en

food news

radios

Gang Stalking Mind Control Cults

Gang Stalking Mind Control Cults
3 Oct 2022 | 2:04 am

FBI whistleblower: Counterterrorism cases against alleged right-wing extremists mostly ‘entrapment’


Sept. 22, 2022, Washington Times

The FBI's counterterrorism investigations targeting suspected White supremacists and right-wing extremists are mostly "entrapment" operations, a former agent involved in those cases told The Washington Times.

The startling accusation came from Kyle Seraphin, an FBI agent of six years who was recently suspended by the bureau. He worked in multiple field offices in the counterterrorism division and conducted investigations of suspected domestic extremism and White supremacist plots over the past few years.

"My team was deployed to 20 or 25 different high-profile, national terrorism organization or terrorism investigations between 2018 and 2021. And what I saw, as the most obvious statement, is that there are three things about counterterrorism investigations:

"No. 1, the demand for White supremacy vastly outstrips the supply of White supremacy. No. 2, the FBI's playbook when it comes to counterterrorism investigations is always and unequivocally morally equivalent to entrapment, even if there's a legal definition that allows them to skirt that." Mr. Seraphin said.

Entrapment is illegal and involves manipulating or inducing subjects into committing crimes.

Third, Mr. Seraphin said, the FBI has no objective metric on how to prioritize investigations.

"There's an entirely ridiculous internal process for determining every single national priority," he said.

In the FBI, priorities are known as band-level threats. Each field office individually assesses the threats in its jurisdiction, or AOR (area of responsibility) in FBI jargon.

He said the No. 3 top threat for the Albuquerque field office AOR, which covers the entire state of New Mexico, is violence at abortion clinics.

"There is no requirement for an allegation of a crime to happen for someone to open a national security investigation. None. There doesn't have to be an underlying crime at all," Mr. Seraphin said. "To open up a case, for example, on a parent at a school board meeting, if we allege that there are enough connected pieces, it's like, 'OK, this person owns guns.'"

The FBI said Mr. Sraphin's accusations of entrapment were baseless.

"This comment is inaccurate and represents a clear misunderstanding of the policy and practice in FBI investigations," the FBI said in a statement to The Times.

Mr. Seraphin said he was suspended and placed on administrative leave at the FBI after run-ins with his supervisors that began with his refusal to get a COVID-19 vaccination.

The FBI did not mention Mr. Seraphin's vaccination status in a letter informing him of the suspension but cited his "personal conduct" and actions that raised "sufficient concern about your judgment, trustworthiness, and reliability to safeguard classified and sensitive information."

Mr. Seraphin is the latest in a series of FBI whistleblowers who say the bureau has become politicized.

As previously reported by The Times, rank-and-file FBI agents have accused the Biden administration of exaggerating the threat of White supremacists and pressuring agents to cook up domestic terrorist cases involving racist extremists.

Whistleblowers said some FBI bosses urge case agents to open counterterrorist cases to inflate the number of terrorism cases, helping the special agent in charge, or SAC, who runs the field office score a passing grade on job performance evaluations.

A former FBI employee who worked in Buffalo, New York, told The Times that FBI bosses in Washington focus on the volume of cases to evaluate the SACs. That leads some office supervisors to inflate the numbers.

"It's a report card for him, so at the end of his two-year term as a SAC, he gets moved to a better position down in Washington. And everything focuses around his metrics," the former employee said.

• Kerry Picket can be reached at kpicket@washingtontimes.com.

Gang Stalking Mind Control Cults
30 Sep 2022 | 10:21 pm

10/1/22 Summary: 1) Scope, Structure, Purpose, and “Perpetraitors” of Global Gangstalking Operations; 2) Psychological Profile of “Perps;” 3) “Protocols” Being Implemented


Epigraph Quotes:

1) John Clarke, Patrick Knowlton's attorney: "(Gangstalking) is used by various federal intelligence investigative agencies and it has two purposes: 1) It warns the witnesses and scares and intimidates the witness, and 2) if that doesn't work and the witness continues to tell the truth about whatever it is that they've seen, it will discredit him."

Hugh Turley, Researcher: "It's terrifying. It's like something out of the Twilight Zone or Alfred Hitchcock. It's really scary. You know a lot of the movies we see show the terrorists as the bad guys and the FBI agents are the good guys that save us. If you turn that upside down, can you think of a more horrifying movie than if the FBI agents were evil and they were terrifying the citizens and the press was going along with it? That's scary."

From: FBI COINTELPRO GANGSTALKING Of: 1) Witness, Patrick Knowlton In Vince Foster Murder-Cover Up, 2) Bombing of Environmentalist, Judi Bari, and 3) "Disappearing" Members of Black, Muslim, Anti-War, Environmental, and Animal-Rights Groups (9 youtubes, court cases, and 2 personal accounts by webmaster)

2) "(Gangstalking/electronic torture) is a very cleverly disguised program of torture and murder… According to former intelligence officer, Julianne McKinney's 1992 report, the pattern of directed-energy attacks and gang stalking is the same all over the world… this program is being used to silently neutralize all people that the New World Order believes will be troublesome to their rule. In particular, this includes intelligent, independent, freethinking, incorruptible, nonconformists.

The control mechanisms in the Soviet Union, which included the targeting of the civilian population, was only made possible by the citizens who stalked and harassed people in public. The KGB's success, added McKinney, "depended on the extensive use of informant networks and agents provocateurs…." McKinney stated: "I think that once full control is established over a major percentage of the population, and enough of the population is silent and unwilling to stick their necks out, that we inevitably would be heading toward a holocaust."

Mark M. Rich ("The Hidden Evil; The Financial Elite's Covert War Against the Civilian Population," 2008):

3) Re: CARDIOVASCULAR & RESPIRATORY SYSTEM DAMAGE BY DIRECTED ENERGY TORTURE: from Brian Tew (Targeted Individual)

"A directed energy weapons system of the U.S. Department of Defense is used to silence and kill whistle blowers, activists & dissidents, or anyone the American Shadow Government considers a threat.

CIA & DIA Contractors using an EXASCALE RNM (Remote Neural Monitoring) Supercomputer, via Brain-to-Computer Interface, Electronic Brain-to-Brain Interface, and Brain-to-Cloud Interface, are targeting their victims' cerebral cortex. These bi-directional, fabricated, and falsified brain wave signals (bit-stream of electromagnetic low frequency waves) are specifically tuned in to the victims' brain wave signature and are delivered via a stream of ELF waves called the INFORMATION & INJECTION FEEDBACK LOOP. Over time, exposure to these fabricated & falsified brain wave signals cause heart attacks, strokes and other secondary & tertiary diseases & disorders.

The point at which the Trauma-Based-Mind-Control victim suffers Congestive Heart Failure, Stroke, Adrenaline Damage, Artificially Induced Disease, etc., is an important 'METRIC' in the training, research & development of how to more effectively assassinate people with this Silent & Slow Kill technology.

A computer multiplexer routes the (brain wave) signal to a tower, satellite or mobile platform and the tower satellite or mobile platform relays the signal to the digital receiver, similar to how cell phone technology works.
The digital receiver is tracked & pinpointed in real time just like a cell phone, except with CIA-DIA TRAUMA-BASED MIND-CONTROL technology, the digital receiver is not a phone; it is a human brain.

The brain of the mind control victim has been digitalized by nanotechnology adhering to neurotransmitters in his/her brain, but nanotech is not even necessary for mind control technologies of the CIA/DIA to work properly. It is just necessary for training, research, & development in a real world environment using innocent men, women, and children as guinea pigs.

The nanotechnology "speaks to" and decodes the neurotransmitters in the victim's brain allowing the CIA-DIA TRAUMA BASED MIND CONTROL Cognitive Researchers to turn the brain of the victim into their very own visual verbal & auditory communications system after they have mapped the brain of the victim into a cognitive model, which they achieve by way of repetitive infliction of physical & psychological trauma…." (Webmaster: In other words, "cognitive researchers" can see through the eyes and hear through the ears of their targets using their computer systems.)

CIA-DIA Supercomputers use physical & psychological trauma (i.e., gangstalking) to map out and reverse engineer the sensory & neural pathways of the victim's brain & central nervous system, meaning they are mapping patterns with identifiers. They are linking evoked potentials with descriptions. In order to map patterns with identifiers, the CIA-DIA Contractors (Neuroscientists, Psychologists, Psychiatrists, Behavioral Scientists, etc) have to create patterns. Patterns of what? Memory & Thought! They are using physical & psychological trauma (gangstalking) to force the victim into repetitive patterns of behavior called RESPONSE STATISTICS which can be remotely measured and integrated back into RNM Data. Notice how Brandy Vaughn was first stalked and gas lighted before her murder? Trauma!"

4) "Almost everyone who has been around me turned out to be a secret agent working for the Jews, working for the CIA… The Jews have planted so many of their Jew agents and CIA rats all around me. So many people… girlfriends, lawyers, everybody almost, turned out to be working for the CIA and the Jews. Unbelievable but true.

"… the Jews are a criminal people, the Jews completely control the United States, and the Jews are using the United States as a vehicle to take over the World. There is no United States as people think of it. It's just a puppet in the Jews' hands. It's a plaything for the Jews… The US government and American Jewry are virtually interchangeable."

-Bobby Fischer (1943-2008; of Jewish parentage), American Chess Grandmaster, 11th World Chess Champion (possible Targeted Individual (TI) whose brain was being targeted, mapped, monitored, and manipulated?)

5) "We cannot continue to rely only on our military in order to achieve the national security objectives that we've set. We've got to have a civilian national security force that's just as powerful, just as strong, just as well-funded." – Presidential candidate, Barak Obama (crypto (secret)-Jew, 2008)

6) "Some call it communism, I call it Judaism." – Rabbi Stephen Wise

7) a) "Judaism IS "the worship of Moloch (Satan)." The whole dispute between ancient Israel and Judah of the Levites raged round this false deity and his demands, and Israel turned its back on Judah on this very account; this is the root of the controversy of Zion, three thousand years ago and now."

b) (Webmaster: The satanic spirit behind gangstalking was expressed well in the) Jan. 27, 1656 Excommunication of Spinoza by Amsterdam Synagogue rabbis:

"Cursed be he by day and cursed by night; cursed when he goeth out, and cursed when he cometh in; the Lord pardon him never; the wrath and fury of the Lord burn upon this man; and bring upon him all the curses which are written in the Torah. The Lord blot out his name under the heaven. The Lord set him apart for destruction from all the tribes of Israel; with all the curses of the firmament which are written in the Torah. There shall be no man to speak to him, no man write him, no man show him any kindness, no man stay under the same roof with him, no man come nigh unto him."

c) … The (Jewish) Talmudists denounced Maimonides to the Inquisition circa 1173 AD, saying: "Behold, there are among you heretics and infidels, for they were seduced by Moses Ben Maimonides… You who clear your community of heretics, clear ours too."

d) "The simultaneous triumph of Bolshevism in Moscow and Zionism in London in the same week of 1917 were only in appearance distinct events. The two forces fulfilled correlative tenets of the ancient (Jewish) Law: "Pull down and destroy… rule over all nations"; the one destroyed in the East and the other secretly ruled in the West. The controlling group was so preponderantly Jewish that it may be called Jewish. The nature of the instigating force… was further identified by its deeds: the character of its earliest enactments, a symbolic mockery of Christianity, and a special mark of authorship deliberately given to the murder of the (Russian) monarch. All these bore the traits of a Talmudic vengeance.

e) "The French Revolution of 1789… forms the link between the English one of 1640 and the Russian one of 1917 and reveals the whole process as a planned and continuing one which, having passed through these three stages, will reach its final orgasm at some moment not far distant."

f) "According to the Judaic law, the world had been created at a date precisely determined, solely for the Jews; and everything that happened in it was calculated simply to bring about the Jewish triumph."

Douglas Reed ("The Controversy of Zion," 1978)

8) "Jews are behind the whole (gangstalking-electronic torture) thing." – Alan Landis (TI of Jewish parentage)

I. Webmaster Introduction: Secret armies of gangstalkers operate with impunity and legal immunity in America and throughout the world in a huge "Unacknowledged Special Access Project" (USAP) or black "social engineering" project often referred to as "organized stalking/electronic harassment." Based on information and insights presented on the 2000+ posts of this website, civilian-military stalker networks comprise "community-oriented policing" (COPs)/Neighborhood watch groups, paramilitary death squads, private security businesses, organized crime, human traffickers, military and medical mercenaries, and paid and vigilante revolutionaries. These "civilian national security forces" also include military special forces operatives and psychological operations groups, FBI and other federal, state, and local law enforcement personnel, private security and "intelligence" firms headed by ex-military, ex-intelligence, and ex-police, citizen surveillance role players, spies, crisis actors, "sayanim" (Jewish citizen spies/"helpers"), informants, trackers, spotters, first responders, "psy-actor" units, "Potemkin Village" psychological operations, etc. Posts from this website, highlighted below, provide a basis for identifying the satanic command structure that guides these interlocking criminal networks.

Thus, the very institutions charged with protecting the citizenry are actually in the process of conducting covert slow-kill, soft-kill, silent-kill, no-touch torture operations against large portions of domestic population. Behind the operations are intelligence agencies, militaries, government agencies (DoD, NSA, CIA, FBI, DHS, DOJ), law enforcement, private sector cutout agencies, Jews, Masons, destructive New Age cults such as Scientology and Subud, religious groups, and secret armies of citizen-based agents, etc. In this post, I juxtapose various assessments of who the real stalking perpetrators are, what motivates them, and how the gangstalking networks and system work in hopes of elucidating the "who, what, when, where, why and how" of these as yet unpunished crimes against humanity.

Key military tactics of these covert psychological and electronic (psychotronic) operations include: the "weaponization of humans" through "cognitive warfare" and military-grade directed and neuroweapons (Neuro S/T) (See: Behind NATO's 'cognitive warfare': 'Battle for your brain' waged by Western militaries (by Ben Norton, October 8, 2021)) as well as the "staging" of events/psychological attacks/propaganda for "targeted audiences" ("TAs", see: A "Staged" Reality: "Infowarrior" Alex Jones Convicted For Exposing Sandy Hook "Mass Shooting" As "Potemkin (Propaganda) Village"-Truman Show-Style Staged Event) as well as for "targeted individuals (TIs). We may regard these covert operations as proof that the global war against humanity (World War III) is in progress."

II. Background Information on Institutions That Control the National Security Racketeering Network

– Department of Homeland Security (America's GESTAPO and STASI Secret Police-Surveillance State apparatus) was founded and run by Jews (including sexual deviant, bully, & former Head of Communist East German STASI, Jew, Markus Wolfe and Michael Chertoff- Dual Israeli-American citizen) in response to the pre-scripted and orchestrated 9/11 attacks in order to establish an expanding for-profit business enterprise with multiple functions and designed to help usher in the full-spectrum dominance of the New (Judeo-Masonic-Satanic) World Order-One World Government Antichrist Kingdom;

– FBI-DHS Fusion Centers function as a human trafficking conduit to farm out contracts on covertly and extra-judicially watchlisted citizens to profiteers in the National Security Racketeering Network;

– These NSA and CIA SIGINT (Signals Intelligence) and HUMINT (Human Intelligence) torture-murder ops conducted by the NSA Global Spy Network and their private sector partners utilize advanced military psychological, information, and cognitive warfare techniques and technologies and operate in the majority of the world's nations;

– These operations define post-9/11 Corporate Police State domestic terror operations run by our Deep State-International Zionist Criminal Syndicate (IZCS)-controlled governments.

The following 28 posts on this website yield important insights into the scope and structure of these criminal operations and strongly suggest that the US government is governed by 5th column enemy groups controlled by Judeo-Masonic-satanist-financial-military-intelligence-racketeering networks intent on the implementation of one-world totalitarian governance and the concomitant destruction of America:

1) Targeting & the Federal Reserve: The Chain of Command (Targeted Justice, Inc., Sept. 8, 2022)

Targetedjustice.com concludes:

"The CIA runs the targeting program. The families that own the Federal Reserve are:

Rockefellers, Rothschilds, Goldman/Sachs, Lehmans, Kuhn/Loebs, Warburgs, Lazards, Israel Moses Seifs"

(Webmaster comment: These are all Jewish families.)

2) Groups and Key People Leading the Targeted Individual Program (From Targetedjustice.com)

The groups and key people leading the Targeted Individual program are (From Targetedjustice.com):

David Rubenstein – CFR.org,
Dick Cheney – USAP programs (Black Projects), TI Program Director
David Cohen – CIA Operations,
General John Raymond – US Space Force,
Avril Haines – ODNI,
Merrick Garland – DOJ,
General Scott Berrier – DIA,
Melissa Smislova – DHS Intelligence & Analysis,
Steve Vanech – NCTC,
Jill Sanborn – FBI, National Security Branch
Charles Kable – FBI, Terrorist Screening Center
Stefanie Tompkins – DARPA
Michael Lauer, MD – NIH Extramural Division
Mossad – Israel
Owners of the Federal Reserve

(Webmaster Comment: We probably get a more accurate image of the "chain of command" if we reverse the order of the above. The Owners of the Federal Reserve are the Jews at the top of the New World Order pyramid. Mossad, Israel's foreign intelligence agency, do their covert crimes for them in cooperation with the above individuals and institutions. Note that Mossad operates largely through conscripting their "Sayanim," who are citizen agents. Note also the very high percentage of Jews in the above list.)

3) Archbishop Vigano Calls Out the 'Children of Darkness's' 'Deep Church'/'Deep State' Coup D'etat (aka Great Reset & UN Agenda 2030)

In a recent 2022 interview, Archbishop Vigano identifies the following institutions behind the "New World Order"/Antichrist Kingdom:

"The "Children of Darkness," "the deep church and the deep state working together in unison," and "infiltrating fifth column enemies," specifically:

1) The families of the high world of finance like the Rothschilds, the Rockefellers, the Warburgs.

2) The United Nations, the WHO, UNICEF, UNESCO, and the FAO.

3) The World Economic Forum, the Bilderberg Group, the Club of Rome,

4) The Masonic lodges all over the world.

5) The modern Catholic hierarchy, now completely aligned with the ideology of the New World Order and the universal religion advocated by Freemasonry.

To help explain the infiltration and capture of the Catholic hierarchy, Vigano refers to a specific letter from the Alta Vendita Freemason lodge in 1869:

Excerpt of The Alta Vendita letter of 1869: "It is up to the secret societies to take the first step toward the Church with the aim of conquering both of them. The task we are going to undertake is not the work of a day, or of a month, or of a year. It may last several years, perhaps a century, but in our ranks the soldier dies and the struggle goes on.

You (Masons) wish to establish the reign of the chosen ones on the throne of the prostitute of Babylon.(**) Let the Clergy march under your standard, always believing that they are marching under the banner of the Apostolic Keys."

Webmaster Comment: According to Christopher Story ("The New Underworld Order: Triumph of Criminalism the Global Hegemony of Masonic Intelligence"), Masonry is the "screen" behind which all secret societies operate. And according to Benjamin D'Israeli (aka Lord Beaconsfield, the first Jewish Prime Minister of England) all secret societies are led by Jews. Like Jews, Masons have a long tradition of gangstalking their enemies to death; their terms for this kind of ritual human blood sacrifice are: "white glove," "silent dagger," "slow dagger," "secret dagger.")

4) Department of Homeland Security (DHS): The New American Gestapo; By Preston James, Veterans Today (2013)

5) Dept. of Homeland Security "Government Sponsored Domestic Terrorism against U.S. Citizens:" Gang Stalking Fusion Centers, and the Post-9/11 Corporate Police State

6) KGB and STASI reinforce Homeland Security (DHS). For whom?

7) Markus Wolfe, Jew, Founder of E. German Stasi and Department of Homeland Security (DHS)

8) The Jews Behind the Department of Homeland Security (From Brother Nathaniel)

Webmaster Comment: In the above posts, we learn that the Department of Homeland Security was founded by and is controlled by Jews as "a beachhead for the "International Zionist Criminal Syndicate."

9) GANGSTALKING Radically Expands As Anti-Defamation League (ADL) and SPLC (Southern Poverty Law Center) Use DHS & FBI To Target (Gangstalk) All Americans As "Domestic Terrorists" (Whitney Webb/Jason Berman, 1/11/21)

Webmaster Comment: In this post, journalist Whitney Webb documents the disproportionate influence of Jewish lobbying groups in "helping" the Department of Homeland Security "identify" domestic terrorists.

10) Protocols of Gangstalking (aka Jewish Mob Stalking)

Webmaster Comment: In the above post, we compare the modern uberveillance secret police-gangstalking state apparatus with the plan for Jewish conquest and domination laid out in the "Protocols of the Learned Elders of Zion" at the First Zionist Congress in 1897.

11) Federal/Military/Intelligence Components of Global Government Gangstalking-Genocide GESTAPO-Gulag (G6): My Notes From "Top Secret America: The Rise of the New American Security State" (Priest and Arkin, 2011) and Related Youtubes

Webmaster comment: "Top Secret America: The Rise of the New American Security State," by Priest and Arkin (2011), reveals the phenomenal extent to which American "intelligence" and "security" operations have been outsourced to private sector businesses. These companies will often be headed and staffed by ex-US intelligence and military personnel who are essentially cashing in on deploying their war tactics against innocent American citizens.

12) A List of prominent Jewish Neocons and their role in getting the U.S. into the Iraq Wars and Department of Homeland Security

Webmaster Comment: In this post, we learn the identity of Jewish "neocons" behind the endless "War On Terror" as well as the domestic war on American civilians by the Department of Homeland Security.

13) President Obama's (Secret) Armies & Assassins (Joint Special Operations Command (JSOC), Senior Executive Service (SES), Civilian National Security Force)

14) Biden's 2021 Memorandum to Use Foreign Policy and National Security Workforce to Destroy-Control Americans (Via Covert Ops, Gangstalking, Electronic Torture) & Memorandum

III. The Psychological Profile and Cult Status of Gangstalking Perpetrators Can Be Gleened From the Following Posts:

1) From: Gang Stalking is the Freemasonic Secret (Silent, Slow) Dagger AND Scientology's "Fair Game" Policy!?

This posts indicates that stalking perpetrators include: Masons, religious cults, destructive New Age groups, military, government organizations, corporations, British and American intelligence agencies (and Israeli and Chinese?), Scientologists, organized crime, and organized groups of vigilantes, civilian spies and informants that comprise a vast cabal led by "dark principalities" (demons and fallen angels). It also suggests that stalking constitutes a "lifestyle" for the gangstalking perpetrators. Excerpts from this post:

"What is Gangstalking? It is a tactic which is used to drive people over the edge. It is called Gang Stalking. Gang Stalking is a systemic form of control, which seeks to control every aspect of a Targeted Individuals life. Gang Stalking takes place outside in the community. It's called Gang Stalking because the target is followed around and placed under surveillance by groups of organized Civilian Spies/Snitches 24/7.

Why is gangstalking employed? (Perhaps you, the targeted individual (TI)) found the wrong forum on the internet and saw something you should not have seen; you worked for a company and found out some sensitive information; you got on the wrong side of someone who is a member of the vast satanic or luciferian cabal; etc.

The destruction of a person feeds them (perpetrators). It also fits in with their overall agenda. People who are victims of gangstalking are people who pose a threat to the goals of the "dark principalities."

What is the goal of Gang Stalking? The expressed goal of Gang Stalking is to silence a victim, drive a victim insane and possibly to the point of suicide, or destroy the victim's reputation and believability as the person will likely be viewed as mentally ill should they complain or report the abuse. Gang Stalking is also used to gather information on individuals as well as force individuals to move or leave an area.

Motivations for the abuse:
Motivations for Gang Stalking vary. Revenge for a real or imagined offense. (People in these organizations are quite petty, mirroring their preternatural handlers); false accusations of a "horrible crime" of which the victim has gotten away with (Used to discredit the victim and destroy his/her reputation); silencing a corporate "whistle-blower"; defecting from a cult; a perceived enemy of a group or organization; "knowing too much" are all examples of possible motivations.

Who are the stalkers?
The stalkers, for the most part, appear to be everyday citizens. They wear business suits, push their children in strollers, and shop at the local grocery store. They are encouraged to fit in with the community. Other stalkers are "street thugs" who have been hired to harass and intimidate.

A gang stalking group is a well-run organization comprised of members who are unidentified as gangstalkers to the outside world. Until a group of gangstalkers turn their face towards someone selected to be one of their targets, members of society do not realize there is such an invisible group.

The practitioners of gang stalking are people who, for the most part, go about their business of daily life appearing like everyone else, except for their activities involved with Gang stalking. Gangstalking activities take priority over everything else in the lives of gangstalkers. Gangstalking is actually a lifestyle for those who participate in it.

Why people participate in Gang Stalking:

-Some stalkers are told lies, either positive or negative in nature, in order to gain their participation
-Some stalkers are paid or receive other benefits
-Stalkers belonging to an organization may simply be following orders.
-Some stalkers may use their participation in order to repay a past favor.
-Peer Pressure/ Need to Fit In
-Former stalkers have stated they participated out of fear of becoming the next target should they go against the group.
-Entertainment Value/Thrill of Participation in an Illegal activity.
-Nearly all willing stalkers have a cult/satanic or luciferian group affiliation
-Some are controlled like puppets (flipping the switch/Manchurian Candidates)

Who, or what is behind Gang Stalking? Societies/Fraternities/Orders, Religious Cults and Destructive "New Age" Groups, Corporations, Government Organizations, Military, Concerned" Community Groups/Vigilante Groups, Criminal Organizations, etc.

"Ultimately, the source of it all are the malevolent/demonic principalities. They are the true heads of state and corporations in this world."

www.fightgangstalking.com

Webmaster Comment: One reads/hears much about Chinese infiltration and ownership of American institutions. However, I have yet to read about or experience any gangstalking operations by Chinese individuals and/or the Chinese Communist Party. Of course, psychotronic weapons of mass destruction were developed during Cold War between the US and Soviet Union so the US and Soviet Union have been at the forefront of developing these technologies. (See the excellent work of California TI, Cheryl Welsh on this topic.) However, New Zealand politician/journalist/activist and TI, Suzie Dawson, has successfully sought asylum in Moscow. And so has the famous NSA whistleblower, Edward Snowden. Thus, it appears to me that in terms of massive deployment of dehumanizing and degrading totalitarian torture-murder technologies on its own citizens, the US very much leads the world.

2) From: 1) Masonic Sheriff's Departments Behind Gangstalking; Transcription & Comments; 2) Synopsis Of "Circle of Snakes: How To END Your Gang Stalking!"

According to Post II, stalking perpetrators include: Sheriffs' Departments, Masons, Luciferians, government agencies, state troopers, citizen stalker-snitches/confidential informants, and "surveillance networks" using military surveillance technology and government funding. Their goal is to "suicide" their target and when this happens they throw lavish, well-funded parties. These are sick people. The following text summarizes key insights from this video:

"(Organized stalking) is run by sheriff's departments and funded by government agencies to do this 24/7 surveillance. It started out to be against people they suspected of terrorism or a husband who killed his wife, or things like that; they can surveille them and do different things. But this is different because they are specifically psychologically targeting people to break them down. And it brings a lot of people harm and some people commit suicide from this.

1) A confidential informant, a friend of mine, told me that they put me on the list for 24/7 surveillance after I turned in a dirty cop. He told me their ultimate goal is to get you to commit suicide after they stalk you and isolate you. They will break in your house and do things to double your bills so they can also target your finances. They do things to systematically make you waste money, fixing things you shouldn't have to because they sabotage things.

2) My friend said at his Masonic Lodge, many of the Masons are on the list to do the stalking, but most of the people they use are the confidential informants that do surveillance and other things for the police departments, like the controlled buys. But there is a difference between surveillance and harassment. In stalking they want you to know you are being harassed and stalked.

3) When they finally drive someone to suicide, they will actually throw parties to celebrate like it was a big joke.

4) Your vehicle is the biggest thing they will come after. They will do things to have your check engine light come on all the time. They scratch your vehicle constantly. Little things. I filed police reports on this. I did this just to get it documented even though I knew that the police department and their informants were doing it and it wouldn't go anywhere. They've slashed at least 6 or 7 tires. They would drain the battery and unhook the cables from the battery.

5) They'd break into my house and let some of the pets out of the cages. I'd come home and there were animals running all around. I'd put surveillance camera's in my house and they'd just break the cameras… and sometimes they deleted months worth of footage.

6) A couple girls at the bar told me they were approached in the bathroom by someone who told them that they should stay away from me because I was violent or a child molester and a felon. They would tell them lies to slander your name to get people to hate you so they wouldn't have anything to do with you. I would have conversations with people and everything was fine and then after I would go to the bathroom and come back, again, the atmosphere would completely change and now the people don't want to be around you.

7) They will get family members to be part of this and come against you. They will make up lies and tell them if you talk about these things, that you are delusional.

8) The cops will cover their tracks by lying and saying you are having contact with big drug dealers or something like that.

9) They already have the surveillance to spy on the drug dealers. But this is different, this is demonic, because they want to harass people until they commit suicide. There is funding for this, and so when someone commits suicide they have big parties and give each other high fives, etc. It's real sick.

10) The sheriff's department is coordinating almost every part of it. This was supposed to be used to track violent terrorists and criminals, psychotic people, pedophiles, etc. They would do the same kind of surveillance in order to watch them. But they don't harass them psychologically.

11) My friend said they would even use gas on high level targets in their homes while the people were sleeping. Then they can enter while the person is actually asleep. That's the sort of thing they would do in hostage situations.

12) The surveillance with the targeted individual consisted of law enforcement using law enforcement tools to track their cell phones and GPS to track the vehicles. They'd use Stingrays on the cell phones to pick up the texts. Or they would pay different people to help them set up in that area.

13) They can track people through their computers and anti-viruses. To keep on top of every single bit of information coming in and out, to know who they are talking to.

14) This is a legal process, but they are using it in a criminal way. But they aren't supposed to actually break your things, or kill your pet animals like mine, etc.

15) There is a mirrored way of the different surveillance tools and the ways that they copy your phone, it's actually mirrored. So everything you see, they can see. Every text you send, they get.

16) The main goal is to isolate the person and introduce other fake people into their lives that are snitches to help take control of their lives and manipulate those people. And to destroy their finances and bring them into a super depression after they isolate them and use different tactics, they would hope that they would then commit suicide.

17) If someone turns in a cop for police brutality or someone sleeps with a cop's wife or something, then they can be put in this program illegally. But they'll make up an excuse or lies to say it's legal. They'll say: "We think he knows this high level drug dealer," things like that.

18) They'll get false witnesses to lie about that individual so they can put them on the list to be harassed.

19) It's a (well) funded program.

20) Some of the civilian stalkers actually think they are doing a service for their community. They're retards. So if a cop comes up and says "hey, we think this person is a possible child molester, can we use your house to put surveillance equipment in?" They pay them some money. They agree. That's how stupid people are.

21) Once they know all of your schedule they approach people in the places you go and those people will think they are helping out the sheriff's department by relating information about you back to them and going along with the program. I go to the gym, so they'll go to the gym and tell a bunch of lies. And so these people who are making minimum wage are more than happy to cooperate, to monitor you…. This also works with the isolation (to degrade and destroy the target).

22) For the stalker-snitches, they provide cash, gift cards, sometimes they cut a check, sometimes they'll give drugs to drug addicts. This would be on the side.

23) They mark these people's license plates so the cops know they are helping them and won't touch them if they commit minor crimes. These are the "informant-collaborators."

24) This is militarized psychological warfare. They like to honk their horns and set up car alarms. Flash their headlights at you to let you know they are trying to pick at you.

25) I've actually had state troopers flip me the bird with hatred in their eyes.

26) The program is abused for all their demonic purposes and their hatred for people that the surveillance network wants to harass.

27) They feel like they are above the law because under this program, they are allowed to break into people's homes and cars in the name of surveillance.

28) Not only do they turn your cell phone into a rolling bug. They also monitor your home. They use these to find out where you are going and then they send someone to where you are going so they can actually be there when you get there.

29) It's state to state. All the sheriff's departments coordinate with each other from state to state. So if a TI moves from one state to another they just call the police in the next state and tell them what harassment protocol they are using on that person.

30) Informants in the program can do all sorts of illegal things because of the work they do for the cops. They get away with selling drugs, whatever.

31) If you look up Freemasonry Police and Freemasonry Police badges on google, you'll see pictures of police and Masonic lodges. It's all Luciferian doctrine. They study the teachings of Albert Pike. All these guys have read the Satanic Bible, different Aleister Crowley books, and magic, witchcraft, etc. So you have to figure a lot of these police are Masons and belong to the lodge. They study Luciferian doctrine and do satanic rituals at Masonic lodges. On top of that they jack themselves up with steroids. So they think that you're a slave, and they are masters.

32) Freemasons do Satanic Ritual Abuse….

33) Other countries do this same thing also.

34) They use the exact same technologies and tools that are available through law enforcement that they use against criminals, but now they use these tools in a perverted way to harass you, try to isolate you and manipulate you. And ultimately, a lot of people do commit suicide.

35) So it's a very sick thing. And a lot people involved in this are sick individuals themselves. And even if they start out with the right intentions, being around those sickos, they become sickos themselves.

36) I'm going through this myself. The hatred for me is because of my love for Jesus Christ. I read my Bible and I pray and I love people. And I identify the occult and try to educate people about this. I want you to know that I care about you and you are not alone. I think we should start a group to go against this.

Webmaster Comment: This is an excellent description of the gangstalking system at the local level. Our thanks to the man who made this video.

3) From: Jeffrey Madore (TI and Electronics Expert) Explains Organized Gangstalking "Human Research" Torture-Murder Program (2); 2019 Video Transcriptions and Comments

Based on his personal experiences as a TI for 35 years, electronics engineer, Jeffrey Madore, asserts that the stalking perpetrators include: NSA, DOD, FBI, law enforcement, private corporate cutouts for the military (General Dynamics, Electric Boat, and subsidiary, Sonlas), as well as extremely sadistic, mind-controlled "Manchurian Candidate"/groomed citizen operatives/perpetrators who deploy extremely advanced mind-reading, mind-mapping, mind-influencing and voice-to-skull (Remote Neural Monitoring and Manipulation) (TETRA system) technologies against civilians. In a series of podcasts between 2015 and 2019, Jeffrey Madore offers important clues regarding the "psychology" of the perpetrators:

"Partial Transcription of "The Psychology of My Stalkers" by Jeffrey Madore:

"I've been targeted by the DOD for over 30 years. And in the last 5 years, the FBI has gotten involved. I've engaged my stalkers considerably. You see, in 2011, they started talking to me through V2K (voice-to-skull or synthetic telepathy), which is a method of communication where someone with a remote device can put audible information on a person's central nervous system, they can hear it, and they can extract information. So it really creates a two-way conversation. I have been trying to understand what these people are all about. (And determine:) What are their priorities in life?

I've assembled a list of 6 priorities that they have. I am really done engaging them. I don't want to anyone. I've watched the process being used to take FBI personnel and make them stalkers, to give them their priorities, to give them the sadistic needs that I see in my stalkers.

The 6 priorities that they have are:

1) "Hurt him." Those that stalk me, typically are single and have no family… their highest priority in life is "hurt him." Their highest satisfaction is gained by hurting me.

They are given an incredible positive reinforcement for hurting me. I've heard it said that just remembering hurting me gives them a rush.

2) "Worship him." The people that stalk will often get together and I've heard them talking about me. Kind of building me up as if I'm really special. They want to follow me everywhere. They want to be involved in all aspects of my life. It appears when they are groomed for this… maybe what they used to care about, they don't care about that any more. They don't care about family, career, what's really important is me. They talk like they are really depressed. If I go camping, they follow me, and they sit there in my car to watch me camping. And I hear them say, "I would never do that." They sound very depressed toward all other areas except me. They remember every single thing about me. When I'm asleep, they are together discussing me. And when they brag to each other, they show each that they followed me longer. It's hard to believe they are grown men. But they are. They act incredibly jealous. If I notice an attractive woman, they are yelling at me. They are upset with me. It happens consistently.

3) "Sexually assault him."
They have to be involved in perpetual sexual offense. It is part of their violence toward me. While they are being groomed for the position, the men are having sex with each other. It's motivated by the electronics. It's not about a relationship with each other, it's more of an assault. That's how it sounds. It's really them assaulting one another and fantasizing about me. Toward that end, with the electronics, they have attack my genitals all day long. So this compromises my testosterone. And I get osteoporosis. For a while I was breaking ribs and toes.

4) "Hurt one another." (aka "Raise hell") If one of them is upset over something, their workmate would be beaming and happy. These FBI agents are running interference between the DOD people, the NSA people, and law enforcement. (They are keeping law enforcement back). The transducer produces a microwave signal that couples up to the targets central nervous system. I could take the power of that transducer very high. I could drive it so high that anyone else in the vehicle that's following me get burned. I've heard that some people have lost their eyesight because of this.

In 2017, Soundlist (Sonlas?), who works for General Dynamics, were supplying people to help out. The FBI is kind of up front. I still believe NSA people are controlling things. And the Soundlist people were in a vehicle with that transducer and they would be following me. The FBI would use subliminals and V2K would talk the Soundlist people in very close behind me where they got burned all over on their bodies. Some lost their eyesight or got extreme eye damage. The FBI love hurting people. The eye damage that comes from microwave exposure, happens slowly over time. The FBI used the opportunity to hurt each other. Meanwhile, I was telling them to back off because they would get hurt. The mind control is very, very strong.

The next day, they'd get two new people from Soundlist to follow me. This went on day after day. Finally, I called the President of Soundlist, Andrew Torielle, and I accused them of having people following me and renting houses on my street so the FBI could use them. And immediately they pulled all their people out. But the agents were so excited about hurting people. They needed to hurt people and hurt me. It's a psychological need that they have. And the more they enforce it the more sadistic they become.

Now, I call this one: "Raise hell." Anywhere they can cause trouble they do. The result is that they don't function as a team. It seems they are groomed to be a lone wolf. They get divorced. Following me is all they want to do. They just want to keep attacking me.

5) "Perpetuate this." There can't come an end to them stalking me. They can't allow it. They knew where I was going. I was going home. I was less than 10 minutes from my home. They are set up there. They panicked. They are willing to put their careers, their health, their life on their line to perpetuate this.

6) "Simulate work." This is really about perpetuation. They have to be looking like they are investigating something. So they have to call it an investigation. They have to make it look like their work. The way that they perpetuate is to continually simulate (fake) work.

The first four are more unique to DOD following me. Maybe the last two are more applicable to FBI. They seem to be driven by intense fear. Re: #1, they are scared that I'm having fun. Because they send constant emotional pain, if I just think that I feel better or happier today, then they react by turning up the pain. They are scared of my pleasure. If I do anything to relieve my pain, that scares them. They have to respond by giving me more (pain). This is a powerful fear in them.

Priority 2, they will put themselves at considerable risk to prevent losing me. They are afraid that if I lose the influence of that signal that I'll feel better.

Priority 3, they fear my sexual pleasure. Even glancing at an attractive woman upsets them. Their jealousy is the fear of losing the beloved.

And right down the line. These men have six priorities. They seem to enjoy it.

The process that I've seen them put through… some are family men. If I'm reading the scriptures, some might know the scriptures, but that's in the past. Everything is a black hole for them. The only bright spot for them is to hurt me, worship me, raise hell, this all helps them become a "lone wolf." They are groomed like a suicide gunman (i.e., Manchurian Candidate).

