When we see photographs of rats grossly deformed by massive tumors after eating genetically engineered corn laced with Roundup, it’s not good news for Monsanto.
People understand instantly in looking at those pathetic rats that organic food is not a niche market or a expensive luxury, but a life or death issue, because the rats were fed corn that is part of the American diet.
All the studies that were required but bypassed before GMOs were unleashed into the food chain seem compressed into this one devastating study by CRIIGEN.
The Monsanto lies are exposed. People must avoid GMOs at all costs and eat organic food if they are to survive.
But Monsanto has been assiduously preparing for this day of public realization, corrupting the FDA (Monsanto VP Michael Taylor is charge of “food safety” and ensuring it through armed raids against organic farmers, organic coops, and mothers’ organic buying clubs!), the USDA (which has funded development of a corn to sterilize humans), the EPA (which is going after hay on an inland ranch as a pollutant under the Clean Water Act, while ignoring serious oil spills into major rivers), and any other agencies standing in the way of getting its death-causing products released as quickly as possible into the environment.
One can see their not very subtle desperation to shut down all questions about their GMOs in the bill proposed in India, that would set up a biotech regulatory authority and laws to imprison anyone who even dared to bring up the issue of the safety of GMOs (including in vaccines, which now contain GMOs with news equally dire). The Indian bill has been called “unconstitutional, unethical, unscientific,” which is practically a nickname for Monsanto at this point.
But however outrageous the efforts to force GMOs onto India, they are small potatoes compared to what Monsanto and the biotech industry have done behind the scenes in the US where they have arranged for Homeland Security to define organic food – the only safe food – as a bio-security threat. They are clearly not happy about the unpatented, free for the taking, biodiversity people are working to save – open pollinated seeds and crops, as well as heritage animals raised on small farms.
As is Monsanto’s modus operandi, reality has been turned on its head, such that GMO seeds and only crops raised on giant mono-culture GMO farms and sprayed with deadly pesticides, and only animals trapped in animal prisons (CAFOs – controlled animal feeding operations) where they are fed on GMOs with pesticides, antibiotics, and hormones, have now been defined as “normal” and what actually is normal (and safe) has been defined as a threat.
Stanford has HUGE stakes in bioterrorism preparedness that includes homeland security funding, as well as having a seat on the National Institutes of Health’s Office of Biotechnology Activities. Stanford also has an entire department that concentrates on agricultural biosecurity. An important goal of the network – which is funded by the Homeland Security Act – is to coordinate diagnostic and scientific expertise in agricultural production and security in regard to agricultural pests and pathogens that could be used in bio-terrorism.
To that end, the US Department of Agriculture (USDA) has taken the position that organic farming, such as free-ranging chickens and cows and non-GM seeds that you can’t ‘control’ are potential biosecurity threats. USDA has even begun putting, in writing, directives on how they want organic farming “contained” – which resembles turning organic farms into nothing more than factory farms.17 (Source)
Basically, what is owned by the biotech/industrial food system and killing people is “good” and what is from nature, healing, and free to humanity, has been redefined as a biologic threat, and potentially as bioterrorism. This should come as no surprise, really, given the takeover of the US government by Monsanto and the parallel redefinition of patriotic Americans as terrorists, too. The more positive something is, the more Orwellian its redefinition as dangerous. An identical thing has occurred with vaccines in which those asking for vaccine safety are treated by corporate media and the government as threats to the health of the country, at just the same time that studies and government documents are showing without a doubt that the vaccines are causing diseases.
Thus we have a huge government and corporate push for flu vaccines, while it is confirmed that the flu vaccine increases the risk of serious pandemic flu illness. And that leaves off that the the H1N1 is inside the flu vaccine, and kills fetuses.
Medicine, not just food, is an organic issue as well. Vaccines are filled now with GMOs, and also contain heavy metals, viruses, other toxins. We look at the poor tumor-swollen rats being held aloft and see in an instant that GMOs and poisons are deadly, and that organic food is the only way to go.
And we are now starting to understand that vaccines come from those same GMO and pesticide companies, contain GMOs and toxins, and are also killing people. The vaccine experiment parallels the GMO experiment – it’s massive, involuntary, and damaging children. And there, too, there is an effort to ban natural supplements as dangerous, and Homeland Security is set to force vaccines on the country if a “pandemic emergency” is declared (not proven). This vaccine attack on normal human DNA parallels the potential DHS bioterrorism attack on organic food.
In both cases, Homeland Security would be acting for Monsanto and the pharmaceutical industry, force-contaminating crops and animals and getting rid of those with normal DNA, and force-contaminating people with GMO-vaccines, destroying normal DNA and threatening everyone’s lives. In both cases, any bio-threat can be manufactured and then military and DHS can roll out to give Monsanto and the pharmaceutical industry absolute power over seeds, crops, animals, and human bodies. This biotech military take over would leave us with deadly non-food and at the mercy of any vaccine they come up with, but would be publicized as saving the country from bioterrorism and disease.
Monsanto needs military power to carry on with GMOs because its lies are being countered almost instantly now. Three photos of sick, deformed rats tell the truth. And while DHS and military may have been woven into a biotech plan to spray organic crops with Agent Orange and mass destroy organic animals as they are already doing in Michigan, or to force toxic GMO-vaccines onto the country, organic has won the truth when it comes to food, and the evidence for organic approach to health – not taking vaccines is a health move similar to not using pesticides) – is in as well.
In the UK, Freedom of Information Act has revealed that the government has known for 30 years that the vaccines don’t work and cause diseases and has done all they can to hide that fact from the public. In the US, the government has been illegally withholding FOIA documents on vaccines for over 7 years. And now the Obama administration, the same one seeking permanent detention of Americans and that has refused act against those officials committing acts of torture, is seeking to change FOIA to create a new category beyond declaring documents secret but would allow it to declare some FOIA documents “non-existent.”
The FOIA documents the CDC is withholding, and Obama is warping reality to keep hidden, are sought by a doctor with an autistic child. The documents concern what the CDC has known about the true impact of mercury in vaccines. That is about autism. Can we hold up three photos of broken children so people recognize the danger of GMOs in vaccines, too? Or should we hold up the dead bodies of infants killed by the DPT vaccine schedule (at two, four and six months) which is tightly correlated with SIDS’ deaths? Even in the 1970s, the DPT vaccine, which was said by the scientist regulating it to be”the dirtiest substance ever put in the human body.” [Start at 2:40 seconds into the video.) The “miracle of vaccines” is that their lethality has been hidden for so long.
Thanks to the CRIIGEN study, it’s patently obvious now that GMOs and Roundup threaten human life. Full stop. Yet Homeland Security, acting on behalf of Monsanto, has bioterrorism laws in place to rub out organic food and animals as a biosecurity threat.
Thanks to FOIAs in the UK, we know without question that the UK and US government have known for 30 years that vaccines don’t work, and are a biologic threat to children’s lives. Full stop. Yet DHS and military ready to force unknown and untested vaccines on the entire country that could potentially be lethal.
In a way, one might even feel badly for the biotech/pharmaceutical industry because defining organic food and farm animals as bio-threats is insane, and their last ditch effort to win control over everything.
They lied about the 1918 “flu” to hide how many they killed with aspirin, and Monsanto was involved there as well. They lied about WMDs to get oil. They lied about fluoride being safe. They lied about bailouts.
They have concocted massive scare stories of to hide the truth – they themselves are terrorists and bio-terrorists seeking control of all living organisms. It’s just all too crazy to be sustained.
Most Americans now see 9/11 as an inside job, with its terror used to put in place totalitarian laws. The scapegoat, Muslims, didn’t do it.
Vaccines don’t work, are causing diseases, destroying children’s minds, and paralyzing and even killing them. Scapegoated parents, aware enough not to vaccinate their own children, didn’t do it.
The world now sees GMOs as a biologic threat to existence. The new (laughable) scapegoat, organic, didn’t do it.
When Homeland Security is working for Monsanto, with elaborate plans to “subdue” organic food and animals, the whole terrorism/bioterrorism apparatus is out on the table as a scam.
IF you have ever wondered if your smart meter is being used to spy on you, well now there is proof that governments and private organisations are using data collected from smart meters to spy on you.
Information about power usage, which can be used to identify when a home is being occupied, is being shared with third parties of which includes government agencies, private organisations and off-shore data processing centres.
This unethical breach of privacy was discovered on the website of one of Australia’s largest electricity retailer, Origin Energy.
Electricity customers, who sign up for an online service that provides the account holder with detailed information about their electricity usage, are unwillingly agreeing to share their private information with third parties.
A 496 word Privacy/Consent policy form explicitly states that customers who wish to sign up for the service that provides them with information about their electricity usage, must agree that the following organisations have access to their private data:
Government authorities
Electricity installers
Mail houses
Data processing analysts
IT service providers
Smart energy technology providers
Debt collection agencies
Credit reporting agencies
A spokesperson for the electricity company (Origin Energy) responsible for this revelation was recently quoted as saying “the additional information requested about each household adds to the richness of the Origin Smart experience” (Source: The Age).
One private organisation that is being given personal information of Origin Energy customers is Tendril, a self-described consumer engagement application and services provider and an organisation that believes smart grids can help fight climate change.
Alarmingly, Tendril’s own website doesn’t explicitly state how it uses data gathered by its clients and for what purposes the data can and cannot be used for.
What implication this has for Australian residents is unknown.
There has been an overwhelming opposition to the roll-out and installation of smart meters around the world.
Smart Meter opt-out coalitions are present in almost all major municipalities that have smart meters present. Unfortunately, in many municipalities an opt-put option is not available.
The author (Andrew Puhanic) was forced to have a smart meter installed on his property, with the only notice given about the installation being a letter informing the ‘month’ that the smart meter would be installed.
The greatest concern with smart meter data being shared with third parties is the fact that the third-party organisation could easily identify (over time) a pattern of when you do and do not use electricity.
This information could fall into the wrong hands and could be used to determine when your home is un-occupied.
In Australia, the erosion of privacy was escalated further by a new proposal to force internet and telephone companies to retain customer records for more than two years. For more information about this proposal, click here.
Households that are forced to have smart meters installed must be assured that the information their electricity company collects is not shared with third parties.
Ultimately, smart meters are designed to collect information about household electricity usage and now there is proof that electricity companies are openly sharing information collected by smart meters.
Secret Service officials refused to allow protesting students at Wright State University to assemble within one-quarter mile of Vice President Joe Biden during his visit last week.
“The Secret Service respects everyone’s right to freedom of speech but we also have a duty to provide a safe and secure environment,” Secret Service spokesman Max Millien told Campus Reform, which reported that students rallying against Biden and President Obama in support of Mitt Romney moved twice at the orders of the Secret Service until they reached a designated “free speech zone.”
“After the students complied with the first request to move, they were again instructed to move – this time to the middle of a field, about a quarter mile away from the area where Biden planned to speak,” Campus Reform explains.
In July, the Secret Service shut down a student-led “fire Eric Holder” protest outside the White House, citing the discovery of a “suspicious package” just as the protest was getting underway.
Smartphones can be a cop’s best friend. They are packed with private information like emails, text messages, photos, and calling history. Unsurprisingly, law enforcement agencies now routinely seize and search phones. This occurs at traffic stops, during raids of a target’s home or office, and during interrogations and stops at the U.S. border. These searches are frequently conducted without any court order.
Several courts around the country have blessed such searches, and so as a practical matter, if the police seize your phone, there isn’t much you can do after the fact to keep your data out of their hands.
However, just because the courts have permitted law enforcement agencies to search seized smartphones, doesn’t mean that you—the person whose data is sitting on that device—have any obligation to make it easy for them.
Screen unlock patterns are not your friend
The Android mobile operating system includes the capability to lock the screen of the device when it isn’t being used. Android supports three unlock authentication methods: a visual pattern, a numeric PIN, and an alphanumeric password.
The pattern-based screen unlock is probably good enough to keep a sibling or inquisitive spouse out of your phone (providing they haven’t seen you enter the pattern, and there isn’t a smudge trail from a previous unlock that has been left behind). However, the pattern-based unlock method is by no means sufficient to stop law enforcement agencies.
After five incorrect attempts to enter the screen unlock pattern, Android will reveal a “forgot pattern?” button, which provides the user with an alternate way method of gaining access: By entering the Google account email address and password that is already associated with the device (for email and the App Market, for example). After the user has incorrectly attempted to unlock the screen unlock pattern 20 times, the device will lock itself until the user enters a correct username/password.
What this means is that if provided a valid username/password pair by Google, law enforcement agencies can gain access to an Android device that is protected with a screen unlock pattern. As I understand it, this assistance takes the form of two password changes: one to a new password that Google shares with law enforcement, followed by another that Google does not share with the police. This second password change takes place sometime after law enforcement agents have bypassed the screen unlock, which prevents the government from having ongoing access to new email messages and other Google account-protected content that would otherwise automatically sync to the device.
Anticipatory warrants
As The Wall Street Journal recently reported, Google was served with a search warrant earlier this year compelling the company to assist agents from the FBI in unlocking an Android phone seized from a pimp. According to the Journal, Google refused to comply with the warrant. The Journal did not reveal why Google refused, merely that the warrant had been filed with the court with a handwritten note by a FBI agent stating, “no property was obtained as Google Legal refused to provide the requested information.”
