Peter Kirby: Enron, Bush, Chemtrails, & a History of Weather Derivatives

Peter Kirby: Enron, Bush, Chemtrails, & a History of Weather Derivatives

A History of Weather Derivatives

Facts lead me to speculate that the chemtrails so often seen in our skies are sprayed for financial gain. Chemtrails are admittedly sprayed as part of weather modification programs. There are two large financial markets that rise and fall with the weather; the weather derivatives market and the catastrophe reinsurance market. Chemtrails may be sprayed as part of a plan to manipulate the weather derivative and catastrophe reinsurance markets.

Even though the catastrophe reinsurance market is much larger, the focus of this paper is the history of the weather derivatives market because, while the history of the catastrophe reinsurance market is murky (I may uncover more in time), lots of information about the history of the weather derivatives market is available. It is this way because Enron originated the weather derivatives market. The fall of Enron was one of the greatest corporate scandals in American history, so there has been much already investigated and exposed.

Enron

When you’re talking about the history of weather derivatives, you’re talking about Enron. They developed the most widely used early trading platforms, they were founding members of the leading industry association and were counterparties in the first known domestic and international transactions.

In their heyday, Enron received Fortune Magazine’s award for ‘Most Innovative Company’ six years in a row. They gave their Enron Prize for Distinguished Public Service to people like Nelson Mandela and Mikhail Gorbachev. Henry Kissinger and James Baker worked as Enron consultants; traveling to such far-flung destinations as Kuwait and China preaching the Enron gospel. Stock analysts gushed over everything Enron did. Enron could seemingly do no wrong.

The only problem was, Enron was cooking the books seven ways to Sunday. When the S.H.T.F., Enron’s stock tanked like World Trade Center building 7 and eventually brought down one of the nation’s oldest and largest accounting firms, Arthur Andersen.

Although the company itself has long since been chopped up and sold off, former Enron employees now populate many other financial market trading establishments.

Enron Weather

The particular division known to buy and sell weather derivatives was called ‘Enron Weather.’ Enron Weather started as a small, but promising bit of the company. By the time of Enron’s demise in 2001, Enron Weather had grown to a significant part of their business.

It is suggested that Enron CEO Jeff Skilling’s brother, Tom Skilling originally had the idea for weather derivatives. Peter Fusaro and Ross Miller write in their book ‘What Went Wrong at Enron’:

“As temperatures spike upward in summer and fall in winter, utilities also potentially needed a hedge against the weather. Or so Enron thought – thanks to an idea that some Enron sources say Jeff Skilling’s brother Thomas, a weatherman in Chicago, suggested.”

Tom Skilling is the chief meteorologist at WGN-TV in Chicago, Illinois.

Loren Fox, the author of ‘Enron: The Rise and Fall’ tells the story of Enron Weather like this:

“…weather derivatives came to be championed by an employee working at the grassroots level and seeing customers’ daily needs. John Sherriff, who at the time managed gas trading for the western United States, began looking at derivatives linked to the weather in late 1995, and Vincent Kaminski’s research group worked on the idea in 1996. A gas trader named Lynda Clemmons was very interested in the idea, based on her conversations with executives at electric utilities that used coal-fired power plants…. In 1997, Enron handed off its weather derivatives effort to Clemmons, who was only 27. She began a one-person weather-hedging department within ECT…”

Fox continues:

“…Clemmons built up Enron’s weather business so that it did 350 transactions (hedging up to $400 million in potential revenues) in 1998, turning its first profit that year.”

Enron initiated the weather derivatives market in Europe as well. According to scholar Samuel Randalls, “In the UK, the first weather derivative deal was sold by Enron to Scottish Hydropower who, at that time, 1998, were taking part in a government pilot scheme for the privatization and deregulation of energy markets.”

Enron’s Oslo office became the base of their European weather derivatives business.

In 2000, Enron also introduced weather derivatives in Australia; offering temperature-based products for Sydney, Melbourne, Hong Kong, Tokyo and Osaka.

In 2002, after the bankruptcy, the Enron trading desk (including Enron Weather) was bought by UBS Warburg.

John Sherriff is now the owner of Lake Tahoe Financial and other Sherriff family businesses.

Mrs. Clemmons left Enron in 2000. She took a number of her colleagues from Enron’s weather team and set up weather derivatives company Element Reinsurance. After Enron, Lynda Clemmons also worked at XL Weather & Energy, The Storm Exchange Inc. and Vyapar Capital Market Partners. According to her Linkedin profile, Mrs. Clemmons is now an independent consultant.

a history of corruption

The Enron financial market trading desk, just like the company itself, had a history of corruption. Back in 1987, the Enron trading operations were called ‘Enron Oil.’ When questions about an Enron account at New York’s Apple Bank began surfacing, Enron management turned a blind eye. Money was pouring into this questionable account from a bank in the Channel Islands and flowing out to the account of a man named Tom Mastroeni; the treasurer of Enron Oil.

Enron management explained away these money flows and this questionable account as completely legal profit shifting. Although Mastroeni produced doctored bank statements and admitted a cover-up, Enron management didn’t pursue the issue. Nobody involved was even reprimanded. Revelations continued to come out, but Enron management did nothing. Enron’s accounting firm Arthur Andersen exhibited a similar disinterest.

After management confirmed an official lack of responsible oversight, Enron Oil traders ignored position limits and got themselves in big trouble. Only then did Enron executives show interest.

The authors of ‘The Smartest Guys in the Room’ tell the story like this:

“For months, Borget [the CEO of Enron Oil] had been betting that the price of oil was headed down, and for months, the market had stubbornly gone against him. As his losses had mounted, he had continually doubled down, ratcheting up the bet in the hope of recouping everything when prices ultimately turned in his direction. Finally, Borget had dug a hole so deep – and so potentially catastrophic – that there was virtually no hope of ever recovering.”

Enron brass was in a panic. Enron was looking at a $1 billion loss; enough to bankrupt the company. Management sent in some expert traders who, over the course of a few weeks, managed to clear out these positions with only a $140 million hit.

Enron had to tell people about this $140 million trading loss, though. Enron’s stock slid 30%. The blame game began. Ken Lay, the affable Enron founder and CEO, denied any responsibility. News of the scandal conveniently came out right after a big bank loan approval.

The U.S. attorney’s office charged Borget and Mastroeni with fraud and personal income tax violations. In 1990, Borget pled guilty to three felonies and was sentenced to a year in jail and and five years’ probation. Mastroeni pled guilty to two felonies. He got a suspended sentence and two years probation.

deregulation

Ken Lay helped his company make more money and created new financial markets (such as the weather derivatives market) through energy sector deregulation. Deregulation created a situation where Enron and others could more effectively manipulate and arbitrage (specifically regulatory arbitrage) markets.

Let us refer to a feature article published by industry publication Risk.net:

“‘Enron was the focal point of the deregulation agenda,’ says Jonathan Whitehead, who started with Enron Europe in 1996 and was heading the liquefied natural gas (LNG) business in Houston at the time of Enron’s demise. ‘It was the most vocal when explaining to regulators and governments and customers the benefits of deregulated markets. I don’t think deregulation in power and gas in Europe or the US would have come as far as it has without Enron,’ he says.

“Pushing for deregulation was very much a part of the company’s strategy from the start. ‘Ken Lay [chairman and chief executive of Enron] was the visionary at the time as far as seeing where deregulation could go and actually driving deregulation,’ says Mark Frevert, who worked at one of Enron’s predecessor companies, Houston Natural Gas, from 1984 and stayed at Enron until it’s demise.”

the right connections

Deregulation necessarily required help from the federal government. To make it happen, Enron and Ken Lay (who died in 2006) had the right federal connections in spades.

Ken Lay enlisted in the navy in 1968. His friend pulled some strings and had him transfered to the Pentagon. According to the authors of The Smartest Guys in the Room, Lay spent his time at the Pentagon, “…conducting studies on the military-procurement process. The work provided the basis for his doctoral thesis on how defense spending affects the economy.”

As I have explained in earlier writings, there is reason to believe that domestic chemtrail spraying operations and weather modification activities are carried out by our military. Ken Lay had many high level military connections.

Mr. Lay had the right political and specifically energy related political connections as well. He worked in the Nixon administration as a Federal Power Commission aide, then as deputy undersecretary of energy in the Interior Department. As chairman and CEO of Enron, he sat on the boards of Washington think tanks and often travelled to Washington.

A revolving door existed between Enron and the federal government. Enron executive Tom White left the company to join the Bush Jr. administration as secretary of the army. Enron executive Herbert ‘Pug’ Winokur was Lay’s old Pentagon friend. Robert Zoellick (now head of the World Bank) represented Enron, then the United States as Trade Representative and later as Deputy Secretary of State.

According to the authors of ‘The Smartest Guys in the Room’:

“In 1993, Lay added Wendy Gramm [to the Enron board], who had just finished a stint as chairman of the Commodities Futures Trading Commission (CFTC) and was married to Texas Senator Phil Gramm.”

It goes on:

“Just after Wendy Gramm stepped down from the CFTC, that agency approved an exemption that limited the regulatory scrutiny of Enron’s energy-derivatives trading business, a process she had set in motion.”

When Enron galloped into Europe, they had an influential lord on their side. Greg Palast covers it like this:

“The fact that a truly free market [in electricity] didn’t exist and cannot possibly work did not stop Britain’s woman in authority, Prime Minister Margaret Thatcher, from adopting it. It was more than free market theories that convinced her. Whispering in her ear was one Lord Wakeham, then merely ‘John’ Wakeham, Thatcher’s energy minister. Wakeham approved the first ‘merchant’ power station. It was owned by a company created only in 1985 – Enron. Lord Wakeham’s decision meant that, for the first time in any nation, an electricity plant owner, namely Enron, could charge whatever the market could bear… or, more accurately, could not bear.

“It was this act in 1990 that launched Enron as the deregulated international power trader. Shortly thereafter, Enron named Wakeham to its board of directors and placed him on Enron’s audit and compliance committee.”

As I speculate, a scheme to manipulate financial markets by modifying the weather would necessarily involve intelligence agencies. According to the authors of ‘The Smartest Guys in the Room,’ Enron had intelligence agency connections:

“One of Enron’s key advantages over its competitors was information: it simply had more of it than its competitors. It’s physical assets provided information, of course. And Enron didn’t stop there. It employed CIA agents who could find out anything about anyone. In stead of tracking the weather on the Weather Channel, the company had a meteorologist on staff. He’d arrive at the office at 4:30 A.M., download data from a satellite, and meet with the traders at 7:00 A.M. to share his insights.”

It continues:

“By the late 1990’s, these research efforts were herded together into something called the fundamentals group – fundies in trader parlance. The fundies group produced intelligence reports and held morning briefings…”

the Bush family

Mr. Lay and Enron had many connections to the Bush family and their cohorts. President George W. Bush (Bush Jr.) lovingly called Ken Lay ‘Kenny Boy.’ Mr. Lay was also close to his father, fellow Houstonian, George H.W. Bush (Bush Sr.). For example, in 1991, Bush Sr. offered Mr. Lay the position of commerce secretary. Mr. Lay turned him down. He wanted to be treasury secretary.

Greg Palast, in his book ‘The Best Democracy Money Can Buy,’ characterizes the Bush/Enron relationship like this:

“But what about Pioneer Lay of Enron Corp? His company, America’s number one power speculator, was also Dubya’s number-one political career donor ($1.8 million to Republicans during the 2000 presidential campaign). Lay was personal advisor to Bush during the postelection ‘transition.’ And his company held secret meetings with the energy plan’s drafters. Bush’s protecting electricity deregulation meant a big payday for Enron – subsequent bankruptcy not withstanding – sending profits up $87 million in the first quarter of Bush’s reign.”

Other Bushes were getting some, too. Greg Palast writes:

“Two months after the bankruptcy, Governor Jeb Bush of Florida traveled to the Texas home of Enron’s ex-president, Rich Kinder, to collect a stack of checks totaling $2 million at the power pillager’s $500-per-plate fund-raising dinner. There are a lot of workers in Florida who will wish they had a chance to lick those plates, because that’s all that’s left of the one-third of a billion dollars Florida’s state pension fund invested in Enron – three times as much as any other of the fifty states.”

Mr. Palast continues:

“Governor Bush encouraged a scheme by a company called Azurix to repipe the entire Southern Florida water system with new reservoirs that would pump fresh water into the swamps. From the view of expert hydrologists, such a mega-project is a crackbrained and useless waste of gobs of money. As part of the deal, Azurix would be handed the right to sell the reservoir’s water to six million Florida customers. Azurix was the wholly owned subsidiary of Enron that had recently been kicked out of Buenos Aires.”

Specializing in private equity buyouts, The Carlyle Group is one of their two main family businesses and one of the nation’s largest defense contractors. Chemtrail spraying is a military operation. The Carlyle Group could help geoengineering programs happen.

Participation in a scheme to defraud the population while murdering them at the same time would probably be A-o.k. with the Bush family. Bush family members exhibit recurring criminal behavior. Forget about the Enron connections. Do you know about the Nazi connections? Are you aware of the numerous links to 9/11? Have you heard of the connections to the attempted Reagan assassination or the attempted assassination of Pope John Paul II? Don’t forget that little Iran-Contra fiasco and the drug dealing, gun running and money laundering. Yup, they’re connected to that dirty, dirty BCCI thing, too. Folks, these are just some of the things we know about. When you see a few cockroaches, you can bet there are hundreds more in the wall.

So, who funds the Bush family? The answer is a little investment bank called Brown Brothers Harriman. Maybe you’ve heard of it. Webster Tarpley and Anton Chaitkin in their book ‘George Bush: the Unauthorized Biography’ describe the situation like this:

“For George Bush, Brown Brothers Harriman was and remains the family firm in the deepest sense. The formidable power of this bank and its ubiquitous network, wielded by Senator Prescott Bush up through the time of his death in 1972, and still active on George’s behalf down to the present day, is the single most important key to every step of George’s business, covert operations and political career.”

And I’ll go you one better. Who owns Brown Brothers Harriman (BBH)? That’s a good question because they are a private company. You cannot buy shares of BBH on any stock exchange. But, in fact, it really doesn’t matter who owns BBH because BBH (like all other big banks) suckles at the teet of the United States Federal Reserve Bank.

In order to get that fresh, uncirculated capital (which has more value than the money which is already in circulation), Brown Brothers Harriman acts upon the orders of the United States Federal Reserve Bank. Sure, BBH has businesses that make money, but when they start a new business such as weather derivatives, they act with the approval of the Fed. I understand this may be a lot to swallow for the uninitiated, but this is the way it works. Read ‘The Creature from Jekyll Island’ by G. Edward Griffin.

Who owns the Fed? Well, that’s the power behind the throne. It is an official secret, but I dare write the name of N.M. Rothschild as represented by the Bank of England.

In short, the Bush family, Enron and Ken Lay had the right political, business, intelligence and military connections necessary to facilitate the scheme I outline.

conclusions

Enron was a business laboratory directed by big banks. In the new world of deregulation created by the Bushes, Enron and others, the purpose of the company was to throw things against the wall and see what stuck. Enron employees were merely minions of those who controlled the purse strings. Enron was the perfect environment in which to try something new like weather derivatives. In light of the histories of corruption exhibited by those involved, it is understandable that the weather derivatives market they created may have been part of yet another murderous rip-off.

While most financial market trading operations are seen as unreliable, Enron’s trading desk was often regarded as their most productive and stable business. Could this have been because they were getting inside information about weather produced by geoengineering activities? I don’t know. I do know they had the ways and means necessary. Enron had motive and opportunity. Enron benefitted from weather derivatives.

notes
-‘The Smartest Guys in the Room’ book by Bethany McLean and Peter Elkind, Penguin Books 2004
-‘Weather as a Force Multiplier: Owning the Weather 2025’ report by the United States Air Force 1996
-‘The BCCI Affair’ report by Senators John Kerry and Hank Brown, 1992
-‘George Bush: the Unauthorized Biography’ book by Webster Tarpley and Anton Chaitkin, Progressive Press 2004
-‘The Best Democracy Money Can Buy’ book by Greg Palast, Penguin Books 2003
-‘Wall Street and the Rise of Hitler’ book by Antony Sutton, Buccaneer Books 1976
-‘Conspiracy of Fools’ by Kurt Eichenwald, Broadway Books 2005
-‘Enron: Charting the Legacy 10 Years on’ article by Risk.net 2011
-Enron annual report, 2000
-‘The Secrets of the Federal Reserve’ book by Eustace Mullins, Bridger House Publishers, Inc. 2009
-‘The Creature from Jekyll Island’ book by G. Edward Griffin, American Media 2010
-‘Enron: The Rise and Fall’ book by Loren Fox, John Wiley & Sons, Inc. 2003
-‘What Went Wrong at Enron: Everyone’s Guide to the Largest Bankruptcy in U.S. History’ book by Peter C. Fusaro and Ross M. Miller, John Wiley & Sons 2002
-‘Weather, Finance and Meteorology – forecasting and derivatives’ by Samuel Randalls School of Geography, Earth and Environmental Sciences, University of Birmingham

websites
wrma.org
risk.net
linkedin.com
xlgroup.com
vcmpartners.com

-Peter A. Kirby is a San Rafael, CA author and activist. Check out his ebook ‘Chemtrails Exposed:’
http://www.amazon.com/Chemtrails-Exposed-ebook/dp/B007JDN7EM/ref=sr_1_4?s=digital-text&ie=UTF8&qid=1331588967&sr=1-4

Organic Elite Surrenders to Monsanto: Whole Foods Oks Coexistence

Organic Elite Surrenders to Monsanto: Whole Foods Oks Coexistence

“The policy set for GE alfalfa will most likely guide policies for other GE crops as well. True coexistence is a must.”   –  Whole Foods Market, Jan. 21, 2011

In the wake of a 12-year battle to keep Monsanto’s Genetically Engineered (GE) crops from contaminating the nation’s 25,000 organic farms and ranches, America’s organic consumers and producers are facing betrayal. A self-appointed cabal of the Organic Elite, spearheaded by Whole Foods MarketOrganic Valley, andStonyfield Farm, has decided it’s time to surrender to Monsanto. Top executives from these companies have publicly admitted that they no longer oppose the mass commercialization of GE crops, such as Monsanto’s controversial Roundup Ready alfalfa, and are prepared to sit down and cut a deal for “coexistence” with Monsanto and USDA biotech cheerleader Tom Vilsack.

In a cleverly worded, but profoundly misleading email sent to its customers last week, Whole Foods Market, while proclaiming their support for organics and “seed purity,” gave the green light to USDA bureaucrats to approve the “conditional deregulation” of Monsanto’s genetically engineered, herbicide-resistant alfalfa.  Beyond the regulatory euphemism of “conditional deregulation,” this means that WFM and their colleagues are willing to go along with the massive planting of a chemical and energy-intensive GE perennial crop, alfalfa; guaranteed to spread its mutant genes and seeds across the nation; guaranteed to contaminate the alfalfa fed to organic animals; guaranteed to lead to massive poisoning of farm workers and destruction of the essential soil food web by the toxic herbicide, Roundup; and guaranteed to produce Roundup-resistant superweeds that will require even more deadly herbicides such as 2,4 D to be sprayed on millions of acres of alfalfa across the U.S.

