Thursday, February 22, 2018

A BRAIN IMPLANT VICTIM SPEAKS OUT

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon29.htmI posted a link one year ago. I received a comment on the link authored by H. Michael Sweeney (HMS) which I feel I need to share again as it contains some very sound advice. HMS outlines some of the pitfalls many TIs fall into. My take away is we are constantly being fed false information, whether deliberately or inadvertently. Information which is isn't cited from a credible source needs to be vetted thoroughly. There is an entire disinformation system designed control what TIs believe. 

***BEGIN HMS COMMENT===

It is too bad this information had not been buried so long because of the language barriers and international separation. To my knowledge this is only the second time this level of quality of information has surfaced (and I apologize but I am unable to reference the other as the information has been lost to me). 

The images give vivid support to the Naeslund testimony. The nature of the additional story material appears to be confirming by their conformity, also useful. 

*** But I have a concern that TIs do not free associate their own state of affairs with presentation content, such that they come away convinced they are also such a victim === 

While it is certainly possible any given TI has an implant of similar nature, it is less likely rather than more. There are newer methods which do not require implants for many of the symptoms cited, though it is also true that there are also newer implants with greater capabilities and additional symptoms. 

*** However, I caution readers of the material to keep one thing in mind: in the face of the continuing medical community's reluctance to address implants (won't scan for them, won't remove them, won't talk about them) we are forced to rely upon account summations which are based primarily upon the victim's perceptions. The problem with that, in my experience and especially with long-term victims, their belief structures have been formed, in part, by the deliberate inclusion of 'false clues' within the targeting process. === 

The intent is to make the victim believe several false things, key things about aspects of and the nature of their targeting. This in turn accomplishes several things: the victim defends against the wrong enemy/technology/source of attack, resulting in frustration (you can't defeat the right problem fighting against the wrong problem); the victim appears mental to outside observers (esp. anyone from whom help is sought); it generates natural paranoiac responses useful to that same end. 

*** It also forces the victim, in trying to understand and present their circumstance in summation, to need reliance upon books and printed materials by other persons. The risk there, is that such sources may be deliberate or misguided misinformation, often tainted once more by false belief structures. The quality of the material being cited can only be judged by the quality and veracity of source references. This is true of all books, of course, not just those on mind control. Being written in a book is no proof of validity; anyone can get a book into print, especially if the intent of those behind MC to provide disinformation. The point is this: a quote from such a book is only as valuable as the YOUR assessment of the entire book or the author. 

*** My concerns stem primarily from subtle clues that not all the information as presented is valid or true. No one clue is a smoking gun, and could easily have an innocent explanation, even as simple as a poorly worded sentence. So I urge caution when comparing this material to one's own situation. It would be tragic to come away with a wrong conclusion. 

Implants remain the hardest enemy technology to deal with effectively. It serves no purpose to anyone but perps for a victim to falsely conclude they are implanted. I add to this concern, that there have been scumbags who have used gadget meters to 'find' implants in people for a fee which can be triggered to give a false signal by simply moving one's finger an inch while holding it, to do so. The kind of devices capable of reliably finding a variety of implants are not going to be hand held toys, as most implants are passive (think dormant) and do not transmit signals except on command, precisely for the reason of avoiding easy detection.

***END HMS COMMENT===

This is a link to the original article:
http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon29.htm

Wednesday, February 21, 2018

FACEBOOK + ME = SILENCE

I have been suspended for the second time in a week for posting information toTruther groups that I post to regularly. My articles are well cited and go against the official narrative.

FaceBook is a social media platform designed to bring people together who have common interests. However, if your interests include talking about current events in a way that doesn't follow the official narrative, your account will be suspended.

In a world where every nation and government is becoming a police state, control of information is paramount. There can be only one narrative... that is the narrative being portrayed by the State. The State narrows the available narratives by eliminating the ones that conflict with their own.

In a democracy censorship does not exist and when it rears its ugly head, it is slain. In a democracy private institutions fight government imposed censorship even it comes in the guise of an opportunity to "self-censor" before the government does it for you. FaceBook is on the frontline of the battle for Free Speech and they have surrendered.

