5 Mind-Blowing Spying Technologies ~ Corbett Report


Read the article: https://www.corbettreport.com/?p=17904

Scientists and engineers can spend years of their lives in painstaking trial-and-error experimentation to develop a breakthrough new technology…and the military-industrial complex can find a way to militarize it in mere hours.

Sadly the military aren’t the only ones interested in the latest gadgets and inventions, though. The alphabet soup agencies are equally voracious for innovative new ways to spy on the public. Today let’s examine five of the most amazing technological breakthroughs…that are about to be turned into nightmarish spying tech.

Advertisements

The FBI Now Considers Animal Abuse a Class A Felony


By VICE News

January 7, 2016 | 9:55 am

In a move seen as a big win for animal rights activists, the FBI has added animal cruelty to its list of Class A felonies, alongside homicide and arson.

Cases of animal cruelty fall into four categories — neglect; intentional abuse and torture; organized abuse, such as cock and dog fighting; and sexual abuse of animals — and the agency is now monitoring them as it does other serious crimes. Starting January 1, data is being entered into the National Incident-Based Reporting System or NIBRS, the public database the FBI uses to keep a record of national crimes.

The FBI’s decision will not only be a way to stop cases of animal abuse but also can help to identify people who might commit violent acts, according to the Christian Science Monitor. Psychological studies show that nearly 70 percent of violent criminals began by abusing animals, and keeping statistics on such cases can help law enforcement track down high-risk demographics and areas.

“Regardless of whether people care about how animals are treated, people – like legislators and judges – care about humans, and they can’t deny the data,” Natasha Dolezal, director of the animal law program in the Center for Animal Law Studies at Lewis & Clark College, in Portland, Oregon, told the Associated Press.

Animal abuse is already a felony in 13 states and in Washington, DC., but it had been previously classified with other miscellaneous crimes, making it impossible to get a handle on the patterns of animal-abuse crimes.

The move to begin tracking cases of animal abuse is a “huge policy shift and significant step forward,” Scott Heiser, a lawyer with the Animal Defense League, told the Washington Post.

The FBI announced the change in 2014 but only began collecting data as of this month. The information will be publicly available in the coming year, the FBI said.

https://news.vice.com/article/the-fbi-now-considers-animal-abuse-a-class-a-felony

 

The FBI is Responsible for More Terrorism Plots In the United States Than Any Other Organization. More Than Al Qaeda, More Than Al Shabaab, More Than the Islamic State, More Than All Of Them Combined


From: washingtonsblog.com

Investigative reporter Trevor Aaronson- executive director of the Florida Center for Investigative Reporting, author of The Terror Factory: Inside the FBI’s Manufactured War on Terrorism – has spent years researching and writing about FBI terrorism “stings” on mentally retarded and destitute Muslims orchestrated by informants convicted of rape and child molestation, who make some $100,000 per sting.

Aaronson notes:

The FBI is responsible for more terrorism plots in the United States than any other organization. More than al Qaeda, more than al Shabaab, more than the Islamic State,more than all of them combined.

***

I’ve spent years pouring through the case files of terrorism prosecutions in the United States, and I’ve come to the conclusion that the FBI is much better at creating terrorists than it is at catching terrorists.


Aaronson points out that the FBI hasn’t denied his reports:

We used the court file to find out whether the defendants had any connections to international terrorist groups, whether an informant was used, and whether the informant played the role of an agent provocateur by providing the means and opportunity. And we submitted that to the FBI and we asked them to respond to our database. If they believed there were any errors, we asked them to tell us what they were and we’d go back and check and they never challenged any of our findings. Later, I used that data in a magazine article and later in my book, and on appearances on places like CBS and NPR, they were offered that opportunity again to say, “Trevor Aaronson’s findings are wrong.” And they’ve never come forward and said, “These are the problems with those findings.” So the data has since been used by groups like Human Rights Watchon its recent report on these types of sting operations. And so far, the FBI has never really responded to these charges that it’s really not catching terrorists so much as it’s catching mentally ill people that it can dress up as terrorists in these types of sting operations.


And see this

Clinton and Bush’s top counter-terrorism czar – Richard Clarke – >said:

A lot of the cases after 9/11 were manufactured or enormously exaggerated and were announced with great trumpets by the attorney general and the FBI director so that we felt that they were doing something when, in fact, what they were doing was not helpful, not relevant, not needed.


noted in 2011:

The Washington Post ran a story about one alleged threat entitled “Was it a terror sting or entrapment?“, showing that the U.S. government lent material support to the wanna-be terrorists, and put violent ideas in their heads

Raw Story reports that the alleged terrorist group that is alleged to have planned to blow up Chicago’s Sears Tower was non-violent before a government informant infiltrated the group and planted violent ideas in their heads

PBS’ Frontline ran a special report focusing on the the alleged Al Qaeda plot in Lodi, California, which showed — based upon interviews with top law enforcement officials involved in the case — thatthe bust amounted to little more than entrapment and coerced and fabricated confessions from two men who, in fact, had nothing to do with the terrorist group

There are numerous other instances of entrapment of peaceful or mentally incompetent people who are then arrested as “terrorists”. For example, the “mastermind” of the terrorism plot was a self-confessed “pothead” , another was a crackhead, and that they were all semi-retarded. And see this,this and this

Source: washingtonsblog.com

Coutesy of: http://www.redicecreations.com/article.php?id=33466

Roswell, UFOs and Project Pandora by Nick Redfern


type

Well, now, this is interesting. In fact, it’s very interesting. Over at the Department of Defense’s website you can find a file that has been declassified via the Freedom of Information Act on the subject of Project Pandora (which, to a significant degree, was focused on Cold War secrets, and how microwaves can affect the mind and body).

