Exposing Intelligence Agency Human Rights Abuses, Government and Corporate Corruption Along with the Problems of Zionism. The Foundation of Freedom is Freedom of Thought and Freedom of Speech
Tuesday, January 27, 2015
Homeland Security and the Alternative Media
Watch The Video At The Bottom!
Forward Note: It is important to realize that one of the goals of Homeland Security is protecting the one percent. See here, here, here, here and here for more about who the one percent are. (See this document and this video to see what official government documents are saying, that we will see an increase between the "haves" and the "have-nots," and that that the "haves" are going to start seeing the "have-nots" as a potential problem.) At the bottom of this article, I have posted four audios for you to listen to along with one video to watch. Please take the time to do so. But, before you do this ... make sure you read the article! Please also read these articles when you have time:
1. Homeland Security - Organized Stalking and Militant Zionism
2. Zersetzung - The Origins of Modern Day Homeland Security and the Police State
3. Zersetzung - The Origins of Modern Day Homeland Security and the Police State Part 2
4. Zersetzung Part 3 - The New Homeland Security
5. FBI Memo Labels Patriots, Truth-Seekers as Potential 'Terrorists'
6. The ADL That Works With the RCMP and the FBI - and it's Ties to Organized Crime
7. An Interesting Video About Smearing Political Enemies
8. 72 Types That Are Considered “Potential Terrorists” In Official Government Documents
9. Learning About the Origins of "Homeland Security"
10. Full-Spectrum Dominance and No-Touch Reality TV Torture
===========================================================================
What does the alternative media have to do with drugs, real estate, and mining companies? Most of the alternative media is a part of the New Phoenix program. What is the Phoenix Program? It is basically like Mao's Hundred Flowers Campaign. In other words, it is a form of COINTELPRO. It is a way to bring the "snakes" out of their den. What better way to find potential political dissidents of the policies of NATO and Israel?
This is why you see some alternative media websites selling gold and silver. It is a vicious system, with connections between organized crime, intelligence agencies, silicon valley, the media and corrupt individuals and banks in the financial industry. They also have front companies in various guises because over 50% of intelligence is now being outsourced. Some of these front companies are even drug dealing operations. (See here for more information about connections between the CIA and drugs.)
These front companies are involved in gathering intelligence and using Stasi stalking techniques to ruin people's lives. They can pose as a variety of different businesses and professions. Some that I know about are writers, escorts, mining companies, trading education businesses, hedge funds, prop trading firms, martial arts businesses, CrossFit-gyms, yoga centers, property management, real-estate agents, mortgage brokers, landscaping and gardening businesses, home renovations (especially mold or mildew from grow operations,) graffiti removal and pest control.
Watch the video at the bottom of this page, then listen to the audio interviews that are located below the video. What you will find is that the Phoenix program was the precursor to Homeland Security and its Canadian equivalent.
When you think about Homeland Security, see here, here, here, here, here, here and here.
In May 25, 2007, the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still images produced by programs such as Google Earth. See here and here for more.
But that's not all, these people have access to technology that can find oil and mineral deposits underground with up to 99% accuracy. (See this ad from Shell as an example. Also, see here for an example of synthetic aperture radar satellites.) That includes diamonds! That is why so many of the alternative media radio show hosts sell gold and silver etc. They can rape the planet and hoard all its resources. (Who do you really think is behind most of the mainstream and alternative media? The same people that are behind the banks. The financiers and the companies that sell the resources that are being pulled out of the ground.) This is why Africa is being held down. This is what AFRICOM is truly about.
But that is far from all they can do. In a nutshell, they can put you under horrible crippling surveillance and they can shoot you and your family with space-based weapons. See here for more about electronic warfare.
Ever wonder what they do at the NSA and CSE in Canada with Signals Intelligence? Or better yet, who has access to it? It is pretty much class warfare. It is being used by wealthy criminals against the general public for surveillance, entertainment, (reality TV-like torture and voyeurism,) weaponization that can injure or kill someone in a plausibly deniable way, intellectual property theft, drug running, human trafficking and insider trading.
Ever wonder what they do at the NSA and CSE in Canada with Signals Intelligence? Or better yet, who has access to it? It is pretty much class warfare. It is being used by wealthy criminals against the general public for surveillance, entertainment, (reality TV-like torture and voyeurism,) weaponization that can injure or kill someone in a plausibly deniable way, intellectual property theft, drug running, human trafficking and insider trading.
Echelon is involved in Signals Intelligence. Please also see here for radiation intelligence and TEMPEST. See this video and this video for an example using a computer. It is important to realize that Signals Intelligence covers everything from intercepting signals to surveillance and electronic warfare.
Please see Earth-Penetrating Tomography, Interferometry, Earth's Field NMR, Nuclear Magnetic Resonance and Electron Paramagnetic Resonance. The imagers are multi-purpose, the imaging transmitters serving to target locations, areas and living animals with directed energy. There are passive and active modes, the active mode requires the transmission of signals into the target where passive mode allows imaging with illumination occurring by other means like spying through leaking electrical emanations, including unintentional radio or electrical signals, sounds, and vibrations. Do you know what else has unintentional leaking electrical signals and vibrations? You! You are an antenna!
What You Are:
1. The Body Electric: Electromagnetism And The Foundation Of Life
2. Electromagnetism and Life
3. You are an Antenna
2. Electromagnetism and Life
3. You are an Antenna
(See here, where the physicist Dr. John Morgan says 2 minutes and 10 seconds into the video, that all natural things emit radio waves. Watch this video with Michael Persinger where he talks about how light and photons can be measured. Also, take notice in this video when the physicist mentions that the brain "radiates" radio.)
You also have magnetite in your brain. Magnetite is the most magnetic of all the naturally-occurring minerals on Earth and is also used in the creation of the hard drive in your computer. Now, realize that the earth magnetic field allows for information storage too, see this video about the earth's magnetic field and information storage. Learn about magnetism and information storage: which is the same as your computer hard drive. Taking this information into consideration, it can be used along with nanotechnology, for holography and synthetic telepathy. (See here and here for examples of holography, here for more about nanoparticle imaging and here for more about molecular imaging.)
You are exactly like this says, your mind has no firewall: https://www.docdroid.net/mmsy/mind-no-firewall.pdf.html you are surrounded by wireless communication and that immerses you in the background or the "shadow" of communications systems. So, besides all of us being embedded in the earth's magnetic field, (something that is EXTREMELY important because of the Schumann Resonance and its relation to the brain and the mind and specifically, the Hippocampus which is the gateway to consciousness, memory and information storage. If you access the Hippocampus you can garner all of the information that is being consolidated in an individuals experience.) We are all embedded in a homogeneous secondary field called the communications system, and, much of it is pulsed in the range of the brain. We are quite literally, living in the shadow of a massive electromagnetic field that is generated by our communications systems.
You also have magnetite in your brain. Magnetite is the most magnetic of all the naturally-occurring minerals on Earth and is also used in the creation of the hard drive in your computer. Now, realize that the earth magnetic field allows for information storage too, see this video about the earth's magnetic field and information storage. Learn about magnetism and information storage: which is the same as your computer hard drive. Taking this information into consideration, it can be used along with nanotechnology, for holography and synthetic telepathy. (See here and here for examples of holography, here for more about nanoparticle imaging and here for more about molecular imaging.)
You are exactly like this says, your mind has no firewall: https://www.docdroid.net/mmsy/mind-no-firewall.pdf.html you are surrounded by wireless communication and that immerses you in the background or the "shadow" of communications systems. So, besides all of us being embedded in the earth's magnetic field, (something that is EXTREMELY important because of the Schumann Resonance and its relation to the brain and the mind and specifically, the Hippocampus which is the gateway to consciousness, memory and information storage. If you access the Hippocampus you can garner all of the information that is being consolidated in an individuals experience.) We are all embedded in a homogeneous secondary field called the communications system, and, much of it is pulsed in the range of the brain. We are quite literally, living in the shadow of a massive electromagnetic field that is generated by our communications systems.
Beyond what I have explained, foot soldier intelligence operatives and criminals have technology that is similarly displayed in these videos (also see here, here and here.) that can influence people at a distance. Light can be measured, (photons,) minds can be read, thoughts can be sent. If you can think it, you can send it. Just like writing an email with your mind. Zuckerberg is saying it here, he is just not telling you the whole story. Also see here for another article with Mark Zuckerberg referring to synthetic telepathy. See here for a Cisco ad that talks about this technology.
So, essentially they have access to your vital signs, the EEG readouts of your brainwaves to know what you are thinking, the ability to see out of your eyes and hear out your ears. This is called Total Information Awareness, (also see here,) meaning they will soon have access to every piece of information on this planet. (See here, here and here for more.) They can also put thoughts in your head and hook you up to another individual's brain. When engaging in the latter, if an individual changes the EEG of his or her brain, that individual can change the EEG of another brain that they are hooked up to. Or in other words, two brains can effectively become one.
So, essentially they have access to your vital signs, the EEG readouts of your brainwaves to know what you are thinking, the ability to see out of your eyes and hear out your ears. This is called Total Information Awareness, (also see here,) meaning they will soon have access to every piece of information on this planet. (See here, here and here for more.) They can also put thoughts in your head and hook you up to another individual's brain. When engaging in the latter, if an individual changes the EEG of his or her brain, that individual can change the EEG of another brain that they are hooked up to. Or in other words, two brains can effectively become one.
NOW FINALLY...
After you watch the videos and listen to the audio interviews below, ask yourself this question ... why are none of the hosts on these podcasts talking about space-based weaponry and the level of surveillance that I'm talking about on this blog?
1. American Government Is Conducting Covert Warfare On Citizens Says Researcher
2. Vietnam, the Phoenix Program, the CIA/DEA Connection
3. The New Homeland Security Phoenix Program
4. Phoenix Program a Precursor to the Department of Homeland Security in the post-9/11
5. The CIA’s “Phoenix Program” in Vietnam and the “War on Terror”
Monday, January 5, 2015
A Collection of Posts About Israel
1. Five Must Read Books About Israel and Jewish Identity
2. Canada and Stephen Harper: Always Stand Behind Israel?
3. Comments Made About Stephen Hawking After He Decides to Boycott Israel
4. U.S.S. Liberty
5. Israel's Secret Nuclear Weapons Program and Mordechai Vanunu
6. Drowning Ideologies-Israel-911-and the NSA
7. Canada-Israel: the Other Special Relationship
8. Zionism Like Racism- Has to Go...
2. Canada and Stephen Harper: Always Stand Behind Israel?
3. Comments Made About Stephen Hawking After He Decides to Boycott Israel
4. U.S.S. Liberty
5. Israel's Secret Nuclear Weapons Program and Mordechai Vanunu
6. Drowning Ideologies-Israel-911-and the NSA
7. Canada-Israel: the Other Special Relationship
8. Zionism Like Racism- Has to Go...
Sunday, January 4, 2015
Tweet From a Doctor in Gaza
Please see my last post on Depleted Uranium in Iraq. Be sure to watch the videos so you truly see how little "THEY" care about "YOUR" soldiers. The second video is the most important one. Get it in your head, they don't care!