They will not be the last. Particularly if all the other venues of free speech give up as well. We can only hope there are some CEO's left that are willing to do the hard work of defending the democracy that is (was) America.

Tuesday, February 20, 2018

SPYING ON ANTI-WAR PROTESTERS: US ARMY CONCEPT OF OPERATIONS FOR POLICE INTELLIGENCE OPERATIONS


There is nothing I love more than to catch military, law enforcement and intelligence agencies grabbing for more of our rights. Here's just another example of the power hungry establishment rent-a-cops overreaching and mission creeping. They just can't get enough. 

"The document presents a 60 page For Official Use Only intelligence manual from the US Army's Military Police School. Among other matters, the document reveals that the US Army is using structuring tricks to work around intelligence oversight rules that would normally prevent domestic spying and hoarding of data on anti-war protesters..."


SCOTLAND ADDED TO THE LIST OF POLICE STATES CREATED BY THE NSA

This was likely glossed over and suppressed here in the U.S. In yet another bit of fallout resulting from the Snowden releases, it is clear Scotland was yet another country the NSA was surveilling in the PRISM Program. From all appearances (of course the program is still top secret even though it has been exposed) the NSA was and is attempting to setup a worldwide surveillance state. Since the U.S. government hasn't reigned in the spooks, it will continue indefinitely. 

Most people I speak to about PRISM and the Worldwide Surveillance Network state: "I'm not doing anything wrong, I don't care if they're surveilling me." These people don''t realize the criteria the government chooses to apply to determine who to surveil or target for something more than surveillance is, at the civilian level, undefined. Citizens aren't told what the criteria are, it's secret. Citizens are not notified when they are targeted. Also consider that it is always changing. How would we know what behaviors to avoid? For example, what if they decided to target people with an anti-Muslim sentiment? Or because a person visited a particular website?

Total security translates to inhumanity. Innocent people always get hurt due to vague targeting criteria and abuse of the system for personal objectives and financial gain. Realize this is only one piece of a much larger mechanism. 

https://www.commonspace.scot/articles/9474/police-conceivable-security-services-act-scotland-without-their-knowledge

and this article:

https://www.commonspace.scot/articles/8602/scottish-government-questioned-secret-surveillance-system-uk-spooks

Wednesday, February 14, 2018

OPERATION PHOENIX SURFACES IN AFGHANISTAN AS BLACKWATER


https://www.nytimes.com/2017/10/22/world/asia/cia-expanding-taliban-fight-afghanistan.html
It appears evident that when the CIA finds a method or system that works, they use it over and over again. This seems particularly true of their use of assassination squads to terrorize the citizens of a particular country. They use the Phoenix Program to eliminate any perceived government detractors within any country they happen to have an interest in. 

They have systematically worked their way around the globe bringing destruction and torture everywhere they go. They install paid snitch programs turning neighbor against neighbor. They create death squads who rape, torture, and kill the inhabitants of the land they invade. Dirty Wars is a film that documents the journey of Investigative journalist Jeremy Scahill as he investigates the killing of villagers in Afghanistan. Here is a description of the documentary:

"Dirty Wars follows investigative reporter Jeremy Scahill, author of the international bestseller Blackwater, into the hidden world of America's covert wars, from Afghanistan to Yemen, Somalia, and beyond. Part action film and part detective story, Dirty Wars is a gripping journey into one of the most important and underreported stories of our time. What begins as a report on a deadly U.S. night raid in a remote corner of Afghanistan quickly turns into a global investigation of the secretive and powerful Joint Special Operations Command (JSOC). As Scahill digs deeper into the activities of JSOC, he is pulled into a world of covert operations unknown to the public and carried out across the globe by men who do not exist on paper and will never appear before Congress. In military jargon, JSOC teams "find, fix, and finish" their targets, who are selected through a secret process. No target is off limits for the "kill list," including U.S. citizens."