It’s a fascinating file that dates back decades. It’s a lengthy file, too; it runs to nearly 500 pages and is comprised of a number of notable documents. But, here’s the weird thing, if you scroll down to page 449, you’ll see that it contains a copy of the controversial “MJ12/Eisenhower Briefing Document” on the Roswell UFO affair of 1947!

eisenhower_briefing01

Of course, as most people within Ufology know, the document is one that has been the subject of much debate regarding its authenticity or otherwise. Indeed, the copy of the EBD in the Pandora file has a hand-written note on it stating that: “This cannot be authenticated as an official DoD document.”

Well, that’s fair enough, and something that most people within Ufology would agree with – it has not been authenticated. But, here’s the issue, what is a copy of the EBD doing in a DoD file on Project Pandora? Let’s look at what we know.

One of the biggest problems surrounding the Roswell case is the almost complete lack of documentation to support the claims that anything crashed or landed on the Foster Ranch, Lincoln County in July 1947.

In 1987, however, the situation changed drastically. In that year,  Timothy Good’s best-selling book, Above Top Secret, was published. One of the most controversial aspects of the book was the discussion of a document that allegedly originated with a classified research and development group established by the U.S. Government in 1947 to deal with the incident at Roswell. It was – so the story goes – variously known as Majestic 12, MAJIC 12, and MJ12.

Classified “Top Secret/Majic Eyes Only,” the document can essentially be broken down into two parts. The first is a 1952 briefing prepared by Admiral Roscoe H. Hillenkoetter (the first Director of the CIA) for President-elect Eisenhower. It informed the president that an alien spacecraft was recovered at Roswell and briefed him on the MJ12 group, its activities and membership.

The second is a 1947 memorandum from President Harry Truman to Secretary of Defense James Forrestal, authorizing the establishment of MJ12.

Majestic-12

Shortly after Timothy Good published copies of the MJ12 documents in May 1987, additional copies surfaced publicly, this time in the United States, having been released by the research team of William Moore, Stanton Friedman and television producer, Jaime Shandera. Moore worked quietly with a number of intelligence insiders who contacted him in the wake of the publication of the 1980 book he co-authored with Charles Berlitz, The Roswell Incident.

From time to time, and under distinctly cloak-and-dagger circumstances, official-looking papers were passed on to Moore by his “Deep Throat”-like sources. The implication was that someone in the Government wished to make available to the UFO research community material – including pro-UFO data on Roswell – that would otherwise have remained forever outside of the public domain.

Needless to say, controversy raged (and still rages, albeit not on the same level) with regard to (A) the authenticity or otherwise of the documents; and (B) the circumstances under which they surfaced. Some favored the idea they were official documents, secretly leaked by insider sources connected to the intelligence community. Others, however, cried “Hoax!” While some suspected the documentation was possibly disinformation, designed to muddy the already dark waters of Roswell even further.

It wasn’t just the field of Ufology that was interested in the MJ12 saga. Officialdom sat up and took note of the notorious documents, too, as we shall now see.

In the autumn of 1988, an investigation of the MJ12 papers was conducted by the FBI’s Foreign Counter-Intelligence division. It operated out of Washington and New York. Some input into the investigation also came from the FBI office in Dallas, Texas.

On September 15, 1988, an agent of the Air Force Office of Special Investigations contacted Dallas FBI and supplied the Bureau with another copy of the MJ12 papers.  Then, on October 25, 1988, the Dallas office transmitted a two-page Secret Airtel to headquarters that read as follows:

“Enclosed for the Bureau is an envelope which contains a possible classified document. Dallas notes that within the last six weeks, there has been local publicity regarding ‘OPERATION MAJESTIC-12′ with at least two appearances on a local radio talk show, discussing the MAJESTIC-12 OPERATION, the individuals involved, and the Government’s attempt to keep it all secret.”

The writer of the Airtel continued:

“It is unknown if this is all part of a publicity campaign. [Censored] from OSI, advises that ‘OPERATION BLUE BOOK,’ mentioned in the document on page 4 did exist. Dallas realizes that the purported document is over 35 years old, but does not know if it has been properly declassified. The Bureau is requested to discern if the document is still classified. Dallas will hold any investigation in abeyance until further direction from FBIHQ.”

Partly as a result of the actions of the Dallas FBI Office, and partly as a result of the investigation undertaken by the FBI’s Foreign Counter-Intelligence people, on November 30, 1988 an arranged meeting took place in Washington D.C. between agents of the Bureau and those of AFOSI. If the AFOSI had information on MJ12, said the Bureau, they would like to know.

A Secret communication back to the Dallas office from Washington on December 2, 1988 read as follows:

“This communication is classified Secret in its entirety. Reference Dallas Airtel dated October 25 1988. Reference Airtel requested that FBIHQ determine if the document enclosed by referenced Airtel was classified or not. The Office of Special Investigations, US Air Force, advised on November 30, 1988, that the document was fabricated. Copies of that document have been distributed to various parts of the United States. The document is completely bogus. Dallas is to close captioned investigation.”

To reinforce the government’s conclusion that the documents were not genuine, official stamps and messages (some of the latter written in black-marker) were added to the copies of the MJ12 papers in the possession of both the USAF and the FBI and which reinforced the hoax conclusion.

briefcase

The copies of the MJ12 documents contained in the DoD’s Project Pandora file (as you will see in the link contained in the first line of this article) also have a similar message written on them, which reads: “This cannot be authenticated as an official DoD document.”

Logic suggests the message was written (probably) around the end of 1988, which is when the Air Force and the FBI were busily adding near-identical messages to their copies.

And, since various UFO researchers had filed Freedom of Information Act requests with all manner of official agencies for data on the MJ12 documents, it makes sense that the DoD would have had copies on file, too, as well as AFOSI and the FBI.