In exchange for allowing Monsanto’s premeditated pollution of the alfalfa gene pool, WFM wants “compensation.” In exchange for a new assault on farmworkers and rural communities (a recent large-scale Swedish study found that spraying Roundup doubles farm workers’ and rural residents’ risk of getting cancer), WFM expects the pro-biotech USDA to begin to regulate rather than cheerlead for Monsanto. In payment for a new broad spectrum attack on the soil’s crucial ability to provide nutrition for food crops and to sequester dangerous greenhouse gases (recent studies show that Roundup devastates essential soil microorganisms that provide plant nutrition and sequester climate-destabilizing greenhouse gases), WFM wants the Biotech Bully of St. Louis to agree to pay “compensation” (i.e. hush money) to farmers “for any losses related to the contamination of his crop.”

In its email of Jan. 21, 2011 WFM calls for “public oversight by the USDA rather than reliance on the biotechnology industry,” even though WFM knows full well that federal regulations on Genetically Modified Organisms (GMOs) do not require pre-market safety testing, nor labeling; and that even federal judges have repeatedly ruled that so-called government “oversight” of Frankencrops such as Monsanto’s sugar beets and alfalfa is basically a farce. At the end of its email, WFM admits that its surrender to Monsanto is permanent: “The policy set for GE alfalfa will most likely guide policies for other GE crops as well  True coexistence is a must.”

Why Is Organic Inc. Surrendering?

According to informed sources, the CEOs of WFM and Stonyfield are personal friends of former Iowa governor, now USDA Secretary, Tom Vilsack, and in fact made financial contributions to Vilsack’s previous electoral campaigns. Vilsack was hailed as “Governor of the Year” in 2001 by the Biotechnology Industry Organization, and traveled in a Monsanto corporate jet on the campaign trail. Perhaps even more fundamental to Organic Inc.’s abject surrender is the fact that the organic elite has become more and more isolated from the concerns and passions of organic consumers and locavores.

The Organic Inc. CEOs are tired of activist pressure, boycotts, and petitions. Several of them have told me this to my face. They apparently believe that the battle against GMOs has been lost, and that it’s time to reach for the consolation prize.  The consolation prize they seek is a so-called “coexistence” between the biotech Behemoth and the organic community that will lull the public to sleep and greenwash the unpleasant fact that Monsanto’s unlabeled and unregulated genetically engineered crops are now spreading their toxic genes on 1/3 of U.S. (and 1/10 of global) crop land.

WFM and most of the largest organic companies have deliberately separated themselves from anti-GMO efforts and cut off all funding to campaigns working to label or ban GMOs. The so-called Non-GMO Project, funded by Whole Foods and giant wholesaler United Natural Foods (UNFI) is basically a greenwashing effort (although the 100% organic companies involved in this project seem to be operating in good faith) to show that certified organic foods are basically free from GMOs (we already know this since GMOs are banned in organic production), while failing to focus on so-called “natural” foods, which constitute most of WFM and UNFI’s sales and are routinely contaminated with GMOs.

From their “business as usual” perspective, successful lawsuits against GMOs filed by public interest groups such as the Center for Food Safety; or noisy attacks on Monsanto by groups like the Organic Consumers Association, create bad publicity, rattle their big customers such as Wal-Mart, Target, Kroger, Costco, Supervalu, Publix and Safeway; and remind consumers that organic crops and foods such as corn, soybeans, and canola are slowly but surely becoming contaminated by Monsanto’s GMOs.

Whole Foods’ Dirty Little Secret: Most of the So-Called “Natural” Processed Foods and Animal Products They Sell Are Contaminated with GMOs

The main reason, however, why Whole Foods is pleading for coexistence with Monsanto, Dow, Bayer, Syngenta, BASF and the rest of the biotech bullies, is that they desperately want the controversy surrounding genetically engineered foods and crops to go away. Why? Because they know, just as we do, that 2/3 of WFM’s $9 billion annual sales is derived from so-called “natural” processed foods and animal products that are contaminated with GMOs. We and our allies have tested their so-called “natural” products (no doubt WFM’s lab has too) containing non-organic corn and soy, and guess what: they’re all contaminated with GMOs, in contrast to their certified organic products, which are basically free of GMOs, or else contain barely detectable trace amounts.

Approximately 2/3 of the products sold by Whole Foods Market and their main distributor, United Natural Foods (UNFI) are not certified organic, but rather are conventional (chemical-intensive and GMO-tainted) foods and products disguised as “natural.”

Unprecedented wholesale and retail control of the organic marketplace by UNFI and Whole Foods, employing a business model of selling twice as much so-called “natural” food as certified organic food, coupled with the takeover of many organic companies by multinational food corporations such as Dean Foods, threatens the growth of the organic movement.

Covering Up GMO Contamination: Perpetrating “Natural” Fraud

Many well-meaning consumers are confused about the difference between conventional products marketed as “natural,” and those nutritionally/ environmentally superior and climate-friendly products that are “certified organic.”

Retail stores like WFM and wholesale distributors like UNFI have failed to educate their customers about the qualitative difference between natural and certified organic, conveniently glossing over the fact that nearly all of the processed “natural” foods and products they sell contain GMOs, or else come from a “natural” supply chain where animals are force-fed GMO grains in factory farms or Confined Animal Feeding Operations (CAFOs).

A troubling trend in organics today is the calculated shift on the part of certain large formerly organic brands from certified organic ingredients and products to so-called “natural” ingredients. With the exception of the “grass-fed and grass-finished” meat sector, most “natural” meat, dairy, and eggs are coming from animals reared on GMO grains and drugs, and confined, entirely, or for a good portion of their lives, in CAFOs.

Whole Foods and UNFI are maximizing their profits by selling quasi-natural products at premium organic prices. Organic consumers are increasingly left without certified organic choices while genuine organic farmers and ranchers continue to lose market share to “natural” imposters. It’s no wonder that less than 1% of American farmland is certified organic, while well-intentioned but misled consumers have boosted organic and “natural” purchases to $80 billion annually-approximately 12% of all grocery store sales.

The Solution: Truth-in-Labeling Will Enable Consumers to Drive So-Called “Natural” GMO and CAFO-Tainted Foods Off the Market

There can be no such thing as “coexistence” with a reckless industry that undermines public health, destroys biodiversity, damages the environment, tortures and poisons animals, destabilizes the climate, and economically devastates the world’s 1.5 billion seed-saving small farmers.

There is no such thing as coexistence between GMOs and organics in the European Union. Why? Because in the EU there are almost no GMO crops under cultivation, nor GM consumer food products on supermarket shelves. And why is this? Because under EU law, all foods containing GMOs or GMO ingredients must be labeled. Consumers have the freedom to choose or not to choose GMOs; while farmers, food processors, and retailers have (at least legally) the right to lace foods with GMOs, as long as they are safety-tested and labeled.

Of course the EU food industry understands that consumers, for the most part, do not want to purchase or consume GE foods. European farmers and food companies, even junk food purveyors like McDonald’s and Wal-Mart, understand quite well the concept expressed by a Monsanto executive when GMOs first came on the market: “If you put a label on genetically engineered food you might as well put a skull and crossbones on it.”

The biotech industry and Organic Inc. are supremely conscious of the fact that North American consumers, like their European counterparts, are wary and suspicious of GMO foods. Even without a PhD, consumers understand you don’t want your food safety or environmental sustainability decisions to be made by out-of-control chemical companies like Monsanto, Dow, or Dupont – the same people who brought you toxic pesticides, Agent Orange, PCBs, and now global warming.

Industry leaders are acutely aware of the fact that every single industry or government poll over the last 16 years has shown that 85-95% of American consumers want mandatory labels on GMO foods. Why? So that we can avoid buying them. GMO foods have absolutely no benefits for consumers or the environment, only hazards. This is why Monsanto and their friends in the Bush, Clinton, and Obama administrations have prevented consumer GMO truth-in-labeling laws from getting a public discussion in Congress.

Although Congressman Dennis Kucinich (Democrat, Ohio) recently introduced a bill in Congress calling for mandatory labeling and safety testing for GMOs, don’t hold your breath for Congress to take a stand for truth-in-labeling and consumers’ right to know what’s in their food. Especially since the 2010 Supreme Court decision in the so-called Citizens United case gave big corporations and billionaires the right to spend unlimited amounts of money (and remain anonymous, as they do so) to buy media coverage and elections, our chances of passing federal GMO labeling laws against the wishes of Monsanto and Food Inc. are all but non-existent.

Perfectly dramatizing the “Revolving Door” between Monsanto and the Federal Government, Supreme Court Justice Clarence Thomas, formerly chief counsel for Monsanto, delivered one of the decisive votes in the Citizens United case, in effect giving Monsanto and other biotech bullies the right to buy the votes it needs in the U.S. Congress.

With big money controlling Congress and the media, we have little choice but to shift our focus and go local. We’ve got to concentrate our forces where our leverage and power lie, in the marketplace, at the retail level; pressuring retail food stores to voluntarily label their products; while on the legislative front we must organize a broad coalition to pass mandatory GMO (and CAFO) labeling laws, at the city, county, and state levels.

The Organic Consumers Association, joined by our consumer, farmer, environmental, and labor allies, has just launched a nationwide Truth-in-Labeling campaign to stop Monsanto and the Biotech Bullies from force-feeding unlabeled GMOs to animals and humans.

Utilizing scientific data, legal precedent, and consumer power the OCA and our local coalitions will educate and mobilize at the grassroots level to pressure giant supermarket chains (Wal-Mart, Kroger, Costco, Safeway, Supervalu, and Publix) and natural food retailers such as Whole Foods and Trader Joe’s to voluntarily implement “truth-in-labeling” practices for GMOs and CAFO products; while simultaneously organizing a critical mass to pass mandatory local and state truth-in-labeling ordinances – similar to labeling laws already in effect for country of origin, irradiated food, allergens, and carcinogens.

If local and state government bodies refuse to take action, wherever possible we must attempt to gather sufficient petition signatures and place these truth-in-labeling initiatives directly on the ballot in 2011 or 2012.  If you’re interested in helping organize or coordinate a Millions Against Monsanto and Factory Farms Truth-in-Labeling campaign in your local community, sign up here:http://organicconsumers.org/oca-volunteer/

To pressure Whole Foods Market and the nation’s largest supermarket chains to voluntarily adopt truth-in-labeling practices sign here, and circulate this petition widely:http://www.organicconsumers.org/articles/article_22309.cfm

And please stay tuned to Organic Bytes for the latest developments in our campaigns.

Power to the People! Not the Corporations!

####

Jan. 28 Response by Whole Foods Market:

Many people have asked us why we endorsed the coexistence option rather than an outright ban on GE alfalfa. That was never an option in Washington!  The USDA presented the industry with only two options that they were considering– deregulation and deregulation with restrictions. Given the pervasive planting of GE crops in the U.S. – 93% of soy, 86% of corn, 93% of cotton and 93% of canola seed planted were genetically engineered in the U.S. in 2010 – the option of an outright ban was not on the table. Whole Foods Market — along with the National Cooperative Grocers Association, the National Organic Coalition, the Organic Trade Association, and other companies and groups — endorsed the path of deregulation with restrictions, or coexistence, not because it was a perfect path, but because it was a path to create meaningful change right now in the regulating of genetically engineered foods and the protection of non-GE foods. (Read the full response.)

SOURCE

 

12,000 Year Old Unexplained Structure

12,000 Year Old Unexplained Structure

http://youtu.be/TZ0ViMVxKZA

For a more thorough analysis related to the geological existence for sites such as these, visit: http://welteislehre.com/

Amazing find (History Chanel documentary) in what is now Turkey, 12,000 year-old circular city. Twice as old as any city in Mesopotamia. The Germans are excavating it.

Raw Milk Advocate James Stewart Arrested & Assaulted by Government Impersonator Bounty Hunters

Raw Milk Advocate James Stewart Arrested & Assaulted by Government Impersonator Bounty Hunters

James Stewart, the 65-year-old raw “milk man” and founder of Rawesome Foods, was assaulted near his home today by three armed men driving unmarked luxury vehicles with no license plates. Carrying firearms on their hips and dressed in gangster-style street clothes, Satanic T-shirt imagery and tattoos, they claimed to be making an “arrest” and verbally assaulted James, sprayed pepper spray in his face, then forced his head against a car and screamed, according to witnesses, “You better listen to me or you’re gonna have a bad f*ckin’ day!”

James Stewart’s cell phone was on the entire time, and a phone witness told NaturalNews the arrest was conducted “Nazi style.” Meanwhile, James was screaming to anyone who would listen, “HELP ME! HELP ME! WHY ARE YOU DOING THIS TO ME?”

A partial video of the incident was captured by a witness. The redness in the face of James Stewart is due to the pepper spray assault. That video link is here:
http://www.youtube.com/watch?v=UYTP9C7jtrI

James was wanted on $130,000 in bail by Ventura County, which had originally put him on $1 million bail — an amount usually reserved for murderers, rapists or serial killers. James, accused of selling “unpasteurized milk” through Rawesome Foods, was made the target of an FDA-funded and politically motivated attempt to destroy the raw milk industry in California. He has been charged with financial crimes by Ventura County even though there is literally no legitimate evidence whatsoever linking James to any such crimes, and the entire case is already in the process of being unraveled.

In the Ventura case, there is no crime, no evidence, and not even any justifiable reason to arrest James and put him on bail in the first place! The entire thing was utterly fabricated as a publicity stunt to attempt to intimidate would-be raw milk producers.

Bounty hunters drive cars with no plates, carry weapons, intimidate witnesses

In the arrest video, James clearly says, “Sir I was trying to give you the information that I thought Mr. McAfee was giving to me.” James is referring to Mark McAfee of Organic Pastures, California’s largest organic milk producer. NaturalNews has confirmed that Mark McAfee, among several other people, had helped fund James Stewart’s bail bond. According to James Stewart, who phoned from Ventura county jail, Mark McAfee was present at the “arrest” and watched the bounty hunters take James away.

UPDATE: Readers of this story were asking for more details and comments on Mark McAfee. As this story is moving quickly, some of the relevant details haven’t yet been reported. Mark had really gone out on a limb to help bail out James Stewart, even putting up his own house as collateral. When James failed to make a recent court appearance in Ventura — because he had decided to fight the malicious charges against him from outside the system — this put McAfee and other people at financial risk. McAfee, in particular, had mortgaged his house to raise some of this bail money, which I believe came to $100,000 on McAfee’s part. This money would have been forfeited had James not been taken into custody by the bounty hunters.

It’s not yet clear whether McAfee had anything to do with leading the bounty hunters to James. Many people suspect so, and opinion is currently divided over whether this was a reluctant but important act of financial preservation or a betrayal of a key figure in the raw food community. I intend to reach out to McAfee to ask for his accounting of events, if he is willing to go on the record with comments. My history with McAfee has so far been a positive one, and I have known him to be a strong advocate of raw food freedom and someone who clearly went out of his way to help James Stewart make his bail.

Bounty hunters verbally intimidate witnesses

During the so-called “arrest,” one of the bounty hunters attempts to verbally intimidate the person filming the video, threatening them by saying, “You’re interfering with an arrest, you’re blocking traffic.” In reality, the bounty hunter never identified himself, never read James any rights and was not involved in any legal arrest whatsoever. The whole thing was a charade carried out by what might appear to a rational person to be armed thugs driving stolen vehicles while impersonating undercover police officers.

In the video, what appears to be a firearm can be seen on the hip of one of the men wearing a pink shirt. At no point during the assault did these men show any badges or identification of any kind. According to California law, “All bounty hunters must carry with them a certification of completion of required courses and training programs.”

According to witnesses, these armed men did not produce any certificates at all. Instead, they verbally intimidated the people filming the incident. One of the bounty hunters called the camera person a “retard” for daring to film him.

We can hear on the video another bounty hunter saying, “You’re in a lot of trouble, you better get an attorney!” During all this, they are rifling through James’ pockets and apparently stealing all his personal belongings. “You are in a lot more trouble than anybody up here,” one of them says to James. “You are in a lot of trouble.”

Over raw milk? Really? Is this what California has come to now? If you sell unpasteurized milk, you get accosted by three armed men driving unlicensed (stolen?) vehicles, working for the state?

“We are not the police…”

When the witnesses filming the incident asked for the badge numbers of the individuals who claimed to be making an “arrest,” they were told, “We’re not the police so we’re not gonna give you badge numbers.”

Later in the video, a close-up image appears for one of the license plates of the luxury vehicles used by the armed assailants. It is clearly an Infinity car dealership plate number KMA-367. The vehicle is a white Infinity luxury sedan.

The other vehicle, which also has no California license plate, is a black sports car. While James is being stuffed into one of the vehicles, one of the bounty hunters calls him a “scumbag.”

Public vigil needed

James is currently residing in the Ventura county jail. As NaturalNews previously reported, James was tortured in the Los Angeles jail system for a period of eight days (http://www.naturalnews.com/035208_James_Stewart_torture_county_jail.h…).

James has privately told me, the editor of NaturalNews, that he fears if he is taken back to jail, he will be tortured, subjected to starvation or even murdered by the authorities there. This may be more likely than you think, because the outright criminality of California officials who persecuted James Stewart is now being exposed.

For example, NaturalNews has already exposed Michelle LeCavalier and L.A. district attorney prosecutors for illegally signing search warrants and conducting armed raids on Rawesome Foods even though they had never taken an oath of office as required by California law (http://www.naturalnews.com/036523_Rawesome_District_Attorney_imperson…).

This means the armed raid against Rawesome Foods, the arrest of James Stewart and all the actions taken against him were illegal. Furthermore, James now has a potential multi-million-dollar civil case against Los Angeles County — and possibly individuals in Ventura County — for false arrest, kidnapping and violating his civil rights while they were “impersonating” officials.

Given these circumstances, James has legitimate reason to fear that county authorities there — who almost certainly staged the armed bounty hunter interception of James last night — may quite literally be trying to kill him.

James told me on the phone many times, “I love live, I will not give up. If they say I committed suicide, it means they killed me, Mike. They’re gonna try to kill me.”

That James was stuffed into unmarked, unlicensed cars driven by intimidating-looking men carrying weapons and verbally threatening witnesses at the scene only further supports the legitimacy of James’ fear.

Let Ventura County know we are watching and that we demand the charges against James be dropped

Here, I ask for your support to let the Ventura County DA’s office know we are watching them, and we hold them responsible for the treatment of James.

Call the main DA’s office at 805-654-2500 and let them know that you are joining tens of thousands of other people who are watching this and carefully scrutinizing their behavior. The Ventura County case against James Stewart is, I can assure you, utterly fabricated and completely without merit. It should be immediately dropped and James set free.

Here’s the full contact information for the Ventura County DA’s office:
http://da.countyofventura.org/contact_information.htm

Ventura County has been waging a “war of personal vengeance” against Stewart (http://www.naturalnews.com/035197_James_Stewart_Sharon_Palmer_Ventura…). Both Ventura and L.A. counties have spent millions of dollars in taxpayer money in an attempt to incarcerate a raw milk man! A senior citizen! The man is 65 years old, utterly non-violent in every way, and yet has been targeted in the most vicious manner by district attorneys who apparently don’t have any real criminals to go after.

Questions remain about the “arrest” of James Stewart

Some serious questions emerge tonight from the “hunting down” of James Stewart by Ventura county:

• What crime has James allegedly committed that is so serious it justifies $130,000 in bail bonds?

• Where is the evidence of such crimes? (It doesn’t exist!)

• Why are armed individuals who claim to be working for the county running around Ventura with unlicensed vehicles that appear to be stolen off the new car lot of an Infinity dealership?