It is my understanding, based on discussions with individuals who are familiar with Google’s law enforcement procedures, that the company will provide assistance to law enforcement agencies seeking to bypass screen unlock patterns, provided that the cops get the right kind of court order. The company insists on an anticipatory warrant, which the Supreme Court has defined as “a warrant based upon an affidavit showing probable cause that at some future time, but not presently, certain evidence of crime will be located at a specific place.”
Although a regular search warrant might be sufficient to authorize the police to search a laptop or other computer, the always-connected nature of smartphones means that they will continue to receive new email messages and other communications after they have been seized and searched by the police. It is my understanding that Google insists on an anticipatory warrant in order to cover emails or other communications that might sync during the period between when the phone is unlocked by the police and the completion of the imaging process (which is when the police copy all of the data off of the phone onto another storage medium).
Presumably, had the FBI obtained an anticipatory warrant in the case that the Wall Street Journal wrote about, the company would have assisted the government in its attempts to unlock the target’s phone.
Praise for Google
The fact that Google can, in some circumstances, provide the government access to data on a locked Android phone should not be taken as evidence that Google is designing government backdoors into its software. If anything, it is a solid example of the fact that when presented with a choice between usability and security, most large companies offering services to the general public tend to lean towards usability (for example, Apple and Dropbox can provide law enforcement agencies access to users’ data stored with their respective cloud storage services).
The existence of the screen unlock pattern bypass is likely there because a large number of consumers forget their screen unlock patterns. Many of those users are probably glad that Google lets them restore access to their device (and any data on it), rather than forcing them to perform a factory reset whenever they forget their password.
However, as soon as Google provides a feature to consumers to restore access to their locked devices, the company can be forced to provide law enforcement agencies access to that same functionality. As the old saying goes, “If you build it, they will come.”
In spite of the fact that Google has prioritized usability over security, Google’s legal team has clearly put their customers’ privacy first.
First, the company has insisted on a stricter form of court order than a plain-vanilla search warrant, and then refused to provide assistance to law enforcement agencies that seek assistance without the right kind of order.
Second, by providing the government access to the Android device via a (temporary) change to the users’ Gmail password, Google has ensured that the target of the surveillance receives an automatic email notice that their password has been changed. Although the email they receive won’t make it explicit that the government has been granted access to their mobile device, it will still serve as a hint to the target that something fishy has happened.
Third, by changing the user’s password a second time, Google has prevented the government from having ongoing, real-time access to the surveillance target’s emails. There is, I believe, no law requiring Google to take this last step—Google has done it to protect the privacy of the user, and to deny the government what would otherwise be an indefinite email wiretap not approved by the courts.
For real protection you need full-disk encryption
Of the three screen lock methods available on Android (pattern, PIN, password), Google only offers a username/password based bypass for the pattern lock. If you’d rather that the police not be able to gain access to your device this way (and are comfortable with the risk of losing your data if you are locked out of your phone), I recommend not using a pattern-based screen lock, and instead using a PIN or password.
However, it’s important to understand that while locking the screen of your device with a PIN or password is a good first step towards security, it is not sufficient to protect your data. Commercially available forensic analysis tools can be used to directly copy all data off of a device and onto external media. To prevent against such forensic imaging, it is important to encrypt data stored on a device.
Since version 3.0 (Honeycomb) of the OS, Android has included support for full disk encryption, but it is not enabled by default. If you want to keep your data safe, enabling this feature is a must.
Unfortunately, Android currently uses the same PIN or password for both the screen unlock and to decrypt the disk. This design decision makes it extremely likely that users will pick a short PIN or password, since they will probably have to enter their screen unlock dozens of time each day. Entering a 16-character password before making a phone call or obtaining GPS directions is too great of a usability burden to place on most users.
Using a shorter letter/number PIN or password might be good enough for a screen unlock, but disk encryption passwords must be much, much longer to be able to withstand brute force attacks. Case in point: A tool released at the Defcon hacker conference this summer can crack the disk encryption of Android devices that are protected with 4-6 digit numeric PINs in a matter of seconds.
Hopefully, Google’s engineers will at some point add new functionality to Android to let you use a different PIN/password for the screen unlock and full disk encryption. In the meantime, users who have rooted their device can download a third-party app that will allow you to choose a different (and hopefully much longer) password for disk encryption.
What about Apple?
The recent Wall Street Journal story on Google also raises important questions about the phone unlocking assistance Apple can provide to law enforcement agencies. An Apple spokesperson told the Journal that the company “won’t release any personal information without a search warrant, and we never share anyone’s passcode. If a court orders us to retrieve data from an iPhone, we do it ourselves. We never let anyone else unlock a customer’s iPhone.”
The quote from Apple’s spokesperson confirms what others have hinted at for some time: that the company will unlock phones and extract data from them for the police. For example, an anonymous law enforcement source told CNET earlier this year that Apple has for at least three years helped police to bypass the lock code on iPhones seized during criminal investigations.
Unfortunately, we do not know the technical specifics of how Apple retrieves data from locked iPhones. It isn’t clear if they are brute-forcing short numeric lock codes, or if there exists a backdoor in iOS that the company can use to bypass the encryption. Until more is known, the only useful advice I can offer is to disable the “Simple Passcode” feature in iOS and instead use a long, alpha-numeric passcode.
By Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy and Technology Project at 11:48am
While we in the civil liberties community disagree strongly with private investigator Steven Rambam‘s admonition to “Get Over It,” after listening to him describe electronic surveillance powers it’s hard to disagree with the first part of the title of his talk: “Privacy Is Dead.” (Part two of the talk is below.)
“Where you work, what your salary is, your criminal history, all the lawsuits you’ve been involved in, real property…everything you’ve ever purchased, everywhere you’ve ever been…Your information is worth money. Your privacy today isn’t being invaded by big brother — it’s being invaded by big marketer,” he told an audience of hackers and privacy activists at HOPE 9 in New York during the summer of 2012.
Lots of the talk is about big corporations and their insatiable hunger for data about all of us, but Ramdam also addresses government spying:
One of the biggest changes is the ability to track your physical location. I’m sorry I came in at the end of the previous talk. I heard them talk about surveying cell phones with a drone, in a wide area — this is something that is done routinely now. [Note: Is that what these microwave antennas were used for at Occupy Wall Street in mid September?] I can tell you that everybody that attended an Occupy Wall Street protest, and didn’t turn their cell phone off, or put it — and sometimes even if they did — the identity of that cell phone has been logged, and everybody who was at that demonstration, whether they were arrested, not arrested, whether their photos were ID’d, whether an informant pointed them out, it’s known they were there anyway. This is routine.
I can tell you that if you go into any police station right now, the first thing they do is tell you, “Oh I’m sorry you’re not allowed to bring a cell phone in there. We’ll hold it for you.” Not a joke. And by the way it’s a legitimate investigatory technique. But cell phones are now the little snitch in your pocket. Cell phones tell me where you are, what you do, who you talk to, everbody you associate with. Cell phone tells me [sic] intimate details of your life and character, including: Were you at a demonstration? Did you attend a mosque? Did you demonstrate in front of an abortion clinic? Did you get an abortion?
Watch to hear more on drones and open source intelligence. Part two of Rambam’s talk:
Biology’s databank, DNA has long tantalized researchers with its potential as a storage medium: fantastically dense, stable, energy efficient and proven to work over a timespan of some 3.5 billion years.
While not the first project to demonstrate the potential of DNA storage, Church’s team married next-generation sequencing technology with a novel strategy to encode 1,000 times the largest amount of data previously stored in DNA.
The researchers used binary code to preserve the text, images and formatting of the book at a density of 5.5 petabits (1 million gigabits) per cubic millimeter. “The information density and scale compare favorably with other experimental storage methods from biology and physics,” said Sri Kosuri, a senior scientist at the Wyss Institute and senior author on the paper. The team also included Yuan Gao, a former Wyss postdoc who is now an associate professor of biomedical engineering at Johns Hopkins University.
And where some experimental media — like quantum holography — require incredibly cold temperatures and tremendous energy, DNA is stable at room temperature. “You can drop it wherever you want, in the desert or your backyard, and it will be there 400,000 years later,” Church said.
Reading and writing in DNA is slower than in other media, however, which makes it better suited for archival storage of massive amounts of data, rather than for quick retrieval or data processing. “Imagine that you had really cheap video recorders everywhere,” Church said. “Just paint walls with video recorders. And for the most part they just record and no one ever goes to them.
But if something really good or really bad happens you want to go and scrape the wall and see what you got. So something that’s molecular is so much more energy efficient and compact that you can consider applications that were impossible before.”
About four grams of DNA theoretically could store the digital data humankind creates in one year
Although other projects have encoded data in the DNA of living bacteria, the Church team used commercial DNA microchips to create standalone DNA. “We purposefully avoided living cells,” Church said. “In an organism, your message is a tiny fraction of the whole cell, so there’s a lot of wasted space. But more importantly, almost as soon as a DNA goes into a cell, if that DNA doesn’t earn its keep, if it isn’t evolutionarily advantageous, the cell will start mutating it, and eventually the cell will completely delete it.”
In another departure, the team rejected “shotgun sequencing,” which reassembles long DNA sequences by identifying overlaps in short strands. Instead, they took their cue from information technology, and encoded the book in 96-bit data blocks, each with a 19-bit address to guide reassembly. Including jpeg images and HTML formatting, the code for the book required 54,898 of these data blocks, each a unique DNA sequence. “We wanted to illustrate how the modern world is really full of zeroes and ones, not As through Zs alone,” Kosuri said.
The team discussed including a DNA copy with each print edition of Regenesis. But in the book, Church and his co-author, the science writer Ed Regis, argue for careful supervision of synthetic biology and the policing of its products and tools. Practicing what they preach, the authors decided against a DNA insert — at least until there has been far more discussion of the safety, security and ethics of using DNA this way. “Maybe the next book,” Church said.
A blind man in the dark with ear muffs on knows that something happened in Benghazi, Libya more than a spontaneous angry mob pissed off over a Grade Z video attacked an American Consulate and killed the US Ambassador to Libya.
I hate internet conspiracy theories, and loathe slinging a new one into the mix, but the evidence available adds up one way: the attack, well-planned, was surgical payback for CIA activity in the area. Stevens wasn’t the target at all, he was just a celebrity in the wrong place at the wrong time. The guff about the dumb Prophet movie was the first cover story for the US Government and when that fell apart like cardboard in the rain, the State Department shifted the meme to flag waving over Stevens’ death.
Let’s see what we know:
– The attack was not spontaneous. It involved a large number of men, perhaps as many as 125, fighting in a coordinated fashion, using weapons such as RPGs and mortars on multiple targets. Yes, yes, lots of people carry guns around Libya, but not RPGs and certainly not crew served weapons like mortars. It appears also that the so-called Libyan security forces assigned to protect the Consulate either conveniently disappeared on cue or saw the smack coming down and ran to save themselves. This information is widely available from media outside the US, but scare in US media sources for some reason.
– The attack did not target Stevens. Indeed, famously, his body was only pulled from the ruins of the Consulate by a secondary crowd. Whether the crowd abused the body or dragged it to a hospital, it clearly had no idea or concern for who it held. The Consulate attackers went for documents, and ignored the Ambassador. Stevens just happened to be there, wrong place, wrong time.
– Half the US personnel evacuated out of Benghazi were CIA. While it is common knowledge that the CIA stations personnel abroad, it seems very unusual to have half a mission’s complement to be Agency. The New York Times reports that though the Agency has been cooperating with the new post-Qaddafi Libyan intelligence service, the size of the CIA’s presence in Benghazi apparently surprised some Libyan leaders. The deputy prime minister, Mustafa Abushagour, was quoted in The Wall Street Journal last week saying that he learned about some of the delicate American operations in Benghazi only after the attack on the mission, in large part because a surprisingly large number of Americans showed up at the Benghazi airport to be evacuated.
– In its reporting on the large number of CIA personnel in Benghazi, the New York Times agreed to withhold locations and details of Agency operations at the request of Obama administration officials, who said that disclosing such information could jeopardize future sensitive government activities and put at risk American personnel working in dangerous settings.
– The UK’s Independent noted that the Consulate attackers made off with documents listing names of Libyans who were working with Americans, and documents related to oil contracts. This strongly suggests the attack itself may have been a diversion to steal these documents and the Ambassador’s death, in U.S. terms, merely collateral damage. The organized attacking mob did not seem to be primarily interested in looting or stealing computer stuff.
– Many wondered why the media was reporting from early on the deaths of four Americans at the Benghazi Consulate, while Clinton continuously only mentioned two (Ambassador Stevens and computer person Sean Smith). Well, that’s because she did not want to tell us that the other two who lost their lives were “former” Navy SEALS now acting as State Department “contractors.” Even when Clinton finally acknowledged the SEALS’ deaths following widespread press reports, she only mentioned that one’s role was as security for the Ambassador.
Clinton pointedly did not mention what the other SEAL was doing in Libya. That is because the other deceased man was in Libya on an intel mission. The SEAL told ABC News that he was in Libya in the field tracking down and blowing up MANPADS, shoulder-fired surface-to-air missiles. The US saw its way to allowing those weapons to be used against Qaddafi and now wants to take them back so they are not used against us. Such ops are not State Department work and fall cleanly into CIA territory.
– The State Department’s curious mix up over who was providing security at the Benghazi Consulate also may point toward other US government Agencies. State Department spokeswoman Victoria Nuland initially said “at no time did we contract with a private security firm in Libya,” while federal procurement records easily Googleable showed a contract for “security guards and patrol services” on May 3 for $387,413.68. An extension option brought the tab for protecting the consulate to $783,000. The contract lists only “foreign security awardees” as its recipient. Was typically fastidious Nuland’s wrong answer simply because she was misbriefed, or was it in fact an honest answer, that the guards were not State Department contractors at all?