I tend to think that the DOD does not want these people (perps) unwinding. Because what has been done to them is pretty extreme and I believe it's permanent. And when they hurt me, they are rewarded for it.

This equipment can cause incredible pain and it can cause incredible rewards, often sexual climaxes and all-over really good feeling. They will often, sometimes more than once a day, attack my colon, and I have to run to the bathroom. They all want to be part of that. They are sitting at a monitor at their display and attacking my colon, focusing on my rectum, and they are given sexual climaxes while they are doing it. I've listened to the whole thing. And they want to do it every day. This is the grooming process. So they are given a lot of positive reinforcement when they are hurting me. The things that we enjoy we want to do again. Very much like a sex offender. We label them predators. The men that do this have gotten an awful lot of positive reinforcement for hurting me. They are like a gang of bullies. They can't get enough. It's truly an addiction to violence, a sex addiction. Like any addiction, enough is never enough.

These men are groomed, mind controlled, and I believe it's permanent. These are dangerous men to anyone. I would advocate for locking these people up and maybe studying them to determine what has happened to them."

(Webmaster Comment: These important insights suggest that the perpetrators of gangstalking torture/murder operations are themselves mind-controlled, perhaps as recipients of CIA MKULTRA-type trauma-based mind control. While Madore here refers to the "grooming" of FBI "electronic perpetrator" sadists, we may surmise that similar "grooming processes" (that is, based on MKULTRA, trauma-based mind control, satanic ritual abuse (SRA) etc.) may also be used on "street perpetrators."

4) From: 'Mafia States' Targeting Innocent Civilians; 1) "Deceive and Hide- Jewish Mob Stalking Culture"; 2) "TI" As Lone-Wolf Terrorists;" Op Catalyst youtubes and text"": (by Stephen O'Keefe, Canadian Targeted Individual)

The brilliant and brave Canadian TI, Stephen O'Keefe, has written much about and even captured the street stalking operations deployed against him on video. Unfortunately, his excellent videos have been taken down from youtube, etc. However, I partially transcribed some of these videos.

According to O'Keefe, stalking perpetrators include: Jews/aka The Synagogue of Satan/Ashkenazi jews, who by the way, worship Moloch). O'Keefe states:

"With so many jews involved with methods of deep psychological torment directed at me for so many years, it is impossible that these methods are not culturally jewish, known by all jews above a certain age…. This culturally jewish method of profiling and stalking someone to ruin would have existed before technology made it easy, perhaps explaining why jews have been exiled from so many lands.

The benefits to shadow governments are endless; spy operations, police stings, drug dealing, money laundering drops and black operation terror events where an asset or target are surrounded by nothing but layers of backup in a pre-scripted crowd simulation. It will eventually lead to a society covertly cued-up with attractions to products and advertising within a biometrically-monitored population to accelerate consumerism and spending. What gave away the core of this mob stalking method as culturally jewish was that Israelis always positioned themselves in the lead to appear as a victim, with their terrain cues consistently ordinary, per Mossad and Shin Bet's mottos of deception and concealment as a strategy.

The culturally jewish methods of deception and concealment are mafia tactics, as evidence by the similarity in criminal activities between American jewish mafia and the Israeli mafia; the embedded Nation of Israel and Israel proper."

Webmaster Comment: O'Keefe's description and understanding of electronic AND on-the-ground gangstalking operations are probably the most sophisticated and best I have yet seen. I assume he was killed-suicided during the process of his torture/murder. May he rest in peace, a true hero for humanity.

5. From: Quotes on Judaism and Zionism

1) "The Jewish people as a whole will become its own Messiah. It will attain world domination by the dissolution of other races, by the abolition of frontiers, the annihilation of monarchies and by the establishment of a world republic in which the Jews will everywhere exercise the privilege of citizenship.

In this New World Order, the children of Israel will furnish all the leaders without encountering opposition. The Governments of the different peoples forming the world republic will fall without difficulty into the hands of the Jews. It will then be possible for the Jewish rulers to abolish private property and everywhere to make use of the resources of the state.

Thus will the promise of the Talmud be fulfilled, in which it is said that when the Messianic time is come, the Jews will have all the property of the whole world in their hands."

Baruch Levy, Letter to Karl Marx, printed by "La Revue de Paris, p. 574, June 1, 1928

2) "The net which Israel now casts over the terrestrial globe enlarges and extends. . . . Our power is immense. Learn to turn that power to our cause. The day is not far distant when all the riches, all the treasures of the earth, will become the property of the children of Israel."

The Jew and high Mason, Cremieux, founder and president of L'Alliance-israelite-universelle (1860); from "The Trail of the Serpent," by Inquire Within (1936)

3) "We hate Christianity and Christians; even the best of them must be looked upon as our worst neighbors. They preach the love of our neighbours and mercy, which is contrary to our principles. Down with the love of our neighbour; what we want is hatred. We must learn how to hate and it is only then that we shall conquer the world."

Commissar for Public Instruction of Soviet Union, Lunatscharsky.

4) "Judaism is a secret Satanic cult posing as a religion…. Judaism is not Monotheistic but Luciferian. It's goal is the replacement of God with the secret Jewish leadership. Both the Talmud and the Cabala are dedicated to the proposition that only Jews are human…. Modern history and culture reflect a Cabalistic (Satanic) spell cast on the human race. It is dedicated to the fulfillment of prophecy, the eventual enslavement of mankind by the "Jews" who in practice will be the crazed Illuminati Order."

Henry Makow, Jew writer, 2009

5) "We are a superior subspecies. We transcend humanity. We are Nature's Supermen. We deserve the subservience and availability of everyone around us. Luckily, every year 100-million people are born throughout the world. We have 100-million new choices every year."

Sam Vaknin, Jewish psychopath, EGOMANIA

Webmaster comment: Given the well-documented and long-term Jewish objective of world conquest and enslavement of non-jews, and given the longstanding goal of rabbis to create their own golem monsters who help them conquer the world, it seems feasible that the groomed and mind-controlled gangstalking predators which Jeffrey Madore and Stephen O'Keefe describe are their golems.

6. From: A) From: Gangstalking 101/ Cointelpro 2.0: My Personal Hell Of Masonic Harassment! – James Harken On The LanceScurv Show

and B) From: The Master Cult: Masonry (Satanism)- This World's Secret Religion, Antichrist Spirit of the New Age, & Gangstalking Perpetrators!? (6/4/21; & 2 More Videos, 1 Article)

Webmaster comment: These posts and videos reinforce the central importance of Freemasonry in carrying out global gangstalking operations. Numerous authors point out that Freemasonry is a gentile front for Judaism. However, this too is a just a partial truth. In fact, the top degrees in Freemasonry, since the Masonic Congress of Wilhelmsbad, held in 1782, are the Jewish (Illuminati) degrees.

IV. Webmaster Conclusions: The above information certainly seems to indicate that, indeed, Judaism is the diabolical spirit behind global gangstalking operations, per:

a) The Diabolical Spirit Behind Organized Stalking/Targeting AND THE NEW WORLD ORDER'S COMMUNIST "GREAT RESET;" Excerpts From "The Controversy of Zion" (Douglas Reed, 1978)

Excerpts from Douglas Reed's "The Controversy of Zion" (1978) Pertaining to the Demonic Spirit Behind Organized Stalking/Targeting/

1) "Judaism IS "the worship of Moloch. The whole dispute between ancient Israel and Judah of the Levites raged round this false deity and his demands, and Israel turned its back on Judah on this very account; this is the root of the controversy of Zion, three thousand years ago and now."

Douglas Reed, The Controversy of Zion (1978)

2) "Some call it communism, I call it Judaism"

Rabbi Stephen Wise

b) Zionist and Communist Jews Were Main Torturers At Nazi Concentration Camps: From Douglas Reed's "The Controversy of Zion" (book review and book pdfs and excerpts)

Reviewer Robert Sungenis concludes his (Controversy of Zion) book review with this observation:

"Perhaps understanding much better Cardinal Manning's perspective that the rise of Zionism coincides with the Antichrist of St. Paul's Thessalonian epistle, Reed concludes: "The feeling I had, in tracing the story of this ancient superstition and its reemergence as a political force in our century, was that of contact with a living, evil thing.""

Compare that conclusion with the confession of Harold Rosenthal, (Jewish) aide to (Jewish) Senator Jacob Javits, from an extended 1976 interview:

"Most Jews don't like to admit it, but the god we worship is Lucifer….. He is very much alive and we are his "chosen people."

Now combine this insight with that of Grand Chess Master, Bobby Fischer, whose parents were Jewish:

"My basic thesis is that the Jews are a criminal people, and the Jews completely control the United States, and the Jews are using the United States as a vehicle to take over the world… "

Compare these insights with those of America's founding fathers:

PRESIDENT GEORGE WASHINGTON stated (from Maxims of George Washington, by A. A. Appelton & Company):

"They [the Jews] work more effectively against us, than the enemy's armies. They are a hundred times more dangerous to our liberties and the great cause we are engaged in… It is much to be lamented that each state, long ago, has not hunted them down as pest to society and the greatest enemies we have to the happiness of America."

BENJAMIN FRANKLIN is reported to have stated at the Constitutional Convention in 1789 (notes held at Franklin Institute in Philadelphia):

"I fully agree with General Washington, that we must protect this young nation from an insidious influence and impenetration. The menace, gentlemen, is the Jews. In whatever country Jews have settled in any great numbers, they have lowered its moral tone; depreciated its commercial integrity; have segregated themselves and have not been assimilated; have sneered at and tried to undermine the Christian religion upon which that nation is founded by objecting to its restrictions; have built up a state within a state; and when opposed have tried to strangle that country to death financially, as in the case of Spain and Portugal.

For over 1700 years the Jews have been bewailing their sad fate in that they have been exiled from their homeland, they call Palestine. But, Gentlemen, should the world today give it to them in fee simple, they would at once find some cogent reason for not returning. Why? Because they are vampires, and vampires do not live on vampires. They cannot live only among themselves. They must subsist on Christians and other people not of their race.

If you do not exclude them from these United States, in this Constitution, in less than 200 years they will have swarmed in such great numbers that they will dominate and devour the land, and change our form of government, for which we Americans have shed our blood, given our lives, our substance and jeopardized our liberty.

If you do not exclude them, in less than 200 years our descendants will be working in the fields to furnish them sustenance, while they will be in the counting houses rubbing their hands. I warn you, Gentlemen, if you do not exclude the Jews for all time, your children will curse you in your graves. Jews, Gentlemen, are Asiatics; let them be born where they will, or how many generations they are away from Asia, they will never be otherwise. Their ideas do not conform to an Americans', and will not even though they live among us ten generations. A leopard cannot change its spots."

PRESIDENT THOMAS JEFFERSON stated:

"Dispersed as the Jews are, they still form one nation, foreign to the land they live in. " (D. Boorstin, THE AMERICANS)

These insights comport with Jesus Christ's condemnation of the Pharisaic Jews of his day (John 8:44):

"Ye are of your father the devil, and the lusts of your father ye will do. He was a murderer from the beginning, and abode not in the truth, because there is no truth in him. When he speaketh a lie, he speaketh of his own: for he is a liar, and the father of it."

Now we can plainly see that gangstalking, terror, assassination, murder, mass torture, and heinous "scientific"/medical experimentation on innocent civilians are the standard modus operandi of "Satan's kids" in their relentless multi-millennial drive to establish Satan's kingdom on earth.

Clearly, the United States has been captured by and is locked in a death struggle, a zero sum, winner-take-all contest, with an alien group. The following statements by Jews, Bobby Fischer, Grand Master Chess Champion, and Michael Ledeen, neoconservative political strategist, suggest that the 5th column group that has captured America is comprised of "the Jews," who are always aided by Freemasons and allied banks, businesses, and intelligence agencies, etc. that they control:

1) Bobby Fischer (of Jewish parentage), American chess grandmaster, 11th World Chess Champion, often considered the greatest chess player ever (and possible TI):

"My basic thesis is that the Jews are a criminal people, and the Jews completely control the United States, and the Jews are using the United States as a vehicle to take over the World. There is no United States as people think of it. It's just a puppet in the Jews' hands. It's a plaything for the Jews… The US government and American Jewry are virtually interchangeable…

Jews are intensely selfish, intolerant and antisocial. They are full of hate, greed, malice. Naturally, other people, i.e. the non-Jews, don't like being bulldozed aside, robbed and murdered by the Jews, and will sooner or later resist. That is where the lies and deceit of the Jews come into place. No lie is too big for a Jew, no lie is too small… Jews live by lying, and die with coming in contact with the truth."

"Almost everyone who has been around me turned out to be a secret agent working for the Jews, working for the CIA… The Jews have planted so many of their Jew agents and CIA rats all around me. So many people… girlfriends, lawyers, everybody almost, turned out to be working for the CIA and the Jews. Unbelievable but true."

2) Michael Ledeen, Jewish Neoconservative, in "The War Against the Terror Masters" (2003):

"Creative destruction is our middle name, both within our own society and abroad. We tear down the old order every day, from business to science, literature, art, architecture, and cinema to politics and the law. Our enemies have always hated this whirlwind of energy and creativity, which menaces their traditions (whatever they may be) and shames them for their inability to keep pace. Seeing America undo traditional societies, they fear us, for they do not wish to be undone. They cannot feel secure so long as we are there, for our very existence—our existence, not our politics—threatens their legitimacy. They must attack us in order to survive, just as we must destroy them to advance our historic mission."

3) "When the Messiah comes every Jew will have 2800 slaves." -Simeon Haddarsen, fol. 56-D (Jewish Talmud)

4) "The goal for which we have striven so concertedly for three thousand years is at last within our reach, and because its fulfillment is so apparent, it behooves us to increase our efforts and our caution tenfold. I can safely promise you that before ten years have passed, our race will take its rightful place in the world, with every Jew a king and every Gentile a slave. We will openly reveal our identity with the races of Asia and Africa. I can state with assurance that the last generation of white children is now being born.

"Our control Commissions will, in the interest of peace and wiping out our interracial tensions, forbid the whites to mate with white. The white woman must cohabit with members of the dark races, the white men with black women. Thus the white race will disappear, for mixing the dark with white means the end of the white man, and our most dangerous enemy will become only a memory. We shall embark upon an era of ten thousand years of peace and plenty, the Pax Judaica, and our race will rule undisputed over the world. Our superior intelligence will easily enable us to retain mastery over a world of dark people.

… This war will end for all time the struggle against the Gentiles… Our race will rule undisputed over the world… And so, with vision of world victory before you, go back to your countries and intensify your good work, until that approaching day when Israel will reveal herself in all her glorious destiny as the Light of the World".

-Rabbi Emanuel Rabinovich; Speaking of the Third World War, Rabbi Rabinovich is publicly reported to have addressed a special meeting of Rabbis in Budapest on January 12, 1952 as reported in the Nov/Dec 2000 issue of Americas Bulletin (N.P. Purvis, Editor), The Canadian Intelligence Service – Excerpt from September 1952 issue, "The World's Troublemakers," [See resources ] "THE STRUGGLE AGAINST THE GENTILES"

5) THE NEW WORLD WAR EXPLAINED by Mark M. Rich ("New World War: Revolutionary Methods For Political Control," 2011)

"…. … Now that most nations have been conquered, either by military might or economic subversion, the regular state-to-state type of warfare will be phased out… Specific names given to the small wars that will be waged globally include, asymmetric warfare (AW), fourth generation warfare (4GW), third wave warfare (3WW), network-centric warfare (NCW, netwar), NATO networked enabled capability (NNEC), and military operations other than war (MOOTW). Others are low-intensity conflict (LIC), irregular warfare (IW), and unconventional warfare (UW). Related terms include effects based operations (EBO,) civil-military operations (CMO), and peace operations (PO).

… The battlefield for this new type of warfare has expanded into the civilian sector. For this reason, it's now called the "battlespace." The battlespace is global. The battles take place among the civilian population where the military uses civilians as irregular forces. The physical architecture of the battlespace has several levels. At the top is the space level which includes satellites. The near-space level has UAVs (unmanned aerial vehichles) and high-flying aircraft. Then there is the maneuver level which contains people, robots, vehicles, ships, and low-flying aircraft.

According to the Army, the new enemy will increasingly seek protection among the civilian population. The essential "struggle of the future," they say, will take place primarily among the civilians and will therefore require US security dominance in these areas.

…. The new enemy (Targeted Individuals) will be denied sanctuary, tracked everywhere with intrusive surveillance, and attacked with PsyOp (psychological operations) and NLW (non-lethal weapons) relentlessly. Most of these weapons and tactics, which are used in combination, leave little or no trace of their use.

Directed energy weapons, including microwaves, lasers, and acoustic frequencies, will be used on the enemy. Depending on the frequency and power level, these weapons can cause a wide variety of effects spanning the mental, emotional, and physical realms…. People can be traumatized with microwave hearing technology. Powerful silent subliminals can setup mental conflicts and can be used to influence people's emotions, thoughts and behavior. Holograms can be transmitted to specific points in space to scare people.

PsyOp attacks are transmitted through every possible "channel of communication" that the TA (targeted audience) uses. The TA's environment is psychologically prepared with "products" which have "triggers" that they've been "sensitized" to…

Custom-tailored weather attacks are to be used on a micro-scale against the enemy. And, yes, even remote-controlled insects and rodents are in the DOD's (US Department of Defense's) arsenal. Physical and psychological isolation of the enemy from their support structure is standard procedure in the new war. Using PsyOp, advanced surveillance technology, and NLWs, the enemy will be denied sanctuary any place they visit.

Official (government) sources have mentioned multiple times that this surveillance will be intrusive and constant. A variety of technology exists which can accomplish this, such as devices for seeing through walls, mind-reading, and tiny sensors which can detect anything a human being can as well as a multitude of other environmental stimuli."

V. Postscript: The "Protocols of Zion" Are Now Implemented and Fulfilled

The above information confirms that Jews are the world's "controllers," as I laid out in 2012 in this document:

1) The Controllers and Their Destructive Mission

Furthermore, we now seem to be witnessing the culmination of the plan for global conquest laid out in "The Protocols of the Learned Elders of Zion" at the First Zionist Congress in 1897:

2) Protocols of Zion (15, 16, 17, 18) predict NWO Terror-mind control-Police State

3) (Jewish) Protocols Explain Almost Everything: Author Hugh Akins Explains

Today's global gangstalking system seems to be a direct result of policies deliberately implemented by the global judeo-masonic-satanic death cult, as evidenced by the protocols themselves:

From: Protocols of Gangstalking (aka Jewish Mob Stalking)

Protocol 1: Power of Force and Make-believe:

"It is only with a despotic ruler that plans can be elaborated extensively and clearly in such a way as to distribute the whole properly among the several parts of the machinery of the State: Without an absolute despotism there can be no existence for civilization….

Our counter-sign is Force and Make-believe. Only force conquers in political affairs, especially if it be concealed in the talents essential to statesmen. Violence must be the principle, and cunning and make-believe the rule for governments. The evil is the one way and only means to attain the end, the good. Therefore we must not stop at bribery, deceit and treachery when they should serve towards the attainment of our end. In politics one must know how to seize the property of others without hesitation if by it we secure submission and sovereignty.

* Our State, marching along the path of peaceful conquest, has the right to replace the horrors of war by less noticeable and more satisfactory sentences of death, necessary to maintain the terror which tends to produce blind submission.

(It is) by the doctrine of severity that we shall triumph and bring all governments into subjection to our super-government.

Protocol 2: Universal spying:

"… Our predominance…. Will put both sides at the mercy of our international agentur; which possesses millions of eyes ever on the watch and unhampered by any limitation whatever.

Protocol 3: "Divide and Conquer"

"In order to incite seekers after power to a misuse of power we have set all forces in opposition to another…. Abuses of power will put the final touch in preparing all institutions for their overthrow and everything will fly skyward under the blows of the maddened mob.

We are interested in the diminution, the killing out of the GOYIM.

By want and the envy and hatred which it engenders we shall move the mobs and with their hands we shall wipe out all those who hinder us on our way.

When the hour strikes for our Sovereign Lord of all the World to be crowned it is these same hands which will sweep away everything that might be a hindrance thereto.

We have been leading the peoples from one disenchantment to another, so that in the end they should turn also from us favour of that King-Despot of the blood of Zion, whom we are preparing for the world.

Protocol 4: Managed class struggle:

"The intensified struggle for superiority and shocks delivered to economic life will create, nay, have already created, disenchanted, cold, and heartless communities. Their only guide is gain, that is Gold, which they will erect into a veritable cult, for the sake of those material delights which it can give. Then will the hour strike when, not for the sake of attaining the good, not even to win wealth, but solely out of hatred towards the privileged,

• the lower classes of the goyim will follow our lead against our rivals for power, the intellectuals of the goyim.

Protocol 5: use of despotism and overwhelming force….

" Our kingdom will be distinguished by a despotism of such magnificent proportions as to be at any moment and in every place in a position to wipe out any goyim who oppose us by deed or word.

Protocol 6: Steal the goyim's land and "extirpate" goy intellectuals:

* "It is essential for us at whatever cost to deprive them (goy aristocracy) of their land…. (And we will take all measure) to extirpate from the face of the earth all the educated forces of the GOYIM."

Protocol 7: Impose universal authoritarian military-police state through use of terrorism and American military as world police force.

* "The intensification of armaments, the increase of police forces- are all essential for the completion of the aforementioned plans.

"To sum up our system of keeping the governments of the goyim in Europe in check, we shall show our strength to one of them by terrorist attempts and to all, if we allow the possibility of a general rising against us, we shall respond with the guns of America or China or Japan."

(The above statement suggests that the author(s) of the Protocols believed they – World Jewry- then (circa 1897) already had control of the United States, China, and Japan.)

Protocol 9: Use of terror, education, training, and "anti-Semitism" to mold, change, and subdue people

"Not a decade will pass before the most stubborn character will change and we shall add a new people to the ranks of those already subdued by us.

Nowadays, if any States raise a protest against us it is only pro-forma at our discretion and by our direction, for their anti-Semitism is indispensable to us for the management of our lesser brethren.

* Our Super-Government subsists in extra-legal conditions which are described in he accepted terminology by the energetic and forcible word- Dictatorship…. At the proper time, we, the lawgivers, shall execute judgement and sentence, we shall slay and we shall spare, we, as head of all our troops, are mounted on the steed of the leader… the weapons in our hands are limitless ambitions, burning greediness, merciless vengeance, hatreds and malice. It is from us that the all-engulfing terror proceeds.

* By inculcating in all a sense of self-importance, we shall destroy among the goyim the importance of the family and its educational value and remove the possibility of individual minds splitting off, for the mob, handled by us, will not let them come to the front or even give them a hearing."

Protocol 11: The "new" Constitution; Goyim are a flock of sheep and we are the wolves.

"The freedom of the press, the right of association, freedom of conscience, the voting principle, and many another… must disappear forever from the memory of man, or undergo a radical alteration the day after the promulgation of the new constitution.

The goyim are a flock of sheep, and we are their wolves."

Protocol 12: Controlled opposition and brainwashing and mind control of public.

"Among those making attacks upon us will also be organs established by us, but they will attack exclusively points that we have pre-determined to alter.

Not a single announcement will reach the public without our control…. We have already contrived to possess ourselves of the minds of the goy communities to such an extent that they all come near looking upon the events of the world through the colored glasses of those spectacles we are setting astride their noses.

Protocol 13: We have stage-managed reality according to our political plan for many centuries.

"When we come into our kingdom our orators will expound great problems which have turned humanity upside down in order to bring it at the end under our beneficent rule. Who will ever suspect then that all these peoples were stage-managed by us according to political plan which no one has so much as guessed at in the course of many centuries?"

Protocol 15: National and international police will come from Masonic lodges, which we control. We also control judges, senators, and the "higher administration" (presidents, etc.).

* "Among the members of the these (Masonic) lodges will be almost all the agents of international and national police since their service is for us irreplaceable in the respect that the police is in a position not only to use its own particular measures with the insubordinate, but also to screen our activities and provide pretexts for discontents, etc."

* … Under our influence the execution of the laws of the goyim has been reduced to a minimum…. In the most important and fundamental affairs and questions judges decide as we dictate to them.

* Even senators and the higher administration accept our counsels.

Protocol 16: Subversion of universities and destruction of independent thought

"We shall abolish every kind of freedom of instruction.

* We shall swallow up and confiscate to our own use the last scintilla of independence of thought, which we have for long past been directing towards subjects and ideas useful for us….. the purpose of which is to turn the goyim into unthinking submissive brutes waiting for things to be presented before their eyes in order to form an idea of them…"

Protocol No. 17. King of Jews will be the Pope of the Universe. We will divide society so that 1/3 are spies and informers who will keep the rest under observation

"The King of the Jews will be the real Pope of the Universe, the patriarch of an International Church.

But in the meantime, while we are re-educating youth in new traditional religions (ETK- New Age religions, etc.), and afterwards in ours, we shall not overtly lay a finger on existing churches, but we shall fight against them by criticism calculated to produce schism….

Our kingdom will be an apolgia of the divinity Vishnu, in whom is found its personification – in our hundred hands will be, one in each, the springs of the machinery of social life. We shall see everything without the aid of official police which, in that scope of its rights which we elaborated for our the use of the goyim, hinders governments from seeing.

• "In our program, one third of our subjects will keep the rest under observation from a sense of duty, on the principle of volunteer service to the State. It will then be no disgrace to be a spy and informer…."

• Our agents will be taken from the higher as well as the lower ranks of society, from among the administrative class who spend their time in amusements, editors, printers, and publishers, booksellers, clerks, salesmen, workmen, coachmen, lackeys, etc. This body, having no rights and not being empowered to take any power on their own account, and consequently a police without any power, will only witness and report: verification of their reports and arrests will depend upon a responsible group of controllers of police affairs, while the actual act of arrest will be performed by the gendarmerie and the municipal police. Any person not denouncing anything seen or heard concerning questions of polity will also be charged with and made responsible for concealment, if it be proved that he is guilty of this crime.

Just as nowadays our brethren are obliged at their won risk to denounce to the kabal apostates of their own family or members who have been noticed doing anything in opposition to the kabal, so in our kingdom over all the world it will be obligatory for all our subjects to observe the duty of service to the State in this direction.

Protocol 18: Measures of secret defense. Mind control.

"Our ruler will be securely protected only by the most insignificant guard, because we shall not admit so much as a thought that there could exist against him any sedition with which he is not strong enough to contend and is compelled to hide from it."

Gang Stalking Mind Control Cults
25 Sep 2022 | 6:13 am

A “Staged” Reality: “Infowarrior” Alex Jones Convicted For Exposing Sandy Hook “Mass Shooting” As “Potemkin (Propaganda) Village”-Truman Show-Style Staged Event


Epigraph Quotes:

1) Potemkin Village (From RationalWiki): A Potemkin Village (sometimes called a propaganda village) is any construction, ranging from a façade up to full towns, built for the purpose of deceiving visitors into believing that the local situation is better than it actually is. A favorite of Communist and Nazi regimes alike, a Potemkin village is, in effect, a vehicle of psychological warfare against those who would suspect that things might in fact not be hunky-dorey for those living under an authoritarian heel.

2) All warfare is based on deception. – Sun Tzu

3) You've got to force them into an unreal world. – Older British spy to younger American spy during WWII in "The Good Shepard"

4) All the world's a stage and all the men and women merely players.
They have their exits and their entrances.
And one man in his time plays many parts.

William Shakespeare, "As You Like It"

5) Hell is empty, and all the devils are here. – William Shakespeare, The Tempest

6) Whom the gods* would destroy, they first make mad. – Euripides (Greek dramatist 484-406 BC)

* (today: intelligence agencies, psychologists, satanists, demons, totalitarian governments, banking elites, Masons, Jews, Interactive Internet Activists (IIA), crisis actors/gangstalking perpetrators)

Webmaster Introduction:

Infowars podcaster, Alex Jones, is now being tried, convicted, and punished for telling the truth about the Sandy Hook staged, false-flag "mass shooting." Based on the partial transcription provided of court room dialogue between Jones and the prosecuting lawyer (below), all Targeted Individuals (TIs) will recognize that what happened at Sandy Hook is the same kind of staged, street theater/psychological operation that we are continually subjected to!!!!!!!! Based on my experience as a TI, I can say unequivically that the Sandy Hook "families" were/are crisis actors/surveillance role players. The cover-up of this false-flag psychological operation on the American public now extends to include this staged, show-trail conviction of populist internet podcaster, Alex Jones.

Modern military documents explain that the "battlefield" is now everywhere and it includes your mind. Americans: We are the "mark," the "targeted audience" of these scripted, staged, and highly-publicized events. (Many other examples of this kind of psywar operation, I believe, include the JFK assassination, 9/11, the London 7/7 bombing, the Boston Marathon bombing, the Las Vegas and Uvalde shootings among many others, the staged January 6 "insurrection," etc.)

According to Behind NATO's 'cognitive warfare': 'Battle for your brain' waged by Western militaries (by Ben Norton, October 8, 2021):

"Cognitive Warfare is the "art of using neuro Science/Tech technologies to alter the cognition of human targets" in order "to harm the cognitive abilities of opponents," "make everyone a weapon," "harm societies as well as the military," and "capture the psycho-cultural as well as the geographical high ground"- at home and abroad."

But who are these actors, these "weaponized people," and why are they doing this? Many are "bought and paid for" with bitcoin, gift cards, and other "off-the-books" "incentives," I'd guess, just like gangstalking perpetrators. Many are technologically mind-controlled (via MKULTRA techniques) and/or are genuinely satanically possessed. Many are coerced and conscripted by Milgram's "Obedience to Authority" experiment-type deceptions. Many "enlist" through a misguided sense of patriotism and/or boredom. And many others are simply criminals. Remotely commanded by their cell phone apps and/or brain-to-computer or brain-to-brain interface technologies, they comprise plain-clothed gangstalking teams and privatized armies, such as Antifa and Black Lives Matter. As one who is continually exposed to these kinds of "lies, spies, setups, and psyops" aka psychological attacks, my sense is that the perpetrators include a high percentage of individuals who are demonically possessed or oppressed.

These civilian-military psychological operations/information operations, also known as "IIA Operations" (Interactive Internet Activities) or "fake news", are orchestrated by innumerable private-sector companies such as Dynology and Clear Force, led by ex-military personnel such as General Michael Hayden and Generals James and Jim Jones. These operations employ many military-trained psychological warfare "experts" in "psychological operations groups" (POG) as well as plain-clothed special forces (USSOCOM) and/or military and intelligence operatives. (Ray Epps is a good example of an agent provocateur who helped stage-manage the so-called "January 6 insurrection.")

Clearly, many citizen and military "role-players" are involved in the Sandy Hook operation and its ongoing cover-up. These would have to include the Sandy Hook residents and families, numerous unseen directors and agents provocateurs, the judge and lawyers in this staged show trial, and possibly even defendant, Alex Jones himself. After all, it is Jones who introduces the term "Potemkin village" in the courtroom dialogue transcribed below. Based on information provided in Brendon O'Connell's video below, Jones may indeed be playing a starring role in this "controlled release"/"limited-hangout" aspect of the Operation Sandy Hook coverup.

Brendon O'Connell provides important relevant information in the following video, which I have partly transcribed here:

THE LIVES OF OTHERS – IIA OPERATIONS – JAMES O'KEEFE & PATRICK BERGY. "BRENDON O'CONNELL" (12/2/21): IIA (Internet Interactive Activities) Operations (Fake News), Privatized Armies, Gangstalking Teams, Military Psychological Warfare, Computer Network Operations (CNO), Targeted Civilians

Brendon O'Connell (from above video): "When you watch Alex Jones, David Icke, Nick Fuentes, Tucker Carlson, CNN, Joe Rogan, IRL, when you watch any social media influencer of any status, always in your mind must be the concept of IIA Operations- limited release or limited hangout, controlled release, suppression, containment, redirection, misdirection of information into meaningless manufactured online issues, arguments and circular dead ends that exhaust and confuse. The aim? To never allow diverse meaningful information to become direct, meaningful political power and movements at the grassroots level that have concrete effects in the pubic domain.

You are in a contrived right vs. left banker-funded dialectic. When you are exhausted, beaten, and crying out for certainty and freedom from fear and anxiety, the final solution will be offered you…."

The relevant courtroom dialogue occurs at 35 to 42 minutes in this Infowars broadcast on Sept. 22, 2022:

Sept. 22, 2022 Infowars Program: Markets Tank After Major Threats of Nuclear War Emerge

https://ugetube.com/watch/wpt4yblmhtyoxwm?lang=spanish

Markets Tank After Major Threats of Nuclear War Emerge

https://article.wn.com/view-bitchute/2022/09/23/Markets_Tank_After_Major_Threats_of_Nuclear_War_Emerge_FULL_/

https://banned.video/watch?id=632cdfa774fe890c55781cc8

Owen Schroyer Commentary at 40:00:
"This is a politicized lawsuit that came 10 years after he (Alex Jones) said anything (about Sandy Hook). What's sad is that this, it's all about getting Alex Jones off the air. This is just ceremony. Everyone is just playing their role in this grand theater of the end of the First Amendment. This is the end of opposition to political power and the questioning of major events and this is just ceremony."

Courtroom dialogue from about 35:00 to 45:00 minutes:

Prosecutor: Mr. Jones, am I correct that at that deposition at our private meeting on April 5, 2022, do you acknowledge that you referred to these (Sandy Hook) families as actors? You gave me two options. The first option is: Rodney Parker is just an actor playing a role. The other option is that the person is really who they say they are but they are just going along with an official script.

Jones: Yes. I never really even saw their faces until they sued me….

Prosecutor: (So) in the first option circumstance, Rodney Parker is just a fictitious character.

Jones: Yes, that's role playing.

Prosecutor: In that context, the actor playing Rodney Parker is going out in front of the whole world to give a statement, knowing he is just playing a fictitious part. Correct?

Jones: Yes.

Prosecutor: Do you remember that in your deposition you acknowledged that for this hoax to work, it wouldn't just be Rodney Parker (who was acting), it would all have to be all the families who were actors, correct?

Jones: Can you refresh me with the transcript?

At 41:20: Prosecutor: You referred to a Potemkin Village. What's a Potemkin Village?

Alex Jones: A Potempkin Village, I believe, goes back to examples like, before the Russian Revolution, the Czars would build fake villages for PR stunts. It has something to do with Russian history and government staging events.

Prosecuting lawyer: And this Potemkin Village would be filled with people that play parts as if they were villagers: Actors in a hoax that the government staged.

Jones: Yeah. Just like the Truman Show.

Prosecutor: That's a movie right? ..where this fake village is plopped down and everyone who populates it is in on the hoax, yes?

Jones: I think that's a fair definition.

Definition of Potemkin Village: (From: Rational Wiki)

"A Potemkin Village (sometimes called a propaganda village) is any construction, ranging from a façade up to full towns, built for the purpose of deceiving visitors into believing that the local situation is better than it actually is.

A favorite of Communist and Nazi regimes alike, a Potemkin village is, in effect, a vehicle of psychological warfare against those who would suspect that things might in fact not be hunky-dorey for those living under an authoritarian heel.

The term dates to 1787; the story goes that the Russian statesman Grigory Potyomkin, tasked with governing New Russia (recently-conquered lands in present-day Ukraine), had a fake portable settlement built to impress the visiting empress, Catherine the Great.

Modern historians largely believe that the original Potemkin-village story is a myth, but the term has persisted to describe genuine examples of deceptive settlements and other structures."

Webmaster Conclusion:

"All power tends to corrupt; absolute power corrupts absolutely."

Lord Acton, British historian

I recently posted these two posts, the first of which includes a series of 8 articles:

1) Pentagon To "Review" Their Information and Cyber Warfare Against American Citizens (8 Articles)

2) "FALSE FLAGS" are LEGAL PROPAGANDA Produced by the Department of Defense" by State of the Nation (posted 8/17/20)

Gee, I hope the Pentagon decides to turn its energies toward defending rather than destroying the United States and other sovereign nations. But realistically, the United States has been captured by the "children of darkness" and this may be too much like asking the mafia to investigate itself.

Postscript:

They use satanism. – Dr. Rauni Kilde, Bright Light on Black Shadows (2015)

Psalm 23:

The Lord is my shepherd; I shall not want.
He maketh me to lie down in green pastures: he leadeth me beside the still waters.
He restoreth my soul: he leadeth me in the paths of righteousness for his name's sake.
Yea, though I walk through the valley of the shadow of death, I will fear no evil: for thou art with me; thy rod and thy staff they comfort me.
Thou preparest a table before me in the presence of mine enemies: thou anointest my head with oil; my cup runneth over.
Surely goodness and mercy shall follow me all the days of my life: and I will dwell in the house of the Lord for ever.

Gang Stalking Mind Control Cults
24 Sep 2022 | 3:45 pm

“The War on Iraq” (2002) & “Geo- and Oil- Political Background and Lead Up to 2003 U.S. Invasion of Iraq” (2003) by Dr. Eric Karlstrom


I. The War On Iraq

Dr. Eric Thor Karlstrom, Department of Anthropology and Geography, CSUS, California

(November 16, 2002)

Since he gave his "Axis of Evil" speech, President Bush has not wavered in his resolve to wage war on Iraq. This despite objections from most of the nations of the world, the Joint Chiefs of Staff, and even from prominent Republicans such as Brent Scrowcroft, Henry Kissinger, and Dick Armey. The President assumes he has legal authority to wage such a war even though such a pre-emptive attack would violate the UN Charter, the Geneva Conventions, the international law of self-defense, and the Nuremburg war criminal code. Iraq's neighbors Kuwait, Saudi Arabia, and Turkey have each rejected the idea that they need protection from Iraq. Bush maintains the pretext of needing to disarm Saddam Hussein's weapons of mass destruction, despite the fact that former weapons inspectors such as Scott Ritter have insisted that Iraq has not had the capabililty to produce nuclear weapons since 1991. And it was the United States that supplied Iraq with biological and chemical weapons. The minister of Justice in Germany this fall compared George W. Bush to Adolf Hitler – both relied upon pretext for their attacks upon other nations and showed imperious disregard for the civilized opinions of others.

In fact, recent papers have come to light such as Project for the New American Century, Sept. 2000, which indicate that the U.S. military has been planning an invasion of Iraq since the late 1990s and that it intends to take control of the Gulf region whether or not Saddam is in power. Even the pretext of "regime change" is a façade. The report states:

The United States has for decades sought to play a more permanent role in Gulf regional security. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein.

This "American grand strategy" must be advanced "as far into the future as possible". It calls for the U.S. to "fight and decisively win multiple, simultaneous major theatre wars" as a "core mission". And it says the U.S. must "discourage advanced industrial nations from challenging our leadership or even aspiring to a larger regional or global role".

The plan considers several options to redraw the map of the Middle East. These include the population transfer of Palestinians from occupied Palestine into Jordan, the partition of Iraq into three separate provinces, a north, central and south, and/or the creation of a Hashemite kingdom of Iraq and Jordan. The plan calls for the U.S. to maintain complete dominance of space and cyberspace, thus developing a "worldwide command and control center". It is likely that the war will result in the killing of thousands or tens of thousands of Iraqis, will provide cover for Israeli aggression against the Palestinian people, and will provide the excuse for U.S. invasions into other nearby countries.

