an inner circle
of MI6 and CIA operatives, the espionage game is heating up.

CSIS Headquarters in Canada

British Intelligence 





Tuesday, January 21, 2025

The Psychology of Narcissists and Psychopaths- You Read This Weasels, You Like Exploiting People?

See here and here for psychopaths. See here for narcissistic supply. See here for why the CIA only hires narcissists and sociopaths.  See here for a Mossad agent talking how they think they are God, this equally applies to the Five Eyes Intelligence agencies. See here for all the different agencies and how they are violating the rights of individuals all over Canada and the USA. See here for all of the laws they are violating. 

B.A.I.T.E.R (Backstabber, Abuser, Impostor, Taker, Exploiter and Reckless)

1. Arrogant entitlement 2. A complete lack of empathy 3. No remorse or guilt 4. Irresponsible and self destructive 5. They thrive on drama 6. They brag about out smarting people 7.  A lot of short term relationships or high levels of infidelity... they almost always claim to be the victim 8. They are con artists and liars  9. Use comedy, praise or charm to bring down your guard 10. Use of gaslighting 

2. Another category - Phony religious people, phony humanists and human rights activists, phony "law enforcers", phony law makers, and phony politicians 



Friday, January 17, 2025

The CBC Was Following My Twitter Account Before it Was Taken Down- See Proof



Note: this was originally posted in December of 2016 with my old Twitter account that was taken down. If the CBC was following my Twitter account, (see screenshot below, see where it says under CBC pic "follows you") who else do you think knows about what is happening in Canada? Freedom in Canada... give me a break. 

The information I was putting out was so controversial and explosive. The CBC knows this, that's why they won't talk about it.  That is also why you should be following this blog. Click on the picture below to enlarge it, and see how they were following me. 

Keep this in mind when you read this blog post and this blog post

(Click on Pic Above to Enlarge, See Where it Says '@CBC Follows You')

Originally posted in March of 2019, Proof That the Israeli Government is Following Me at the Highest Level: Another Israeli Who Blocks Me Because I'm Intolerant Of Their Intolerance (See Picture)



Not only am I being followed at the highest levels of my own country, but, I'm also followed at the highest levels of Israeli government. See the PROOF below! 

See the screenshot pictures and the video below! 

One is a screenshot from the CSE of Canada Twitter account, which is the equivalent of the NSA in the USA, the CSE is the military intelligence of Canada. As you can see, they were blocking me. The other screenshot is from someone in the Israeli government at the highest level, in fact, you can see her in the former Prime Minister of Israel's (Benjamin Netanyahu,) cabinet picture below. I had no idea who this woman was until I read an article about her, looked her up and found her Twitter account. As you can see, she was blocking my old Twitter account that was banned. 

See her Wikipedia here. For some of her interesting comments see here. Here is a small sample of her loving disposition: “May you be raped in your grave,” says the new darling of Israel’s ruling Likud party. Sounds like this charmer here who said Palestinian mothers give birth to “little snakes.”  I am used to being blocked, it is no different than the Canadian Military Intelligence Agency that blocks me. (See picture below.) For more of this classic Israeli and Jewish intolerance, see this soccer game in Israel

Imagine if we had people in the Canadian government saying this? Thankfully we don't --- they just kiss the asses of the people who believe such insanity. See here for more about Judaism. 

See her in red in center. Click on pic above to enlarge, she is right behind
Benjamin Netanyahu (the previous Prime Minister,) and right beside the
 current Prime Minister of Israel. 


Watch 30 Seconds into the video to see her!

Tuesday, January 14, 2025

THE BOX- WHAT IS THE BEAST HORSE IN MAPLE RIDGE ON? You Know Who You Are - Your Day Will Come





Here is a Movie You People Might Like to Watch Called The Box 
Involves the NSA, CIA, and NASA takes place in 1976 (Year I Was Born)
The Box is about the Cube,  Judas Iscariot, and testing humanity's worthiness.
Did you take the 30 pieces of silver like Judas? Do you care about the TRUTH?
Judas and his money bag, the kiss of betrayal.