• Why were these “bounty hunters” dressed in Satanic imagery and sporting gang-style facial hair and tattoos while driving high-dollar luxury cars?

• Why were they so verbally abusive to James Stewart, calling him a “scumbag” if they were just bounty hunters looking to earn a paycheck?

• How were these bounty hunters able to locate James Stewart in the first place? Were they tipped off by someone?

• What will happen to James Stewart in Ventura county jail? Will they torture him? Will they silence him? Will they drop the charges and apologize?

This story is developing here on NaturalNews.com. We will continue to bring you details as we speak with witnesses and investigate more deeply. Share this story. Spread the word: No one who sells real food in California is safe from the “authorities” there. You can and will be targeted, kidnapped, robbed at gunpoint by the police, then tortured in the jail system.

Watch the bounty hunter “arrest” video here:

Learn more: NaturalNews.com

UN Gun Ban Treaty Leaked – The Elite Are Gunning for your Guns!

UN Gun Ban Treaty Leaked – The Elite Are Gunning for your Guns!

Treacherous wording upholds “States” gun rights but not individuals

The text of the anticipated and hotly-contested United Nations Arms Trade Treaty has been leaked, with the treaty itself set to be adopted and signed by member States as early as tomorrow, July 27. President Obama, today joining the chorus for gun control inside the United States in the wake of the Batman massacre, has previously indicated that he would sign the treaty, which would then have to be ratified by the Senate.

Masked behind the language of promoting peace in an international world by preventing genocide, the UN has unleashed a great Trojan Horse that calls upon States to enact national legislation sufficient to meet the minimum goals outlined in this treaty– including gun registries, background checks, import/export controls and more for arms of all types, including small & conventional weapons. “Each State Party shall adopt national legislation or other appropriate national measures regulations and policies as may be necessary to implement the obligations of this Treaty,” the treaty text states in part.

It makes specific note that the treaty places no limit upon greater gun control efforts within individual nations, and additionally places no expiration on the agreement. The scope of this language proves the analysis by Infowars (1, 2, 3, 4), writers at Forbes and many other publications that have been warning about this deceptive encroachment to be correct– there is an effort to disarm America underway.

The devil, as usual, is in the details.

Repeatedly, the treaty obligates States to establish “national control systems” to meet the particulars of the treaty. While the phrase “within national laws and regulations” appears to suggest that the 2nd Amendment would limit the implementation, properly read in the context of the wording and history itself, it really only invites new “regulations” where no “law” can be established.

These international goals will undoubtedly pressure changes in the executive branches’ many policies, as we have already seen with the ATF, who are trying to outlaw most types of shotguns, and who separately placed greater reporting burdens on gun shops in the Southwest border states as a response to the Fast & Furious set-up by Eric Holder & co. to demonize and destroy gun ownership.

The first “principle” outlined in the preamble reads: “1. The inherent rights of all States to individual or collective self-defense.” While the language of the treaty appears to recognize the legal right to keep such arms, the text actually recognizes the “inherent right of States” to “individual and collective” self-defense.

This is NOT the same as individual persons’ inherent right to keep and bear arms as recognized and enumerated in the United States’ Bill of Rights. Instead, it puts the collectivist unit known as the State above the individual, in complete defiance of the system set-up in the United States. Individual defense for a State, for instance, refers to what is known on the international scene as “unilateral war,” while collective defense is recognize in such actions as that of NATO or other allied bodies. The States’ right to maintain internal order has also been recognized by the UN, but all other purposes for arms ownership are seen as illegitimate.

It specifically recognizes [only] the “lawful private ownership and use of conventional arms exclusively for, inter alia, recreational, cultural, historical and sporting activities for States where such ownership and use are permitted or protected by law.” There’s been a great deal of rhetoric from gun grabbers over the years attempting to emphasize gun ownership for legitimate sporting uses, but the real purpose of arms ownership is a balance of power at the individual level in order to discourage tyranny at the State level. THAT is what the founding fathers intended, and that is the historical legacy Americans cherish.

NO SPECIFIC PROTECTION for individual persons is contained in this dangerous treaty, though the same media who’ve been demonizing critics of the UN’s effort as delusional and paranoid will attempt to argue otherwise, clinging to deliberately inserted clauses herein that look like stop-guards and protections for gun rights, but properly read, do no such thing.

While the UN advises States to keep within the scope of their own laws, the end-run assault against American’s 2nd Amendment is unmistakeable.

The text was released two days ago, but has received almost no attention in the press. The International Association for the Protection of Civilian Arms Rights and The Examiner have analyzed the treaty, while pointing out that member states like France have “let slip that their ultimate goal is to regulate legitimately-owned ‘weapons.’”

The United Nations has a sordid history of pursuing “general and complete disarmament,” and individual arms including legally owned arms have always been part of that focus. The United Nations treaty from 2001, known as the “SADC Protocol: Southern African Development Community” is, according to the UN’s own disarmament website, a “regional instrument that aims to curtail small arms ownership and illicit trafficking in Southern Africa along with the destruction of surplus state weapons. It is a far-reaching instrument, which goes beyond that of a politically binding declaration, providing the region with a legal basis upon which to deal with both the legal and the illicit trade in firearms.”

As we have previously noted, U.S. troops have been trained to confiscate American guns, while the confiscation in New Orleans after Hurricane Katrina has already set the precedent. The deception over aiming for legal guns while pretending to target “illicit” weapons is continued here in this 2012 monster treaty.

Below is the text in full, as it has been proposed and released. Any changes in the signed version will be noted when that time comes:

————————

UNITED NATIONS ARMS TRADE TREATY TEXT

PREAMBLE

The States Parties to this Treaty.

Guided by the purposes and principles of the Charter of the United Nations.

Recalling that the charter of the UN promotes the establishment and maintenance of international peace and security with the least diversion for armaments of the world’s human and economic resources;

Reaffirming the obligation of all State Parties to settle their international disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered, in accordance with the Charter of the UN;

Underlining the need to prevent, combat and eradicate the illicit trade of conventional arms and to prevent their diversion to illegal and unauthorized end use, such as terrorism and organized crime;

Recognizing the legitimate political, security, economic and commercial rights and interests of States in the international trade of conventional arms;

Reaffirming the sovereign right and responsibility of any State to regulate and control transfers of conventional arms that take place exclusively within its territory pursuant to its own legal or constitutional systems;

Recognizing that development, human rights and peace and security, which are three pillars of the United Nations, are interlinked and mutually reinforcing.

Recalling the United Nations Disarmament Commission guidelines on international arms transfers adopted by the General Assembly;

Noting the contribution made by the 2001 UN Programme of Action to preventing combating and eradicating the illicit trade in small arms and light weapons in all its aspects, as well as the 2001 Protocol against the illicit manufacturing of and trafficking in Firearms, their parts and components and ammunition, supplementing the United Nations Convention against Transnational Organized Crime;

Recognizing the security, social, economic and humanitarian consequences of the illicit trade in and unregulated trade of conventional arms;

Recognizing the challenges faced by victims of armed conflict and their need for adequate care, rehabilitation and social and economic inclusion;

Bearing in mind that the women and children are particularly affected in situations of conflict and armed violence;

Emphasizing that nothing in this treaty prevents States from exercising their right to adopt additional more rigorous measures consistent with the purpose of this Treaty;

Recognizing the legitimate international trade and lawful private ownership and use of conventional arms exclusively for, inter alia, recreational, cultural, historical and sporting activities for States where such ownership and use are permitted or protected by law;

Recognizing the active role that non-governmental organizations and civil society can play in furthering the goals and objectives of this Treaty; and

16. Emphasizing that regulation of the international trade in conventional arms should not hamper international cooperation and legitimate trade in material, equipment and technology for peaceful purposes;

Have agreed as follows:

Principles

Guided by the Purposes and Principles of the Charter of the United Nations, States Parties, In promoting the goals and objectives of this Treaty and implementing its provisions, shall act in accordance with the following principles:

The inherent rights of all States to individual or collective self-defense;

2. Settlement of individual disputes by peaceful means in such a manner that international peace and security, and justice, are not endangered;

3. The rights and obligations of States under applicable international law, including international humanitarian law and international human rights law;

4. The responsibility of all States, in accordance with their respective international obligations, to effectively regulate and control international transfer of conventional arms as well as the primary responsibility of all States to in establishing and implementing their respective national export control systems; and

5. The necessity to implement this Treaty consistently and effectively and in a universal, objective and non-discriminatory manner.

Article 1
Goals and Objectives

Cognizant of the need to prevent and combat the diversion of conventional arms into the illicit market or to unauthorized end users through the improvement of regulation on the international trade in conventional arms,

The goals and objectives of this Treaty are:

– For States Parties to establish the highest possible common standards for regulating or improving regulation of the international trade in conventional arms;

– To prevent, combat and eradicate the illicit trade in conventional arms and their diversion to illegal and unauthorized end use;

In order to:

– Contribute to international and regional peace, security and stability;

– Avoid that the international trade in conventional arms contributes to human suffering;

– Promote cooperation, transparency and responsibility of States Parties in the trade in conventional arms, thus building confidence among States Parties,

Article 2

– A. Covered Items

– 1. This Treaty shall apply to all conventional arms within the following categories:

– a. Battle Tanks

– b. Armored combat vehicles

– c. Large-caliber Artillery systems

– d. Combat aircraft

– e. Attack helicopters

– f. Warships

– g. Missiles and missile launchers

– h. Small Arms and Light Weapons

– 2. Each State Party Shall establish and Maintain a national control system to regulate the export of munitions to the extent necessary to ensure that national controls on the export of the conventional arms covered by Paragraph a1 (a)-(h) are not circumvented by the export of munitions for those conventional arms.

– 3. Each State Party shall establish and maintain a national control system to regulate the export of parts and components to the extent necessary to ensure that national controls on the export of the conventional arms covered by Paragraph A1 are not circumvented by the export of parts and components of those items.

– 4. Each State Party shall establish or update, as appropriate, and maintain a national control list that shall include the items that fall within Paragraph 1 above, as defined on a national basis, based on relevant UN instruments at a minimum. Each State Party shall publish its control list to the extent permitted by national law.

– B. Covered Activities

– 1. This Treaty shall apply to those activities of the international trade in conventional arms covered in paragraph a1 above, and set out in Articles 6-10, hereafter referred to as “transfer.”

– 2. This Treaty shall not apply to the international movement of conventional arms by a State Party or its agents for its armed forces or law enforcement authorities operating outside its national territories, provided they remain under the State Party’s ownership.

Article 3
Prohibited Transfers

A State Party shall not authorize any transfer of conventional arms within the scope of this Treaty if the transfer would violate any obligation under any measure adopted by the United Nations Security Council acting under Chapter VII of the Charter of the United Nations, in particular arms embargoes.

A State Party shall not authorize any transfer of conventional arms within the scope of this Treaty if the transfer would violate its relevant international obligations, under international agreements, to which it is a Party, in particular those relating to the international transfer of, or illicit trafficking in, conventional arms.

A State Party shall not authorize a transfer of conventional arms within the scope of this Treaty for the purpose of facilitating the commission of genocide, crimes against humanity, war crimes constituting grave breaches of the Geneva Conventions of 1949, or serious violations of Common Article 3 of the Geneva Convention of 1949.

Article 4
National Assessment

Each State Party, in considering whether to authorize an export of conventional arms within the scope of this Treaty, shall, prior to authorization and through national control systems, make an assessment specific to the circumstances of the transfer based on the following criteria:

Whether the proposed export of conventional arms would:

Be used to commit or facilitate serious violations of international humanitarian law;
Be used to commit or facilitate serious violations of international human rights law;
Contribute to peace and security;
Be used to commit or facilitate an act constituting an offense under international conventions and protocols relating to terrorism or transnational organized crime, to which the transferring State is a Party;

In making the assessment, the transferring State Party shall apply the criteria set out in Paragraph 2 consistently and in an objective and non-discriminatory manner and in accordance with the principles set out in this Treaty, taking into account relevant factors, including information provided by the importing State.

4. In assessing the risk pursuant to Paragraph 2, the transferring State Party may also take into consideration the establishment of risk mitigation measures including confidence-building measures and jointly developed programs by the exporting and importing State.

5. If in the view of the authorizing State Party, this assessment, which would include any actions that may be taken in accordance with Paragraph 4, constitutes a substantial risk, the State Party shall not authorize the transfer.

Article 5
Additional Obligations

Each State Party, when authorizing an export, shall consider taking feasible measures, including joint actions with other States involved in the transfer, to avoid the transferred arms:
being diverted to the illicit market;
be used to commit or facilitate gender-based violence or violence against children;
become subject to corrupt practices; or
adversely impact the development of the recipient State.

Article 6
General Implementation

Each State Party shall implement this Treaty in a consistent, objective and non-discriminatory manner in accordance with the goals and objectives of this Treaty;

The implementation of this Treaty shall not prejudice previous or future obligations undertaken with regards to international instruments, provided that those obligations are consistent with the goals and objectives of this Treaty. This Treaty shall not be cited as grounds for voiding contractual obligations under defense cooperation agreements concluded by States Parties to this Treaty.

Each State Party shall take all appropriate legislative and administrative measures necessary to implement the provisions of this Treaty and designate competent national authorities in order to have an effective, transparent and predictable national control system regulating the transfer of conventional arms;

Each State Party shall establish one or more national contact points to exchange information on matters related to the implementation of this Treaty. A State Party shall notify the Implementation Support Unit (See Article 13) of its national contact point(s) and keep the information updated.

State Parties involved in a transfer of conventional arms shall, in a manner consistent with the principles of this Treaty, take appropriate measures to prevent diversion to the illicit market or to unauthorized end-users. All State Parties shall cooperate, as appropriate, with the exporting State to that end.

If a diversion is detected the State or States Parties that made the decision shall verify the State or States Parties that could be affected by such diversion, in particulate those State Parties that are involved in the transfer, without delay.

Each State Party shall take the appropriate measures, within national laws and regulations, to regulate transfers of conventional arms within the scope of the Treaty.

Article 7
Export

Each State Party shall conduct risk assessments, as detailed in Articles 4 and 5, whether to grant authorizations for the transfer of conventional arms under the scope of this Treaty. State Parties shall apply Articles 3-5 consistently, taking into account all relevant information, including the nature and potential use of the items to be transferred and the verified end-user in the country of final destination.

Each State Party shall take measures to ensure all authorizations for the export of conventional arms under the scope of the Treaty are detailed and issued prior to the export. Appropriate and relevant details of the authorization shall be made available to the importing, transit and transshipment State Parties, upon request.

Article 8
Import

Importing State Parties shall take measures to ensure that appropriate and relevant information is provided, upon request, to the exporting State Party to assist the exporting State in its criteria assessment and to assist in verifying end users.

State Parties shall put in place adequate measures that will allow them, where necessary, to monitor and control imports of items covered by the scope of the Treaty. State Parties shall also adopt appropriate measures to prevent the diversion of imported items to unauthorized end users or to the illicit market.

Importing State Parties may request, where necessary, information from the exporting State Party concerning potential authorizations.

Article 9
Brokering

Each State Party shall take the appropriate measures, within national laws and regulations, to control brokering taking place under its jurisdiction for conventional arms within the scope of this Treaty.

Article 10
Transit and Transshipment

Each State Party shall adopt appropriate legislative, administrative or other measures to monitor and control, where necessary and feasible, conventional arms covered by this Treaty that transit or transship through territory under its jurisdiction, consistent with international law with due regard for innocent passage and transit passage;

Importing and exporting States Parties shall cooperate and exchange information, where feasible and upon request, to transit and transshipment States Parties, in order to mitigate the risk of discretion;

Article 11
Reporting, Record Keeping and Transparency

Each State Party shall maintain records in accordance with its national laws and regardless of the items referred to in Article 2, Paragraph A, with regards to conventional arms authorization or exports, and where feasible of those items transferred to their territory as the final destination, or that are authorized to transit or transship their territory, respectively.

Such records may contain: quantity, value, model/type, authorized arms transfers, arms actually transferred, details of exporting State(s), recipient State(s), and end users as appropriate. Records shall be kept for a minimum of ten years, or consistent with other international commitments applicable to the State Party.

States Parties may report to the Implementation Support Unit on an annual basis any actions taken to address the diversion of conventional arms to the illicit market.

Each State Party shall, within the first year after entry into force of this Treaty for that State Party, provide an initial report to States Parties of relevant activities undertaken in order to implement this Treaty; including inter alia, domestic laws, regulations and administrative measures. States Parties shall report any new activities undertaken in order to implement this Treaty, when appropriate. Reports shall be distributed and made public by the Implementation Support Unit.

Each State Party shall submit annually to the Implementation Support Unit by 31 May a report for the preceding calendar year concerning the authorization or actual transfer of items included in Article 2, Paragraph A1. Reports shall be distributed and made public by the Implementation Support Unit. The report submitted to the Implementation Support Unit may contain the same type of information submitted by the State Party to other relevant UN bodies, including the UN Register of Conventional Arms. Reports will be consistent with national security sensitivities or be commercially sensitive.

ARTICLE 12
ENFORCEMENT

Each State Party shall adopt national legislation or other appropriate national measures regulations and policies as may be necessary to implement the obligations of this Treaty.

ARTICLE 13
IMPLEMENTATION SUPPORT UNIT

This Treaty hereby establishes an Implementation Support Unit to assist States Parties in its implementation.
The ISU shall consist of adequate staff, with necessary expertise to ensure the mandate entrusted to it can be effectively undertaken, with the core costs funded by States Parties.
The implementation Support Unit, within a minimized structure and responsible to States Parties, shall undertake the responsibilities assigned to it in this Treaty, inter alia:
Receive distribute reports, on behalf of the Depository, and make them publicly available;
Maintain and Distribute regularly to States Parties the up-to-date list of national contact points;
Facilitate the matching of offers and requests of assistance for Treaty implementation and promote international cooperation as requested;
Facilitate the work of the Conference of States Parties, including making arrangements and providing the necessary service es for meetings under this Treaty; and
Perform other duties as mandated by the Conference of States Parties.

ARTICLE 14
INTERNATIONAL COOPERATION

States Parties shall designate national points of contact to act as a liaison on matters relating to the implementation of this Treaty.
States Parties shall cooperate closely with one another, as appropriate, to enhance the implementation of this Treaty consistent with their respective security interests and legal and administrative systems.

States Parties are encouraged to facilitate international cooperation, including the exchange of information on matters of mutual interest regarding the implementation and application of this Treaty in accordance with their national legal system. Such voluntary exchange of information may include, inter alia, information on national implementation measures as well as information on specific exporters, importers and brokers and on any prosecutions brought domestically, consistent with commercial and proprietary protections and domestic laws, regulations and respective legal and administrative systems.

4. Each State Party is encouraged to maintain consultations and to share information, as appropriate, to support the implementation of this Treaty, including through their national contact points.

5. States Parties shall cooperate to enforce the provisions of this Treaty and combat breaches of this Treaty, including sharing information regarding illicit activities and actors to assist national enforcement and to counter and prevent diversion. States Parties may also exchange information on lessons learned in relation to any aspect of this Treaty, to develop best practices to assist national implementation.

Article 15
International Assistance

In fulfilling the obligation of this Treaty, States Parties may seek, inter alia, legal assistance, legislative assistance, technical assistance, institutional capacity building, material assistance or financial assistance. States, in a position to do so, shall provide such assistance. States Parties may contribute resources to a voluntary trust fund to assist requesting States Parties requiring such assistance to implement the Treaty.