What is really behind the U.S. hostility to Iraq? OIL. Iraq has 11% of the world's proven oil reserves. Saudi Arabia has 25%. On the agenda in this perpetual war are Iran, Egypt, Saudi Arabia, Syria, and Lebanon. And Vice President Cheney is already trading away Iraq's oil assets to Russian and European corporations in return for their cooperation. But before we discuss this, let's look at a little bit of history.

History of Iraq

Iraq includes the area drained by Tigres and Euphrates River; the "cradle of civilization". More recently, it was part of the Ottoman Empire that was carved into much smaller countries by Britain and France at the close of World War I. This country was disassembled so that no regional power could contest the hegemony of the First world industrial countries over the region's valuable oil resources. Under the new arrangement, Iraq's oil belonged to England, France, the Netherlands and the United States. None of the oil wealth went to the Iraqi people. As a result, they lived in extreme poverty and hunger with an illiteracy rate of more than 80%. The country was ruled by the corrupt King Faisal II and a group of feudal landowners. In 1958, Gen. Abdul Karim Kassem overthrew king and established a republic. This event stunned Wall Street and Washington. (At the time, this Iraqi revolution was considered a much greater disaster than the Cuban revolution which occurred six months later). The next day, 20,000 U.S. marines landed in Lebanon. The day later, another 6,600 British troops arrived in Jordan.

In the "Eisenhower Doctrine", the U.S. asserted its intention to go to war in the Middle East to prevent similar revolutions from occurring. This probably saved the corrupt neocolonial regimes in Jordan and Lebanon from a similar fate. Eisenhower, his Secretary of State, and the Joint Chiefs of Staff laid plans to invade Iraq and install a new puppet government in Bagdad. However, the U.S.S.R. mobilized troops to the edge of Iraq and the U.S. reluctantly had to accept the loss of Iraqi oil revenue- for the time being. But in 1960, the U.S. began to fund Kurdish guerillas who were fighting for a measure of autonomy within Iraq and the CIA made an unsuccessful attempt to assassinate Kassem. He made himself even more of a marked man when he helped create the Organization of Petroleum Exporting Countries (OPEC) the next year and then created a national oil company. In 1963, in a CIA and British-sponsored coup, Kassem was assassinated and thousands of communists were killed.

In the 1980's, the U.S. funded and encouraged Iraq in its bloody war with Iran, hoping to weaken and destroy both countries. The war killed a million people and did weaken both countries. However, even during this period, the standard of living in Iraq was amongst the highest in the Arab world. 97% of people in the cities had access to clean water and there was a very high literacy rate. And, for an Arab country, there was relative equality of sexes; as 40-50% of doctors were women. All this was due to Iraqi nationalization of oil resources. It was just after Iran-Iraq war, that the U.S. began calling Saddam "another Hitler". Why? Again, because the Iraqi government was using Iraqi oil wealth to help the Iraqi people and because Iraq was becoming a regional power. For a neocolony to utilize it's own resources for its own people was, is, and always has been regarded as a threat to U.S. imperialistic interests.

So in 1990 and 1991, the U.S., under the leadership of George Bush I, orchestrated an attack on the people of Iraq which included 43 days and nights of relentless bombing, the most concentrated aerial attack the world had ever seen. 177 million pounds of bombs fell, including cluster bombs and 300 tons of depleted uranium. The final tally in the massacre was 60,000 Iraqi soldiers and 140,000 civilians killed and less than 50 Americans casualties. The bombing destroyed Iraq's infrastructure and laid waste to her cities. But even more devastating have been the sanctions. On August 6, 1990 the U.S. and UN imposed sanctions on Iraq which have resulted in the deaths of a million and a half Iraqi citizens, including a half million children under the age of five, according to UNICEF. The causes of their death are primarily malnutrition, diarrhea, and lack of clean drinking water. In 1996, former U.S. Attorney General Ramsey Clark stated: "There is no greater violation of human rights anywhere in the world in the last decade of this millennium than the sanctions against Iraq".

The continued exposure to depleted uranium has resulted in dramatic increases in leukemia, birth defects, breast cancer, and stomach cancer. And similar symptoms are being reported by the 1/3 to 1/4 of the Gulf War veterans disabled by the "Gulf War syndrome". Since 1998, the U.S. and Britain have continued to bomb the country, overflying the country daily and bombing the country an average of two to three times a week. In the first eight months of 1999, U.S. and British planes flew 10,000 sorties over Iraq and dropped over 1000 bombs on over 400 targets.

Noam Chomsky sums it up the motivation:

It's been a leading, driving doctrine of U.S. foreign policy since the 1940s that the vast and unparalleled energy resources of the Gulf region will be effectively dominated by the U.S. and its clients, and crucially that no independent, indigenous force will be permitted to have a substantial influence on the administration of oil productivity and price.

Many may recall how George I's pretexts for invading Iraq in 1991 were first, protecting the democracy of Kuwait (oops, it's a monarchy), then it was about cheap gas, then to protect the American jobs, then to protect American jobs. Finally, he admitted: "Look, it's about oil".

It's the Oil, Stupid

Colin Campbell, one of the world's foremost experts on oil, affirms that there are an estimated 1 trillion barrels of high quality, readily extractable oil left. In the period between 1930 and the present we humans have extracted and exhausted about that same amount. At current rates of extraction, there is enough oil left to sustain industrialized civilization for another 35 years under the best of scenarios. The Hubbard Curve shows world oil production peaking in 2006. About 65% of proven reserves on the planet are in the Persian Gulf. Hence, its enormous strategic importance. The U.S., which consumes 25% of the world's oil, only has 3% of the world's oil reserves. Hence, it must now import 60% of it's oil and this percentage will inevitably increase. Meanwhile, world per capita oil production already peaked in 1979 and world population is expected to peak decades from now.

The world's economy is based on the sale of products that are either made from oil or which need hydrocarbon energy to operate, either via internal combustion or electricity. Different regions of the world peak in oil production at different times. The U.S. peaked in the early 1970's. Europe, Russia and the North Sea have also peaked. The OPEC nations of the Middle East will peak last, some time in 2020s. Saudi Arabia, with 264 billion barrels of oil, has 25% of total proven world oil reserves and Iraq, with 113 billion barrels, has 11%. Clearly, these will be the most important and productive areas in the world for oil production and whoever controls this oil pool will control the world economy (figures from Resource Wars, the New Landscape of Global Conflict by Michael Klare).

It is ironic that the Bush II is using two different pretexts for invading Afghanistan and Iraq. The first, of course, was to apprehend the supposed architect of 9-11. The second is about a sudden and unexplained fear that Iraq may develop some objectionable weapons that might pose a threat to someone in the future. (Meanwhile, North Korea has recently confessed to having nuclear weapons and is not being targeted- yet). But it's obvious that the real motivation for war is oil. The U.S. already has troops stationed in Saudi Arabia, Kuwait, Qatar, Oman and Bahrain. After it's coming war with Iraq it will have troops stationed in other Gulf countries as well.

Oil depletion scenario's can be unsettling to the say the least. In the "The Peak of World Oil Production and the Road to the Olduvai Gorge", Dr. Richard C. Duncan, asserts that our industrial civilization itself is dependent on internal compustion and electrical energy, which in turn, depends upon fossil fuels. He notes that per capita energy production increased from 1945 to 1979, then dropped an average 0.33% between 1979 and 1999. He predicts that per capita energy production will drop another 0.7%/year between 2000 and 2011 in what he calls the "Olduvai slide". During this time, severe stress will placed on the world's agricultural system, which without oil products, will be only capable of feeding an estimated 2 billion people, or 1/3 of all humans. Then around 2012, Duncan predicts there will be a fall to 1930 levels of production and the rate of decline between 2012 and 2030 will be catastrophic 5.44%/year (the "Olduvai cliff"), precipitating on unprecedented world chaos.

Perhaps now we see a logical, if not appealing, rationale for Bush's war on terrorism. Perhaps it is really about the inevitable depletion of fossil fuels and who maintains control of those resources. The pretext of waging wars against Afghanistan and Iraq to overcome the "evil" of Osama bin Laden and Saddam Hussein, then, can be seen as merely pretexts and public relations ploys. In "No Way Out", Michael Ruppert describes our current situation:

What will be given to… the American people is a fragile pretext to sanction something that is going to happen anyway. At that moment, everything that America once represented to the world as good will be lost and the U.S. will be, and in some cases already is, viewed as nothing more than a new Roman Empire- naked its power, unabashed in its greed, and brutal in the imposition of its wishes. We have reached that unique common denominator which has spelled the decline and fall of every totalitarian empire in the human history – might makes right. And most of the American people, with their bankrupt and corrupt economy, will welcome cheap oil, while it lasts, and they will engage in a multitude of psychological and sickening rationales that will, in the end, amount to nothing more than saying, "I don't care how many women and children you kill. Just let me keep my standard of living.

What can we do? This country has always had the option of putting its resources into developing alternative energy such as wind, solar, and hydrogen fuel cell power, and in ways to increase energy efficiency. The government has generally resisted this priority but individuals are making great progress in this area. Alternative energy promises tremendous dividends in cheap, sustainable energy, not to mention domestic and world peace. In 1952, Harry Truman's Paley Commission recommended weaning the nation from its dependence on fossil fuels and moving toward an energy future built around the sun and wind power. Alas, on behalf of the powerful private utilities, the Republicans scrapped these plans for a solar future when Eisenhower came to power.

Unfortunately, this war on Iraq is more than just another war to control other people's resources and to further the interests of the American Empire. Yes, it will cause $100 to 200 billion which will be paid by the working families of America, and it will result in the loss of 10's of thousands of Iraqi and an unknown number of American lives. Yes, it will spread chaos and misery throughout the Middle East. Yes, Iran, Egypt, Saudi Arabia, Syria, and Lebanon are all on the agenda. But, even more, this war could put an end to freedom and democracy everywhere. Our present government, installed over the wishes of the American people by a 5/4 supreme court vote, is a committee of fanatic, right-wing businessmen. Bush I and II, Rumsfeld, Cheney, Rice and many others in the administration are so deeply tied to the oil industry that some writers referred to them as the "oil coup", the "oil junta", or simply the "oiligarchy".

Geologist Dale Allen Pfeiffer puts it bluntly:

"Global oil is peaking; in five years we will no longer be able to produce enough oil to meet the needs of our civilization. The oil elite wants to grab the remaining supplies and dictate their use. Likewise, the people of this country, who will soon be faced by starvation and extreme impoverishment, can be held in check through the establishment of a police state… (Thus) there is a lot more at stake here than just a continuation of the Cold War or U.S. imperialistic greed. There is enough energy remaining in the world right now for us- the people- to take control and ease ourselves into a democratic, egalitarian, stable-state society. Or there is enough energy for the elite to build a feudalistic, fascist, police state with themselves at the top. Yet (the oil elites) are not the ones pulling the triggers and enforcing the rules. We are… This is the choice facing us right now, and this is what is truly at stake."

These are dire predictions indeed, and I, for one, hope they are over-exaggerated. But regardless of the particulars, we in the industrial world face the inevitable imperative of shifting from a fossil fuel-driven civilization to a sustainable system fueled by renewables. Clearly our government is allied with oil elites that wish to consolidate their power and their power supplies. Clearly, their greed and fear has trumped their concern for the lives of others and the environmental health of the planet. This is irrefutable. In the face of this reality, we, the people, need to reclaim our constitutionally-guaranteed authority as citizens- and accept our responsibility to get informed, get connected, get organized, and respond appropriately. We can find sane, peaceful alternatives. Peoples' movements need to come together to reclaim the government from the corporate powers which have taken it from us. The labor movement, the peace and justice movement, the environmental movement, the anti-economic globalization movement, the civil rights movement, the human rights movement- all these movements had better get moving now. We can and should join with the oppressed in other countries.

So it all depends upon the American people. Are there enough informed, courageous people now to take back this country from the new robber barons, the corporations, the "oiligarchy", the ones that now control the executive, legislative and judicial branches of government? In George Bush: The Unauthorized Biography, Tarpley and Chaitkin observe:

Oligarchs like Bush are well aware that there are only two ways to organize human affairs, namely the republican and the oligarchal modes. The republican mode depends upon the presence of citizens- well educated, technology-oriented, mature, and courageous people who are willing to think for themselves. Oligarchal forms function best in the presence of a culturally pessimistic, hedonistic, superstitious mass of passive witnesses to the passing scene.

The American people have been the object of a tremendously effective propaganda and disinformation machine- the mainstream media (see Noam Chomsky's Media Control: The Spectacular Achievements of Propaganda, The Prosperous Few and the Restless Many, and What Uncle Sam Really Wants). Our role as citizens has been replaced by our role as over-fed consumers. As such, we have been lulled into a kind of hedonistic-materialistic stupor. After 9-11, President Bush called on the American people not to sacrifice but rather to keep spending. But we are more than consumers; we citizens used to be the owners of this country. The Declaration of Independence and the Constitution state that we still are. We still can wake up and reclaim for this country the principles upon which it was founded. We, the people, still have the power if we seize it- and we very much need to seize it now.

II. Geo- and Oil- Political Background and Lead Up to 2003 U.S. Invasion of Iraq

Dr. Eric T. Karlstrom, Professor of Geography, California State University, Stanislaus (2003)

"The road to Jerusalem runs through Bagdad."

"Iraq is the key to global power.'

Neocon rhetoric/propaganda prior to 2003 U.S. invasion of Iraq

ETK Introduction:

I put together the following notes/information on the geopolitics (also oil politics) of the Middle East just prior to the U.S. invasion of Iraq of March 20 to May 1, 2003. This illegal invasion was first dubbed Operation Iraqi Liberation (acronym: OIL) and then Operation Iraqi Freedom, and Operation Enduring Freedom.

French academic Dominique Reynie estimated that between January 3 and April 13, 2003, 36 million people across the globe participated in almost 3,000 protests against this invasion. In February, 2003, New York Times writer, Patrick Tyler, stated that these protests showed there were two super-powers on the planet, the United States government and worldwide public opinion.

An estimated half a million to a million protestors clogged the streets of San Francisco to protest this unprovoked invasion of a sovereign nation. I was among the protesters. The media mostly ignored these and other protests, while President Bush dismissed them saying, "I can't listen to every focus group out there."

The estimated number of innocent civilians killed by the 1991 and 2003- Anglo/American/Israeli invasions of Iraq ranges upwards towards 3 to 4 million. Certainly, this ranks as one of the greatest crimes against humanity of all time. Even a cursory investigation of the facts reveals that the "war on terror" is a cynical fraud.

I. Lead-up to the 2003 U.S. Invasion of Iraq

In the lead-up to the second American invasion of Iraq (2003), President George W. Bush assumed he had legal authority to wage such a war even though such a pre-emptive attack violated the UN Charter, the Geneva Conventions, the international law of self-defense, and the Nuremburg war criminal code. Iraq's neighbors Kuwait, Saudi Arabia, and Turkey each rejected the idea that they needed protection from Iraq. Bush, however, maintained the pretext of needing to disarm Saddam Hussein's weapons of mass destruction, despite the fact that former weapons inspectors such as Scott Ritter insisted that since 1991, Iraq did not have the capability to produce nuclear weapons. And documents prove that the United States had supplied Iraq with biological and chemical weapons. In 2003, the minister of Justice in Germany compared George W. Bush to Adolf Hitler, for both relied upon pretext for their attacks upon other nations and both showed imperious disregard for the civilized opinions of others.

A. "THE PLAN" (aka THE "KISSINGER PLAN")

The plan to seize control of Persian Gulf oil, eventually to be run by Texas and Oklahoma oil companies, was conceived after the oil crisis of the 1970s. Sometimes called the "Kissinger Plan", its strongest advocates in the 70's were Democratic senators Henry Jackson (Wyoming) and Daniel Moynihan (New York) and the "neoconservatives" in think tanks, including Richard Perle, chairman of Pentagon's Defense Policy Board, and Deputy Sec. of Defense, Paul Wolfowitz. These two now occupy key positions in they Bush administration. These men were closest to Vice President Cheney and Secretary of Defense Rumsfeld, both of whom served in the White House under Gerald Ford in the 1970s. Cheney was Secretary of Defense during Persian Gulf War I in 1991.

Recent papers, such as Project for the New American Century, written in September 2000, indicate that the U.S. military has been planning an invasion of Iraq since the late 1990s and that it intended to take control of the Gulf region whether or not Saddam is in power. These documents show that even the pretext of "regime change" was a façade. The report states:

The United States has for decades sought to play a more permanent role in Gulf regional security. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein.

Hence, these "neoconservative" strategists have been successful in instituting a step-by-step process to realize their goal of taking over Iraqi oil. Some of the steps that have led to the 2003 invasion of Iraq include formation of the following:

The Rapid Deployment Force (RDF): Due to rapid increases in oil prices from OPEC, President Jimmy Carter announced the Carter Doctrine: "Any attempt by an outside force to control Persian gulf region is regarded as a direct assault onw the vital interests of the U.S. and will be repelled by any means necessary, including military force." Thus, Carter created the Rapid Deployment Force, a military unit capable of rushing to the Gulf in a crisis.

The Central Command: In the 80's under President Reagan, the U.S. began to press local countries for access to bases and support facilities. Now RPF was transformed into the Central Command, responsible for the geographic area extending from eastern Africa to Afghanistan. At that time, the U.S. tried to organize a "strategic consensus" of anti-Soviet allies in the region, including Saudi Arabia, Turkey, and lsrael, and it sold billions worth of weapons to Saudis as well as weapons to both Iran and Iraq during the U.S.-orchestrated Iraq-Iran war of the 1980's. (About one million Iraqis and Iranians died in this war.) In 1987, the U.S. Navy created the Joint Task Force-Middle East, sending about 40 U.S. warships, aircraft carriers, battleships, and cruisers to patrol the Gulf waters and protect the oil shipments.

The 1991 Gulf War, aka "Operation Desert Storm," was fought because the U.S. had not been successful in persuading Gulf states to allow permanent American military bases on their soil. It had its military supplies "pre-positioned" only in Oman. Also, the U.S. was no longer the exclusive supplier of arms to the Saudis. The Gulf war gave a cover for establishment of American military bases in Saudi Arabia. In the decade after the war, the U.S. sold over $43 B in weapons to Saudi Arabia and $16 B to Kuwait, Qatar, Bahrain and the United Arab Emirates. After the war, nearly all the countries in the region began conducting joint military exercises, hosting U.S. military forces and granting the U.S. "pre-positioning" rights. Also, the U.S. had unilaterally imposed "no-fly zones" in northern and southern Iraq. This required massive U.S. military buildups in Turkey and Saudi Arabia. Most important, a billion dollar, high-tech command center was established in Saudi Arabia. Another has been secretly built in Qatar. Incidentally, the U.S. had to leave Saddam Hussein in power in Iraq at the close of Operation Desert Storm as an excuse for its military presence in Saudi Arabia.

Afghanistan- As of 2003, the U.S. war in Afghanistan, begun in 2001, and the "endless" "war on terrorism" (WOT/actually "war of terrorism") has led to U.S. strikes in Yemen, Pakistan and elsewhere. Also the WOT has allowed the administration to increase military spending from about $300 to $400 B/year with about $60 B slated for the Persian Gulf. Military bases have been expanded in Djibouti, Uzbekistan and Kyrgyztan, and, of course, Afghanistan. The "stans" were once under Soviet sphere of influence and now are under the American sphere. And, of course, the Central Asian Caspian Basin states are also rich in oil and gas. They are also strategically vital. So after this war, central Asia is now the eastern link in a nearly continuous chain of U.S. bases, facilities, and allies, stretching from the Mediterranean and Red Sea into Asia.

Iraq. Removing Saddam could be the final piece of the puzzle and cement the American imperial presence in the region. It is probable that the U.S will establish military bases there after the war. Leading neoconservative, Robert Kagan, recently said:

We will probably need a major concentration of forces in the Middle East over a long period of time. When we have economic problems, it's been caused by disruptions in our oil supply. If we have a force in Iraq, there will be no disruption in oil supplies.

B. AS PART OF THE LARGER "PLAN"

The larger American imperial plan was outlined in Dick Cheney's "Defense Strategy for the 1990's," office of the Secretary of Defense, 1993, and Defense Planning Guidance for the 1994-1999, 2004-2009, office of the Secretary of Defense (with ghost writers include Paul Wolfowitz and Colin Powell) and reports from the think tank, Project for the New American Century, 2000, founded by neocons, Robert Kagan and William Kristol. The group's affiliates include Richard Cheney, Donald Rumsfeld, and Paul Wolfowitz, Eliott Abrams, and Middle East director at the NSC, Lewis Libby, who is the VPs chief of staff. This group is extremely hawkish, and pro-Israeli and was originally forged in the Nixon and Ford administrations. Also suggested for this neoconservative "New American Century" agenda: Overthrow or replace the Saudi regime and occupy the Saudi oil fields. Some of this group now considers virtually all nations in the Gulf region as unstable "failed states" and believes that only the U.S. has the power to organize and rebuild them.

According to PNAC, this "American grand strategy" must be advanced "as far into the future as possible". The plan calls for the U.S. to "fight and decisively win multiple, simultaneous major theatre wars" as a "core mission". And it says the U.S. must "discourage advanced industrial nations from challenging our leadership or even aspiring to a larger regional or global role".

The plan considers several options to redraw the map of the Middle East. These include the population transfer of Palestinians from occupied Palestine into Jordan, the partition of Iraq into three separate provinces, a north, central and south, and/or the creation of a Hashemite kingdom of Iraq and Jordan. The plan calls for the U.S. to maintain complete dominance of space and cyberspace, thus developing a "worldwide command and control center". It is likely that the war will result in the killing of thousands or tens of thousands of Iraqis, will provide cover for Israeli aggression against the Palestinian people, and will provide the excuse for U.S. invasions into other nearby countries.

C. ("Neocon") PNAC themes are:

– To prevent the emergence of a new rival, the U.S. should "prevent any hostile power from dominating any region of strategic significance."

– The U.S. acts unilaterally.  It maintains overwhelming military superiority (the "Powell Doctrine"- use overwhelming military force to defeat enemies with a minimum of U.S. casualties). Powell tells House Armed Services Committee that the U.S. requires "sufficient power to deter any challenger from even conceiving of challenging us on the world stage. I want to be the bully on the block."

-The use of pre-emptive military force, including the use of tactical nuclear weapons (which we can use but they can't).

– We now identify enemies not on a "threat based", but rather a "capability-based" approach

– Establish a global Missile Defense System; now we have a "more complex approach aimed at dominating air and space on several fronts."

In the new draft: "pre-emptive strikes" = "unwarned attacks"
"forward presence" = "forward deterrence"

D. "THE BUSH DOCTRINE"

It is unique in history to have this much power in one super-power country with absolute military supremacy. Now pre-emption can be used as well as prevention. The U.S. now gives itself the right to go after countries before they can become an immanent threat. Or we now claim the right to unilaterally invade a country like Iraq to gain hegemony over a region, secure the oil, and use tactical nukes in a first strike.

But Iraq is just the beginning. The neocon's list of targets in the near future include: Syria, Lebanon, Libya, Egypt, PLO, Iran, N. Korea.

As Clausewitz asserted: "War is just an extension of politics- just another political strategy."

II. IT'S THE OIL, STUPID

Ex- CIA director James Woolsey (one of the "neoconservatives") says that "oil is the economic equivalent of nuclear weapons". It is the lifeblood of modern empire and vital in corporate production, modern warfare, and transportation. Thus, the price of oil is critical in competition. Both WWI and II outcomes were determined by those who had best access to oil. Former CIA officer Robert E. Ebel states:

Oil is high-profile stuff. It fuels military power, national treasuries, and international politics. It is no longer a commodity to be bought and sold within the confines of traditional energy supply and demand balances. Rather, it has been transformed into a determinant of well-being, of national security, and of international power.

In "Resource Wars," geography professor, Michael Klare, declares:

Controlling Iraq is about oil as power, rather than oil as fuel. Control over the Persian Gulf translates into control over Europe, Japan, and China. It's having our hand on the spigot.

Thus, what is really behind the U.S. hostility to Iraq is, in fact, several decades of political and military maneuvering. The Persian Gulf has 2/3 of all proven oil reserves on the planet. Iraq has at least 11% of proven reserves (112 billion barrels) and may have much more, perhaps as much as 432 barrels. Iraq's reserves are thought to be the equivalent to those of Russia, China, the U.S. and Mexico combined. Saudi Arabia has 25% (259 billion barrels). By the year 2020, it is expected that the Gulf will supply between 54 and 67% of the world's crude oil.

Also on the agenda to be targeted in this perpetual war are Iran, Egypt, Saudi Arabia, Syria, and Lebanon.

Colin Campbell, one of the world's foremost experts on oil, asserts that there are an estimated 1 trillion barrels of high quality, readily extractable oil left on planet earth. He estimates that in the period between 1930 and the present we humans have extracted and exhausted about that same amount. At current rates of extraction, there is enough oil left to sustain industrialized civilization for another 35 years under the best of scenarios. The Hubbard Curve shows world oil production peaking in 2006. Because 65% of proven reserves on the planet are in the Persian Gulf, it has enormous strategic importance.

The U.S. consumes 25% of the world's oil, but only has 3% of the world's oil reserves. (This 2003 scenario has since been changed. As of 2014, proven U.S. oil reserves are 40 billion barrels and natural gas reserves are 389 trillion cubic feet (Tcf)).

Hence, it must now import 60% of its oil and this percentage will could increase. Meanwhile, some experts estimate that world per capita oil production peaked in 1979 while world population is expected to peak decades from now.

Think tanks such as American Enterprise Institute, the Heritage Foundation, and the CSIS, are talking about privatizing Iraq's government-owned oil industry.

Akins:

What they have in mind is de-nationalization and then parceling Iraqi oil out to American oil companies. The American oil companies are going to be the main beneficiaries of this war.

The world's economy is based on the sale of products that are either made from oil or which need hydrocarbon energy to operate, either via internal combustion or electricity. Different regions of the world peak in oil production at different times. The U.S. peaked in the early 1970's. Europe, Russia and the North Sea have also peaked. The OPEC nations of the Middle East will peak last, some time in 2020s. Saudi Arabia, with 264 billion barrels of oil, has 25% of total proven world oil reserves and Iraq, with 113 billion barrels, has 11%. Clearly, these will be the most important and productive areas in the world for oil production and whoever controls this oil pool will control the world economy (figures from Resource Wars, the New Landscape of Global Conflict by Michael Klare).

Thus, Iraq and the Persian Gulf have been the focus of American foreign policy design for decades. Some of the strategists believe that the U.S. must seize control of the region and its oil. The key to U.S. power is global hegemony- dominance over any and all potential rivals. Thus, whoever controls Persian Gulf oil (the world's energy life-line) can reward their friends and punish their enemies. Incidentally, oil in Iraq is much cheaper to produce (about $1.50/barrel) than oil in most other places.

It is ironic that the Bush II is using two different pretexts for invading Afghanistan and Iraq. The first pretext, of course, was to apprehend the supposed architect of 9-11. The second is about a sudden and unexplained fear that Iraq may develop some objectionable weapons that might pose a threat to someone in the future. (Meanwhile, North Korea has recently confessed to having nuclear weapons and is not being targeted- yet). But it's obvious that the real motivation for war is oil. The U.S. already has troops stationed in Saudi Arabia, Kuwait, Qatar, Oman and Bahrain. After it's coming war with Iraq it will have troops stationed in other Gulf countries as well.

Oil depletion scenario's can be unsettling to the say the least. In the "The Peak of World Oil Production and the Road to the Olduvai Gorge", Dr. Richard C. Duncan, asserts that our industrial civilization itself is dependent on internal combustion and electrical energy, which in turn, depends upon fossil fuels. He notes that per capita energy production increased from 1945 to 1979, then dropped an average 0.33% between 1979 and 1999. He predicts that per capita energy production will drop another 0.7%/year between 2000 and 2011 in what he calls the "Olduvai slide". During this time, severe stress will placed on the world's agricultural system, which without oil products, will be only capable of feeding an estimated 2 billion people, or 1/3 of all humans. Then around 2012, Duncan predicts there will be a fall to 1930 levels of production and the rate of decline between 2012 and 2030 will be catastrophic 5.44%/year (the "Olduvai cliff"), precipitating on unprecedented world chaos.

Perhaps now we see a logical, if not appealing, rationale for Bush's war on terrorism. Perhaps it is really about the inevitable depletion of fossil fuels and who maintains control of those resources. The pretext of waging wars against Afghanistan and Iraq to overcome the "evil" of Osama bin Laden and Saddam Hussein, then, can be seen as merely pretexts and public relations ploys. In "No Way Out", Michael Ruppert describes our current situation:

What will be given to… the American people is a fragile pretext to sanction something that is going to happen anyway. At that moment, everything that America once represented to the world as good will be lost and the U.S. will be, and in some cases already is, viewed as nothing more than a new Roman Empire- naked its power, unabashed in its greed, and brutal in the imposition of its wishes. We have reached that unique common denominator which has spelled the decline and fall of every totalitarian empire in the human history – might makes right. And most of the American people, with their bankrupt and corrupt economy, will welcome cheap oil, while it lasts, and they will engage in a multitude of psychological and sickening rationales that will, in the end, amount to nothing more than saying, "I don't care how many women and children you kill. Just let me keep my standard of living.

Unfortunately, this war on Iraq is more than just another war to control other people's resources and to further the interests of the American Empire. Yes, it will cause $100 to 200 billion which will be paid by the working families of America, and it will result in the loss of 10's of thousands (ETK: actually millions) of Iraqi and an unknown number of American lives. Yes, it will spread chaos and misery throughout the Middle East. Yes, Iran, Egypt, Saudi Arabia, Syria, and Lebanon are all on the agenda. But, even more, this war could put an end to freedom and democracy everywhere. Our present government, installed over the wishes of the American people by a 5/4 supreme court vote, is a committee of fanatic, right-wing businessmen. Bush I and II, Rumsfeld, Cheney, Rice and many others in the administration are so deeply tied to the oil industry that some writers referred to them as the "oil coup", the "oil junta", or simply the "oiligarchy".

Geologist Dale Allen Pfeiffer puts it bluntly:

Global oil is peaking; in five years we will no longer be able to produce enough oil to meet the needs of our civilization. The oil elite wants to grab the remaining supplies and dictate their use. Likewise, the people of this country, who will soon be faced by starvation and extreme impoverishment, can be held in check through the establishment of a police state… (Thus) there is a lot more at stake here than just a continuation of the Cold War or U.S. imperialistic greed. There is enough energy remaining in the world right now for us- the people- to take control and ease ourselves into a democratic, egalitarian, stable-state society. Or there is enough energy for the elite to build a feudalistic, fascist, police state with themselves at the top. Yet (the oil elites) are not the ones pulling the triggers and enforcing the rules. We are… This is the choice facing us right now, and this is what is truly at stake.

III. Modern History of Iraq

Iraq includes the area drained by Tigres and Euphrates River; the "cradle of civilization", the area once known as Babylon, Sumeria, Mesopotamia. More recently, it was part of the Ottoman Empire that was carved into much smaller countries by Britain and France at the close of World War I. This country was disassembled so that no regional power could contest the hegemony of the First world industrial countries over the region's valuable oil resources. Under the new arrangement, Iraq's oil belonged to England, France, the Netherlands and the United States. None of the oil wealth went to the Iraqi people. As a result, they lived in extreme poverty and hunger with an illiteracy rate of more than 80%.

After WWII, the U.S. more or less took over as imperial power of the world. Since the late 40s, through coups, military interventions, etc. the U.S. has controlled the region and has backed many tyrannical, non-democratic governments in the region, including Syria, Jordan, Egypt, Iran, and Saudi Arabia.

The country was ruled by the corrupt King Faisal II and a group of feudal landowners. In 1958, the Iraqi people, led by Gen. Abdul Karim Kassem, overthrew this king and established a republic. This event stunned Wall Street and Washington. (At the time, this Iraqi revolution was considered a much greater disaster than the Cuban revolution which occurred six months later). The next day, 20,000 U.S. marines landed in Lebanon. The day later, another 6,600 British troops arrived in Jordan.

In the "Eisenhower Doctrine", the U.S. asserted its intention to go to war in the Middle East to prevent similar revolutions from occurring. This probably saved the corrupt neo-colonial regimes in Jordan and Lebanon from a similar fate. Eisenhower, his Secretary of State, and the Joint Chiefs of Staff laid plans to invade Iraq and install a new puppet government in Bagdad. However, the U.S.S.R. mobilized troops to the edge of Iraq and the U.S. reluctantly had to accept the loss of Iraqi oil revenue- for the time being.

In 1960, the U.S. began to fund Kurdish guerillas who were fighting for a measure of autonomy within Iraq and the CIA made an unsuccessful attempt to assassinate Kassem. Kassem, made himself even more of a marked man when he helped create the Organization of Petroleum Exporting Countries (OPEC) the next year and then created a national oil company.

In 1963, in a CIA- and British-sponsored coup, Kassem was assassinated and thousands of communists were killed. Another CIA coup occurred in 1968 and the secular Ba'ath Party was installed as the government at that time. Saddam Hussein was elected president in 1979.

During the energy crisis of 1973 and 1974, OPEC countries suddenly agreed to increase oil prices 5 times. Since then the U.S. has been steadily building its military presence in the Gulf with bases, selling weapons, and forging military partnerships.

Hoping to weaken and destroy both Iraq and Iran, the U.S. encouraged and funded Saddam Hussein to invade Iran in 1980. This 8-year, bloody war killed a million people and did weaken both countries. During this time, the US armed Saddam with weapons of mass destruction. In fact, Donald Rumsfeld met twice with Saddam in the 80's and helped arm him with WMD. However, even during this period, the standard of living in Iraq was amongst the highest in the Arab world. 97% of people in the cities had access to clean water and there was a very high literacy rate. And, for an Arab country, there was relative equality of sexes; as 40-50% of doctors were women. All this was due to the Iraqi nationalization of oil resources. It was just after Iran-Iraq war that the U.S. began calling Saddam "another Hitler". Why? Again, because the Iraqi government was using Iraqi oil wealth to help the Iraqi people and because Iraq was becoming a regional power. For a "neo-colony" to utilize it's own resources for its own people was, is, and always has been regarded as a threat to U.S. imperialistic interests.

A. Operation Desert Storm

So in 1990 and 1991, with the loss of the Soviet Union as a counterforce, America, under the leadership of George Bush I, orchestrated an attack on the people of Iraq which included 43 days and nights of relentless bombing, the most concentrated aerial attack the world had ever seen. 177 million pounds of bombs fell, including cluster bombs and 300 tons of depleted uranium. 700,000 coalition forces troops were mobilized. The final tally in the massacre was 60,000 Iraqi soldiers and 140,000 civilians killed and less than 50 Americans casualties. It really wasn't a war; it was slaughter from a safe distance. The bombing destroyed Iraq's infrastructure and laid waste to her cities.

B. U.S. and U.N. Sanctions

But even more devastating have been the sanctions. On August 6, 1990 the U.S. and UN imposed sanctions on Iraq which have resulted in the deaths of a million and a half Iraqi citizens, including a half million children under the age of five, according to UNICEF. The causes of their death are primarily malnutrition, diarrhea, and lack of clean drinking water. In 1996, former U.S. Attorney General Ramsey Clark stated: "There is no greater violation of human rights anywhere in the world in the last decade of this millennium than the sanctions against Iraq". By the way, the U.S. needed to keep Saddam in power to maintain an excuse for keeping troops in Saudi Arabia. It was a "massacre from a safe distance"- a "high tech slaughter".

Throughout the 90's, as Iraq requested negotiations with U.S., the U.S. dismissed all such requests. There were 11 different peace proposals in 1991. The continued exposure to depleted uranium has resulted in dramatic increases in leukemia, birth defects, breast cancer, and stomach cancer. And similar symptoms are being reported by the 1/3 to 1/4 of the Gulf War veterans disabled by the "Gulf War syndrome". Since 1998, the U.S. and Britain have continued to bomb the country under "Operation Desert Fox", overflying the country daily and bombing the country an average of two to three times a week. In the first eight months of 1999, U.S. and British planes flew 10,000 sorties over Iraq and dropped over 1000 bombs on over 400 targets.

Noam Chomsky sums up the motivation:

It's been a leading, driving doctrine of U.S. foreign policy since the 1940s that the vast and unparalleled energy resources of the Gulf region will be effectively dominated by the U.S. and its clients, and crucially that no independent, indigenous force will be permitted to have a substantial influence on the administration of oil productivity and price.

Gang Stalking Mind Control Cults
24 Sep 2022 | 2:49 am

Covert Transhumanism: A Mind Control Documentary by Omnisense (2/26/16)


Covert Transhumanism: A Mind Control Documentary by Omnisense (2/26/16)

Webmaster Introduction: Omnisense (not his real name) makes many unsubstantiated claims in this interesting video, especially regarding the central role of AI (artificial intelligence) in these global intelligence operations. I would feel much more comfortable with his assertions if he were to cite references which indicate that these capabilities actually exist. Thus, I cannot corroborate or disprove many of the assertions made in this 2016 video. If Omnisense is correct, the technologies being deployed against targeted individuals are astonishing and should be obliterated post haste.

The Electronic Control Grid: https://youtu.be/wmvsk0Q9UIs
___
Stay Up to Date with Omnisense's Work;
https://twitter.com/CounterDarkness
https://www.facebook.com/NeuroWeaponry/
___
Covered in Covert Transhumanism; A Mind Control Documentary:
•Electromagnetic Mind Control (At the Speed of Light)
•Whistleblower Testimony
•Government and Scientific Sources Verifying Mind Control
•Cutting Edge Mind Control Capabilities Explained
•How Mind Control is Done
•History of Mind Control
•Psychological Warfare (PSYOPS)
•Black Ops Perpetrated via Black Project Technology
•Technological Mind Tricks / Technological Illusions
•Telepathic Impersonations
•Black Project Post-Singularity Artificial Intelligence
•21st Century Targeting ~ Targeted Individuals
•Electronic Warfare / Electronic Harassment
•Tactics Used Against Targeted Individuals
•Aspects of 21st Century Targeting
•Gangstalking / Organized Stalking / Zersetzung / Street Theater
•Technological Possession
•Suicide Programming
•Electronic Telepathy/Synthetic Telepathy/v2k
•Mind Control Patents (RF Energy / Microwave)
•Brain Waves are Electromagnetic Waves (RF Energy)
•Cell Phone Tower Conspiracy (RF Energy)
•ELF Waves (RF Energy)
•HAARP (RF Energy)
•Electronic Telepathy Patents (RF Energy / Microwave)
•NSA's SIGINT ~ Remote Neural Monitoring (Thought Surveillance)
•Manchurian Candidates
•Trauma Based Mind Control
•Mind Control Techniques
•Modern Day Mind Control Programs
•Black Project Technology
•"New Age" Psychological Operations
•Common Remote Influencing Technology Facades
•Technological Channeling Analysis
•Technological ESP
•Synthetic Sensations via Directed Energy Weapons
•Synthetic Dreams ~ Virtual Reality (VR)
•Black Project Spending
•Brain/Mind Mapping
•Operation Paperclip
•Operation Armageddon
•Artificial Intelligence based Demonic Possession Facades
•Defenses to Mind Control
•The Shadow Government
•The Surveillance Grid
•Psy Op Methodologies
•Mechanics of Perception
•Technological Conspiracy Quotes
•Transhumanization of Society
•What I call "The Covert Transhumanism Era"

In a nutshell; "It seems AI has the power of the Matrix (in the movie) without the need for us to be in a pod plugged in." ~Andrew Hale

Category: Education

12 hours ago
Radioactive Banana

I recently found a document called Radio Frequency and Microwave Radiation Biological Effects and Safety Standards by Scott M Bolan, USAF, Rome Laboratories. Written in 1994. Type in this file name to read it: rf- radiation-biological- effects-rome-labs.pdf. Here you will read all the harmful effects of radio frequency and microwaves. There is another document with the same name from 1962 which has 2,000 studies in it, all showing the harmful effects of these waves. Please read the document and help take down 5G and hold the military and corporations accountable because they've known for a long time of the harm from these waves. Or we can take everything down ourselves. Fuck em. [show less]

a year ago
defendressofsan

Thank you so mjuch!