According to Danger Room, the State Department frequently hires security companies to protect diplomats in conflict zones. It usually is done through what’s known as the Worldwide Protective Services contract, in which a handful of approved firms compete to safeguard specific diplomatic installations.
In 2010, State selected eight firms for the most recent contract. Blue Mountain wasn’t among them, and the State Department did not explain why the Benghazi consulate contract did not go to one of those eight firms. How the State Department could have even hired a foreign firm outside that blanket contract is unclear. State’s Inspector General had criticized State’s management of personnel security firms, so unilaterally expanding the pool just for one Libyan Consulate seems off base.
– The US government has had a heck of a time getting its story straight over what happened in Benghazi, most famously in sending UN ambassador and attack dog Susan Rice around to claim the attack was purely spontaneous even as the White House backed away from the idea. We’ve already mentioned Clinton’s duplicity over the identities and roles of the two deceased American “ex-” SEALS. Even long-time State drone Patrick Kennedy, Under-Secretary at the State Department, said at one point he was convinced the assault was planned due to its extensive nature and the proliferation of weapons.
The election-year focus on President Barack Obama meant that the White House had at first been catching most of the heat for the tragedy in Benghazi. It’s certainly true the explanations from White House spokesman Jay Carney and UN Ambassador Susan Rice have strained common sense — mainly, the idea that the attack could be blamed solely on an anti-Islamic video, and that there was a protest outside the consulate at 10 p.m. (there reportedly wasn’t,) among other misleading details. That initial story has crumbled, and it took Robert Gibbs to get the Obama administration back on message on the Sunday shows.
State’s later calling reporter Michael Hastings an “asshole” and telling him to “fuck off” in relation to CNN’s use of Ambassador Steven’s found diary just adds fuel to the make-it-up-as-you-go-along nature of all this.
– Of course, there is a sort of precedent for this, most famously in 1991 when the KGB used a fire in the US Embassy in Moscow as a cover to roam around the building collecting documents,
Look, if all you have to do is tell the truth, it is pretty easy. Making up a cover story on the fly requires revisions. It may not be in our lifetimes that we learn what really happened in Libya, but something more than just a protest gone wild did happen.
It gets worse by the hour. While France wisely outlawed wi-fi in its schools due to its serious effects on children, more appliances, transmitters, signals, antennas, phone masts, dishes, and electronic gadgetry is being added by the minute.
And we’re supposed to be excited about it.
Just look at this insane ad intended to sex-up the electromagnetic crap blasting our biosignals to smithereens.
Looks like V-rizin’ wants to “Rule the Air!” with their death-dealing microwaves.
The Orwellian voice-over?
“Signal – Airborne, beautiful and strong. There to insure the most powerful transmitter is YOU!”
The Sinister Assumptive Message
“Oh how we love getting blasted with our phone signals!! You rock, Verizon!..bring on the microwaves, robo-automation and anything else! We are techno-crazy and love it so!”
Wrong, you bastards. Don’t tell us what we want, Big Corp, we’re sick of it! And for those falling for this…wake the hell up!
Your playing with our health, well being and environment is about to come to an end.
Diabolical Microwaves
The effects of these cell towers and other microwave technologies bear witness to their perfidy. While they make light of these death-dealing devices and pretend they’re innocuous, the unwitting sheeple wither and die from mutated brain cells, injured immune and nervous systems, organ damage, and our children are predicted to have genetically altered offspring within 2 generations!
Never mind seriously influencing our minds.
We Live in ‘Electromagnetic Soup’
The “electrosmog” that first began developing with the rollout of the electrical grid a century ago and now envelops every inhabitant of Earth is responsible for many of the diseases that impair or kill them.
In 2007, the Bioinitiative Working Group released a 650-page report citing more than 2,000 studies (many very recent) that detail the toxic effects of EMFs from all sources. Chronic exposure to even low-level radiation (like that from cell phones), can cause a variety of cancers, impair immunity, and contribute to Alzheimer’s disease and dementia, heart disease, and many other ailments.
“For the first time in our evolutionary history, we have generated an entire secondary, virtual, densely complex environment — an electromagnetic soup — that essentially overlaps the human nervous system,” says Michael Persinger, PhD, a neuroscientist at Laurentian University who has studied the effects of EMFs on cancer cells.
And it appears that, more than a century after Thomas Edison switched on his first light bulb, the health consequences of that continual overlap are just now beginning to be documented. (Source)
They Didn’t Have to Use These Damaging Frequencies–They CHOSE To!
Retired British military intelligence scientist Barrie Trower who for years worked in microwave and stealth warfare, has been speaking out and supplying scientific documentation regarding the serious dangers of EMFs, and getting results.
He said,
During the 1950s and 1960s during the Cold War, it was realised by accident that microwaves could be used as stealth weapons when the Russians beamed the American embassy during the Cold War and it gave everybody working in the embassy cancer, breast cancers, leukemias whatever, and it was realised then that low level microwaves were the perfect stealth weapon to be used on dissident groups around the world, because you could make dissident groups sick, give them cancer, change their mental outlook on life without them even knowing they were being radiated.
The electromagnetic spectrum is a band that goes from gamma rays and x-rays at one end, the very high energy waves, and it comes down through visible light, which is also some radiation, and then it goes through infrared microwaves, tv and radio. Now the only ones which really affect us in the communications industry are the microwaves, and microwaves have a special ability to interfere with water, which is how microwave ovens work, and we are made of water.
All of our chemical and electrical signals involve water in the body, somehow, electrical communications in the body. So, the industry has picked the worst possible part of the electromagnetic spectrum to give to young children and to adults (with regards to cell phones).
The Frightening Effects of WiFi and Cell Phone Radiation on Young Girls
Trower: I have three research papers. I am a scientific adviser to five organisations. Part of my brief is I read international scientific papers, I retranslate them into a language that most people can understand, which is how I advise.
I have three papers showing that low level microwaves can interfere with the genetics in the ovarian follicles. Now what that means in everyday language, different from boys, young girls when they’re born, they will have up to four hundred eggs in their ovaries. The microwaves can damage the genetic structure, we now know, in those ovaries. So, when this young girl grows up, gets married, and has children, if she has a daughter, this particular mitochondrial genetic damage is irreparable. There is nothing at all that can repair it.
(See full transcript of interview with Barrie Trower here)
Barrie Trower Speaks about Microwave Radiation
On August 24, 2010, Mr. Barrie Trower, a British physicist who was a microwave weapons expert and who worked for the Royal Navy and the British Secret Service, gave a talk at the University of Toronto about the health effects of WiFi and other forms of microwave radiation.
Mr. Trower came out of retirement because he was concerned that the microwave frequencies and intensities to which children are exposed in schools are similar to those used for microwave weapons. He provided Dr. Havas with a copy of a talk he gave to the King of Botswana earlier this year (April 2010) and that document can be viewed here.
Link to article in Toronto Star August 26, 2010: ”U.K. Expert Warns against Wi-Fi.”
For a genuine visit with Mr. Trower and to hear his full views, this is for you:
These Same Wicked PTBs Electrify Our Atmosphere – And Put Towers Near Schools, Hospitals and Population Centers
If you’ve driven around under our metalisized skies, noticing these proliferating phone towers or masts, you’ll notice how many have been diabolically placed near or directly on schools, institutions, medical facilities, strip malls, businesses and housing areas. You can be sure the ‘Phone Company’ is well aware of what they’re doing and the dangerous effects–they just lie to the underlings.
That’s why things like THIS happen when the informed take drastic action to draw attention to this horrific reality.
We’re dealing with intentional harm to our young people and overall population by the same corporate devils who genetically modify our crops, poison our air and water, and add carcinogenic genetically altering additives to our food.
Are All These Towers Just For Cell Phones…or Mind and Thought Manipulation?
The use of EMFs (electromagnetic frequencies) is one of our elite controllers most effective stealth technologies. Besides breaking down human health, the human brain is known to operate at a certain frequency, and is easily accessed and manipulated within that range using the ‘right’ technology. You can be sure the Powers That Be are using these for other purposes as well.
The day is now approaching in which government mind control technologies will be directed at you, your neighbors, and your loved ones. Every single day, equipment is being erected and installed in this country with the hidden purpose of exerting mind control over the entire population. Everywhere in this country (and overseas), ELF/microwave transmission towers are being erected. No one is saying anything, but you’re expected to presume that they’re for cell phones. (Do you really think that we need that much ‘cell phone’ transmission capability, every few blocks? Do you realize how very little energy is used by genuine cell phone usage? Yet these towers are capable of putting out levels of power that exceed cell phone requirements by a wide margin.
These mind control technologies have been in place for a long time. It’s not an accident that the frequency band chosen for cell phone use just happens to match the second order waves that Wilhelm Reich discovered in the late1940′s to effect thought transmission and allow the mind to be manipulated without the victim realizing it. Reich worked on this project secretly for the CIA for over 5 years, from 1947-1952, until he realized who the CIA was planning to use the mind control on -the American people. He was outraged that he was deceived and used for such a treasonous motive and swore never to cooperate with the CIA, FDA, etc. again. Reich was covertly murdered in Federal prison in 1957, just a few weeks before he was due to be released, having been in prison for 2 years on a trumped up charge leading to a contempt of court citation.
A method was discovered to disable these ELF towers from exerting their mind control functions by placing a simple device known as an orgone generator within a radius of 1,300 feet of these towers. These microwave towers are used in conjunction with HAARP based technology to not only affect subliminal mind control influences, but also to control the weather, the creation of artificially induced drought conditions are also greatly influenced by the population-reduction chemtrail spraying operations which take place daily over the skies in America and in many other countries) . Source
Can We Stop Cell Phone Tower Construction?
from Lynn Quiring, RPh, CCN, NMDLogical Health LLC
‘Unfortunately, there is not much one can do to stop the proliferation and continued build out of cell phone towers and structures. Although thought to be legislation about deregulation issues, the Telecommunications Act of 1996 (TCA) was really an open invitation for the cell phone industry to place their towers anywhere they wanted. Section 704 of the TCA basically states that local authorities can’t ban the placement of towers in their jurisdictions. The law says: “No State or local government or instrumentality thereof may regulate the placement, construction, and modification of personal wireless service facilities on the basis of the environmental effects of radio frequency emissions to the extent that such facilities comply with the Commission’s regulations concerning such emissions.” So legally the local government can’t refuse the construction of a cell phone tower in your neighborhood! Any challenge by local communities could easily end up in federal court. Our lawmakers have basically given the cell phone industry free reign to install these towers wherever they want. And, by the way, the cell phone industry helped write this legislation that our government officials passed as law! The public, therefore, now has no voice and no vote. Is there something wrong with this picture? Why didn’t our public officials represent the people instead of big business? Why would you let the very industry you’re trying to regulate write it’s own laws?
How Many Cell Phone Towers Are Near You?
The average person lives within one-half mile of a cell phone tower. Have you ever wondered how close you live or work to one of these towers? Would it bother you if one were right in your backyard? How many of these towers and antennas do you think there are in your immediate area? Find out by visiting the website www.antennasearch.com/. Simply type in your address and you’ll get a listing and a map of all the towers and antennas within a short radius of your address. Like most people you’ll probably gasp when you see the numbers. These towers are literally everywhere. Hundreds and hundreds of them are probably located within a few miles of your home or office.
What Can We Do?
Obviously, we can’t escape the exposure. We’ve established that fact. So what can we do to minimize the damage?
Here are few ideas: We need to limit our exposure any way possible. Don’t live near a cell phone tower if you have a choice. Don’t buy a home near one even if the price is right. Limit your use of wireless devices. Go back to ‘wired’ connections whenever possible. Maximize your health through proper nutrition and good hydration. Eat foods high in antioxidants and take supplements. Eat organically as much as possible. There is no safe distance to locate away from a mast tower. Obviously, the closer to the tower the greater the exposure risk so do locate as far away as possible. Whenever possible encourage your local government officials to consider transitioning to the use of fiber optic cable. Most of it has already been laid underground. It’s just not being used. There are no masts with fiber optics and the small amount of radiation at the exits can be neutralized with technology now available. Discourage the use of Wi-Fi in schools by meeting with your school officials and school boards. Wi-Fi hotspots are popping up everywhere now. Even whole cities are going wireless with the installation of Wi-Fi. Again, it’s all done through a wireless signal, which is damaging to your health. Don’t let cell phone companies install cell phone antennas on the roofs of schools where your children attend. The radio waves are disruptive to their ability to focus, not to mention the health hazards we’ve already outlined. If you can’t change your current situation there is some hope. There are some intervention devices now available that you can use in your home, school and office to help lessen the risk of exposure. Some very good cutting-edge technology has been developed that will intervene and help mitigate the damage being done by wireless connections.’ (Source)
The Smart Meter Onslaught
This is the nastiest wave yet. They’re attacking residences with extremely powerful rapid intermittent blasts under the guise of checking your energy consumption.
Not the case. They’re not only monitoring your every activity, but you’re being bombarded with the most sinister waves yet.
A tremendously helpful site can be found HERE..at freedomtaker.com. Read it carefully and take advantage of its info. We’re being killed off if we let them, don’t be the next.
Protect Yourself and Your Family
If you look up EMF protection devices, you’ll find plenty.