Don't be afraid/disgusted
This isn't movies effects
This is what Israel has done to #Gaza's kids
THIS BROKE MY HEART pic.twitter.com/DIjx14Vx1I
— Dr.Bassel AbuWarda (@DrBaselAbuwarda) September 9, 2014
Friday, December 19, 2014
Canadian Spy Agency Drops Canada From Name - Why?
See here for more information. Why would they do this? As I have been exposing on this blog... it's because they don't work for YOU or Canadians. Well, that's not completely true. They do work for a certain segment of the population. Namely, the "moneyed" class. They can see, watch and listen to everything you are doing. They can see inside of your house! They can see around the world. They can pick anyone they want to focus on.
Can you do this? Are you allowed access to this technology? You pay for this, they can use it on you.
You are essentially a gullible tax paying slave. These people are not there to protect you. If you believe this, you are a fool.
Why do you think the taxpayer-supported CBC FAILS TO REPORT ANY OF THIS IMPORTANT INFORMATION? These people know what they are doing and what they are covering up from you. It truly is that insane. Once again, no word whatsoever from ANY Canadian media. Did you know that Canadian media is one of the most controlled in the world?
See these videos for more information on the control of Canadian Media:
1. https://www.youtube.com/watch?v=KJ4BIzCmrF8
2. https://www.youtube.com/watch?v=d8D67YiLcOM
3. https://www.youtube.com/watch?v=fiurWhmOIgk
4. https://www.youtube.com/watch?v=iRnZ43wxGvY
CBC even follows me on Twitter. They know how screwed up it is, they know what I'm talking about is real. The people that run your country, the banks, and the corporations think you are a bunch of stupid idiots. These people are laughing at you. They think you are stupid tax paying fools.
Maybe you are ---- if you believe what they tell you. I hope not. Prove me wrong. Prove to me that you care.
The information on this blog is true. This is the bravado of the people in power. This is why you have "fake" strippers running to be the Prime Minister, (they aren't even real strippers!) and frothing-at-the-mouth groveling boot-licking Conservatives like Harper. See here, here and here for more on this. Who, quite truthfully... isn't even following anything in the New Testament.
They literally have absolute contempt for you people. They lie to you every single day. They are compulsive liars that will say anything so they can continue to hold the reins of power.
Can you do this? Are you allowed access to this technology? You pay for this, they can use it on you.
You are essentially a gullible tax paying slave. These people are not there to protect you. If you believe this, you are a fool.
Why do you think the taxpayer-supported CBC FAILS TO REPORT ANY OF THIS IMPORTANT INFORMATION? These people know what they are doing and what they are covering up from you. It truly is that insane. Once again, no word whatsoever from ANY Canadian media. Did you know that Canadian media is one of the most controlled in the world?
See these videos for more information on the control of Canadian Media:
1. https://www.youtube.com/watch?v=KJ4BIzCmrF8
2. https://www.youtube.com/watch?v=d8D67YiLcOM
3. https://www.youtube.com/watch?v=fiurWhmOIgk
4. https://www.youtube.com/watch?v=iRnZ43wxGvY
CBC even follows me on Twitter. They know how screwed up it is, they know what I'm talking about is real. The people that run your country, the banks, and the corporations think you are a bunch of stupid idiots. These people are laughing at you. They think you are stupid tax paying fools.
Maybe you are ---- if you believe what they tell you. I hope not. Prove me wrong. Prove to me that you care.
The information on this blog is true. This is the bravado of the people in power. This is why you have "fake" strippers running to be the Prime Minister, (they aren't even real strippers!) and frothing-at-the-mouth groveling boot-licking Conservatives like Harper. See here, here and here for more on this. Who, quite truthfully... isn't even following anything in the New Testament.
He's a Phony
They literally have absolute contempt for you people. They lie to you every single day. They are compulsive liars that will say anything so they can continue to hold the reins of power.
Sunday, December 7, 2014
The Israel You Don't Hear About in the Media - MUST SEE VIDEOS
I have two interesting videos to watch below. They show more of the Israel your government doesn't want you to see. This is the state that Stephen Harper will stand behind no matter what.
In the United States and Canada, we hear endless talk about Islamic fundamentalism and the problems of terrorists from the Islamic faith. Now, I'm not saying there isn't problems with Islamic terrorism.
But, everything seems to get thrown into the same category of "Islamic terrorism" from a desperate Palestinian who straps a bomb to himself because he just lost his whole family ---- to ----- ISIS.
ISIS specifically, are mostly from the radical Sunni Wahabi brand of Islam. What is usually left out in the media is that the United States and Israel are allies with many of the states that produce these radical terrorists. Especially Saudi Arabia. The United States and Israel have no problem yapping all day long about Iran, but they are allies with truly fundamentalist states. I have even heard the former Ambassador of Israel to the United States say, that "given the current circumstances, we are better off to be allies with the Sunnis in the middle east." These are the same "freedom fighters" that are helping the western powers fight against Syria. The United States and Israel can use these people in the same way that the United States used the Mujahideen to fight against the Soviet Union in Afghanistan.
Now, I'm not saying that every person in the United States or the Israeli military believes in this strategy, but, this seems to be what they are currently doing. I think he let the cat out of the bag. He basically said what I thought they were doing the whole time.
Now, why would the former Ambassador say that? Well, according to him, these crazy nut jobs don't have any nuclear weapons or any aspirations to build such a thing. Unlike what Iran is supposedly doing. Even though Iran has submitted to nuclear inspections from the IAEA, unlike the state of Israel. BUT, this didn't stop the United States from putting crippling sanctions against the Iranian people.
In the end you have to ask yourself, who are the terrorists? Where do they come from? Why is the United States and Israel allies with states that sponsor Islamic terrorism?
Now, please watch these videos below:
But First... Let's Deal With a Few Others Issues
In the United States and Canada, we hear endless talk about Islamic fundamentalism and the problems of terrorists from the Islamic faith. Now, I'm not saying there isn't problems with Islamic terrorism.
But, everything seems to get thrown into the same category of "Islamic terrorism" from a desperate Palestinian who straps a bomb to himself because he just lost his whole family ---- to ----- ISIS.
ISIS specifically, are mostly from the radical Sunni Wahabi brand of Islam. What is usually left out in the media is that the United States and Israel are allies with many of the states that produce these radical terrorists. Especially Saudi Arabia. The United States and Israel have no problem yapping all day long about Iran, but they are allies with truly fundamentalist states. I have even heard the former Ambassador of Israel to the United States say, that "given the current circumstances, we are better off to be allies with the Sunnis in the middle east." These are the same "freedom fighters" that are helping the western powers fight against Syria. The United States and Israel can use these people in the same way that the United States used the Mujahideen to fight against the Soviet Union in Afghanistan.
Now, I'm not saying that every person in the United States or the Israeli military believes in this strategy, but, this seems to be what they are currently doing. I think he let the cat out of the bag. He basically said what I thought they were doing the whole time.
Now, why would the former Ambassador say that? Well, according to him, these crazy nut jobs don't have any nuclear weapons or any aspirations to build such a thing. Unlike what Iran is supposedly doing. Even though Iran has submitted to nuclear inspections from the IAEA, unlike the state of Israel. BUT, this didn't stop the United States from putting crippling sanctions against the Iranian people.
In the end you have to ask yourself, who are the terrorists? Where do they come from? Why is the United States and Israel allies with states that sponsor Islamic terrorism?
Now, please watch these videos below:
Friday, December 5, 2014
Silicon Valley, Is It Worse Than Big Oil And Wall Street?
If you check out my Twitter located here: https://twitter.com/ShaneHurren1, you'll notice that much of my ranting has been directed towards silicon valley companies. Primarily, Google, Twitter, Facebook. Why? Well, quite simply, these companies are fronts for the NSA and the CIA. Below is an excellent article that gives a greater explanation about what is going on there. They don't tell you everything, see here and here for the bigger picture. Also, the whole idea that the National Geospatial-Intelligence Agency (NGA) helped the military and CIA locate and kill Osama bin Laden is laughable. In fact, they would have known where he was the whole time. The real question you should ask yourself is this ... why did they take so long to kill him? Actually maybe a better question would be... why did they kill him?
August 19, 2014 - by Adam Hudson
Silicon Valley has been in the media spotlight for its role in gentrifying and raising rents in San Francisco, helping the NSA spy on American citizens, and lack of racial and gender diversity. Despite that, Silicon Valley still has a reputation for benevolence, innocence and progressivism. Hence Google's phrase, "Don't be evil." A recent Wall Street Journal/NBC News poll found that, even after the Snowden leaks, 53% of those surveyed had high confidence in the tech industry. The tech industry is not seen as evil as, say, Wall Street or Big Oil.
One aspect of Silicon Valley that would damage this reputation has not been scrutinized enough—its involvement in American militarism. Silicon Valley's ties to the National Security State extend beyond the NSA's PRISM program. Through numerous partnerships and contracts with the U.S. military, intelligence and law enforcement agencies, Silicon Valley is part of the American military-industrial complex. Google sells its technologies to the U.S. military, FBI, CIA, NSA, DEA, NGA, and other intelligence and law enforcement agencies, has managers with backgrounds in military and intelligence work, and partners with defense contractors like Lockheed Martin and Northrop Grumman. Amazon designed a cloud computing system that will be used by the CIA and every other intelligence agency. The CIA-funded tech company Palantir sells its data-mining and analysis software to the U.S. military, CIA, LAPD, NYPD, and other security agencies. These technologies have several war-zone and intelligence-gathering applications.
First, a little background to explain how the military has been involved with Silicon Valley since its conception as a technology center. Silicon Valley's roots date back to World War II, according to a presentation by researcher and entrepreneur Steve Blank. During the war, the U.S. government funded a secret lab at Harvard University to research how to disrupt Germany's radar-guided electronic air defense system. The solution -- drop aluminum foil in front of German radars to jam them. This birthed modern electronic warfare and signals intelligence. The head of that lab was Stanford engineering professor Fred Terman who, after World War II, took 11 staffers from that lab to create Stanford's Electronic Research Lab (ERL), which received funding from the military. Stanford also had an Applied Electronics Lab (AEL) that did classified research in jammers and electronic intelligence for the military.
In fact, much of AEL's research aided the U.S. war in Vietnam. This made the lab a target for student antiwar protesters who nonviolently occupied the lab in April 1969 and demanded an end to classified research at Stanford. After nearly a year of teach-ins, protests, and violent clashes with the police, Stanford effectively eliminated war-related classified research at the university.
The ERL did research in and designed microwave tubes and electronic receivers and jammers. This helped the U.S. military and intelligence agencies spy on the Soviet Union and jam their air defense systems. Local tube companies and contractors developed the technologies based on that research. Some researchers from ERL also founded microwave companies in the area. This created a boon of microwave and electronic startups that ultimately formed the Silicon Valley known today.
Don't be evil, Google
Last year, the first Snowden documents revealed that Google, Facebook, Yahoo!, and other major tech companies provided the NSA access to their users' data through the PRISM program. All the major tech companies denied knowledge of PRISM and put up an adversarial public front to government surveillance. However, Al Jazeera America's Jason Leopold obtained, via FOIA request, two sets of email communications between former NSA Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt. The communications, according to Leopold, suggest "a far cozier working relationship between some tech firms and the U.S. government than was implied by Silicon Valley brass" and that "not all cooperation was under pressure." In the emails, Alexander and the Google executives discussed information sharing related to national security purposes.