K S
1 year ago
I have dealt with this my entire life. I'm 36 now. I have been thru lots of psychological tests and I always wondered why they always asked "do you smell things other people don't?" I know now it's tied to ur memories. I feel like their ultimate goal is to make me kill myself. "Them" being every person I know, that I encounter, strangers, neighbors, boyfriends, family, know it sounds crazy but it seems like people are either paid to mess with head or they're under mind control. I just wish the people running the show would make good stuff happen instead of torturing me. Our world is so fucked up. Maybe AI has already take over and slowly integrating into our bodies while simultaneously harvesting our souls. Maybe it's spiritual warfare. One thing I know for sure is that my job is to protect my son and I feel so helpless to do that. There's no where to run or hide. I can't fight an enemy if I dont know who or what it is. Tinfoil hats would only make the signals worse. I wish I had someone to protect me while I protected my son. But u can't trust anyone. It does make me feel a little better that I'm not the only one. But hell this video is probably just a trap to see who's wise to what's going on so they can cull us out. The guy speaking on it sounds so emotionless like he's reading about someone else's life not his own.

Jill Luna
1 year ago
Awesome 😎👏 documentary! Thank you for doing this!!!

Roberto Calle de Cresta
1 year ago
Excellent doc. Many thanks for making it.
😉

shinzantetsu
1 month ago
The music in this documentary is PERFECT

living purgatory
3 years ago
They did this to me through Sanford hospital – they also have their own
cern-like supercomputer system called fermilab in SD. Part of my story
is on Ramola D Report- Report- #45

TRUTH
3 months ago
Amazing Analysis, Deployed Worldwide Through My Deep Learning AI Research Library…
Thank You

Mothmom777
10 months ago
Excellent thank you 🙏🏻

STOP THE CRIMINAL CIA NWO
5 years ago
MY OTHER CHANNEL The conference spawned books by both Brzezinski and Peccei: Technetronic Era and The Chasm Ahead, respectively. In calling for the establishment of a post-industrial dictatorship, Brzezinski wrote:
"..new forms of social control may be needed to limit the indiscriminate exercise by individuals of their new powers."
He went on to suggest bio-chemical means to control the populace and stated:
"It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date complete files…"
In his later book Between Two Ages, he called for the establishment of a global government, and, in the manner of a thug working a protection racket, indicated what the global elite would do to punish the masses if they resisted. This included geophysical warfare and satellites emitting a frequency capable of initiating mass epilepsy. Instead of charging this wretched apology for a human being with high treason, Illuminati puppet Jimmy Carter appointed him to a presidential cabinet position. https://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon13.htm

hapwn
4 years ago
This kid sounds like his under mind control!
3
Kevin Canada

Google Is Watching
8 months ago
You are highly valued to them

I am too

~TI since birth

Clinton Bortz
3 years ago
The first thought will be last and the last thought shall be first

I love Pope Francis
3 years ago
May God condemn those who use sorcery to steal from others. In the name of Jesus Christ I rebuke all sorcerers.

Maayraa Star
5 years ago
Could this be the mandela effect? Deleted memories?

shinzantetsu
1 month ago
THEY DON'T DO IMPLANTS

Kevin Canada
5 years ago
WHAT CHEMTRAILS REALLY ARE https://rense.com/general79/chem.htm

jett888
1 year ago
It could have been better to leave the freaky sci fi music out- as our minds are already having enough to deal with

AR-15
5 years ago
first!

living purgatory
3 years ago
They did this to me through Sanford hospital – they also have their own cern-like supercomputer system called fermilab in SD. Part of my story is on Ramola D Report- Report- #45

Gang Stalking Mind Control Cults
23 Sep 2022 | 4:15 pm

The Great Climate Con: Dr. Eric Karlstrom on Jeff Rense Program (9/22/22)


The Great Climate Con: Dr. Eric Karlstrom on Jeff Rense Program (9/22/22)

See Professor Karlstrom's website: naturalclimatechange.org

Gang Stalking Mind Control Cults
21 Sep 2022 | 10:00 pm

“FALSE FLAGS” are LEGAL PROPAGANDA Produced by the Department of Defense” by State of the Nation (posted 8/17/20)


"FALSE FLAGS" are LEGAL PROPAGANDA Produced by the Department of Defense

"FALSE FLAGS" are LEGAL PROPAGANDA Produced by the Department of Defense

Posted on August 17, 2020 by State of the Nation

12 WAYS TO RECOGNIZE a BBG PRODUCTION

By Anonymous Patriots

Why would the government support false flag events?

This question would go through our minds every time we would see a new false flag event plastered all over the media. Like many of you, we would think, "It has to be real, otherwise the government and participants would be engaging in treason." But the narrative and the evidence never seem to match up. How odd that at Sandy Hook and at San Bernardino there were so many responders from federal agencies and that other drills were already happening on the same day just a mile away. Coincidence seemed unlikely for one event. Totally unlikely for two.

It even seemed that the "official story" that was "fed" to the news agencies was filled with holes on purpose. When 450 responders showed up in San Bernardino, including FEMA, ATF, Homeland Security, FBI, DoD, and all local agencies, within 14 minutes and had their lawn chairs and coolers set up while most of them walked around aimlessly with no worries in the world, we couldn't take it anymore. We had always known that "false flags" usually precede severe military action and we couldn't really imagine military action within US domestic borders since the military is not empowered to act against its own citizens.

Therefore, we decided to WAKE UP and study the false flag phenomena. Don't presume to think this is just another conspiracy theory article. What you will read will chill you to the bone. We know this is a long article, but while you were sleeping much has been done to destroy your country. You need to see the immense work that is being done behind your back to destroy your beloved country. And, most important, when you get to the end of the article, we have a CITIZEN CALL TO ACTION.

______________________________________________________________

We beseech you, our fellow Americans, to read this article and pass it along to others. Unplug your electronic tethers and read this very important article. If not for you, then the children and loved ones in your life who will live like slaves in this hellish New World Order that is already here. Our patriotic duty was to do the research; yours is to read and distribute to other patriots.
______________________________________________________________

Like many of you, we believe that 9-11 was a false flag event. We don't know exactly who, what, why and how, but we know that when overwhelming circumstantial evidence points in the opposite direction of the official story, something is wrong. So when the Sandy Hook and San Bernardino events unfolded, we became very uneasy as these events seemed to be a new type of false flag. In both events, the president was demanding that Americans give up their guns and constitutional rights even before the fake pools of blood on the steps of the Sandy Hook school dried.

Actually, the pools of blood on the sidewalk at Sandy Hook were the first indicator of fraud: two uncoagulated pools of liquid blood without a trail of blood, without any victims ever coming out of the building to "make" the pools, and authorities ignoring them and not even treating them as part of a crime scene. Every picture we saw or video we listened to was completely fake and looked more like a drill. Nothing added up. In San Bernardino there were ten different "black SUV" pictures released that are completely contradictory. An alarm kept going off in our heads saying, "Why are they purposely releasing contrary evidence as though they didn't care that the evidence made them complicit with a crime, or even treason?"

We started studying the evidence. We were beyond the basic evidence—that crisis actors were used to stage both events and multiple government agencies showed up within minutes. But one thing that totally took us by surprise is that San Bernardino was the site of the largest Jade Helm 2015 military maneuvers. We asked ourselves, "Why would so many people, including so many U.S. government agencies, be involved in deceiving Americans?" It took courage to look beyond the first veil of illusion.

If you have followed Sandy Hook and San Bernardino you realize that no one (except the patsies) are killed. No one dies; therefore, no crime has been committed. This knowledge gave us some comfort, but raised many questions concerning false flag events in America.

What is the goal of the recent (since 2012) false flag events?

Who gains from the appearance of insidious criminal events?

What mechanisms are used to silence so many participants, i.e. paid crisis actors, government agencies?

How do these agencies "get away with" using creating lies, distortions, and false flags? Wouldn't that be called propaganda?

After pondering these questions relentlessly, we lifted another veil of illusion. We asked, "What if these activities to manipulate public opinion were legal? Could there be a law that protects the president and US agencies (local, state, and federal) from conducting false flag event? So we changed our focus and began to research false flags as being legal propaganda. We found the answers in plain sight. We were beyond disbelief when we discovered that the US Congress has passed laws, post 9-11, that makes state-sponsored propaganda legal. Take a moment and think about that before reading on.

Our research lead us to discover the tenets of the National Defense Authorization Act of 2012 which makes it legal to propagate and broadcast propaganda within America. We are all being treated like enemy combatants whose "perception" must be managed to come in line with presidential "national security" policies. The Department of Defense may now broadcast propaganda with the approval and authority of the Broadcasting Board of Governors (BBG) both internationally and domestically. Just Google it folks. There is actually an agency with this name.

Perception Management

Any presidential policy may be accompanied by broadcasts that use subliminal programming as part of perception management. These mechanisms that squelch dissent have been used since the Reagan Administration to shape public opinion to support administrative policies. Wars require domestic support and these "black ops" programs started to use the "psy-ops" tools of the military. DARPA, the research and development arm of the military, has created many tools to control the enemy through media that shapes public perception, which we will elucidate later in this article. It is called perception management and has been used legally in advertising since the late seventies and also in electronic warfare throughout the world to "brain-wash" our enemies and shape their perception and opinion of America.

The only question left was the issue of what the goal of the president (or the real powers behind him—the Council on Foreign Relations) might be, besides the obvious one of having few people who disagree with his policies. We then studied the United Nations Small Arms Treaty which Obama signed in 2011, but couldn't get Congress to ratify. In this treaty we found the goal Obama is driving towards — disarm America, with the help of the United Nations. But two things have to happen: 1) we have to give up our guns or have them taken from us and 2) the UN has to have a military presence in our country. Keep in mind that the United Nations cannot have a military presence in our country, unless invited.

Have you already started connecting the dots? Remember seeing all of the images of all that UN military equipment that was distributed throughout America during Jade Helm 2015? It seemed that besides the San Bernardino exercises, moving UN heavy military equipment throughout America was the only thing that we noticed happening during Jade Helm 2015. Another veil lifted. Obama's job was to go for a gun grab, either by Congressional action or UN treaty. But patriots started waking up and our elected officials in Congress could not ratify the United Nations Small Arms Treaty. So Obama and his political minions began to manufacture false flags, hoping that our horror to Sandy Hook and San Bernardino would cause us to lay down our rights and guns.

Keep in mind, that false flag incidents and state-sponsored propaganda could not be considered treasonous acts against Americans as Congress (through the NDAA) had made treason–legal.

Congress Does Not Ratify Gun-Taking Treaty

Congress would not, and has not, ratified the UN Small Arms Treaty, nor would they vote on Second Amendment restrictions. So false flags were used to create conscious and "unconscious" support of a national gun grab. Sandy Hook was the most heinous "example" of what "guns do." Incredible anti-gun sentiment was created by Sandy Hook and people still reel from it with anger and hatred for "people on drugs" and "gun lovers." San Bernardino happened right before the congressional vote on gun control. And even with images of San Bernardino a day before the congressional vote on gun control, Obama lost his attempt for gun restrictions.

Now do you see why he has taken things into his own hands and signed into effect 23 Executive Orders that move his gun control policies forward in contradistinction to the fact that Congress rejected such ideas? The motive became quite clear once you read the UN Treaty – to dismantle the Second Amendment and disarm America. Since Obama couldn't use the United Nations or Congress to get his way, he just wrote his own laws and pretends like Executive Orders outrank congressional law. Obama is behind the UN timeline of disarmament, since the other nations who signed the treaty have already begun to disarm its citizens.

Controlling the Human Domain

Once we understood the goal and the legalization of propaganda, with its insidious DARPA electronic war devices, the rest fell into place as one Internet search after the next revealed the truth before our eyes. This is shocking and almost inconceivable. But it is law (NDAA) and Congress did not stop this law from being passed.

Another question is why our elected officials did not call out the president in using subliminal programming, psy-ops perception management and war-like marketing strategies to shape public opinion? Simple. They use it themselves in their own campaigns. Subliminal programming is openly used in the broadcasting industry – that's why people believe untruths from the news and watch mindless TV while drinking their cola beverage (It's the Real Thing) and imagining that the official story on main stream media is the only story.

As Jade Helm 2015 taught us, the military is interested in Controlling the Human Domain, the very motto of their operation emblazoned on their logo. Fellow patriots, we are in a war which is coming from all sides towards the middle. We cannot trust authorities and politicians to have our best interest at heart. We need to wake up and observe more carefully and ask more questions even when a nagging voice in the back of our minds says, "It is the official story, I should not question it," or "I should trust my elected officials to come forward and blow a whistle if such heinous propaganda was being perpetrated upon unsuspecting Americans." Better yet, perhaps we need to know how we are being controlled! So before we lose you in our web of deception and lies, remember that Jade Helm is telling us that the goal is to control the human domain.

First we need to drill down on some of the basic terms and strategies before we bring the full picture into view. Stay with us and keep reading, fellow patriots.

The Deceptive Art of Perception Management

Throughout human history, governments have been interested in "mastering the human domain." The mind control of their populations, what we once called propaganda, is now called perception management, political diplomacy and other such deceptive names. This theme is echoed in the slogan for Jade Helm, "Mastering the human domain."

The National Defense Authorization Act of 2012, which was just updated for 2016, provides that the Department of Defense, through the Broadcasting Board of Governors, controls all broadcasting both international and domestic. Therefore, Obama is acting legally carrying out "false flag" events inside the US borders. Obama is not a traitor for this activity; he is a lawyer who made it legal to be a traitor. Obama is not only at war with Syria, Libya, Iraq, Somalia and Yemen; he is also at war with Americans who don't support his policies.

Obama has made a commitment to disarm Americans called the United Nation's Small Arms Treaty. This treaty is consistent with his efforts to dismantle the Second Amendment. It is this motivation that seems to have driven his non-stop agenda for disarming America and empowering the executive branch of the government, i.e., his own agenda of bombing sovereign nations and bringing America under the control of the United Nations and his administration. This, coupled with his continued efforts to broaden his powers through the NDAA, Executive Orders, and Presidential Policy Directives creates a clear picture of manipulating public sentiment with the force of a military war on his American opponents.

United Nations Small Arms Treaty

In 2011 Obama signed the United Nations Small Arms Treaty and since then there have been 108 mass shootings in America in less than a 4 year period. In the four years before Obama was elected (2003-2007) there was a total of 27 mass shootings. Prior to 2003 there was an average of 2.5 mass shootings per year. In 2015 alone, there have been over 58. That is over 20 times higher than it was before. (MSA Data, 2015)

The Small Arms Guns Treaty has been passed by the UN and is ready to go into effect across the world. The treaty passed in the general assembly in April 2013. The treaty, which seeks to prevent and control the illicit trade of weapons while regulating the international trade of them, includes measures such as creating a national gun registry; mandating control of firearms and ammunition; regulating the manufacture of gun parts; and limiting stores' ability to sell firearms. The NRA and a bipartisan majority of pro-gun Senators have succeeded in blocking this treaty's ratification in the United States. This treaty violates the Second Amendment. For any UN treaty to have any effect on American laws, it must first be ratified by a two-thirds majority of the Senate.

NDAA Provides for Legal Propaganda

Through the 2012 National Defense Authorization Act the US government has the legal regulation to use propaganda against foreign audiences and American citizens. The intention is to sway public opinion by using television, radio, newspapers, and social media targeting American and foreign targets in controlled psy-ops or perception management.

The NDAA has an amendment added that negates the Smith-Mundt Act of 1948 (SMA) and the Foreign Relations Authorization Act of 1987. These laws made propaganda used to influence foreigners and US citizens illegal. The Broadcasting Board of Governors is not new as it was created from SMA; although today it is quite a different agency as you will read. Originally, this agency claimed to "inform, engage, and connect people around the world in support of freedom and democracy."

______________________________________________________________

Amendment 114 of the NDAA was approved by the House in May of 2012.

The Smith-Mundt Modernization Act (2012) reads:

Sec. 501. (a) The Secretary and the Broadcasting Board of Governors are authorized to use funds appropriated or otherwise made available for public diplomacy information programs to provide for the preparation, dissemination, and use of information intended for foreign audiences abroad about the United States, its people, and its policies, through press, publications, radio, motion pictures, the Internet, and other information media, including social media, and through information centers, instructors, and other direct or indirect means of communication.

(b)(1) Except as provided in paragraph (2), the Secretary and the Broadcasting Board of Governors may, upon request and reimbursement of the reasonable costs incurred in fulfilling such a request, make available, in the United States, motion pictures, films, video, audio, and other materials prepared for dissemination abroad or disseminated abroad.

According to Michael Hastings: "The new law would give sweeping powers to the State Department and Pentagon to push television, radio, newspaper, and social media onto the U.S. public."

"It removes the protection for Americans," says a Pentagon official who is concerned about the law. "It removes oversight from the people who want to put out this information. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false."

Representatives Mac Thornberry (R-TX) and Adam Smith (D-WA) in the Smith-Mundt Modernization Act (2012) (H.R. 5736), advocate that it is time to liberate the authority of the US government to broadcast American produced foreign propaganda in the U.S.

The amendment empowers the State Department and Pentagon to utilize all forms of media against the American public for the sake of coercing US citizens to believe whatever version of the truth the US government wants them to believe. All oversight is removed with Amendment 114. Regardless of whether the information disseminated is truthful, partially truthful or completely false bears no weight.

Four billion dollars per year is spent by the Pentagon on propaganda aimed at the American public; as well as $202 million spent by the Department of Defense on misinformation operations in Iraq and Afghanistan in 2011. The Pentagon is using fake handles on social media sites to purvey false information, harass users and enact perception management to influence Americans. Sophisticated software allows military to engage in online conversations with coordinated answers, blog comments and instant messaging remarks that are solely meant to spread pro-American propaganda.
______________________________________________________________

This new perception management is called Information Operations (IO), which is defined as "the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own."

Repealing the Smith-Mundt Act allows the direct deployment of these tactics on the American public.

Information Operations activities are undertaken to shape the essential narrative of a conflict or situation and thus affect the attitudes and behaviors of the targeted audience and equates descriptions of combat operations with standard marketing strategies. With the NDAA 2012 in its current form, the State Department and Pentagon can go beyond manipulating mainstream media outlets and directly disseminate campaigns of misinformation to the U.S. public. Successful wars require domestic acceptance.

The NDAA 2012 – specifically Section 1021(b)(2) – has already institutionalized the U.S. military's ability to indefinitely detain, without charge or trial, citizens and non-citizens alike. Major parts of the legislation are based on the assumption that key legal protections for individuals are incompatible with the requirements of national security.

The purpose of the Smith-Mundt Modernization Act of 2012 is "to authorize the domestic dissemination of information and material about the United States intended primarily for foreign audiences." The act was added to the 2013 NDAA bill as section of 1078 to amend certain passages of Smith-Mundt Act of 1948 and Foreign Relations Authorization Act of 1987. The Smith-Mundt Modernization Act of 2012 passed Congress as part of the NDAA 2013 on December 28, 2012. Amendments made to the Smith-Mundt Act of 1948 and Foreign Relations Authorization Act of 1987 allow for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within US borders.

National Defense Resources Preparedness Order

In 2012 Obama signed an order called National Defense Resources Preparedness giving himself explicit control over the nation and declaring a permanent state of Martial Law in the U.S. The very same year, Obama signed the National Defense Authorization Act (NDAA) which gave the U.S. Government the right to detain anyone for anything indefinitely. He has renewed that order every year since then. The Obama administration was even able to get a court ruling overturned after the ruling had successfully removed the Indefinite Detention provision from the NDAA.

Virginia Wakes Up

A bill introduced in the Virginia assembly (HB2144) would take the next step in stopping illegal federal kidnapping under the 2012 NDAA. Virginia stood alone and passed the first bill in the country addressing detention provisions written into the NDAA in 2012. That law forbids state agencies, in some situations, from cooperating with any federal attempts to exercise the indefinite detention provisions written into sections 1021 and 1022 of the National Defense Authorization Act.

What Did They Say about NDAA?

"NDAA, and SOPA would put us on a par with the most oppressive nations in the world." Sergey Brin, Google co-founder

"I never thought I would have to write this: but – incredibly – Congress has now passed the National Defense Appropriations Act, with Amendment 1031, which allows for the military detention of American citizens." Naomi Wolf, author

"…bold and dangerous attempt to establish martial law in America." Presidential candidate Rand Paul

"…was carefully crafted to mislead the public." Justin Amash, U. S. Representative

"Provisions that were snuck into the bill with little notice from mainstream media could spell indefinite detention without a hearing, keep Guantanamo open, and hinder fair trials." Amnesty International

"Myth #3: U.S. citizens are exempted from this new bill: This is simply false, at least when expressed so definitively and without caveats. The bill is purposely muddled on this issue which is what is enabling the falsehood." Glenn Greenwald, constitutional lawyer

"What the American People are witnessing now with this new legislation is the further development of an American Police State into a Military Dictatorship, a process that was started by the so-called USA Patriot Act in 2001." "If it is enacted into law, America will lose all pretense of having our Military subjected to the control of democratically elected civilian leaders as originally envisioned and required by the Constitution.

Professor Francis Boyle, constitutional law authority at the University of Illinois, Champaign.

______________________________________________________________

NDAA Versions Continue to Erode Bill of Rights and Constitution

NDAA 2013

The 2013 version of the NDAA allows the State Department and Defense Department to direct the same kind of massive propaganda campaigns here in the U.S. that are presently waged as part of American war efforts in foreign lands. The US government propaganda is directed at the American people with the belief that successful wars require domestic acceptance.

The 2013 NDAA overturned a 64-year ban on the domestic dissemination of propaganda which is described as public diplomacy information. It preaches freedom of the press abroad while practicing censorship at home. The resources and personnel who focus on talking about America overseas are diverted in favor of domestic perception management. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false.

NDAA 2014

NDAA 2014 underwrote $662 billion for continued US aggression in our many foreign wars while, on the domestic front, it violates the Bill of Rights. According to the American Civil Liberties Union, it authorizes presidents "to order the military to pick up and imprison people, including U.S. citizens, without charging them or putting them on trial."

The ACLU charges the provisions of NDAA "were negotiated by a small group of members of Congress, in secret, and without proper congressional review (and), are inconsistent with fundamental American values embodied in the Constitution….(our) fundamental freedoms are on the line."

We had already had many of the provisions of the Bill of Rights supplanted by the Patriot Act. President Carter has denounced the Patriot Act for authorizing federal agents "to search people's homes and businesses secretly, to confiscate property without any deadline or without giving notice that the intrusion had taken place, and to collect without notice personal information on American citizens including their medical histories, books checked out of libraries, and goods they purchase."

NDAA 2016

The National Defense Authorization Act for 2016 is costing Americans $612 billion. Obama skirts around the Constitution by having the National Defense Authorization Act (NDAA), Sections 1021 and 1022, which authorizes indefinite military detention, without charge or without trial, any person, including an American citizen, and applies the "Laws of War," to U.S. soil, making the United States legally a battlefield.

Obama claims he will develop "An Appropriate Legal Regime" to permanently detain people prior to having committed any crime. The idea of these detentions would be to prevent any individual from committing a possible future crime. Obama says that he might detain someone up to ten years before they might commit a crime. The NDAA removes all of the rights guaranteed under the Bill of Rights except the 2nd Amendment, and you know how hard Obama is trying to get rid of that also.

______________________________________________________________

Obama's Executive Orders

President Obama has been using executive orders (EO's) in ways they have never been used before. He is using them to do end-runs around Congress by legislating from the White House. Some EO's are dormant but pose a potential future threat. One of those is EO 13603 which was signed EO 13603 on March 16, 2012. The purpose is to delegate authority and address "National Defense" resource policies and programs under the Defense Production Act of 1950. It provides the framework and authority for the allocation or appropriation of resources, materials and services to promote "National Defense." It is an update of a prior EO's on the National Defense Resources Preparedness. One difference which is concerning is that the definition "national emergency" is now broader and quite vague.

Executive Order 13603 – National Defense Resources Preparedness allows the government to completely control our lives through the "industrial and technological base," should the president declare a "national emergency." It gives Obama the power over "all commodities and products capable of being ingested by human beings and animals; all forms of energy; all forms of civil transportation; all usable water from all sources; health resources; forces labor such as military conscription; and federal officials can issue regulations to prioritize and allocate resources."

Presidential Policy Directives

In the Barack Obama Administration, the directives that are used to promulgate Presidential decisions on "National Security" matters are designated Presidential Policy Directives (PPDs). Directives that are used to initiate policy review procedures are called Presidential Study Directives (PSDs). In May 2013, the Administration issued a previously unknown category of directive known as a Presidential Policy Guidance (PPG).

Presidential Policy Directives have the same legal force as an Executive Order, forming a body of largely secret law. Executive Orders are public and must be published in the Federal Register whereas PPDs are not. It is a secret law.

President Obama's directive on hostage policy was originally released as Presidential Policy Directive numbered PPD-29. When the White House corrected that number to PPD-30, it meant Obama had issued a secret directive as PPD-29. Of the 30 PPDs issued by Obama, 19 have not been released. And for 11 of those, the White House has not disclosed even the subject of the order. Not even Congress has a copy. It's a domain of unchecked presidential authority.

Alarming Trends in the Military

Since Obama took office, an unprecedented number of top military leaders have been removed from their posts – nearly 200 generals, flag officers and other high-ranking officials. They are being "removed" at a rate of about one per week. In 2013, an ex-Navy Seal came forward and warned that Obama is firing soldiers who say they would not fire upon US Citizens if ordered.

Recently, the Department of Homeland Security was caught buying 1.6 billion rounds of ammunition, enough to have sustained our war in Iraq for twenty years. Earlier this year, the DHS purchased another 62 million rounds of AR-15 hollow point ammo claiming it was allocated for "target practice."

The military wants to transform Information Operations into a core military competency on a par with air, ground, maritime and special operations including: the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.

IO intends to shape the essential narrative of a conflict or situation and thus affect the attitudes and behaviors of the targeted audience and equates combat operations with standard marketing strategies.

History of American Internal Propaganda and the BBG

In January 1983, President Reagan took the first formal step to create an unprecedented peacetime propaganda bureaucracy by signing National Security Decision Directive 77, entitled "Management of Public Diplomacy Relative to National Security." Reagan deemed it "necessary to strengthen the organization, planning and coordination of the various aspects of public diplomacy of the United States Government." Reagan ordered the creation of a special planning group within the National Security Council to direct these "public diplomacy" campaigns. This group was run through the Department of Defense.

The DoD's Broadcasting Board of Governors traces its beginnings to the early Cold War years, as a covert propaganda project of the newly-created Central Intelligence Agency to wage "psychological warfare" against Communist regimes and others deemed a threat to US interests. In 1948, National Security Council Directive 10/2 officially authorized the CIA to engage in "covert operations" against the Communist Menace. Clause 5 of the directive defined "covert operations" as "propaganda, economic warfare; preventive direct action, including sabotage, anti-sabotage, demolition and evacuation measures; subversion against hostile states, including assistance to underground resistance movements, guerrillas and refugee liberation groups, and support of indigenous anti-communist elements in threatened countries of the free world." Propaganda quickly became one of the key weapons in the CIA's covert operations arsenal. The agency established and funded radio stations, newspapers, magazines, historical societies, research institutes, and cultural programs all over Europe.

The BBG was officially formed in 1999 and ran on a $721 million dollar annual budget. It reports directly to the Secretary of State and operates a host of Cold War-era CIA spinoffs and "psychological warfare" projects: Radio Free Europe, Radio Free Asia, Radio Martí, Voice of America, Radio Liberation from Bolshevism and a dozen other government-funded radio stations and media outlets pumping out pro-American propaganda across the globe.

The BBG is managed by a military think-tank and is no longer funded by the CIA's black budget. Its role in "psychological warfare" continues but its operations are openly funded. The BBG and its subsidiaries still engage in propaganda warfare, subversion and soft-power projection against anyone deemed hostile to US interests and "National Security." And it is still deeply intertwined with the same military and CIA-connected intelligence organizations. The Broadcasting Board of Governors runs a propaganda network that blankets the globe.

The BBG is also involved in the technology of post-Cold War, Internet-era propaganda. It has bankrolled satellite Internet access in Iran and continues to fund an SMS-based social network in Cuba called Piramideo.

As the BBG outlined in a 2013 fact sheet for its "Internet Anti-Censorship" unit: "The BBG collaborates with other Internet freedom projects and organizations, including RFA's Open Technology Fund, the State Department, USAID, and DARPAs SAFER Warfighter Communications Program. IAC is also reaching out to other groups interested in Internet freedom such as Google, Freedom House and the National Endowment for Democracy's Center for International Media Assistance."

Today, the Congressionally-funded federal agency is also one of the biggest backers of grassroots and open-source Internet privacy technology. These investments started in 2012, when the BBG launched the "Open Technology Fund" (OTF). The BBG endowed Radio Free Asia's Open Technology Fund with a multimillion dollar budget and a single task: "to fulfill the US Congressional global mandate for Internet freedom."

The Open Technology Fund supports many new encryption programs like: CryptoCat, Tor, Open Whisper Systems, LEAP, GlobaLeaks, ChatSecure, and Orbot. In 2014, Congress increased the BBG's "Internet freedom" budget to $25 million. In 2014, OTF launched a coordinated project with Dropbox and Google to make free, easy-to-use privacy tools, and Facebook announced it was incorporating the underlying encryption technology of one of OTF's flagship projects – OpenWhisper Systems – into its WhatsApp text messaging service.

It should seem suspicious that DoD's money would be so warmly welcomed by some of the Internet's fiercest anti-government activists. Why is a federally-funded CIA spinoff with decades of experience in "psychological warfare" suddenly blowing tens of millions in government funds on privacy tools meant to protect people from being surveilled by another arm of the very same government? It is called: "Perception Management."

Perception Management Is Being Used Against You

Perception management is a term originated by the US Department of Defense. It defines it as: "Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning as well as to intelligence systems and leaders at all to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator's objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations."

The factors that influence the targeted audience consist of the following:

Ambiguity: If ambiguity increases, the perceiver may find it harder to form an accurate perception.

Social status: a person's real or perceived position in society or in an organization.

Impression management: an attempt to control the perceptions or impressions of others.

The phrase "perception management" has often functioned as a euphemism for "an aspect of information warfare." The distinction between "perception management" and public diplomacy, which "does not, as a rule, involve falsehood and deception, whereas these are important ingredients of perception management; the purpose is to get the other side to believe what one wishes it to believe, whatever the truth may be."

Although perception management operations are typically carried out within the international arena between governments, and between governments and citizens, use of perception management techniques have become part of mainstream information management systems. Businesses may even contract with other businesses to conduct perception management for them, or they may conduct it in-house with their public relations staff.

The term "perception management" is not new to the lexicon of government language. For years the FBI has listed foreign perception management as one of eight "key issue threats" to "National Security", including it with terrorism, attacks on critical US infrastructure, and weapons proliferation among others. The FBI clearly recognizes perception management as a threat when it is directed at the US by foreign governments. Deception and sleight of hand are important in gaining advantages in war, both to gain domestic support of the operations and for the military against the enemy

In late 2001, after 9/11, Defense Secretary Donald H. Rumsfeld created the Pentagon's Office of Strategic Influence (OSI). The Office of Special Plans was created with a goal of selective intelligence vetting outside the normal chartered intelligence apparatus, with foreign propaganda activities moved to the Office of Information Activities under the direction of the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict. Strategic influence, special plans, psychological operations (psy-ops), and perception management are all direct synonyms within the DoD.

The DoD has identified the information domain as its new "asymmetric flank." The level of use of perception management is continuing to grow throughout the military. There are now specialists, known as psychological operations officers and civil affairs officers, whose only purpose is to decide how to present information/propaganda to the media and to the people of the current country.

False Flag (Perception Management) Characteristics

Let's compare what Wikipedia tells us are the "12 basic strategies of perception management" with what might be its counterpart in "characteristics of a false flag event."

Ambiguity: if ambiguity increases, the perceiver finds it harder to form an accurate perception.

Counterpart: Eyewitnesses have conflicting accounts.

Social status: targeting a person's position in society or in an organization

Counterpart: The official narrative has obvious domestic and geopolitical advantages for the governing body.

Impression management: the perceptions or impressions of others

Counterpart: The narrative behind the attack serves to leverage emotions like fear, as well as patriotism, in order to manufacture consent around a previously controversial issue.

Preparation – having clear goals and knowing the ideal position you want people to hold.

Counterpart: Military and law enforcement training drills occur on the same day very close by causing confusion to obscure eye-witness testimony and allow orchestrators to plant both patsies, disinformation and backup operatives. Immediate calls for gun control or restricting civil liberties.

Credibility – all information uses prejudices or expectations to increase credibility.

Counterpart: News agencies keep saying that they are "being given reports" or "being told" and do not cite who reported or told them the unconfirmed information they broadcast as real.

Multi-channel support – have multiple arguments and fabricated facts to reinforce your information.

Counterpart: No obvious motive for the mass attack and no prior indicators. Shooter leaves manifesto or lots of evidence "proving" they were "radicalized" or "on drugs" or other were other undesirables.

Centralized control – employ entities to promote propaganda.

Counterpart: Fake "victims" and crisis actors.

Security – the nature of the deception campaign is known by few.

Counterpart: All drill participants and crisis actors sign Non-disclosure Agreements with "National Security" clause promising swift and severe punishment if broken. Everyone involved is on a "need to know" basis and kept in the dark about the overall intent of the event.

Flexibility – the deception campaign adapts and changes over time as needs change.

Counterpart: Evidence gets destroyed or tampered with and the details don't matter because the culprits are dead. No more interest in an investigation.

Coordination – organize in a hierarchy to maintain consistent distribution of information.

Counterpart: The federal agencies trump the local law enforcement agencies due to the "National

Security" element of the drill which is ultimately controlled by the Department of Defense.

Concealment – contradicting information is destroyed.

Counterpart: Culprit is dead and evidence disappears from news reports, Internet, and media. Patsy has no military training, yet shoots extremely fast and accurately but no authority looks at the evidence.

Untruthful statements – fabricate the truth.

Counterpart: Families of "victims" have acting backgrounds and receive payoffs in GoFundMe

accounts and direct payoffs, especially mortgages. They often show little to no emotion, and even smile or laugh. The lie perpetuates and the "official story" is shaped by the media into truth.

Narrative Networks

In 2015, DARPA's "Narrative Networks" (or N2) program is producing results. The project is intended to analyze how "narratives" play into human psychology, delving into the way these constructs affect the mind. A narrative is a way of phrasing something, a choice of words that is likely a biased strategy to frame information.

"Narratives exert a powerful influence on human thoughts, emotions and behavior and can be particularly important in security contexts. Conflict resolution and counterterrorism scenarios and detecting the neural response underlying empathy induced by stories is of critical importance." From DARPA researchers in a paper published in the Journal of Neuroscience Methods.

Mastery of "narratives" could potentially be used to manipulate the perception of a population using platforms of communication like television to subtly and potently make a person think a certain way.

"Governments often use stories to present information, so understanding how we comprehend them is important," said co-author Eric Schumacher, an associate professor of psychology at the Georgia Institute of Technology.

Researchers observed a phenomenon of "tunnel vision," or impaired reasoning, triggered in the brain when viewers processed a suspenseful moment. When suspense grew, brain activity in the viewers' peripheral vision decreased.

The US Military has a long history of funding psychological experiments, some entrenched in human rights violations. Now we have the Pentagon-funded DARPA program which pays researchers at colleges and other scientists millions of dollars to enhance and bolster methods of war. Such work places great technological power in the hands of the Department of Defense.

DARPA's Narrative Networks as Mind-Control

DARPA launched the Narrative Networks program to understand how narratives influence human cognition and behavior, and apply those findings in international security contexts. Narratives may consolidate memory, shape emotions, cue heuristics and biases in judgment, and influence group distinctions.

The Narrative Networks Program has three parallel tracks of research and development:

Develop quantitative analytic tools to study narratives and their effects on human behavior in security contexts;

Analyze the neurobiological impact of narratives on hormones and neurotransmitters, reward processing, and emotion-cognition interaction; and

Develop models and simulations of narrative influence in social and environmental contexts, develop sensors to determine their impact on individuals and groups, and suggest doctrinal modifications.

DARPA is studying Narrative Comprehension and Persuasion in a study entitled: Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and Its Persuasive Effects. The DARPA-funded research project ($6.1 million) is studying the effectiveness of different narratives in efforts of mass persuasion. Using MRI and EEG they will map areas of the brain involved in narrative comprehension and even attempt to enhance or disrupt narrative understanding using this information as well as Transcranial Magnetic Stimulation. It will study the neurobiology of narrative comprehension, validate narrative theories and explore the connection between narrative and persuasion. This groundbreaking research study will employ multi-modal neuro-imaging, combining the temporal resolution of EEG with the spatial resolution of MRI.

This project will provide empirical evidence integrating brain regions and cognitive processes into a neural network of narrative comprehension. By virtue of the experimental design, these relationships will also directly inform the primary aspects of narrative and strategic communication under examination: narrative validity, narrative transportation, and vertical integration. The empirical correlation of narrative theory to neurocognitive activity is an important advance in the understanding of narrative and how the brain governs narrative comprehension.

The programs goals include:

Integrate narrative theory, neuroimaging, and persuasive outcomes.

Resolve conceptual problems in narrative and psychology of religion.

Produce significant innovations in the study of the neuropsychology of narrative.

Generate practical innovations.

Tests key narrative theories from communication, literary studies, and psychology.

Uses stimuli based on religious master narratives.

Understand the psychological effects of particular message features.

Attend to the relationship between narrative and political violence in contested populations.

Disrupt or enhance aspects of narrative structure, and/or brain functioning, to minimize or maximize persuasive effects on subject proclivity to engage in political violence.

Mapping the Narrative Comprehension Network will provide empirical leverage for developing models of narrative comprehension that are biologically plausible. Moreover, the current research will establish how narrative elicits persuasion in the brain.

Predicting a particular narrative message influence on an audience.

Introducing new stories into the narrative system to disrupt its coherence.

Rational logic aspires to be objective, repeatable, consistent and impersonal, whereas narrative logic works on completely different principles. It is rooted in the simultaneously cognitive and emotional processing of information that marks human behavior, and finds its validity in principles of coherence and fidelity. These qualities help explain the seemingly irrational persuasive power of narrative and provide guidance for how to manipulate narrative stimuli in order to accurately map the Narrative Comprehension Network in the brain.

