Thursday, December 26, 2024

Latest Articles On Torturing People With Technology That is Covered Up- David Salinas Flores- Faculty of Medicine Universidad Nacional Mayor de San Marcos, Peru

Below are three interesting articles, read them all. Also, watch this documentary about experimenting on people with classified technology. Pure evil. The intelligence agencies and many police officers of the Western world are very aware of this technology. See here for more about Homeland Security. This is how truly sick our countries are. They rule over us and they work with criminals.

1.. The secret of the neuroscience boom: are there secret human experiments in Latin America? (Download this)
2. Transhumanism: the big fraud towards digital slavery 
(Download this)

Also, read this past article here:  Slavery By Satellite - Must-Read Article From Academics (Download this)


Does anyone Know People Working With Intelligence Agencies and Drug Cartels?



Sunday, December 1, 2024

Where's the Justice? Silicon Valley Billionaire Scum Along With the CIA and NSA: Must Watch Documentary Below- Learn the History of Manipulation of Human Beings With Classified Technology (Many Silicon Valley Billionaires, Electrical Engineers, Computer Scientists, Neuroscientists, Psychologists, Psychiatrists Know About This & Are Complicit in Covering it Up)


See here for more about Ewen Cameron.  See here for a list of government agencies involved in covering up the human rights abuses and torture that continues now.  

See here and here for more about classified and hi-technology. See here for more about MkUltra. (Be sure to scroll down and go through all of the articles when you click through on the MkUltra link.) See here for more about Transhumanism. (Be sure to scroll down and go through all of the articles and videos when you click on the Transhumanist link.)

The documentary below is an absolute must watch. Be sure to watch the whole presentation. You will learn how long this technology has been around and the massive human rights abuses that have been perpetrated. This is something that is rarely talked about, in fact, it is extremely difficult to find information on this topic. Be sure to watch this old news clip from CNN in the 80's. Also interesting are movies from the 80's like Videodrome and Brainstorm



Tuesday, August 20, 2024

Mayan Prophecy and the Codex Borgia


 Codex Borgia

The Mayan Prophecy was the end of 2012, I was 36 (above Christ head 6 x 6 = 36
Turned 37 on August 24th in 2013, 37 x 24 = 888
Jesuit Pope came in 12 March 2013 reunite everyone back under Rome
Jesuits are counter-reformation

The Codex Borgia (look at numbers,) has 39 (Chi-Rho, Constantine)
76 Pages - My birth year- Israel was established 76 years ago-76 book of Septuagint
Reunite all of Rome under Constantine including Greek Orthodox and all Protestants

Simon Peter is the Cancer sign in the Last Supper painting (4th from the left), this is very important.
The Cancer sign is a 6 x 9 = 54 or July 31 to September 23.  

27 x 27 =54 = July 31 to September 23 (Signs in the Sky 2017) -There are 27 Books in New Testament
21 days after my Mom's birthday on July 31st: Eclipse August 21, 2017
(3 days before mine on August 24th)
Gospel of John known as the Gospel of Signs:
Pontius Pilate puts up a sign in Hebrew 22, Latin 23, Greek 24

My Mom's birthday: 11 meters = Ezekiel 1.1 = 153 days left in the year after July 31st
 = 
John 21 -153 Vesica Piscis Eclipse
(11 by 11 in), for a total length of nearly 11 meters= 11+11+11 = 33 Jesus Christ Death.

The Jews try to kill Jesus a total of 21 times in the Gospels, and in the book of Revelation there is
 7 scrolls, 7 trumpets, and 7 bowls = 21 for the sign of Jonah judgment in John 21. 
Simon Peter is restored in John 21 with the 153 fish and the Vesica Piscis. He is called son of Jonah a trinity of times. (Sign of Jonah, Jonah and the whale from the Old Testament.)
Simon Peter is the Arch between the Jews of James and the Gentiles of Paul in their ministries.
Simon Peter is crucified at end of Gospel of John and the judgment is handed over to Roman Emperor.  
Also Pontifex Maximus or bridge builder(The faith of the centurion that makes Jesus marvel. In the Gospel of John, he wants to save his son and in the Synoptics he wants to save his servant. (Servant and Son) The Roman Saint Longinus pierces the side of Jesus and his feast day is the ides of March, (when Caesar died) Also the Roman Pontius Pilate who washes his hands of the blood of Christ, puts the sign up in the Gospel of John and defies the Pharisees. 




 Sun Behind Buddha Head, Swastika Connected to Sun
4 Noble Truth - 8 Fold Path = 32 Jesuit Sun Rays
John 8:32


Thursday, August 8, 2024

Targeted Individual Program is US Special Operations Command’s “Continuous Clandestine Tagging, Tracking, and Locating Hostile Forces


Click on Links Below to Read the
 Government Documents


The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program." 