But PRISM is the tip of the iceberg. Several tech companies are deeply in bed with the U.S. military, intelligence agencies, and defense contractors. One very notable example is Google. Google markets and sells its technology to the U.S. military and several intelligence and law enforcement agencies, such as the FBI, CIA, NSA, DEA, and NGA.
Google has a contract with the National Geospatial-Intelligence Agency (NGA) that allows the agency to use Google Earth Builder. The NGA provides geospatial intelligence, such as satellite imagery and mapping, to the military and other intelligence agencies like the NSA. In fact, NGA geospatial intelligence helped the military and CIA locate and kill Osama bin Laden. This contract allows the NGA to utilize Google's mapping technology for geospatial intelligence purposes. Google's Official Enterprise Blog announced that "Google’s work with NGA marks one of the first major government geospatial cloud initiatives, which will enable NGA to use Google Earth Builder to host its geospatial data and information. This allows NGA to customize Google Earth & Maps to provide maps and globes to support U.S. government activities, including: U.S. national security; homeland security; environmental impact and monitoring; and humanitarian assistance, disaster response and preparedness efforts."
Google Earth's technology "got its start in the intelligence community, in a CIA-backed firm called Keyhole," which Google purchased in 2004, according to the Washington Post. PandoDaily reporter Yasha Levine, who has extensively reported on Google's ties to the military and intelligence community, points out that Keyhole's "main product was an application called EarthViewer, which allowed users to fly and move around a virtual globe as if they were in a video game."
In 2003, a year before Google bought Keyhole, the company was on the verge of bankruptcy, until it was saved by In-Q-Tel, a CIA-funded venture capital firm. The CIA worked with other intelligence agencies to fit Keyhole's systems to its needs. According to the CIA Museum page, "The finished product transformed the way intelligence officers interacted with geographic information and earth imagery. Users could now easily combine complicated sets of data and imagery into clear, realistic visual representations. Users could 'fly' from space to street level seamlessly while interactively exploring layers of information including roads, schools, businesses, and demographics."
How much In-Q-Tel invested into Keyhole is classified. However, Levine writes that "the bulk of the funds didn’t come from the CIA’s intelligence budget — as they normally do with In-Q-Tel — but from the NGA, which provided the money on behalf of the entire 'Intelligence Community.' As a result, equity in Keyhole was held by two major intelligence agencies." Shortly after In-Q-Tel bought Keyhole, the NGA (then known as the National Imagery and Mapping Agency or NIMA) announced it immediately used Keyhole's technology to support U.S. troops in Iraq at the 2003-2011 war. The next year, Google purchased Keyhole and used its technology to develop Google Earth.
Four years after Google purchased Keyhole, in 2008, Google and the NGA purchased GeoEye-1, the world's highest-resolution satellite, from the company GeoEye. The NGA paid for half of the satellite's $502 million development and committed to purchasing its imagery. Because of a government restriction, Google gets lower-resolution images but still retains exclusive access to the satellite's photos. GeoEye later merged into DigitalGlobe in 2013.
Google's relationship to the National Security State extends beyond contracts with the military and intelligence agencies. Many managers in Google's public sector division come from the U.S. military and intelligence community, according to one of Levine's reports.
Michele R. Weslander-Quaid is one example. She became Google's Innovation Evangelist and Chief Technology Officer of the company's public sector division in 2011. Before joining Google, since 9/11, Weslander-Quaid worked throughout the military and intelligence world in positions at the National Geospatial-Intelligence Agency, Office of the Director of National Intelligence, National Reconnaissance Office, and later, the Office of the Secretary of Defense. Levine noted that Weslander-Quaid also " toured combat zones in both Iraq and Afghanistan in order to see the tech needs of the military first-hand."
Throughout her years working in the intelligence community, Weslander-Quaid "shook things up by dropping archaic software and hardware and convincing teams to collaborate via web tools" and "treated each agency like a startup," according to a 2014 Entrepreneur Magazine profile. She was a major advocate for web tools and cloud-based software and was responsible for implementing them at the agencies she worked at. At Google, Weslander-Quaid's job is to meet "with agency directors to map technological paths they want to follow, and helps Google employees understand what's needed to work with public-sector clients." Weslander-Quaid told Entrepreneur, "A big part of my job is to translate between Silicon Valley speak and government dialect" and "act as a bridge between the two cultures."
Another is Shannon Sullivan, head of defense and intelligence at Google. Before working at Google, Sullivan served in the U.S. Air Force working at various intelligence positions. First as senior military advisor and then in the Air Force's C4ISR Acquisition and Test; Space Operations, Foreign Military Sales unit. C4ISR stands for "Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance." Sullivan left his Air Force positions to work as Defense Director for BAE Systems, a British-based arms and defense company, and then Army and Air Force COCOMs Director at Oracle. His last project at Google was " setting up a Google Apps 'transformational' test program to supply 50,000 soldiers in the US Army and DoD with a customized Google App Universe", according to Levine.
Google not only has a revolving door with the Pentagon and intelligence community, it also partners with defense and intelligence contractors. Levine writes that "in recent years, Google has increasingly taken the role of subcontractor: selling its wares to military and intelligence agencies by partnering with established military contractors."
The company's partners include two of the biggest American defense contractors -- Lockheed Martin, an aerospace, defense, and information security company, and Northrop Grumman, an aerospace and defense technology company. Both Lockheed and Northrop produce aircraft, missiles and defense systems, naval and radar systems, unmanned systems, satellites, information technology, and other defense-related technologies. In 2011, Lockheed Martin made $36.3 billion in arms sales, while Northrop Grumman made $21.4 billion. Lockheed has a major office in Sunnyvale, California, right in the middle of Silicon Valley. Moreover, Lockheed was also involved in interrogating prisoners in Iraq and Guantanamo, through its purchase of Sytex Corporation and the information technology unit of Affiliated Computer Services (ACS), both of whom directly interrogated detainees.
Google worked with Lockheed to design geospatial technologies. In 2007, describing the company as "Google's partner," the Washington Post reported that Lockheed "demonstrated a Google Earth product that it helped design for the National Geospatial-Intelligence Agency's work in Iraq. These included displays of key regions of the country and outlined Sunni and Shiite neighborhoods in Baghdad, as well as U.S. and Iraqi military bases in the city. Neither Lockheed nor Google would say how the geospatial agency uses the data." Meanwhile, Google has a $1-million contract with Northrop to install a Google Earth plug-in.
Both Lockheed and Northrop manufacture and sell unmanned systems, also known as drones. Lockheed's drones include the Stalker, which can stay airborne for 48 hours; Desert Hawk III, a small reconnaissance drone used by British troops in Iraq and Afghanistan; and the RQ-170 Sentinel, a high-altitude stealth reconnaissance drone used by the U.S. Air Force and CIA. RQ-170s have been used in Afghanistan and for the raidthat killed Osama bin Laden. One American RQ-170 infamously crashed in Iran while on a surveillance mission over the country in late 2011.
Northrop Grumman built the RQ-4 Global Hawk, a high-altitude surveillance drone used by the Air Force and Navy. Northrop is also building a new stealth drone for the Air Force called the RQ-180, which may be operational by 2015. In 2012, Northrop sold $1.2 billion worth of drones to South Korea.
Google is also cashing in on the drone market. It recently purchased drone manufacturer Titan Aerospace, which makes high-altitude, solar-powered drones that can "stay in the air for years without needing to land," reported the Wire. Facebook entered into talks to buy the company a month before Google made the purchase.
Last December, Google purchased Boston Dynamics, a major engineering and robotics company that receives funding from the military for its projects. According to the Guardian, "Funding for the majority of the most advanced Boston Dynamics robots comes from military sources, including the US Defence Advanced Research Projects Agency (DARPA) and the US army, navy and marine corps." Some of these DARPA-funded projects include BigDog, Legged Squad Support System (LS3), Cheetah, WildCat, and Atlas, all of which are autonomous, walking robots. Altas is humanoid, while BigDog, LS3, Cheetah, WildCat are animal-like quadrupeds. In addition to Boston Dynamics, Google purchased eight robotics companies in 2013—Industrial Perception, Redwood Robotics, Meka, Schaft, Holomni, Bot & Dolly, and Autofuss. Google has been tight-lipped about the specifics of its plans for the robotics companies. But some sources told the New York Times that Google's robotics efforts are not aimed at consumers but rather manufacturing, such as automating supply chains.
Google's "Enterprise Government" page also lists military/intelligence contractors Science Applications International Corporation (SAIC) and Blackbird Technologies among the companies it partners with. In particularly, Blackbird is a military contractor that supplies locators for "the covert 'tagging, tracking and locating' of suspected enemies," according to Wired. Its customers include the U.S. Navy and U.S. Special Operations Command. SOCOM oversees the U.S. military's special operations forces units, such as the Navy SEALs, Delta Force, Army Rangers, and Green Berets. Blackbird even sent some employees as armed operatives on secret missions with special operations forces. The company's vice president is Cofer Black, a former CIA operative who ran the agency's Counterterrorist Center before 9/11.
Palantir and the military
Many others tech companies are working with military and intelligence agencies. Amazon recently developed a $600 million cloud computing system for the CIA that will also service all 17 intelligence agencies. Both Amazon and the CIA have said little to nothing about the system's capabilities.
Palantir, which is based in Palo Alto, California produces and sells data-mining and analysis software. Its customers include the U.S. Marine Corps, U.S. Special Operations Command, CIA, NSA, FBI, Defense Intelligence Agency, Department of Homeland Security, National Counterterrorism Center, LAPD, and NYPD. In California, the Northern California Regional Intelligence Center (NCRIC), one of 72 federally run fusion centers built across the nation since 9/11, uses Palantir software to collect and analyze license plate photos.
While Google sells its wares to whomever in order to make a profit, Palantir, as a company, isn't solely dedicated to profit-maximizing. Counterterrorism has been part of the company's mission since it began. The company was founded in 2004 by investor Alex Karp, who is the company's chief executive, and billionaire PayPal founder Peter Thiel. In 2003, Thiel came up with the idea to develop software to fight terrorism based on PayPal's fraud recognition software. The CIA's In-Q-Tel helped jumpstart the company by investing $2 million. The rest of the company's $30 million start-up costs were funded by Thiel and his venture capital fund.
Palantir's software has "a user-friendly search tool that can scan multiple data sources at once, something previous search tools couldn't do," according to a 2009 Wall Street Journal profile. The software fills gaps in intelligence "by using a 'tagging' technique similar to that used by the search functions on most Web sites. Palantir tags, or categorizes, every bit of data separately, whether it be a first name, a last name or a phone number." Analysts can quickly categorize information as it comes in. The software's ability to scan and categorize multiple sources of incoming data helps analysts connect the dots among large and different pools of information -- signals intelligence, human intelligence, geospatial intelligence, and much more. All this data is collected and analyzed in Palantir's system. This makes it useful for war-related, intelligence, and law enforcement purposes. That is why so many military, police, and intelligence agencies want Palantir's software.