Culture provides schema, or templates, for ordering narrative data (top-down); individuals process incoming story data and organize it with a selected schema. The process continues until comprehension is achieved, or lack of comprehension mandates implementation of a new schema. A master narrative can be seen as an exemplar narrative schema. Because master narratives embody specific cultural values, they can be strategically deployed as an explanatory frame for current events in order to encourage a particular interpretation and for persuasive purposes. Master narratives execute ideological functions, positioning these cultural values as naturalized and universal.

Vertical integration is achieved when personal, local and master narratives all line up consistently. This congruence formulates a powerful model for identity formation and persuasion. Cognitive processes that are indicated by vertical integration to be part of the Narrative Comprehension Network include: self-recognition, identity, and theory of mind (to see oneself in a story), pattern recognition (to see parallels between master narratives and contemporary situations), and memory (to remember the master narrative elements).

Subliminal Mind Control – SSSS

The "Sound of Silence" is a military-intelligence code-word for certain psychotronic weapons of mass mind-control tested in the mid-1950s, perfected during the 70s, and used extensively by the US military in the early 90s. This weapon is based on subliminal carrier technology, or the Silent Sound Spread Spectrum (SSSS). It was developed for military use by Dr. Oliver Lowery of Norcross, Georgia, and is described in US Patent #5,159,703 – "Silent Subliminal Presentation System" for commercial use in 1992.

The patent abstract reads:

"A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum, are amplitude- or frequency-modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener."

The Sound of Silence Spread Spectrum broadcasting equipment allows for the implantation of thoughts, emotions, and even prescribed physical actions into human beings. In the private sector SSSS goes by the name Silent Subliminal Presentation System and the technology has also been released to certain corporate vendors who have attached brand names like BrainSpeak and Silent Subliminals to their own SSSS-based products.

It is a technology that uses subliminal programming that is carried over Ultra-High Frequency (UHF) broadcast waves, planting inaudible messages directly into the subconscious human mind. Perfected more than twenty years ago by the DoD and battlefield-tested upon Iraqi soldiers in the Gulf War during 1991, SSSS is a proven weapon.

The US Government has plans to extend the range of this technology to envelop all peoples, all countries through BBG broadcasts. SSSS is completely undetectable by those being targeted and it delivers its subliminal programming directly to the human brain via the auditory sense at frequencies that humans are incapable of perceiving as sound, there is no defense against it. Coupled with the use of supercomputers, an individual's unique electroencephalographic (EEG) patterns can be digitally altered and then stored for rebroadcast via digital UHF. Computer-enhanced EEGs can identify and isolate the brain's low-amplitude emotion signature clusters, synthesize them and they can then be broadcast over TV and radio signals directly into the brain where they can then silently trigger the same basic emotion in another human being.

DARPA and Social Media

The SMISC program has invested millions of dollars investigating social media, social networks, and how information spreads across them. One study, funded by the Air Force Research Laboratory (AFRL), entitled "Containment Control for a Social Network with State-Dependent Connectivity" demonstrates that the mathematical principles used to control groups of autonomous robots can be applied to social networks in order to control human behavior. If properly calibrated, the mathematical models developed by Dixon and his fellow researchers could be used to sway the opinion of social networks toward a desired set of behaviors. It is called soft Info-warfare.

DARPA launched its SMISC program in 2011 to examine ways social networks could be used for propaganda and what broadly falls under the title of Military Information Support Operations (MISO), formerly known as Psychological Operations – psy-ops. The SMISC program includes studies that analyze Twitter, investigate the spread of Internet memes; automatically identifying deceptive content in social media with linguistic cues; and modeling user attitude toward controversial topics in online social media. It models how collaboration between "key influencers" in social networks could affect the behavior of groups within the network by using the principle of "containment control."

British intelligence agency GCHQ has developed tools specifically aimed at leveraging social media for "effects" operations. The organization has shared its methods with the NSA, and these capabilities have been used in Afghanistan and elsewhere to "shape" information available to members of targeted organizations online and via mobile phones.

The Department of Defense already uses some social media manipulation techniques as part of its "information support" operations, targeting message boards and websites associated with foreign groups that are considered "extremist." In April, the Associated Press uncovered an effort by the US Agency for International Development (USAID) in 2009 to create ZunZuneo, a Twitter-like mobile social network aimed at undermining the Communist regime in Cuba. The research that DoD is financing has much broader cultural implications than as a tool of information warfare against adversaries abroad.

Psy-Ops and DARPA

DARPA's new ultrasonic neural interface devices can frame information as narratives which shape, explain, and make sense of data. Cognitive computers themselves can also do this – creating news articles from pooled data with no human being involved. What used to be called propaganda is now called "strategic communications" that tell a stories or create narrative networks. DARPA is focused on creating counter-narratives, or stories they believe will counteract the effects of radicalization.

The Ultrasonic Neural Interface Program is used to affect changes in a person's beliefs, their sense of identity, and even memory, partly because they stimulate the release of brain chemicals. Neural interfaces and narrative networks can manipulate the brain using electrical and/or magnetic energy. The most common is Transcranial Magnetic Stimulation (TMS). When targeted at a specific area in the brain, TMS can create a variety of effects, including emotional changes and bodily movement. Its goals were to: (i) map out the precise areas of the brain that are affected by stories; (ii) analyze how people respond to specific stories; and (iii) test ways of changing their response to a story, i.e. by altering the story format, and/or zapping their brains with TMS. This technique is more properly referred to as neuromodulation, and involves stimulating the release of neurotransmitters by targeting specific areas of the brain with electromagnetic pulses.

DARPA's research has found that stories affect our emotions, our cultural and religious beliefs, and even memory. In other words, the narratives we hear (on TV, in the news, blogs, tweets, etc) affect important brain chemicals, and therefore our very identities. So do pulsed electromagnetic fields – such as TMS.

DARPA is clearly aware of the vast range of possible applications for these devices, and have also been funding a new way of altering brain chemistry, called pulsed ultrasound. Focused ultrasound can deliver, "complex spatio-temporal patterns of acoustic waves" to achieve similar results to TMS, but has a spatial resolution which is five times greater, and can reach far deeper into the brain. Ultrasound can be used to activate reward pathways (dopamine) in the brain which may be used to condition and/or reinforce certain desired attributes and/or to motivate specific behavioral actions.

DARPA has spent several years analyzing universal narrative structures, and the physiological effects they have on people, as well as tracking popular narratives (and the memes they produce) in social media. The US Government's Strategic Communications plan involves sentiment analysis, the use of counter-narratives, and 'downvoting' stories which it does not approve of, preventing discussion of certain 'banned' topics, as well as using "persona management software" to create false identities, and thus manipulate public perception of news and fool people into believing in a false "popular consensus."

One part of the new Psy-op strategy is controlling the conversation. By manipulating the news we hear, our primal responses can therefore be influenced, without us even knowing it. Brain-to-computer interfaces (BCIs) are already being used to link people's minds/feelings to a movie they're watching. MyndPlay have devised an EEG headset which monitors the viewer's emotional reactions to the movie, and changes the ending accordingly.

New DARPA Projects to Enslave Our Minds

DARPA is one of the government-sponsored research agencies that most boldly explores the future of science and technology. Given that many of its research projects have military applications, it has been traditional for the agency to be secretive about them. In recent years, however, DARPA has been embracing the benefits of open source, particularly for promoting rapid innovation. With an annual budget of $2.8 billion, DARPA drives a good portion of the advanced research that happens at universities and corporations in the US.

DARPA has given out open source software that has been sponsored by the agency. The focus area for first year is the XDATA initiative that is developing open source infrastructure for supporting big data. DARPA has an open source strategy for areas of work including big data to help increase the impact of government investments in building a flexible technology base.

One new DARPA program is to remotely disrupt political dissent and extremism by employing "Transcranial Magnetic Stimulation" (TMS) in tandem with sophisticated propaganda based on this technology. The research at Arizona State University is entitled, "Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects." TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to induce or disrupt the operation of narratives within the brain. This area of study has received $100 million in funding via Obama's ten-year BRAIN Project, as well as a $1.3 billion commitment from Europe.

DARPA is the research and development tool of the National Security Council and thus has carte blanche to openly seek help from industry and the private sector to build the most cutting edge war devices that anyone can imagine. Below we list some declassified projects but the ones that are most heinous are still classified.

DARPA's Open Catalog contains a curated list of DARPA-sponsored software and peer-reviewed publications. DARPA sponsors fundamental and applied research in a variety of areas that may lead to experimental results and reusable technology designed to benefit multiple government domains. The DARPA Open Catalog organizes publicly releasable material from DARPA programs. DARPA has an open strategy to help increase the impact of government investments. DARPA is interested in building communities around government-funded research. DARPA plans to continue to make available information generated by DARPA programs, including software, publications, data, and experimental results.

______________________________________________________________

Some recently released DARPA projects are listed below and demonstrate that DARPA is focused on "Controlling the Human Domain" in every way possible.

The Active Authentication (AA) program seeks to develop novel ways of validating the identity of computer users by focusing on the unique aspects of individuals through software-based biometrics. Biometrics are defined as the characteristics used to recognize individuals based on one or more intrinsic physical or behavioral traits. This program is focused on behavioral biometrics.

~Translation: Foundation code that gives NSA a system to identify all users whether encrypted or not.

The Anomaly Detection at Multiple Scales (ADAMS) program seeks to create, adapt and apply technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts.

~Translation: NSA spying on everything to find "red flags" that trigger further surveillance.

The Automated Program Analysis for Cybersecurity (APAC) program aims to address the challenge of timely and robust security validation of mobile apps by first defining security properties to be measured against and then developing automated tools to perform the measuring. APAC seeks to apply recent research breakthroughs in this field in an attempt to scale DoD's program analysis capability to a level never before achieved with an automated solution.

~Translation: DoD system to analyze all streaming data from all systems, encrypted or otherwise.

The Memex Program was released to Open Source in September 2014. Memex seeks to develop software that advances online search capabilities far beyond the current state of the art. Creation of a new domain-specific indexing and search paradigm will provide mechanisms for improved content discovery, information extraction, information retrieval, user collaboration, and extension of current search capabilities to the deep web, the dark web, and non-traditional (e.g. multimedia) content.

~Translation: NSA will now control all search engines that use Memex as the base code.

The Mission-oriented Resilient Clouds (MRC) program is addressing some of the security challenges facing cloud computing by developing technologies to detect, diagnose and respond to attacks in the cloud, with the goal of effectively building a 'community health system' for the cloud. MRC is also developing technologies intended to enable missions that are supported by cloud computing and other networked systems to continue functioning while under cyberattack.

~Translation: NSA control of all cloud computing with back doors directly to US cyber-control systems.

DARPA's Programming Computation on Encrypted Data (PROCEED) program is a research effort that seeks to develop methods that allow computing with encrypted data without first decrypting that data, making it possible to compute more securely in untrusted environments.

~Translation: NSA double-speak for controlling all encryption and having a method of seeing through encryption without being detected.

The SAFER Program seeks to develop technology to enable safe, resilient communications over the Internet, particularly in situations in which third parties attempt to discover the identity or location of the end users, or block communications. The program also seeks to provide the technological quality of service required to support applications such as electronic mail, instant messaging, voice over IP, and other media that promote effective communication.

~Translation: NSA double-speak for complete control of IP address identifiers for surveillance from all devices.

Social Media in Strategic Communication (SMISC) program is to develop a new science of social networks built on an emerging technology base. Through the program, DARPA seeks to develop tools to support the efforts of human operators to counter misinformation or deception campaigns with truthful information.

~Translation: NSA control of all social media.

XDATA Program is developing an open source software library for big data to help overcome the challenges of effectively scaling to modern data volume and characteristics. The program is developing the tools and techniques to process and analyze large sets of imperfect, incomplete data. Its programs and publications focus on the areas of analytics, visualization, and infrastructure to efficiently fuse, analyze, and disseminate these large volumes of data.

~Translation: NSA system to analyze and target media users and all data.
______________________________________________________________

DARPA and the Brain Initiative

President Obama announced the BRAIN initiative in April 2013. Today, the initiative is supported by several federal agencies as well as dozens of technology firms, academic institutions, scientists and other key contributors to the field of neuroscience. DARPA is supporting the BRAIN initiative through a number of programs.

Electrical Prescriptions (ElectRx) – The ElectRx program aims to help the human body heal itself through neuromodulation of organ functions using ultra-miniaturized devices, approximately the size of individual nerve fibers, which could be delivered through minimally invasive injection.

~Translation: Military control of our neurological systems.

Hand Proprioception and Touch Interfaces (HAPTIX) – The HAPTIX program aims to create fully implantable, modular and reconfigurable neural-interface microsystems that communicate wirelessly with external modules, such as a prosthesis interface link, to deliver naturalistic sensations to amputees.

~Translation: Wireless brain-control over other electronic systems (robots, vehicles, planes, etc.).

Neuro Function, Activity, Structure and Technology (Neuro-FAST) – The Neuro-FAST program seeks to enable unprecedented visualization and decoding of brain activity to better characterize and mitigate threats to the human brain, as well as facilitate development of brain-in-the loop systems to accelerate and improve functional behaviors. The program has developed CLARITY, a revolutionary tissue-preservation method, and builds off recent discoveries in genetics, optical recordings and brain-computer interfaces offering faster, better views of the entire brain.

~Translation: The basis of cybernetic interfaces between humans and machines.

Restoring Active Memory (RAM) – The RAM program aims to develop and test a wireless, fully implantable neural-interface medical device for human clinical use. The device would facilitate the formation of new memories and retrieval of existing ones.

~Translation: Control of memories and the creation of personal identities generated by computers.

Reliable Neural-Interface Technology (RE-NET) – The RE-NET program seeks to develop the technologies needed to reliably extract information from the nervous system, and to do so at a scale and rate necessary to control complex machines, such as high-performance prosthetic limbs.

~Translation: Neural interrogation invades our minds.

Systems-Based Neurotechnology for Emerging Therapies (SUBNETS) – The SUBNETS program seeks to create implanted, closed-loop diagnostic and therapeutic systems for treating neuro-psychological illnesses and networks of the brain.

~Translation: Mechanical psychiatrists will be able to prescribe neural restructuring of the personality.

Patents for Mind Control and Psy-Ops

The arsenal of mind control technologies developed by the government is quite vast. A number of well researched books on the subject have been published revealing the complexity and variety of these technologies. The US Patents described below define technology used for behavior manipulation through all types of media. These patents reflect "old" technology compared to DARPA classified projects. This list just shows the pervasiveness of this technology that is commonly found in all types of media.

Nervous system manipulation by electromagnetic fields from monitors. US Patent #6,506,148, 1/14/2003

Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.

Computer monitor and TV monitors can be made to emit weak low-frequency electromagnetic fields by pulsing the intensity of displayed images. Experiments have shown that the 1/2 Hz sensory resonance can be excited in this manner in a subject near the monitor. The 2.4 Hz sensory resonance can also be excited in this fashion. A TV monitor or computer monitor can be used to manipulate the nervous system of nearby people.

This method can be used in making movies and recording video tapes and DVDs. Video tapes can be edited such as to overlay the pulsing by means of modulating hardware. US Patent #872528, 6/1/2001

Ultrasonic Speech Translator and Communication System, US Patent #5,539,705, M. A. Akerman, Curtis Ayers, Howard Haynes, July 23, 1996. A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.

Method and Recording for Producing Sounds and Messages to Achieve Alpha and Theta Brainwave States and Positive Emotional States in Humans, US Patent #5,352,181, Mark Davis, October 4, l994.

Method of and Apparatus for Inducing Desired States of Consciousness, US Patent #5.356,368, Robert Monroe, October 18, 1994. Improved methods and apparatus for entraining human brain patterns, employing frequency-following-response (FFR) techniques and facilitating attainment of desired states of consciousness.

Method of Inducing Mental, Emotional and Physical States of Consciousness, including Specific Mental Activity, in Human Beings, US Patent #5,213,562, Robert Monroe, May 25, 1993.

Subliminal Message Generator, US Patent #5,270,800, Robert Sweet, December 14, 1993. A combined subliminal and supraliminal message generator for use with a television receiver; permits complete control of subliminal messages and their presentation. Also applicable to cable television and computers.

Superimposing Method and Apparatus Useful for Subliminal Messages, US Patent #5,134,484, Joseph Wilson, July 28, 1992. Method of Changing a Person's Behavior.

Silent Subliminal Presentation System, US Patent #5,159,703, Oliver Lowery, October 27, 1992. A silent communications system in which non-aural carriers in the very low or very high audio-frequency range, or in the adjacent ultrasonic frequency spectrum, are amplitude-modulated with the desired intelligence and propagated acoustically or vibrationally for inducement into the brain.

Method and System for Altering Consciousness, US Patent #5,123,899, James Gall, June 23, 1992. A system for altering the states of human consciousness involving the use of simultaneous application of multiple stimuli, preferably sounds, having differing frequencies.

Hearing System, US Patent #4,877,027, Wayne Brunkan, October 31, 1989. A method for directly inducing sound into the head of a person, using microwaves in the range of 100 MHz to 10,000 MHz, modulated with a waveform of frequency- modulated bursts.

Non-Invasive Method and Apparatus for Modulating Brain Signals through an External Magnetic or Electric Field to Reduce Pain, US Patent #4,889,526, Elizabeth Rauscher and William Van Bise, December 26, 1989.

Apparatus for Inducing Frequency Reduction in Brain Wave, US Patent #4,834,70l, Kazumi Masaki, May 30, 1989.

Non-Audible Speech Generation Method and Apparatus, US Patent #4,821,326, Norman MacLeod, April 11, 1989.

Method and Apparatus for Translating the EEG into Music to Induce and Control Various Psychological and Physiological States and to Control a Musical Instrument, US Patent #4,883,067, Knispel et. al., November 28, 1989.

Hearing Device, US Patent #4,858,612, Philip Stocklin, August 22, 1989. A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the regions of the auditory cortex.

US Patent #4,717,343, Alan Densky, January 5, 1988. A method of conditioning a person's unconscious mind in order to effect desired change in the person's behavior, and which does not require the services of a trained therapist.

Auditory Subliminal Programming System, US Patent #4,777,529, Richard Schultz and Raymond Dolejs, October 11, 1988.

Auditory Subliminal Message System and Method, US Patent #4,395,600, Rene Lundy and David Tyler, July 26, 1983. An amplitude-controlled subliminal message may be mixed with background music.

Device for the Induction of Specific Brain Wave Patterns, US Patent #4,335,710, John Williamson, June 22, 1982. Brainwave patterns associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.

Apparatus for Electrophysiological Stimulation, US Patent #4,227,516, Bruce Meland and Bernard Gindes, October 14, 1980.

Noise Generator and Transmitter, US Patent #4,034,741, Guy Adams and Jess Carden, Jr, July 12, 1977. An analgesic noise-generator.

Apparatus for the Treatment of Neuropsychic and Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation, US Patent #3,773,049, L. Y. Rabichev, V. F. Vasiliev, A. S. Putilin, T. G. Ilina, P. V. Raku and L. P. Kemitsky, November 20, 1973. This is the patent for LIDA, the Soviet brainwashing machine.

Psycho-Acoustic Projector, US Patent #3,568,347, Andrew Flanders, February 23, 1971. A system for producing aural psychological disturbances and partial deafness in the enemy during combat situations.

False Flags are Domestic LEGAL Propaganda

By now your head is probably spinning and you are, like us, sick to the core at what our elected officials are permitting to happen in our country and the world in the United States' name.

President Obama, and the powers that are behind him, weren't kidding when he said that he would transform America. They have a motive, a means, and an opportunity to effect positive public support for any agenda items through the work of the DoD and the BBG within the boundaries of America. It doesn't matter whether it is gun control, the Iran Deal, bombing other nations, TPP, ObamaCare, NDAA, or any agenda item, somehow he pushes it through without much resistance. And when public consent cannot be manufactured with perception management and psychological manipulation of narrative networks, Obama just writes another Executive Order, Presidential Policy Directive (PPD), Presidential Study Directives (PSD) or Presidential Policy Guidance (PPG), or whatever he wants to rename his misuse of executive authority.

One thing is for sure: Obama seems to be unchallenged by his fellow politicians who must be part of some larger scheme that coerces their votes. They must be complicit. There must be a message in the media that promotes common political schemes without being "illegal", "treasonous", or even uncommon. Shaping the narrative with "talking points" is perception management of narrative networks.

In the name of "National Security" Obama has bombed Syria, Libya, Iraq, Somalia, and Yemen without any congressional approval. These acts of war were accompanied with excellent smoke and mirrors – perception management and DARPA subliminal devices. Only a few lone voices pointed out that we need congressional approval to wage war! Crickets…

Could the crickets be DARPA electronic warfare bouncing around in our manipulated brains?

Could Obama's speeches be electronic warfare aimed at our neural narrative networks?

Why is DARPA so set on creating things that "control the human domain," just as Jade Helm?

Has Jade Helm 2015 ended or does it get renewed each year by Obama just like the NDAA?

Are we targets for pro-Obama propaganda provided by the DoD's BBG?

Could some false flags (where no one truly dies) be more propaganda films created by the huge BBG broadcasting network?

YES. The answer to all of these questions above is YES.

What Can We Do, Fellow Patriots?

First. Arm yourself with the truth – like a two edged sword. Read and re-read this article as painful as it may be for you. Do your own research from what we have provided you.

Second. Arm yourself with a consciousness higher than the driving force of global manipulation for personal power and greed – like a personal shield. Personal self-awareness has always been the fulcrum of human evolution. Oftentimes, it comes down to a few people, or even one person, who turns the tide of evil away from controlling the evolution of human consciousness. One lawsuit can turn the tables. One law. One person. One Patriot.

Third. Arm yourself with the knowledge of the weapons being used against you and the motives. Once you have that knowledge, you can find devices to counteract some of those weapons. There are an equal number of good devices to counter the evil ones.

Fourth. Arm yourself with the knowledge to discern when narratives ("story-lies") are being used to manipulate you against your will. Take the 12 Steps of Perception Management, as presented above, and apply them to possible false flag scenarios to learn to recognize the patterns and see through to reality.

Fifth. Arm yourself against your enemy and attempt to neutralize them using their own methods and devices. A call goes out to all Patriots to secretly subvert political manipulation of Americans on American soil. In other words, wait for the right moment and then throw a monkey wrench into the works. Help the evil devices malfunction and upset the "official story" with random acts of Patriotism.

Sixth. Arm yourself with the justice of the law and bring lawsuits against domestic propaganda and subliminal manipulation of Americans – or anyone.

Seventh. Arm yourself against government agendas that now consider Americans to be enemy combatants on domestic soil who must be supportive of agendas that take away American civil liberties and constitutional rights.

Of course, we forgot to mention the first and most primal step – 'get mad as hell about it and don't take it anymore.' The idea that you have been manipulated most of your life by commercial interests through legal subliminal programming is enough to demand answers: "Why the hell do elected officials and the government 'allow' this to happen?" And now you are armed with the answer: The "government" is doing the same thing to us but with military grade electronic warfare that is mind-boggling.

Warning: As you begin to go back in your memory of these events (9-11, Sandy Hook, San Bernardino, and many others) with this new awakening, you may feel raped, used, and manipulated. The more you watched the "shootings" the more you believed the "story" – the narrative. The more you were sucked in and could not get those images out of your head, the more your freedom was stolen. But, if you looked closely, the "man behind the curtain" is actually our own government. Only chaos and confusion arises from such evil manipulation and thus FEAR is bred. FEAR is another name for TERROR which is another name for WAR.

War is big business and it needs the best of marketing devices to get public support for presidential policy – in the name of "National Security," which trumps all else.

We have an out-of-control president who uses military mind-control devices to manage the perceptions of American citizens to "make" them "allow" his unprecedented abuse of executive authority. Since he is the commander and chief and controls the DoD, which should have no authority inside of America, he needed the NDAA to legally permit him to consider Americans a threat to "National Security." For five years he has consistently broaden his "powers" to take away civil liberties, virtually unchallenged.

The time is now to wake up and end electronic warfare in America through loopholes in the NDAA. This Act must be rewritten to specifically address these issues and make sure that American civil liberties are not violated by clever lawyers like Obama who have made treason legal.

Gang Stalking Mind Control Cults
21 Sep 2022 | 8:40 pm

Pentagon To “Review” Their Information and Cyber Warfare Against American Citizens (8 Articles)


1) Masters of Deceit: The Government's Propaganda of Fear, Mind Control & Brain Warfare (John and Nisha Whitehead, Sept. 21, 2022)

Masters of Deceit: The Government's Propaganda of Fear, Mind Control & Brain Warfare

by John W. Whitehead & Nisha Whitehead | The Rutherford Institute
September 21st 2022,

Our government treats its citizens like faceless statistics and economic units to be bought, sold, bartered, traded, and tracked.

"It is the function of mass agitation to exploit all the grievances, hopes, aspirations, prejudices, fears, and ideals of all the special groups that make up our society, social, religious, economic, racial, political. Stir them up. Set one against the other. Divide and conquer. That's the way to soften up a democracy."― J. Edgar Hoover, Masters of Deceit

The U.S. government has become a master of deceit.

It's all documented, too.

This is a government that lies, cheats, steals, spies, kills, maims, enslaves, breaks the laws, overreaches its authority, and abuses its power at almost every turn; treats its citizens like faceless statistics and economic units to be bought, sold, bartered, traded, and tracked; and wages wars for profit, jails its own people for profit, and has no qualms about spreading its reign of terror abroad.

Worse, this is a government that has become almost indistinguishable from the evil it claims to be fighting, whether that evil takes the form of terrorism, torture, drug trafficking, sex trafficking, murder, violence, theft, pornography, scientific experimentations or some other diabolical means of inflicting pain, suffering and servitude on humanity.

With every passing day, it becomes painfully clear that this is not a government that can be trusted with your life, your loved ones, your livelihood or your freedoms.

Just recently, for example, the Pentagon was compelled to order a sweeping review of clandestine U.S. psychological warfare operations (psy ops) conducted through social media platforms. The investigation comes in response to reports suggesting that the U.S. military has been creating bogus personas with AI-generated profile pictures and fictitious media sites on Facebook, Twitter and Instagram in order to manipulate social media users.

Psychological warfare, as the U.S. Army's 4th Psychological Operations Group explained in a recruiting video released earlier this year, enables the government to pull the strings, turn everything they touch into a weapon, be everywhere, deceive, persuade, change, influence, and inspire.

Of the many weapons in the government's vast arsenal, psychological warfare (or psy ops) can take many forms: mind control experiments, behavioral nudging, propaganda.

In the 1950s, MK-ULTRA, the mind control program developed under CIA director Allen Dulles as part of his brain warfare Cold War campaigns, subjected hundreds of unsuspecting American civilians and military personnel to doses of LSD, some having the hallucinogenic drug slipped into their drinks at the beach, in city bars, at restaurants. For Operation Midnight Climax, the CIA hired prostitutes to lure men into a bugged room, where they would be dosed with LSD and observed having sex

As Brianna Nofil explains, "MK-Ultra's 'mind control' experiments generally centered around behavior modification via electro-shock therapy, hypnosis, polygraphs, radiation, and a variety of drugs, toxins, and chemicals."

The CIA spent nearly $20 million on its MKULTRA program, reportedly as a means of programming people to carry out assassinations and, to a lesser degree, inducing anxieties and erasing memories, before it was supposedly shut down.

As one study reported, detainees held in CIA safe-houses abroad "were literally interrogated to death in experimental methods combining drugs, hypnosis and torture, to attempt to master brainwashing techniques and memory erasing."

Similarly, the top-secret Montauk Project, the inspiration for the hit Netflix series Stranger Things, allegedly was working to develop mind-control techniques that would then be tested out on locals in a nearby village, triggering crime waves or causing teenagers to congregate.

As journalist Lorraine Boissoneault concludes, "Despite MK-ULTRA violating ethical norms for human experiments, the legacy of brainwashing experiments continued to live on in U.S. policy. The same methods that had once been used to train American soldiers ended up being used to extract information from terrorists in Abu Ghraib, Iraq and Guantanamo Bay."

Fast forward to the present day, and it's clear that the government—aided and abetted by technological advances and scientific experimentation—has updated its psy ops warfare for a new era. For instance, the government has been empowered to use its ever-expanding arsenal of weapons and technologies to influence behaviors en masse and control the populace.

It's a short hop, skip and a jump from a behavioral program that tries to influence how people respond to paperwork to a government program that tries to shape the public's views about other, more consequential matters. Thus, increasingly, governments around the world—including in the United States—are relying on "nudge units" to steer citizens in the direction the powers-that-be want them to go, while preserving the appearance of free will.

Back in 2014, for example, a Fusion Center in Washington State (a Dept. of Homeland Security-linked data collection clearinghouse that shares information between state, local and federal agencies) inadvertently released records on remote mind control tactics (the use of "psycho-electronic" weapons to control people from a distance or subject them to varying degrees of pain).

Indeed, the COVID-19 pandemic could easily be considered psychological warfare disguised as a pandemic threat. As science writer David Robson explains: "Fears of contagion lead us to become more conformist and tribalistic… Daily reminders of disease may even sway our political affiliations… Various experiments have shown that we become more conformist and respectful of convention when we feel the threat of a disease… the evocative images of a pandemic led [participants in an experiment] to value conformity and obedience over eccentricity or rebellion."

This is how you persuade a populace to voluntarily march in lockstep with a police state and police themselves (and each other): by ratcheting up the fear-factor, meted out one carefully calibrated crisis at a time, and teaching them to distrust any who diverge from the norm.

This is not a new experiment in mind control.

Add the government's inclination to monitor online activity and police so-called "disinformation," and you have the makings of a restructuring of reality straight out of Orwell's 1984, where the Ministry of Truth polices speech and ensures that facts conform to whatever version of reality the government propagandists embrace.

This "policing of the mind" is exactly the danger author Jim Keith warned about when he predicted that "information and communication sources are gradually being linked together into a single computerized network, providing an opportunity for unheralded control of what will be broadcast, what will be said, and ultimately what will be thought."

We've already seen this play out on the state and federal level with hate crime legislation that cracks down on so-called "hateful" thoughts and expression, encourages self-censoring and reduces free debate on various subject matter.

The end goal of these mind-control campaigns—packaged in the guise of the greater good—is to see how far the American people will allow the government to go in re-shaping the country in the image of a totalitarian police state.

The government's fear-mongering is yet another key element in its mind-control programming.

It's a simple enough formula. National crises, global pandemics, reported terrorist attacks, and sporadic shootings leave us in a constant state of fear. The emotional panic that accompanies fear actually shuts down the prefrontal cortex or the rational thinking part of our brains. In other words, when we are consumed by fear, we stop thinking.

A populace that stops thinking for themselves is a populace that is easily led, easily manipulated and easily controlled whether through propaganda, brainwashing, mind control, or just plain fear-mongering.

Fear not only increases the power of government, but it also divides the people into factions, persuades them to see each other as the enemy and keeps them screaming at each other so that they drown out all other sounds. In this way, they will never reach consensus about anything and will be too distracted to notice the police state closing in on them until the final crushing curtain falls.

This Machiavellian scheme has so ensnared the nation that few Americans even realize they are being brainwashed—manipulated—into adopting an "us" against "them" mindset. All the while, those in power—bought and paid for by lobbyists and corporations—move their costly agendas forward.

This unseen mechanism of society that manipulates us through fear into compliance is what American theorist Edward L. Bernays referred to as "an invisible government which is the true ruling power of our country."

It was almost 100 years ago when Bernays wrote his seminal work Propaganda:

"We are governed, our minds are molded, our tastes formed, our ideas suggested, largely by men we have never heard of… In almost every act of our daily lives, whether in the sphere of politics or business, in our social conduct or our ethical thinking, we are dominated by the relatively small number of persons…who understand the mental processes and social patterns of the masses. It is they who pull the wires which control the public mind."

As I point out in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, to this invisible government of rulers who operate behind the scenes—the architects of the Deep State—we are mere puppets on a string, to be brainwashed, manipulated and controlled.

For years now, the powers-that-be—those politicians and bureaucrats who think like tyrants and act like petty dictators regardless of what party they belong to—have attempted to brainwash us into believing that we have no rights: to think for ourselves, make decisions about our health, protect our homes and families and businesses, act in our best interests, demand accountability and transparency from government, or generally operate as if we are in control of our own lives.

Well, the government is wrong.

We have every right, and you know why? Because, as the Declaration of Independence states, we are endowed by our Creator with certain inalienable rights—to life, liberty, property and the pursuit of happiness—that no government can take away from us.

It's time we started reminding the government that "we the people" are the ones in charge.

2) Pentagon's information warfare review should cover domestic side

Pentagon's information warfare review should cover domestic side (Sept. 21, 2022)

The U.S. Department of Defense has ordered "a sweeping audit of how it conducts clandestine information warfare," the Washington Post reports. The apparent reason for the review is an August disclosure, by Graphika and the Stanford Internet Observatory, that Twitter and Facebook, of social media accounts opened under fake identities and used to feed disinformation to "audiences overseas."

That's all well and good, but while they're at it I wish the Pentagon would also review – and cease – its information warfare campaigns against the American public.

Among supposed American constitutional values are separation of the military from politics, and its subservience to civilian government.

While those values have always proven more noticeable in the breach than in the observance in wartime, the post-World War II national security state has turned that breach into a well-funded, 24/7/365, campaign of political influence.

Senior military officials routinely attempt to affect policy (and politicians, and voter sentiment) with public statements designating the next Enemy of the Week and begging for more money and more operational authority to fight the wars it chooses rather than the wars Congress declares (the last time Congress was willing to take that kind of responsibility was in 1942, when it added Bulgaria, Hungary, and Romania to its list of WWII opponents).

The Department of Defense maintains an "Entertainment Media Office" to support filmmakers with military resources. Needless to say, only productions which glorify the U.S. armed forces need apply. The most recent prominent example (involving no fewer than two U.S. Navy aircraft carriers, multiple aircraft and military pilots, etc.) is mega-hit "Top Gun: Maverick."

In 2015, the public learned that the National Football League's apparently heartfelt love of military pageantry – color guards, tributes to veterans, even aircraft flyovers and parachute jumps – was actually just a bought and paid for (with millions of taxpayer dollars) DOD marketing scheme.

And yes, they're constantly coming for our children. I was recruited into the U.S. Marine Corps in high school myself in the 1980s, but even I was surprised at the sheer volume of mail my own kids received from armed forces recruiters from about the time they hit the age of 16 a few years ago. They're all over the public schools, not just to fill their recruitment quotas but to make positive impressions on future voters.

The up side for them is obvious: Spending millions of taxpayer dollars on psy-ops directed at Americans gets them hundreds of billions to spend on other things.

The down side for us is equally obvious: Instead of armed forces doing as the civilian government directs, we have armed forces using taxpayer money to influence how the civilian government directs them. That's a non-trivial factor behind three decades of constant war.

3) Latest News New Bill Legalizes Government Propaganda and Disinformation on American Citizens (May 22, 2012)

by the Vigilant Citizen

The next defense authorization bill to be proposed by the American congress contains a not-so-publicized amendment that would legalize the use of propaganda on American citizens. The bill would indeed nullify an existing law that (supposedly) protects U.S. audiences from misinformation campaigns conducted by its own government. In other words, Americans could now be subjected to the hardcore, massively manipulative and disinformation-filled propaganda that is usually reserved for foreign countries such as Iraq. Yes, the American public is the new "enemy" to brainwash and the internet will be an important battlefield.

Readers of this site might ask: "Since when Americans were NOT subjected to propaganda?". That is a true assessment. Most of the articles on this site effectively describe how mass media products are filled with propaganda and disinformation that is communicated to the American public. The new bill would however legalize the process, making it official and out in the open. While propaganda in the United States was always somewhat covert and disguised as something else, the new bill apparently seeks to form an actual Orwellian Ministry of Truth, where propaganda is just part of daily business. If you believe that mass media is full of BS now…there's apparently a lot more of it coming our way soon.

Here's an article on the "propaganda" bill.

Congressmen Seek To Lift Propaganda Ban

Propaganda that was supposed to target foreigners could now be aimed at Americans, reversing a longstanding policy. "Disconcerting and dangerous," says Shank.

An amendment that would legalize the use of propaganda on American audiences is being inserted into the latest defense authorization bill, BuzzFeed has learned.

The amendment would "strike the current ban on domestic dissemination" of propaganda material produced by the State Department and the independent Broadcasting Board of Governors, according to the summary of the law at the House Rules Committee's official website.

The tweak to the bill would essentially neutralize two previous acts—the Smith-Mundt Act of 1948 and Foreign Relations Authorization Act in 1987—that had been passed to protect U.S. audiences from our own government's misinformation campaigns.

The bi-partisan amendment is sponsored by Rep. Mac Thornberry from Texas and Rep. Adam Smith from Washington State.

In a little noticed press release earlier in the week — buried beneath the other high-profile issues in the $642 billion defense bill, including indefinite detention and a prohibition on gay marriage at military installations — Thornberry warned that in the Internet age, the current law "ties the hands of America's diplomatic officials, military, and others by inhibiting our ability to effectively communicate in a credible way."

The bill's supporters say the informational material used overseas to influence foreign audiences is too good to not use at home, and that new techniques are needed to help fight Al-Qaeda, a borderless enemy whose own propaganda reaches Americans online.

Critics of the bill say there are ways to keep America safe without turning the massive information operations apparatus within the federal government against American citizens.

"Clearly there are ways to modernize for the information age without wiping out the distinction between domestic and foreign audiences," says Michael Shank, Vice President at the Institute for Economics and Peace in Washington D.C. "That Reps Adam Smith and Mac Thornberry want to roll back protections put in place by previously-serving Senators – who, in their wisdom, ensured limits to taxpayer–funded propaganda promulgated by the US government – is disconcerting and dangerous."

"I just don't want to see something this significant – whatever the pros and cons – go through without anyone noticing,"
" says one source on the Hill, who is disturbed by the law. According to this source, the law would allow "U.S. propaganda intended to influence foreign audiences to be used on the domestic population."

The new law would give sweeping powers to the government to push television, radio, newspaper, and social media onto the U.S. public. "It removes the protection for Americans," says a Pentagon official who is concerned about the law. "It removes oversight from the people who want to put out this information. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false."

According to this official, "senior public affairs" officers within the Department of Defense want to "get rid" of Smith-Mundt and other restrictions because it prevents information activities designed to prop up unpopular policies—like the wars in Iraq and Afghanistan.

Critics of the bill point out that there was rigorous debate when Smith Mundt passed, and the fact that this is so "under the radar," as the Pentagon official puts it, is troubling.

The Pentagon spends some $4 billion a year to sway public opinion already, and it was recently revealed by USA Today the DoD spent $202 million on information operations in Iraq and Afghanistan last year.

In an apparent retaliation to the USA Today investigation, the two reporters working on the story appear to have been targeted by Pentagon contractors, who created fake Facebook pages and Twitter accounts in an attempt to discredit them.

(In fact, a second amendment to the authorization bill — in reaction to the USA Today report — seeks cuts to the Pentagon's propaganda budget overseas, while this amendment will make it easier for the propaganda to spread at home.)

The evaporation of Smith-Mundt and other provisions to safeguard U.S. citizens against government propaganda campaigns is part of a larger trend within the diplomatic and military establishment.