With that all noted, let’s take a closer look at Project Pandora.

Exopaedia notes of the program that, in the early 1960s, “…the CIA discovered that the US embassy in Moscow was ‘bombarded’ with EMR (electro magnetic radiation). The signal was composed of several frequencies. The Pandora Project was intended to investigate and gather data on this Russian experiment. The embassy personnel was not informed of the existence of the beam, or of the Pandora project.”

Exopaedia continues that, “the signal was intended to produce blurred vision and loss of mental concentration. Investigation on the effects on the embassy personnel, however, showed that they developed blood composition anomalies and unusual chromosome counts. Some people even developed a leukemia-like blood disease.”

So, what we have here is a file on a program that dates back to the early 1960s and which was focused on major concerns that the Soviets were up to no good – as they clearly were. But, even so, that still does not provide the answer to an important question: why is a very controversial, questionable, document on dead aliens, crashed UFOs, and an allegedly highly-classified project to investigate both, contained in a DoD file on that old, Cold War operation instigated by the Russians?

I have no real answers to what we might term “The Mystery of Microwaves and MJ12.” Maybe someone out there knows.

Time-wise, however, this is all very interesting. My newly-published book, Close Encounters of the Fatal Kind, includes a chapter titled “The Microwave Incident.” It deals with the mysterious and controversial death of a man who was involved in a 1965 UFO event that may actually have been fabricated, via the use of mind-altering/warping technologies. The alleged cause of the death in the faked, flying saucer encounter? An over-use of microwave technology.

Source: http://mysteriousuniverse.org/2014/07/roswell-ufos-and-project-pandora/

Courtesy of:

Red Ice Creations

Following World Change

Rob Marquis Update – January 2nd 2014 Hearing and Call for Support (North Carolina)


Saturday, December 28, 2013

Updated 12.28.2013 2:07pm – I did receive specific information for his Hearing, see the update below. 

Rob’s story begins in these posts here:

Acting as a Sovereign: The Chair of Saint Peter – Creditor to Bankruptcy of THE CITY OF DETROIT

In-Joy, The Show 2/3 Oct 2013 8pm EST – Special Guest Robert Marques Chair of Saint Peter


This is a message from Lori Marques today, about Rob Marques and what is going on with him now:Hello Judy hope you had a very merry Christmas and a fabulous birthday… I have an update if you could share that would be great. Rob was sent to Annapolis and at that meeting the states attorney told Rob “well if we don’t send you to SC then then SC can sue MD so sign the waiver and deal with the charges down there. My brother asked if he was a public servant and he him hauled around the question and said “well kind of”.. Needles to say the corruption goes very high up the ladder. They sent rob back to Washington county as hr would not sign. I have an email from my parents I would like you to share. Were asking for lots of energy for robs Jan 2 court date. Rob is now very confident and ready to move forward he just needs a little help from the people. I love and appreciate you and all the others who are holding him in the light as he is truly trying to help free everyone by going through this experience..

Hi Everyone; I hope you all had a wonderful Christ-mas. It is time once more for another re-consideration hearing in Washington County District Court for Rob on Jan 2@ 1Pm. Rob has asked this one last time for your support at the hearing. The FBI has been contacted and is aware of Robs situation. Hopefully, they will visiting Rob soon for an interview. If FBI does not get to interview him by Jan 2.., (which i doubt they will not) he is planning on opening up the court in original jurisdiction. We are inviting the FBI to witness the proceedings and I may even call the media to sit in. The FBI has been Noticed of Robs status as a Diplomat and is under the protection of Title 18. The courts and the warden have been carbon copied on the documents that were sent to the FBI.
We have all been 1st hand witnesses of what happens when Rob and witnesses enter the court room. This time.. some of us will not remain silent and say nothing if the judge leaves the bench and hauls Rob off again. Download pictures Which Rob will be prepared for. We will remain in peace and honor but will speak up. Once again they are going to try to get Rob to consent to being the ALL CAPS name that he is not. Please email me if you can definitely make the hearing.
We are forever in your good graces for your attendance.. Thank you all so much and have a wonderful and blessed New Year. Warmly, Frank & Terry MarquesI have asked if there is any other information related to his hearing and where to make contact for support. Check back for updates.

– Justin

Update on Hearing Details and Information:

Please attend 4th Reconsideration Hearing by the Washington County District Court to be extradited to South Carolina as a fugitive for writing a document to help free another living being in South Carolina. (this is the bogus charge) You may google robert michael marques to see the real reason that Rob feels he is being held.

All are welcome. Please attend in peace and honor. If you would like to participate in the audience as a witness, please bring a note pad and pen to record the corruption and breaches of trust by the court. When all are asked for living witnesses in the court here to witness robert michael of the House marques, pease raise your hand with your pad in hand.

Hearing is to take place at 1PM ~ Room 1 Reconsideration Hearing for ROBERT MICHAEL MARQUES Washington County District Court of Maryland 36 West Antietam Street Hagerstown, Maryland 21740
Many Blessings.

Love, Light, Peace and Gratitude All ways, terry marques

Any questions please feel free to email me @consciousone444@yahoo.com

P.S. If Rob does not appear in the courtroom for the hearing, then you will know something else has gone awry. They tend to use all kinds of trickery.

Was Michael Hastings Murdered? Red Ice Radio


EXCELLENT coverage of Michael Hasting’s untimely death by Red Ice Radio, this VERY important information needs to be shared freely. IMO Hasting’s was murdered as a shot across the bow to warn others to shut-up or else, apparently firing reporters isn’t enough any more ~ explosions are more effective in getting peoples attention.

Many people of the viewing public don’t know that many broadcast professional’s personally felt Dan Rather was fired to set an example to other networks. 