U.S. troops in Afghanistan who used Palantir's software, particularly the Marines and SOCOM, found it very helpful for their missions. Commanders liked Palantir's ability to direct them at insurgents who "build and bury homemade bombs, the biggest killer of U.S. troops in Afghanistan," the Washington Times reported. A Government Accountability Office report said Palantir's software "gained a reputation for being intuitive and easy to use, while also providing effective tools to link and visualize data." Special operations forces found Palantir to be "a highly effective system for conducting intelligence information analysis and supporting operations" and "provided flexibility to support mobile, disconnected users out on patrols or conducting missions." Many within the military establishment are pushing to have other branches, such as the Army, adopt Palantir's software in order to improve intelligence-sharing.
Palantir's friends include people from the highest echelons of the National Security State. Former CIA Director George Tenet and former Secretary of State Condoleezza Rice are advisers to Palantir, while former CIA director Gen. David Petraeus "considers himself a friend of Palantir CEO Alex Karp", according to Forbes. Tenet told Forbes, "I wish I had Palantir when I was director. I wish we had the tool of its power because it not only slice and dices today, but it gives you an enormous knowledge management tool to make connections for analysts that go back five, six, six, eight, 10 years. It gives you a shot at your data that I don’t think any product that we had at the time did."
High-tech militarism
Silicon Valley's technology has numerous battlefield applications, which is something the U.S. military notices. Since the global war on terror began, the military has had a growing need for high-tech intelligence-gathering and other equipment. "A key challenge facing the military services is providing users with the capabilities to analyze the huge amount of intelligence data being collected," the GAO report said. The proliferation of drones, counter-insurgency operations, sophisticated intelligence-surveillance-reconnaissance (ISR) systems, and new technologies and sensors changed how intelligence is used in counterinsurgency campaigns in Iraq and Afghanistan and counterterrorism operations in Pakistan, Somalia, Yemen, and other countries.
According to the report, "The need to integrate the large amount of available intelligence data, including the ability to synthesize information from different types of intelligence sources (e.g., HUMINT, SIGINT, GEOINT, and open source), has become increasingly important in addressing, for example, improvised explosive device threats and tracking the activities of certain components of the local population." This is where Palantir's software comes in handy. It does what the military needs -- data-mining and intelligence analysis. That is why it is used by SOCOM and other arms of the National Security State.
Irregular wars against insurgents and terrorist groups present two problems— finding the enemy and killing them. This is because such groups know how to mix in with, and are usually part of, the local population. Robotic weapons, such as drones, present "an asymmetric solution to an asymmetric problem," according to a Foster-Miller executive quoted in P.W. Singer's book Wired for War. Drones can hover over a territory for long periods of time and launch a missile at a target on command without putting American troops in harm's way, making them very attractive weapons.
Additionally, the U.S. military and intelligence agencies are increasingly relying on signals intelligence to solve this problem. Signals intelligence monitors electronic signals, such as phone calls and conversations, emails, radio or radar signals, and electronic communications. Intelligence analysts or troops on the ground will collect and analyze the electronic communications, along with geospatial intelligence, of adversaries to track their location, map human behavior, and carry out lethal operations.
Robert Steele, a former Marine, CIA case officer, and current open source intelligence advocate, explained the utility of signals intelligence. "Signals intelligence has always relied primarily on seeing the dots and connecting the dots, not on knowing what the dots are saying. When combined with a history of the dots, and particularly the dots coming together in meetings, or a black (anonymous) cell phone residing next to a white (known) cellphone, such that the black acquires the white identity by extension, it becomes possible to 'map' human activity in relation to weapons caches, mosques, meetings, etcetera," he said in an email interview. Steele added the "only advantage" to signals intelligence "is that it is very very expensive and leaves a lot of money on the table for pork and overhead."
In Iraq and Afghanistan, for example, Joint Special Operations Command (JSOC) commandos combined images from surveillance drones with the tracking of mobile phone numbers to analyze insurgent networks. Commandos then used this analysis to locate and capture or kill their intended targets during raids. Oftentimes, however, this led to getting the wrong person. Steele added that human and open source intelligence are "vastly superior to signals intelligence 95% of the time" but "are underfunded precisely because they are not expensive and require face to face contact with foreigners, something the US Government is incompetent at, and Silicon Valley could care less."
Capt. Michael Kearns, a retired U.S. and Australian Air Force intelligence officer and former SERE instructor with experience working in Silicon Valley, explained how digital information makes it easier for intelligence agencies to collect data. In an email, he told AlterNet, "Back in the day when the world was analog, every signal was one signal. Some signals contained a broad band of information contained within, however, there were no 'data packets' embedded within the electromagnetic spectrum. Therefore, collecting a signal, or a phone conversation, was largely the task of capturing / decoding / processing some specifically targeted, singular source. Today, welcome to the digital era. Data 'packets' flow as if like water, with pieces and parts of all things 'upstream' contained within. Therefore, the task today for a digital society is largely one of collecting everything, so as to fully unwrap and exploit the totality of the captured data in an almost exploratory manner. And therein lies the apparent inherently unconstitutional-ness of wholesale collection of digital data…it's almost like 'pre-crime.'"
One modern use of signals intelligence is in the United States' extrajudicial killing program, a major component of the global war on terror. The extrajudicial killing program began during the Bush administration as a means to kill suspected terrorists around the world without any due process. However, as Bush focused on the large-occupations of Iraq and Afghanistan, the extrajudicial killing program was less emphasized.
The Obama administration continued the war on terror but largely shifted away from large-scale occupations to emphasizing CIA/JSOC drone strikes, airstrikes, cruise missile attacks,proxies, and raids by special operations forces against suspected terrorists and other groups. Obama continued and expanded Bush's assassination program, relying on drones and special operations forces to do the job. According to the Bureau of Investigative Journalism, U.S. drone strikes and other covert operations have killed nearly 3,000 to over 4,800 people, including 500 to over 1,000 civilians, in Pakistan, Yemen, and Somalia. During Obama's five years in office, over 2,400 people were killed by U.S. drone strikes. Most of those killed by drone strikes are civilians or low-level fighters and, in Pakistan, only 2 percent were high-level militants. Communities living under drone strikes are regularly terrorized and traumatized by them.
Targeting for drone strikes is based on metadata analysis and geolocating the cell phone SIM card of a suspected terrorist, according to a report by the Intercept. This intelligence is provided by the NSA and given to the CIA or JSOC which will then carry out the drone strike. However, it is very common for people in countries like Yemen or Pakistan to hold multiple SIM cards, hand their cell phones to family and friends, and groups like the Taliban to randomly hand out SIM cards among their fighters to confuse trackers.
Since this methodology targets a SIM card linked to a suspect rather than an actual person, innocent civilians are regularly killed unintentionally. To ensure the assassination program will continue, the National Counterterrorism Center developed the "disposition matrix," a database that continuously adds the names, locations, and associates of suspected terrorists to kill-or-capture lists.
The Defense Department's 2015 budget proposal requests $495.6 billion, down $0.4 billion from last year, and decreases the Army to around 440,000 to 450,000 troops from the post-9/11 peak of 570,000. But it protects money -- $5.1 billion -- for cyberwarfare and special operations forces, giving SOCOM $7.7 billion, a 10 percent increase from last year, and 69,700 personnel. Thus, these sorts of operations will likely continue.
As the United States emphasizes cyberwarfare, special operations, drone strikes, electronic-based forms of intelligence, and other tactics of irregular warfare to wage perpetual war, sophisticated technology will be needed. Silicon Valley is the National Security State's go-to industry for this purpose.
August 19, 2014 - by Adam Hudson
How Google and the Big Tech Companies Are
Helping Maintain America's Empire
Helping Maintain America's Empire
Military, intelligence agencies and defense contractors
are totally connected to Silicon Valley.
are totally connected to Silicon Valley.
Silicon Valley has been in the media spotlight for its role in gentrifying and raising rents in San Francisco, helping the NSA spy on American citizens, and lack of racial and gender diversity. Despite that, Silicon Valley still has a reputation for benevolence, innocence and progressivism. Hence Google's phrase, "Don't be evil." A recent Wall Street Journal/NBC News poll found that, even after the Snowden leaks, 53% of those surveyed had high confidence in the tech industry. The tech industry is not seen as evil as, say, Wall Street or Big Oil.
One aspect of Silicon Valley that would damage this reputation has not been scrutinized enough—its involvement in American militarism. Silicon Valley's ties to the National Security State extend beyond the NSA's PRISM program. Through numerous partnerships and contracts with the U.S. military, intelligence and law enforcement agencies, Silicon Valley is part of the American military-industrial complex. Google sells its technologies to the U.S. military, FBI, CIA, NSA, DEA, NGA, and other intelligence and law enforcement agencies, has managers with backgrounds in military and intelligence work, and partners with defense contractors like Lockheed Martin and Northrop Grumman. Amazon designed a cloud computing system that will be used by the CIA and every other intelligence agency. The CIA-funded tech company Palantir sells its data-mining and analysis software to the U.S. military, CIA, LAPD, NYPD, and other security agencies. These technologies have several war-zone and intelligence-gathering applications.
First, a little background to explain how the military has been involved with Silicon Valley since its conception as a technology center. Silicon Valley's roots date back to World War II, according to a presentation by researcher and entrepreneur Steve Blank. During the war, the U.S. government funded a secret lab at Harvard University to research how to disrupt Germany's radar-guided electronic air defense system. The solution -- drop aluminum foil in front of German radars to jam them. This birthed modern electronic warfare and signals intelligence. The head of that lab was Stanford engineering professor Fred Terman who, after World War II, took 11 staffers from that lab to create Stanford's Electronic Research Lab (ERL), which received funding from the military. Stanford also had an Applied Electronics Lab (AEL) that did classified research in jammers and electronic intelligence for the military.
In fact, much of AEL's research aided the U.S. war in Vietnam. This made the lab a target for student antiwar protesters who nonviolently occupied the lab in April 1969 and demanded an end to classified research at Stanford. After nearly a year of teach-ins, protests, and violent clashes with the police, Stanford effectively eliminated war-related classified research at the university.
The ERL did research in and designed microwave tubes and electronic receivers and jammers. This helped the U.S. military and intelligence agencies spy on the Soviet Union and jam their air defense systems. Local tube companies and contractors developed the technologies based on that research. Some researchers from ERL also founded microwave companies in the area. This created a boon of microwave and electronic startups that ultimately formed the Silicon Valley known today.
Don't be evil, Google
Last year, the first Snowden documents revealed that Google, Facebook, Yahoo!, and other major tech companies provided the NSA access to their users' data through the PRISM program. All the major tech companies denied knowledge of PRISM and put up an adversarial public front to government surveillance. However, Al Jazeera America's Jason Leopold obtained, via FOIA request, two sets of email communications between former NSA Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt. The communications, according to Leopold, suggest "a far cozier working relationship between some tech firms and the U.S. government than was implied by Silicon Valley brass" and that "not all cooperation was under pressure." In the emails, Alexander and the Google executives discussed information sharing related to national security purposes.
But PRISM is the tip of the iceberg. Several tech companies are deeply in bed with the U.S. military, intelligence agencies, and defense contractors. One very notable example is Google. Google markets and sells its technology to the U.S. military and several intelligence and law enforcement agencies, such as the FBI, CIA, NSA, DEA, and NGA.