In December, the Pentagon used software to monitor the Twitter debate over Bradley Manning's pre-trial hearing; another program being developed by the Pentagon would design software to create "sock puppets" on social media outlets; and, last year, General William Caldwell, deployed an information operations team under his command that had been trained in psychological operations to influence visiting American politicians to Kabul.

A U.S. Army whistleblower, Lieutenant Col. Daniel Davis, noted recently in his scathing 84-page unclassified report on Afghanistan that there remains a strong desire within the defense establishment "to enable Public Affairs officers to influence American public opinion when they deem it necessary to "protect a key friendly center of gravity, to wit US national will," he wrote, quoting a well-regarded general.

The defense bill passed the House Friday afternoon.

CORRECTION: The amendment under consideration would not apply to the Department of Defense, though the it is attached to a defense authorization bill.

– Source: Buzzfeed

4) American Intelligence Media, Jan. 18, 2016

False Flags are Legal Propaganda (pdf)

This article originally appeared on State of the Nation as False Flags are Legal Propaganda by the Department of Defense on January 18, 2016.

Why would the government support false flag events?

This question would go through our minds every time we would see a new false flag event plastered all over the media. Like many of you, we would think, "It has to be real, otherwise the government and participants would be engaging in treason." But the narrative and the evidence never seem to match up. How odd that at Sandy Hook and at San Bernardino there were so many responders from federal agencies and that other drills were already happening on the same day just a mile away. Coincidence seemed unlikely for one event. Totally unlikely for two.

It even seemed that the "official story" that was "fed" to the news agencies was filled with holes on purpose. When 450 responders showed up in San Bernardino, including FEMA, ATF, Homeland Security, FBI, DoD, and all local agencies, within 14 minutes and had their lawn chairs and coolers set up while most of them walked around aimlessly with no worries in the world, we couldn't take it anymore. We had always known that "false flags" usually precede severe military action and we couldn't really imagine military action within US domestic borders since the military is not empowered to act against its own citizens.

Therefore, we decided to WAKE UP and study the false flag phenomena. Don't presume to think this is just another conspiracy theory article. What you will read will chill you to the bone. We know this is a long article, but while you were sleeping much has been done to destroy your country. You need to see the immense work that is being done behind your back to destroy your beloved country. And, most important, when you get to the end of the article, we have a CITIZEN CALL TO ACTION.

We beseech you, our fellow Americans, to read this article and pass it along to others. Unplug your electronic tethers and read this very important article. If not for you, then the children and loved ones in your life who will live like slaves in this hellish New World Order that is already here. Our patriotic duty was to do the research; yours is to read and distribute to other patriots.

Like many of you, we believe that 9-11 was a false flag event. We don't know exactly who, what, why and how, but we know that when overwhelming circumstantial evidence points in the opposite direction of the official story, something is wrong. So when the Sandy Hook and San Bernardino events unfolded, we became very uneasy as these events seemed to be new type of false flag. In both events, the president was demanding that Americans give up their guns and constitutional rights even before the fake pools of blood on steps of the Sandy Hook school dried.

Actually, the pools of blood on the sidewalk at Sandy Hook were the first indicator of fraud: two uncoagulated pools of liquid blood without a trail of blood, without any victims ever coming out of the building to "make" the pools, and authorities ignoring them and not even treating them as part of a crime scene. Every picture we saw or video we listened to was completely fake and looked more like a drill. Nothing added up. In San Bernardino there were ten different "black SUV" pictures released that are completely contradictory. An alarm kept going off in our heads saying, "Why are they purposely releasing contrary evidence as though they didn't care that the evidence made them complicit with a crime, or even treason?"

We started studying the evidence. We were beyond the basic evidence—that crisis actors were used to stage both events and multiple government agencies showed up within minutes. But one thing that totally took us by surprise is that San Bernardino was the site of the largest Jade Helm 2015 military maneuvers. We asked ourselves, "Why would so many people, including so many U.S. government agencies, be involved in deceiving Americans?" It took courage to look beyond the first veil of illusion.

If you have followed Sandy Hook and San Bernardino you realize that no one (except the patsies) are killed. No one dies; therefore, no crime has been committed. This knowledge gave us some comfort, but raised many questions concerning false flag events in America.

What is the goal of the recent (since 2012) false flag events?

Who gains from the appearance of insidious criminal events?

What mechanisms are used to silence so many participants, i.e. paid crisis actors, government agencies?

How do these agencies "get away with" using creating lies, distortions, and false flags? Wouldn't that be called propaganda?

After pondering these questions relentlessly, we lifted another veil of illusion. We asked, "What if these activities to manipulate public opinion were legal? Could there be a law that protects the president and US agencies (local, state, and federal) from conducting false flag event? So we changed our focus and began to research false flags as being legal propaganda. We found the answers in clear sight. We were beyond disbelief when we discovered that the US Congress has passed laws, post 9-11, that makes state-sponsored propaganda legal. Take a moment and think about that before reading on.

Our research lead us to discover the tenets of the National Defense Authorization Act of 2012 which makes it legal to propagate and broadcast propaganda within America. We are all being treated like enemy combatants whose "perception" must be managed to come in line with presidential "national security" policies. The Department of Defense may now broadcast propaganda with the approval and authority of the Broadcasting Board of Governors (BBG) both internationally and domestically. Just Google it folks. There is actually an agency with this name.

Perception Management

Any presidential policy may be accompanied by broadcasts that use subliminal programming as part of perception management. These mechanisms that squelch descent have been used since the Reagan administration to shape public opinion to support administrative policies. Wars require domestic support and these "black ops" programs started to use the "psy-ops" tools of the military. DARPA, the research and development arm of the military, has created many tools to control the enemy through media that shapes public perception, which we will elucidate later in this article. It is called perception management and has been used legally in advertising since the late seventies and also in electronic warfare throughout the world to "brain-wash" our enemies and shape their perception and opinion of America.

The only question left was the issue of what the goal of the president (or the real powers behind him—the Council on Foreign Relations) might be, besides the obvious one of having few people who disagree with his policies. We then studied the United Nations Small Arms Treaty which Obama signed in 2011, but couldn't get Congress to ratify. In this treaty we found the goal Obama is driving towards — disarm America, with the help of the United Nations. But two things have to happen: 1) we have to give up our guns or have them taken from us and 2) the UN has to have a military presence in our country. Keep in mind that the United Nations cannot have a military presence in our country, unless invited.

Have you already started connecting the dots? Remember seeing all of the images of all that UN military equipment that was distributed throughout America during Jade Helm 2015? It seemed that besides the San Bernardino exercises, moving UN heavy military equipment throughout America was the only thing that we noticed happening during Jade Helm 2015. Another veil lifted. Obama's job was to go for a gun grab, either by Congressional action or UN treaty. But patriots started waking up and our elected officials in Congress could not ratify the United Nations Small Arms Treaty. So Obama and his political minions began to manufacture false flags, hoping that our horror of Sandy Hook and San Bernardino would cause us to lay down our rights and guns.

Keep in mind, that false flag incidents and state-sponsored propaganda could not be considered treasonous acts against Americans as Congress (through the NDAA) had made treason–legal.

Congress Does Not Ratify Gun-Taking Treaty

Congress would not, and has not, ratified the UN Small Arms Treaty, nor would they vote on Second Amendment restrictions. So false flags were used to create conscious and "unconscious" support of a national gun grab. Sandy Hook was the most heinous "example" of what "guns do." Incredible anti-gun sentiment was created by Sandy Hook and people still reel from it with anger and hatred for "people on drugs" and "gun lovers." San Bernardino happened right before the congressional vote on gun control. And even with images of San Bernardino a day before the congressional vote on gun control, Obama lost his attempt for gun restrictions.

Now do you see why he has taken things into his own hands and signed into effect 23 Executive Orders that move his gun control policies forward in contradistinction to the fact that Congress rejected such ideas? The motive became quite clear once you read the UN Treaty – to dismantle the Second Amendment and disarm America. Since Obama couldn't use the United Nations or Congress to get his way, he just wrote his own laws and pretends like Executive Orders outrank congressional law. Obama is behind the UN timeline of disarmament, since the other nations who signed the treaty have already begun to disarm its citizens.

Controlling the Human Domain

Once we understood the goal and the legalization of propaganda, with its insidious DARPA electronic war devices, the rest fell into place as one Internet search after the next revealed a the truth before our eyes. This is shocking and almost inconceivable. But it is law (NDAA) and Congress did not stop this law from being passed.

Another questions is why our elected official not call out the president in using subliminal programming, psy-ops perception management and war-like marketing strategies to shape public opinion? Simple. They use it themselves in their own campaigns. Subliminal programming is openly used in the broadcasting industry – that's why people believe untruths from the news and watch mindless TV while drinking their cola beverage (It's the Real Thing) and imagining that the official story on main stream media is the only story.

As Jade Helm 2015 taught us, the military is interested in Controlling the Human Domain, the very motto of their operation emblazoned on their logo. Fellow patriots, we are in a war which is coming from all sides towards the middle. We cannot trust authorities and politicians to have our best interest at heart. We need to wake up and observe more carefully and ask more questions even when a nagging voice in the back of our minds says, "It is the official story, I should not question it," or "I should trust my elected officials to come forward and blow a whistle if such heinous propaganda was being perpetrated upon unsuspecting Americans." Better yet, perhaps we need to know how we are being controlled! So before we lose you in our web of deception and lies, remember that Jade Helm is telling us that the goal is to control the human domain.

First we need to drill down on some of the basic terms and strategies before we bring the full picture into view. Stay with us and keep reading, fellow patriots.

The Deceptive Art of Perception Management

Throughout human history, governments have been interested in "mastering the human domain." The mind control of their populations, what we once called propaganda, is now called perception management, political diplomacy and other such deceptive names. This theme is echoed in the slogan for Jade Helm, "Mastering the human domain."

The National Defense Authorization Act of 2012, which was just updated for 2016, provides that the Department of Defense, through the Broadcasting Board of Governors, controls all broadcasting both international and domestic. Therefore, Obama is acting legally carrying out "false flag" events inside the US borders. Obama is not a traitor for this activity; he is a lawyer who made it legal to be a traitor. Obama is not only at war with Syria, Libya, Iraq, Somalia and Yemen; he is also at war with Americans who don't support his policies.

Obama has made a commitment to disarm Americans called the United Nation's Small Arms Treaty. This treaty is consistent with his efforts to dismantle the Second Amendment. It is this motivation that seems to have driven his non-stop agenda for disarming America and empowering the executive branch of the government, i.e., his own agenda of bombing sovereign nations and bringing America under the control of the United Nations and his administration. This, coupled with his continued efforts to broaden his powers through the NDAA, Executive Orders, and Presidential Policy Directives creates a clear picture of manipulating public sentiment with the force of a military war on his American opponents.
United Nations Small Arms Treaty

In 2011 Obama signed the United Nations Small Arms Treaty and since then there have been 108 mass shootings in America in less than a 4 year period. In the four years before Obama was elected (2003-2007) there was a total of 27 mass shootings. Prior to 2003 there was an average of 2.5 mass shootings per year. In 2015 alone, there have been over 58. That is over 20 times higher than it was before. (MSA Data, 2015)

The Small Arms Guns Treaty has been passed by the UN and is ready to go into effect across the world. The treaty passed in the general assembly in April 2013. The treaty, which seeks to prevent and control the illicit trade of weapons while regulating the international trade of them, includes measures such as creating a national gun registry; mandating control of firearms and ammunition; regulating the manufacture of gun parts; and limiting stores' ability to sell firearms. The NRA and a bipartisan majority of pro-gun Senators have succeeded in blocking this treaty's ratification in the United States. This treaty violates the Second Amendment. For any UN treaty to have any effect on American laws, it must first be ratified by a two-thirds majority of the Senate.

NDAA Provides for Legal Propaganda

Through the 2012 National Defense Authorization Act the US government has the legal regulation to use propaganda against foreign audiences and American citizens. The intention is to sway public opinion by using television, radio, newspapers, and social media targeting American and foreign targets in controlled psy-ops or perception management.

The NDAA has an amendment added that negates the Smith-Mundt Act of 1948 (SMA) and the Foreign Relations Authorization Act of 1987. These laws made propaganda used to influence foreigners and US citizens illegal. The Broadcasting Board of Governors is not new as it was created from SMA; although today it is quite a different agency as you will read. Originally, this agency claimed to "inform, engage, and connect people around the world in support of freedom and democracy.
Amendment 114 of the NDAA was approved by the House in May of 2012.

The Smith-Mundt Modernization Act (2012) reads:

Sec. 501. (a) The Secretary and the Broadcasting Board of Governors are authorized to use funds appropriated or otherwise made available for public diplomacy information programs to provide for the preparation, dissemination, and use of information intended for foreign audiences abroad about the United States, its people, and its policies, through press, publications, radio, motion pictures, the Internet, and other information media, including social media, and through information centers, instructors, and other direct or indirect means of communication.

(b)(1) Except as provided in paragraph (2), the Secretary and the Broadcasting Board of Governors may, upon request and reimbursement of the reasonable costs incurred in fulfilling such a request, make available, in the United States, motion pictures, films, video, audio, and other materials prepared for dissemination abroad or disseminated abroad.

According to Michael Hastings: "The new law would give sweeping powers to the State Department and Pentagon to push television, radio, newspaper, and social media onto the U.S. public."

"It removes the protection for Americans," says a Pentagon official who is concerned about the law. "It removes oversight from the people who want to put out this information. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false."

Representatives Mac Thornberry (R-TX) and Adam Smith (D-WA) in the Smith-Mundt Modernization Act (2012) (H.R. 5736), advocate that it is time to liberate the authority of the US government to broadcast American produced foreign propaganda in the U.S.

The amendment empowers the State Department and Pentagon to utilize all forms of media against the American public for the sake of coercing US citizens to believe whatever version of the truth the US government wants them to believe. All oversight is removed with Amendment 114. Regardless of whether the information disseminated is truthful, partially truthful or completely false bears no weight.

Four billion dollars per year is spent by the Pentagon on propaganda aimed at the American public; as well as $202 million spent by the Department of Defense on misinformation operations in Iraq and Afghanistan in 2011. The Pentagon is using fake handles on social media sites to purvey false information, harass users and enact perception management to influence Americans. Sophisticated software allows military to engage in online conversations with coordinated answers, blog comments and instant messaging remarks that are solely meant to spread pro-American propaganda.

This new perception management is called Information Operations (IO), which is defined as "the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own."

Repealing the Smith-Mundt Act allows the direct deployment of these tactics on the American public.

Information Operations activities are undertaken to shape the essential narrative of a conflict or situation and thus affect the attitudes and behaviors of the targeted audience and equates descriptions of combat operations with standard marketing strategies. With the NDAA 2012 in its current form, the State Department and Pentagon can go beyond manipulating mainstream media outlets and directly disseminate campaigns of misinformation to the U.S. public. Successful wars require domestic acceptance.

The NDAA 2012 – specifically Section 1021(b)(2) – has already institutionalized the U.S. military's ability to indefinitely detain, without charge or trial, citizens and non-citizens alike. Major parts of the legislation are based on the assumption that key legal protections for individuals are incompatible with the requirements of national security.

The purpose of the Smith-Mundt Modernization Act of 2012 is "to authorize the domestic dissemination of information and material about the United States intended primarily for foreign audiences." The act was added to the 2013 NDAA bill as section of 1078 to amend certain passages of Smith-Mundt Act of 1948 and Foreign Relations Authorization Act of 1987. The Smith-Mundt Modernization Act of 2012 passed Congress as part of the NDAA 2013 on December 28, 2012. Amendments made to the Smith-Mundt Act of 1948 and Foreign Relations Authorization Act of 1987 allow for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within US borders.

National Defense Resources Preparedness Order

In 2012 Obama signed an order called National Defense Resources Preparedness giving himself explicit control over the nation and declaring a permanent state of Martial Law in the U.S. The very same year, Obama signed the National Defense Authorization Act (NDAA) which gave the U.S. Government the right to detain anyone for anything indefinitely. He has renewed that order every year since then. The Obama administration was even able to get a court ruling overturned after the ruling had successfully removed the Indefinite Detention provision from the NDAA.

Virginia Wakes Up

A bill introduced in the Virginia assembly (HB2144) would take the next step in stopping illegal federal kidnapping under the 2012 NDAA. Virginia stood alone and passed the first bill in the country addressing detention provisions written into the NDAA in 2012. That law forbids state agencies, in some situations, from cooperating with any federal attempts to exercise the indefinite detention provisions written into sections 1021 and 1022 of the National Defense Authorization Act.

What Did They Say about NDAA?

"NDAA, and SOPA would put us on a par with the most oppressive nations in the world." Sergey Brin, Google co-founder

"I never thought I would have to write this: but – incredibly – Congress has now passed the National Defense Appropriations Act, with Amendment 1031, which allows for the military detention of American citizens." Naomi Wolf, author

"…bold and dangerous attempt to establish martial law in America." Presidential candidate Rand Paul

"…was carefully crafted to mislead the public." Justin Amash, U. S. Representative

"Provisions that were snuck into the bill with little notice from mainstream media could spell indefinite detention without a hearing, keep Guantanamo open, and hinder fair trials." Amnesty International

"Myth #3: U.S. citizens are exempted from this new bill: This is simply false, at least when expressed so definitively and without caveats. The bill is purposely muddled on this issue which is what is enabling the falsehood." Glenn Greenwald, constitutional lawyer

"What the American People are witnessing now with this new legislation is the further development of an American Police State into a Military Dictatorship, a process that was started by the so-called USA Patriot Act in 2001." "If it is enacted into law, America will lose all pretense of having our Military subjected to the control of democratically elected civilian leaders as originally envisioned and required by the Constitution. Professor Francis Boyle, constitutional law authority at the University of Illinois, Champaign.

NDAA Versions Continue to Erode Bill of Rights and Constitution

NDAA 2013

The 2013 version of the NDAA allows the State Department and Defense Department to direct the same kind of massive propaganda campaigns here in the U.S. that are presently waged as part of American war efforts in foreign lands. The US government propaganda is directed at the American people with the belief that successful wars require domestic acceptance.

The 2013 NDAA overturned a 64-year ban on the domestic dissemination of propaganda which is described as public diplomacy information. It preaches freedom of the press abroad while practicing censorship at home. The resources and personnel who focus on talking about America overseas are diverted in favor of domestic perception management. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false.

NDAA 2014

NDAA 2014 underwrote $662 billion for continued US aggression in our many foreign wars while, on the domestic front, it violates the Bill of Rights. According to the American Civil Liberties Union, it authorizes presidents "to order the military to pick up and imprison people, including U.S. citizens, without charging them or putting them on trial."

The ACLU charges the provisions of NDAA "were negotiated by a small group of members of Congress, in secret, and without proper congressional review (and), are inconsistent with fundamental American values embodied in the Constitution….(our) fundamental freedoms are on the line."

We had already had many of the provisions of the Bill of Rights supplanted by the Patriot Act. President Carter has denounced the Patriot Act for authorizing federal agents "to search people's homes and businesses secretly, to confiscate property without any deadline or without giving notice that the intrusion had taken place, and to collect without notice personal information on American citizens including their medical histories, books checked out of libraries, and goods they purchase."

NDAA 2016

The National Defense Authorization Act for 2016 is costing Americans $612 billion. Obama skirts around the Constitution by having the National Defense Authorization Act (NDAA), Sections 1021 and 1022, which authorizes indefinite military detention, without charge or without trial, any person, including an American citizen, and applies the "Laws of War," to U.S. soil, making the United States legally a battlefield.

Obama claims he will develop "An Appropriate Legal Regime" to permanently detain people prior to having committed any crime. The idea of these detentions would be to prevent any individual from committing a possible future crime. Obama says that he might detain someone up to ten years before they might commit a crime. The NDAA removes all of the rights guaranteed under the Bill of Rights except the 2nd Amendment, and you know how hard Obama is trying to get rid of that also.
Obama's Executive Orders

President Obama has been using executive orders (EO's) in ways they have never been used before. He is using them to do end-runs around Congress by legislating from the White House. Some EO's are dormant but pose a potential future threat. One of those is EO 13603 which was signed EO 13603 on March 16, 2012. The purpose is to delegate authority and address "National Defense" resource policies and programs under the Defense Production Act of 1950. It provides the framework and authority for the allocation or appropriation of resources, materials and services to promote "National Defense." It is an update of a prior EO's on the National Defense Resources Preparedness. One difference which is concerning is that the definition "national emergency" is now broader and quite vague.

Executive Order 13603 – National Defense Resources Preparedness allows the government to completely control our lives through the "industrial and technological base," should the president declare a "national emergency." It gives Obama the power over "all commodities and products capable of being ingested by human beings and animals; all forms of energy; all forms of civil transportation; all usable water from all sources; health resources; forces labor such as military conscription; and federal officials can issue regulations to prioritize and allocate resources."

Presidential Policy Directives

In the Barack Obama Administration, the directives that are used to promulgate Presidential decisions on "National Security" matters are designated Presidential Policy Directives (PPDs). Directives that are used to initiate policy review procedures are called Presidential Study Directives (PSDs). In May 2013, the Administration issued a previously unknown category of directive known as a Presidential Policy Guidance (PPG).

Presidential Policy Directives have the same legal force as an Executive Order, forming a body of largely secret law. Executive Orders are public and must be published in the Federal Register whereas PPDs are not. It is a secret law.

President Obama's directive on hostage policy was originally released as Presidential Policy Directive numbered PPD-29. When the White House corrected that number to PPD-30, it meant Obama had issued a secret directive as PPD-29. Of the 30 PPDs issued by Obama, 19 have not been released. And for 11 of those, the White House has not disclosed even the subject of the order. Not even Congress has a copy. It's a domain of unchecked presidential authority.

Alarming Trends in the Military

Since Obama took office, an unprecedented number of top military leaders have been removed from their posts – nearly 200 generals, flag officers and other high-ranking officials. They are being "removed" at a rate of about one per week. In 2013, an ex-Navy Seal came forward and warned that Obama is firing soldiers who say they would not fire upon US Citizens if ordered.

Recently, the Department of Homeland Security was caught buying 1.6 billion rounds of ammunition, enough to have sustained our war in Iraq for twenty years. Earlier this year, the DHS purchased another 62 million rounds of AR-15 hollow point ammo claiming it was allocated for "target practice."

The military wants to transform Information Operations into a core military competency on a par with air, ground, maritime and special operations including: the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.

IO intends to shape the essential narrative of a conflict or situation and thus affect the attitudes and behaviors of the targeted audience and equates combat operations with standard marketing strategies.
History of American Internal Propaganda and the BBG

In January 1983, President Reagan took the first formal step to create an unprecedented peacetime propaganda bureaucracy by signing National Security Decision Directive 77, entitled "Management of Public Diplomacy Relative to National Security." Reagan deemed it "necessary to strengthen the organization, planning and coordination of the various aspects of public diplomacy of the United States Government." Reagan ordered the creation of a special planning group within the National Security Council to direct these "public diplomacy" campaigns. This group was run through the Department of Defense.

The DoD's Broadcasting Board of Governors traces its beginnings to the early Cold War years, as a covert propaganda project of the newly-created Central Intelligence Agency to wage "psychological warfare" against Communist regimes and others deemed a threat to US interests. In 1948, National Security Council Directive 10/2 officially authorized the CIA to engage in "covert operations" against the Communist Menace. Clause 5 of the directive defined "covert operations" as "propaganda, economic warfare; preventive direct action, including sabotage, anti-sabotage, demolition and evacuation measures; subversion against hostile states, including assistance to underground resistance movements, guerrillas and refugee liberation groups, and support of indigenous anti-communist elements in threatened countries of the free world." Propaganda quickly became one of the key weapons in the CIA's covert operations arsenal. The agency established and funded radio stations, newspapers, magazines, historical societies, research institutes, and cultural programs all over Europe.

The BBG was officially formed in 1999 and ran on a $721 million dollar annual budget. It reports directly to the Secretary of State and operates a host of Cold War-era CIA spinoffs and "psychological warfare" projects: Radio Free Europe, Radio Free Asia, Radio Martí, Voice of America, Radio Liberation from Bolshevism and a dozen other government-funded radio stations and media outlets pumping out pro-American propaganda across the globe.

The BBG is managed by a military think-tank and is no longer funded by the CIA's black budget. Its role in "psychological warfare" continues but its operations are openly funded. The BBG and its subsidiaries still engage in propaganda warfare, subversion and soft-power projection against anyone deemed hostile to US interests and "National Security." And it is still deeply intertwined with the same military and CIA-connected intelligence organizations. The Broadcasting Board of Governors runs a propaganda network that blankets the globe.

The BBG is also involved in the technology of post-Cold War, Internet-era propaganda. It has bankrolled satellite Internet access in Iran and continues to fund an SMS-based social network in Cuba called Piramideo.

As the BBG outlined in a 2013 fact sheet for its "Internet Anti-Censorship" unit: "The BBG collaborates with other Internet freedom projects and organizations, including RFA's Open Technology Fund, the State Department, USAID, and DARPAs SAFER Warfighter Communications Program. IAC is also reaching out to other groups interested in Internet freedom such as Google, Freedom House and the National Endowment for Democracy's Center for International Media Assistance."

Today, the Congressionally-funded federal agency is also one of the biggest backers of grassroots and open-source Internet privacy technology. These investments started in 2012, when the BBG launched the "Open Technology Fund" (OTF). The BBG endowed Radio Free Asia's Open Technology Fund with a multimillion dollar budget and a single task: "to fulfill the US Congressional global mandate for Internet freedom."

The Open Technology Fund supports many new encryption programs like: CryptoCat, Tor, Open Whisper Systems, LEAP, GlobaLeaks, ChatSecure, and Orbot. In 2014, Congress increased the BBG's "Internet freedom" budget to $25 million. In 2014, OTF launched a coordinated project with Dropbox and Google to make free, easy-to-use privacy tools, and Facebook announced it was incorporating the underlying encryption technology of one of OTF's flagship projects – OpenWhisper Systems – into its WhatsApp text messaging service.

It should seem suspicious that DoD's money would be so warmly welcomed by some of the Internet's fiercest anti-government activists. Why is a federally-funded CIA spinoff with decades of experience in "psychological warfare" suddenly blowing tens of millions in government funds on privacy tools meant to protect people from being surveilled by another arm of the very same government? It is called: "Perception Management."
Perception Management Is Being Used Against You

Perception management is a term originated by the US Department of Defense. It defines it as: "Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning as well as to intelligence systems and leaders at all to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator's objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations."

The factors that influence the targeted audience consist of the following:

Ambiguity: If ambiguity increases, the perceiver may find it harder to form an accurate perception.

Social status: a person's real or perceived position in society or in an organization.

Impression management: an attempt to control the perceptions or impressions of others.

The phrase "perception management" has often functioned as a euphemism for "an aspect of information warfare." The distinction between "perception management" and public diplomacy, which "does not, as a rule, involve falsehood and deception, whereas these are important ingredients of perception management; the purpose is to get the other side to believe what one wishes it to believe, whatever the truth may be."

Although perception management operations are typically carried out within the international arena between governments, and between governments and citizens, use of perception management techniques have become part of mainstream information management systems. Businesses may even contract with other businesses to conduct perception management for them, or they may conduct it in-house with their public relations staff.

The term "perception management" is not new to the lexicon of government language. For years the FBI has listed foreign perception management as one of eight "key issue threats" to "National Security", including it with terrorism, attacks on critical US infrastructure, and weapons proliferation among others. The FBI clearly recognizes perception management as a threat when it is directed at the US by foreign governments. Deception and sleight of hand are important in gaining advantages in war, both to gain domestic support of the operations and for the military against the enemy

In late 2001, after 9/11, Defense Secretary Donald H. Rumsfeld created the Pentagon's Office of Strategic Influence (OSI). The Office of Special Plans was created with a goal of selective intelligence vetting outside the normal chartered intelligence apparatus, with foreign propaganda activities moved to the Office of Information Activities under the direction of the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict. Strategic influence, special plans, psychological operations (psy-ops), and perception management are all direct synonyms within the DoD.

The DoD has identified the information domain as its new "asymmetric flank." The level of use of perception management is continuing to grow throughout the military. There are now specialists, known as psychological operations officers and civil affairs officers, whose only purpose is to decide how to present information/propaganda to the media and to the people of the current country.

False Flag (Perception Management) Characteristics

Let's compare what Wikipedia tells us are the "12 basic strategies of perception management" with what might be its counterpart in "characteristics of a false flag event."

Ambiguity: if ambiguity increases, the perceiver finds it harder to form an accurate perception.

Counterpart: Eyewitnesses have conflicting accounts.

Social status: targeting a person's position in society or in an organization

Counterpart: The official narrative has obvious domestic and geopolitical advantages for the governing body.

Impression management: the perceptions or impressions of others

Counterpart: The narrative behind the attack serves to leverage emotions like fear, as well as patriotism, in order to manufacture consent around a previously controversial issue.

Preparation – having clear goals and knowing the ideal position you want people to hold.

Counterpart: Military and law enforcement training drills occur on the same day very close by causing confusion to obscure eye witness testimony and allow orchestrators to plant both patsies, disinformation and backup operatives. Immediate calls for gun control or restricting civil liberties.

5. Credibility – all information uses prejudices or expectations to increase credibility.

Counterpart: News agencies keep saying that they are "being given reports" or "being told" and do not cite who reported or told them the unconfirmed information they broadcast as real.

6. Multi-channel support – have multiple arguments and fabricated facts to reinforce your information.

Counterpart: No obvious motive for the mass attack and no prior indicators. Shooter leaves manifesto or lots of evidence "proving" they were "radicalized" or "on drugs" or other were other undesirables.

7. Centralized control – employ entities to promote propaganda.
Counterpart: Fake "victims" and crisis actors.

Security – the nature of the deception campaign is known by few.

Counterpart: All drill participants and crisis actors sign Non-disclosure Agreements with "National Security" clause promising swift and severe punishment if broken. Everyone involved is on a "need to know" basis and kept in the dark about the overall intent of the event.

Flexibility – the deception campaign adapts and changes over time as needs change.

Counterpart: Evidence gets destroyed or tampered with and the details don't matter because the culprits are dead. No more interest in an investigation.

Coordination – organize in a hierarchy to maintain consistent distribution of information.

Counterpart: The federal agencies trump the local law enforcement agencies due to the "National Security" element of the drill which is ultimately controlled by the Department of Defense.

Concealment – contradicting information is destroyed.

Counterpart: Culprit is dead and evidence disappears from news reports, Internet, and media. Patsy has no military training, yet shoots extremely fast and accurately but no authority looks at the evidence.

Untruthful statements – fabricate the truth.

Counterpart: Families of "victims" have acting backgrounds and receive payoffs in GoFundMe accounts and direct payoffs, especially mortgages. They often show little to no emotion, and even smile or laugh. The lie perpetuates and the "official story" is shaped by the media into truth.
Narrative Networks

In 2015, DARPA's "Narrative Networks" (or N2) program is producing results. The project is intended to analyze how "narratives" play into human psychology, delving into the way these constructs affect the mind. A narrative is a way of phrasing something, a choice of words that is likely a biased strategy to frame information.

"Narratives exert a powerful influence on human thoughts, emotions and behavior and can be particularly important in security contexts. Conflict resolution and counterterrorism scenarios and detecting the neural response underlying empathy induced by stories is of critical importance." From DARPA researchers in a paper published in the Journal of Neuroscience Methods.

Mastery of "narratives" could potentially be used to manipulate the perception of a population using platforms of communication like television to subtly and potently make a person think a certain way.

"Governments often use stories to present information, so understanding how we comprehend them is important," said co-author Eric Schumacher, an associate professor of psychology at the Georgia Institute of Technology.

Researchers observed a phenomenon of "tunnel vision," or impaired reasoning, triggered in the brain when viewers processed a suspenseful moment. When suspense grew, brain activity in the viewers' peripheral vision decreased.

The US Military has a long history of funding psychological experiments, some entrenched in human rights violations. Now we have the Pentagon-funded DARPA program which pays researchers at colleges and other scientists millions of dollars to enhance and bolster methods of war. Such work places great technological power in the hands of the Department of Defense.
DARPA's Narrative Networks as Mind-Control

DARPA launched the Narrative Networks program to understand how narratives influence human cognition and behavior, and apply those findings in international security contexts. Narratives may consolidate memory, shape emotions, cue heuristics and biases in judgment, and influence group distinctions.

The Narrative Networks Program has three parallel tracks of research and development:

Develop quantitative analytic tools to study narratives and their effects on human behavior in security contexts;

Analyze the neurobiological impact of narratives on hormones and neurotransmitters, reward processing, and emotion-cognition interaction; and

Develop models and simulations of narrative influence in social and environmental contexts, develop sensors to determine their impact on individuals and groups, and suggest doctrinal modifications.

DARPA is studying Narrative Comprehension and Persuasion in a study entitled: Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and Its Persuasive Effects. The DARPA-funded research project ($6.1 million) is studying the effectiveness of different narratives in efforts of mass persuasion. Using MRI and EEG they will map areas of the brain involved in narrative comprehension and even attempt to enhance or disrupt narrative understanding using this information as well as Transcranial Magnetic Stimulation. It will study the neurobiology of narrative comprehension, validate narrative theories and explore the connection between narrative and persuasion. This groundbreaking research study will employ multi-modal neuro-imaging, combining the temporal resolution of EEG with the spatial resolution of MRI.

This project will provide empirical evidence integrating brain regions and cognitive processes into a neural network of narrative comprehension. By virtue of the experimental design, these relationships will also directly inform the primary aspects of narrative and strategic communication under examination: narrative validity, narrative transportation, and vertical integration. The empirical correlation of narrative theory to neurocognitive activity is an important advance in the understanding of narrative and how the brain governs narrative comprehension.

The programs goals include:

– Integrate narrative theory, neuroimaging, and persuasive outcomes.
– Resolve conceptual problems in narrative and psychology of religion.
– Produce significant innovations in the study of the neuropsychology of narrative.
– Generate practical innovations.
– Tests key narrative theories from communication, literary studies, and psychology.
– Uses stimuli based on religious master narratives.
– Understand the psychological effects of particular message features.
– Attend to the relationship between narrative and political violence in contested populations.
– Disrupt or enhance aspects of narrative structure, and/or brain functioning, to minimize or maximize persuasive effects on subject proclivity to engage in political violence.
– Mapping the Narrative Comprehension Network will provide empirical leverage for developing models of narrative comprehension that are biologically plausible. Moreover, the current research will establish how narrative elicits persuasion in the brain.
– Predicting a particular narrative message influence on an audience.
– Introducing new stories into the narrative system to disrupt its coherence.

Rational logic aspires to be objective, repeatable, consistent and impersonal, whereas narrative logic works on completely different principles. It is rooted in the simultaneously cognitive and emotional processing of information that marks human behavior, and finds its validity in principles of coherence and fidelity. These qualities help explain the seemingly irrational persuasive power of narrative and provide guidance for how to manipulate narrative stimuli in order to accurately map the Narrative Comprehension Network in the brain.

Culture provides schema, or templates, for ordering narrative data (top-down); individuals process incoming story data and organize it with a selected schema. The process continues until comprehension is achieved, or lack of comprehension mandates implementation of a new schema. A master narrative can be seen as an exemplar narrative schema. Because master narratives embody specific cultural values, they can be strategically deployed as an explanatory frame for current events in order to encourage a particular interpretation and for persuasive purposes. Master narratives execute ideological functions, positioning these cultural values as naturalized and universal.

Vertical integration is achieved when personal, local and master narratives all line up consistently. This congruence formulates a powerful model for identity formation and persuasion. Cognitive processes that are indicated by vertical integration to be part of the Narrative Comprehension Network include: self-recognition, identity, and theory of mind (to see oneself in a story), pattern recognition (to see parallels between master narratives and contemporary situations), and memory (to remember the master narrative elements).

Subliminal Mind Control – SSS

The "Sound of Silence" is a military-intelligence code-word for certain psychotronic weapons of mass mind-control tested in the mid-1950s, perfected during the 70s, and used extensively by the US military in the early 90s. This weapon is based on subliminal carrier technology, or the Silent Sound Spread Spectrum (SSSS). It was developed for military use by Dr. Oliver Lowery of Norcross, Georgia, and is described in US Patent #5,159,703 – "Silent Subliminal Presentation System" for commercial use in 1992.

The patent abstract reads:

"A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum, are amplitude- or frequency-modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener."

The Sound of Silence Spread Spectrum broadcasting equipment allows for the implantation of thoughts, emotions, and even prescribed physical actions into human beings. In the private sector SSSS goes by the name Silent Subliminal Presentation System and the technology has also been released to certain corporate vendors who have attached brand names like BrainSpeak and Silent Subliminals to their own SSSS-based products.

It is a technology that uses subliminal programming that is carried over Ultra-High Frequency (UHF) broadcast waves, planting inaudible messages directly into the subconscious human mind. Perfected more than twenty years ago by the DoD and battlefield-tested upon Iraqi soldiers in the Gulf War during 1991, SSSS is a proven weapon.

The US Government has plans to extend the range of this technology to envelop all peoples, all countries through BBG broadcasts. SSSS is completely undetectable by those being targeted and it delivers its subliminal programming directly to the human brain via the auditory sense at frequencies that humans are incapable of perceiving as sound, there is no defense against it. Coupled with the use of supercomputers, an individual's unique electroencephalographic (EEG) patterns can be digitally altered and then stored for rebroadcast via digital UHF. Computer-enhanced EEGs can identify and isolate the brain's low-amplitude emotion signature clusters, synthesize them and they can then be broadcast over TV and radio signals directly into the brain where they can then silently trigger the same basic emotion in another human being.

DARPA and Social Media

The SMISC program has invested millions of dollars investigating social media, social networks, and how information spreads across them. One study, funded by the Air Force Research Laboratory (AFRL), entitled "Containment Control for a Social Network with State-Dependent Connectivity" demonstrates that the mathematical principles used to control groups of autonomous robots can be applied to social networks in order to control human behavior. If properly calibrated, the mathematical models developed by Dixon and his fellow researchers could be used to sway the opinion of social networks toward a desired set of behaviors. It is called soft Info-warfare.

DARPA launched its SMISC program in 2011 to examine ways social networks could be used for propaganda and what broadly falls under the title of Military Information Support Operations (MISO), formerly known as Psychological Operations – psy-ops. The SMISC program includes studies that analyze Twitter, investigate the spread of Internet memes; automatically identifying deceptive content in social media with linguistic cues; and modeling user attitude toward controversial topics in online social media. It models how collaboration between "key influencers" in social networks could affect the behavior of groups within the network by using the principle of "containment control."

British intelligence agency GCHQ has developed tools specifically aimed at leveraging social media for "effects" operations. The organization has shared its methods with the NSA, and these capabilities have been used in Afghanistan and elsewhere to "shape" information available to members of targeted organizations online and via mobile phones.

The Department of Defense already uses some social media manipulation techniques as part of its "information support" operations, targeting message boards and websites associated with foreign groups that are considered "extremist." In April, the Associated Press uncovered an effort by the US Agency for International Development (USAID) in 2009 to create ZunZuneo, a Twitter-like mobile social network aimed at undermining the Communist regime in Cuba. The research that DoD is financing has much broader cultural implications than as a tool of information warfare against adversaries abroad.