We need to get the word out. If millions of people are aware of the facts behind this story, it’ll help build momentum with a shift in conscious awareness about the enemy that lies in our midst. Only then, will we take our planet back from those that have enslaved humanity behind invisible prison bars for several thousand years. But sadly, nothing will change until millions of people are literally marching the streets of America in protest of these incessant systems of control and domination imprisoning humanity.  We’ve got to stand behind the important work of investigative journalism, without them we are in the dark.

We’ve been saying for sometime that investigative journalists are a dying breed, now “it appears” they’re being murdered. Please help this video go viral! Thank you…

What happened to Michael Hastings? The revelation that Rolling Stone journalist Michael Hastings was working on a story about the CIA before his death and had contacted a Wikileaks lawyer about being under investigation by the FBI hours before his car exploded into flames has bolstered increasingly valid claims that the 33-year-old was assassinated.

Hastings died last week in Hollywood when his car hit a tree at high speed.

According to a prominent security analyst, technology exists that could’ve allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke told The Huffington Post that what is known about the single-vehicle crash is “consistent with a car cyber attack.”

Clarke said, “There is reason to believe that intelligence agencies for major powers” — including the United States — know how to remotely seize control of a car.

“What has been revealed as a result of some research at universities is that it’s relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn’t want acceleration, to throw on the brakes when the driver doesn’t want the brakes on, to launch an air bag,” Clarke told The Huffington Post. “You can do some really highly destructive things now, through hacking a car, and it’s not that hard.”

It’s possible that Hastings car was hacked considering the people he had written about in his past and what he recently had been tlaking about.

Kathleen Fisher from DARPA recently did a presentation on the ease of hacking a standard american sedan. Volvo started the SARTRE (Safe Road Trains for the Environment) program in 2009 and they are now reporting that their testing has been “successfully completed.” Hacking of a lemmings train like Volvo’s, could lead to massive collisions on the roads and there should be major security concerns considering what recently has been learned.

http://www.redicecreations.com

Yahoo to users, let us read your emails, or Goodbye


Watch for the launch of Project XIII this month, a new internet platform specifically designed by people like us to prevent data harvesting.

As of June 1, all Yahoo email users are required to upgrade to the company’s newest platform, which allows Yahoo to scan and analyze every email, written or received.

Source

Richard Dolan on ET Disclosure ~ Third Phase of Moon Radio 4/25/2013


Published on Apr 26, 2013

freerevolutionradio freerevolutionradio

Title: ThirdPhaseofMoon Radio 4/25 w/ Richard Dolan on ET Disclosure!!

Description: The largest UFO youtube channel is officially on the largest internet radio station in the world! Join us in this amazing ride where hosts Dr. J Andy Elias, Preston Dennett and Blake Cousins talk to ufologist, Richard Dolan. This famed author talks about disclosure, ufos and national security and so much more. Also, he is testifying at the citizens hearing from 4/20-5/3 which can be seen live at http://www.citizenshearing.org. Also, Check out Thirdphaseofmoon on youtube and you decide., on Revolution radio at http://www.freedomslips.com. Also, listen to last week’s interview with stephen bassett here http://youtu.be/5zfbT3ly5Ow. with Dr. David Jacobs at http://youtu.be/tAzwj0jHOZM and Dr. Roger Leir’s interview at http://www.youtube.com/watch?v=Zv2Vxt…, hear the interview with Stanton Friedman http://www.youtube.com/watch?v=az3Vux… , Stan Romanek http://youtu.be/HfO73N0Rw9Iand & Travis Walton http://youtu.be/kTgLMLSqkew. Also, check out Thirdphaseofmoon on Youtube and if you have captured anything amazing on video, skype us or find us on facebook at thirdphaseofmoon. Thanks again and join us next time, Thursdays 8-10 PM eastern standard time on http://www.freedomslips.com.

Listen live on the go Get the ANdroid APP here
http://www.freedomslips.com/freedomsl

Please click Like on our videos
WEBSITE http://www.freedomslips.com
WEBSITE http://www.revolutiontalkradio
https://www.facebook.com/freedomslips
You can support the station and this channel by visiting http://www.freedomslips.com/sitesuppo
LIVE CHAT http://www.freedomslips.com/newchat/l
Paypal donations can be sent to nitehawk@ruraltek.com

Listen live on the go Get the ANdroid APP here
http://www.freedomslips.com/freedomsl…

Please click Like on our videos
WEBSITE http://www.freedomslips.com
WEBSITE http://www.revolutiontalkradio
https://www.facebook.com/freedomslips
You can support the station and this channel by visiting http://www.freedomslips.com/sitesuppo…
LIVE CHAT http://www.freedomslips.com/newchat/l…
Paypal donations can be sent to nitehawk@ruraltek.com

Spying on Americans through Cellphone Carriers NSA Spying: ‘If We Tell You, We’ll Have to Kill You’ By Tom Burghardt


Global Research, July 14, 2012
When Congress passed the FISA Amendments Act (FAA) in 2008, a privacy-killing law that gutted First, Fourth and Fifth Amendment protections for Americans while granting immunity to giant telecoms that assisted the National Security Agency’s (NSA) warrantless wiretapping programs, we were assured that the government “does not spy” on our communications.

Yet scarcely a year after FAA was signed into law by President Bush, The New York Times revealed that under Hope and Change™ huckster Barack Obama, NSA continued the previous regime’s illegal practices, intercepting “private e-mail messages and phone calls of Americans in recent months on a scale that went beyond the broad legal limits established by Congress last year.”

The wholesale vacuuming-up of private communications by the sprawling Pentagon bureaucracy were described by unnamed “senior officials” as the “‘overcollection’ of domestic communications of Americans;” in other words, a mere technical “glitch” in an otherwise “balanced” program.