Google has a contract with the National Geospatial-Intelligence Agency (NGA) that allows the agency to use Google Earth Builder. The NGA provides geospatial intelligence, such as satellite imagery and mapping, to the military and other intelligence agencies like the NSA. In fact, NGA geospatial intelligence helped the military and CIA locate and kill Osama bin Laden. This contract allows the NGA to utilize Google's mapping technology for geospatial intelligence purposes. Google's Official Enterprise Blog announced that "Google’s work with NGA marks one of the first major government geospatial cloud initiatives, which will enable NGA to use Google Earth Builder to host its geospatial data and information. This allows NGA to customize Google Earth & Maps to provide maps and globes to support U.S. government activities, including: U.S. national security; homeland security; environmental impact and monitoring; and humanitarian assistance, disaster response and preparedness efforts."
Google Earth's technology "got its start in the intelligence community, in a CIA-backed firm called Keyhole," which Google purchased in 2004, according to the Washington Post. PandoDaily reporter Yasha Levine, who has extensively reported on Google's ties to the military and intelligence community, points out that Keyhole's "main product was an application called EarthViewer, which allowed users to fly and move around a virtual globe as if they were in a video game."
In 2003, a year before Google bought Keyhole, the company was on the verge of bankruptcy, until it was saved by In-Q-Tel, a CIA-funded venture capital firm. The CIA worked with other intelligence agencies to fit Keyhole's systems to its needs. According to the CIA Museum page, "The finished product transformed the way intelligence officers interacted with geographic information and earth imagery. Users could now easily combine complicated sets of data and imagery into clear, realistic visual representations. Users could 'fly' from space to street level seamlessly while interactively exploring layers of information including roads, schools, businesses, and demographics."
How much In-Q-Tel invested into Keyhole is classified. However, Levine writes that "the bulk of the funds didn’t come from the CIA’s intelligence budget — as they normally do with In-Q-Tel — but from the NGA, which provided the money on behalf of the entire 'Intelligence Community.' As a result, equity in Keyhole was held by two major intelligence agencies." Shortly after In-Q-Tel bought Keyhole, the NGA (then known as the National Imagery and Mapping Agency or NIMA) announced it immediately used Keyhole's technology to support U.S. troops in Iraq at the 2003-2011 war. The next year, Google purchased Keyhole and used its technology to develop Google Earth.
Four years after Google purchased Keyhole, in 2008, Google and the NGA purchased GeoEye-1, the world's highest-resolution satellite, from the company GeoEye. The NGA paid for half of the satellite's $502 million development and committed to purchasing its imagery. Because of a government restriction, Google gets lower-resolution images but still retains exclusive access to the satellite's photos. GeoEye later merged into DigitalGlobe in 2013.
Google's relationship to the National Security State extends beyond contracts with the military and intelligence agencies. Many managers in Google's public sector division come from the U.S. military and intelligence community, according to one of Levine's reports.
Michele R. Weslander-Quaid is one example. She became Google's Innovation Evangelist and Chief Technology Officer of the company's public sector division in 2011. Before joining Google, since 9/11, Weslander-Quaid worked throughout the military and intelligence world in positions at the National Geospatial-Intelligence Agency, Office of the Director of National Intelligence, National Reconnaissance Office, and later, the Office of the Secretary of Defense. Levine noted that Weslander-Quaid also " toured combat zones in both Iraq and Afghanistan in order to see the tech needs of the military first-hand."
Throughout her years working in the intelligence community, Weslander-Quaid "shook things up by dropping archaic software and hardware and convincing teams to collaborate via web tools" and "treated each agency like a startup," according to a 2014 Entrepreneur Magazine profile. She was a major advocate for web tools and cloud-based software and was responsible for implementing them at the agencies she worked at. At Google, Weslander-Quaid's job is to meet "with agency directors to map technological paths they want to follow, and helps Google employees understand what's needed to work with public-sector clients." Weslander-Quaid told Entrepreneur, "A big part of my job is to translate between Silicon Valley speak and government dialect" and "act as a bridge between the two cultures."
Another is Shannon Sullivan, head of defense and intelligence at Google. Before working at Google, Sullivan served in the U.S. Air Force working at various intelligence positions. First as senior military advisor and then in the Air Force's C4ISR Acquisition and Test; Space Operations, Foreign Military Sales unit. C4ISR stands for "Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance." Sullivan left his Air Force positions to work as Defense Director for BAE Systems, a British-based arms and defense company, and then Army and Air Force COCOMs Director at Oracle. His last project at Google was " setting up a Google Apps 'transformational' test program to supply 50,000 soldiers in the US Army and DoD with a customized Google App Universe", according to Levine.
Google not only has a revolving door with the Pentagon and intelligence community, it also partners with defense and intelligence contractors. Levine writes that "in recent years, Google has increasingly taken the role of subcontractor: selling its wares to military and intelligence agencies by partnering with established military contractors."
The company's partners include two of the biggest American defense contractors -- Lockheed Martin, an aerospace, defense, and information security company, and Northrop Grumman, an aerospace and defense technology company. Both Lockheed and Northrop produce aircraft, missiles and defense systems, naval and radar systems, unmanned systems, satellites, information technology, and other defense-related technologies. In 2011, Lockheed Martin made $36.3 billion in arms sales, while Northrop Grumman made $21.4 billion. Lockheed has a major office in Sunnyvale, California, right in the middle of Silicon Valley. Moreover, Lockheed was also involved in interrogating prisoners in Iraq and Guantanamo, through its purchase of Sytex Corporation and the information technology unit of Affiliated Computer Services (ACS), both of whom directly interrogated detainees.
Google worked with Lockheed to design geospatial technologies. In 2007, describing the company as "Google's partner," the Washington Post reported that Lockheed "demonstrated a Google Earth product that it helped design for the National Geospatial-Intelligence Agency's work in Iraq. These included displays of key regions of the country and outlined Sunni and Shiite neighborhoods in Baghdad, as well as U.S. and Iraqi military bases in the city. Neither Lockheed nor Google would say how the geospatial agency uses the data." Meanwhile, Google has a $1-million contract with Northrop to install a Google Earth plug-in.
Both Lockheed and Northrop manufacture and sell unmanned systems, also known as drones. Lockheed's drones include the Stalker, which can stay airborne for 48 hours; Desert Hawk III, a small reconnaissance drone used by British troops in Iraq and Afghanistan; and the RQ-170 Sentinel, a high-altitude stealth reconnaissance drone used by the U.S. Air Force and CIA. RQ-170s have been used in Afghanistan and for the raidthat killed Osama bin Laden. One American RQ-170 infamously crashed in Iran while on a surveillance mission over the country in late 2011.
Northrop Grumman built the RQ-4 Global Hawk, a high-altitude surveillance drone used by the Air Force and Navy. Northrop is also building a new stealth drone for the Air Force called the RQ-180, which may be operational by 2015. In 2012, Northrop sold $1.2 billion worth of drones to South Korea.
Google is also cashing in on the drone market. It recently purchased drone manufacturer Titan Aerospace, which makes high-altitude, solar-powered drones that can "stay in the air for years without needing to land," reported the Wire. Facebook entered into talks to buy the company a month before Google made the purchase.
Last December, Google purchased Boston Dynamics, a major engineering and robotics company that receives funding from the military for its projects. According to the Guardian, "Funding for the majority of the most advanced Boston Dynamics robots comes from military sources, including the US Defence Advanced Research Projects Agency (DARPA) and the US army, navy and marine corps." Some of these DARPA-funded projects include BigDog, Legged Squad Support System (LS3), Cheetah, WildCat, and Atlas, all of which are autonomous, walking robots. Altas is humanoid, while BigDog, LS3, Cheetah, WildCat are animal-like quadrupeds. In addition to Boston Dynamics, Google purchased eight robotics companies in 2013—Industrial Perception, Redwood Robotics, Meka, Schaft, Holomni, Bot & Dolly, and Autofuss. Google has been tight-lipped about the specifics of its plans for the robotics companies. But some sources told the New York Times that Google's robotics efforts are not aimed at consumers but rather manufacturing, such as automating supply chains.
Google's "Enterprise Government" page also lists military/intelligence contractors Science Applications International Corporation (SAIC) and Blackbird Technologies among the companies it partners with. In particularly, Blackbird is a military contractor that supplies locators for "the covert 'tagging, tracking and locating' of suspected enemies," according to Wired. Its customers include the U.S. Navy and U.S. Special Operations Command. SOCOM oversees the U.S. military's special operations forces units, such as the Navy SEALs, Delta Force, Army Rangers, and Green Berets. Blackbird even sent some employees as armed operatives on secret missions with special operations forces. The company's vice president is Cofer Black, a former CIA operative who ran the agency's Counterterrorist Center before 9/11.
Palantir and the military
Many others tech companies are working with military and intelligence agencies. Amazon recently developed a $600 million cloud computing system for the CIA that will also service all 17 intelligence agencies. Both Amazon and the CIA have said little to nothing about the system's capabilities.
Palantir, which is based in Palo Alto, California produces and sells data-mining and analysis software. Its customers include the U.S. Marine Corps, U.S. Special Operations Command, CIA, NSA, FBI, Defense Intelligence Agency, Department of Homeland Security, National Counterterrorism Center, LAPD, and NYPD. In California, the Northern California Regional Intelligence Center (NCRIC), one of 72 federally run fusion centers built across the nation since 9/11, uses Palantir software to collect and analyze license plate photos.
While Google sells its wares to whomever in order to make a profit, Palantir, as a company, isn't solely dedicated to profit-maximizing. Counterterrorism has been part of the company's mission since it began. The company was founded in 2004 by investor Alex Karp, who is the company's chief executive, and billionaire PayPal founder Peter Thiel. In 2003, Thiel came up with the idea to develop software to fight terrorism based on PayPal's fraud recognition software. The CIA's In-Q-Tel helped jumpstart the company by investing $2 million. The rest of the company's $30 million start-up costs were funded by Thiel and his venture capital fund.
Palantir's software has "a user-friendly search tool that can scan multiple data sources at once, something previous search tools couldn't do," according to a 2009 Wall Street Journal profile. The software fills gaps in intelligence "by using a 'tagging' technique similar to that used by the search functions on most Web sites. Palantir tags, or categorizes, every bit of data separately, whether it be a first name, a last name or a phone number." Analysts can quickly categorize information as it comes in. The software's ability to scan and categorize multiple sources of incoming data helps analysts connect the dots among large and different pools of information -- signals intelligence, human intelligence, geospatial intelligence, and much more. All this data is collected and analyzed in Palantir's system. This makes it useful for war-related, intelligence, and law enforcement purposes. That is why so many military, police, and intelligence agencies want Palantir's software.
U.S. troops in Afghanistan who used Palantir's software, particularly the Marines and SOCOM, found it very helpful for their missions. Commanders liked Palantir's ability to direct them at insurgents who "build and bury homemade bombs, the biggest killer of U.S. troops in Afghanistan," the Washington Times reported. A Government Accountability Office report said Palantir's software "gained a reputation for being intuitive and easy to use, while also providing effective tools to link and visualize data." Special operations forces found Palantir to be "a highly effective system for conducting intelligence information analysis and supporting operations" and "provided flexibility to support mobile, disconnected users out on patrols or conducting missions." Many within the military establishment are pushing to have other branches, such as the Army, adopt Palantir's software in order to improve intelligence-sharing.