Currently there are approximately 10,000 troops in Afghanistan and 30,000 military contractors (mercenaries). Military contractors are not held to the same standard as military personnel. Some believe the use of contractors is done to circumnavigate policy and law prohibiting certain types of behavior by troops. It is likely then, that these 30,000 contractors are the Death Squads. They perform the work the American military are prohibited from engaging in. As the Phoenix Program is a CIA operation, they are likely generating the lists from intelligence collected, disseminating the information to the Death Squads and tracking the results. CIA analysts crunch the numbers and produce effectiveness reports.

Similar to the Phoenix Program in Vietnam, there are computer generated death lists and death squads that go on missions every night to find the people on those lists. Those captured are detained without charge, tortured, killed, and raped, simply for meeting criteria that placed them on a computer generated list. The connotation is that they are somehow aiding terrorists. But that allegation neither needs to be proved nor need be accurate. Still others on the list are there because a neighbor made a report. There is paid snitch system (similar to the East German Stasi program) where informants are paid for "Tips." This was a common practice in Vietnam. However, the system was abused by profiteers and people with grudges. People were fingered by neighbors and relatives for inclusion of the Death Squad's lists for reasons unrelated to being communist sympathizers. 

The desired effect is to eliminate the support structure at the grassroots level. Hearts and minds. 

The actual effect is criminal organizations and people with grudges use the system for their own purposes. 

The bad news is the Phoenix Program has come home to the U.S. There are many thousands of citizens claiming to be targeted by the U.S. government. Electronic torture and community involvement are common claims of these victims. Some victims claim their torturer is the Department of Homeland Security and that local police, their community, and other government agencies are participating. Sound familiar?

Expose the New Phoenix Program and end the suffering of millions of people.

http://www.imdb.com/title/tt2532528/

ADDENDUM

Here is a recent NYT article that corroborates some of the claims made here. As it is a mainstream news source, one expects the article to tow the party line (no mention of the brutal techniques used to gather information). However, it is clear the Phoenix Program is alive and well in Afghanistan.


https://www.nytimes.com/2017/10/22/world/asia/cia-expanding-taliban-fight-afghanistan.html

THE DARK ART OF MIND CONTROL

https://www.youtube.com/watch?v=-ACRtw_WgqcWe all know we are being manipulated by the "system." Fame, fortune, sex, family, and popularity are some of the things used to control us. When we discuss control it should be understood there are various levels of control. Neil Sanders speaks about how we are manipulated into buying things we don't need. These methods also translate to other areas of life.

https://www.youtube.com/watch?v=-ACRtw_Wgqc

Friday, February 9, 2018

THE PHOENIX PROGRAM: STARTLING SIMILARITIES TO GANGSTALKING PROGRAMS

https://www.youtube.com/watch?v=yOmQoADOQWs&t=1208sThe Phoenix Program, initiated in 1965, was a mass assassination operation spearheaded by the CIA during the Vietnam War. A former CIA operative in the Phoenix program interviewed in the linked video called it a "...computerized genocide program." As the video further points out, a database of Vietnam citizens was used to select 1,800 of them a month for extermination. The extermination program was then used by some to eliminate their rivals through the use of a "See Something, Say Something" type program, reporting their neighbors as suspected Viet Cong (VC) to U.S. forces for money. Many innocent people died. The CIA operatives collected the ears of the dead to prove they had killed people. 

In order to recruit people to be Bounty Hunters the CIA appealed to the candidate's sense of patriotism, informing them they were fighting communism to protect the American way of life. The situation they found on the ground diverged vastly from what they were prepared to expect. The new recruits were ordered to kill anyone on the computer generated list regardless of their complicity with the VC. The stark contradiction between what they learned during training and the reality of situation they found themselves in disillusioned many. After the war, many of these bounty hunters who returned home were unable to assimilate back into normal society due to their part in the slaughter of innocent people. Still others who had enjoyed their work during the war became mercenaries. 

We are now seeing a resurgence in the use of Bounty Hunters and computer generated lists of "suspected" [insert a label here]. The same system of snitching and murder is in place and is abused by criminals and profiteers alike. In an effort to keep the program hidden from those not involved, targets are driven to suicide through the use of silent weapons which slowly disintegrate the target's life.