But what most Americans are blissfully unaware of is the fact that they carry in their pockets what have been described as near-perfect spy devices: their cellphones.

 
Earlier this week, The New York Times disclosed that “cellphone carriers reported that they responded to a startling 1.3 million demands for subscriber information last year from law enforcement agencies seeking text messages, caller locations and other information in the course of investigations.”

 
The report by carriers, made in response to congressional inquiries “document an explosion in cellphone surveillance in the last five years, with the companies turning over records thousands of times a day in response to police emergencies, court orders, law enforcement subpoenas and other requests.”


“I never expected it to be this massive,” said Rep. Edward J. Markey (D-MA), the co-chair of the Bipartisan Congressional Privacy Caucus, “who requested the reports from nine carriers, including AT&T, Sprint, T-Mobile and Verizon.”

Markey told the Times that the prevalence of cellphone surveillance by law enforcement agencies raised the specter of “digital dragnets” that threaten the privacy of most customers.

 
While the sheer volume of requests by local, state and federal police for user data may have startled Congress, which by-and-large has turned a blind eye when it comes to privacy depredations at all levels of government, it is hardly a complete picture of the pervasive nature of the problem.


In 2009 security watchdog Christopher Soghoian reported on his Slight Paranoia web site that just one firm, Sprint Nextel, “provided law enforcement agencies with its customers’ (GPS) location information over 8 million times between September 2008 and October 2009. This massive disclosure of sensitive customer information was made possible due to the roll-out by Sprint of a new, special web portal for law enforcement officers.” (emphasis added)

 
According to Soghoian, “Internet service providers and telecommunications companies play a significant, yet little known role in law enforcement and intelligence gathering.”

 
“Government agents routinely obtain customer records from these firms,” Soghoian averred, “detailing the telephone numbers dialed, text messages, emails and instant messages sent, web pages browsed, the queries submitted to search engines, and of course, huge amounts of geolocation data, detailing exactly where an individual was located at a particular date and time.”

 
While there are indeed “exigent circumstances” which may require law enforcement to demand instant access to GPS data or other customer records–a kidnapping or child abduction in progress–in the main however, it appears that most warrant-free requests fall under a more sinister category: fishing expedition.

Read more:

http://globalresearch.ca/index.php?context=va&aid=31899

 

Ether Technology, Magnetism, Nikola Tesla & Otis T. Carr by Ralph Ring on Red Ice Creations


Fascinating interview on the power of belief, perception and tapping into the quantum energy of the universe!  It also reveals how deep and how far back the war against “higher consciousness” goes and the militant suppression of technology that would assist people in self-empowerment.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ralph Ring is a Natural Scientist and a Creative Technician who in the late 1950′s and early 1960′s worked together with Otis T Carr, a protégé of the great inventor Nikola Tesla, and a team of dedicated scientists on and with alternative technologies, including levitation and teleportation. With the aid of his small team, Carr and Ralph built a number of flying disks which worked. They attempted to commercially manufacture their invention.

Their experimentation was terminated by FBI agents. His dream since birth has and is to produce floating homes, cities and countries. In the first hour of this interview, Ralph Ring will discuss the spacecraft technology in the experimental vehicle he co-piloted in 1960, the OTC-X1. The OTC-X1 was powered by rotating electromagnets in conjunction with a number of small, ingenious capacitor-like devices called “Utrons”. He’ll share his story of building, flying, and trying to commercially manufacture this type of technology.

Ralph will explain ether technology and magnetism. He’ll also talk about our 3D brain and how belief and consciousness play an important role when operating this type of technology. Ralph’s research assistant and best friend, Marsha Brown-Ring also joins in from time to time. She has been a witness to many events in Ralph’s life.

Topics Discussed: ether technology, magnetic energy, magnetism, belief, Otis T Carr, flying discs, spacecrafts, technology, Nikola Tesla, teleportation, FBI, manufacturing spacecrafts, laws of physics, floating homes, OTC-X1, monetary system, Germans, General Motors, 3D brain, multi-verses, crystal consciousness, Los Alamos, Victorville, California, levitation, police witness, unbelief, knowing, wireless technology, utrons, electromagnets, floating cars, brain protective of its job, FBI confiscating crafts and more.


http://www.cmn.tv/videos/ether-technology-magnetism-nikola-tesla-otis-t-carr-2/

Whistleblowers Prosecuted While War Criminals Remain Free?


by Debbie Menon

Dr.Paul Craig Roberts, former Assistant Secretary of the US Treasury, former Associate Editor of the Wall Street Journal, and professor of economics in six universities, wrote in A Story… The Last Whistleblower :

“The ability of whistleblowers to bring accountability to government is about to disappear.”

It was quite a story! I liked it.

Stories are all we shall hear someday because no one will have the courage or the opportunity to tell the truth.

But even story tellers must be careful.  Aesop told fables.  He invented the genre in fact, the fabulous story form.  And, he was hung by the neck until dead, dead, dead, because  some of his fables upset  some very important men.

George Orwell’s 1984 is a story.  No way it could be anything but fiction, right?  They didn’t hang George Orwell, but if he were alive today I have no doubts that there are people who would like to see him tried on a trumped up charge of treason or discredited in some way or another, if not actually hung.

They didn’t hang or kill Winston Smith, either, but he was effectively assassinated.

RT reports A newly released document acquired by Wired Magazine exposes the United States Defense Department’s torture techniques. In the 37 page report, former CIA official John Kiriakou warns the George W. Bush administration about the techniques that were being used on detainees and explains how they are against US law. His warnings went unheard of, until Kiriakou was indicted for leaking the information to the media.

David Swanson, campaigner for Roots Action, joins us with more.

 

 Words don’t mean anything anymore!