Palantir's friends include people from the highest echelons of the National Security State. Former CIA Director George Tenet and former Secretary of State Condoleezza Rice are advisers to Palantir, while former CIA director Gen. David Petraeus "considers himself a friend of Palantir CEO Alex Karp", according to Forbes. Tenet told Forbes, "I wish I had Palantir when I was director. I wish we had the tool of its power because it not only slice and dices today, but it gives you an enormous knowledge management tool to make connections for analysts that go back five, six, six, eight, 10 years. It gives you a shot at your data that I don’t think any product that we had at the time did."
High-tech militarism
Silicon Valley's technology has numerous battlefield applications, which is something the U.S. military notices. Since the global war on terror began, the military has had a growing need for high-tech intelligence-gathering and other equipment. "A key challenge facing the military services is providing users with the capabilities to analyze the huge amount of intelligence data being collected," the GAO report said. The proliferation of drones, counter-insurgency operations, sophisticated intelligence-surveillance-reconnaissance (ISR) systems, and new technologies and sensors changed how intelligence is used in counterinsurgency campaigns in Iraq and Afghanistan and counterterrorism operations in Pakistan, Somalia, Yemen, and other countries.
According to the report, "The need to integrate the large amount of available intelligence data, including the ability to synthesize information from different types of intelligence sources (e.g., HUMINT, SIGINT, GEOINT, and open source), has become increasingly important in addressing, for example, improvised explosive device threats and tracking the activities of certain components of the local population." This is where Palantir's software comes in handy. It does what the military needs -- data-mining and intelligence analysis. That is why it is used by SOCOM and other arms of the National Security State.
Irregular wars against insurgents and terrorist groups present two problems— finding the enemy and killing them. This is because such groups know how to mix in with, and are usually part of, the local population. Robotic weapons, such as drones, present "an asymmetric solution to an asymmetric problem," according to a Foster-Miller executive quoted in P.W. Singer's book Wired for War. Drones can hover over a territory for long periods of time and launch a missile at a target on command without putting American troops in harm's way, making them very attractive weapons.
Additionally, the U.S. military and intelligence agencies are increasingly relying on signals intelligence to solve this problem. Signals intelligence monitors electronic signals, such as phone calls and conversations, emails, radio or radar signals, and electronic communications. Intelligence analysts or troops on the ground will collect and analyze the electronic communications, along with geospatial intelligence, of adversaries to track their location, map human behavior, and carry out lethal operations.
Robert Steele, a former Marine, CIA case officer, and current open source intelligence advocate, explained the utility of signals intelligence. "Signals intelligence has always relied primarily on seeing the dots and connecting the dots, not on knowing what the dots are saying. When combined with a history of the dots, and particularly the dots coming together in meetings, or a black (anonymous) cell phone residing next to a white (known) cellphone, such that the black acquires the white identity by extension, it becomes possible to 'map' human activity in relation to weapons caches, mosques, meetings, etcetera," he said in an email interview. Steele added the "only advantage" to signals intelligence "is that it is very very expensive and leaves a lot of money on the table for pork and overhead."
In Iraq and Afghanistan, for example, Joint Special Operations Command (JSOC) commandos combined images from surveillance drones with the tracking of mobile phone numbers to analyze insurgent networks. Commandos then used this analysis to locate and capture or kill their intended targets during raids. Oftentimes, however, this led to getting the wrong person. Steele added that human and open source intelligence are "vastly superior to signals intelligence 95% of the time" but "are underfunded precisely because they are not expensive and require face to face contact with foreigners, something the US Government is incompetent at, and Silicon Valley could care less."
Capt. Michael Kearns, a retired U.S. and Australian Air Force intelligence officer and former SERE instructor with experience working in Silicon Valley, explained how digital information makes it easier for intelligence agencies to collect data. In an email, he told AlterNet, "Back in the day when the world was analog, every signal was one signal. Some signals contained a broad band of information contained within, however, there were no 'data packets' embedded within the electromagnetic spectrum. Therefore, collecting a signal, or a phone conversation, was largely the task of capturing / decoding / processing some specifically targeted, singular source. Today, welcome to the digital era. Data 'packets' flow as if like water, with pieces and parts of all things 'upstream' contained within. Therefore, the task today for a digital society is largely one of collecting everything, so as to fully unwrap and exploit the totality of the captured data in an almost exploratory manner. And therein lies the apparent inherently unconstitutional-ness of wholesale collection of digital data…it's almost like 'pre-crime.'"
One modern use of signals intelligence is in the United States' extrajudicial killing program, a major component of the global war on terror. The extrajudicial killing program began during the Bush administration as a means to kill suspected terrorists around the world without any due process. However, as Bush focused on the large-occupations of Iraq and Afghanistan, the extrajudicial killing program was less emphasized.
The Obama administration continued the war on terror but largely shifted away from large-scale occupations to emphasizing CIA/JSOC drone strikes, airstrikes, cruise missile attacks,proxies, and raids by special operations forces against suspected terrorists and other groups. Obama continued and expanded Bush's assassination program, relying on drones and special operations forces to do the job. According to the Bureau of Investigative Journalism, U.S. drone strikes and other covert operations have killed nearly 3,000 to over 4,800 people, including 500 to over 1,000 civilians, in Pakistan, Yemen, and Somalia. During Obama's five years in office, over 2,400 people were killed by U.S. drone strikes. Most of those killed by drone strikes are civilians or low-level fighters and, in Pakistan, only 2 percent were high-level militants. Communities living under drone strikes are regularly terrorized and traumatized by them.
Targeting for drone strikes is based on metadata analysis and geolocating the cell phone SIM card of a suspected terrorist, according to a report by the Intercept. This intelligence is provided by the NSA and given to the CIA or JSOC which will then carry out the drone strike. However, it is very common for people in countries like Yemen or Pakistan to hold multiple SIM cards, hand their cell phones to family and friends, and groups like the Taliban to randomly hand out SIM cards among their fighters to confuse trackers.
Since this methodology targets a SIM card linked to a suspect rather than an actual person, innocent civilians are regularly killed unintentionally. To ensure the assassination program will continue, the National Counterterrorism Center developed the "disposition matrix," a database that continuously adds the names, locations, and associates of suspected terrorists to kill-or-capture lists.
The Defense Department's 2015 budget proposal requests $495.6 billion, down $0.4 billion from last year, and decreases the Army to around 440,000 to 450,000 troops from the post-9/11 peak of 570,000. But it protects money -- $5.1 billion -- for cyberwarfare and special operations forces, giving SOCOM $7.7 billion, a 10 percent increase from last year, and 69,700 personnel. Thus, these sorts of operations will likely continue.
As the United States emphasizes cyberwarfare, special operations, drone strikes, electronic-based forms of intelligence, and other tactics of irregular warfare to wage perpetual war, sophisticated technology will be needed. Silicon Valley is the National Security State's go-to industry for this purpose.
Thursday, December 4, 2014
Saturday, November 29, 2014
Monday, November 17, 2014
Zbigniew Brzezinski On Technocracy
This is who Zbigniew Brzeziński is, here is a quote from him:
“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen. These files will be subject to instantaneous retrieval by the authorities. ”
― Zbigniew BrzeziÅ„ski, Between Two Ages: America's Role in the Technetronic Era
Tuesday, November 4, 2014
CNN - On Electromagnetic Weapons - From The 80's
Let's take a little trip down memory lane and have a look at CNN. Could you imagine this sort of information airing on CNN today? The video clip below has Jose Delgado and Dr. Robert Becker in it, both of these individuals were pioneers in their fields. (See in the clip how he says they can make people do stuff they normally wouldn't. This was in the 80's.)
Thursday, October 23, 2014
The Stasi Octopus
Before you read what is below, it is important to read this article about Homeland Security:
http://www.dissidentvoice.org/Jan05/Whitney0121.htm
I am posting the following excerpt from Stasi: The Untold Story of the East German Secret Police: because this is EXACTLY what is happening to me. EVEN THE PROFESSIONS are the same. It literally encompasses all levels of society and involves numerous and diverse professions. What is the big difference now?
1. It is much more organized and covert. It is done with radar, satellites, cell phone towers and space-based weaponry. (See here and here for more information)
2. They have spies who participate in actively parroting your thoughts and/or what you are doing back to you over the internet. For example, many are following your I.P. and know where you are going on the internet. (When you visit their websites, blogs, Facebook and Twitter accounts etc.) Most of these people are Jews or Zionist Gentiles. See here for more about Homeland Security. They watch you and try to drive you crazy with gaslighting and anchoring and parroting techniques. The policy is active denial and is a part of what is called "no-touch torture." Imagine being surrounded by a bunch of psychos who have access to your brain and trying to drive you crazy. They also work with foot soldier community-based organized stalkers who pretty much do the same thing. (See here and here for more information.)
Like a giant octopus, the Stasi's tentacles probed every aspect of life. Full-time officers were posted to all major industrial plants. Without exception, one tenant in every apartment building was designated as a watchdog reporting to an area representative of the Volkspolizei(Vopo), the People's Police. In turn, the police officer was the Stasi's man. If a relative or a friend came to stay overnight, it was reported. Schools, universities, and hospitals were infiltrated from top to bottom. German academia was shocked to learn Heinrich Fink, professor of theology and vice chancellor at East Berlin's Humbolt University, had been a Stasi informer since 1968. After Fink's Stasi connections came to light, he was summarily fired. Doctors, lawyers, journalists, writers, actors and sports figures were co-opted by Stasi officers, as were waiters and hotel personnel. Tapping about 100, 000 telephone lines in West Germany and West Berlin around the clock was the job of 2000 officers.
Stasi officers knew no limits and had no shame when it came ot protecting the party and the state. Churchmen, including high officials of both the Catholic and Protestant denominations, were recruited en masse as secret informers. Their offices and confessionals were infested with eavesdropping devices. Even the director of Leipzig's famous Thomas Church choir, Hans-Joachim Rotch, was forced to resign when he was unmasked as a Spitzel, the people's pejorative for a Stasi informant.
Absolutely nothing was sacred to the secret police. Tiny holes were bored in apartment and hotel room walls through which Stasi agents filmed their "suspects" with special video cameras. Even the bathrooms were penetrated by the communist voyeurs. Like the Nazi Gestapo, the Stasi was the sinister side of Deutsche Grundlichkeit (German thoroughness.)
http://www.dissidentvoice.org/Jan05/Whitney0121.htm
I am posting the following excerpt from Stasi: The Untold Story of the East German Secret Police: because this is EXACTLY what is happening to me. EVEN THE PROFESSIONS are the same. It literally encompasses all levels of society and involves numerous and diverse professions. What is the big difference now?
1. It is much more organized and covert. It is done with radar, satellites, cell phone towers and space-based weaponry. (See here and here for more information)
2. They have spies who participate in actively parroting your thoughts and/or what you are doing back to you over the internet. For example, many are following your I.P. and know where you are going on the internet. (When you visit their websites, blogs, Facebook and Twitter accounts etc.) Most of these people are Jews or Zionist Gentiles. See here for more about Homeland Security. They watch you and try to drive you crazy with gaslighting and anchoring and parroting techniques. The policy is active denial and is a part of what is called "no-touch torture." Imagine being surrounded by a bunch of psychos who have access to your brain and trying to drive you crazy. They also work with foot soldier community-based organized stalkers who pretty much do the same thing. (See here and here for more information.)