One particular technology I find particularly intriguing is the Orgone Technology mentioned above. This is believed to work at the quantum level and to be able to convert the negative entropy of these destructive waves into a positive force. There is a growing army of enthusiasts who are experimenting with orgonite devices and getting amazing results.
Be sure to research it.
Knowing what we do regarding the crystalline structure of the universe, I find it intuitively makes a lot of sense, especially when coupled with prayer or intention. Our own magnificent bodies are crystalline, for which reason we need to realize we are either receiving and amplifying this negative entropy, or helping to convert it to a positive force.
It’s certainly something worth researching. But in whatever form we can, we should resist with consciousness in every form possible.
Conclusion
We’re under attack.
We need to be informed, aware and willing to inform others, as well as effect changes to help people escape the effects of these debilitating technologies as much as possible. As more and more people become aware of these facts, the change of consciousness and behavior that ensues will continue to transform our planet.
These are serious times we live in, and we need to respond accordingly.
Book Description Publication Date: May 12, 2009
For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network of military bases and conflicts to advance the long-term goal of Full Spectrum Dominance. Methods included control of propaganda, use of NGOs for regime change, Color Revolutions to advance NATO eastwards, and a vast array of psychological and economic warfare techniques. They even used ‘save the gorilla’ organizations in Africa to secretly run arms in to create wars for raw materials. It was all part of a Revolution in Military Affairs, as they termed it. The events of September 11, 2001 would allow an American President to declare a worldwide War on Terror, on an enemy who was everywhere, and nowhere. 9/11 justified the Patriot Act, the very act that destroyed Americans’ Constitutional freedoms in the name of security. This book gives a disturbing look at the strategy of Full Spectrum Dominance, at what is behind a strategy that could lead us into a horrific nuclear war in the very near future, and at the very least, to a world at continuous war. Seeds of Destruction: The Hidden Agenda of… by William F. Engdahl
4.3 out of 5 stars (28)
$16.47 A Century of War: : Anglo-American Oil Poli… by F. William Engdahl
5.0 out of 5 stars (1)
$24.95 Gods of Money: Wall Street and the Death of... by F. William Engdahl
5.0 out of 5 stars (1)
$21.33 They Own It All (Including You)!: By Means o… by Ronald MacDonald
4.8 out of 5 stars (38)
$14.96 Next
——————————————————————————–
Editorial Reviews About the Author
F. William Engdahl is author of the international best-selling book on oil and geopolitics, A Century of War: Anglo-American Politics and the New World Order. He is a widely discussed analyst of current political and economic developments whose articles have appeared in numerous newspapers and magazines and well-known international websites. His book, ‘Seeds of Destruction: The Hidden Agenda Behind Genetic Manipulation,’ deals with agribusiness and the attempt to control world food supply and thereby populations. He may be reached at his website, www.engdahl.oilgeopolitics.net –This text refers to an alternate Paperback edition.
——————————————————————————–
Product Details
Paperback: 268 pages
Publisher: Third Millennium Press (May 12, 2009)
Language: English
ISBN-10: 0979560861
ISBN-13: 978-0979560866
Product Dimensions: 8.9 x 5.9 x 0.6 inches
Shipping Weight: 5.6 ounces
Average Customer Review: 4.7 out of 5 stars See all reviews (15 customer reviews)
Amazon Best Sellers Rank: #1,109,639 in Books (See Top 100 in Books)
5.0 out of 5 stars Urgent and Essential Reading, June 21, 2009
By Margot L. White “M. Lachlan White”
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
FULL SPECTRUM DOMINANCE is a rare and essential book — one that orients readers quickly and deeply to the world we live in, and how we arrived here. William Engdahl presents the historical background of policy making and decision analysis that explains how the United States arrived at its present “mission” in the world. The value of Engdahl’s brilliant book is not only that it familiarizes American readers with a history that is not usually revealed to us, but it also guides us through the many overt and covert tactics employed by the US for regime change– primarily via the Pentagon and its nefarious weapons contractors, but also through various think tanks and foundations with innocuous names disingenuously referring to “democracy” and “freedom.” The “full spectrum” of tactics and deceptions and tricks — both violent and non-violent — is revealed here. Needless to say, this book falls within the honorable tradition of political histories that blow the cover off America’s much vaunted pretense and propaganda about serving the cause of “freedom” and “democracy” around the world! It is the only book available today that covers ALL of this, with ample quotations and documents from the architects of US policies, in just 250 well written pages. FULL SPECTRUM DOMINANCE is unique in presenting the evolution of CIA tactics, ranging from its crude “coups” of yesteryear (as in Iran and Guatemala) to its current — and perhaps more insidious — use of “non-violent” electronically manipulated technological “crowd control” via cell phones and (as is currently evident on the streets of Tehran) Twitter. If Americans are woefully ignorant of the full range and dangerous extremes of American violence around the world, of American interventions into and manipulations of other countries’ elections and environments and economics, then there is no longer any excuse for such ignorance. FULL SPECTRUM DOMINANCE is a “must read.” To understand pipeline politics, the critical importance of Eurasia to US defense contractors, read this book. To understand how and why America has become such a rapacious and violent empire with bases all over the world and tens of thousands of agents provocateurs doing its dirty work from Tibet to Tehran, manipulating elections, staging phony “revolutions” to surround Russia with hostile Made-in-USA regimes, propping up American-trained puppets or fomenting chaos from Myanmar to Congo and from Ukraine to Iran — read this book! Help other customers find the most helpful reviews
Was this review helpful to you? Yes No Report abuse | Permalink
Comment Comment (1)
5.0 out of 5 stars Essential reading, June 1, 2009
By Lori “The Rogue Reader Mom” (Arizona) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
F W Engdahl has succeeded again at the difficult task of explaining the complexities of how our world really works and how we got to this frightful point in world affairs.
An exacting researcher, Mr. Engdahl, with his latest book, has taken on the task of sorting out the USA’s real intentions as it pertains to the rest of the world. In connecting the dots he takes us on a journey of clarity and comprehension regarding the aggressive path our nation is on as it builds the American Empire.
To follow Mr. Engdahl’s logical explanations of why we do what we do to the rest of the world is to come to the realization that the US may not be the ‘good guys’ we think we are and the rest of the world may have plenty of reasons to be wary of the US.
A sobering examination of our real past and current policies towards Russia, China, Europe, the Middle East and the rest of world community, ‘full spectrum dominance’, as the Pentagon calls it, is a strong-arm policy of control over the rest of the world that is leading us down a disastrous path towards a possible world war. We can’t solve our world’s problems until we properly identify them. Mr. Engdahl has done that in superb fashion.
5.0 out of 5 stars A book everyone needs to read!, July 1, 2009
By William Fetty “Kamakazi” (Sweden)
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
Engdahl’s books are at the very top of my list of books I recommend to people who want to know what is happening geopolitically in the world, but more importantly WHY things are happening!
Engdahl, though an academic scholar and very well educated with years of experince has once again written a book that anyone can understand and which reads like a great documentary film, much due to the fact that Engdahl is also a journalist, historian and economic researcher!
Full Spectrum Dominance picks up where his first book on the subject “A Century Of War:Anglo-American oil politics and the new world order” ends.
Engdahl once again leads us through the matrix of anglo-american foreign policy and their century old agenda of literal world domination through brute force and covert non-violent means. The evil and criminal actions of the anglo-american empire throughout the 20th century which has now spilled over in to the new millenium are presented in great detail and just like Engdahls previous books makes for a page turner. Once again I cannot recommend this book enough! Read it!
The quite strange unarmed bird-like drone which was recovered by Pakistani forces in August of 2011 apparently did not just fly over Pakistan, but was also apparently spotted by Iraqi insurgents at least two years before making its way to Pakistan.
A reader of The Aviationist tipped them off to a video posted on May 28, 2009 showing the drone captured by the Iraqi Hezbollah in Iraq which is eerily similar to the drone which was captured in Pakistan.
The providence of the drone is shrouded in a thick veil of mystery since no nation would take responsibility for the device which has, according to Danger Room, “silver wings and a span about the size of a grown man’s outstretched arms, the drone was clearly more than a hobbyist’s toy: the remains of a camera were near the crash site, a camera that fit into the robotic bird’s belly, ostensibly for spying on insurgents.”
Danger Room points out that the drone is quite similar to, but definitely not exactly the same as, Festo’s “SmartBird” drone.
The dimensions of the two drones are similar and the designs obviously look alike as well although, “It’s clearly not the same drone, as the wings are obviously different: the mystery drone’s wings are straighter and more sharply angled than the SmartBird’s sleeker, more rounded wings, which mimic those of the gull,” according to Danger Room.
The nation or entity behind the drone is difficult to determine outside from speculation based on the nations currently involved in operations in Pakistan.
However, Danger Room seems to think it belong so the U.S. in writing, “Iraqi Hezbollah date its photos of the mystery drone to May 2009 in Basra, a major city in southern Iraq. Back then, U.S. troops were training their Iraqi counterparts on new-line intelligence, surveillance and reconnaissance systems. Hmm.”
While the video and screenshots don’t reveal any technical information on the drone which is all that new, it does show that the drone in Iraq and that in Pakistan are closely related.
Both have a design which relies on flapping wings, a trapezoidal tail feather and a spherical camera placed in the belly of the bird.
However, the drone recovered in Pakistan has a tailfin on the underside of the rear feather which the drone in Iraq is missing and the version found in Iraq is a duller color than the reflective silver drone in Pakistan.
“The fact that it was probably already flying in Iraq two years before crashing in Pakistan, proves that the bird-like UAV is not a toy but a small combat proven spy drone,” writes The Aviationist’s David Cenciotti.
This deals a significant blow to those who have repeatedly claimed that it was actually just a DIY drone, evidenced by Danger Room tagging the latest post with “DIY Drones.”
However, since we really have no idea who made the drone or who was operating it, one cannot say with certainty that it is not a DIY creation of some group somewhere although I find this quite unlikely.
Ultimately, it’s impossible to speculate on the issue with any degree of certainty since we know very little about the drone and its origin but it will be fascinating to see if more information comes out or if more appearances of the strange device begin to surface.
Did I forget anything or miss any errors? Would you like to make me aware of a story or subject to cover? Or perhaps you want to bring your writing to a wider audience? Feel free to contact me at [email protected] with your concerns, tips, questions, original writings, insults or just about anything that may strike your fancy.
Please support our work and help us start to pay contributors by doing your shopping through our Amazon link or check out some must-have products at our store.
As well as thanking God for his success, CEO Chris Hyman is a Pentecostal Christian who has released a gospel album in America and fasts every Tuesday. Coincidentally he was in the World Trade Centre on 9/11 on the 47th floor addressing shareholders.
Serco run navy patrol boats for the ADF, as well as search and salvage operations through their partnership with P&O which form Maritime Defence Services.
Serco run two Australian Jails already, Acacia in WA and Borallon in Queensland
They’re one of the biggest companies In the UK for running electronic tagging of offenders under house arrest or parole.
Serco are in one of the two favoured bid consortiums for the new Sydney metro rail line.
Here are some amazing corporate videos from Serco, we fully recommend both if you’re a fan of Verhoeven-esque corporate propaganda. You can watch the video here:
Serco Group plc is a British government services company based in Hook, North Hampshire in the United Kingdom. It is listed on the London Stock Exchange and is a constituent of the FTSE 100 Index. Among its operations are public and private transport and traffic control, aviation, military and nuclear weapons contracts, detention centres and prisons, and schools.
Serco was founded in 1929 as a United Kingdom division of the Radio Corporation of America and initially provided services to the cinema industry.[3] It changed its name to Serco in 1987[3] and has been a London Stock Exchange listed company since 1988.[3]
On 29 December 2008, Serco completed its acquisition of SI International.[4]
Operations
The Guardian has called Serco “probably the biggest company you’ve never heard of”.[5]
Serco operates in various sectors:
Home Affairs: Serco operates the National Border Targeting Centre for the UK Border Agency and provides the Carrier Gateway – the interface between carriers and the Agency.[6]
Detention: Serco supplies electronic tagging devices for offenders and asylum seekers.[22] In Britain, Serco runs four prisons, a Young Offenders Institution and a Secure Training Centre.[23] It also operates two Immigration Removal Centres.[24][25] Serco is also responsible for the contracted-out court escort services in the south-east area (formerly a role undertaken by HM Prison Service).[26] In addition, Serco runs partly privatised Hünfeld Prison in Hesse, Germany.[27] In Australia Serco runs Acacia Prison in Western Australia[28] and Borallon Correctional Facility in Queensland[29] as well as the national contract for immigration detention centres, including Christmas Island and the Villawood detention centre in Sydney.[30][31] In Auckland, New Zealand Serco runs the Mt Eden remand prison[32] and in March 2012 was awarded the contract to build an operate a 960 bed prison at Wiri.[33]
Aviation: Serco provides air traffic control services at international airports in the United Arab Emirates[42] and at some smaller airports in the USA and Canada.[43][44] Since 2004 Serco have also had £5m a year from the US government to manage airports in Iraq.[45] Serco also operate Scatsta Airport on Shetland.[46] In June 2010 Serco signed a £4million contract to operate all air traffic control services for Coventry Airport.[47]
Education: Serco holds a 10 year contract with Bradford City Council to manage and operate the local education authority,[53] providing education support services to the City’s schools, and similarly manages and operates Walsall[54] and Stoke-on-Trent local education authorities.[55] Serco is one of Ofsted‘s three Regional Inspection Service Providers, responsible for school inspections in the English Midlands.[56] Serco is also the provider of a Student information system, Facility, used in schools and colleges in several countries.[57]
Drivers’ licensing: Serco, through a purpose-made division Serco DES, holds a 10 year, $114 million contract with the Province of Ontario to operate the province’s DriveTest driver examination centres. These tests include vision, road, and knowledge tests for all persons seeking to become a licensed automobile driver in the province.[43]
Serco publishes a magazine, Ethos Journal, to stimulate thought and provoke reaction to the big issues shaping the world of public services. Ethos is aimed at public sector leaders, politicians, academics and policy specialists debating the future of public services today.[62]
Serco operates waste collection services for local councils.[63]
Serco operates in Continental Europe, the Middle East, the Asia Pacific region and North America, but the majority of its turnover still comes from the UK.