States Parties shall afford one another the widest measure of assistance, consistent with their respective legal and administrative systems, in investigations, prosecutions and judicial proceedings in relation to the violations of the national measures implemented to comply with obligations under of the provisions of this Treaty.

Each State Party may offer or receive assistance, inter alia, through the United Nations international, regional, subregional or national organizations, non-governmental organizations or on a bi-lateral basis. Such assistance may include technical, financial, material and other forms of assistance as needed, upon request.

Article 16
Signature, Ratification, Acceptance, Approval or Accession

This Treaty shall be open for signature on [date] at the United Nations Headquarters in New York by all States and regional integration organizations.
This Treaty is subject to ratification, acceptance or approval of the Signatories.
This Treaty shall be open for accession by any state and regional integration organization that has not signed the Treaty.

4. The instruments of ratification, acceptance, approval or accession shall be deposited with the Depositary.

5. The Depositary shall promptly inform all signatory and acceding States and regional integration organizations of the date of each signature, the date of deposit of each instrument of ratification, acceptance, approval or accession and the date of the entry into force of this Treaty, and of the receipt of notices.

6. “Regional integration organization” shall mean an organization constituted by sovereign States of a given region, to which its Member States have transferred competence in respect of matters governed by this Treaty and which has been duly authorized, in accordance with its internal procedures, to sign, ratify, accept, approve or accede to it.

7. At the time of its ratification, acceptance, approval or accession, a regional integration organization shall declare the extent of its competence with respect to matters governed by this Treaty. Such organizations shall also inform the Depositary of any relevant modifications in the extent of it competence.

8. References to “State Parties” in the present Treaty shall apply to such organizations within the limits of their competence.

Article 17
Entry into Force

This Treaty shall enter into force thirty days following the date of the deposit of the sixty-fifth instrument of ratification, acceptance or approval with the Depositary.

For any State or regional integration organization that deposits its instruments of accession subsequent to the entry into force of the Treaty, the Treaty shall enter into force thirty days following the date of deposit of its instruments of accession.

For the purpose of Paragraph 1 and 2 above, any instrument deposited by a regional integration organization shall not be counted as additional to those deposited by Member States of that organization.

Article 18
Withdrawal and Duration

This Treaty shall be of unlimited duration.

Each State Party shall, in exercising its national sovereignty, have the right to withdraw from this Convention. It shall give notice of such withdrawal to all other States Parties from this Convention. It shall give notice of such withdrawal to all other States Parties and to the Depositary. The instrument of withdrawal shall include a full explanation of the reasons motivating this withdrawal.

A state shall not be discharged, by reason of its withdrawal, from the obligations arising from this treaty while it was a party to the Treaty, including any financial obligations, which may have accrued.

Article 19
Reservations

Each State party, in exercising its national sovereignty, may formulate reservations unless the reservation is incompatible with the object and purpose of this Treaty.

Article 20
Amendments

At any time after the Treaty’s entry into force, a State Party may propose an amendment to this Treaty.

Any proposed amendment shall be submitted in writing to the Depository, which will then circulate the proposal to all States Parties, not less than 180 days before next meeting of the Conference of States Parties. The amendment shall be considered at the next Conference of States Parties if a majority of States Parties notify the Implementation Support Unit that they support further consideration of the proposal no later than 180 days after its circulation by the Depositary.

Any amendment to this Treaty shall be adopted by consensus, or if consensus is not achieved, by two-thirds of the States Parties present and voting at the Conference of States Parties. The Depositary shall communicate any amendment to all States Parties.

A proposed amendment adopted in accordance with Paragraph 3 of this Article shall enter into force for all States Parties to the Treaty that have accepted it, upon deposit with the Depositary. Thereafter, it shall enter into force for any remaining State Party on the date of deposit of its instrument of accession.

Article 21
Conference of States Parties

The Conference of States Parties shall be convened not later than once a year following the entry into force of this Treaty. The Conference of States Parties shall adopt rules of procedure and rules governing its activities, including the frequency of meetings and rules concerning payment of expenses incurred in carrying out those activities.

The Conference of States Parties shall:
a. Consider and adopt recommendations regarding the implementation of this Treaty, in particular the promotion of its universality; TR

b. Consider amendments to this Treaty;

c. Consider and decide the work and budget of the Implementation Support Unit;

d. Consider the establishment of any subsidiary bodies as may be necessary to improve the functioning of the Treaty;

e. Perform any other function consistent with this Treaty.

3. If circumstances merit, an exceptional meeting of the State Parties may be convened if required and resources allow.

Article 22
Dispute Settlement

States Parties shall consult and cooperate with each other to settle any dispute that may arise with regard to the interpretation or application of this Treaty.
States Parties shall settle any dispute between them concerning the interpretation or application of this Treat though negotiations or other peaceful means of the Parties mutual choice.
States Parties may pursue, by mutual consent, third party arbitration to settle any dispute between them, regarding issues concerning the implementation of this Treaty.

Article 23
Relations with States not party to this Treaty

States Parties shall apply Articles 3-5 to all transfers of conventional arms within the scope of this Treaty to those not party to this Treaty.

Article 24
Relationship with other instruments

States Parties shall have the right to enter into agreements on the trade in conventional arms with regards to the international trade in conventional arms, provided that those agreements are compatible with their obligations under this Treaty and do not undermine the objects and purposes of this Treaty.

Article 25
Depositary and Authentic Texts

The Secretary-General of the United Nations is the Depositary of this Treaty.
The original text of this Treaty, of which the Arabic, Chinese, English, Russian and Spanish texts are equally authentic.

(Emphasis in bold added by this author for help in analysis)

Aaron Dykes
July 26, 2012

SOURCE: InfoWars.com

COINTELPRO Techniques For Dilution, Misdirection And Control of an Internet Forum

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’

Technique #1 – ‘FORUM SLIDING’

If a very sensitive posting of a critical nature has been posted on a forum – it can be quickly removed from public view by ‘forum sliding.’ In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to ‘age.’ Each of these misdirectional forum postings can then be called upon at will to trigger a ‘forum slide.’ The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a ‘forum slide’ and ‘flush’ the critical post out of public view it is simply a matter of logging into each account both real and fake and then ‘replying’ to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting ‘slides’ down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 – ‘CONSENSUS CRACKING’

A second highly effective technique (which you can see in operation all the time at www.abovetopsecret.com) is ‘consensus cracking.’ To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made – but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger ‘evidence’ or disinformation in your favour is slowly ‘seeded in.’ Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then ‘abort’ the consensus cracking by initiating a ‘forum slide.’

Technique #3 – ‘TOPIC DILUTION’

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a ‘RESOURCE BURN.’ By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a ‘gossip mode.’ In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to ‘drive in the wedge.’ By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 – ‘INFORMATION COLLECTION’

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a ‘show you mine so me yours’ posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your ‘favourite weapon’ and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite ‘technique of operation.’ From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 – ‘ANGER TROLLING’

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes – without the requirement to ‘stage’ a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to ‘lead’ the forum by replying to your own posting with your own statement of violent intent, and that you ‘do not care what the authorities think!!’ inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 – ‘GAINING FULL CONTROL’

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings – and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the ‘ultimate victory’ as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a ‘honey pot’ gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.

COINTELPRO: 25 Rules of ‘Disinformation’

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule. This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

COINTELPRO: Eight Traits of the Disinformationalist

1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial. They almost always have disdain for ‘conspiracy theorists’ and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions. An odd kind of ‘artificial’ emotionalism and an unusually thick skin — an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.

Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the ‘image’ and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It’s just a job, and they often seem unable to ‘act their role in character’ as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later — an emotional yo-yo.

With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game — where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat ‘freudian’, so to speak, in that perhaps they really root for the side of truth deep within.

I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I’m not aware of too many Navy pilots who don’t have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT – FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR – there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to ‘get permission’ or instruction from a formal chain of command.

c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay – the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

 

 

 

Aurora Massacre: Several Links Between James Holmes and US Gov’t Research

Aurora Massacre: Several Links Between James Holmes and US Gov’t Research

WASHINGTON — James Holmes, the 24-year old suspect in the mass shooting of Batman “The Dark Knight Rises” movie goers in Aurora, Colorado that left 12 people dead and 58 injured, has had a number of links to U.S. government-funded research centers. Holmes’s past association with government research projects has prompted police and federal law enforcement officials to order laboratories and schools with which Holmes has had a past association not to talk to the press about Holmes.

Holmes was one of six recipients of a National Institutes of Health Neuroscience Training Grant at the University of Colorado Anschutz Medical Campus in Denver. Holmes is a graduate of the University of California at Riverside with a Bachelor of Science degree in neuroscience. Although Holmes dropped out of the PhD neuroscience program at Anschutz in June, police evacuated two buildings at the Anschutz center after the massacre at the Aurora movie theater. Holmes reportedly gave a presentation at the Anschutz campus in May on Micro DNA Biomarkers in a class titled “Biological Basis of Psychiatric and Neurological Disorders.”

Initial reports of Holmes having an accomplice in the theater shooting have been discounted by the Aurora police. However, no explanation has been given by police why the Anschutz campus buildings were evacuated after Holmes was already in custody in the Arapahoe County jail.

The Anschutz Medical Campus is on the recently de-commissioned site of the U.S. Army’s Fitzsimons Army Medical Center and is named after Philip Anschutz, the billionaire Christian fundamentalist oil and railroad tycoon who also owns The Examiner newspaper chain and website and the neo-conservative Weekly Standard. The Anschutz Medical Campus was built by a $91 million grant from the Anschutz Foundation.

In 2006, at the age of 18, Holmes served as a research intern at the Salk Institute at the University of California at San Diego in La Jolla. It is noteworthy that for the previous two years before Holmes worked at the Salk Institute, the research center was partnered with the Defense Advance Research Projects Agency (DARPA), Columbia University, University of California at San Francisco, University of Wisconsin at Madison, Wake Forest University, and the Mars Company (the manufacturers of Milky Way and Snickers bars) to prevent fatigue in combat troops through the enhanced use of epicatechina, a blood flow-increasing and blood vessel-dilating anti-oxidant flavanol found in cocoa and, particularly, in dark chocolate.

The research was part of a larger DARPA program known as the “Peak Soldier Performance Program,” which involved creating brain-machine interfaces for battlefield use, including human-robotic bionics for legs, arms, and eyes. DARPA works closely with the Defense Science Office on projects that include the medical research community. Fitzsimons was at the forefront of DARPA research on the use of brain-connected “neuroprosthetic” limbs forsoldiers amputated or paralyzed in combat.

According to his LinkedIn profile, James Holmes’s father, Dr. Robert Holmes, who received a PhD in Statistics in 1981 from the University of California at Berkeley, worked for San Diego-based HNC Software, Inc. from 2000 to 2002. HNC, known as a “neural network” company, and DARPA, beginning in 1998, have worked on developing “cortronic neural networks,” which would allow machines to interpret aural and visual stimuli to think like humans. The cortronic concept was developed by HNC Software’s chief scientist and co-founder, Robert Hecht-Nielsen. HNC merged with the Minneapolis-based Fair Isaac Corporation (FICO), a computer analysis and decision-making company. Robert Holmes continues to work at FICO.

It has also emerged that Holmes, when he was 20, worked as a camp counselor at Camp Max Straus of the Jewish Big Brothers and Sister of Los Angeles. According to the Jewish Journal, among other tasks, Holmes helped to teach boys between the ages of 7 to 10 archery. In another unusual detail, the car Holmes used to drive to the Aurora movie theater had Tennessee plates. Holmes is originally from San Diego.

James Holmes is the grandson of Lt. Col. Robert Holmes, one of the first Turkish language graduates of the Army Language School, later the Defense Language Institute, in Monterey, California. Graduating from the Turkish language class in 1948, Holmes spent a career in the Army, which likely included more than a few intelligence-related assignments. Typically, U.S. military officers conversant in Turkish served with either the Defense Intelligence Agency or the Central Intelligence Agency at either the U.S. embassy in Ankara or the Consulate General in Istanbul, or both.

Terrence Sejnowski, the Francis Crick Professor at the Salk Institute for Biological Studies and the director of the Computational Neurobiology Laboratory, in an interview with Cognitive Science Online in 2008, had the following comment about recent studies of the human brain: “Alan Newell [cognitive psychology researcher at the intelligence community-linked RAND Corporation] once said that when AI [artificial intelligence] was founded not enough was known about the brain to be of any help and in the early 1980s, symbol processing was the only game in town. That has changed and we now know a lot about the brain, perhaps more than we need to know [emphasis added].”

More than we need to know!

The links between the younger and elder Holmes and U.S. government research on creating super-soldiers, human brain-machine interfaces, and human-like robots beg the question: “Was James Holmes engaged in a real-life Jason Bourne TREADSTONE project that broke down and resulted in deadly consequences in Aurora, Colorado?” In any event, if the Batman movies are now serving as a newer version of J.D. Salinger’s Catcher in the Rye subliminal messaging triggering mechanism, — Salinger’s novel was of interest to a number of American political assassins — keep in mind that August 10 is the opening date of The Bourne Legacy. It may be wise to skip that film in the theater for a while.

Copyright 2012 Wayne Madsen Report

SOURCE: RedDirtReport.com

The Sad Reality of the Milk & Dairy Industry

The Sad Reality of the Milk & Dairy Industry

You’ve got something that I want… and you won’t believe the things I’ll do to get it!

Website – www.oppressthis.com
Facebook – https://www.facebook.com/pages/oppressTHIS-Shell123ey/169801543075368?ref=ts
Twitter – http://twitter.com/#!/oppressTHIS

To put it simply..

There is a room, with a wall running down the middle, dividing it into two.

On one side of the room, there is a girl with a button… she pushes it a lot, because it’s always been there, and she sees no harm in it.

On the other side of the divide, is a girl in chains, and every time the button is pushed, she receives an electric shock through the chains.

It’s excruciating.

MY VIDEO SMASHES THE WALL BETWEEN THE TORTURER AND THE TORTURED.

And now the torturer can see what she’s been doing.

Her actions are connected to the consequences.

It’s now time for her to make INFORMED DECISIONS.

CONSUMER EMPOWERMENT, BABY!

Mexican Official: CIA ‘Manages’ Drug Trade

Mexican Official: CIA ‘Manages’ Drug Trade

Juarez, Mexico– The US Central Intelligence Agency and other international security forces “don’t fight drug traffickers”, a spokesman for the Chihuahua state government in northern Mexico has told Al Jazeera, instead “they try to manage the drug trade”.Allegations about official complicity in the drug business are nothing new when they come from activists, professors, campaigners or even former officials. However, an official spokesman for the authorities in one of Mexico’s most violent states – one which directly borders Texas – going on the record with such accusations is unique.

“It’s like pest control companies, they only control,” Guillermo Terrazas Villanueva, the Chihuahua spokesman, told Al Jazeera last month at his office in Juarez. “If you finish off the pests, you are out of a job. If they finish the drug business, they finish their jobs.”

A spokesman for the CIA in Washington wouldn’t comment on the accusations directly, instead he referred Al Jazeera to an official website.

Accusations are ‘baloney’

Villanueva is not a high ranking official and his views do not represent Mexico’s foreign policy establishment. Other more senior officials in Chihuahua State, including the mayor of Juarez, dismissed the claims as “baloney”.

“I think the CIA and DEA [US Drug Enforcement Agency] are on the same side as us in fighting drug gangs,” Hector Murguia, the mayor of Juarez, told Al Jazeera during an interview inside his SUV. “We have excellent collaboration with the US.”

Under the Merida Initiative, the US Congress has approved more than $1.4bn in drug war aid for Mexico, providing attack helicopters, weapons and training for police and judges.

More than 55,000 people have died in drug related violence in Mexico since December 2006. Privately, residents and officials across Mexico’s political spectrum often blame the lethal cocktail of US drug consumption and the flow of high-powered weapons smuggled south of the border for causing much of the carnage.

Drug war ‘illusions’

“The war on drugs is an illusion,” Hugo Almada Mireles, professor at the Autonomous University of Juarez and author of several books, told Al Jazeera. “It’s a reason to intervene in Latin America.”

“The CIA wants to control the population; they don’t want to stop arms trafficking to Mexico, look at [Operation] Fast and Furious,” he said, referencing a botched US exercise where automatic weapons were sold to criminals in the hope that security forces could trace where the guns ended up.

The Bureau of Alcohol Tobacco and Firearms lost track of 1,700 guns as part of the operation, including an AK-47 used in 2010 the murder of Brian Terry, a Customs and Border Protection Agent.

Blaming the gringos for Mexico’s problems has been a popular sport south of the Rio Grande ever since the Mexican-American war of the 1840s, when the US conquered most of present day California, Utah, Nevada, Arizona and New Mexico from its southern neighbour. But operations such as Fast and Furious show that reality can be stranger than fiction when it comes to the drug war and relations between the US and Mexico. If the case hadn’t been proven, the idea that US agents were actively putting weapons into the hands of Mexican gangsters would sound absurd to many.

‘Conspiracy theories’

“I think it’s easy to become cynical about American and other countries’ involvement in Latin America around drugs,” Kevin Sabet, a former senior adviser to the White House on drug control policy, told Al Jazeera. “Statements [accusing the CIA of managing the drug trade] should be backed up with evidence… I don’t put much stake in it.”

Villanueva’s accusations “might be a way to get some attention to his region, which is understandable but not productive or grounded in reality”, Sabet said. “We have sort of ‘been there done that’ with CIA conspiracy theories.”

In 1996, the San Jose Mercury News published Dark Alliance, a series of investigative reports linking CIA missions in Nicaragua with the explosion of crack cocaine consumption in America’s ghettos.

In order to fund Contra rebels fighting Nicaragua’s socialist government, the CIA partnered with Colombian cartels to move drugs into Los Angeles, sending profits back to Central America, the series alleged.

“There is no question in my mind that people affiliated with, or on the payroll of, the CIA were involved in drug trafficking,” US Senator John Kerry said at the time, in response to the series.

Other newspapers, including the Washington Post and the Los Angeles Times, slammed Dark Alliance, and the editor of the Mercury News eventually wrote that the paper had over-stated some elements in the story and made mistakes in the journalistic process, but that he stood by many of the key conclusions.

Widespread rumours

US government has neglected border corruption

“It’s true, they want to control it,” a mid-level official with the Secretariat Gobernacion in Juarez, Mexico’s equivalent to the US Department of Homeland Security, told Al Jazeera of the CIA and DEA’s policing of the drug trade. The officer, speaking on the condition of anonymity, said he knew the allegations to be correct, based on discussions he had with US officials working in Juarez.

Acceptance of these claims within some elements of Mexico’s government and security services shows the difficulty in pursuing effective international action against the drug trade.

Jesús Zambada Niebla, a leading trafficker from the Sinaloa cartel currently awaiting trial in Chicago, has said he was working for the US Drug Enforcement Agency during his days as a trafficker, and was promised immunity from prosecution.

“Under that agreement, the Sinaloa Cartel under the leadership of [Jesus Zambada’s] father, Ismael Zambada and ‘Chapo’ Guzmán were given carte blanche to continue to smuggle tonnes of illicit drugs… into… the United States, and were protected by the United States government from arrest and prosecution in return for providing information against rival cartels,” Zambada’s lawyers wrote as part of his defence. “Indeed, the Unites States government agents aided the leaders of the Sinaloa Cartel.”