GEORGE Bush, Dick Cheney, Tito Gonzales, David Levin, Keith Olbermann, many others have had their chance to speak, and their words to say on “waterboarding” and “ torture;”  “we do not,” “…we do, but it is legal.” “It is not,” “It is…” etc.

The bottom line of those with first hand experience seems to be that it hurts, damages, frightens the hell out of, and is persuasive enough to make almost anyone say what the teacher wants them to say, just to make it stop.

Torture becomes legal, “creative interrogation”; Kidnapping becomes “rendition.” C’mon! My common sense tells me better.

It would appear that “common sense” is not so common anymore. In fact, it’s becoming a rare, very rare, commodity throughout the world—particularly in North America.

An adjunct to Truth and Beauty, it is of no use in the politics of today’s world.

You can say anything you like. Call it what you like and, yes, the ignorant and ill-informed will believe you, if you say it forcefully and frequently enough, especially while standing in front of an altar, a flag or some such token of symbol of Truth, and Sincerity.

Words don’t mean anything anymore! Maybe, in this world where individualism is so important, we can write our own definitions, and if someone doesn’t like them, then we can, imprison them, holocaust, apartheid, genocide, or just kill them all, ship them out, or ban them from a web.

Or, we can brand them an anti-Semite and destroy their intellectual credentials and no one will ever listen to anything they ever say again.

Keith Olbermann editorial to Obama “Future Of The U.S. Depends On Torture Accountability”

Link to Olbermann video:
http://www.msnbc.msn.com/id/32545640

Visit msnbc.com for breaking news, world news, and news about the economy

Do these and things and you could be a terrorist?


This proves it, the lunatics have taken over the asylum!! This is so ridiculous it’s hilarious, what’s disturbing is we could all be accused of being terrorists according to this broad list of characteristics.

Uploaded by on Feb 18, 2012

Tidbits: What is Being Held Back from You


Credit for this very worthwhile read goes to Kerry Cassidy’s blog, be sure to follow the link to the videos and the remainder of article that exposes the ugly truth about how deep the corruption goes behind 9/11. The following is from her blog:

January 27, 2012

Gordon Duff starts down the Exposing the real Osama Road – Veterans Today

A must read for ALL NAVY SEALS who think Seal Team 6 took him out… get ready for true history lesson 1:

click here to read the full article from beginning to end

Thursday, January 26th, 2012 | Posted by
Paulson of Treasury, Bush of Turkeyland, The Men Who Looted America

Secrets are More Often Conspiracies and Shame and Seldom are National Security

by  Gordon Duff,  Senior Editor

Let’s start this out with an attention grabber.  Out there, somewhere is a photograph of Osama bin Laden and George H. W. Bush, shaking hands in the White House.  It exists.  There is this and more, so much more, that would make America’s heads spin.

The actual trained journalists around me beat this into my head. OK, here it is.

Those who follow rumors, which means every single one of us, know that former President George H. W. Bush worked with the bin Ladens, a wealthy and respected Saudi family that invests in a group of military companies called The Carlyle Group, headed by many former world leaders.

When Osama bin Laden, the short haired young Saudi millionaire CIA agent visited Bush in the White House, he came there, not just as an important part of our intelligence infrastructure at the end of the Cold War, but as a good friend of George H. W. Bush, a man who was  practically an uncle to him.

“Hey Osama, I mean Tim”…”Get Over Here and Get in the Picture!”

Wait a minute, wouldn’t that make George “W” Bush Osama bin Laden’s brother?  Well, not a real brother, not like Jeb anyway. Bin Laden was taller and better looking and, as the CIA transcript below indicates, certainly better educated and more honest.

We might also add, Osama bin Laden, were he of “that” Bush generation, was a veteran, having risked his life defending the United States against Russia many times.

The Bush boys shunned wartime service as we well know, perhaps they saw brother “Tim” as doing their part for them. (Tim “bin Laden” Osman)

No wonder Bush thought the 9/11 attacks were “pilot error” and not “Brother Tim” gone bad.  The video below actually has President Bush citing 9/11 as “pilot error.”

The president’s immediate responses to the 9/11 attacks are among the most amazing pieces of inappropriate humor since Caligula nominated his horse to the Roman senate:

Continue reading, see videos here:

http://www.veteranstoday.com/2012/01/26/tidbits-what-is-being-held-back-from-you/

War on Whistleblowers – Sibel Edmonds on GRTV


Uploaded by on Oct 11, 2011

SUBSCRIBE TO THE PODCAST: http://ur1.ca/50ptm

This week GRTV talks to Sibel Edmonds, famed FBI whistleblower and the Editor of BoilingFrogsPost.com about the various ways that whistleblowers in the national security establishment are retaliated against, set upon by the establishment, and undermined by the very foundation-funded organizations that are supposed to be helping them.

Organized and Professional Disinformation Operations and the”Twenty-Five Rules of Disinformation”



Well-funded and highly-organized disinformation operations are in full-swing throughout the internet. From forums to comment boards and even professional websites that have only one purpose: Defame, distract, and destroy the truth.

However organized, the tactics are very predictable in a world filled with lies and half-truths. This, sadly, includes every day news media, one of the worst offenders with respect to being a source of disinformation.

Disinformation campaigns are launched against those seeking to uncover and expose the truth and/or the conspiracy. The H1N1 scandal was a prime example of how hundreds of operations can be launched to sway opinions on the facts. For every fact-based article on the realities of the H1N1 vaccine, there were both very primitive and sophisticated counters on message boards, comment forums and hundreds of alternative and mainstream websites.

Stephen Barrett‘s Quackwatch.com and supporters such as skeptic.org.uk and skepticblog.com are examples of websites who promote both synthetic and organic disinformation on almost any topic that does not concur with mainstream thought.