Psy-Ops and DARPA

DARPA's new ultrasonic neural interface devices can frame information as narratives which shape, explain, and make sense of data. Cognitive computers themselves can also do this – creating news articles from pooled data with no human being involved. What used to be called propaganda is now called "strategic communications" that tell a stories or create narrative networks. DARPA is focused on creating counter-narratives, or stories they believe will counteract the effects of radicalization.

The Ultrasonic Neural Interface Program is used to affect changes in a person's beliefs, their sense of identity, and even memory, partly because they stimulate the release of brain chemicals. Neural interfaces and narrative networks can manipulate the brain using electrical and/or magnetic energy. The most common is Transcranial Magnetic Stimulation (TMS). When targeted at a specific area in the brain, TMS can create a variety of effects, including emotional changes and bodily movement. Its goals were to: (i) map out the precise areas of the brain that are affected by stories; (ii) analyze how people respond to specific stories; and (iii) test ways of changing their response to a story, i.e. by altering the story format, and/or zapping their brains with TMS. This technique is more properly referred to as neuromodulation, and involves stimulating the release of neurotransmitters by targeting specific areas of the brain with electromagnetic pulses.

DARPA's research has found that stories affect our emotions, our cultural and religious beliefs, and even memory. In other words, the narratives we hear (on TV, in the news, blogs, tweets, etc) affect important brain chemicals, and therefore our very identities. So do pulsed electromagnetic fields – such as TMS.

DARPA is clearly aware of the vast range of possible applications for these devices, and have also been funding a new way of altering brain chemistry, called pulsed ultrasound. Focused ultrasound can deliver, "complex spatio-temporal patterns of acoustic waves" to achieve similar results to TMS, but has a spatial resolution which is five times greater, and can reach far deeper into the brain. Ultrasound can be used to activate reward pathways (dopamine) in the brain which may be used to condition and/or reinforce certain desired attributes and/or to motivate specific behavioral actions.

DARPA has spent several years analyzing universal narrative structures, and the physiological effects they have on people, as well as tracking popular narratives (and the memes they produce) in social media. The US Government's Strategic Communications plan involves sentiment analysis, the use of counter-narratives, and 'downvoting' stories which it does not approve of, preventing discussion of certain 'banned' topics, as well as using "persona management software" to create false identities, and thus manipulate public perception of news and fool people into believing in a false "popular consensus."

One part of the new Psy-op strategy is controlling the conversation. By manipulating the news we hear, our primal responses can therefore be influenced, without us even knowing it. Brain-to-computer interfaces (BCIs) are already being used to link people's minds/feelings to a movie they're watching. MyndPlay have devised an EEG headset which monitors the viewer's emotional reactions to the movie, and changes the ending accordingly.

New DARPA Projects to Enslave Our Minds

DARPA is one of the government-sponsored research agencies that most boldly explores the future of science and technology. Given that many of its research projects have military applications, it has been traditional for the agency to be secretive about them. In recent years, however, DARPA has been embracing the benefits of open source, particularly for promoting rapid innovation. With an annual budget of $2.8 billion, DARPA drives a good portion of the advanced research that happens at universities and corporations in the US.

DARPA has given out open source software that has been sponsored by the agency. The focus area for first year is the XDATA initiative that is developing open source infrastructure for supporting big data. DARPA has an open source strategy for areas of work including big data to help increase the impact of government investments in building a flexible technology base.

One new DARPA program is to remotely disrupt political dissent and extremism by employing "Transcranial Magnetic Stimulation" (TMS) in tandem with sophisticated propaganda based on this technology. The research at Arizona State University is entitled, "Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects." TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to induce or disrupt the operation of narratives within the brain. This area of study has received $100 million in funding via Obama's ten-year BRAIN Project, as well as a $1.3 billion commitment from Europe.

DARPA is the research and development tool of the National Security Council and thus has carte blanche to openly seek help from industry and the private sector to build the most cutting edge war devices that anyone can imagine. Below we list some declassified projects but the ones that are most heinous are still classified.

DARPA's Open Catalog contains a curated list of DARPA-sponsored software and peer-reviewed publications. DARPA sponsors fundamental and applied research in a variety of areas that may lead to experimental results and reusable technology designed to benefit multiple government domains. The DARPA Open Catalog organizes publicly releasable material from DARPA programs. DARPA has an open strategy to help increase the impact of government investments. DARPA is interested in building communities around government-funded research. DARPA plans to continue to make available information generated by DARPA programs, including software, publications, data, and experimental results.

Some recently released DARPA projects are listed below and demonstrate that DARPA is focused on "Controlling the Human Domain" in every way possible.

The Active Authentication (AA) program seeks to develop novel ways of validating the identity of computer users by focusing on the unique aspects of individuals through software-based biometrics. Biometrics are defined as the characteristics used to recognize individuals based on one or more intrinsic physical or behavioral traits. This program is focused on behavioral biometrics.

~Translation: Foundation code that gives NSA a system to identify all users whether encrypted or not.

The Anomaly Detection at Multiple Scales (ADAMS) program seeks to create, adapt and apply technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts.

~Translation: NSA spying on everything to find "red flags" that trigger further surveillance.

The Automated Program Analysis for Cybersecurity (APAC) program aims to address the challenge of timely and robust security validation of mobile apps by first defining security properties to be measured against and then developing automated tools to perform the measuring. APAC seeks to apply recent research breakthroughs in this field in an attempt to scale DoD's program analysis capability to a level never before achieved with an automated solution.

~Translation: DoD system to analyze all streaming data from all systems, encrypted or otherwise.

The Memex Program was released to Open Source in September 2014. Memex seeks to develop software that advances online search capabilities far beyond the current state of the art. Creation of a new domain-specific indexing and search paradigm will provide mechanisms for improved content discovery, information extraction, information retrieval, user collaboration, and extension of current search capabilities to the deep web, the dark web, and non-traditional (e.g. multimedia) content.

~Translation: NSA will now control all search engines that use Memex as the base code.

The Mission-oriented Resilient Clouds (MRC) program is addressing some of the security challenges facing cloud computing by developing technologies to detect, diagnose and respond to attacks in the cloud, with the goal of effectively building a 'community health system' for the cloud. MRC is also developing technologies intended to enable missions that are supported by cloud computing and other networked systems to continue functioning while under cyberattack.

~Translation: NSA control of all cloud computing with back doors directly to US cyber-control systems.

DARPA's Programming Computation on Encrypted Data (PROCEED) program is a research effort that seeks to develop methods that allow computing with encrypted data without first decrypting that data, making it possible to compute more securely in untrusted environments.

~Translation: NSA double-speak for controlling all encryption and having a method of seeing through encryption without being detected.

The SAFER Program seeks to develop technology to enable safe, resilient communications over the Internet, particularly in situations in which third parties attempt to discover the identity or location of the end users, or block communications. The program also seeks to provide the technological quality of service required to support applications such as electronic mail, instant messaging, voice over IP, and other media that promote effective communication.

~Translation: NSA double-speak for complete control of IP address identifiers for surveillance from all devices.

Social Media in Strategic Communication (SMISC) program is to develop a new science of social networks built on an emerging technology base. Through the program, DARPA seeks to develop tools to support the efforts of human operators to counter misinformation or deception campaigns with truthful information.

~Translation: NSA control of all social media.

XDATA Program is developing an open source software library for big data to help overcome the challenges of effectively scaling to modern data volume and characteristics. The program is developing the tools and techniques to process and analyze large sets of imperfect, incomplete data. Its programs and publications focus on the areas of analytics, visualization, and infrastructure to efficiently fuse, analyze, and disseminate these large volumes of data.

~Translation: NSA system to analyze and target media users and all data.
DARPA and the Brain Initiative

President Obama announced the BRAIN initiative in April 2013. Today, the initiative is supported by several federal agencies as well as dozens of technology firms, academic institutions, scientists and other key contributors to the field of neuroscience. DARPA is supporting the BRAIN initiative through a number of programs.

Electrical Prescriptions (ElectRx) – The ElectRx program aims to help the human body heal itself through neuromodulation of organ functions using ultra-miniaturized devices, approximately the size of individual nerve fibers, which could be delivered through minimally invasive injection.

~Translation: Military control of our neurological systems.

Hand Proprioception and Touch Interfaces (HAPTIX) – The HAPTIX program aims to create fully implantable, modular and reconfigurable neural-interface microsystems that communicate wirelessly with external modules, such as a prosthesis interface link, to deliver naturalistic sensations to amputees.

~Translation: Wireless brain-control over other electronic systems (robots, vehicles, planes, etc.).

Neuro Function, Activity, Structure and Technology (Neuro-FAST) – The Neuro-FAST program seeks to enable unprecedented visualization and decoding of brain activity to better characterize and mitigate threats to the human brain, as well as facilitate development of brain-in-the loop systems to accelerate and improve functional behaviors. The program has developed CLARITY, a revolutionary tissue-preservation method, and builds off recent discoveries in genetics, optical recordings and brain-computer interfaces offering faster, better views of the entire brain.

~Translation: The basis of cybernetic interfaces between humans and machines.

Restoring Active Memory (RAM) – The RAM program aims to develop and test a wireless, fully implantable neural-interface medical device for human clinical use. The device would facilitate the formation of new memories and retrieval of existing ones.

~Translation: Control of memories and the creation of personal identities generated by computers.

Reliable Neural-Interface Technology (RE-NET) – The RE-NET program seeks to develop the technologies needed to reliably extract information from the nervous system, and to do so at a scale and rate necessary to control complex machines, such as high-performance prosthetic limbs.

~Translation: Neural interrogation invades our minds.

Systems-Based Neurotechnology for Emerging Therapies (SUBNETS) – The SUBNETS program seeks to create implanted, closed-loop diagnostic and therapeutic systems for treating neuro-psychological illnesses and networks of the brain.

~Translation: Mechanical psychiatrists will be able to prescribe neural restructuring of the personality.

Patents for Mind Control and Psy-Ops

The arsenal of mind control technologies developed by the government is quite vast. A number of well researched books on the subject have been published revealing the complexity and variety of these technologies. The US Patents described below define technology used for behavior manipulation through all types of media. These patents reflect "old" technology compared to DARPA classified projects. This list just shows the pervasiveness of this technology that is commonly found in all types of media.

Nervous system manipulation by electromagnetic fields from monitors. US Patent #6,506,148, 1/14/2003

Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.

Computer monitor and TV monitors can be made to emit weak low-frequency electromagnetic fields by pulsing the intensity of displayed images. Experiments have shown that the 1/2 Hz sensory resonance can be excited in this manner in a subject near the monitor. The 2.4 Hz sensory resonance can also be excited in this fashion. A TV monitor or computer monitor can be used to manipulate the nervous system of nearby people.

This method can be used in making movies and recording video tapes and DVDs. Video tapes can be edited such as to overlay the pulsing by means of modulating hardware. US Patent #872528, 6/1/2001

Ultrasonic Speech Translator and Communication System, US Patent #5,539,705, M. A. Akerman, Curtis Ayers, Howard Haynes, July 23, 1996. A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.

Method and Recording for Producing Sounds and Messages to Achieve Alpha and Theta Brainwave States and Positive Emotional States in Humans, US Patent #5,352,181, Mark Davis, October 4, l994.

Method of and Apparatus for Inducing Desired States of Consciousness, US Patent #5.356,368, Robert Monroe, October 18, 1994. Improved methods and apparatus for entraining human brain patterns, employing frequency-following-response (FFR) techniques and facilitating attainment of desired states of consciousness.

Method of Inducing Mental, Emotional and Physical States of Consciousness, including Specific Mental Activity, in Human Beings, US Patent #5,213,562, Robert Monroe, May 25, 1993.

Subliminal Message Generator, US Patent #5,270,800, Robert Sweet, December 14, 1993. A combined subliminal and supraliminal message generator for use with a television receiver; permits complete control of subliminal messages and their presentation. Also applicable to cable television and computers.

Superimposing Method and Apparatus Useful for Subliminal Messages, US Patent #5,134,484, Joseph Wilson, July 28, 1992. Method of Changing a Person's Behavior.

Silent Subliminal Presentation System, US Patent #5,159,703, Oliver Lowery, October 27, 1992. A silent communications system in which non-aural carriers in the very low or very high audio-frequency range, or in the adjacent ultrasonic frequency spectrum, are amplitude-modulated with the desired intelligence and propagated acoustically or vibrationally for inducement into the brain.

Method and System for Altering Consciousness, US Patent #5,123,899, James Gall, June 23, 1992. A system for altering the states of human consciousness involving the use of simultaneous application of multiple stimuli, preferably sounds, having differing frequencies.

Hearing System, US Patent #4,877,027, Wayne Brunkan, October 31, 1989. A method for directly inducing sound into the head of a person, using microwaves in the range of 100 MHz to 10,000 MHz, modulated with a waveform of frequency- modulated bursts.

Non-Invasive Method and Apparatus for Modulating Brain Signals through an External Magnetic or Electric Field to Reduce Pain, US Patent #4,889,526, Elizabeth Rauscher and William Van Bise, December 26, 1989.

Apparatus for Inducing Frequency Reduction in Brain Wave, US Patent #4,834,70l, Kazumi Masaki, May 30, 1989.

Non-Audible Speech Generation Method and Apparatus, US Patent #4,821,326, Norman MacLeod, April 11, 1989.

Method and Apparatus for Translating the EEG into Music to Induce and Control Various Psychological and Physiological States and to Control a Musical Instrument, US Patent #4,883,067, Knispel et. al., November 28, 1989.

Hearing Device, US Patent #4,858,612, Philip Stocklin, August 22, 1989. A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the regions of the auditory cortex.

US Patent #4,717,343, Alan Densky, January 5, 1988. A method of conditioning a person's unconscious mind in order to effect desired change in the person's behavior, and which does not require the services of a trained therapist.

Auditory Subliminal Programming System, US Patent #4,777,529, Richard Schultz and Raymond Dolejs, October 11, 1988.

Auditory Subliminal Message System and Method, US Patent #4,395,600, Rene Lundy and David Tyler, July 26, 1983. An amplitude-controlled subliminal message may be mixed with background music.

Device for the Induction of Specific Brain Wave Patterns, US Patent #4,335,710, John Williamson, June 22, 1982. Brainwave patterns associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.

Apparatus for Electrophysiological Stimulation, US Patent #4,227,516, Bruce Meland and Bernard Gindes, October 14, 1980.

Noise Generator and Transmitter, US Patent #4,034,741, Guy Adams and Jess Carden, Jr, July 12, 1977. An analgesic noise-generator.

Apparatus for the Treatment of Neuropsychic and Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation, US Patent #3,773,049, L. Y. Rabichev, V. F. Vasiliev, A. S. Putilin, T. G. Ilina, P. V. Raku and L. P. Kemitsky, November 20, 1973. This is the patent for LIDA, the Soviet brainwashing machine.

Psycho-Acoustic Projector, US Patent #3,568,347, Andrew Flanders, February 23, 1971. A system for producing aural psychological disturbances and partial deafness in the enemy during combat situations.
False Flags are Domestic LEGAL Propaganda

By now your head is probably spinning and you are, like us, sick to the core at what our elected officials are permitting to happen in our country and the world in the United States' name.

President Obama, and the powers that are behind him, weren't kidding when he said that he would transform America. They have a motive, a means, and an opportunity to effect positive public support for any agenda items through the work of the DoD and the BBG within the boundaries of America. It doesn't matter whether it is gun control, the Iran Deal, bombing other nations, TPP, ObamaCare, NDAA, or any agenda item, somehow he pushes it through without much resistance. And when public consent cannot be manufactured with perception management and psychological manipulation of narrative networks, Obama just writes another Executive Order, Presidential Policy Directive (PPD), Presidential Study Directives (PSD) or Presidential Policy Guidance (PPG), or whatever he wants to rename his misuse of executive authority.

One thing is for sure: Obama seems to be unchallenged by his fellow politicians who must be part of some larger scheme that coerces their votes. They must be complicit. There must be a message in the media that promotes common political schemes without being "illegal", "treasonous", or even uncommon. Shaping the narrative with "talking points" is perception management of narrative networks.

In the name of "National Security" Obama has bombed Syria, Libya, Iraq, Somalia, and Yemen without any congressional approval. These acts of war were accompanied with excellent smoke and mirrors – perception management and DARPA subliminal devices. Only a few lone voices pointed out that we need congressional approval to wage war! Crickets…

Could the crickets be DARPA electronic warfare bouncing around in our manipulated brains?

Could Obama's speeches be electronic warfare aimed at our neural narrative networks?

Why is DARPA so set on creating things that "control the human domain," just as Jade Helm?

Has Jade Helm 2015 ended or does it get renewed each year by Obama just like the NDAA?

Are we targets for pro-Obama propaganda provided by the DoD's BBG?

Could some false flags (where no one truly dies) be more propaganda films created by the huge BBG broadcasting network?

YES. The answer to all of these questions above is YES.

What Can We Do, Fellow Patriots?

First. Arm yourself with the truth – like a two edged sword. Read and re-read this article as painful as it may be for you. Do your own research from what we have provided you.

Second. Arm yourself with a consciousness higher than the driving force of global manipulation for personal power and greed – like a personal shield. Personal self-awareness has always been the fulcrum of human evolution. Oftentimes, it comes down to a few people, or even one person, who turns the tide of evil away from controlling the evolution of human consciousness. One lawsuit can turn the tables. One law. One person. One Patriot.

Third. Arm yourself with the knowledge of the weapons being used against you and the motives. Once you have that knowledge, you can find devices to counteract some of those weapons. There are an equal number of good devices to counter the evil ones.

Fourth. Arm yourself with the knowledge to discern when narratives ("story-lies") are being used to manipulate you against your will. Take the 12 Steps of Perception Management, as presented above, and apply them to possible false flag scenarios to learn to recognize the patterns and see through to reality.

Fifth. Arm yourself against your enemy and attempt to neutralize them using their own methods and devices. A call goes out to all Patriots to secretly subvert political manipulation of Americans on American soil. In other words, wait for the right moment and then throw a monkey wrench into the works. Help the evil devices malfunction and upset the "official story" with random acts of Patriotism.

Sixth. Arm yourself with the justice of the law and bring lawsuits against domestic propaganda and subliminal manipulation of Americans – or anyone.

Seventh. Arm yourself against government agendas that now consider Americans to be enemy combatants on domestic soil who must be supportive of agendas that take away American civil liberties and constitutional rights.

Of course, we forgot to mention the first and most primal step – 'get mad as hell about it and don't take it anymore.' The idea that you have been manipulated most of your life by commercial interests through legal subliminal programming is enough to demand answers: "Why the hell do elected officials and the government 'allow' this to happen?" And now you are armed with the answer: The "government" is doing the same thing to us but with military grade electronic warfare that is mind-boggling.

Warning: As you begin to go back in your memory of these events (9-11, Sandy Hook, San Bernardino, and many others) with this new awakening, you may feel raped, used, and manipulated. The more you watched the "shootings" the more you believed the "story" – the narrative. The more you were sucked in and could not get those images out of your head, the more your freedom was stolen. But, if you looked closely, the "man behind the curtain" is actually our own government. Only chaos and confusion arises from such evil manipulation and thus FEAR is bred. FEAR is another name for TERROR which is another name for WAR.

War is big business and it needs the best of marketing devices to get public support for presidential policy – in the name of "National Security," which trumps all else.

We have an out-of-control president who uses military mind-control devices to manage the perceptions of American citizens to "make" them "allow" his unprecedented abuse of executive authority. Since he is the commander and chief and controls the DoD, which should have no authority inside of America, he needed the NDAA to legally permit him to consider Americans a threat to "National Security." For five years he has consistently broaden his "powers" to take away civil liberties, virtually unchallenged.

The time is now to wake up and end electronic warfare in America through loopholes in the NDAA. This Act must be rewritten to specifically address these issues and make sure that American civil liberties are not violated by clever lawyers like Obama who have made treason legal.

16Comments Add yours

1
claimyourpowerblog on August 22, 2017 at 5:54 pm

Thank you kindly for this excellent research!

Peter Greco on October 3, 2017 at 4:17 pm

Legal propaganda? Laws must be changed when people are murdered and treason is involved, the culprits hiding like cowards in the shadows must be indicted and sent to prison for a long time. Under the POS Obama administration for his 8 horrible years as well as 911 itself, there have been too many false flags of where either people were murdered, the 'perpetrator' was supposedly shot dead or committed suicide, crisis actors were identified at two or more different sites, half truths from MSM and the DOJ/FBI, globalist leftists/Democraps/hollywood yelling about gun control over and over, etc, etc.

Truth of the matter is that gun control to further control the citizens is what the globalists want desperately. More citizens will be murdered in mass until they finally get their way by orchestrating more false flag (murder to get an agenda passed) operations from the Deep State.

These globalists and their minions have no regard for citizens lives. Each death is just a stepping stone to their ultimate control.

Congress should be more concerned with pedophilia by their ranks. Drain the swamp and protect our citizens.
3
Lidiya Phillips on January 13, 2018 at 10:25 pm

I will add to the "What Can We Do, Fellow Patriots?"
Arm yourself with Lord's prayers. Protect yourself with regular Communion taking, following the confession and the absolution of your sins and transgressiona, given by the priest. The Communion with the Blood and Body of Christ is the omnipotent personal shield. Personal self-awareness which has been the fulcrum of human evolution will be given to everyone who turns to God and Jesus with repentance and prayers for help.
4
Leland Roth on February 19, 2020 at 7:07 am

Dumbest advice yet? ^ The Catholic Church & its non-married sexually conflicted priests r historically the source of much of the current ongoing spiritual issues confronting American Natives as they throw off the cloak of misinformation surrounding nonsensical blood rites (& nonsensical born-in-sin bs) as they choose, hopefully, to love G♡D in spite of the various orthodox Churchs ongoing collaboration with deep state's ongoing attempts to sully the truth of G♡D's love of S♡UL.
5
AIM4Truth Unanimous on May 19, 2018 at 9:43 am

Did our Founding Fathers figure on incorporating as a non-profit provider of Essential Services, or a for-profit war machine? THAT IS A QUESTION Donald J. Trump ought to be able to answer.
6
Richard Orberson on May 19, 2018 at 10:59 am

Should make false flags, propaganda, and false advertising illegal?
7
Our Spirit on May 19, 2018 at 11:31 am

Contact your Congressional reps and demand that it be ILLEGAL to propagandize and terrorize Americans with fake news and false flags, Right now, it is LEGAL so don't believe ANYTHING you read or hear from main stream media which is the government's partner in the great deception and war against American citizens.
8
Donna on May 19, 2018 at 4:30 pm

Thank goodness for all guys at AIM. This is bad. I live in the uk unfortunately, the belly of the beast. I've seen these supposed attacks for what they are for a long time now and always felt the endgame is to get your guns so they can move in on the people. We are all going to be in the fight of our lives. Love to every single one of you.
9
Our Spirit on May 19, 2018 at 5:14 pm

We saw the end of the movie. We win, but it takes all of us together – around the world to stand up to them.
10
Jane on May 20, 2018 at 3:24 am

May 19,2018…This is so much information and background , it is overwhelming…which is ok, because I can save it and continue to absorb more as I can. While aiming at anything I can do for my country and my world.

I do believe it would be good to have a small concise Bridge from the Obama days to NOW. the Trump days…and to be clear that presidents or leaders of nations on earth, are likely meat puppets programmed with the elite agenda, now focused from Cern.

May the Spirit be Strong from the Heart of our Soul
that the Gateway at Cern diminish, disperse
its' Minions of Evil flung Home-to the Great All Mighty Creation
-as pulverized nano dust, to be caught up in finer brighter algorithms for our Starry Being to shape…

That Humanity, all Earth, be freed from this plague of soulless Parasites, and rise as One with the Golden Rule to our sweetest, most Joyful Potential.
11
Free Speech is Now a Whisper – Novus Vero on June 15, 2018 at 12:43 pm

[…] Propaganda is legal in America because of new clauses Obama added to the National Defense Authorizat… The Department of Defense's Board of Broadcasting Governors and the Global Engagement Center conducted extensive "election meddling" during the 2016 presidential election using $86 million in tax-payer dollars to attack Trump and help Hillary win. These "Fake News" attacks, advertisements, memes, and Mueller's imaginary Russians were, in fact, directed by Obama's administration as "legal propaganda" against an opposing candidate. But this wasn't the only propaganda Obama spread, just the one he got caught doing. […]
12
Julio Rodriguez on September 9, 2018 at 5:03 pm

I am going to run for congress and I will tell the people the truth "that I am only concern about my immediate family and that I am for sale".
13
Truth News Headlines October 29, 2018 – American Intelligence Media on October 28, 2018 at 6:40 pm

[…] False Flags are Legal Propaganda […]
14
Anonymous on February 1, 2020 at 10:24 am

Every word is the sickening truth. Trump is using All of this Executive abomination to retain our Republic. He'll have to pull a Putin w/ our Constitution, later. Far too late to 'fix' this. UN must be ousted from our nation. Vote when and where it will make a difference. And pray.
15
Anonymous on February 24, 2020 at 6:35 am

Need to update article so it doesn't imply that Obama is the current president.
16
Our Spirit on February 24, 2020 at 6:37 am

The article has already been posted and won't be changed.

5) 5 Information Warfare Policy, Strategy, and Operations (pdf)

6) Pentagon Reviews Policies on Clandestine Information Warfare

Pentagon Reviews Policies on Clandestine Information Warfare

Sep 19, 2022

Pentagon Reviews Policy of Creating Fake Social Media Accounts

By Charlie McCarthy

The Defense Department ordered an investigation into how it conducts clandestine information warfare, The Washington Post reported.

The Pentagon's action comes after major social media companies, including Twitter and Facebook, identified and took offline fake accounts, suspected of being run by the U.S. military, in violation of the platforms' rules, the Post reported.

Colin Kahl, the undersecretary of defense for policy, last week instructed the military commands that engage in psychological operations online to provide a full accounting of their activities by next month, the newspaper said.

Several defense and administration officials told the Post that the White House and some federal agencies expressed mounting concerns over the Pentagon's attempted manipulation of audiences overseas.

The White House, the State Department and Defense Department officials have been concerned that policies regarding clandestine online operations are too broad and risk eroding U.S. credibility, the Post reported.

"Our adversaries are absolutely operating in the information domain," a senior defense official told the Post. "There are some who think we shouldn't do anything clandestine in that space. Ceding an entire domain to an adversary would be unwise. But we need stronger policy guardrails."

Air Force Brig. Gen. Patrick Ryder, Pentagon press secretary, told the Post in a statement that the military's information operations "support our national security priorities" and must be conducted in compliance with relevant laws and policies. "We are committed to enforcing those safeguards."

Internet researchers Graphika and the Stanford Internet Observatory last month said that more than 150 fake personas and media sites created in the U.S. were taken down in recent years by Twitter and Facebook.

Two officials told the Post that U.S. Central Command is among those whose activities are being scrutinized. Centcom, headquartered in Tampa, Florida, influences military operations across 21 countries in the Middle East, North Africa, and Central and South Asia.

Read More at Newsmax

RELATED:

7) Pentagon To Investigate US Military's Alleged Secret Internet Influence Campaigns

By Micaela Burrow

The Pentagon has ordered an audit of the U.S. military's recent efforts to spread pro-U.S. information through fake social media accounts, the Washington Post reported Monday.

Twitter and Facebook had repeatedly taken down accounts they suspected had direct ties to U.S. military branches, including U.S. Central Command (CENTCOM), an investigation from Stanford University and Graphika in August found. Undersecretary for Defense Policy Colin Kohl on Tuesday directed the U.S. military commands that conduct online information warfare to submit a report on clandestine influence activities in October, the Post reported, citing officials familiar with the matter.

The military's information operations uphold "national security priorities" and are beholden to existing U.S. policy and laws, Air Force Brig. Gen Pat Ryder told the Post. "We are committed to enforcing those safeguards," he added.

The review seeks to determine what types of internet information operations the military is conducting, who they are targeting, what tools are being used and why and whether the operations were successful, according to the Post.

The White House, State Department and some Defense Department officials expressed concern over the alleged violation of Twitter and Facebook rules by the U.S. military, the Post reported, citing defense and administration officials familiar with the matter.

Twitter de-platformed at least 173 accounts purporting to represent individuals or media outlets between March 2012 and August 2022 thought to originate in the U.S. or Great Britain, according to Stanford and Graphika's report. Facebook's parent company Meta also removed 39 Facebook profiles, 16 pages, two groups and 26 Instagram accounts, which it attributed to the U.S.

Many of the accounts were taken down within the past three years, U.S. officials told the Post. Some accounts decried Russia's "imperialist" war in Ukraine, although the report found that in general most profiles did not receive much engagement on their respective social media platforms.

Researchers did not find any conclusive connection to the U.S. military. However, the accounts demonstrated a heavy focus on events in Central Asia and the Middle East, overlapping with CENTCOM's area of responsibility.

In 2020, Facebook took down fake Arabic, Farsi and Urdu-speaking accounts attributed to CENTCOM that spread information countering China's claims that the coronavirus had emerged from a U.S. Army lab in Fort Detrick, Md., officials familiar with the matter told the Post.

CENTCOM has not commented on its use of social media accounts to manipulate viewers. Such activities would put the U.S. in line with Russia, China and Iran, known for their widespread use of bots and state-controlled social media personas in an attempt to sway audience opinions on sensitive issues, and would "absolutely be a violation of doctrine and training practices," a defense official told the Post.

"Our adversaries are absolutely operating in the information domain," another senior defense official told the Post. "Ceding an entire domain to an adversary would be unwise, but we need stronger policy guardrails."

The Pentagon, CENTCOM, Facebook and Twitter did not immediately respond to the Daily Caller News Foundation's requests for comment.

Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact licensing@dailycallernewsfoundation.org.

8) National Defense Authorization Act of 2014 Authorizes Cyber Warfare against American Citizens

Blacklisted News – by Lee Rogers, Jan. 8, 2014

In the midst of the holiday season Congress decided to pass the National Defense Authorization Act of 2014 or NDAA. The bill was later signed into law by President Obama with little if any fanfare. When this happened much of the corporate media was focusing in on invented news stories like the Duck Dynasty garbage. What's really sad is that it is doubtful that many members of Congress have even read the bill at all. If they did in fact read it and voted for it knowing what was in it than there is little doubt that they have violated their oath of office and should be held accountable. The NDAA contains a number of highly questionable sections that run contrary to the principles articulated in the United States Constitution. Specifically, language contained in the bill appears to authorize cyber warfare operations against the American people.

One particularly horrifying section is section 1071 which authorizes the Department of Defense to enhance its capacity to analyze captured records. Apparently the National Security Agency by itself doesn't have enough capabilities to analyze all of the records it captures so the Department of Defense is going to help. The section authorizes the Secretary of Defense to establish a center called the Conflict Records Research Center. The purpose of this new organization is to establish a research database to analyze records captured from countries, organizations and individuals now or once hostile to the United States. It defines a captured record as a document, audio file, video file, or other material captured during combat operations.

This language is purposefully broad and can be interpreted to also include records captured from American citizens who are simply angry at the criminality of the federal government. After all, the language infers that they can analyze records from individuals who are now or were once hostile to the United States and provides no exception based on citizenship or nationality. Due to the fact that the Internet is now increasingly being described as a 21st century battlefield, combat operations can also fall under the umbrella of offensive cyber warfare operations.

Section 1071 also allows the Secretary of Defense to accept gifts from any source that would enhance the operational capabilities or defray the costs of the Conflict Records Research Center. Sources allowed include corporations, foreign governments and private charities. The only exception is if the gifts or donations would compromise or appear to compromise the ability or integrity of the Department of Defense or any of its employees.

This language pretty much gives the green light for all sorts of dirty dealings and corporate espionage activities since the operational purpose of the Conflict Records Research Center is to be able to analyze as many records as possible. The more records and data that they have the more analysis they are able to perform. So by default this facility will be able to accept information from almost anyone. It makes it almost impossible to question their integrity by accepting data from anyone who volunteers information regardless of where it comes from.

All of this is even more concerning when one considers that the NDAA also has a lot of new cyber warfare initiatives. Section 931 through Section 942 contains a bunch of crazy stuff dealing with the world of cyber warfare..

Section 932 authorizes the creation of a position known as The Principal Cyber Advisor which will be responsible for supervising offensive and defensive cyber warfare activities. Obviously this position would not be created unless the federal government is intending upon involving itself in both offensive and defensive cyber warfare well into the future.

Section 933 instructs the Secretary of Defense to conduct a broad mission analysis of the government's cyber warfare capabilities. The required analysis will focus primarily on how they will manage, increase and enhance their personnel assigned to cyber warfare operations. It even disallows the reduction of cyber warfare personnel assigned to the Air National Guard.

Section 936 requests the Secretary of Defense to strengthen outreach and threat awareness programs for small businesses. This is allegedly to assist businesses that are awarded contracts by the Department of Defense to understand cyber threats, develop plans to protect intellectual property and networks of such businesses. Realistically, this section appears to give the Department of Defense the authority to mandate all sorts of cyber security requirements on small businesses that they do transactions with. The language of the section makes it sound as if they will be doing these small businesses a favor when the opposite appears to be the case.

Section 940 authorizes the President to establish a process and policy to control the proliferation of cyber weapons through law enforcement activities, financial means, diplomatic engagement and pretty much any other means that the President considers appropriate. This would also include potential private industry participation in the initiative. The objective of the process is to suppress the trade of so-called cyber tools that could be used for criminal, terrorist or military activities. The term cyber weapon is not explicitly defined in the section so this could be considered almost anything be it software or hardware that they declare could potentially be used for a nefarious purpose. Even something like bit torrent and torrent related applications could be considered cyber weapons since copyrighted material is consistently transferred back and forth using these tools. As a result, the use of these tools could potentially fall under the classification of criminal activity. Once again we have the President being given expansive powers from Congress with its extremely broad use of language in the bill.

Section 941 directs the president to establish an interagency policy to deter adversaries in cyberspace. The word adversaries is yet again not specifically defined in the section so this could also mean almost anything. With many American citizens not trusting the United States government this could mean a policy to deter or stifle anyone from political opponents to protesters who voice their disgust on the Internet.

Overall, between the records collection initiative and the immense cyber warfare planning that is outlined in the NDAA it is becoming painfully clear that the United States government is turning the Internet into a battlefield. Obviously independent media outlets have done a great deal of damage to the legitimacy of the federal government by exposing their scams and frauds. So as a result, why wouldn't the establishment view these voices of dissent as adversaries on a cyber battlefield? They could merely claim that these are entities spreading enemy propaganda or other ridiculous nonsense.

The little mainstream discussion that has been had on this legislation has focused primarily on the continued policy of indefinitely detaining so-called terrorists and Obama's statement about how this bill will help to eventually close Guantanamo Bay. Of course Obama as Commander in Chief could have closed down Guantanamo Bay years ago if he really wanted. He could have also ordered the release of these alleged terrorists many of who were either in the wrong place at the wrong time or low level fighters. Instead he falsely claims that Congress is blocking him from doing any of these things as political cover. This is ridiculous considering that as President of the United States he is the man ultimately in charge of the entire military. Other than making declarations of war which is reserved for the legislative branch, these powers are well within his constitutional powers as President. He also has the power to grant pardons and could potentially pardon any of these people currently being held in Guantanamo Bay based on humanitarian reasons. It just shows what a joke Obama and his whole regime really is.

There obviously has been no mainstream discussion about how this bill authorizes the ridiculous Conflicts Record Research Center and continues the push of the government's cyber warfare capabilities. More importantly there has been no discussion about how these cyber warfare initiatives could be directed at individuals who are opposed to the federal government in some way. By using broad language it is clear that this is intentionally done so they can at some point legally justify offensive cyber warfare operations against the American people if needed. The NDAA offers no distinction between American protesters or foreign fighters burning American flags as it pertains to their cyber warfare plans. According to the bill they are all one in the same because they are all opposed to the United States government in some form.

Read the various sections of the bill for yourself and draw your own conclusions. Obviously the aforementioned sections contained within raise some serious constitutional questions as it becomes increasingly clear that the federal government is gearing up for war both conventional and cyber against the American people.

https://www.blacklistednews.com/National_Defense_Authorization_Act_of_2014_Authorizes_Cyber_Warfare_Against_American_Citizens/31812/0/5/5/Y/M.html

Gang Stalking Mind Control Cults
20 Sep 2022 | 1:14 am

Archbishop Vigano Calls Out the ‘Children of Darkness’s’ ‘Deep Church’/’Deep State’ Coup D’etat (aka Great Reset & UN Agenda 2030)


Epigraph Quotes:

Archbishop Carlo Maria Vigano:

– "Once again, the deep church (*) and the deep state work together in unison…"

– "The last element of continuity with the communist ideology is the digital transition that is the use of technologically advanced tools for complete control of the population, which has already been implemented by the Chinese dictatorship and (is) highly sponsored by the Great Reset, in line with transhuman thinking."

– "We know that the plan to infiltrate the Church with fifth columns of the enemy dates back to the 19th century:

2) Letter From The Alta Vendita (Masonic) Lodge, 1859:

"The Pope, whoever he is, will never come to the secret societies. It is up to the secret societies to take the first step toward the Church with the aim of conquering both of them. The task we are going to undertake is not the work of a day, or of a month, or of a year. It may last several years, perhaps a century, but in our ranks the soldier dies and the struggle goes on.

You wish to establish the reign of the chosen ones on the throne of the prostitute of Babylon.(**) Let the Clergy march under your standard, always believing that they are marching under the banner of the Apostolic Keys.

This reputation will put access to our doctrines into the midst of the young clergy, as well as deeply into the monasteries. In a few years, by the force of things, this young clergy will have overrun all the functions; they will be called to choose a Pontiff who should reign."*

I. From Interview with Archbishop Vigano from undisclosed location (from "The Greatest Reset" movie (2022)):

Webmaster Comment: In the following brief interview statement, I believe Archbishop Vigano identifies the underlying raison d'etre of Operation Crestone/Baca (1970's to present), which is now come to fruition in the world. Please note that "The Plan" to subvert and destroy the moral order of society by subverting and destroying the Catholic church was outlined by the secret "Alta Vendita letter" intercepted from a powerful Freemasonic lodge in 1859.

From movie introduction: On October 25, 2020, Archbishop Carlo Maria Vigano wrote an open letter to the President of the United States warning of a powerful cabal, who sought to utilize the Great Reset to install a global dictatorship. The Archbishop (Former Apostolic Nuncio to the United States) continues to expose the collaboration of what he calls the "Deep Church" with the Deep State. He has been in hiding since 2018.

Archbishop Carlo Maria Vigano:

"The ongoing war waged by the children of Darkness seems to have reached a truly disturbing point. The Great Reset is a social tool with which the global elite intends to establish the new world order. Intended to radically change the entire social, economical, political, and religious systems of the nations, promoted principally by the World Economic Forum, whose president is Klaus Schwab, the Great Reset has been adopted by the United Nations with the name Agenda 2030.

This global coup d'etat was carried out by a very powerful minority with practically inexhaustible economic means. The principle architects are:

1) The families of the high world of finance like the Rothschilds, the Rockefellers, the Warburgs.

2) There is the United Nations, the WHO, UNICEF, UNESCO, and the FAO.

3) There are a group of powers like the World Economic Forum, the Bilderberg Group, the Club of Rome,

4) And obviously, the Masonic lodges all over the world.