These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”

The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment. 

Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:

1) Tagging, Tracking, and Locating Human (High-value) targets aka “hostile forces” to support the Global War On Terrorism (GWOT)
2) Technologies include:
Nanotechnology (including Quantum Dot and Self-assembled Photonic Antenna)
Biotechnology (including “biomimetic devices for detection and identification at long distances” and “Taggants for Biological Signature Amplification, Translation,”)
Chemistry (including “signature enhancing Taggants” and “chemical/biochemical sensors for natural signatures”)
3) Participating agencies include: DARPA, Army Research Lab, NSA, DIA, CIA, Homeland Security, FBI,  Air Force Research Lab, DOE, and Industry
4) Human signature detection via skin spectral emissivity's, thermal fingerprints at long distance
5) fieldable “bio-electronics”
6) bio-engineered signature translation and bio-reactive taggant (implant)
7) self-assembled photonic antennae
8) biometrics and tactical site exploitation (forensics)
9) Operation “Silent Dagger” 
10) Ground SIGINT (Signals Intelligence) Kit (GSK)
11) Joint Threat Warning Systems from the Air, Land, and Sea
12) RF (radio-frequency) and non-traditional (eg., optical/multi-band) Tags and R/Xs
13) “synchronize acquisition of signals intelligence (SIGINT) capabilities across the air, ground and maritime (warfare) domains”
14) SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION
15) Blue Force Tracking (BFT)
16) Special Operations Tactical Video Systems (SOTVS)
17) Sensitive Site Exploitation (SSE)
18) tiny satellites that keep tabs on targets from above (SpaceX rocket carrying the CubeSats—inexpensive satellites so small they can fit in the palm of your hand)
19) tracking satellites are part of the growing Special Operations focus on “high-value target” missions
20) tracking tags on enemies including radio frequency identification devices, quantum dots that could be used to track a singe molecule, and tagging measures such as insect pheromones
To acquire the high-value human “targets” needed to test and develop these clandestine weapons systems, the US government, through the FBI-DHS Fusion Centers and Neighborhood Watch Programs among others, has mislabeled innocent citizens as “terrorists” and “hostile forces.” Thus, ALL involved in these operations are complicit in “crimes against humanity,” “war crimes,” murder, attempted murder, torture, terrorism, and TREASON. These individuals and institutions are the real terrorists and they are TRAITORS!

These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.

I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)


by Doug Richardson SOAL-T WSO, Sept. 5, 2007

Also at: Continuous Clandestine Tagging, Tracking, and Locating (CTTL) Mr. Doug Richardson SOAL-T WSO5 September 2007 US Special Operations Command

Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.

Highlights From PPT:

p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)

– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets

- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)

- Forces Require an Ability to Apply and Monitor Tags

- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.

p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army

- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR

- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.

p. 7: CTTL– Key Enabling Technologies

- Nanotechnology

Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting

Biotechnology

Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID

Chemistry

Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures

p. 8: CTTL– Partnership for Transition–

- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition

PEO-Special Projects
PEO-Intelligence and Information Systems

- Collaborative Execution of S&T

DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories

p. 13: CTTL — Human Signature Detection

- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later

Goal: Verification of Capability and Operational Value Within 2 Years

Human Thermal Fingerprint at Long Distance

p. 14: CTTL –Human Signature Detection —

Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years

Synthetic Dog’s Nose Sensor


p. 15: CTTL — Signature Amplification/Translation

Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years

Current Capability – Bioengineered Signature Translation

p. 16: CTTL — Nano-scale Devices

Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna

II. UNCLASSIFIED Mr. Douglas Richardson Program Executive Officer SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION

III. SPECIAL RECONNAISSANCE Mr. David Breede, Program Executive Officer SPECIAL OPERATIONS FORCES INDUSTRY CONFERENCE EXPANDING THE COMPETITIVE SPACE

Wednesday, July 10, 2024

We are Hackable Animals

There you go. No more rights. Here is the wikipedia of the guy that is featured in the top video below.  In the bottom video is Sergey Brin, the co-founder of Google along with Klaus Schwab, the founder of the World Economic Forum. Have you ever seen the movie the Circle, which is loosely based upon Google? Remember the Google Chrome circle? Do you remember in the movie how they were following the guy around? This is organized stalking

The guy in the top video is Dr Yuval Noah Harari, see interviews with him herehere, and here with James Altucher. I have written previously about James Altucher herehere, and here, The video proves what I am saying. James is a computer scientist, Yuval isn't, but he knows about this. (It is worth mentioning, James is not the only one covering this up.)