Excerpt:
Like a giant octopus, the Stasi's tentacles probed every aspect of life. Full-time officers were posted to all major industrial plants. Without exception, one tenant in every apartment building was designated as a watchdog reporting to an area representative of the Volkspolizei(Vopo), the People's Police. In turn, the police officer was the Stasi's man. If a relative or a friend came to stay overnight, it was reported. Schools, universities, and hospitals were infiltrated from top to bottom. German academia was shocked to learn Heinrich Fink, professor of theology and vice chancellor at East Berlin's Humbolt University, had been a Stasi informer since 1968. After Fink's Stasi connections came to light, he was summarily fired. Doctors, lawyers, journalists, writers, actors and sports figures were co-opted by Stasi officers, as were waiters and hotel personnel. Tapping about 100, 000 telephone lines in West Germany and West Berlin around the clock was the job of 2000 officers.
Stasi officers knew no limits and had no shame when it came ot protecting the party and the state. Churchmen, including high officials of both the Catholic and Protestant denominations, were recruited en masse as secret informers. Their offices and confessionals were infested with eavesdropping devices. Even the director of Leipzig's famous Thomas Church choir, Hans-Joachim Rotch, was forced to resign when he was unmasked as a Spitzel, the people's pejorative for a Stasi informant.
Absolutely nothing was sacred to the secret police. Tiny holes were bored in apartment and hotel room walls through which Stasi agents filmed their "suspects" with special video cameras. Even the bathrooms were penetrated by the communist voyeurs. Like the Nazi Gestapo, the Stasi was the sinister side of Deutsche Grundlichkeit (German thoroughness.)
Monday, August 11, 2014
Friday, August 8, 2014
Secrecy News - Navy Mind Control - Federation of American Scientists
U.S. Navy research on “mind control techniques” cannot be performed
on human subjects without the authorization of the Under Secretary of
the Navy, according to a new Navy Instruction (pdf).
“The Under Secretary of the Navy (UNSECNAV) is the Approval Authority for research involving … severe or unusual intrusions, either physical or psychological, on human subjects (such as consciousness-altering drugs or mind-control techniques).”
The nature and scope of any such Navy research could not be immediately discovered.
See “Human Research Protection Program,” Secretary of the Navy Instruction 3900.39D, November 6, 2006 [at section 7(a)(2), page 9].
“The Under Secretary of the Navy (UNSECNAV) is the Approval Authority for research involving … severe or unusual intrusions, either physical or psychological, on human subjects (such as consciousness-altering drugs or mind-control techniques).”
The nature and scope of any such Navy research could not be immediately discovered.
See “Human Research Protection Program,” Secretary of the Navy Instruction 3900.39D, November 6, 2006 [at section 7(a)(2), page 9].
Wednesday, July 16, 2014
Former U.S. Representative From Ohio and Candidate for the President of the United States Dennis Kucinich's Attempted Ban of Space-Based Weapons
First off, see here for information on Electronic Warfare. (I put up an older version of the Wikipedia article because they have taken down the part about targeting "humans" in the newest updated articles. See for yourself, here is the latest article, notice they took out the part that says "humans" being targeted.
Dennis Kucinich attempted ban on space-based weapons, read more here.
This new class of weapons is being used on unaware, not informed humans, who of course did not consent to such experimentation. The Nuremberg Code of Conduct for experimentation with human subjects, is part of the Customary Law and the UDHR. The Code lists ten points, which universally have been adopted after the Nuremberg trials of war criminals by the Nuremberg Military Tribunals.
The secret technologies in question are covered by military/agency secrecy orders, mostly obtained under the US Inventions Secrecy Act, 1951. The US Patriot Act, for example, protects governments and connected criminals from criticism and/or detection and prosecution. Under this act anyone whistleblowing or fighting the system on a major concern is arbitrarily deemed to be unpatriotic. They can then be listed (by a senior politician or at the request, through them, of a connected criminal) as a security risk and harassed covertly; using secret technologies. In fact a Department Of Defense Directive, Directive 5240 1-R, 1994, gives open permission for those under surveillance to be used for remote experimentation. It's no coincidence that this particularly undemocratic and evil move was followed in 1996 by a significant increase in the number of satellites deployed for the purpose of civilian surveillance and harassment.
The victims are not openly confronted as that would remove any feigned excuses and leave the perpetrators open to all manner of accusation. Instead, the methods used are covert; employing high-tech methods to remotely torture, torment and deceive victims without leaving evidence.
The situation is getting worse not better with more and more secretive, undemocratic legislation being sneaked past the unwary public all the time. State treachery and terrorism are behind it yet it is all hidden under the guise of "the war on terror". For example, the US government just passed the National Defense Authorization Act of 2012, giving the President (and others) the power to target and silence anyone questioning State corruption. When this is done openly in other countries the US is the first to condemn such evil. Yet when they are guilty of the same they do it in secret and no-one dares to criticize them, lest they join the ranks of those they persecute.
Eg. In the USA over 300,000 NSL's (National Security Letters) have already been issued. These allow the agency targeting of innocent civilians whose objections to corruption / crime in high places have been deliberately skewed or misinterpreted as a threat to powerful people. Once placed in a program people can be abused and experimented on, from a distance (using satellites / high tech'). This effectively silences and discredits them while providing agency researchers with guinea pigs for experiments in control, brain function, dreams, health, robotics and much more. Post 9/11, $750 billion per year has been spent on satellite weapons used for human experimentation / targeting. Most of this has found it's way from government coffers to about 80 defense contractors who are also culpable for the crimes against humanity that are addressed on this site.
There is a circular / Catch 22 type problem in that governments use "classified" covers to hide criminal activity (esp. if it is an unconstitutional act) but targets can't prove any of that BECAUSE it has been classified. Executive Order 13526 section 1.7 (covering classified status allocation) specifically says that **"You cannot classify information merely to cover up a crime"**. Even if devices or procedures are classified this also applies to them and information on them when they are being used for criminal purposes. So, in theory, by misusing devices, abusing authority and so on, the administration not only commits crimes but should open up the information relating to that for public scrutiny...(Government of, by and for the people).
Now Presidents Obama and Bush both signed executive order 13526, so if any of these hidden crimes were to be presented to the US Supreme Court, any current US leader could be impeached as having breached their oath of office...which includes upholding the constitution.
The ECHELON spying system, remote neural monitoring, the use of directed energy weapons and more are all clearly crimes against the people and humanity in general and so by classifying the devices the government and it's leaders are breaching the constitution as well. As with any crime the break in the loop between the acts, investigation, trial and incarceration is the lack of proof. "Classifying" information and calling it a matter of National Security negates the need for the criminals involved to even create excuses for their conduct. The ability of government to classify crime is what must be fought.
The ECHELON spying system, remote neural monitoring, the use of directed energy weapons and more are all clearly crimes against the people and humanity in general and so by classifying the devices the government and it's leaders are breaching the constitution as well. As with any crime the break in the loop between the acts, investigation, trial and incarceration is the lack of proof. "Classifying" information and calling it a matter of National Security negates the need for the criminals involved to even create excuses for their conduct. The ability of government to classify crime is what must be fought.
Also, the US military is supposed to be prohibited by law from targeting US citizens with PSYOPS within US borders under Executive Order S-1233, DOD directive S-3321.1 and National Security Directive 130. Of course, there's no-one to police that especially since Psyops, by their very nature, are difficult to prove.
This is particularly so where the secret weapons discussed on this blog are employed. Also nothing stops agencies, US or allied, from doing that dirty work and hiding it under the National Security carpet. Nonetheless, public discussion of these Psyops crimes is beginning.
The International Commitee of the Red Cross (ICRC) raised the issue of psychotronic weapons; firstly in 1994, then the 2002 Geneva Forum and then the 2009 5th Symposium on non-lethal weapons. The EUROPEAN PARLIAMENT passed a "Resolution on the Environment, Security and Foreign Policy" - A4-0005/99, January 28th, 1999 which called for "An international convention introducing a global ban on ALL development and deployment of weapons which might enable any form of manipulation of human beings"..."It is our conviction that this ban can not be implemented without the global pressure of the informed general public on governments. Our major objective is to get across to the general public the real threat which these weapons represent for human rights and democracy and to apply pressure on the governments and the parliaments around the world to enact legislation which would prohibit the use of these devices to both government AND private organizations as well as individuals". (Plenary sessions / European Parliament, 1999). ]
Monday, February 24, 2014
For Those Who Like to Say "I'm Crazy" or "I Need Help"
This is a repost of an earlier blog.
I put that in the title of this article because I want readers of this blog to remember... the stuff you are going to read on this blog, you will not find anywhere else.
Most of the media that you get is controlled. When you see some of the stuff that I begin talking about you will soon see how it is different than most of the information you read. I would honestly say that as much as 95% of alternative media is controlled, and 100% of the mainstream. If it is popular, it is completely controlled.
Just remember that in George Orwell's 1984, Oceania had a massive amount of media. It was done to cause media overload ... and it was all controlled. This is the world you live in. It is almost all fake. They will give you a lot of truth in the alternative media, but... they will leave out the 15% that makes a huge difference. It's the part that makes you see the big picture.
Now, if you've seen or read anything about me already... think or believe whatever you want. However, I would appreciate if you withhold your judgment until you read everything I say on this blog. Remember the ad hominem video I posted earlier. In the end, it is the message that counts... not the messenger.
I want to point a couple things out to you...
1. There may be a reason why someone is trying to discredit or shut me up
2. Organized crime and your governments, the military, and the intelligence agencies specifically, have technology that can influence human behavior in ways most people wouldn't even imagine until someone points it out to them. They also have horribly invasive spy technology that sounds like science fiction until you realize it is just classified and hidden from the public
3. I know something about Judaism and Zionism that most people don't
As for me... I have been threatened on at least three occasions I can remember, I have had someone threaten to kill my mom's dog when I was staying at her house, (incidentally the dog ended up dying of a brain tumor.) Update: it's actually a lot worse. I have had people stalking me all over North America... even on planes. My family has also been stalked. I have had my car vandalized. My mother and stepfather's business was vandalized and sabotaged.
I am sure there has been a dossier collected on me and passed out to all the people who used to be in my life. I'm quite sure the same thing has happened to people in my immediate family. Basically, my whole families life was infiltrated. I think some people who used to be close to me have also been bribed or threatened to monitor and follow me. I am quite positive that I've been under an insane level of surveillance for at least 7 years. I am also fairly sure that my family and even my extended family have been under surveillance, but not at the same level as me.
And last but not least....I'm having MY THOUGHTS READ and I don't know how long this has been going on.
I'm fairly sure that the program was initially started out to discredit me, but then they wanted me to join some sort of intelligence organization. They basically try to blackmail, bribe or financially break someone to go into this. I have been involved in some sort of MKULTRA program, (the MKULTRA program might have changed names, but it's still going on).