The CIA uses various agencies to manage the disintegration program. The Department of Homeland Security, NSA, FBI, Local Law Enforcement, and the Military are primary assets. The community a target lives is recruited into the program by local police. The other assets attach to local police departments in order to circumnavigate laws forbidding the use of the military against citizens on U.S. soil. Doing so would be a war crime, crime against humanity, and treason.
The obvious question is "why?" Why would a government hunt down and kill its own people? This question has more than one answer. On the surface, it appears that people have been labeled as Domestic Terrorists, and are therefore traitors, enemies of the state. However the truth is far less simple. 

There are financial incentives for all of the participants in the program. Revenue streams include: Raiding the target's UCC1 account, Medical/Psychological/Weapons testing and experimentation, government grants and contracts, research and development budgets, the black budget, illegal drug sales, false flag operations, and other criminal activities. 

https://www.youtube.com/watch?v=yOmQoADOQWs&t=1208s

Thursday, February 8, 2018

THE PHOENIX PROGRAM: STARTLING SIMILARITIES TO GANGSTALKING PROGRAMS

https://www.youtube.com/watch?v=yOmQoADOQWs&t=1208s The Phoenix Program, initiated in 1965, was a mass assassination operation spearheaded by the CIA during the Viet Nam War. A former CIA operative in the Phoenix program interviewed in the linked video called it a "...computerized genocide program." As the video further points out, a database of Viet Nam citizens was used to select 1,800 of them a month for extermination. The extermination program was then used by some to eliminate their rivals through the use of a "See Something, Say Something" type program, reporting their neighbors as suspected Viet Cong (VC) to U.S. forces for money. Many innocent people died. The CIA operatives collected the ears of the dead to prove they had killed people

In order to recruit people to be Bounty Hunters the CIA appealed to the candidate's sense of patriotism, informing them they were fighting communism to protect the American way of life. The situation they found on the ground diverged vastly from what they were prepared to expect. The new recruits were ordered to kill anyone on the computer generated list regardless of their complicity with the VC. The stark contradiction between what they learned during training and the reality of situation they found themselves in disillusioned many. After the war, many of these bounty hunters who returned home were unable to assimilate back into normal society due to their part in the slaughter of innocent people. Still others who had enjoyed their work during the war became mercenaries. 

We are now seeing a resurgence in the use of Bounty Hunters and computer generated lists of "suspected" [insert a label here]. The same system of snitching and murder is in place and is abused by criminals and profiteers alike. In an effort to keep the program hidden from those not involved, targets are driven to suicide through the use of silent weapons which slowly disintegrate the target's life.

The CIA uses various agencies to manage the disintegration program. The Department of Homeland Security, NSA, FBI, Local Law Enforcement, and the Military are primary assets. The community a target lives is recruited into the program by local police. The other assets attach to local police departments in order to circumnavigate laws forbidding the use of the military against citizens on U.S. soil. Doing so would be a war crime, crime against humanity, and treason.

The obvious question is "why?" Why would a government hunt down and kill its own people? This question has more than one answer. On the surface, it appears that people have been labeled as Domestic Terrorists, and are therefore traitors, enemies of the state. However the truth is far less simple. 

There are financial incentives for all of the participants in the program. Revenue streams include: Raiding the target's UCC1 account, Medical/Psychological/Weapons testing and experimentation, government grants and contracts, research and development budgets, the black budget, illegal drug sales, false flag operations, and other criminal activities. 

https://www.youtube.com/watch?v=yOmQoADOQWs&t=1208s

Tuesday, February 6, 2018

THE FISA ACT & SECTION 702: A BRIEF OVERVIEW

https://intelligence.house.gov/fisa-702/
INTRODUCTION


In the movie "Snowden", it was made clear that the CIA/NSA had systematically infiltrated every countries' communications infrastructure under the PRISM program in order to surveil their governments, businesses and citizens. The movie went onto say the surveillance was indiscriminate, targeting terrorist states along with friendly countries. The conclusion he arrived at was the surveillance wasn't about terrorism, it was about control. That observation applied to the U.S. as well.