There are specific tactics which disinfo artists tend to apply, as H. Michael Sweeney has brilliantly detailed. Also included with this material are eight common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive.

People can be bought, threatened, or blackmailed into providing disinformation, so even “good guys” can be suspect in many cases.

A rational person participating as one interested in the truth will evaluate that chain of evidence and conclude either that the links are solid and conclusive, that one or more links are weak and need further development before conclusion can be arrived at, or that one or more links can be broken, usually invalidating (but not necessarily so, if parallel links already exist or can be found, or if a particular link was merely supportive, but not in itself key) the argument.

The game is played by raising issues which either strengthen or weaken (preferably to the point of breaking) these links. It is the job of a disinfo artist to interfere with these evaluation… to at least make people think the links are weak or broken when, in truth, they are not… or to propose alternative solutions leading away from the truth.

Often, by simply impeding and slowing down the process through disinformation tactics, a level of victory is assured because apathy increases with time and rhetoric.

It would seem true in almost every instance, that if one cannot break the chain of evidence for a given solution, revelation of truth has won out. If the chain is broken either a new link must be forged, or a whole new chain developed, or the solution is invalid an a new one must be found… but truth still wins out. There is no shame in being the creator or supporter of a failed solution, chain, or link, if done with honesty in search of the truth. This is the rational approach.

While it is understandable that a person can become emotionally involved with a particular side of a given issue, it is really unimportant who wins, as long as truth wins.

But the disinfo artist will seek to emotionalize and chastise any failure (real or false claims thereof), and will seek by means of intimidation to prevent discussion in general.

It is the disinfo artist and those who may pull their strings (those who stand to suffer should the crime be solved) MUST seek to prevent rational and complete examination of any chain of evidence which would hang them. Since fact and truth seldom fall on their own, they must be overcome with lies and deceit.

Those who are professional in the art of lies and deceit, such as the intelligence community and the professional criminal (often the same people or at least working together), tend to apply fairly well defined and observable tools in this process.

However, the public at large is not well armed against such weapons, and is often easily led astray by these time-proven tactics. Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues.

For the most part, only the players themselves understand the rules of the game.


Twenty-Five Rules of Disinformation

  1. Hear no evil, see no evil, speak no evil
    Regardless of what you know, don’t discuss it – especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

  2. Become incredulous and indignant
    Avoid discussing key issues and instead focus on side issues which can be used to show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

  3. Create rumor mongers
    Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

  4. Use a straw man
    Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

  5. Sidetrack opponents with name calling and ridicule
    This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

  6. Hit and Run
    In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning – simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

  7. Question motives
    Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

  8. Invoke authority
    Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

  9. Play Dumb
    No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

  10. Associate opponent charges with old news
    A derivative of the straw man – usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues – so much the better where the opponent is or was involved with the original source.

  11. Establish and rely upon fall-back positions
    Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made – but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

  12. Enigmas have no solution
    Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.

  13. Alice in Wonderland Logic
    Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

  14. Demand complete solutions
    Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

  15. Fit the facts to alternate conclusions
    This requires creative thinking unless the crime was planned with contingency conclusions in place.

  16. Vanish evidence and witnesses
    If it does not exist, it is not fact, and you won’t have to address the issue.

  17. Change the subject
    Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

  18. Emotionalize, Antagonize, and Goad Opponents
    If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

  19. Ignore facts presented, demand impossible proofs
    This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

  20. False evidence
    Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations – as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

  21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body
    Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

  22. Manufacture a new truth
    Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

  23. Create bigger distractions
    If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

  24. Silence critics
    If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

  25. Vanish
    If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Eight Traits of the Disinformationalist

  1. Avoidance
    They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

  2. Selectivity
    They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

  3. Coincidental
    They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

  4. Teamwork
    They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

  5. Anti-conspiratorial
    They almost always have disdain for ‘conspiracy theorists’ and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain. Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

  6. Artificial Emotions
    An odd kind of ‘artificial’ emotionalism and an unusually thick skin – an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial. Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal.

    But disinfo types usually have trouble maintaining the ‘image’ and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It’s just a job, and they often seem unable to ‘act their role in character’ as well in a communications medium as they might be able in a real face-to-face conversation/confrontation.

    You might have outright rage and indignation one moment, ho-hum the next, and more anger later – an emotional yo-yo. With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game – where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

  7. Inconsistent
    There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat ‘freudian’, so to speak, in that perhaps they really root for the side of truth deep within.

    I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education.

    I’m not aware of too many Navy pilots who don’t have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

  8. Time Constant
    There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

    1. ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT – FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

    2. When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR – there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to ‘get permission’ or instruction from a formal chain of command.

    3. In the NG example a) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay – the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

Remarkably, not even media and law enforcement have NOT BEEN TRAINED to deal with these issues.

For the most part, only the players themselves understand the rules of the game.
http://www.bibliotecapleyades.net/sociopolitica/sociopol_endgame13.htm 

Are Your Thoughts Your Own? Mass Mind Control Through Network Television


by Alex Ansary
December 29, 2005

from OutsideTheBox Website

  • Why do countless American people go along with the War on Iraq?

  • Why do so many people call for a police state control grid?

A major component to a full understanding of why this kind of governmental and corporate corruption is to discover the modern science of mind control and social engineering. It’s baffling to merely glance at the stacks of documentation that this world government isn’t being constructed for the greater good of humanity.

Although there are a growing number of people waking up the reality of our growing transparent soft cage, there seems to be just enough citizens who are choosing to remain asleep. Worse yet, there are even those who were at least partially awake at one time but found it necessary to return to the slumber of dreamland.

This is no accident; this is a carefully crafted design. The drive to dumb down the populations of planet earth is a classic art that existed before the United States did. One component to understanding and deciphering the systems of control is to become a student of the magicians of influence and propaganda. In order to defeat our enemies (or dictators), its imperative that we understand how they think and what they believe in.