The first thing is to know what to expect before hand. While people think about the dollar dropping to nothing, or an Obama re-election, you need to consider the most pressing signs of a pending martial law.
How pending?
About 15 minutes or less away from being put into a bus.
Now there are people who would look forward to 3 hots and a cot. And there are some who would actively encourage you to go to the camps. There was an article that said that social services folks are encourage self-sufficient people to use food stamps, and that the self-sufficient mentality was preventing more people from being on food stamps.
But we aren’t those people. We are the kinds that enjoy freedom.
So what do we look for?
Using the backbone of a military operation, you must make the enemy (that would be you) deaf, dumb, and blind.
What does that mean? It means you must be blind: Not knowing what to expect, how many men are in the operation, and what your final destination will be. This means that the operation will most likely take place in the middle of the night. When they roll up, mega watt lights will be shone onto the neighbourhood. This disorientates you as well as illuminate your home for movement. This also means the power to your block will be secured. Depending on the size of the town, perhaps several blocks at once. That would be a good thing. Read on…
Deaf means that you won’t know what is going on. Loud noises, such as bullhorns shouting orders, diesel engines running, and people yelling at you to go here or there. It also means you won’t be able to receive texts or cell phone service.
Dumb, or mute, means you won’t be able to call anyone, tweet, post a Facebook update, send an email of warning. Imagine if the events took place in Chicago. How quick would such a warning get spread all over Facebook or Twitter. It would “trends” quickly and the element of surprise would be gone.
Making you deaf and dumb is as simple as securing the internet with the Internet Kill Switch. That ends Facebook, Twitter, and Email.
And all you have to do to secure the cell phone or land-line service is to have the US military show up at the local phone office and have them secure all lines in the place. Turning the power off would be as effective as cutting lines, but once power is restored you could have normal service. Infrastructure would be maintained.
Your neighbourhood is now deaf, dumb, and blind.
You need to buy yourself some time. Not much time, but just enough time.
And you have about 5 minutes to do it in. Maybe less.
What do you need?
You need to make an alert when you lose power. This is from my site:
“I took a small wall wart that is rated at 12 volts and about 100 mA. I attached it to the power and ground part of a small 12v relay I bought from radio shack. I then took a 9v battery connector and a piezeo alarm and put it on the connectors of the relay that if there is no power to the relay – will allow current to flow. The way you find that is to put the red wire of the connector to the relay, and one of the leads from the alarm to the opposite side of the relay. Connect the black wire and the other alarm wire together.
Provided you have a 9v battery on the connector you should hear a sound. If not, change to a different spot on the relay. So when you apply power by plugging in the wall wart, the sound goes off. Remove the wart or turn off the power, you get an alarm sound. “
When I was in the Navy, any time we lost power we went into an immediate Security Alert. And you should too. When that alarm sounds (Put it in your bedroom as close to the bed as possible), after you pull the alarm out of the socket, get up and hide the children,
And that means you have to have pre-arranged hiding spots.
A window seat is a great way to start. Make a bench, bolt it to the wall under the bedroom window, and make small doors for the child to hide in. You can do the same for your room. Tell the children just to go if they are ever told, and to stay very quiet until you tell them to come out. And only you. Pretend to be someone else and see if they come to them. Soldiers may be very sneaky and say, “Your parents told me to get you. Come on, let’s go to them!”
Practice this frequently so they are aware of what needs to be done, and to be done in the dark, and to be done without question.
If you can’t make a window bench, then fill your closet up with “boxes”. These boxes are “stacked” to make it look like a storage area, but it’s just a shell. If you are in a manufactured home or a single story home, go to the closet and cut open a hatch to the crawl space. Have a black blanket so you can hide under the blanket to stay concealed. USE YOUR IMAGINATION!
The idea is that soldiers don’t have much time to search each home. They have to keep moving onto the next house. Once they leave and the power goes back on – DON’T CHANGE ANYTHING. If the bathroom light was on, leave it on. The smart meters will detect and record ANY changes and it will alert someone that there are people within the home!
Drones will be used to monitor communities and neighbourhoods. Going out after dark is the same as going out during the day.
If you go out at night, take a night vision capable video camera. Put black plastic around the IR lamp that is usually beneath the camera’s lens. This will prevent the drone from seeing the IR light, but you’ll be able to see the IR lights on the drone in the dark.
If you feel froggy, shoot down the drone AS IT LEAVES! The flight will be level and of constant speed, enough for you to get a bead on it. It’s difficult to tell where the shot came from, and you’ll get some satisfaction of taking one down. These thing are expensive and if they have to redirect one away from another area, that means someone else is getting a break.
If you have to move from one place to another, do so during a rain or thunderstorm. These conditions make drone flying very difficult and seeing anything of value VERY difficult. Yes, it is horrible conditions for you, but at least you will be free.
If, during the day, you see people wandering through your town, ignore them and hide. They may be “spies” looking for the last holdouts. As a rule of thumb, 8 to 80, blind, crippled, or crazy, means anyone may be a threat. Don’t kill them, just let them pass through. Watch them to see if they use a radio. IF they do use one, listen for codes such as, “Secure”, “Subjects”, “Natives”, or “SitRep (Situation Report)”
Such phrases would mean that they are looking for you as wolves in sheep’s clothing. DO NOTHING towards them. Get their photos if you can but remain hidden.
Satellites may detect heat from fireplaces, so use the covert cooking methods like solar cooking, Hay Box cooking or Creveche. If you can, light a match in the sewers to eliminate any flammable gasses, and cook down there. The streets should hide the heat signature well enough, especially in the day. Solar cooking using the back of a pickup may be a good decision as it may imitate the accumulated heat of a canopy.
You will be on your own. You will be the deciding factor if you live free or die free.
But it’s your decision. No one else makes it for you.
A man whose bid to become a police officer was rejected after he scored too high on an intelligence test has lost an appeal in his federal lawsuit against the city.
The 2nd U.S. Circuit Court of Appeals in New York upheld a lower court’s decision that the city did not discriminate against Robert Jordan because the same standards were applied to everyone who took the test.
“This kind of puts an official face on discrimination in America against people of a certain class,” Jordan said today from his Waterford home. “I maintain you have no more control over your basic intelligence than your eye color or your gender or anything else.”
He said he does not plan to take any further legal action.
Jordan, a 49-year-old college graduate, took the exam in 1996 and scored 33 points, the equivalent of an IQ of 125. But New London police interviewed only candidates who scored 20 to 27, on the theory that those who scored too high could get bored with police work and leave soon after undergoing costly training.
Most Cops Just Above Normal The average score nationally for police officers is 21 to 22, the equivalent of an IQ of 104, or just a little above average.
Jordan alleged his rejection from the police force was discrimination. He sued the city, saying his civil rights were violated because he was denied equal protection under the law.
But the U.S. District Court found that New London had “shown a rational basis for the policy.” In a ruling dated Aug. 23, the 2nd Circuit agreed. The court said the policy might be unwise but was a rational way to reduce job turnover.
Jordan has worked as a prison guard since he took the test.
The average American today is exposed to a whole lot more fluoride than he or she is probably aware. Conventional produce, it turns out, is one of the most prevalent sources of fluoride exposure besides fluoridated water, as conventional crops are not only irrigated with fluoride-laced water in many cases, but also sprayed with pesticide and herbicide chemicals that have been blended with fluoride, and later processed once again with fluoridated water.
This fact may come as a surprise to many who have bought into the idea that eating more fresh produce is automatically beneficial for health, regardless of how that produce was grown. Thinking that they are doing their bodies a favor, millions of Americans have incorporated conventional fruits and vegetables into their everyday diets, not realizing that the resulting cumulative effect of fluoride exposure from these foods could be harming their health.
Many food crops uptake fluoride chemicals from water, soil
According to the U.S. Centers for Disease Control and Prevention (CDC), nearly 75 percent of the U.S. population is being forcibly medicated with fluoride chemicals via their water supplies. This means that a significant percentage of U.S. crops are also irrigated using this same fluoridated water, particularly in the “Bread Belt” states, many of which are almost entirely fluoridated. (http://www.cdc.gov/fluoridation/statistics/2010stats.htm)
While not all crops uptake fluoride from water in the same amounts, many absorb significant amounts of fluoride through their root systems every time they are watered. Tea plants, for instance, are among the worst when it comes to absorbing fluoride from soil and water, and storing it in their leaves (http://lpi.oregonstate.edu/infocenter/phytochemicals/tea/). Grapes are another crop that tends to accumulate fluoride in high levels as well.
According to data collected by the U.S. Department of Agriculture (USDA) for its National Fluoride Database of Selected Beverages and Foods, fresh fruits and vegetables have relatively low levels of fluoride compared to what is found in fluoridated water, reconstituted juices, dried fruit, and other sources (http://www.fluoridealert.org/content/fresh_foods/). But levels can vary, and particularly in the case of conventional produce, fluoridated pesticides and herbicides can add to overall fluoride exposure and intake levels.
Fluoridated pesticide, herbicide residues often lurk on conventional food
Because of its extreme toxicity, fluoride is often added to pesticides and herbicides in order to protect conventional crops from insect damage and disease. But just like with fluoridated irrigation water, fluoridated crop chemicals often absorb directly into plants, or at the very least, linger on the skins of the fruits and vegetables they produce, which adds to their fluoride toxicity.
Sulfuryl fluoride is one such pesticide that is commonly used to treat conventional cereal grains, dried fruit, tree nuts, cocoa beans, coffee beans, and other foods. Though the U.S. Environmental Protection Agency (EPA) is said to currently be in the process of phasing out the use of sulfuryl fluoride (http://www.ewg.org/release/epa-bar-fluoride-based-pesticide), the chemical is still being used on a wide variety of conventional food crops, unbeknownst to consumers.
There are, in fact, more than 150 different fluoridated pesticides currently approved for use on conventional crops, none of which are typically indicated on produce labels. Chances are that if you eat conventional fruit, vegetables, or nuts, you are more than likely eating varieties that have been sprayed or fumigated with fluoride chemicals, which are prohibited from use on organic crops.
As we reported on recently, conventional grapes are often sprayed with the fluoride-based chemical pesticide cryolite, which is often sold under the trade name Kryocide. This particular pesticide actually contains substances that facilitate the passing of fluoride across the blood-brain barrier and directly into brain tissue, which makes it exceptionally toxic. (http://www.naturalnews.com/036753_fluoride_pesticides_grapes.html)
This compounded exposure to fluoride from fluoridated irrigation water, fluoridated pesticides and herbicides, airborne fluoride chemicals, and fluoridated water used during processing or reconstitution after harvest renders many conventional fruits and vegetables fluoride saturated.
Admittedly, many organic crops are also exposed to fluoride via irrigated water just like conventional crops are. But at least organic crops are not sprayed with fluoridated pesticides after harvest, and many organic foods are processed after harvest using purified water, as indicated on their ingredient labels, which means they contain less overall fluoride than their conventional counterparts.
The Fluoride Action Network (FAN) has also created a helpful guide entitled 7 Ways to Avoid Fluoride in Beverages and Food that will help you discern how best to avoid fluoride when shopping for other types of food: http://www.fluoridealert.org/content/grocery_guide/
The Obama administration is battling to restore a controversial provision of a new federal law that it admits could have been used to arrest and detain citizens indefinitely – even if their actions were protected by the First Amendment.
A federal judge this week made permanent an injunction against enforcement of Section 1021 of the most recent National Defense Authorization Act, which was declared unconstitutional.
The Obama administration then took only hours to file an appeal of the order from U.S. District Judge Katherine Forrest, and attorneys also asked her to halt enforcement of her order.
In her order, Forrest wrote, “The government put forth the qualified position that plaintiffs’ particular activities, as described at the hearing, if described accurately, if they were independent, and without more, would not subject plaintiffs to military detention under Section 1021.”
But she continued, “The government did not – and does not – generally agree or anywhere argue that activities protected by the First Amendment could not subject an individual to indefinite military detention under Section 1021.”
The case was brought last January by a number of writers and reporters, led by New York Times reporter Christopher Hedges. The journalists contend the controversial section allows for detention of citizens and residents taken into custody in the U.S. on “suspicion of providing substantial support” to anyone engaged in hostilities against the U.S.
The lawsuit alleges the law is vague and could be read to authorize the arrest and detention of people whose speech or associations are protected by the First Amendment. They wonder whether interviewing a member of al-Qaida would be considered “substantial support.”
“Here, the stakes get no higher: indefinite military detention – potential detention during a war on terrorism that is not expected to end in the foreseeable future, if ever. The Constitution requires specificity – and that specificity is absent from Section 1021,” the judge wrote.
“It most definitely tells us something about their intent,” he told WND.
He cited Obama’s signing statement, when the bill was made law, that he would not use the provision allowing detention of American citizens without probable cause in military facilities.