Monday, July 8, 2024

Brain Computer Interfaces, Mind Control and Surveillance

See past video with Steve Hoffman here. Some one in Silicon Valley that actually tells some of the truth. Think of how many of them know this and say absolutely nothing


Saturday, June 29, 2024

Nanotechnology: Hacking Humans, Its Potential, and Real Risks

See here for more about nanotechnology. (Scroll down and read all the articles.) This is also what I have been saying about using viruses to get this in your body. (Also see here.) It has become so sophisticated it can also be introduced with dust. See the movie "Gamer" when they talk about this. Also, see this video about injecting a brain-computer interface into your body through your leg (starting at 4:32 into the video,) also see here

Tuesday, June 11, 2024

Hacking Humans

Watch video below, see past videos from this same hacker here. Also, see the screenshot of his company below the video. He works with Homeland Security, so the US government should probably know about this technology.  He also works with Honeywell, a major military contractor that is involved with augmented cognition




Wednesday, May 8, 2024

Wednesday, April 10, 2024

An Interesting Video About Smearing Political Enemies- This is What Zionists Love to Do - WWW Internet = 666 In Hebrew - Connected to Finding Political Dissidents

Internet = WWW = 666


First off, go here to read the Wikipedia entry on COINTELPRO. In addition to watching the video below, you absolutely MUST see the articles below the video. Also, see here, is Zionism/Jewish nationalism a political cult?

Doug Christie exposes the attacks on freedom
 in Canada from Ritual Defamation 

1. Torture, Discrediting With Slander and Organized Stalking
2. Examples Of Counter Intelligence Phonies Who Know About Stasi Organized Stalking & Classified Technology And Keep Quiet About It
3. Zersetzung: The Origins of Modern Day Homeland Security and the Police State
4. Zersetzung: The Origins of Modern Day Homeland Security and the Police State Part 2
5. Zersetzung Part 3 - The New Homeland Security
6. Homeland Security - Organized Stalking and Militant Zionism
7. How to Discredit Someone With  Hi-Technology
8. How Covert Agents Infiltrate To Manipulate, Deceive, And Destroy Reputations
9. Front Groups and Intelligence Agents
10. Learning About the Origins of "Homeland Security"
11. Download STASI book
12. Noam Chomsky on COINTELPRO
13. A Perfect Example of a Cointelpro Website
14. Phony Cointelpro Front Websites and the Liars That are Behind Them
15. COINTELPRO and the Phoenix Program
16. COINTELPRO Part 2
17. Gaslighting: What Intelligence and Informant Stalkers Participate In
18. Video Example of Stasi "Anchoring" Techniques
19. How Easy is it to Get People to Engage in Organized Stalking? A Perfect Example of The Naivete of the Public and Putting Too Much Trust in Authority Figures
20. 'Couple Harassed with Organized Stalking Noise Harassment Campaign'
21. Homeland Security Made in Israel
22. Homeland Security is Connected to Zionism
23. Homeland Security: The Strong Connections Between Israel, Canada and the United States
24. CSIS and the RCMP dealing with Political People
25. FBI Infragard and Private Outsourced Intelligence Agents
26. InfraGard: An Unhealthy Government Alliance
27Proof FBI Snitching & Organized Stalking Program
28. The Current FBI, NSA, CIA, RCMP, CSE, CSIS, and the Canadian Human Rights Commission Leadership That Should Be Prosecuted & Thrown In Jail


Monday, March 18, 2024

Doctor Testimonies

Also be sure to see here, here and here

See here for Jordan Peterson calling for the Palestinians of Gaza's destruction and him blocking me when I talk about what is happening in this country with organized stalking. See here for an Israeli at the top of the Canadian Civil Liberties Association. They don't seem to care about us here either. So honestly, what are the real teachings and why do so many of these people go along with it? See here for Netanyahu associating the Palestinians with the Biblical Amalek. 



Friday, February 16, 2024

Lex Fridman- Courage? Jordan Peterson.... Anything to Say?

See here for how Jordan Peterson blocked me. Am I one of these "rats" that you talked about as you flee our country because you fear for your safety?  See here for a couple Israelis' who have questioned the narrative of October 7th. 

Guess who was at the celebration in the top video? This guy. He is the equivalent of the head of Public Safety Canada or Homeland Security in the USA. He literally is a supporter of terrorists and now arguably, is one! This is not just me saying this, even the pathetic F.B.I. used to think this once. What is the real threat in Canada and the USA right now? It is Jewish Zionist extremism