The Sinaloa cartel is Mexico’s oldest and most powerful trafficking organisation, and some analysts believe security forces in the US and Mexico favour the group over its rivals.

Joaquin “El Chapo”, the cartel’s billionaire leader and one of the world’s most wanted men, escaped from a Mexican prison in 2001 by sneaking into a laundry truck – likely with collaboration from guards – further stoking rumours that leading traffickers have complicit friends in high places.

“It would be easy for the Mexican army to capture El Chapo,” Mireles said. “But this is not the objective.” He thinks the authorities on both sides of the border are happy to have El Chapo on the loose, as his cartel is easier to manage and his drug money is recycled back into the broader economy. Other analysts consider this viewpoint a conspiracy theory and blame ineptitude and low level corruption for El Chapo’s escape, rather than a broader plan from government agencies.

Political changes

In Depth
More from Mexico’s drug war
Cartels cast shadow over
Mexico polls
Dirty money thrives despite
Mexico drug war
As PRI wins, Mexico looks
forward to its past
Mexicans make beeline
for ‘bandit saint’
US-trained cartel terrorises
Mexico

After an election hit by reported irregularities, Enrique Pena Nieto from the Institutional Revolutionary Party (PRI) is set to be sworn in as Mexico’s president on December 1.

He wants to open a high-level dialogue with the US about the drug war, but has said legalisation of some drugs is not an option. Some hardliners in the US worry that Nieto will make a deal with some cartels, in order to reduce violence.

“I am hopeful that he will not return to the PRI party of the past which was corrupt and had a history of turning a blind eye to the drug cartels,” said Michael McCaul, a Republican Congressman from Texas.

Regardless of what position a new administration takes in order to calm the violence and restore order, it is likely many Mexicans – including government officials such as Chihuahua spokesman Guillermo Villanueva – will believe outside forces want the drug trade to continue.

The widespread view linking the CIA to the drug trade – whether or not the allegations are true – speaks volumes about officials’ mutual mistrust amid ongoing killings and the destruction of civic life in Mexico.

“We have good soldiers and policemen,” Villanueva said. “But you won’t resolve this problem with bullets. We need education and jobs.”

Follow Chris Arsenault on Twitter: @AJEchris

Source:

 

Why Didn’t Anyone Fight Back? Questions Linger Over James Holmes Batman Movie Theater Shooting

Why Didn’t Anyone Fight Back? Questions Linger Over James Holmes Batman Movie Theater Shooting

One of the most shocking realization emerging from the James Holmes Batman movie shooting rampage in Aurora, Colorado is the fact that nobody apparently tried to stop the shooter. This is absolutely baffling. Out of at least 70 moviegoers (and maybe more, as numbers remain sketchy at the moment), it appears that nobody tried to tackle him to the ground, shoot back with their own gun, or even fight back in any way whatsoever. The accounts of witnesses are those of people fleeing, ducking and screaming… but not fighting for their lives.

This story is in no way intended to blame those present at the theater for what was obviously a horrifying, shocking and probably very confusing event, but at the same time we must ask the question: Why did no one fight back?

See my previous story, by the way, which asks other questions about this shooting, such as where did Holmes get the training and the funds to build a complex maze of flammable booby-traps? That story is available at:
http://www.naturalnews.com/036536_James_Holmes_shooting_false_flag.ht…

“There were bullet [casings] just falling on my head. They were burning my forehead,” Jennifer Seeger told reporters in an LA Times article (http://latimesblogs.latimes.com/lanow/2012/07/colorado-shooting-suspe…). “Every few seconds it was just: Boom, boom, boom,” she said. “He would reload and shoot and anyone who would try to leave would just get killed.”

Another bizarre quote appears in the Daily Mail: (http://www.dailymail.co.uk/news/article-2176450/The-Dark-Knight-Rises…)

A baby was shot at point blank range, the family were gathered around screaming.

Huh?

If the baby was shot at point blank range, that means the shooter was right there beside them. Instead of gathering around and screaming, why didn’t the family tackle the shooter?

This is not any sort of insensitive attempt at satire or blaming anyone, by the way. This is purely an effort to ask a deeply disturbing question that has been bothering me ever since this whole thing went down:

How can a lone gunman fire off at least 100 rounds in a crowded theater full of people and have NOBODY fight back, shoot back or attempt to tackle him?

The guy literally walked in, tossed a couple of smoke bombs, started shooting everybody in sight, and for some reason that remains entire unexplained, they let him do it. When he finished, he walked out the door and calmly surrendered to police, mission accomplished. He was never shot at, stabbed, kicked, punched, tripped or attacked in any way whatsoever, apparently.

It would have taken at least two full minutes to carry out the attack

Importantly, this shooting had to have taken several minutes to carry out. To fire 100+ rounds of ammunition from any weapon requires multiple reloads, each of which takes several seconds to carry out. There would have been long pauses in the shooting. There has even been a report that the AR-15 rifle used by the shooter jammed, which would have created an even longer pause.

These pauses are opportunities to bum rush the guy, or shoot back, or throw something at him, or just punch him right in the jaw with everything you’ve got. Holding a gun does not make you invincible. If anything, it makes you very, very vulnerable to all sorts of attacks. As I learned in my own defensive training, often alongside peace officers:

• Nobody has eyes in the back of their head. Attacks from behind are very, very effective.

• A gun only points in one direction at a time. It cannot shoot backwards, behind the person holding it.

• A gas mask SEVERELY limits angle of perception of vision. Someone wearing a gas mask, as is reported in this incident, is ridiculously vulnerable to attacks from behind, from above, from the sides and from below.

• No man can ignore a deliberate knee to the groin (from the front), or a “kickball” kick to the groin from behind. Such moves are taught in martial arts such as Krav Maga, and they are very, very effective at bringing any man to his knees, either screaming or even vomiting in pain.

• At close range, guns are LESS dangerous than knives. A knife can cut along an entire geometric plane, but a gun can only fire at a single point in space. Guns jam, guns run out of ammo, guns need to be reloaded. A knife, on the other hand, has none of these limitations. Disarming someone with a gun is MUCH easier than disarming someone with a knife.

Something doesn’t add up

It is bewildering that during the several minutes it would have taken for Holmes to fire 100+ rounds into the crowd, nobody fought back.

Again, I’m not blaming the people there, I’m just bewildered that nobody fought back. It doesn’t make sense. Unless, of course, the very fabric of American culture is now so passive and afraid that people have forgotten how to take action in the face of fear.

I think I speak for a great many concealed carry permit holders when I say that if I had been in that theater, I would have been emptying magazines in the direction of the threat (i.e. putting sights on target and repeatedly pulling the trigger). Like many concealed carry weapon holders, I would have turned that scene into what we sometimes jokingly call a “two-way range.”

Like all other concealed carry holders, I am reluctant to ever draw a weapon on anyone, but I’m absolutely willing to do so in order to try to stop a massacre from taking place.

What I can’t understand is how apparently NOBODY in the entire theater had the training or the presence of mind to fight back. This is truly astonishing at every level. In America today, do people just lay down to die when there’s a gunman in the room? I’m not asking this to be insulting in any way, I’m simply bewildered by the lack of action. This is an honest question: WHY did no one act?

Shattering myths: Guys with guns can be physically assaulted, even if you’re unarmed

Here’s a news flash for those who have never trained in these scenarios: Guys wielding guns are very, very easy to disarm during reloads — far easier than trying to disarm someone with a knife, as mentioned earlier. “Weapon takeaways” are routinely taught in Krav Maga, for example, and they are fast and effect, usually breaking the bad guy’s trigger finger in the process.

Taking away a weapon from a gunman is surprisingly easy. Forcing him to the ground takes almost no effort at all. This shooter could have been easily disarmed and pummeled to the ground by a single person, not to mention two or three working together.

Instead, the only reports we get from this incident are those of people screaming and hiding, or sometimes fleeing. To my knowledge, there are no eyewitness accounts of anyone rushing the gunman, shooting back, or trying to even trip him to fall on the floor. And yet empty shell casings were literally falling right onto people within arms’ reach of the guy.

As the Daily Mail reports: (http://www.dailymail.co.uk/news/article-2176450/The-Dark-Knight-Rises…)

Twenty-five-year-old Jennifer Seeger, of Aurora, says she was in the second row, about four feet from the gunman. She says she ‘was just a deer in headlights’ and ducked to the ground.

Tactically speaking, there is absolutely no way that one person can shoot 70 people unless those 70 people just lay there and let it happen. To shoot 70 people, the guy must have pulled the trigger at least 100 times, probably a lot more, as accuracy in these situations is usually quite poor. Most likely we’re going to find up to 200 rounds expended, once a final forensic count is completed.

News reports say he used as 90-round ammo “drum” for the AR-15. These drums are notoriously bad at feeding ammo, making them useless on the battlefield, which is why soldiers never use them on their personal AR-15s (they use 30-round mags). According to reports, Holmes’ AR-15 drum jammed during the shooting (no surprise) and he had to abandon that weapon and start using something else. All this would have taken time for him to sort out, during which the shooter is completely vulnerable to all sorts of grappling attacks, punches, kicks to the groin, eye gouges, weapon takeaways, etc.

Yet, strangely, nobody rushed the guy. Nobody shot back. Nobody tried to punch him. I honestly don’t understand this.

A culture of passive victims

It occurs to me that maybe I’m different from most Americans today in the fact that I am willing to fight back. For some reason, that seems to be a rarity these days. Too many people have bought into learned helplessness, where they depend on the government to take care of them, keep them safe and solve all their problems.

Once you outsource your personal security to the government — usually by having no defense skills and hoping 911 will respond quickly — you make yourself an easy victim for violent criminals.

The true path to personal safety and security is to learn how to protect yourself and your loved ones. There are many ways to do that, from basic hand-to-hand combat and martial arts skills to learning proficiency in the “American martial art” of hand-gunning. I’ve personally trained with numerous instructors who could have taken Holmes out from 20 – 30 meters away with a single shot to the head, with about 90% accuracy even under pressure. There are lots of proficient firearms owners across America, and a great many of them are carrying those weapons into movie theaters, shopping malls, retail stores and even at the airport. Why was no one carrying a concealed weapon at the Batman movie theater in Aurora? I have no idea.

Again, it’s difficult to second guess what really went down there with all the confusion, the screaming, the smoke and so on. Maybe there were concealed carry weapon holders in the room but they couldn’t get a clear shot. One thing concealed carry holders are always taught is to never shoot at a bad guy if there are innocent civilians behind him. (You’re always trained to know what’s BEHIND your target.) This might have made target acquisition difficult, but given the reality of what was unfolding, it would seem logical to pull the trigger anyway, as allowing the shooter to stand would clearly result in a great number of additional deaths.

Also, there is the distinct possibility that perhaps someone did pull a gun on Holmes, but they got shot by him first. We don’t know the real story on this until more information is released by investigators. So perhaps there was someone who had the courage to fight back and we just haven’t learned about them yet.

What we do know, so far at least, is that no stories of attempted heroism have emerged. Not a single account that I’m aware of, and I’ve been scanning the stories. This is very, very strange. Something doesn’t add up yet again.

Is American culture now one of total surrender?

What I’m starting to think really happened is that the American culture is becoming one of total surrender to criminals. Why do people line up at the airports and allow the TSA go grope their genitals? Because they’re passive and they’ve surrendered instead of fighting back. Why do stay silent when runaway criminality is happening all around them in the form of armed raids on raw milk farmers (http://www.naturalnews.com/033220_Rawesome_Foods_armed_raids.html) and government hit squads trying to kill farmers’ ranch pigs in Michigan? (http://www.naturalnews.com/035585_Michigan_farms_raids.html) Because people are scared into silence.

Americans, it turns out, are easy to terrorize. They’re easy to freeze into a state of fear-based non-action. That fear can and will be used against them, again and again. Look at the post 9/11 effort to crush freedom and destroy the Bill of Rights. It succeeded because Americans were terrorized and willing to give up all their liberties for the false promise of a little security.

The police cannot protect you

This is concerning for lots of reasons beyond the Batman shooting. It means the population is just cannon fodder for armed gangs of looters when the next collapse comes, and the debt spending of the U.S. government absolutely guarantees a financial collapse is just around the corner. (It’s only a matter of time.)

It’s beginning to look more and more like only those of us who have the natural instinct to fight back — and who are willing to acquire fundamental skills of personal defense — will be left standing in the long run. Even those of us who have such skills will need to be both well practiced and, to some extent, lucky. But luck has a way of bending your way when you’re prepared, I’ve noticed.

I hope YOU, the readers, are among those of us who are survivors. We need more good people to survive and help lead our nation into a future of liberty, abundance and lasting health. We need more good people to survive social unrest, the aftermath of natural disasters, the coming economic collapse, food shortages, roving bands of armed gangs and so on. If anything, right now is a time for more people to go out and get trained on personal defense, whether that’s with martial arts, rape prevention classes, or even quality firearms training.

It should hopefully be obvious at this point that the police cannot protect you. Calling 911 is about as useless as crossing your fingers and hoping you won’t die. And that’s even if 911 answers, because 911 services are easily taken offline even by wind storms (as we saw recently in Washington D.C.). If you cannot protect yourself and your family, you’re not ready for what’s coming, I believe. Get prepared. Get some skills. Practice to the point of proficiency. Decide to survive rather than surrendering to violence.

Much of this, after all, is simply a mental decision. I have no idea why that mental decision did not take place inside the Batman movie theater, but I know that you and I can make that decision right now — the decision to SURVIVE — and we can move forward in life with the strength and power of sticking with that decision.

SOURCE: NaturalNews.com

Hate Drones, Love Privacy? Manufacturer Douglas McDonalad Says You’re A Criminal

 

“If you’re concerned about it, maybe there’s a reason we should be flying over you, right?” said Douglas McDonald, the company’s director of special operations and president of a local chapter of the unmanned vehicle trade group.

LAKOTA, N.D. – The use of unmanned aerial drones, whose deadly accuracy helped revolutionize modern warfare high above the battlefields of Iraq and Afghanistan, is now spreading intrigue and worry across the plains of North Dakota.

airforce_drone_groundedAmid 3,000 acres of corn and soybeans and miles from the closest town, a Predator drone led to the arrests of farmer Rodney Brossart and five members of his family last year after a dispute over a neighbor’s six lost cows on his property escalated into a 16-hour standoff with police.

It is one of the first reported cases in the nation where an unmanned drone was used to assist in the arrest of a U.S. citizen on his own property; and a controversial sign of how drones, in all shapes, sizes and missions, are beginning to hover over American skies.

Far from just the menacing aircraft bearing Hellfire Missiles and infrared cameras from combat, Unmanned Aerial Systems, the preferred term in the industry, now include products so small they fit in the palm of your hand and can look as innocent as remote-controlled hobby airplanes.

They can quickly scout rural areas for lost children, identify hot spots in forest fires before they get out of control, monitor field crops before they wither or allow paparazzi new ways to target celebrities. The government has predicted that as many as 30,000 drones will be flying over U.S. skies by the end of the decade.

But can drones fly in domestic airspace without crashing into an airplane? Can they be used in a way that doesn’t invade privacy? Who’s watching the drone operators — and how closely?

“All the pieces appear to be lining up for the eventual introduction of routine aerial surveillance in American life — a development that would profoundly change the character of public life in the United States,” the American Civil Liberties Union warned in a policy paper on drones last year titled, “Protecting Privacy From Aerial Surveillance.”

In the North Dakota case, fearing that the Brossarts had armed themselves, local law enforcement asked for the assist from the Predator — unarmed but otherwise identical to the ones used in combat — that’s stationed at Grand Forks Air Force Base as a SWAT team converged on the property.

It put Rodney Brossart front and center in the debate over the burgeoning use of domestic drones, and the threat they may represent when authorities are given the ability to watch everything from above.

“I’m not going to sit back and do nothing,” Brossart said recently, sitting in the shade outside his small house where farm equipment, trailers and the top half of a school bus sit in the yard in various states of disrepair. As drone use expands nationwide, he’s worried. “I don’t know what to expect because of what we’ve seen.”

Groups from the Electronic Privacy Information Center to the American Library Association have joined to raise concerns with the Federal Aviation Administration about the implications of opening up U.S. air space to drones, as have Reps. Edward Markey and Joe Barton, co-chairs of the Congressional Bi-Partisan Privacy Caucus.

But the federal government already has been quietly expanding their use in U.S. air space. Even as the wars abroad wind to an end, the military has been pleading for funding for more pilots. Drones cannot be flown now in the United States without FAA approval. But with little public scrutiny, the FAA already has issued at least 266 active testing permits for domestic drone operations, amid safety concerns. Statistics show unmanned aircraft have an accident rate seven times higher than general aviation and 353 times higher than commercial aviation.

Under political and commercial pressure, the Obama administration has ordered the FAA to develop new rules for expanding the use of small drones domestically. By 2015, drones will have access to U.S. airspace currently reserved for piloted aircraft.

“Think about it; they are inscrutable, flying, intelligent,” said Ryan Calo, the director of privacy and robotics for the Center for Internet and Society at Stanford Law School. “They are really very difficult for the human mind to cleanly characterize.”

While drone use in the rest of the country has been largely theoretical, here in eastern North Dakota it is becoming a way of life.

Drivers on Hwy. 2 near the Grand Forks base say they often see the U.S. Customs Predator B (the B indicates it is unarmed) practicing “touch and go” landings in the morning. A local sheriff’s deputy talked of looking up from writing reports in his patrol car one night to see a drone quietly hovering over him. Don “Bama” Nance, who spent 20 years in the Air Force before retiring to Emerado, now cuts the grass on the base golf course.

“They’re always overhead on the third hole,” he said.

The Grand Forks base has been flying drones sine 2005, when it switched missions from flying tankers to unmanned aerial systems. So, too, have the storied Happy Hooligans of the North Dakota Air National Guard, which has flown drone missions in Iraq and Afghanistan from its base in Fargo.

And use is growing. Predators operated by Customs and Border Patrol completed more than 30 hours of flight in 2009 and more than 55 hours in 2010, mapping the flooded Red River Valley areas of North Dakota and Minnesota. In 2011, the Predator B flew close to 250 hours in disaster relief support along the northern border.

The Grand Forks base, which now has two Predators flying, expects to have as many as 15 Northrop Grumman Global Hawks and six to eight General Atomics Predators/Reapers. That will add an additional 907 Air Force personnel to the base.

For this wide swath of eastern North Dakota, that is part of the appeal: jobs. The University of North Dakota has eagerly partnered with the military and defense contractors, and often operating behind locked doors and secrecy, university officials are working to make the area a hub of unmanned aircraft activity. The state has invested an estimated $12.5 million to make it happen. The local Economic Development Corporation has added a drone coordinator in charge of recruiting more companies to join the 16 drone-related ones that have already set up shop.

“Where aviation was in 1925, that’s where we are today with unmanned aerial vehicles,” said Al Palmer, director of UND’s Center for Unmanned Aircraft Systems Research, Education and Training. “The possibilities are endless.”

A new major

The University of North Dakota operates a fleet of seven different types of unmanned aircraft. In 2009, it became the first college in the country to offer a four-year degree in unmanned aircraft piloting. It now has 23 graduates and 84 students majoring in the program, which is open only to U.S. citizens.

It works with Northland Community College in Thief River Falls, Minn., which developed the first drone maintenance training center in the country and proudly shows off its own full-size Global Hawk.