“Just because someone says something doesn’t mean they’re not lying,” he said.
Bloomberg reports the Obama administration also is asking Forrest for a stay of the ruling that found the law violates the First, Fifth and 14th Amendments.
The judge expressed dissatisfaction with what one observer described as the arrogance of the Department of Justice in the case.
Forrest asked the government to define the legal term, noting the importance of how they apply to reporting and other duties.
“The court repeatedly asked the government whether those particular past activities could subject plaintiffs to indefinite military detention; the government refused to answer,” she wrote.
“The Constitution places affirmative limits on the power of the executive to act, and these limits apply in times of peace as well as times of war,” she wrote.
She said the law “impermissibly impinges on guaranteed First Amendment rights and lacks sufficient definitional structure and protection to meet the requirements of due process.”
“This court rejects the government’s suggestion that American citizens can be placed in military detention indefinitely, for acts they could not predict might subject them to detention, and have as their sole remedy a habeas petition adjudicated by a single decision-maker (a judge versus a jury), by a ‘preponderance of the evidence’ standard,” she wrote.
“That scenario dispenses with a number of guaranteed rights,” she said.
The Obama administration already has described those who hold a pro-life position or support third-party presidential candidates or the Second Amendment fit the profile of a domestic terrorist.
Obama stated when he put his signature to the legislative plan that his administration “will not authorize the indefinite military detention without trial of American citizens.”
Virginia already has passed a law that states it would not cooperate with such detentions, and several local jurisdictions have done the same. Arizona, Rhode Island, Maryland, Oklahoma, Tennessee and Washington also have considered similar legislation.
The case was brought on behalf of Christopher Hedges, Daniel Ellsberg, Jennifer Bolen, Noam Chomsky, Alex O’Brien, Kai Warg All, Brigitta Jonsottir and the group U.S. Day of Rage. Many of the plaintiffs are authors or reporters who stated that the threat of indefinite detention by the U.S. military already had altered their activities.
Constitutional expert Herb Titus filed a friend-of-the-court brief on behalf of the sponsor of the Virginia law, Delegate Bob Marshall and others.
Titus, an attorney with William J. Olson, P.C., told WND the judge’s first decision to grant a preliminary injunction halting enforcement of paragraph 1021 “affirms the constitutional position taken by Delegate Marshall is correct.”
The impact is that “the statute does not have sufficient constitutional guidelines to govern the discretion of the president in making a decision whether to hold someone in indefinite military detention,” Titus said.
The judge had noted that the law doesn’t have a requirement that there be any knowledge that an act is prohibited before a detention. The judge also said the law is vague, and she appeared to be disturbed that the administration lawyers refused to answer her questions.
Titus said the judge’s conclusions underscore “the arrogance of the current regime, in that they will not answer questions that they ought to answer to a judge because they don’t think they have to.”
The brief was filed on behalf of Marshall and other individuals and organizations, including the United States Justice Foundation, Downsize DC Foundation, Institute on the Constitution, Gun Owners of America, Western Center for Journalism, the Tenth Amendment Center and Pastor Chuck Baldwin.
Marshall’s HB1160 passed the Virginia House of Delegates by a vote of 87-7 and the Virginia Senate 36-1. Since the vote was on changes recommended by Gov. Bob McDonnell, it was scheduled to take effect without further vote.
Marshall then wrote leaders in state legislatures around the country suggesting similar votes in their states.
Marshall’s letter noted Virginia was the first state in the nation to refuse cooperation “with federal authorities who, acting under the authority of section 1021 of the National Defense Authorization Act of 2012 (NDAA), could arrest and detain American citizens suspected of aiding terrorists without probable cause, without the right to know the charges against them, and without the procedural rights guaranteed by the Bill of Rights.”
He told lawmakers, “While we would hope that the U.S. Senate and U.S. House of Representatives would be vigilant to protect the constitutional rights of American citizens, even when addressing the problem of international terrorism, those efforts in Congress failed at the end of last year, and President Obama signed NDAA into law on December 31, 2011.”
Endorsing Marshall’s plan was the Japanese American Citizens League, which cited the detention of tens of thousands of Japanese Americans during World War II on no authorization other than the president’s signature.
The Obama administration continues to argue the law allows for detention without legal due process only those who “substantially supported” terror groups such as al-Qaida or “associated forces.” But the plaintiffs note that the law does not define those terms.
Instead, they point to the law’s provision that such individuals may be detained “without trial until the end of the hostilities.”
Obama attorneys said the new law simply affirms what already was precedent under the Authorization for Use of Military Force, which was adopted in the dust of the 9/11 terror attacks.
But plaintiffs wrote, “Nowhere does the AUMF convey to the executive the power to detain any person – citizen or otherwise – who ‘substantially supported’ al-Qaida or the Taliban or their associate forces, as section 1021 of the NDAA now provides.”
“No case has ever recognized the government’s contention that the AUMF authorized the detention of noncombatants. … Neither case law nor the actual text of the AUMF supports the government’s contention that such detention power already existed.”
Reality, Inter-connected. All matter is thought – the nature of the material world, is that it is completely non-material.
Wayne Dyer, Deepak Chopra, David Wilcock, David Icke, Michael Talbot, Gregg Braden,David Lynch, James Traitz, Robert Anton Wilson, Neil Kramer, Grant Morrison, Bill Hicks
I’ve been hearing rumours for a few months now that Godlike Productions has a “banned words” list that will result in you being blocked from reading the website should you decide to use one.
While I fully expect certain keywords to result in you unable to make a posting on the site, but I have never heard of a site that bans you 100% for using said words.
As well, there are only 2 keywords that I know that are blocked… “Alex Jones” and “Tavistock”. Thinking this may just be an urban legend, I wanted to put it to the test.
I opened up my browser and headed over to Godlike Productions. To ensure that I wasn’t already banned (which does happen sometimes) I commented on a few posts.
Then I spy a post from the form administrator. The admin goes by the name “Trinity” and is one of the 2 main administrators. The post was entitled “A Heart Felt Thank You To All Participants On This Website!” where Trinity thanks the visitors of GLP.
Thinking that this would be a perfect place to test my theory, I typed in the following comment:
“I never knew it would be so much fun hanging with the guys from Tavistock”
And then hit the submit button. The screen flashed and suddenly I was greeted with the following message:
SORRY – YOUR IP ADDRESS <REMOVED FOR PRIVACY> HAS BEEN BANNED FROM VIEWING THIS WEBSITE
If you have an upgraded account you are immune to bans while logged in. Please log in now to browse the site.
If you have a free account you may also log in now and upgrade your account to get immunity from bans.
If you still don’t have an account you may create an account now and then upgrade it to get past bans (and get access to other exclusive features).
Thank you for not stalking!
So why would GLP be banning people for using the words Tavistock? Mind control and culture creation are big subjects in the alternative media and Tavistock is at the head of those operations.
Is this just a way for GLP to create buzz in the community? If you ban certain words, like Tavistock, the visitors of the forums will spread that all around the Internet while calling you disinformation.
Unfortunately, Google doesn’t see “truth or false”. They only see that links are being feed back into GLP, thus GLP must be popular. Now Google will rank GLP pages higher because they have more “authority” due to the back-links.
Thinking this was all a bit strange, I decided to see if I could find out who owns GLP and then I could maybe gauge if they are brilliant marketers or full on COINTELPRO.
A Dark Rabbit Hole full of Vipers
As I’ve done with most of my investigations, I started this one without a conclusion in my head. I really wanted to believe that this was just some smart viral marketing campaign by GLP to help bring in hits and advertising dollars. But what I found made me really nervous.
So nervous, in fact, that I’m considering not publishing this article as I write it. Sticking your nose at Intelligence Operations can make you ended up hanging yourself with your hands tied behind your back, but I must continue on. The people have the right to know.
After some digging, and lots and lots of web-speculation, I believe I may have the answer on who actually owns GLP.
Come to find out Trinity’s real name is Jason Lucas and is located in Shalimar, Florida. Jason is one of the principal people behind a company known as “C2 Media” which is a spyware company. This was proven by the following documents submitted to the FTC on a presentation by Mr. Lucas regarding spyware.
Not long after, it seems Mr. Lucas was drafted by the US intelligence community and became Deputy Director of a “data mining” for the Department of Defense’s Joint Task force.
In fact, the more you dig on Mr. Lucas and his business partner, Alex Shamash, you can see they are involved in all the “dirty” technologies on the Internet (aka Spyware, Adware, Malware, etc).
You can trace C2 Media (and their offset company Lop.com, who is well known for their massive spyware campaigns) by just searching through older computer magazines online.
If you want to know more about Jason Lucas and Alex Shamash, please read this article.
The Dark Conclusion
It is the users choice on what sites they visit, but they should be informed of what those sites are monitoring.
In fact, here at Conspiracy HQ, you can easily see our “Privacy Policy” by clicking the link in the top menu bar. We do use cookies to help personalize the users experience, but everything tracked is 100% anonymous.
GLP on the other hand immediately does a port scan of your computer when you connect to their website. This gives the operators plenty of information about you, your computer and what software or holes in security you may have.
Why would a site that is so entrenched in the alternative media track your moves, scan your computer and know exactly who you are when you connect to their site?
I am Jason Anthony Lucas, and am the owner and administrator of a website: godlikeproductions.com
I was born April 10, 1974. Roughly a decade or so ago, I used a business model that installed spyware on hundreds of thousands, perhaps millions, of computers around the world. It was extremely difficult for the average user to get rid of this software, and many people, including well-known computing magazines deemed my software as malware.
By selling the information the software gleaned from unsuspecting individual’s computers, I and my partners made a lot of money. I became rich by most standards, and was able to retire in my early 30’s. Fearing that the spyware might face legal challenges, I sent letters to the Federal Trade Commission, attempting to delineate the software, from spyware/malware. It was clear that the software was indeed spyware/malware, in that it transmitted information from people’s computers without their knowledge to my clients – and I was paid handsomely. Of course, I atempted to convince the FTC otherwise.
Around this time I was looking for ways to spend some of my money, so I bought a website, now commonly known as GLP. I played on peoples’ fears and desires – fears of conspiracies, and desires to be part of a community, as millions of people disassociate from the real world and interpersonal relationships, and are only able to function in a detached, virtual world. By marketing my product toward these two demographics (I’m good at marketing), I have now turned my website into a money making venture, by convincing otherwise intelligent people, to pay me money to have an avatar on my forum, and thereby obtain a “personality” of sorts – something they are unable to do successfully in the real world.
In 2006, my girlfriend at that time, graduated from Cooley law school on January 22. Though still single, we together purchased her childhood home from her parents. On January 30, 2006 her parents provided us a warranty deed to the property, and we signed a mortgage for $535,920 on the same day. I paid off the mortgage in full 13 months later, on March 12, 2007.
We did not marry until March 31, 2007. She put up with my shenanigans such as business dealings with pornographic websites and GLP, as it supplied a steady income stream, in addition to my already acquired wealth. Quite honestly though, things fell apart quite rapidly as my now wife was already pregnant with our daughter when we married. I’m sure my wife expected a “normal” life for us and especially her daughter-to-be; but I’ll admit that my shortcomings proved too much for the relationship. By August 20, 2007, I was kicked out of the house, divorce proceedings had begun, and I legally relinquished the house back to my soon-to-be ex-wife, as I already had another home in my possession; this is still the house I live in to this day. As you can see, my marriage lasted only a few months. My ex-wife was, by this time, living with her parents and the baby. The house I bought back in 2006 (from her parents, and near the ocean) was put up for sale some years ago, and is unoccupied and still for sale to this day. I invested ~ $300,000 of custom work in the house. This means I have roughly $835,000 into the house, but my current asking price is only $585,500.
As part of the divorce legal settlement, my ex-wife deeded the house I bought from her parents, back to me on February 9, 2008. I immediately had the house placed in the Jason A. Lucas Revocable Trust on February 28, 2008. My Successor Trustee is my sister, and I added another trustee, but will not name him yet, as he and I have some business dealings which may put our freedom in jeopardy. My divorce was finalized (recorded) on July 3, 2008.
I’m writing this as an introspective – a catharsis of the mind. Looking back, I’ve been quite an asshole much of my life. My parents divorced when I was 14, and in a little unusual move, my mom had my sister and my surnames changed from my father’s name, back to her maiden name. I am no stranger to the legal system – I have been to court for writing bad checks, my divorce, I sued my next door neighbor and lost (my attorney actually quit on me while in court!), and of course, my various business dealings.
Now that you know some of my history, I’ll open up as to how I feel about myself. I would rather liken my failed life resulting from a Napoleonic Complex (literally). I am of short stature, my parents divorced while I was an early teenager, and found I could use my marketing skills to install spyware onto perhaps millions of computers, and made a lot of money early in life.
With money comes some degree of a feeling of power. I grew up, and remain in the Fort Walton/Shalimar/Freeport area. I devolved into a small little world of hatred and mistrust, all-the-while using my money as influence and threats (mainly lawsuits) against anyone I fear who might enter my encampment of personal failure. I am a known alcoholic, but beat my breast with bravado because I have money. However, possessions, money, and alcohol are all I really have now, along with some degree of notoriety because of my website, but also fueled by the myths bestowed upon me by an unknowing and foolish public. They have built me up to be this figure of intrigue and allure, with all the stories of government spying/psy-ops, etc. None of this is true, of course.