Satan is a slanderer, deceiver, temper, leads people astray, but also an accuser and judge
(All Stalking Losers Watch This)

Political Corruption and Bondage- Marque De Sade Style






Wednesday, January 8, 2025

Watch the Video Below - Was This Osama bin Laden? Marco and Michelle? You Guys Better Start Telling the Truth (Michelle Blocking People on Your Facebook Will Not Stop the TRUTH)

Anything to Say? 

Is this not EVIL?  Marco see here and see below. 

See here for who really did this.

1992 Sesame Street
The guy's name in the clip from Sesame Street below is Louise. 
It is connected to Lucifer see here.


The Simpsons From an Episode in 1997:
(See here for Jewish control of Hollywood)


You have to understand there is a connection between the number 23 and the September 11th attacks. See here and here for more about the dates on the Hebrew calendar.  The September 11th attacks = 23, add it up: 9+11+2+0+0+1=23. World Trade Center = WTC. W is the 23rd letter of the Alphabet, T is the 20th letter of the Alphabet, C is the 3rd letter of the Alphabet. So, WTC = 46 (Twin Towers.) 46-23= 23. The Twin Towers were like the number 11 as they stood side by side. The date of the attack: 9/11= 9+1+1=11. The sentence "September 11" consists of 9 letters and 2 numbers = 9+2=11. September 11th is the 254th day of the year= 2+5+4=11. After September 11, there are 111 days left to the end of the year.








Thursday, December 26, 2024

Latest Articles On Torturing People With Technology That is Covered Up- David Salinas Flores- Faculty of Medicine Universidad Nacional Mayor de San Marcos, Peru

Below are three interesting articles, read them all. Also, watch this documentary about experimenting on people with classified technology. Pure evil. The intelligence agencies and many police officers of the Western world are very aware of this technology. See here for more about Homeland Security. This is how truly sick our countries are. They rule over us and they work with criminals.

1.. The secret of the neuroscience boom: are there secret human experiments in Latin America? (Download this)
2. Transhumanism: the big fraud towards digital slavery 
(Download this)

Also, read this past article here:  Slavery By Satellite - Must-Read Article From Academics (Download this)


Does anyone Know People Working With Intelligence Agencies and Drug Cartels?



Sunday, December 1, 2024

Where's the Justice? Silicon Valley Billionaire Scum Along With the CIA and NSA: Must Watch Documentary Below- Learn the History of Manipulation of Human Beings With Classified Technology (Many Silicon Valley Billionaires, Electrical Engineers, Computer Scientists, Neuroscientists, Psychologists, Psychiatrists Know About This & Are Complicit in Covering it Up)


See here for more about Ewen Cameron.  See here for a list of government agencies involved in covering up the human rights abuses and torture that continues now.  

See here and here for more about classified and hi-technology. See here for more about MkUltra. (Be sure to scroll down and go through all of the articles when you click through on the MkUltra link.) See here for more about Transhumanism. (Be sure to scroll down and go through all of the articles and videos when you click on the Transhumanist link.)

The documentary below is an absolute must watch. Be sure to watch the whole presentation. You will learn how long this technology has been around and the massive human rights abuses that have been perpetrated. This is something that is rarely talked about, in fact, it is extremely difficult to find information on this topic. Be sure to watch this old news clip from CNN in the 80's. Also interesting are movies from the 80's like Videodrome and Brainstorm



Thursday, August 8, 2024

Targeted Individual Program is US Special Operations Command’s “Continuous Clandestine Tagging, Tracking, and Locating Hostile Forces


Click on Links Below to Read the
 Government Documents


The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program." 

These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”

The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment. 

Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:

1) Tagging, Tracking, and Locating Human (High-value) targets aka “hostile forces” to support the Global War On Terrorism (GWOT)
2) Technologies include:
Nanotechnology (including Quantum Dot and Self-assembled Photonic Antenna)
Biotechnology (including “biomimetic devices for detection and identification at long distances” and “Taggants for Biological Signature Amplification, Translation,”)
Chemistry (including “signature enhancing Taggants” and “chemical/biochemical sensors for natural signatures”)
3) Participating agencies include: DARPA, Army Research Lab, NSA, DIA, CIA, Homeland Security, FBI,  Air Force Research Lab, DOE, and Industry
4) Human signature detection via skin spectral emissivity's, thermal fingerprints at long distance
5) fieldable “bio-electronics”
6) bio-engineered signature translation and bio-reactive taggant (implant)
7) self-assembled photonic antennae
8) biometrics and tactical site exploitation (forensics)
9) Operation “Silent Dagger” 
10) Ground SIGINT (Signals Intelligence) Kit (GSK)
11) Joint Threat Warning Systems from the Air, Land, and Sea
12) RF (radio-frequency) and non-traditional (eg., optical/multi-band) Tags and R/Xs
13) “synchronize acquisition of signals intelligence (SIGINT) capabilities across the air, ground and maritime (warfare) domains”
14) SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION
15) Blue Force Tracking (BFT)
16) Special Operations Tactical Video Systems (SOTVS)
17) Sensitive Site Exploitation (SSE)
18) tiny satellites that keep tabs on targets from above (SpaceX rocket carrying the CubeSats—inexpensive satellites so small they can fit in the palm of your hand)
19) tracking satellites are part of the growing Special Operations focus on “high-value target” missions
20) tracking tags on enemies including radio frequency identification devices, quantum dots that could be used to track a singe molecule, and tagging measures such as insect pheromones
To acquire the high-value human “targets” needed to test and develop these clandestine weapons systems, the US government, through the FBI-DHS Fusion Centers and Neighborhood Watch Programs among others, has mislabeled innocent citizens as “terrorists” and “hostile forces.” Thus, ALL involved in these operations are complicit in “crimes against humanity,” “war crimes,” murder, attempted murder, torture, terrorism, and TREASON. These individuals and institutions are the real terrorists and they are TRAITORS!

These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.

I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)


by Doug Richardson SOAL-T WSO, Sept. 5, 2007

Also at: Continuous Clandestine Tagging, Tracking, and Locating (CTTL) Mr. Doug Richardson SOAL-T WSO5 September 2007 US Special Operations Command

Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.

Highlights From PPT:

p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)

– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets

- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)

- Forces Require an Ability to Apply and Monitor Tags

- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.

p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army

- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR

- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.

p. 7: CTTL– Key Enabling Technologies

- Nanotechnology

Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting

Biotechnology

Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID

Chemistry

Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures

p. 8: CTTL– Partnership for Transition–

- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition

PEO-Special Projects
PEO-Intelligence and Information Systems

- Collaborative Execution of S&T

DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories

p. 13: CTTL — Human Signature Detection

- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later

Goal: Verification of Capability and Operational Value Within 2 Years

Human Thermal Fingerprint at Long Distance

p. 14: CTTL –Human Signature Detection —

Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years

Synthetic Dog’s Nose Sensor


p. 15: CTTL — Signature Amplification/Translation

Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years

Current Capability – Bioengineered Signature Translation

p. 16: CTTL — Nano-scale Devices

Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna

II. UNCLASSIFIED Mr. Douglas Richardson Program Executive Officer SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION

III. SPECIAL RECONNAISSANCE Mr. David Breede, Program Executive Officer SPECIAL OPERATIONS FORCES INDUSTRY CONFERENCE EXPANDING THE COMPETITIVE SPACE

Wednesday, July 10, 2024

We are Hackable Animals

There you go. No more rights. Here is the wikipedia of the guy that is featured in the top video below.  In the bottom video is Sergey Brin, the co-founder of Google along with Klaus Schwab, the founder of the World Economic Forum. Have you ever seen the movie the Circle, which is loosely based upon Google? Remember the Google Chrome circle? Do you remember in the movie how they were following the guy around? This is organized stalking

The guy in the top video is Dr Yuval Noah Harari, see interviews with him herehere, and here with James Altucher. I have written previously about James Altucher herehere, and here, The video proves what I am saying. James is a computer scientist, Yuval isn't, but he knows about this. (It is worth mentioning, James is not the only one covering this up.)


Monday, July 8, 2024

Brain Computer Interfaces, Mind Control and Surveillance

See past video with Steve Hoffman here. Some one in Silicon Valley that actually tells some of the truth. Think of how many of them know this and say absolutely nothing