Full spectrum, warrantless, dragnet style surveillance is now in full effect. While there seemed to be restraints in place to prevent spying on Americans without just cause, in fact, there were none. This is what Edward Snowden exposed by his leaking of documents which exposed the activity. In addition, the leaks left egg on the face of the Director of National Intelligence, James Clapper, who lied in front of a congressional committee and the nation that no such program existed. He resigned amid the fall out of the false testimony he gave.

It should be noted that Clapper then went onto join the Center for a New American Security (CNAS), a Washington, DC think tank. The CNAS' focus include terrorism, irregular warfare, and the national security implications of natural resource consumption.

FISA SECTION 702
 

Section 702 of the Foreign Intelligence Surveillance Act (FISA)[1]
provides Intelligence Agencies authorization to surveil the communications of non-US persons outside the United States.


If you watched the movie "Snowden", you know that Americans within the United States are surveilled under 702. In order to do this, a warrant must be approved by a FISA Court judge. However, as stated in the movie, the FISA Court judges rubber-stamp the warrants.

THE PROTECT AMERICA ACT OF 2007

"The Protect America Act of 2007 (PAA)[2] is a controversial amendment to the Foreign Intelligence Surveillance Act (FISA) that was signed into law by U.S. President George W. Bush. It removed the warrant requirement for government surveillance of foreign intelligence targets "reasonably believed" to be outside the United States."


"The bill allowed the monitoring of all electronic communications of "Americans communicating with foreigners who are the targets of a U.S. terrorism investigation" without a court's order or oversight, so long as it is not targeted at one particular person "reasonably believed to be" inside the country."

"The Protect America Act differed from the FISA in that no discussion of actions or character judgment of the target was required for application of the statute (i.e., to receive a FISA surveillance warrant, a FISC foreign agent definition was required). This data could be monitored only if intelligence officials acted in the context of intelligence information gathering.[3]"

"No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. "

CITATIONS

[1] FISA 702
 
https://intelligence.house.gov/fisa-702/

[2] Protect America Act of 2007
https://en.wikipedia.org/wiki/Protect_America_Act_of_2007…

[3] 'Quasi-anti-terrorism law' for all-forms of intelligence collection
https://en.wikipedia.org/wiki/Protect_America_Act_of_2007

Thursday, February 1, 2018

EXECUTIVE ORDER IMPOSES SEVERE REPERCUSSIONS ON THOSE ENGAGING IN HUMAN RIGHTS ABUSES, CORRUPTION

https://www.whitehouse.gov/presidential-actions/executive-order-blocking-property-persons-involved-serious-human-rights-abuse-corruption/
There are people in our society today who are targeted by rogue factions of our government. They are collectively know as Targeted Individuals. Their lives are minimized and they are physically and mentally tortured. Electronic weapons, similar to those deployed against U.S. diplomats working in Cuba, are used in a covert program to decimate innocent American's lives.

On December 21, 2017 President Donald Trump signed an Executive Order 13818 which targets human rights abuses and corruption. While the order targets foreign criminals, it has far reaching implications. That is because it can be applied to any criminal or organization.
A day of reckoning is here.

https://www.whitehouse.gov/presidential-actions/executive-order-blocking-property-persons-involved-serious-human-rights-abuse-corruption/




RETURN TO THE DARK AGES

“The Constitution is a limitation of the government, not on private individuals--that it does not prescribe the conduct of private individuals, only the conduct of the government--that it is not a charter for government power, but a charter of the citizens' protection against the government."

"Instead of being a protector of man's rights, the government is becoming their most dangerous violator; instead of guarding freedom, the government is establishing slavery; instead of protecting men from the initiators of physical force, the government is initiating physical force and coercion in any manner and issue it pleases; instead of serving as the instrument of objectivity in human relationships, the government is creating a deadly, subterranean reign of uncertainty and fear, by means of nonobjective laws whose interpretation is left to the arbitrary decisions of random bureaucrats; instead of protecting men from injury by whim, the government is arrogating to itself the power of unlimited whim--so that we are fast approaching the stage of ultimate inversion; the stage where the government is "free" to do anything it pleases, while the citizens may only act by permission; which is the stage of the darkest periods of humanity, the stage of rule by brute force.”

― Ayn Rand, The Virtue of Selfishness: A New Concept of Egoism, 1964