The university also serves as an incubator for companies that might want to expand the industry. In five days, Unmanned Applications Institute International, which provides training in operating drones, can teach a cop how to use a drone the size of a bathtub toy.

“If you’re concerned about it, maybe there’s a reason we should be flying over you, right?” said Douglas McDonald, the company’s director of special operations and president of a local chapter of the unmanned vehicle trade group. “But as soon as you lose your kid, get your car stolen or have marijuana growing out at your lake place that’s not yours, you’d probably want one of those flying overhead.”

Earlier this year, the Grand Forks Sheriff’s Department was provided its own drone by the university for $1 as part of a project to develop policies and procedures for law enforcement.

“We are not out there to abuse people’s rights, but at the same time we’re out there to protect public safety,” said Grand Forks Sheriff Robert Rost. “The public perception is that Big Brother is going to be snooping on them and that is not the case at all. It will not be misused.”

Still, not everyone is enthusiastic about drones. The Air Force has proposed expanding seven additional nautical miles of restricted air space near Devils Lake to conduct laser training with drones. Of the 43 public comments on the proposal, 42 opposed it, largely out of safety concerns and fears that it would interfere with commercial and general aviation. Nevertheless, the FAA approved the airspace expansion late last month.

Between the base and Grand Forks, Arnie Sevigny flies his own silent drone protest: a raggedy kite shaped like a jet fighter whipping in the wind 100 feet in the air and tied down with a stake on his property a few miles from the base. “No camera. No invasion of privacy,” Sevigny joked. “What do you need a drone for anyhow? They use the satellites they already have to see the head of a dime in your hand.”

And for all the assurances, there is much that isn’t said or revealed. Some of the equipment used by the university can’t be seen by the public because of federal privacy rules. Although legal, anyone photographing outside the base can find themselves being questioned by county, state and Air Force law enforcement. When asked how many times U.S. Border Protection has dispatched drones at the request of local police, a spokeswoman for the agency said it does not keep those figures.

Even Brossart doesn’t know what the drone that led to his family’s arrests saw. Despite demands made in court, the Predator’s footage has not been produced to his attorneys. “They don’t want to show what happened,” he said, “because it will show exactly what they did.”

A judge is expected to rule within days on whether the charges against Brossart, who has had a number of run-ins with authorities over the years, should be dismissed, in part, because the warrantless use of the “spy plane” was part of a pattern of outrageous government conduct that violated Brossart’s Fourth Amendment rights.

With case law murky on the domestic use of drones, Brossart’s attorney, Bruce Quick, said the courts, Congress and state legislatures will likely have to address the issue. “It’s not just criminal defense attorneys. It’s just people concerned about civil liberties in general,” he said. “I don’t think a lot of us like the idea of our privacy being given away.”

Mark Brunswick • 612-673-4434

SOURCE: StarTribune.com

Batman Shooting Foretold In 1986 “Dark Knight” Comic

Batman Shooting Foretold In 1986 “Dark Knight” Comic

Here we go again. There’s going to be a lot of speculation regarding this Batman movie shooting. It fits too perfectly into their gun control agenda build up of late for it not to be staged but we’ll have to see. But already we’re seeing the same pattern of foreshadowing and predictive programming.

If you want a real hint, this report just showed up in the Washington Times of all things. They’re of course insinuating it was possibly the inspiration for the shooter. We’ll be learning more about him quickly but from his disturbed profile he sure seems to fit the usual mind control pattern.

What is strange is how prevalent this comic-type illustration predictive propaganda is with these false flag events.

Here’s the newspaper story:

The horrific shooting at the screening of The Dark Knight Rises in Colorado late last night bears eerie similarities to a scene in the 1986 comic Batman: The Dark Knight Returns. In the comic, a crazed, gun-toting loner walks into a movie theater and begins shooting it up, killing three in the process. The passage concludes with the media blaming Batman for inspiring the shooting, though he is not involved in the incident at all.

The 1986 comic, written and drawn by Frank Miller, was a key inspiration for the Chris Nolan Batman films. It helped to reimagine the character away from his Saturday morning cartoon image and into a dark, grim avenger. The point of this particular scene in the comic was to show just how far Gotham has fallen since Batman had retired.  Source

Predictive Programming

The Illuminati card game was invented way before any of the above depicted events. A strange phenomenon indeed. We don’t know what is behind these incredibly prescient depictions but it isn’t the only instance of these kinds of illustrations, apparently done or or inspired by insiders. (This is just a sampling, there are many more cards, a very interesting study.)

In 1990 an Illuminati Card Game was invented by Steven Jackson. The ’game’ he had created ruffled quite a few feathers as he was promptly visited by the Secret Service who tried to shut him down and prevent the cards from being released. You can read Jacksons own account of the raid Here.

  Apparently Jackson must have either had some type of insider knowledge or the foresight of Nostrodumus because the game he created has turned out to be very close to the real thing. Several of the cards depict events in modern history that either have, or soon will occur, including the attacks on the World Trade Center and Pentagon. Source

 

 

More At: ZenGardner.com

Colorado Batman Incident Facts: Lone Gunman or False Flag?

Colorado Batman Incident Facts: Lone Gunman or False Flag?

James Holmes, the Aurora, Colorado shooter who reportedly opened fire at a Batman movie premiere, was a medical student at the University of Colorado, pursuing a PhD in neuroscience, reports ABC News. (http://abcnews.go.com/US/mass-shooting-colorado-movie-theater-14-peop…)

As part of the attack, Holmes painted his hair red and referred to himself as “The Joker,” one of the arch enemies in the DC Comics-inspired Batman movie series. (http://newyork.cbslocal.com/2012/07/20/police-14-dead-in-colorado-the…)

According to news reports, this sudden violent rampage was completely out of character for James Holmes, who was described as “shy.”

The New York Times is now reporting:
Billy Kromka, a pre-med student at the University of Colorado, Boulder, worked with Mr. Holmes for three months last summer as a research assistant in a lab of at the Anschutz Medical Campus. Mr. Kromka said he was surprised to learn Mr. Holmes was the shooting suspect. “It was just shocking, because there was no way I thought he could have the capacity to do commit an atrocity like this,” he said. (http://www.nytimes.com/2012/07/21/us/colorado-mall-shooting.html?page…)

“He spent much of his time immersed in the computer, often participating in role-playing online games…”

There is already conjecture that James Holmes may have been involved in mind-altering neuroscience research and ended up becoming involved at a depth he never anticipated. His actions clearly show a strange detachment from reality, indicating he was not in his right mind. That can only typically be accomplished through drugs, hypnosis or trauma (and sometimes all three).

His behavior doesn’t add up

His behavior already reveals stark inconsistencies that question the mainstream explanation of events. For example, he opened fire on innocent people but then calmly surrendered to police without resistance. This is not consistent with the idea of “killing everyone.”

Furthermore, he then admitted to police that his apartment was booby-trapped with explosives. If you were really an evil-minded Joker trying to kill people (including cops), why would you warn them about the booby trap in advance? It doesn’t add up.

“Holmes was taken into custody shortly after the shooting, police said, adding he didn’t resist when he was arrested,” reports a local CBS news affiliate (http://newyork.cbslocal.com/2012/07/20/police-14-dead-in-colorado-the…).

“After his arrest, Holmes told police about ‘possible explosives in his residence,’ Oates said. When police searched his apartment, they discovered it was booby-trapped and evacuated surrounding buildings, police said. Oates said bomb technicians are determining how to disarm flammable or explosive material in the third-floor apartment. He said police could be there some time.”

None of this checks out. If you’re a killer bent on causing mayhem, why tell the police about your surprise bomb waiting for them back at your apartment?

Holmes was clearly provided with exotic gear

Continuing from CBS:

“He said pictures from inside the apartment are fairly disturbing and the devices look to be sophisticated, adding the booby-traps were ‘something I’ve never seen.’ One rifle, two handguns, a knife, a bullet proof vest, a ballistic helmet, a gas device, a gas mask, military SWAT clothing and unidentified explosives were also found in Holmes’ car, a law enforcement source told CBS News. Oates said Holmes wore a gas mask, a ballistic helmet and vest as well as leg, groin and throat protectors during the shooting.”

In other words, this guy was equipped with exotic gear by someone with connections to military equipment. SWAT clothing, explosives, complex booby-traps… c’mon, this isn’t a “lone gunman.” This is somebody who was selected for a mission, given equipment to carry it out, then somehow brainwashed into getting it done.

“Aurora Police Chief Dan Oates said Holmes’ apartment is booby-trapped with a ‘sophisticated’ maze of flammable devices. It could take hours or days for authorities to disarm it,” reports Yahoo News (http://sg.sports.yahoo.com/blogs/lookout/suspect-neuroscience-phd-stu…).

UPDATE: (This section added to the story Saturday at 2:30 pm central, July 21, 2012). It is now being reported that exotic, advanced booby-traps have been disarmed at the apartment of James Holmes. The Denver affiliate of CBS News is now reporting: (http://denver.cbslocal.com/2012/07/21/officials-expect-explosions-as-…)

Officials say they have removed all major threats at the booby-trapped apartment of the Aurora movie theater shooting suspect on Saturday. They have used a robot to go inside James Holmes’ apartment. …They were able to disable a trip wire that was set to go off when the apartment door was opened. “This is some serious stuff that our team is dealing with…”

Shortly before noon crews were successful performing a controlled detonation… More controlled detonations were possible.

…there were multiple trip wires throughout the apartment. Investigators have also seen what appear to be mortars planted in the apartment — sort of the kind of mortars that might be seen in a commercial fireworks show. Up to a half dozen of them are scattered around.

…they have seen a number of inflated balloons in the apartment… with many appearing to be filled with a powder. Also linked together are bottles of liquid. …a strong smell of gasoline emanating from the apartment.

…several boxes on top of the refrigerator and there are lights flashing on the boxes.

…30 aerial shells (fireworks) commercially legally available for purchase. …the suspect may have filled them with smokeless powder. …entering the apartment would have caused a trip wire to trigger one liquid container to pour/mix with another. When the two mix together, they set off the main charge of the device which may be additional flammable liquids.

…an enormously dangerous mission. About 100 personnel are on scene.

And the BBC is now reporting: (http://www.bbc.co.uk/news/world-us-canada-18937726)

Technicians made a first attempt on Friday to disarm the traps, believed to include explosives, but withdrew when it became clear the property was too dangerous to enter. Sgt Carlson said the device was set up to detonate when the first person entered the flat. “We’ve defeated first threat. It was set up to kill, and that could have been police officers or anything,” she said.

FBI has a track record of staging similar assaults, then stopping them at the last minute

This is not your run-of-the-mill crime of passion. It was a carefully planned, heavily funded and technically advanced attack. Who might be behind all this? The FBI, of course, which has a long history of setting up and staging similar attacks, then stopping them right before they happen. See four documented stories on these facts:

http://www.naturalnews.com/035849_domestic_terror_plots_FBI.html
http://www.naturalnews.com/034325_FBI_entrapment_terror_plots.html
http://www.naturalnews.com/033751_FBI_terrorism.html
http://www.naturalnews.com/035757_FBI_terror_plots_false_flag.html

As you soak all this in, remember that the FBI had admitted to setting up terror plots, providing the weapons and gear, staging the location of the bombings and even driving the vehicles to pull it off! This is not a conspiracy theory, it’s been admitted by the FBI right out in the open. Even the New York Times openly reports all this in stories like this one:

NYT: Terrorist Plots, Hatched by the F.B.I. (http://www.nytimes.com/2012/04/29/opinion/sunday/terrorist-plots-help…)

THE United States has been narrowly saved from lethal terrorist plots in recent years — or so it has seemed. A would-be suicide bomber was intercepted on his way to the Capitol; a scheme to bomb synagogues and shoot Stinger missiles at military aircraft was developed by men in Newburgh, N.Y.; and a fanciful idea to fly explosive-laden model planes into the Pentagon and the Capitol was hatched in Massachusetts. But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. …the F.B.I. provided a van loaded with six 55-gallon drums of “inert material,” harmless blasting caps, a detonator cord and a gallon of diesel fuel to make the van smell flammable. An undercover F.B.I. agent even did the driving…

Mystery man Holmes has no background

On top of all this, Holmes apparently has no background. “He’s not on anybody’s radar screen — nothing,” said a peace officer in a NYT article. “This guy is somewhat of an enigma. Nobody knows anything about him.” (http://www.nytimes.com/2012/07/21/us/colorado-mall-shooting.html)

Mr. Holmes’s only criminal history is a traffic summons, the authorities said. He earned a bachelor’s degree with honors in neuroscience in 2010 from the University of California, Riverside, and was a graduate student in neurosciences at the University of Colorado at Denver’s Anschutz Medical Campus… He was currently collecting unemployment…

Question: How does an unemployed medical student afford $20,000 in weapons gear?

If you start to look at the really big picture here, the obvious question arises: How does an unemployed medical student afford all the complex weapons gear, bomb-making gear, “flammable” booby trap devices, ammunition, multiple magazines, bullet-proof vest, groin protection, ballistic helmet, SWAT uniform and all the rest of it?

A decent AR-15 rifle costs $1,000 or more all by itself. The shotgun and handgun might run another $800 total. Spare mags, sights, slings, and so on will run you at least another $1,000 across three firearms. The bullet-proof vest is easily another $800, and the cost of the bomb-making gear is anybody’s guess. With all the specialty body gear, ammunition, booby-trap devices and more, I’m guessing this is at least $20,000 in weapons and tactical gear, much of which is very difficult for civilians to get in the first place.

The mere manufacture of an explosive booby-trap device is, all by itself, a felony crime by the way. And remember: “Aurora Police Chief Dan Oates said Holmes’ apartment is booby-trapped with a ‘sophisticated’ maze of flammable devices. It could take hours or days for authorities to disarm it,” reported Yahoo News (http://sg.sports.yahoo.com/blogs/lookout/suspect-neuroscience-phd-stu…).

Question: Where does an unemployed, introverted medical school student get the training to deploy sophisticated booby traps, tactical body armor, weapons systems and more? Certainly not in graduate school!

All this leads to an obvious third party influence over all this. Someone else taught this guy these skills and funded the acquisition of the equipment.

Note: Some readers have questioned the $20,000 figure estimated here, saying this gear could have been acquired for only $10,000 or so. I doubt that, as all the extras that you need to effectively run these guns cost a lot of money: training courses, spare magazines, etc. Just a decent AR-15 battle sight (a holographic red dot sight) can run $1,000 – $2,000. Search “ACOG” if you don’t believe me. It is also reported that Holmes bought 6,000 rounds of ammo, which definitely isn’t cheap either. It’s clear this guy was spending big bucks. Whether it’s $10k or $20k isn’t really that much of a point.

Staged just in time for a vote on the UN small arms treaty?

More and more, this shooting is looking like a deliberate plot staged by the government itself much like Operation Fast and Furious pulled off by the ATF (http://www.naturalnews.com/032934_ATF_illegal_firearms.html) which helped smuggle tens of thousands of guns into Mexico for the purpose of causing “gun violence” in the USA, then blaming the Second Amendment for it.

All this looks like James Holmes completed a “mission” and then calmly ended that mission by surrendering to police and admitting everything. The mission, as we are now learning, was to cause as much terror and mayhem as possible, then to have that multiplied by the national media at exactly the right time leading up the UN vote next week on a global small arms treaty that could result in gun confiscation across America. (http://lewrockwell.com/eddlem/eddlem61.1.html)

Even Forbes.com wrote about this quite extensively, warning readers about the coming gun confiscation effort related to the UN treaty. The story was authored by Larry Bell (http://www.forbes.com/sites/larrybell/2011/06/07/u-n-agreement-should…) and says the UN treaty could “override our national sovereignty, and in the process, provide license for the federal government to assert preemptive powers over state regulatory powers guaranteed by the Tenth Amendment in addition to our Second Amendment rights.”

In other words, this has all the signs of Fast & Furious, Episode II. I wouldn’t be surprised to discover someone in Washington was behind it all. After all, there’s no quicker way to disarm a nation and take total control over the population than to stage violence, blame it on firearms, then call for leaders to “do something!” Such calls inevitably end up resulting in gun confiscation, and it’s never too long after that before government genocide really kicks in like we saw with Hitler, Stalin, Pol Pot, Mao and other tyrants.

Governments routinely murder millions

Here’s a short list of government mass murder carried out throughout history, almost always immediately following the disarmament of the public (and usually involving staged false flag events to justify the disarmament):

50+ million dead: Mao Ze-Dong (China, 1958-61 and 1966-69, Tibet 1949-50)
12+ million dead: Adolf Hitler (Germany, 1939-1945) – concentration camps, civilian deaths and dead Russian POWs
8+ million dead: Leopold II of Belgium (Congo, 1886-1908)
6+ million dead: Jozef Stalin (USSR, 1932-39)
5+ million dead: Hideki Tojo (Japan, 1941-44)
2+ million dead: Ismail Enver (Turkey, 1915-22)
1.7 million dead: Pol Pot (Cambodia, 1975-79)
1.6 million dead: Kim Il Sung (North Korea, 1948-94)
1.5 million dead: Menghistu (Ethiopia, 1975-78)
1 million dead: Yakubu Gowon (Biafra, 1967-1970)
900,000 dead: Leonid Brezhnev (Afghanistan, 1979-1982)
800,000 dead: Jean Kambanda (Rwanda, 1994)
See more at:
http://www.scaruffi.com/politics/dictat.html

Death by government:
http://www.hawaii.edu/powerkills/DBG.CHAP1.HTM
http://www.infowars.com/democide-government-killed-over-260-million-i…

A “monopoly of force” in government is far more dangerous than a crazed lone shooter

So yes, James Holmes and other crazed shooters kill a number of people each year in random acts of violence. It’s horrifying and wrong, but it’s nothing compared to the millions of lives that governments tend to destroy when they gain total power over the populace.

The most dangerous thing in the world, it turns out, is not a crazy person with a rifle; it’s a government with a “monopoly of force” over the entire population. And that’s exactly what the UN spells out as its goal for the world: Stripping all power from individual citizens and handing “monopolies of force” to the governments of the world, shoring up their positions as the only “legitimate” power on the planet.

See this document entitled, “Geneva Centre for the Democratic Control of Armed Forces (DCAF)” policy paper No. 24:
http://www.naturalnews.com/files/Revisiting-the-State-Monopoly-on-the…

As this document reveals, a table entitled “Governance solutions for reasserting the state monopoly on the use of force” lists the options available to governments to re-establish “monopolies of force” against their own people:

• (Re-)establish state monopoly
– Ownership of WMDs
– Safety Inspectorates

• Prohibit business activity
– Justice and Execution
– Deadly Force?

• Regulate/limit activities
– Private defense/security services
– Control of financial transfers
– Export controls
– Transport and infrastructure safety
– Environmental impact

Interestingly, that document also describes “terrorism” in a way that perfectly matches the Aurora, Colorado “Batman” movie theater shooter:

Terrorists aim to spread panic and fear in societies in order to achieve political goals, be they based on left- or right-wing, social-revolutionary, nationalistic or religious ideologies. They are organized in a clandestine way, most often in small groups and cells… Typical tactical means include kidnapping, hostage-taking, sabotage, murder, suicide attacks, vehicle bombs and improvised explosive devices.

A global monopoly of force

This document is a goldmine of information about the globalist agenda to disarm and enslave the population. Check out page 28, which reads:

The legitimate monopoly of force should not be limited to the nation-state but should be based on the local, national, regional and the global levels.