I know I am a pathetic 38 year old tiny man (literally), who has money, no friends (other than the virtual variety), and am a failure as a husband and father. I could make better use of my time, i.e., instead of devoting untold hours and energy to a website, bravado, and alcohol… if I instead heaped all that energy on my daughter, she might actually have a more normal life of two loving, yet separate parents. By way of default, I’d have to say I am more of a hands-off dad, thinking that money and possessions will make my daughter happy.
Imagine having a father with enough monetary wealth to retire in his mid-thirties, and has the ability to spend much of his free time with you, playing, going to parks, museums, the beach, telling bedtime stories, taking you to school, helping with homework, etc.; yet he chooses instead to be on a computer playing macho-man, and drinking. Kind of sad for her… and me.
Which is why, I think, that all the attention I get from the interwebz just goes to feed my insatiable desire to feel powerful, all the while recognizing that in fact, I am a failure as a human.
The public, however, continues my mythical status, and assures a steady stream of income by paying me to have avatars on my website, and buying me (through “donations”) a telescope costing more than $35,000 (that’s just the instrument and mount).
One could assert that my alcohol-driven rants and lifestyle lends itself to being an unfit father, and generally loathsome human. I have turned to alcohol to drown my sorrows, and I currently have no desire to refrain from imbibing. My ego cannot let go.
I have had professional therapists say I need to disconnect from the virtual world in which I live. I’ll agree with that, and as a result, I’d like to request the following by those who care about me and GLP:
I am wealthy, and do not need additional money. For this reason, I am requesting that all of you, paying members or donators, stop sending money or donations. This will only enable my self-destructing lifestyle, and I need to heal before causing my ultimate demise.
So please, STOP sending me money. I’ll still be around, and maybe someday, can turn my life around.
Sincerely,
Jason Anthony Lucas
4571 State Highway 20 East
Freeport, Florida 32439
(private road is Plantation Lane)
If you’d like to see the telescope on the property, just copy/paste the following into Google Earth:
30 29 00 N 86 03 39 W
Since I’m coming clean, I will soon be giving an explanation of my involvement in spyware/malware, how I tried to pass it off legally as adware, along with the business model and business partners and their connections to me.
A 16-year-old high school student’s video report for his American Government class earned him an A+ from his teacher. It also yielded a visit from the FBI.
Justin Hallman says that a project he put together for school that included information on the National Defense Authorization Act, Rep. Ron Paul, Anonymous and the Occupy Wall Street movement was well received in the classroom, but wasn’t exactly praised by others. After agents with the Federal Bureau of Investigation saw a copy of Hallman’s finished work on YouTube, they paid a visit to his own home.
The boy’s mother says the FBI showed up at their home one month after the class project was first turned in and told her, “We need to talk to your son.” Once inside, Justin Hallman says he was drilled about his thoughts on an array of issues included in his project.
“They also asked me why I had talked to my teacher about the Illuminati,” he writes in an email obtained by Infowars. “I told them it was just harmless talk about the 1776 Illuminati that formed from the enlightenment era. I said my teacher said they are/were terrorists and not to talk about them (this caused the FBI agents to look puzzled and they changed the subject very fast to Anonymous). In the end they finally left for an ‘important meeting.’”
Hallman says the meeting wasn’t an informal chat, either, but even involved a proposition. According to the high-schooler, the FBIs attempted to recruit Hallman as an undercover source to scoop up more information on Anonymous and Occupy Wall Street.
“They wanted me to be an informant, to possibly put my life in danger, to help them arrest and gain intel on occupy protesters and hackers,” Hallman says in the email.
In the video he produced for class, Hallman includes text that warns, “Our future relies on the choices we make next” and “There is still hope!” For Mr. Sparks, his American Government teacher that “liked it so much that he gave it a score of 45/35 points,” the future might seem hopeful. For the FBI, however, that outlook appears to be eyebrow-raising and worthy of a surprise stop-by.
On his YouTube channel, Hallman says he’s decided to make a second video to cover recent developments “involving the NDAA, TrapWire, the increasing police state, and the possibility of a war with Iran.” His first clip has so far earned him over 100,000 views online.
For the second time this year, self-proclaimed Anonymous spokesman Barrett Brown was raided by the FBI.
The latest dramatic incident occurred late Wednesday evening while Brown and another woman identified by some as his girlfriend were participating in an online chat on TinyChat with other individuals.
Two minutes into the recorded chat session, loud voices could be heard in the background of Brown’s residence in Texas while the woman in the room with him was in front of the computer screen. She quickly closed the computer screen, but the audio continued to capture events in the room as the FBI appeared to strong-arm Brown to put handcuffs on him. Brown could be heard yelling in the background.
A spokeswoman in the Dallas County sherriff’s office confirmed to Wired that Brown was raided last night and was booked into the county jail around 11 p.m. She said the FBI removed him from the jail this morning to take him to a different facility, but she did not know where he was headed.
California attorney Jay Leiderman, a member of Brown’s legal team, told Wired that Brown was scheduled to be arraigned today in Texas on making threats to a federal agent.
Asked if the FBI agents were aware that Brown was online at the time of their raid, Leiderman said, “They problaby would have preferred to raid him when he was not online.” He noted that the audio from the raid was “certainly less than flattering when they’re marching through these doors dropping F-bombs…. I imagine they would not want to have that captured if they could help it.”
A transcript of the TinyChat session has been posted online. Just moments before the arrest, there were jokes about whether one of the chat participants was real or just an animated GIF. Moments later, the chat participants faced a different conundrum: trying to figure out whether they’d just witnessed an FBI raid.
A voice that appeared to come from one of the arresting agents was heard saying something to the effect: “You’re going down! Get your hands down!”
Right as the noise began, another participant in the chat room showed up in a video window with a white handkerchief covering his lower face. “Is Barrett Browm getting fuckin’ raided by the FBI?” he appeared to say. “Holy shit!”
Brown’s latest raid came after he posted a long and rambling YouTube video in which he talked about taking drugs (though not today, he noted) and about retaliating against an FBI Agent named Robert Smith after he learned that his mother might be hit with obstruction of justice charges. The threat of charges was apparently related to a laptop of Brown’s that he apparently hid.
“So that’s why Robert Smith’s life is over,” Brown said in the video (beginning around minute 9:40). “When I say his life is over, I’m not saying I’m going to kill him, but I am going to ruin his life and look into his fucking kids. Because Aaron Barr did the same thing and he didn’t get raided for it. How do you like them apples?” he said, smiling.
The video, titled “Why I’m Going to Destroy FBI Agent Robert Smith Part Three: Revenge of the Lithe” was accompanied by a note apparently posted by Brown that reads: “Send all info on Agent Robert Smith to [email protected] so FBI can watch me look up his kids. It’s all legal, folks, Palantir chief counsel Matt Long already signed off on it when Themis planned worse.”
Brown also talked about being a target of the Zeta drug cartel and mentioned that he was heavily armed and was concerned that the cartel would come after him posed as federal officers.
“Any armed official of the U.S. government, particularly the FBI, will be regarded as potential Zeta assassin squads,” he said in the video. “As FBI knows … they know that I’m armed and I come from a military family and I was taught to shoot by a Vietnam veteran … and I will shoot all of them and kill them if they come and do anything…. I have reason to fear for my life.”
He signed off the video saying: “Frankly, it was pretty obvious I was going to be dead before I was 40 or so, so I wouldn’t mind going out with two FBI sidearms like a fucking Egyptian pharaoh. Adios.”
Asked about Brown’s comments, Leiderman said that he hadn’t seen the full video and wasn’t aware of everything Brown had said, but he noted that his client had a reputation for hyperbole and joking around, and that things he said might appear to be a threat when they weren’t really intended to be that way.
“It’s hard to understand the context [of what he said], Leiderman said. “But this is speech, so ordinarily we go to a First Amendment defense, but obviously there are lines that can be crossed where you can lose your First Amendment protection.”
An FBI spokeswoman had no comment to make on Brown’s arrest.
For those who do not believe the story we are being told by the government and media. The James Holmes Conspiracy. Several witness testimonies, news reports, theories and ideas behind the motives of the crime. Topics discussed include the second suspect, weapons, police audio analysis, James Holmes education and bio, LIBOR scandal, MK Ultra, Project Gunrunner, and several other important elements. Several new pieces of evidence and testimonies all in one video.
Documentary made by Mark Howitt www.youtube.com/lorddefiler
Video published on August 14th 2012
This video has been blocked in these locations:
Guernsey, Ireland, Isle of Man, Italy, Jersey, United Kingdom
Greetings World — On September 3, 2012 our comrades in AntiSec released a Press Release here –> http://pastebin.com/nfVT7b0Z
In this release they disclosed the fact that they had hacked the laptop of an FBI agent in the Cyber-Crime division and among the booty taken was a file containing 12 million UDIDs from various Apple products owned by people in the USA. They released evidence of this in the form of 1 million partially redacted entries from the file. The media did their usual idiot dance, latched onto the story and ran without thinking. Then mid-week it was pointed out by their critics that Anonymous could have got that file from many sources. Of course the FBI denied they were hacked, did you honestly think that the FBI Cyber-Crime guys would be like yeah Anonymous hacked us and we are butthurt? Please. Then no sooner does the media turn to this idea that hey, Anonymous could have got this info from some app developer lo and behold an app developer mysteriously discovers that they have been hacked and the data belongs to them. Yeah right. And now the media has come full circle like baying dogs and is reporting this shit as the newest version of reality. Fucking jokers. We have strong reason to believe this company Blue Toad are liars. But even if their data matches the data set obtained from the FBI by AntiSec, this simply points to one possible source where the FBI might have obtained the data. As AntiSec themselves pointed out in their response to the FBI’s lies, no one ever said the FBI got this data from Apple.
Now that the main stream media is finally catching on that this so-called “Blue Toad” revelation proves nothing, everyone seems completely perplexed. Some tech journalists are demanding hard “proof”. Don’t be fools, that would land a bunch of us in prison and it ain’t going to happen. What AntiSec and Anonymous HAVE provided you is evidence that only has meaning to the FBI Cyber-Crime guys.
These partial IPs for instance:
206.112.75.XX
153.31.184.XX
Has any reporter asked the FBI Cyber-Crime division if these IPs have any meaning to them. No, of course not. They would only deny it or just not answer the question saying it was a “security issue”, right ? But it IS your job as a reporter to at least ask. In the initial Press Release, AntiSec provided the name of the Cyber Agent and the make and model of his laptop. “During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached.” Has even ONE reporter contacted Agent Stangl and asked him what make and model laptop he uses for work? Uhmmm, no of course not. You are all so quick to believe some strange company who conveniently pops up out of the mists (and who we have never even heard of ourselves until today). But what is REALLY incredible is that you would believe a group who is historically PROVEN to be pathological liars and criminals, namely the FBI. AntiSec also provided the method used, and most security “experts” (i.e. White Hat Scum) have grudgingly admitted the hack would be possible using the technique described. AntiSec has even provided the MAC addresses of all the hardware used in the new York office of the Cyber-Crime Division:
Has anyone asked the FBI if these MACS are real? And before you reply “they would just deny it or say no comment” – it is STILL your job as reporters to at least ASK and report their answer to your audience. You have asked for chat logs from the hack. AntiSec has indicated they may provide them after they have thoroughly scrutinized them and redacted shit that can get them V&ed, which will most likely include the forensic “proof” some of you crazy journos are clamoring for. But the bottom line is this. Anonymous and AntiSec have provided FAR more evidence for their side of the story than the FBI has with their two lousy tweets and then a steady stream of “no comments”. The FBI has not provided one shred of evidence for their lying denials. Anonymous and AntiSec have provided what they can, and may provide more in the future.
AntiSec hacked the FBI and found 12 million UDIDs from Apple products on the laptop of a special cyber agent of the FBI. Whether the FBI had these for some tracking scenario as AntiSec opines, or whether they had them to use to crack open Apple stuff they seize when the “suspect” won’t give them the passwords – or whether they had them for some completely un-known nefarious reason, they had them and Anonymous took them. We know this is true, and more importantly the FBI knows this is true. It is not our job to convince either the media or the masses. But the truth is there, if the journalists want to actually WORK for a living and dig for it. Also, that file wasn’t all that AntiSec obtained from Agent Stangl’s laptop. The FBI and all you media journos should….
EXPECT US.
SINCERELY
— Anonymous Anonymous Global — www.AnonymousGlobal.tk
For Messages From AntiSec Follow @AnonymousIRC on Twitter
JOINT MEDIA RELEASE:
Indigenous Social Justice Association &
Support Assange & WikiLeaks Coalition
September 9, 2012
ISJA: It is with a sense of pride and complete social justice that this Association has worked with the Sydney Support Assange and WikiLeaks Coalition to have the privilege of successfully arranging for Julian Assange to be able to be issued with an Aboriginal Nations Passport that his father, John Shipton, will accept on his behalf at the Welcome to Aboriginal Land Passport Ceremony to be held at The Settlement, 17 Edward Street, Darlington from 11am to 4pm on Saturday 15 September, 2012.
We strongly endorse the words of Ms Linda Pearson of the Support Assange and WikiLeaks Coalition, see below, on the total lack of support by our Federal Government to assist Julian against being press-ganged to America to face corrupt charges against him for informing the world’s people of the absolute lies that all Governments continue to tell their people. Whilst it is true that all Governments lie, it is well known that America leads the pack in their eternal quest for American hegemony of the world’s resources. It is well known that all Australian Governments since the dismissal of the Whitlam Government in 1975, that was assisted and orchestrated by America’s CIA, have meekly put our country at the policies of the American Foreign Policy interests. Julian is but another example.