When people think about mind control, they usually think in terms of the classic “conspiracy theory” that refers to Project MkUltra. This program is a proven example of ‘overt mind control.’

The project had grown out of an earlier secret program, known as Bluebird that was officially formed to counter Soviet advances in brainwashing. In reality the CIA had other objectives. An earlier aim was to study methods ‘through which control of an individual may be attained’. The emphasis of experimentation was ‘narco-hypnosis’, the blending of mind altering drugs with carefully hypnotic programming.

A crack CIA team was formed that could travel, at a moments notice, to anywhere in the world. Their task was to test the new interrogation techniques, and ensure that victims would not remember being interrogated and programmed. All manner of narcotics, from marijuana to LSD, heroin and sodium pentathol (the so called ‘truth drug’) were regularly used.

Despite poor initial results, CIA-sponsored mind control program flourished. On 13 April 1953, the super-secret Project MK-ULTRA was born. Its scope was broader than ever before, and only those in the top echelon of the CIA were privy to it.

Official CIA documents describe MK-ULTRA as an ‘umbrella project’ with 149 ‘sub-projects’. Many of these sub-projects dealt with testing illegal drugs for potential field use. Others dealt with electronics. One explored the possibility of activating ‘the human organism by remote control’. Throughout, it remained a major goal to brainwash individuals to become couriers and spies without their knowledge.

When it was formed in 1947, the CIA was forbidden to have any domestic police or internal security powers. In short, it was authorized only to operate ‘overseas’. From the very start MK-ULTRA staff broke this Congressional stipulation and began testing on unwitting American citizens.
Precisely how extensive illegal testing became will never be known.

Richard Helms, CIA Director and chief architect of the program, ordered the destruction of all MK-ULTRA records shortly before leaving office in 1973. Despite these precautions some documents were misfiled and came to light in the late 1970’s. They laid bare the spy agency’s cynicism. Despite the widespread knowledge of MK Ultra and the civil lawsuits that followed, this form of behavior modification is not the most expansive.

The real dangers are the types of thought control that are ‘covert’ and not the subject of several dozen Hollywood movies like “Clockwork Orange” and Mel Gibson’s “Conspiracy Theory.”

Our founding fathers faced enormous challenges in the formation of this country and its bill of rights. One challenge was laying down the groundwork or a free society without knowing what kind of technological advances would be made. Who would have guessed in those times that we needed an article in the bill of rights that specifically prohibits the government and it’s associates from engaged in mind control or thought control.

The closest item that promises our protection from the government is the 4th Article in The Bill of Rights which states,

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

Like many are now beginning to note, the US Constitution and its Bill of Rights are merely given lip service by our supposedly elected officials.

One of the most common examples of mind control in our so-called free and civilized society is the advent and usage of the television set. This isn’t to say that all things on TV are geared towards brainwashing you. They’re not. But most of the programming on television today is run and programming by the largest media corporations that have interests in defense contracts, such as Westinghouse (CBS), and General Electric (NBC).

This makes perfect sense when you see how slanted and warped the news is today. Examining the conflicts of interest is merely glancing at the issue, although to understand the multiple ways that lies become truth, we need to examine the techniques of brain washing that the networks are employing.

Radio isn’t any different in its ability to brainwash a population into submission. Sixty-seven years ago, six million Americans became unwitting subjects in an experiment in psychological warfare. It was the night before Halloween, 1938.

At 8 p.m. CST, the Mercury Radio on the Air began broadcasting Orson Welles’ radio adaptation of H. G. Wells’ War of the Worlds.

As is now well known, the story was presented as if it were breaking news, with bulletins so realistic that an estimated one million people believed the world was actually under attack by Martians. Of that number, thousands succumbed to outright panic, not waiting to hear Welles’ explanation at the end of the program that it had all been a Halloween prank, but fleeing into the night to escape the alien invaders.
According to researcher Mack White,

“Psychologist Hadley Cantril conducted a study of the effects of the broadcast and published his findings in a book, The Invasion from Mars: A Study in the Psychology of Panic.

This study explored the power of broadcast media, particularly as it relates to the suggestibility of human beings under the influence of fear. Cantril was affiliated with Princeton University’s Radio Research Project, which was funded in 1937 by the Rockefeller Foundation. Also affiliated with the Project was Council on Foreign Relations (CFR) member and Columbia Broadcasting System (CBS) executive Frank Stanton, whose network had broadcast the program.

Stanton would later go on to head the news division of CBS, and in time would become president of the network, as well as chairman of the board of the RAND Corporation, the influential think tank which has done groundbreaking research on, among other things, mass brainwashing. Two years later, with Rockefeller Foundation money, Cantril established the Office of Public Opinion Research (OPOR), also at Princeton.

Among the studies conducted by the OPOR was an analysis of the effectiveness of “psycho-political operations” (propaganda, in plain English) of the Office of Strategic Services (OSS), the forerunner of the Central Intelligence Agency (CIA).

Then, during World War II, Cantril and Rockefeller money assisted CFR member and CBS reporter Edward R. Murrow in setting up the Princeton Listening Center, the purpose of which was to study Nazi radio propaganda with the object of applying Nazi techniques to OSS propaganda.

Out of this project came a new government agency, the Foreign Broadcast Intelligence Service (FBIS). The FBIS eventually became the United States Information Agency (USIA), which is the propaganda arm of the National Security Council.

Thus, by the end of the 1940s, the basic research had been done and the propaganda apparatus of the national security state had been set up – just in time for the Dawn of Television.”

Experiments conducted by researcher Herbert Krugman reveal that when a person watches television, brain activity switches from the left to the right hemisphere.