Global Security Governance and the Monopoly of Force

At the global level no monopoly of violence exists. The UN Security Council already has a monopoly power to authorize the use of force at the global level, although the UN was never given the necessary means to exercise this authority, such as the capacity to implement sanctions, a police force and armed forces…

This deficiency in global governance acts as a bottleneck and a barrier to the creation of the democratically legitimized monopoly of violence that is globally required.

This story gets deep, doesn’t it? Watch for more analysis here at NaturalNews.com, where we still fight for liberty and justice in a world that’s increasingly becoming enslaved.

UPDATE: Follow-up story now posted that asks the question: Why did not one fight back?

That story is available now at NaturalNews.com:
http://www.naturalnews.com/036537_James_Holmes_Batman_shooting.html

Video added: Answers to many questions raised by readers of this story

View it on YouTube at:

http://www.youtube.com/watch?v=TUCsNzzwCeY

SOURCE: NaturalNews.com

Did Philip K. Dick Disclose The Real Matrix in 1977?

Did Philip K. Dick Disclose The Real Matrix in 1977?

http://youtu.be/jXeVgEs4sOo

 

Dick’s stories typically focus on the fragile nature of what is “real” and the construction of personal identity. His stories often become surreal fantasies as the main characters slowly discover that their everyday world is actually an illusion constructed by powerful external entities (such as in Ubik[32]), vast political conspiracies, or simply from the vicissitudes of an unreliable narrator. “All of his work starts with the basic assumption that there cannot be one, single, objective reality”, writes science fiction author Charles Platt. “Everything is a matter of perception. The ground is liable to shift under your feet. A protagonist may find himself living out another person’s dream, or he may enter a drug-induced state that actually makes better sense than the real world, or he may cross into a different universe completely.”[29]

Alternate universes and simulacra were common plot devices, with fictional worlds inhabited by common, working people, rather than galactic elites. “There are no heroes in Dick’s books”, Ursula K. Le Guin wrote, “but there are heroics. One is reminded of Dickens: what counts is the honesty, constancy, kindness and patience of ordinary people.”[32] Dick made no secret that much of his thinking and work was heavily influenced by the writings of Carl Jung.[26][33] The Jungian constructs and models that most concerned Dick seem to be the archetypes of the collective unconscious, group projection/hallucination, synchronicities, and personality theory.[26] Many of Dick’s protagonists overtly analyze reality and their perceptions in Jungian terms (see Lies Inc.), while other times, the themes are so obviously in reference to Jung their usage needs no explanation.[citation needed] Dick’s self-named Exegesis also contained many notes on Jung in relation to theology and mysticism.[citation needed]

“Phil Dick’s third major theme is his fascination with war and his fear and hatred of it. One hardly sees critical mention of it, yet it is as integral to his body of work as oxygen is to water.” – Steven Owen Godersky[34]

Dick frequently focused on the question, “What is human?” In works such as Do Androids Dream of Electric Sheep? beings can appear totally human in every respect while lacking soul or compassion, while completely alien beings such as Glimmung in Galactic Pot-Healer may be more humane and complex than Dick’s human characters.

Mental illness was a constant interest of Dick’s, and themes of mental illness permeate his work. The character Jack Bohlen in the 1964 novel Martian Time-Slip is an “ex-schizophrenic”. The novel Clans of the Alphane Moon centers on an entire society made up of descendants of lunatic asylum inmates. In 1965 he wrote the essay titled Schizophrenia and the Book of Changes.[35]

Drug use (including religious, recreational, and abuse) was also a theme in many of Dick’s works, such as A Scanner Darkly and The Three Stigmata of Palmer Eldritch. Dick was a drug user for much of his life. According to a 1975 interview in Rolling Stone,[36] Dick wrote all of his books published before 1970 while on amphetamines. “A Scanner Darkly (1977) was the first complete novel I had written without speed”, said Dick in the interview. He also experimented briefly with psychedelics, but wrote The Three Stigmata of Palmer Eldritch, which Rolling Stone dubs “the classic LSD novel of all time”, before he had ever tried them. Despite his heavy amphetamine use, however, Dick later said that doctors had told him that the amphetamines never actually affected him, that his liver had processed them before they reached his brain.[36]

Summing up all these themes in Understanding Philip K. Dick, Eric Carl Link discussed eight themes or ‘ideas and motifs’[37]: Epistemology and the Nature of Reality, Know Thyself, The Android and the Human, Entropy and Pot Healing, The Theodicy Problem, Warfare and Power Politics, The Evolved Human, and ‘Technology, Media, Drugs and Madness’.[38]

Selected works

For complete bibliography, see Philip K. Dick bibliography.

The Man in the High Castle (1962) is set in an alternate universe United States ruled by the victorious Axis powers. It is considered a defining novel of the alternate history sub-genre,[39] and is the only Dick novel to win a Hugo Award.

The Three Stigmata of Palmer Eldritch (1965) utilizes an array of science fiction concepts and features several layers of reality and unreality. It is also one of Dick’s first works to explore religious themes. The novel takes place in the 21st century, when, under UN authority, mankind has colonized the Solar System‘s every habitable planet and moon. Life is physically daunting and psychologically monotonous for most colonists, so the UN must draft people to go to the colonies. Most entertain themselves using “Perky Pat” dolls and accessories manufactured by Earth-based “P.P. Layouts”. The company also secretly creates “Can-D”, an illegal but widely available hallucinogenic drug allowing the user to “translate” into Perky Pat (if the drug user is a woman) or Pat’s boyfriend, Walt (if the drug user is a man). This recreational use of Can-D allows colonists to experience a few minutes of an idealized life on Earth by participating in a collective hallucination.

Do Androids Dream of Electric Sheep? (1968) is the story of a bounty hunter policing the local android population. It occurs on a dying, poisoned Earth de-populated of all “successful” humans; the only remaining inhabitants of the planet are people with no prospects off-world. The 1968 story is the literary source of the film Blade Runner (1982).[40] It is both a conflation and an intensification of the pivotally Dickian question, What is real, what is fake? What crucial factor defines humanity as distinctly ‘alive’, versus those merely alive only in their outward appearance?

Ubik (1969) uses extensive networks of psychics and a suspended state after death in creating a state of eroding reality. A group of psychics is sent to investigate a group of rival psychics, but several of them are apparently killed by a saboteur’s bomb. Much of the novel flicks between a number of equally plausible realities; the “real” reality, a state of half-life and psychically manipulated realities. In 2005, Time magazine listed it among the “All-TIME 100 Greatest Novels” published since 1923.[13]

Flow My Tears, the Policeman Said (1974) concerns Jason Taverner, a television star living in a dystopian near-future police state. After being attacked by an angry ex-girlfriend, Taverner awakens in a dingy Los Angeles hotel room. He still has his money in his wallet, but his identification cards are missing. This is no minor inconvenience, as security checkpoints (manned by “pols” and “nats”, the police and National Guard) are set up throughout the city to stop and arrest anyone without valid ID. Jason at first thinks that he was robbed, but soon discovers that his entire identity has been erased. There is no record of him in any official database, and even his closest associates do not recognize or remember him. For the first time in many years, Jason has no fame or reputation to rely on. He has only his innate charisma to help him as he tries to find out what happened to his past and avoid the attention of the pols. The novel was Dick’s first published novel after years of silence, during which time his critical reputation had grown, and this novel was awarded the John W. Campbell Memorial Award for Best Science Fiction Novel.[8] It is the only Philip K. Dick novel nominated for both a Hugo and for a Nebula Award.

In an essay written two years before dying, Dick described how he learned from his Episcopalian priest that an important scene in Flow My Tears, the Policeman Said – involving its other main character, Police General Felix Buckman, the policeman of the title – was very similar to a scene in the Acts of the Apostles.[30] Film director Richard Linklater discusses this novel in his film Waking Life, which begins with a scene reminiscent of another Dick novel, Time Out of Joint.

A Scanner Darkly (1977) is a bleak mixture of science fiction and police procedural novels; in its story, an undercover narcotics police detective begins to lose touch with reality after falling victim to the same permanently mind altering drug, Substance D, he was enlisted to help fight. Substance D is instantly addictive, beginning with a pleasant euphoria which is quickly replaced with increasing confusion, hallucinations and eventually total psychosis. In this novel, as with all Dick novels, there is an underlying thread of paranoia and dissociation with multiple realities perceived simultaneously. It was adapted to film by Richard Linklater.

VALIS (1980) is perhaps Dick’s most postmodern and autobiographical novel, examining his own unexplained experiences. It may also be his most academically studied work, and was adapted as an opera by Tod Machover.[41] Later works like the VALIS trilogy were heavily autobiographical, many with “two-three-seventy-four” (2-3-74) references and influences. The word VALIS is the acronym for Vast Active Living Intelligence System. Later, PKD theorized that VALIS was both a “reality generator” and a means of extraterrestrial communication. A fourth VALIS manuscript, Radio Free Albemuth, although composed in 1976, was posthumously published in 1985. This work is described by the publisher (Arbor House) as “an introduction and key to his magnificent VALIS trilogy.”

Regardless of the feeling that he was somehow experiencing a divine communication, Dick was never fully able to rationalize the events. For the rest of his life, he struggled to comprehend what was occurring, questioning his own sanity and perception of reality. He transcribed what thoughts he could into an eight-thousand-page, one-million-word journal dubbed the Exegesis. From 1974 until his death in 1982, Dick spent many nights writing in this journal. A recurring theme in Exegesis is PKD’s hypothesis that history had been stopped in the 1st century AD., and that “the Empire never ended”. He saw Rome as the pinnacle of materialism and despotism, which, after forcing the Gnostics underground, had kept the population of Earth enslaved to worldly possessions. Dick believed that VALIS had communicated with him, and anonymous others, to induce the impeachment of U.S. President Richard Nixon, whom Dick believed to be the current Emperor of Rome incarnate.

In a 1968 essay titled “Self Portrait”, collected in the 1995 book The Shifting Realities of Philip K. Dick, Dick reflects on his work and lists which books he feels “might escape World War Three”: Eye in the Sky, The Man in the High Castle, Martian Time-Slip, Dr. Bloodmoney, or How We Got Along After the Bomb, The Zap Gun, The Penultimate Truth, The Simulacra, The Three Stigmata of Palmer Eldritch (which he refers to as “the most vital of them all”), Do Androids Dream of Electric Sheep?, and Ubik.[42] In a 1976 interview, Dick cited A Scanner Darkly as his best work, feeling that he “had finally written a true masterpiece, after 25 years of writing”.[43]

Adaptations

Films

A number of Dick’s stories have been made into films. Dick himself wrote a screenplay for an intended film adaptation of Ubik in 1974, but the film was never made. Many film adaptations have not used Dick’s original titles. When asked why this was, Dick’s ex-wife Tessa said, “Actually, the books rarely carry Phil’s original titles, as the editors usually wrote new titles after reading his manuscripts. Phil often commented that he couldn’t write good titles. If he could, he would have been an advertising writer instead of a novelist.”[44] Films based on Dick’s writing have accumulated a total revenue of over US $1 billion as of 2009.[45]

Future films based on Dick’s writing include the animated adaptation King of the Elves from the Walt Disney Animation Studios, set to be released in the winter of 2012; Radio Free Albemuth, based on Dick’s novel of the same name, which has been completed and is currently awaiting distribution; and a film adaptation of Ubik which, according to Dick’s daughter, Isa Dick Hackett, is in advanced negotiation.[48] Ubik is set to be made into a film by Michel Gondry.[49]

The Halcyon Company, known for developing the Terminator franchise, acquired right of first refusal to film adaptations of the works of Philip K. Dick in 2007. In May 2009, they announced plans for an adaptation of Flow My Tears, the Policeman Said.[50] It has been reported in 2010 that Ridley Scott will produce an adaptation of The Man in the High Castle for BBC, in the form of a mini-series.[51]

Undercover Reporter Infiltrates Security Firm to Expose London Olympics

Undercover Reporter Infiltrates Security Firm to Expose London Olympics

Highlights: Foreign troops drafted in; drug deals in training classroom; ineffective screening processes and detection technology; photographs of sensitive mock-up screening areas taken by un-screened trainees; 200k ‘casket linings’ delivered; uniforms being stolen; plan for an evacuation of London; drones on-line (incl. armed); poor standard of security recruits — cant speak English.

Exclusive interview with investigative journalist Lee Hazledean who is training undercover as a security guard for the London olympics with private security firm G4S. Lee is a filmmaker and investigative TV journalist. He has also been involved in major stories on the IRA and how British Army infiltrated the organisation and carried out false flag operations. He has managed to get undercover as part of the security team at the 2012 Olympics with G4S. He has found there is a media black out on all major news outlets to do with the Olympics unless the story is broken in a news paper or foreign news agency it’s unlikely to see the light of day. Security training and officers are so appaling that the safety and security of the London 2012 Olympics are in jeopardy.

A few example’s: During an exercise he was asked to pose as a would-be terrorist and managed to get knives, guns and IED’s through security screening on every occasion and every exercise. The X-Ray operators have only two days of training, they aren’t trained properly and miss the most obvious prohibited items gun’s, knives, IED’s, ammunition etc. Bag and physical searchers again are missing dangerous weapons, trainees can’t use vital security equipment like the HHMD (Hand Held Metal detectors) they can’t even communicate properly with the public on a basic level. Worryingly the ‘Rapiscan’ walk through metal detectors don’t work properly and aren’t sensitive enough to pick up large knives, ammunition and other metallic threats. He was told that they would be set to go off only after 50 people have walked through to limit queuing time and to get spectators into the venue. So a Terrorist if they basically queued up would probably get through wearing a suicide vest. In classes there are drug deals going down, people can’t speak any English. People who haven’t even completed their SIA licenses yet are being picked to be Team Leaders over highly trained security officers, ex soldiers and ex police. Lee is concerned that weapons or worse will be getting into the games. However, what’s more disturbing is that uniforms are already going missing or being stolen. The training facility is an accurate mock-up of the actual security measures at the Olympic venues. Lee has witnessed several people taking photos on their mobile phones in the training facility and whilst they have been a few people caught by trainers most aren’t noticed. We know that terrorists take surveillance photos to gain intelligence. Contemporary International claim that they have mobile phone ‘jammers’ in the facility, however trainers admitted to Lee that there were no ‘jammers’ at all, it was a verbal deterrent.

Also there are plans for the evacuation of London, G4S are going to be at the forefront, as well as 100,000 troops coming in via Woolwich barracks made up of regular British Forces, American regular army and European troops. Lee was not told why there would be any need for an evacuation of the whole of London, they just said it was to be a “defining moment in the history of London”. This could just be a precaution but the public should be made aware of the foreign invasion which is taking place right now. The troops are being held across London in various barracks once they’ve been through Woolwich. Lee also had this information confirmed by an army doctor who was shocked at all the foreign troops coming into London. There is also a shipment of what are being described as casket linings, each casket can hold four or five people and 200,000 casket linings have been delivered we believe from America. Also we were shown videos of drones attacking targets in Afghanistan and were told that drones will be patrolling the sky’s over London during the Olympics carrying out surveillance and search and destroy missions if necessary.

London 2012 Olympics: ‘Missiles Left Unguarded’ Outside East London Flats:-
www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/9243658/London-201…

London 2012 Olympics: Public Given Access to Blackheath Anti-aircraft Missile Launcher:-
www.telegraph.co.uk/news/uknews/defence/9254072/London-2012-Olympics-p…

The Link Between Olympics’ Security and FEMA Concentration Camps:-
www.luikkerland.com/the-cockaigne-times/2012/06/07/the-link-between-ol…

Source:-
bcfm.org.uk/2012/06/22/17/friday-drivetime-76/18658

Monsanto Thugs Likely Behind Bee Poisonings In Australia

Monsanto Thugs Likely Behind Bee Poisonings In Australia

Beehives poisoned

Beekeepers on the south coast have lost up to a thousand hives in a series of poison attacks.

South coast beekeepers are reeling from the senseless destruction of hundreds of hives across the region yesterday.

A toxic poison was sprayed into over 740 honey producing hives in the Batemans Bay area, decimating the local industry.

Police say the attacks on the region’s biggest producers caused  an estimated $150,000 damage, but local producers say the poison will continue to destroy hives over coming weeks.

Bee keepers on the NSW south coast lost about 750 hives after bees were poisoned. Owner of Australian Rainforest Honey, Steve Roberts, lost about 230 hives, south of Pebbly Beach.Beekeepers on the NSW south coast lost about 750 hives after bees were poisoned. Owner of Australian Rainforest Honey, Steve Roberts, lost about 230 hives, south of Pebbly Beach. Photo: Graham Tidy

One of the hardest hit was south coast producer Australian Rainforest Honey.

The company had 240 hives poisoned at its two sites on the south coast, causing tens of thousands of dollars in damage.

One of the company’s directors, Stephen Roberts, was at his site just south of Pebbly Beach today, sifting through piles of dead bees and attempting to save those that hadn’t been lost.

Owner of Australian Rainforest Honey, Steve Roberts, at left, with employee, Adlei Baldo, south of Pebbly Beach.Owner of Australian Rainforest Honey, Steve Roberts, at left, with employee, Adlei Baldo, south of Pebbly Beach.

Mr Roberts says the poisoning was a senseless, inexplicable act, and is working with rural police and the NSW Department of Primary Industries to catch those responsible.

Mr Roberts bees are also used to pollinate almonds, and the attacks may have a secondary impact on that industry.

The attacks appear targeted, with the offenders poisoning a series of hidden, remote bushland sites, some up to 40km apart.

“It’s not right, it’s just not right,” Mr Roberts said.

“We’ll have to start up the hives from scratch again, and it’ll be well over $100,000,” he said.

Investigators from the Department of Primary Industries were at the hives today taking samples of the poison, but a spokeswoman said it would take a number of days to determine an exact cause of death.

The beekeeping business is highly competitive and has been described as  cutthroat, but there is no indication that any rival honey producer was responsible.

But while authorities try and track down the culprits, there’s little left for Australian Rainforest Honey to do but mop up and start all over again.

“We’re just lucky that we’ve got a few more loads of bees than others have,” Mr Roberts said.

“We’ll feel it, we’ll definitely feel it, but what can you do?”

Anyone with information should contact Crime Stoppers on 1800 333 000.

Read more: CanberraTimes.com

See Also:

Vanishing of the Bees – Beekeeper Leaks EPA Document

How To Hack Satellite Internet & Surf Anonymously

How To Hack Satellite Internet & Surf Anonymously

 

A Spanish researcher demos new satellite-hijacking tricks with cybercriminal potential.

Satellites can bring a digital signal to places where the Internet seems like a miracle: off-the-grid desert solar farms, the Arctic or an aircraft carrier at sea. But in beaming data to and from the world’s most remote places, satellite Internet may also offer its signal to a less benign recipient: any digital miscreant within thousands of miles.

In a presentation at the Black Hat security conference in Arlington, Va., Tuesday, Spanish cybersecurity researcher Leonardo Nve presented a variety of tricks for gaining access to and exploiting satellite Internet connections. Using less than $75 in tools, Nve, a researcher with security firm S21Sec, says that he can intercept Digital Video Broadcast (DVB) signals to get free high-speed Internet. And while that’s not a particularly new trick–hackers have long been able to intercept satellite TV or other sky-borne signals–Nve also went a step further, describing how he was able to use satellite signals to anonymize his Internet connection, gain access to private networks and even intercept satellite Internet users’ requests for Web pages and replace them with spoofed sites.