The Ceremony is being held at the behest of many migrant, refugee and non-Aboriginal Australians who wish to fully recognise the Traditional Owners of the many Aboriginal Nations that still exist to this very day. They wish to show their full respect to the true history of this land and that is that we Aborigines still have full Sovereignty over our Lands.
Always was…always will be… Aboriginal Land.
The crimes of the 1788 Invasion and the subsequent Colonisation still need to be addressed and accounted for but we believe that the Passport Ceremony is the first of many steps that are required by those who wish to participate in a multicultural and pluralistic Reconciliation. Not the assimilationist Reconciliation wanted by Australian Governments and other racists but the real and honourable Reconciliation of removing the-white-blindfold of our joint history and allowing a mutual respect to be created.
By agreement we will be issuing both Julian Assange, via his father, and Mamdoub Habib, who will be present, an Aboriginal Nations Passport that will allow both to respectfully travel through the Aboriginal Nations. Mamdoub now and Julian on his return to Aboriginal Australia. Both these men were denied any assistance, firstly by the Howard Government and then by the Gillard Government respectively. These nefarious actions were taken by these two Governments to appease their American masters. We will attempt to right that wrong.
All those who wish to be issued with a Passport may obtain one by, firstly, signing the Pledge, giving some personal details to be added to the Passport, supplying a passport sized photo and a charge of $10 to help in affraying costs: aboriginalpassportceremony.org/how-to-get-an-aboriginal-passport/. The Passports are for use by Non-Aboriginal people only and can only be used to travel through the Aboriginal Nations. This does not apply to Aborigines as we have our own cultural methods of travelling through Country.
The Ceremony at The Settlement will include music, dancers, food and a wonderful sense of Welcome and Solidarity to all those attending. This will be an alcohol and drug free event.
We give the final word to Linda Pearson of the Support Assange and WikiLeaks Coalition:
“We are extremely grateful to the Indigenous Social Justice Association for highlighting the injustice faced by Julian Assange, and for this opportunity to show our solidarity with the Aboriginal owners of this land.
Australia is built on the injustices of invasion and colonisation. We condemn racist government polices like the Northern Territory Intervention which continue to inflict untold harm on Aboriginal and Torres Strait Islander peoples. We benefit from the occupation of stolen land, while Aboriginal people are incarcerated at five times the rate of black South Africans under apartheid.
The ISJA’s decision to issue Julian Assange an Aboriginal Passport comes as he remains confined in the Ecuadorian Embassy in London. Despite international obligations to respect Assange’s status as a political refugee, the UK government has made clear its intention to arrest him if he tries to leave the Embassy.
The Australian government should be negotiating with the UK to ensure Assange’s safe passage to Ecuador. However, our politicians have consistently put their alliance with the United States before Assange’s human rights, even when his life has been threatened.
The issuing of an Aboriginal Passport to Julian Assange brings further shame on the Australian government. It recognises that Assange’s Australian passport has been completely worthless to him.”
For further information please contact Ray Jackson 0450 651 063, Ms. Rihab Charida, Ms. Linda Pearson 0401 511 588 or Ms Anne Picot 0404 090 710.
Indigenous Social Justice Association
1303/200 Pitt Street
Waterloo NSW 2017
Phone: (02) 9318 0947
Mobile: 0450 651 063
The Defense Advanced Projects Research Agency (DARPA) Autonomous Robotic Manipulation (ARM) program seeks to find ways to utilize different remote robotic manipulation systems that are controlled by humans. This program is divided into 3 aspects:
• Hardware: to design dexterous multi-fingered robotic hands
• Software: develop complex algorithms for grasping, manipulation and sensory perception
• Outreach: beta-testing robotics in public forums to further study robotic autonomy
In 2010, DARPA revealed a robot at the Association for Unmanned Vehicle Systems International Conference in Denver that was interactive in a public forum. Participants would write software and have the robot preform specified tasks. The goal of this event was to show that robots were being developed by the US government to preform “dangerous tasks” such as disarming an explosive device thereby reducing “significant human interaction”.
Universities and other government-controlled agencies such as Carnegie Mellon University, HRL Laboratories, iRobot, NASA-Jet Propulsion Laboratory, SRI, and the University of Southern California, provided teams of researchers to write software for DARPA.
Boston Dynamics, Inc., has been awarded a $10.9 million contract to manufacture humanoid robots that are bi-pedal, built like humans and have a sensor head with on-board computing capabilities.
These robots are being created to assist in excavation and rescue missions, according to DARPA. They could also be employed to evacuation operations during either man-made or natural disasters.
This week, the Project Offices for Unmanned Aircraft Systems (UAS), Apache Attack Helicopter and Armed Scout Helicopter revealed the Manned Unmanned System Integration Capability (MUSIC) at Michael Army Airfield, Dugway Proving Ground, Utah. During the exercise, MUSIC showed that the US Army could use drones armed with lethal weapons that were wired for precise communication with their operator.
The RQ-7 Shadow is another enhanced drone with weapons capabilities. As the US Army endeavors to combine ground forces with drone technology, their tactical operation’s success is multiplied.
The use of government-sponsored universities such as Cornell, MIT and Delft University of Technology in the Netherlands has created prototypes for bi-pedal robots that will someday be the synthetic army or police force.
Stanford University’s Aerospace Robotics Laboratory (ARL) wants to introduce autonomous robots into law enforcement situations; such as response in lieu of police SWAT teams.
Drones for law enforcement are being developed with the creation of the Talon SWAT/MP that can be configured with a multitude of weaponry. Some include a multi-shot TASER, LRAD, 40mm grenade launcher, and a 12-gage shotgun.
An earlier version of Talon, developed for the Israeli Defense Forces and the Israeli Ministry of Defense’s Directorate of Defense, was of the VIPeR series that were equipped with a 9 mm mini-Uzi with scope and pointer, or grenade launcher.
In 2006, Los Angeles began using aerial drones to spy over citizens under the guise of tracking suspects. The Federal Aviation Administration (FAA) subsequently ended that program. The police force retaliated citing that “there is an immediate need by state and local public safety personnel for unmanned aerial systems.”
The Naval Research Laboratory has developed SAFFiR, the Shipboard Autonomous Firefighting Robot. SAFFiR is an autonomous bipedal humanoid robot, based on the CHARLI-L1 robot created at Virginia Tech. This robot can interact with humans with a comprehensive response system that utilizes language – including slang to make it more familiar. A robot that can hold a conversation and fight fires is quite impressive.
In 2009, with funding from the Pentagon, DARPA created the Multifunction Utility/Logistics and Equipment (MULE) which was a size of a Humvee. This robot car used sensors to drive autonomously and calculate its target, await remote instructions or decide to fire.
MULE’s potential has been in the works for the last 3 years. Its advancement and use as a battlefield vehicle is being tested and readied for deployment. The remote controls mirror those of a gaming console which gives the operator the ease of playing a “video game” while at the same time instructing a deadly piece of equipment on targeted missions.
Unmanned ground vehicles have been in use since Iraq and Afghanistan. They are armed for combat with the same capabilities as ground troops. MULE’s development as an autonomous weapon for the purpose of allowing a robot to decide on whether or not to carry out a mission is advantageous to the US military.
A force of robotic “peacekeepers” that are programed to become violent without remorse – will enable the government to organize and act where human law enforcement and/or trained soldiers may hesitate.
Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.
It has been said that knowledge is power, and that applies to any area in life. Of course, it is important to arm and prepare, but it is even more important to constantly learn new aspects of survival. Some of these arts and sciences have been lost in the last century, as modern life has caused humanity to know more how to use a smartphone rather than how to build a fire. It is easy to gloss over these skills like an old memory, when you can simply pop at TV dinner in the microwave when you are hungry.
The histories of empires have told us that they are finite, and that includes that of the U.S. In this case, it is important to gain knowledge and learn about old methods that have been long forgotten by many. This knowledge may not always be accessible as it is one of the first resources that will become scarce in the event of a nation threatening disaster. Other items may be procured with relative ease, but it may be next to impossible to find gems of wisdom.
One of the best places to find knowledge about survival methods for now is on the Internet. The Internet has an incredibly high concentration and abundance of information that dwarfs libraries and can be accessed in the comfort of your home. A quick search engine inquiry will reveal answers that took hours of research in the past. This is a great place to start. Whatever useful information you find, print out, and put in a ring binder.
Community
We were not meant to survive in isolation. There are many skills we can learn from one another. Find a mentor or group that does survival activities on a regular basis. Learning from one person to another is the best way to make it a part of you. For instance, learning martial arts of some kind will be indispensable in a crisis. These arts train you to keep calm, respond properly, avoid fights, and win them with the time come.
Nothing will help people survive more than a tight knit community that cares for its members. In this community, you will find different skills, access to different resources, and a psychological morale improvement. Finding others with the same mindset will help you survive long-term, and make the situation far more bearable than braving the dark times alone.
Basic Tools
Knives are considered one of the most basic tools in any society. It has been seen as the very beginning of technology after the discovery of fire. Using the proper knife for a survival scenario is arguably the most crucial part of survival. Your world will revolve around your knife, so it is important to have one appropriately selected.
You do not want to survive on a kitchen knife, as these are only tailored for light duty. Survival knives can come in several forms but they have to perform these basic tasks:
Chopping or Cutting Wood
Carving Wood
Stripping Bark for Lashing
Hunting
Cleaning Game
Cutting Cords
Fishing
Climbing
Fashioning Other Weapons
Striking Fire Steel
Shaving and Scoring Wood
Defense
It is for this reason that your knife must be durable, and have the right shape to perform daily tasks. As opposed to many popular designs, you do not want your knife to be longer than 5”. If it is 6” and above, it will be difficult to handle and could possibly be dangerous. Also, avoid serrated edges on your knife. The most powerful cutting and carving edge is at the base near the handle, and if that area is serrated, it will be difficult to use it to chop and carve.
Also, you may need to defend yourself with your knife. This may be more preferable than using bullets, as you may not want to draw attention to the location of the shot. This means that the knife must come to a sharp point at the tip. This may also allow you to lash the knife to a long stick, creating a spear for hunting. Another possible function of your knife may allow you to throw it at a target. This is another great hunting application, but it is less for defense, in the event that your target runs away with your precious knife.
There are many designs to a good survival knife; you just need to figure out what your preferred style may be. For this reason, you also may want to consider making one of your own. Creating your own knife design and manufacturing it yourself will allow you to know how to make more in the event that you lose or break your original. For less than $100, you can procure the resources necessary to shape and heat-treat your knife from bar stock.
The reason why the topic of knives is located in the “knowledge” category is because of how crucial it is to know how to use them and even perhaps know how to make them. Getting to know your knife is has to do with more than just surviving; some survivalists even say that it connects you closer to nature. The ability to survive from this most basic tool is known as more of an art form than a method.
Stealth
While the survivalist mindset might seem to stem from weathering bad times, it is actually based in a basic enjoyment of nature. Nature is a gift, and the ability to live comfortably from its provisions is one of the most life-changing experiences a person can ever have. The art of survival seems to have been lost over the years, but before the technology boom in the last century, it was commonplace to know and understand survivalist principles.
One of the most basic skills when in the wild is a combination of two methods. These methods are called the “Fox Walk” and “Wide-Angle Vision.” These were the basic “bread and butter” of how tribal populations would hunt and stalk without leaving any trace. Learning lessons from these peoples, it has enlightened us on how to live from the land.
The Fox Walk is a method on how tribal populations were able to move in the forest completely undetected by even the wildlife. These methods were also used in war as the first skirmishes took place between the Native Americans and the residents of Jamestown. Knowing how effective the Fox Walk concealed movements, the Navy Seals adopted this tactic to conceal their numbers behind enemy lines. The Fox Walk basically consists of:
First, it is most effective to do this without footwear or wearing moccasins. This allows you to feel the ground, and helps you avoid stepping on sticks that can crack and make noise.
Land your foot with your heal first. This requires balance; as your foot comes into contact with the ground, you may have to move to a different location to avoid a sharp rock, a stick, or leaves that may make noise.
Then allow the outside of your foot to roll to the ground, and then the balls of your feet. This will allow you to mask your presence by lessening your footprint and noise.
If you are traveling in a group, the battle-tested way to conceal your numbers is to Fox Walk, and with each person placing his or her foot in the print of the one ahead of them.
Rushing about is a quick way to be found and wastes crucial energy, so the Fox Walk is a method, crafted for slow, steady movements.
These are the basics of Wide-Angle Vision:
Wide-Angle Vision allows you to see movement and inconsistencies rather than the details that are directly in front of you.
This type of focus allows you to spot resources more easily and sense movement, which is crucial for hunting.
Wide-Angle Vision utilizes your peripheral vision, allowing for a much wider view and scope of sound stimulation. This causes you to be far more aware of your surroundings.
In order to practice Wide-Angle Vision, move your hands out directly in front of you. Then, separate them slowly until your arms are stretched out all the way.
Then, wiggle your fingers. If your peripheral vision can pick up both hands, then you have entered into Wide-Angle vision.
The best part about utilizing the Fox Walk and Wide-Angle Vision is the fact that you can move around less, maximizing the resources in your vicinity. You will use much less energy, and it will keep you calm. Some have said that it is almost like tuning in to a sixth sense, as you can extend your perception farther that you would normally be able to.
Experiencing and enjoying nature is one of the most basic principles of the art of survival, and using ancient methods is one of the best ways to do just that.