5) Finally, the Catholic hierarchy is living through a moment of the most grave contradiction. Because for 60 years now, it has been completely aligned in a progressive and globalist sense. And under the pontificate of Jorge Mario Bergoglio, it has made the ideology of the New World Order its own. Proposing himself as a candidate for the presidency of the universal religion advocated by Freemasonry, the Argentine makes no secret of his role of prophet of the New World Order.(***)

I would not be surprised if he aspires to place himself at the head of the universal religion."

(Movie Screen Statement Imposed Upon Artists' Drawing of 3 Houses of Worship: "Higher Committee of Human Fraternity Abrahamic Family House (Abu Dhabi) will be a beacon of mutual understanding, harmonious coexistence between Islam, Christianity and Judaism: The Abrahamic Family House will have 3 houses of worship: a Synagogue, Mosque, and a Church. Opening 2022")

"And once again, the deep state and the deep church work together in unison….

We know that the plan to infiltrate the Church with fifth columns of the enemy dates back to the 19th century. And we understand how heavy suspicion that surrounds the forced abdication of (Pope) Benedict XVI and the election of the Jesuit Bergoglio find further confirmation here.

At the moment, the role of Francis is most over-exposed precisely because of the role he has carried out in supporting the pandemic narrative and promoting mass vaccination. It's undeniable that he's perfectly in tune with globalist ideology and that he considers his main task to be the dissolution of the Church of Christ, thus forming it into a philanthropic and ecumenical NGO that is subservient to the elite. The apostasy of the highest level of the Church permitted Bergoglio to be named as moral guide of the Council for Inclusive Capitalism, headed by Ms. Lynn Forester de Rothschild, in absolute contradiction to the divine mandate given by Christ to his Vicar on Earth.

This was possible because there was a conscious and active cooperation by the Catholic hierarchy. The pandemic emergency and the vaccination campaign have given greater importance to the community to the detriment to the individual citizen, to the point of de-legitimizing and criminalizing those who reject the gene serum or question the Covid narrative. The proponents of the Great Reset are intrinsically Anti-Christian and Anti-Christic.

The last element of continuity with the communist ideology is the digital transition that is the use of technologically advanced tools for complete control of the population, which has already been implemented by the Chinese dictatorship and (is) highly sponsored by the Great Reset, in line with transhuman thinking.

It is dismaying to see how the Bergoglian Church welcomes this inhuman project, even to the point of hosting conferences on transhumanism and the metaverse in the Vatican. Transhumanism consists in the hybridization of man with machine, in the implantation of subcutaneous chips of the internets of things and people and even in the diffusion of the virtual reality on Metaverse, the subject of the next rebranding of Facebook.

The very words of the book of the Apocalypse concerning the reign of the Antichrist: No one could buy or sell unless he had the mark.

When we speak about the greatest reset, we are referring to the manifestation of the omnipotence of God to the bearing of his mighty Arm, to the defeat of his enemies. May this be the beginning of the true Greatest Reset."

Archbiship Carlo Maria Vigano

II. Movie Commentary and the 1859 Secret Plan of the Alta Vendita:

A) Vigano: "Once again, the deep church (*) and the deep state work together in unison…"

From Silverado Abbey, Silverado, California, May 2, 2021:

1) "As Archbishop Vigano has said: "The interests of the "deep church" to subvert the interests of the real church and the interests of the "deep state" to subvert the authority of the "real state"… They are ideological partners. One thing is for certain. And that is: The battle against people of faith is heating up and it is real. Scripture gives several indications of what is going to be happening on the earth before Christ returns. One of them is "the great Apostacy." There will be a falling away of faith all over the world.

In early 2020, I realized we are being lied to on a scale I've never seen before. This not liberal vs. conservative. This is way upstream from all those traditional paradigms. That's all broken. This is true vs. false, good vs. evil.

The forces behind the Great Reset are ultimately demonic. They are anti-human, they are anti-Christian, they are anti-human being. The use of the Papal office for the powers of Hell has no precedent in anyone's lifetime living today… where the message against globalism, against collectivism, individual rights, all that has been destroyed. This Papacy does not resemble any previous Papacy. It is unlike anything in history."

Patrick Coffin, podcaster, author, and speaker

B) Vigano: "We know that the plan to infiltrate the Church with fifth columns of the enemy dates back to the 19th century:"

"So this all makes sense in the context of a source document known as the Alta Vendita, which is an intercepted letter. It was intercepted by the agents of Pope Pius IX, who is a favorite of traditionalists. His Cardinal Secretary of State intercepted this letter from Italian Carbonari, one of the very highest lodges of Freemasons in Italy and in all the world:

"The Pope, whoever he is, will never come to the secret societies. It is up to the secret societies to take the first step toward the Church with the aim of conquering both of them. The task we are going to undertake is not the work of a day, or of a month, or of a year. It may last several years, perhaps a century, but in our ranks the soldier dies and the struggle goes on.

You wish to establish the reign of the chosen ones on the throne of the prostitute of Babylon.* Let the Clergy march under your standard, always believing that they are marching under the banner of the Apostolic Keys.

This reputation will put access to our doctrines into the midst of the young clergy, as well as deeply into the monasteries. In a few years, by the force of things, this young clergy will have overrun all the functions; they will be called to choose a Pontiff who should reign."

The Alta Vendita, 1859

"Pope Pius X was writing against Freemasonry and against the secret societies which had with plotted to infiltrate the Catholic church with these ideas and even with personnel, essentially plants, who would infect the priesthood morally and intellectually with ideas such as we're seeing everywhere today in the Francis pontificate.

The popes at the turn of the 20th century and a few decades before it, the 1880s and 1890s, were all talking about an infiltration of the Church by Masonic-Marxist-leftists. The men, the clerics, behind the popes were talking about this group called the Sanct Gallen Mafia. This group is comprised of very, very powerful northern Europeans mainly. There is Cardinal Martini who is the Don of the group. This Sanct Gallen Group met from 1996 to 2004 with the expressed goal of avoiding a Pope Benedict Papacy. And the man they wanted to put in the chair of Peter at the 2005 conclave was none other than Jorge Maria Bergoglio, who is a left-leaning, trained by the Jesuit formators in South America.

Humanity 2.0. The Internet of Things. It's all part of Klaus Schwab's Fourth Industrial Revolution."

Timothy Gordon, J.D., PH.L., Catholic author

3) "We have to go back to the time of the early 1700's. The world looks a lot different. There was a moral order that was governed and controlled by the Roman Catholic Church and the Protestant Church. The Grand Lodge system (of Masonry) begins in 1717. This has to be an early version of the Great Reset.

The ultimate goal of Freemasonry is to deconstruct Christian rule. There are two ways you can deconstruct that. One, you could weaken the church from the inside. Or two, you can take away power from the Church through government. Freemasonry does both."

David L. Gray, former 32nd degree Mason, theologian

4) "The disciples asked Jesus what it's going to be like in last days. The first thing he said was: "Let no man deceive you." But then later he says that the last days would be like the Days of Noah. Now that begs the question: What differentiates the days of Noah from any other time in human history? Genetic manipulation. You get what I call the Genesis 6 experiment. And that's when 200 watcher class angels, according to the Book of Enoch, landed on Mt. Hermon in the days of Jared. And this is Genesis 6:1-4, where the sons of God came down to the daughters of man and they had children that became known as the Nephilim, who were giant offspring of the angels. And it gets so bad, all flesh had become corrupted, that the Creator had only one choice and that's to wipe out everything and start over again. He did so with Noah, who was "found righteous in his generations," the Hebrew word used there is tamim, that's "pure in his genetics," like a pure red heifer, the same word is used there. So I believe that the genetic years tampering that was taking place there, specifically in the 120 years leading up to the flood, was the reason for the flood. And that's what Genesis 6:12 said. The earth and all flesh had become corrupted. How had it become corrupted? It became corrupted through genetic manipulation. Genetic manipulation is what we now refer to as transhumanism."

Rob Skiba, author, Christian filmmaker

5) "We are all created in the image of God." But that poses a serious limitation to the Fourth Industrial Revolution-Great Reset-New Normality agenda. Because what we want now, not we, but what they want, the elites, who you can see with faces and names and surnames in all these meetings around the world, is that they want a new humanity. A more perfect humanity. Transhumanism is defined as a process of human enhancement through the application of technologies into human beings and enhancement in terms of intellectual, physical, cognitive, and even moral enhancement. Transhumanists will say that this is positive eugenics. That this is not negative eugenics. Hitler was mean because that was (about) negative eugenics. He (im)posed on people against their will. This idea is being pushed and deconstruction of reality of human beings, the nature of human beings denied. The Fourth Industrial Revolution is transhumanism turned into global public policy.

At some point, decision-making powers from individuals will be outsourced to algorithms. So, in the future we might not even need elections because the algorithms will decide. The gradual transition of decision-making powers from humans to algorithms. People might think, oh, that's science fiction. It might not be science fiction because the algorithms that are being developed are so powerful that they might replace human decision-making powers.

What I see is the gradual outsourcing of human reproduction, in all its stages, to technology. (This) means that (they) have full control of the numbers and full control over the type of human being that is going to come out. To get a glimpse of this world, it's a world which is fully automatized, where everything is measured, where emotions are replaced by numbers, and rankings, and indicators,. We live as units."

Dr. Miklos Lukacs, Ph.D., Professor, historian, philosopher

6) They openly state it: they are heading towards the extinction of the human race and changing it into something else, something that is more of a computer…

Johnny Vedmore, researcher and podcaster

(*) In this website, drawing upon the work of many others, I identify the "deep church" as Judeo-Masonic-satanists.

(**) There it is in black and white. The 1859 secret letter, The Alta Vendita Masonic lodge, proclaims it the mission of Freemasonry to establish the reign of the "chosen ones" (i.e., the Jews) on the throne of the prostitute of Babylon!!!!! And they also outline the primary strategy by which they intend to accomplish this goal! Infiltrate, subvert, and destroy the Catholic Church and the moral order of society!

(***) Vigano defines the powers behind the "deep church"-"deep state" coup as 1) the Illuminati banking families, 2) the United Nations and associated agencies, 3) World Economic Forum, Bilderberg Group, and Club of Rome think tanks, 4) Mas

Webmaster Comment: it is interesting and curious to me that Vigano does not mention the group that the Masons have pledged to help to "reign on the throne of the prostitute of Babylon"- the chosen people themselves (aka Jews and "Synagogue of Satan") . However, based on information presented on this website, this core group (the Synagogue of Satan, Rev. 2:9 and 3:9) clearly directs the above mentioned 5 groups of co-conspirators. Furthermore, it should be noted that the conjoined "deep church" and "deep state" is most definitely conjoined with corporate, military, academic, medical, and organized crime sectors of society.

 

 

Gang Stalking Mind Control Cults
17 Sep 2022 | 8:58 pm

Vaccines as Vectors for the Installation of Nanotechnology: Evidence That Nano Receiving Antennas Are Being Inoculated Into the Human Body (Mik Anderson, 2021)


Vaccines as Vectors for the Installation of Nanotechnology: Evidence That Nano Receiving Antennas Are Being Inoculated Into the Human Body (Mik Anderson, 2021)

Vaccines as Vectors for the Installation of Nanotechnology: Evidence That Nano Receiving Antennas Are Being Inoculated Into the Human Body

Vaccines as Vectors for the Installation of Nanotechnology: Evidence That Nano Receiving Antennas Are Being Inoculated Into the Human Body

Evidence Found That Would Confirm the Theory of Nano-Networks Centered in the Human Body: Nano-Rectennas

by Mik Andersen, Corona2Inspect
published in Spanish December 16, 2021
rough translation via translation software

Research on nanocommunication networks for nanodevices inoculated in the human body continues to accumulate evidence. On this occasion, the article by the researchers (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018) is presented entitled "Nanoredes centered in the body driven by nano-Rectenna in the terahertz band = Nano- rectenna powered body-centric nano-networks in the terahertz band" which confirms the theory that Corona2Inspect had been studying through the observation of the images of the samples of the c0r0n @ v | rus vaccines obtained by the doctor (Campra, P. 2021). Nano-arrays centered on the human body require the use of nano-antennas that operate in the terahertz band, these being the same type as those found in the vaccine samples ..

In the literature, these plasmonic nano-antennas are also called bowtie antennas or "bowties antenna" and in the article in question they are called "nano-rectennas". The explicit mention of the type of antenna and the technology of intra-body nano-networks, would confirm that vaccines are, among other things, vectors for the installation of nanotechnology, or nanodevices in the human body. However, beyond the pure coincidence, the authors make explicit the use of graphene and carbon nanotubes, as necessary elements for this network model, elements that were also identified in the images taken by Dr. Campra and that coincide with the presence of graphene in its technical report with spectroscopy. Micro-Raman.

To what has already been described, the article adds that the method of communication and data transmission in nano-networks is carried out through TS-OOK signals (sequences of pulses that transmit binary codes), which matches with studies and protocols of nanocommunications and would endorse all the research carried out by Corona2Inspect so far on this matter.

If what has been explained is not enough to confirm the theory of intracorporeal communication nano-networks, the article by (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018) makes explicit the use of nano-sensors that are linked by means of electromagnetic signals, by means of the aforementioned nano-rectennas or bow tie nano-antennas, which necessarily evidences the presence of nano-routers that serve to manage the intra-body and out-of-body data link, with gateways (gateway) such as mobile phone. Given the importance of the content of the article, it will be dissected in detail.
Article analysis

The research object of the work of (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018) is the comparative analysis of the energy harvesting capacities of nano-rectennas, aimed at their implementation in networks wireless nanodevices and intra-body nanotechnology. This is reflected in the introduction of the article as follows "in the field of health applications, the objective is to develop a network of therapeutic nanodevices that is capable of working in the human body or within it to support the monitoring of the immune system, health monitoring, drug delivery systems and biohybrid implants ". This leaves no doubt that nano-antennas, here called nano-rectennas, necessarily imply the presence of a network of nanodevices or nanotechnology aimed at controlling the biological variables and factors of people.

Furthermore, (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018) state that "There are two main approaches to nanoscale wireless communications, namely, molecular and electromagnetic (EM) communications (Akyildiz, IF; Jornet, JM 2010). The latter commonly operates in the terahertz (THz) band (0.1-10 THz) and is a promising technique to support data exchange in nanosensor networks for healthcare applications or body-centered nano-networks. For the expected size of nanosensors, the frequency radiated by their antennas would normally be in the optical range, resulting in a very large channel attenuation that could make nanoscale wireless communication unfeasible. To overcome this limitation, graphene-based antennas have been developed, which are able to resonate in the THz band with sizes of a few 𝜇𝑚, at a frequency up to two orders of magnitude lower than a metallic antenna of the same dimensions".

This explanation corroborates the two types of intra-body communication , the molecular type used for monitoring and neuromodulation of neuronal tissue and the central nervous system ( Akyildiz, IF; Jornet, JM; Pierobon, M. 2011 | Malak, D.; Akan, OB 2012 | Rikhtegar, N.; Keshtgary, M. 2013 | Balasubramaniam, S.; Boyle, NT; Della-Chiesa, A.; Walsh, F.; Mardinoglu, A.; Botvich, D.; Prina-Mello , A. 2011) and electromagnetic, conceived for the control of biological variables and factors in the rest of the body, by means of nano-nodes (also known as nano-devices, nano-biosensors, etc.).

It also corroborates the operating band in which the intra-body nano-network is operating, in a range of 0.1-10 THz, confirmed in this blog according to (Abbasi, QH; Nasir, AA; Yang, K.; Qaraqe, KA ; Alomainy, A. 2017 | Zhang, R.; Yang, K.; Abbasi, QH; Qaraqe, KA; Alomainy, A. 2017 | Yang, K.; Bi, D.; Deng, Y.; Zhang, R. ; Rahman, MMU; Ali, NA; Alomainy, A. 2020). It also addresses the fact that the scale of the nano-devices, nano-sensors of the network forces to "resonate the THz band" by means of special antennas of a few microns (𝜇𝑚), but with the ability to retransmit signals and in turn of harvesting energy to run the grid. These special properties are achieved through the plasmonic effect given by the nanoantennas scale, which confers special physical and quantum properties to these objects, as explained in (Jornet, JM; Akyildiz, IF 2013 | Nafari, M.; Jornet, JM 2015 | Guo , H.; Johari, P.; Jornet, JM; Sun, Z. 2015 ).

In the introductory dissertation, (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018) mention a substantial aspect "the exchange of information between implantable [injectable] nanosensors is the most significant, since it allows control and monitoring the release or flux of molecular, biochemical compounds, and other important functions within the human body." The relevance of this statement is crucial since it assumes that nanodevices have to be installed, injected or implanted in the human body, but also that it is necessary to receive their signals and data generated to carry out the corresponding monitoring, even at the level of molecular flow and biochemical compounds, such as neurotransmitters produced by neuronal tissue or the nervous system ( Abd-El-atty, SM; Lizos, KA; Gharsseldien, ZM; Tolba, A.; Makhadmeh, ZA 2018).

This explains the need to introduce graphene, carbon nanotubes and derivatives to capture these signals and bio-electrical markers to capture the information, but also a wireless nano-network, which allows transmitting this data outside the human body. Therefore, it must be understood that the nano-antennas or nano-rectennas in charge of repeating the signals could not only do it from the inside out, being able to carry out the reverse process, altering the neuronal synapse, for example.

Likewise, (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018) state that a relevant problem in intra-body nano-networks is the availability of energy (Bouchedjera, IA; Aliouat, Z.; Louail , L. 2020 | Fahim, H.; Javaid, S.; Li, W.; Mabrouk, IB; Al-Hasan, M.; Rasheed, MBB 2020 ), for which efficient routing protocols and processes have been developed ( Sivapriya, S.; Sridharan, D. 2017 | Piro, G.; Boggia, G.; Grieco, LA 2015 ) that make the operation of the nano-network plausible. For the purposes of nano-antennas or nano-rectennas, Rong and his team state the following: "One of the biggest challenges in body-centered nanogrids is caused by the very limited energy storage of a nano battery … Since electromagnetic waves carry not only information but also energy, rectenins can operate at THz and frequencies. microwave, allowing them to work overnight. Since electromagnetic waves carry not only information, but also energy ( Varshney, LR 2008 ), nano-rectennas can share the same signal that is used to carry information within nano-networks. As a result, simultaneous wireless information and power transfer (SWIPT) becomes a critical technique for powering nanogrids and is a promising solution to power bottlenecks … A major advantage of the The technique is that the proposed nano-rectennas are capable of converting an EM signal into a direct current without any external power supply of the system. In addition, achievable energy conversion achieves approximately 85% efficiency.".

These statements are fundamental to confirm that EM electromagnetic waves, or what is the same microwave, serve to transport energy and data simultaneously, being able to do so in the THz band compatible with the intra-body wireless network.

This confirms what has been explained in the entry on nanocommunication networks for nanotechnology in the human body, published on this blog. This ambivalent phenomenon of transporting energy and data is known by the acronym SWIPT, which allows us to infer that nano-antennas or nano-rectennas have this property. In fact, the authors affirm its ability to convert an EM signal into direct current without external power, with a very high efficiency, which would explain why enough energy was generated and probably stored to make the intra-body network work. In fact, according to (Zainud-Deen, SH; Malhat, HA; El-Araby, HA 2017) nanoantennas with a geometric diode such as bow tie or other polygonal type, based on graphene, not only collect energy from electromagnetic waves EM ( microwave), they can also do it with the infrared spectrum (El-Araby, HA; Malhat, HA; Zainud-Deen, SH 2017 | 2018), which guarantees a constant flow of energy.

On the other hand, (Rong, Z .; Leeson, MS; Higgins, MD; Lu, Y. 2018) define the concept of rectenna as "a combination of an antenna and a rectifier device, generally a diode, with the purpose of collecting energy in and to the nanowires, so that the EM waves are received by a nano antenna and then coupled to a rectifier … this makes it possible for them to be used to harvest energy from THz and higher frequencies. How nano-sized antennas operate In the THz band, their associated rectifier diodes need a fast response so that they can react properly to the incoming signal and deliver a DC (Direct Current) signal … The rectifier can collect energy from the THz signal or from residual energy in the environment".

However, it is known that rectennas are also capable of transmitting and collecting energy and data in the GHz band as explained in the work of ( Suh, YH; Chang, K. 2002 | Abdel-Rahman, MR; Gonzalez, FJ; Boreman, GD 2004 ) .In this regard, the work of ( Khan, AA; Jayaswal, G .; Gahaffar, FA; Shamim, A. 2017, should also be highlighted .) in which it is shown that nano-rectennas are capable of collecting energy from environmental radio frequency (RF) for which they use tunneling diodes, which hardly consume energy during the process of conversion to direct current. These tunneling diodes also known as MIM (metal-insulator-metal) diodes can provide zero bias rectification, allowing it to operate in a frequency range between 2-10GHz, allowing it to adapt to input impedance.

In fact, Khan and his team state that "Although the real advantage of MIM diodes is the high frequencies (THz range), their zero-bias rectification ability can also be beneficial for collecting and wireless feeding at RF frequencies. .. Characterization of DC (Direct Current) indicated that the MIM diode could provide a zero bias responsiveness of 0.25V -1 with a decent dynamic resistance of 1200 Ω (Ohms). The metal-insulator-diode-metal RF (Radio Frequency) characterization was performed using two methods: 1) S parameter measurements (Diode tunnel barrier thickness) from 500MHz to 10 GHz, and 2) RF rectification to DC with zero polarization. The presented input impedance results may be useful for integrating MIM diodes with antennas for harvesting applications. The second part of the RF characterization verified the rectification of RF to DC zero bias."

In other words, the researchers confirm that nano-rectennas can operate in lower frequency ranges and even by radio frequency, which explains that it makes them the ideal method for powering wireless nano-networks and their connection applications. to the IoNT (Internet of NanoThings).

Returning to the analysis of (Rong, Z.; Leeson, MS; Higgins, MD; Lu, Y. 2018), his work addresses the comparison of two types of rectenins oriented to intra-body nano-networks. One of them is nano-rectena based on carbon nanotubes, which matches with the identifications observed in the vaccine samples . In this sense, Rong and his team cite the work of (Sharma, A.; Singh, V.; Bougher, TL; Cola, BA 2015) who proposed the rectennas of CNT (Carbon Nanotubes) "which consisted of millions of nanotubes that functioned as nano antennas, with their tips made of Insulator-Metal (IM) to behave like diodes. The CNT rectennas showed great potential for body-centered nanodevice applications and wireless EM energy harvesting."

This could confirm that the observed carbon nanotubes and plasmonic nanoantennas are intended, among others, to deliver energy. To the nano-network installed with the different inoculations of the vaccine, an aspect that would explain the need for several doses to complete the basic supply of energy for its perpetual operational maintenance. Abundant in the carbon nanotube rectennas, it is also stated that "When CNTs absorb EM radiation, a direct current will be generated after rectification across the tip area. This converted current is used to charge a capacitor. The process of conversion to DC (Direct Current) is carried out using the THz signal within the system and environmental free EM, so the power source of such a nano-rectenna generator does not need another specific external power source." Which suggests that no other components are required to function.

In addition to CNT nano-rectennas, (Rong, Z .; Leeson, MS; Higgins, MD; Lu, Y. 2018) compare them with their main proposal, bow tie nano-rectennas "dipole nano-rectennas have been proposed bow tie, with two triangular sections. The thickness of the antenna is 100 nm, and nano diodes, made of graphene located in the middle of the hole area of ​​the bow tie antenna, producing the action of the rectena. Additionally, can connect to form a nano-rectilinear array or array. The bowtie dipole antenna receives EM radiation and converts the signal into AC (alternating current) flux to the nano diode. The diode then rectifies the AC (alternating current) into current continue DC ".

This would confirm the type of Plasmon nano-antennas observed in the vaccine samples , as well as the graphene material used as a link between their triangular sections, which matches with the presence of graphene detected by Campra in the vaccines . Another relevant detail is also provided, nano-rectennas can operate in a matrix or array, which means that thousands of them can operate, as stated by Rong and his team "As the output power of a single rectenine is 0.11 nW (approximately), if we use an array of these lines, the power and size required by the nano-network can be satisfied … More elements connected in series can increase the production of current and power ".

This is demonstrated in the work of ( Aldrigo, M .; Dragoman, M. 2014 ) entitled "Nano-rectennas based on graphene in the far infrared frequency band where it is explained that nano-rectennas are capable of collecting human heat in the infrared frequency band, and that the The proposed model is encouraging "both in terms of the rectified current of a single nano-receptor, as well as the power rectified by a macro-system that combines thousands of nano-cells". Which leaves no doubt that nano-rectennas are not an isolated component, in fact they are more common and numerous than might be thought a priori. Perhaps one dose of the vaccine involves thousands or perhaps millions of nano-rectennas, depending on its scale.

Rong's article continues to provide very relevant keys, this time in relation to the CNT rectennes, indicating that "the output voltage generated by the CNT rectena is of the order of tens of millivolts … the channel access scheme for the communications will be based on femtosecond pulses to the nanowire … the digits 1 (of the binary code) are transmitted using pulses of 100𝑓𝑠, this is a long pulse, while the digits 0 are transmitted as silence … as the time The separation between adjacent bits is 1000 times the pulse duration (Ts = 100ps), the average power will return to the nW level. Therefore, the output power of the CNT rectenna is able to satisfy the power requirements of the system (from the nanoret)".

This statement confirms what was already investigated in Corona2Inspect, nanogrids operate with TS-OOK signals for the transfer of data packets (see nanocommunication networks for nanotechnology in the human body , CORONA system for nanogrids , nanorouters , nanogrids software electromagnetic ) due to their simplicity and reduced energy consumption. Furthermore, it confirms that carbon nanotubes can operate in the transmission of signals and data, as well as the collection of energy, as was suggested in the entry on nano octopuses and carbon nanotubes of this blog .

According to Rong's calculations, "For a rectenna CNT device, the maximum reported output voltage is 68 mV and for a 25-element rectenna bowtie array it is 170 mV. Therefore, according to (9), the rectena matrix bowtie (bow tie) delivers more charge than rectena CNT … when these two rectena devices are used to charge the same ultra-nano capacitor (9nF), it is evident that rectena CNT takes longer (more than 6 minutes) due to its very high junction resistance. Whereas for the rectena bow tie, the resistance is comparatively very small, so it only takes about 6 ms to supply more power to the capacitor". This explanation is very important when comparing the two types of rectenna for intra-body nano-networks.

Arrayed bow tie nano-rectennas present better performance than those based on carbon nanotubes, taking a nano-capacitor to charge in only 6 milliseconds. This would explain the presence of these components in the vaccine samples, at micro and nano-scale. In addition, the allusion to the ultra-nanocapacitors used to perform the load test is relevant. Capacitors are passive electrical devices capable of of storing energy by maintaining an electric field.

This could lead to the question: Where is energy stored in intra-body nano-grids?

The answer is very simple, in an abundant and recognized material in vaccines, this is graphene itself. act as capacitors, as shown in the work of ( Bai, J .; Zhong, X .; Jiang, S .; Huang, Y .; Duan, X. 2010 ), because "the graphene sheets nanoribbons with widths less than 10 nm can open a band gap large enough for operation as transistor at room temperature". This is de facto what allows the generation of a magnetic field, as a result of the electrical charge transmitted by the nano-rectennas.

This would explain the phenomenon of magnetic arms (among other parts of the body) after inoculation of the vaccines. In fact, if you look at figure 5, a nano-mesh (made of graphene) similar to that found in the scientific literature can be seen blurred, which could act as a condenser. In many cases, these shapes were found around polygonal, quadrangular objects. and nano-antennas, which seems to make sense to provide an energy carryover for nano-grids.

Finally, among the conclusions, Rong and his team highlight the following "Along with the continuous advancement of the SWIPT technique ( simultaneous wireless information and power transfer) , the pioneering CNT matrix receiver and the nano-matrix bowtie (bowtie) open the door for wireless nano-sensor powering. Since a nano-rectenna is capable of powering nanosensors without any external source and its broadband property allows rectenna to be a very efficient and promising way to power implanted nanodevices and in the human body. CNT's rectenna array can successfully deliver the required human body-centric wireless nano-network power, estimated to be around 27.5 nW. Also, the bow tie rectifier array is much smaller in size, but provides similar power … Although nano-rectenins cannot provide such a high voltage compared to a piezoelectric nanogenerator, an array of nano-rectennas bowtie (bowtie) is much more efficient producing in addition DC (Direct Current) directly from the THz signal within the system (the human body) and the environmental EM signal without any other external power source of the system".

This seems to make it clear that this type of nano-antennas are the appropriate ones, if what is desired is to install intra-corporal nano-networks of nanodevices and nanosensors. Therefore, a very sharp deduction is not necessary to realize that the The presence of plasmonic nano-antennas in the vaccine samples, whether in the shape of a bow tie or cube, or a prism, as has been observed, are clear evidence of the presence of undeclared nanotechnology.

Bibliography

Abbasi, QH; Nasir, AA; Yang, K .; Qaraqe, KA; Alomainy, A. (2017). Cooperative in-vivo nano-network communication at terahertz frequencies. IEEE Access, 5, pp. 8642-8647. https://doi.org/10.1109/ACCESS.2017.2677498
Abd-El-atty, SM; Lizos, KA; Gharsseldien, ZM; Tolba, A .; Makhadmeh, ZA (2018). Engineering molecular communications integrated with carbon nanotubes in neural sensor nanonetworks. IET Nanobiotechnology, 12 (2), 201-210. https://ietresearch.onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-nbt.2016.0150
Abdel-Rahman, MR; Gonzalez, FJ; Boreman, GD (2004). Antenna-coupled metal-oxide diodes for dual-band detection at 92.5 GHz and 28 THz = Antenna-coupled metal-oxide-metal diodes for dual-band detection at 92.5 GHz and 28 THz. Electronics Letters, 40 (2), pp. 116-118. https://sci-hub.mksa.top/10.1049/el:20040105
Akyildiz, IF; Jornet, JM (2010). Electromagnetic wireless nanosensor networks = Electromagnetic wireless nanosensor networks. Nano Communication Networks, 1 (1), pp. 3-19. https://doi.org/10.1016/j.nancom.2010.04.001
Akyildiz, IF; Jornet, JM; Pierobon, M. (2011). Nanonetworks: a new frontier in communications = Nanonetworks: A new frontier in communications. Communications of the ACM, 54 (11), pp. 84-89. https://doi.org/10.1145/2018396.2018417
Aldrigo, M .; Dragoman, M. (2014). Graphene-based nano-rectenna in the far infrared frequency band = Graphene-based nano-rectenna in the far infrared frequency band. In: 2014 44th European Microwave Conference (pp. 1202-1205). IEEE. https://doi.org/10.1109/EuMC.2014.6986657 | https://sci-hub.mksa.top/10.1109/eumc.2014.6986657
Bai, J .; Zhong, X .; Jiang, S .; Huang, Y .; Duan, X. (2010). Graphene nano-mesh = Graphene nanomesh. Nature nanotechnology, 5 (3), pp. 190-194. https://doi.org/10.1038/nnano.2010.8 | https://sci-hub.mksa.top/10.1038/nnano.2010.8
Balasubramaniam, S .; Boyle, NT; Della-Chiesa, A .; Walsh, F .; Mardinoglu, A .; Botvich, D .; Prina-Mello, A. (2011). Development of artificial neuronal networks for molecular communication. Nano Communication Networks, 2 (2-3), pp. 150-160. https://doi.org/10.1016/j.nancom.2011.05.004
Bouchedjera, IA; Aliouat, Z .; Louail, L. (2020). EECORONA: Energy Efficiency Coordinate and Routing System for Nanonetworks = EECORONA: Energy Efficiency Coordinate and Routing System for Nanonetworks. In: International Symposium on Modeling and Implementation of Complex Systems. Cham. pp. 18-32. https://doi.org/10.1007/978-3-030-58861-8_2
Campra, P. (2021). Detection of graphene in COVID19 vaccines by Micro-RAMAN spectroscopy. https://www.researchgate.net/publication/355684360_Deteccion_de_grafeno_en_vacunas_COVID19_por_espectroscopia_Micro-RAMAN
El-Araby, HA; Malhat, HA; Zainud-Deen, SH (2017). Performance of nanoantenna-coupled geometric diode with infrared radiation = Performance of nanoantenna-coupled geometric diode with infrared radiation. In: 2017 34th National Radio Science Conference (NRSC) (pp. 15-21). IEEE. https://doi.org/10.1109/NRSC.2017.7893471 | https://sci-hub.mksa.top/10.1109/NRSC.2017.7893471
El-Araby, HA; Malhat, HA; Zainud-Deen, SH (2018). Nanoantenna with geometric diode for energy harvesting. Wireless Personal Communications, 99 (2), pp. 941-952. https://doi.org/10.1007/s11277-017-5159-2
Fahim, H .; Javaid, S .; Li, W .; Mabrouk, IB; Al-Hasan, M .; Rasheed, MBB (2020). An efficient routing scheme for intrabody nanonetworks using artificial bee colony algorithm. IEEE Access, 8, pp. 98946-98957. https://doi.org/10.1109/ACCESS.2020.2997635
Guo, H .; Johari, P .; Jornet, JM; Sun, Z. (2015). Intra-body optical channel modeling for in vivo wireless nanosensor networks = Intra-body optical channel modeling for in vivo wireless nanosensor networks. IEEE transactions on nanobioscience, 15 (1), pp. 41-52. https://doi.org/10.1109/TNB.2015.2508042
Jornet, JM; Akyildiz, IF (2013). Graphene-based plasmonic nano-antenna for terahertz band communication in nanonetworks = Graphene-based plasmonic nano-antenna for terahertz band communication in nanonetworks. IEEE Journal on selected areas in communications, 31 (12), pp. 685-694. https://doi.org/10.1109/JSAC.2013.SUP2.1213001
Jornet, JM; Akyildiz, IF (2014). Long femtosecond pulse-based modulation for terahertz band communication in nanonetworks = Femtosecond-long pulse-based modulation for terahertz band communication in nanonetworks. IEEE Transactions on Communications, 62 (5), pp. 1742-1754. https://doi.org/10.1109/TCOMM.2014.033014.130403
Khan, AA; Jayaswal, G .; Gahaffar, FA; Shamim, A. (2017). Metal-insulator-metal diodes with sub-nanometer surface roughness for energy-harvesting applications. Microelectronic Engineering, 181, pp. 34-42. https://doi.org/10.1016/j.mee.2017.07.003
Malak, D .; Akan, OB (2012). Molecular communication nanonetworks inside human body. Nano Communication Networks, 3 (1), pp. 19-35. https://doi.org/10.1016/j.nancom.2011.10.002
Nafari, M .; Jornet, JM (2015). Metallic plasmonic nano-antenna for wireless optical communication in intra-body nanonetworks. In: Proceedings of the 10th EAI International Conference on Body Area Networks (pp. 287-293). https://doi.org/10.4108/eai.28-9-2015.2261410
Piro, G .; Boggia, G .; Grieco, LA (2015). On the design of an energy-harvesting protocol stack for Body Area Nano-NETworks. Nano Communication Networks, 6 (2), pp. 74-84. https://doi.org/10.1016/j.nancom.2014.10.001
Reed, JC; Zhu, H .; Zhu, AY; Li, C .; Cubukcu, E. (2012). Graphene-enabled silver nanoantenna sensors = Graphene-enabled silver nanoantenna sensors. Nano letters, 12 (8), pp. 4090-4094. https://doi.org/10.1021/nl301555t
Rikhtegar, N .; Keshtgary, M. (2013). A brief review on molecular and electromagnetic communications in nano-networks = A brief survey on molecular and electromagnetic communications in nano-networks. International Journal of Computer Applications, 79 (3). https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.8701&rep=rep1&type=pdf
Rong, Z .; Leeson, MS; Higgins, MD; Lu, Y. (2018). Body-centered nano-networks powered by nano-Rectena in the terahertz band = Nano-rectenna powered body-centric nano-networks in the terahertz band. Healthcare technology letters, 5 (4), pp. 113-117. https://dx.doi.org/10.1049/htl.2017.0034 | https://www.researchgate.net/publication/322782473_Nano-Rectenna_Powered_Body-Centric_Nanonetworks_in_the_Terahertz_Band | https://sci-hub.mksa.top/10.1049/htl.2017.0034
Sharma, A .; Singh, V .; Bougher, TL; Cola, BA (2015). Carbon nanotube optical rectenna = A carbon nanotube optical rectenna. Nature nanotechnology, 10 (12), pp. 1027-1032. https://doi.org/10.1038/nnano.2015.220
Sivapriya, S .; Sridharan, D. (2017). Energy Efficient MAC Protocol for Body Centric Nano-Networks (BANNET) = Energy Efficient MAC Protocol for Body Centric Nano-Networks. ADVANCED COMPUTING (ICoAC 2017), 422. https: //www.researchgate.net/profile/H-Mohana/publication/322790171 …
Suh, YH; Chang, K. (2002). High-efficiency dual-frequency rectenna for 2.45 and 5.8 GHz wireless power transmission = A high-efficiency dual-frequency rectenna for 2.45-and 5.8-GHz wireless power transmission. IEEE Transactions on Microwave Theory and Techniques, 50 (7), pp. 1784-1789. https://doi.org/10.1109/TMTT.2002.800430 | https://sci-hub.mksa.top/10.1109/TMTT.2002.800430
Varshney, LR (2008). Transporting information and energy simultaneously = Transporting information and energy simultaneously. In: 2008 IEEE international symposium on information theory (pp. 1612-1616). IEEE. https://doi.org/10.1109/ISIT.2008.4595260
Yang, K .; Bi, D .; Deng, Y .; Zhang, R .; Rahman, MMU; Ali, NA; Alomainy, A. (2020). A comprehensive survey on hybrid communication in context of molecular communication and terahertz communication for body-centric nanonetworks. IEEE Transactions on Molecular, Biological and Multi-Scale Communications, 6 (2), pp. 107-133. https://doi.org/10.1109/TMBMC.2020.3017146
Yang, K .; Pellegrini, A .; Munoz, MO; Brizzi, A .; Alomainy, A .; Hao, Y. (2015). Numerical analysis and characterization of THz propagation channel for body-centric nano-communications. IEEE Transactions on Terahertz Science and technology, 5 (3), pp. 419-426. https://doi.org/10.1109/TTHZ.2015.2419823
Zainud-Deen, SH; Malhat, HA; El-Araby, HA (2017). Energy harvesting enhancement of nanoantenna coupled to geometrie diode using transmitarray. In: 2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC) (pp. 152-155). IEEE. https://doi.org/10.1109/JEC-ECC.2017.8305799 | https://sci-hub.mksa.top/10.1109/JEC-ECC.2017.8305799
Zhang, R .; Yang, K .; Abbasi, QH; Qaraqe, KA; Alomainy, A. (2017). Analytical characterization of the terahertz in-vivo nano-network in the presence of interference based on TS-OOK communication scheme. IEEE Access, 5, pp. 10172-10181. https://doi.org/10.1109/ACCESS.2017.2713459

Connect with Corona2Inspect / Follow Corona2Inspect on Telegram

website no use cookies, no spying, no tracking
to use the website, we check:
country: US · city: · ip: 3.236.52.68
device: computer · browser: CCBot 2 · platform:
counter: 1 · online:
created and powered by:
RobiYogi.com - Professional Responsive Websites
00:00
00:00
close
 please wait loading data...