I've had muscle spasms, headaches, sleep deprivation, anxiety, phobias, mood swings and crazy thoughts for at least 7 years. Along with this, I've been phobic about going outdoors or being around other people which lead to massive amounts of isolation. (Update: See here first. Then see here, here, here, and here for some interesting links between Autism, Asperger Syndrome, and electromagnetic fields.) For the last few months, I have been doing much better, though I still get muscle spasms and mood swings.
Now, you might say this is mental illness. Remember ad hominem. I KNOW the technology exists to do all of what I posted above and I will be focusing on that in future posts. But, to get you started ... please see this blog post. It features coverage from CNN that talks about electromagnetic weapons. After this, go here here and here.
As for mental illness and the business of psychiatry... it would be advisable to take it with a grain of salt when you understand its history. At one time, the head of the Canadian, American and World Psychiatric Associations, the American Psychopathological Association and the Society of Biological Psychiatry was doing mind control experiments for the CIA in Canada at McGill University. The CIA's KUBARK interrogation and torture manual refer to "studies from McGill University." It was also the American Psychiatric Association that created the Diagnostic and Statistical Manual of Mental Disorders (DSM) manual.
Now, this is really important... there is a reason behind this manual:
1. ) To benefit the pharmaceutical industries, and...
2.) To diagnose illnesses for people having experimentation done on them. Much of the technology they are using for mind control mimics these symptoms
In essence, psychiatry is essentially a pseudo-science with a bell curve of supposed social norms and any deviation outside of these norms is deemed to be abnormal and in need of medication.
Here is a video to watch on the DSM manual:
Who are intelligence agencies using mind control and testing energy weapons on?
I would say two groups specifically:
1. Abnormal people that fall outside of the bell curve of what is deemed as supposed social norms. Incidentally, these same people might also be perfect to recruit because they are not normal in the DSM sense of the term. These may be people who society would deem as having mental illnesses or abnormal abilities of some sort.
2. Political dissidents and whistleblowers. It's a nice feedback loop. This way they can do their testing and at the same time discredit those that are saying things they don't like. Once they discredit these people, they cannot speak out about it. They want to get dissidents to act out or do something stupid to discredit themselves. These people are saying things about those in power... and those in power do not like it. It works out beautifully for them. They want to discredit and shut dissidents up. Once they do that, they get their icing on their cake because they can continue to torture and test weapons on them and often a dissident can't speak out because they have been compromised.
Now, one might ask.... why would they want you to join some sort of intelligence program? That's a good question. The answer is probably quite simple... to help me out and to shut me up. To make their job easier and my life easier. In other words... a bribe.
Most people think of intelligence agencies and they think of James Bond movies. But that's ridiculous. That isn't what they do.
Most of what they do now is propaganda, journalism, writing, media and very high-tech surveillance. Once you understand how high-tech the surveillance is...you will begin to question if there is even such a thing as the war on terror--- because if is real --- they could have found Bin Laden in no time flat. They also should have been able to stop 9/11.
At the absolute least, they knew where Bin Laden was for a very long time. That means most of the media you are getting is completely false. Think about that. When I begin to show you the level of technology they have you will understand that most of your news is complete bullshit.
I put that in the title of this article because I want readers of this blog to remember... the stuff you are going to read on this blog, you will not find anywhere else.
Most of the media that you get is controlled. When you see some of the stuff that I begin talking about you will soon see how it is different than most of the information you read. I would honestly say that as much as 95% of alternative media is controlled, and 100% of the mainstream. If it is popular, it is completely controlled.
Just remember that in George Orwell's 1984, Oceania had a massive amount of media. It was done to cause media overload ... and it was all controlled. This is the world you live in. It is almost all fake. They will give you a lot of truth in the alternative media, but... they will leave out the 15% that makes a huge difference. It's the part that makes you see the big picture.
Now, if you've seen or read anything about me already... think or believe whatever you want. However, I would appreciate if you withhold your judgment until you read everything I say on this blog. Remember the ad hominem video I posted earlier. In the end, it is the message that counts... not the messenger.
I want to point a couple things out to you...
1. There may be a reason why someone is trying to discredit or shut me up
2. Organized crime and your governments, the military, and the intelligence agencies specifically, have technology that can influence human behavior in ways most people wouldn't even imagine until someone points it out to them. They also have horribly invasive spy technology that sounds like science fiction until you realize it is just classified and hidden from the public
3. I know something about Judaism and Zionism that most people don't
As for me... I have been threatened on at least three occasions I can remember, I have had someone threaten to kill my mom's dog when I was staying at her house, (incidentally the dog ended up dying of a brain tumor.) Update: it's actually a lot worse. I have had people stalking me all over North America... even on planes. My family has also been stalked. I have had my car vandalized. My mother and stepfather's business was vandalized and sabotaged.
I am sure there has been a dossier collected on me and passed out to all the people who used to be in my life. I'm quite sure the same thing has happened to people in my immediate family. Basically, my whole families life was infiltrated. I think some people who used to be close to me have also been bribed or threatened to monitor and follow me. I am quite positive that I've been under an insane level of surveillance for at least 7 years. I am also fairly sure that my family and even my extended family have been under surveillance, but not at the same level as me.
And last but not least....I'm having MY THOUGHTS READ and I don't know how long this has been going on.
I'm fairly sure that the program was initially started out to discredit me, but then they wanted me to join some sort of intelligence organization. They basically try to blackmail, bribe or financially break someone to go into this. I have been involved in some sort of MKULTRA program, (the MKULTRA program might have changed names, but it's still going on).
I've had muscle spasms, headaches, sleep deprivation, anxiety, phobias, mood swings and crazy thoughts for at least 7 years. Along with this, I've been phobic about going outdoors or being around other people which lead to massive amounts of isolation. (Update: See here first. Then see here, here, here, and here for some interesting links between Autism, Asperger Syndrome, and electromagnetic fields.) For the last few months, I have been doing much better, though I still get muscle spasms and mood swings.
Now, you might say this is mental illness. Remember ad hominem. I KNOW the technology exists to do all of what I posted above and I will be focusing on that in future posts. But, to get you started ... please see this blog post. It features coverage from CNN that talks about electromagnetic weapons. After this, go here here and here.
As for mental illness and the business of psychiatry... it would be advisable to take it with a grain of salt when you understand its history. At one time, the head of the Canadian, American and World Psychiatric Associations, the American Psychopathological Association and the Society of Biological Psychiatry was doing mind control experiments for the CIA in Canada at McGill University. The CIA's KUBARK interrogation and torture manual refer to "studies from McGill University." It was also the American Psychiatric Association that created the Diagnostic and Statistical Manual of Mental Disorders (DSM) manual.
Now, this is really important... there is a reason behind this manual:
1. ) To benefit the pharmaceutical industries, and...
2.) To diagnose illnesses for people having experimentation done on them. Much of the technology they are using for mind control mimics these symptoms
In essence, psychiatry is essentially a pseudo-science with a bell curve of supposed social norms and any deviation outside of these norms is deemed to be abnormal and in need of medication.
Here is a video to watch on the DSM manual:
Who are intelligence agencies using mind control and testing energy weapons on?
I would say two groups specifically:
1. Abnormal people that fall outside of the bell curve of what is deemed as supposed social norms. Incidentally, these same people might also be perfect to recruit because they are not normal in the DSM sense of the term. These may be people who society would deem as having mental illnesses or abnormal abilities of some sort.
2. Political dissidents and whistleblowers. It's a nice feedback loop. This way they can do their testing and at the same time discredit those that are saying things they don't like. Once they discredit these people, they cannot speak out about it. They want to get dissidents to act out or do something stupid to discredit themselves. These people are saying things about those in power... and those in power do not like it. It works out beautifully for them. They want to discredit and shut dissidents up. Once they do that, they get their icing on their cake because they can continue to torture and test weapons on them and often a dissident can't speak out because they have been compromised.
Now, one might ask.... why would they want you to join some sort of intelligence program? That's a good question. The answer is probably quite simple... to help me out and to shut me up. To make their job easier and my life easier. In other words... a bribe.
Most people think of intelligence agencies and they think of James Bond movies. But that's ridiculous. That isn't what they do.
Most of what they do now is propaganda, journalism, writing, media and very high-tech surveillance. Once you understand how high-tech the surveillance is...you will begin to question if there is even such a thing as the war on terror--- because if is real --- they could have found Bin Laden in no time flat. They also should have been able to stop 9/11.
At the absolute least, they knew where Bin Laden was for a very long time. That means most of the media you are getting is completely false. Think about that. When I begin to show you the level of technology they have you will understand that most of your news is complete bullshit.
Sunday, February 16, 2014
Torture - From Wikipedia
Motivation to torture
Research over the past 50 years, starting with the Milgram experiment, suggests that under the right circumstances and with the appropriate encouragement and setting, most people can be encouraged to actively torture others.[1]
John Conroy:
When torture takes place, people believe they are on the high moral ground, that the nation is under threat and they are the front line protecting the nation, and people will be grateful for what they are doing.[2]Confidence in the efficacy of torture is based upon the behaviorist theory of human behavior.[3]
Stages of torture mentality include:
- Reluctant or peripheral participation
- Official encouragement: As the Stanford prison experiment and Milgram experiment show, many people will follow the direction of an authority figure (such as a superior officer) in an official setting (especially if presented as mandatory), even if they have personal uncertainty. The main motivations for this appear to be fear of loss of status or respect, and the desire to be seen as a "good citizen" or "good subordinate."
- Peer encouragement: to accept torture as necessary, acceptable or deserved, or to comply from a wish to not reject peer group beliefs.
- Dehumanization: seeing victims as objects of curiosity and experimentation, where pain becomes just another test to see how it affects the victim.
- Disinhibition: socio-cultural and situational pressures may cause torturers to undergo a lessening of moral inhibitions and as a result act in ways not normally countenanced by law, custom and conscience.
- Organisationally, like many other procedures, once torture becomes established as part of internally acceptable norms under certain circumstances, its use often becomes institutionalised and self-perpetuating over time, as what was once used exceptionally for perceived necessity finds more reasons claimed to justify wider use.
Psychological effects of Torture
Based on new research psychological and physical torture have similar mental effects. Often torture victims suffer from elevated rates of Anxiety, Depression, Adjustment Disorder, PTSD, DESNOS (Disorders of Extreme Stress Not Otherwise Specified) , Somatoform Disorders and sometimes psychotic manifestations, nightmares, intrusions, insomnia, decreased libido, memory lapses, reduced capacity to learn, sexual dysfunction, social withdrawal, emotional flatness and periodical headaches. Based on new research psychological and physical torture have similar mental effects. Symptoms should always be understood in the context above.
No diagnostic terminology encapsulates the deep distrust of others which many torture survivors have developed, nor the destruction of all that gave their lives meaning. Guilt and shame about humiliation during torture, and about the survivor’s inability to withstand it, as well as guilt at surviving, are common problems which discourage disclosure. On top of this, uncertainty about the future, including the possibility of being sent back to the country in which the survivor was tortured, and the lack of any close confidant or even of any social support, compound the stress. Some current conditions are identifiable as additional risk factors: social isolation, poverty, unemployment, institutional accommodation, and pain can all predict higher levels of emotional distress in torture survivors.[5]
Subscribe to:
Posts (Atom)