“What’s interesting about this is that it’s very, very easy,” says Nve. “Anyone can do it: phishers or Chinese hackers … it’s like a very big Wi-Fi network that’s easy to access.”

In a penetration test on a client’s network, Nve used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be bought on eBay ( EBAY – news – people ) for $30 or less, along with open source Linux DVB software applications and the network data analysis or “sniffing” tool Wireshark.

Exploiting that signal, Nve says he was able to impersonate any user connecting to the Internet via satellite, effectively creating a high-speed, untraceable anonymous Internet connection that that can be used for nefarious online activities.

Nve also reversed the trick, impersonating Web sites that a satellite user is attempting to visit by intercepting a Domain Name System (DNS) request–a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it’s stored–and sending back an answer faster than the ISP. That allows him to replace a Web site that a user navigates to directly with a site of his choosing, creating the potential for undetectable cybercrime sites that steal passwords or installs malicious software.

In his tests on the client’s network, Nve says he was also able to hijack signals using GRE or TCP protocols that enterprises use to communicate between PCs and servers or between offices, using the connections to gain access to a corporation or government agency’s local area network.

The Barcelona-based researcher tested his methods on geosynchronous satellites aimed at Europe, Africa and South America. But he says there’s little doubt that the same tricks would work on satellites facing North America or anywhere else.

What makes his attacks possible, Nve says, is that DVB signals are usually left unencrypted. That lack of simple security, he says, stems from the logistical and legal complications of scrambling the signal, which might make it harder to share data among companies or agencies and–given that a satellite signal covers many countries–could run into red tape surrounding international use of cryptography. “Each [country] can have its own law for crypto,” says Nve. “It’s easier not to have encryption at the DVB layer.”

Nve isn’t the first to show the vulnerability of supposedly secure satellite connections. John Walker, a British satellite enthusiast, told the BBC in 2002 that he could watch unencrypted NATO video feeds from surveillance sorties in the Balkans. And the same lack of encryption allowed insurgents to hack into the video feed of unmanned U.S. drone planes scouting Afghanistan, the Wall Street Journal reported in December.

In fact, the techniques that Nve demonstrated are probably known to other satellite hackers but never publicized, says Jim Geovedi, a satellite security researcher and consultant with the firm Bellua in Indonesia. He compares satellite hacking to early phone hacking or “phreaking,” a practice that’s not well protected against but performed by only a small number of people worldwide. “This satellite hacking thing is still considered blackbox knowledge,” he wrote in an e-mail to Forbes. “I believe there are many people out there who conduct similar research. They may have some cool tricks but have kept them secret for ages.”

At last year’s Black Hat D.C. conference, British cybersecurity researcher Adam Laurie demonstrated how he intercepts satellite signals with techniques similar to Nve, using a DreamBox satellite receiver and Wireshark. But Nve argues that his method is far cheaper–Laurie’s DreamBox setup cost around $750–and that he’s the first to demonstrate satellite signal hijacking rather than mere interception.

“I’m not just talking about watching TV,” says Nve. “I’m talking about doing some very scary things.”

 

 

At 12:57 PM, Anonymous satellite_hacker said…

Satellite hacking for fun isn’t cheap! One of the sessions I was really looking forward to ahead of the Black Hat DC event this year was Adam Laurie’s session titled – Satellite Hacking for Fun and Profit.

It’s a session that didn’t disappoint, Laurie is always entertaining, but it also revealed how much effort is actually required to try and get at satellite signals.

First off, Laurie prefaced his talk by noting that he wasn’t going to talk about hacking the actual satellite in space itself.

“I’m playing it safe and just looking at what is coming down,” Laurie told the Black Hat audience.

Instead what Laurie focused his talk on was something he called ‘Feed Hunting’ – that is looking for satellite feeds that are not supposed to be found. Laurie claimed that he has been doing satellite feed hunting for years – at least as far back as the untimely demise of the late Princess Diana in 1997. Laurie claimed that he was able to find a non-public feed from a TV broadcaster that had left their transponder on in a Paris hotel room.

Fast forward a dozen years and Laurie commented that the technology to identify satellite feeds has progressed dramatically. Among the reasons why he satellite feed hunting has gotten easier is an open source based satellite received called the dreambox.

Laurie explained that the dreambox has a web interface that makes it easier to find streams and provides information on what the stream includes. Another open source technology also helps to feed hunt satellite content.

A project called dvbsnoop is a DVB (dIgital video broadcasting) and MPEG stream analyzer that lets the user access raw data from DVB card. By sifting through the raw data, Laurie demonstrated that interesting satellite feeds that weren’t intended to be public could be found.

Going a step further, Laurie claimed that he had created his own python based script called dreaMMap that could create a 3d model of satellite frequency transmissions. With the 3D model the user just does a point and click to steer dish to a particular satellite frequency. One memory of the Black Hat audience asked Laurie if what he was doing was legal. Laurie shrugged and commented:

“I’m in the US giving a talk where I’m tunneled to my server in the UK and looking at a satellite in space that is over Africa – so who would get me?”

All told there is a financial cost to Laurie’s satellite feed hunting techniques – and that cost is approximately $785 for the Dreambox hardware, the actual satellite dish and then the motor and the mount for the dish. Well I guess if you’ve got the money to burn…

SOURCE: Satellite Internet Blog

Sex, Technology, and its Harm To Children

Sex, Technology, and its Harm To Children

Information technology, among all that it does, brings together two things which are wonderful when apart, and frightening when combined: children, and sex. For the past couple decades, this has, understandably, freaked us all out. We need to calm down and have a talk about it.

In his defense of freedom of “icky speech”, Neil Gaiman observed, “The Law is a blunt instrument. It’s not a scalpel. It’s a club.” This exemplifies how much of the world has reacted to the intersection of technology, sex, and children: by wildly flailing around with a gigantic legal club, more often smashing itself in the head than solving any problems. Let’s explore how:

Kids Looking At Pornography

The Internet is really, really great for porn. Porn is so easy to find online that even a child could do it. The problem, so it would seem, is that this is exactly what children end up doing. And as they approach and go through puberty, boy oh boy do they find porn.

Such porn-finding is unstoppable. Nobody ever clicks “No, I am not 18 years of age or older” when visiting a porn site. No web filtering software can stand up to the resourcefulness of a curious and hormonal teenager. No law will convince a maturing human being not to seek out sexually explicit material. The underage psyche interprets barriers to pornography as damage, and routes around it.

For some reason, this is seen as a bad thing. Exposure to graphic depictions of sex are considered somehow harmful to children, teenagers, and anyone below the arbitrary age of 18, 21, or whatever. But as generations of kids raised on surreptitiously-accessed Internet porn grow older, little evidence of harm shows itself. Rampant porn-viewing hasn’t been shown to increase rates of sexual assault or sexual violence; in fact increasing availability of porn has correlated with a decline in rape. On that note, what pornography may also do is aid in young people’s exploration and discovery of their own sexualities as they mature — a hypothesis which, if true, isn’t particularly malignant.

Yet, we insist on criminalizing this perfectly normal behavior by sexually developing human beings. In many cases, this illegality concerns the willful distribution of pornography to a minor — giving the pornographer, not the minor, the blame. But here’s the thing: nobody has to distribute or market pornography to a minor. They’ll find it all by themselves.

Kids Willfully Creating “Pornography”

It starts to get a bit more problematic when that exploration goes beyond passive viewing; apparently, kids these days are into something called “sexting”. At its most innocuous, a child or teenager snaps a nude or sexually explicit photo of themselves, and sends it (often via MMS) to a friend, crush, or significant other. All of a sudden, through their own free will, the kid’s become a child pornographer.

Of course, this behavior is far from unique to minors. Information technology has enabled consenting adults from all walks of life to share sexually explicit imagery of themselves with one another. MMSes and emails between friends aren’t even the half of it. Webcams and video chat software weren’t on the scene for five minutes before somebody realized that they could be used to transmit their genitalia. There are sexually explicit social networks and YouTube-clones where people can expose themselves to millions of anonymous viewers. There’s even a fusion of these two in live video broadcasting websites which permit people to stream real-time images of themselves doing scandalous things without very much clothing on. As with all sexually-charged things that consenting adults do, sometimes minors decide to give it a try themselves.

Child pornography laws are meant to prevent the abuse of minors. When minors decide, by their own volition, to take nude or sexually explicit images of themselves and share them with loved ones, friends, or even anonymous acquaintances, it’s hard to describe how that could possibly constitute abuse. Sadly, because of the law, all parties involved end up liable for the heinous crime of child pornography: both the recipient, regardless of age, and the exhibiting minor.

Laws intended to protect children from sexual abuse now have the effect of criminalizing behavior that — in the context of our contemporary world — is perfectly reasonable for a pubescent minor to engage in. It’s not really that weird, strange, or appalling that sexually-developing young people might want to show off their bodies to their fellow sexually-developing young people; the only weird part is this new medium of exhibition they’re using. Before the Internet and cellphones, kids just took off their clothes for each other in person.

Much like with physical, flesh-and-blood sexual intimacy, educating children about why they shouldn’t make themselves into porn stars isn’t going to work; they’ll still desire to, and they’ll still do it. And there’s nothing inherently wrong with that. The sanest course of action is to educate them about responsibility: “use a condom” is to real sex as “don’t send pictures of your boyfriend’s dick to all of your other friends” is to explicit image sharing. But the reason for that advice should be basic common sense and human decency, not because doing so will force you to register as a sex offender at age 14.

Actual Child Pornography and Pedophilia

What about the actual abuse from which children need to be protected? The sexual abuse of children — or anyone, for that matter — is rightfully illegal, and absolutely reprehensible. But in our zeal to destroy reprehensible things, most societies have gone further, and made it illegal to access or possess images of this abhorrent abuse. Unfortunately, the uncomfortable truth is that banning the possession of child pornography doesn’t do any good.

First of all, child pornography is a wonderful scapegoat. Copyright lobbyists regularly use child porn to incite moral panic, and make their proposals to censor the Internet more palatable. And much like these “piracy-stopping” censorship schemes, child pornography bans don’t stop the sexual abuse of children involved.

Before the Internet, child pornography was distributed secretly among close-knit networks of pedophiles. It wouldn’t be unreasonable to assume that the recipient of child porn might be no more than two or three degrees of separation from its creator — the actual person who had committed the sexual abuse. Today, a single child rapist can anonymously distribute their “work” to thousands of people with a single click of a mouse. The downloaders often have absolutely no idea who the perpetrator was; their arrests solve nothing.

Furthermore, there is no conclusive evidence that viewers of child pornography are more likely to act on their fetishes and commit sexual abuse of a child. In fact, based on the aforementioned “porn lowers rape rates” study, one could reasonably hypothesize that the exact opposite is true.

The criminalization of viewing or possessing child pornography only serves to get “revenge” on people who are interested in it. It does not lead to the imprisonment of child rapists, it does not give justice to the victims, and it does not stop potential pedophiles from acting on their urges.

What would, in fact, stop potential pedophiles from acting on their urges is mental health treatment. If at all possible, societies should not view sexual diversity or fetishism as a mental illness; it’s not a particularly harmful thing if somebody is sexually aroused by, oh, let’s say, being hit in the face with a pie. Sexual attraction to children, on the other hand, isn’t something that can be reasonably accommodated — hence, a mental health problem.

But much as the criminalization (and resulting stigmatization) of drug use makes addicts afraid to seek treatment, people suffering with pedophilia fear the consequences of getting help. In researching this article, I got an anonymous source to put it in his own words for me:

When I was 17 I looked at a lot of porn, just like anyone my age. I was curious about it all. I didn’t even know I was gay until I got curious about gay porn. So I looked at all the varieties, twinks, jocks, black guys, Asian guys, groups, all of it. Weirder stuff too like bondage, BDSM, some of it I liked for a while, some of it I never went back to. Then I started looking at kids. I was curious, and a horny teenager, so it wasn’t like it was that creepy. But every time after, I felt horrible. I could see how scared those kids were in the pics but I didn’t stop. I told myself, it’s just because I’m young, I’ll grow out of it, but I’m 20 now and still can’t stop myself sometimes. I wouldn’t ever go and do it for real, I know that. I like guys my own age and older, so it’s not like I can only get off to kids. But I still hate myself for it. But if I go out and tell someone I need help, the feds might come and knock down my door. So I don’t know what to do.

This is the sort of person who needs a therapist’s couch, not a prison cell. But our irrational rage at all things pedophilic deny this man his health, his sanity, and his right to be a productive member of society. He’s not alone, he’s just the one brave enough to break the silence.

Conclusion

The intersection of sexuality and children is understandably frightening. It’s a very primal instinct to want to protect children, and sex — as something that many full-grown adults still haven’t fully come to terms with — seems threatening with its emotional complexity, and its potential for abuse. The Internet and other information technology make it easier for everyone to encounter all types of information, and consequently, for children to encounter sex. But there are two things we must remember:

  1. Sex is perfectly fine, and something that children need education of, not protection from.
  2. Sexual abuse is not perfectly fine, and is its own distinct concern.

If we truly care about protecting children from sexual abuse, then it behooves us to do it effectively. Knee-jerk reactions, moral panics, and emotion-based policymaking do not protect our children. Ineffective laws only serve to make politicians and civil servants look like they’re doing something, in a ploy to win public support. And that is almost as disgusting as abusing a child.

 

SOURCE: Falkvinge,net

Sanders Releases Explosive Bailout List

Sanders Releases Explosive Bailout List

More than $4 trillion in near zero-interest Federal Reserve loans and other financial assistance went to the banks and businesses of at least 18 current and former Federal Reserve regional bank directors in the aftermath of the 2008 financial collapse, according to Government Accountability Office records made public for the first time today by Sen. Bernie Sanders.

On the eve of Senate testimony by JPMorgan Chase CEO Jamie Dimon, Sanders (I-Vt.) released the detailed findings on Dimon and other Fed board members whose banks and businesses benefited from Fed actions.

A Sanders provision in the Dodd-Frank Wall Street Reform Act required the Government Accountability Office to investigate potential conflicts of interest. The Oct. 19, 2011 report by the non-partisan investigative arm of Congress laid out the findings, but did not name names. Sanders today released the names.

 

“This report reveals the inherent conflicts of interest that exist at the Federal Reserve.  At a time when small businesses could not get affordable loans to create jobs, the Fed was providing trillions in secret loans to some of the largest banks and corporations in America that were well represented on the boards of the Federal Reserve Banks.  These conflicts must end,” Sanders said.

The GAO study found that allowing members of the banking industry to both elect and serve on the Federal Reserve’s board of directors creates “an appearance of a conflict of interest” and poses “reputational risks” to the Federal Reserve System.

In Dimon’s case, JPMorgan received some $391 billion of the $4 trillion in emergency Fed funds at the same time his bank was used by the Fed as a clearinghouse for emergency lending programs. In March of 2008, the Fed provided JPMorgan with $29 billion in financing to acquire Bear Stearns. Dimon also got the Fed to provide JPMorgan Chase with an 18-month exemption from risk-based leverage and capital requirements. And he convinced the Fed to take risky mortgage-related assets off of Bear Stearns balance sheet before JP Morgan Chase acquired the troubled investment bank.

Another high-profile conflict involved Stephen Friedman, the former chairman of the New York Fed’s board of directors. Late in 2008, the New York Fed approved an application from Goldman Sachs to become a bank holding company giving it access to cheap loans from the Federal Reserve. During that period, Friedman sat on the Goldman Sachs board.  He also owned Goldman stock, something that was prohibited by Federal Reserve conflict of interest regulations. Although it was not publicly disclosed at the time, Friedman received a waiver from the Fed’s conflict of interest rules in late 2008. Unbeknownst to the Fed, Friedman continued to purchase shares in Goldman from November 2008 through January of 2009, according to the GAO.

In another case, General Electric CEO Jeffrey Immelt was a New York Fed board member at the same time GE helped create a Commercial Paper Funding Facility during the financial crisis. The Fed later provided $16 billion in financing to GE under this emergency lending program.

Sanders on May 22 introduced legislation to prohibit banking industry and business executives from serving as directors of the 12 Federal Reserve regional banks.

To read a report summarizing the new GAO information, click here.

 


 

Jamie Dimon Is Not Alone

 

During the financial crisis, at least 18 former and current directors from Federal Reserve Banks worked in banks and corporations that collectively received over $4 trillion in low-interest loans from the Federal Reserve.

US Senator Bernard Sanders (I-Vt.)
Washington, DC
June 12, 2012

 

    1. Jamie Dimon, the Chairman and CEO of JP Morgan Chase, has served on the Board of Directors at the Federal Reserve Bank of New York since 2007. During the financial crisis, the Fed provided JP Morgan Chase with $391 billion in total financial assistance. JP Morgan Chase was also used by the Fed as a clearinghouse for the Fed’s emergency lending programs.In March of 2008, the Fed provided JP Morgan Chase with $29 billion in financing to acquire Bear Stearns. During the financial crisis, the Fed provided JP Morgan Chase with an 18-month exemption from risk-based leverage and capital requirements. The Fed also agreed to take risky mortgage-related assets off of Bear Stearns balance sheet before JP Morgan Chase acquired this troubled investment bank.
    1. Jeffrey Immelt, the CEO of General Electric, served on the New York Fed’s Board of Directors from 2006-2011. General Electric received $16 billion in low-interest financing from the Federal Reserve’s Commercial Paper Funding Facility during this time period.
    1. Stephen Friedman. In 2008, the New York Fed approved an application from Goldman Sachs to become a bank holding company giving it access to cheap Fed loans. During the same period, Friedman, who was chairman of the New York Fed at the time, sat on the Goldman Sachs board of directors and owned Goldman stock, something the Fed’s rules prohibited. He received a waiver in late 2008 that was not made public. After Friedman received the waiver, he continued to purchase stock in Goldman from November 2008 through January of 2009 unbeknownst to the Fed, according to the GAO. During the financial crisis, Goldman Sachs received $814 billion in total financial assistance from the Fed.
    1. Sanford Weill, the former CEO of Citigroup, served on the Fed’s Board of Directors in New York in 2006. During the financial crisis, Citigroup received over $2.5 trillion in total financial assistance from the Fed.
    1. Richard Fuld, Jr, the former CEO of Lehman Brothers, served on the Fed’s Board of Directors in New York from 2006 to 2008. During the financial crisis, the Fed provided $183 billion in total financial assistance to Lehman before it collapsed.
    1. James M. Wells, the Chairman and CEO of SunTrust Banks, has served on the Board of Directors at the Federal Reserve Bank in Atlanta since 2008. During the financial crisis, SunTrust received $7.5 billion in total financial assistance from the Fed.
    1. Richard Carrion, the head of Popular Inc. in Puerto Rico, has served on the Board of Directors of the Federal Reserve Bank of New York since 2008. Popular received $1.2 billion in total financing from the Fed’s Term Auction Facility during the financial crisis.
    1. James Smith, the Chairman and CEO of Webster Bank, served on the Federal Reserve’s Board of Directors in Boston from 2008-2010. Webster Bank received $550 million in total financing from the Federal Reserve’s Term Auction Facility during the financial crisis.
    1. Ted Cecala, the former Chairman and CEO of Wilmington Trust, served on the Fed’s Board of Directors in Philadelphia from 2008-2010. Wilmington Trust received $3.2 billion in total financial assistance from the Federal Reserve during the financial crisis.
    1. Robert Jones, the President and CEO of Old National Bancorp, has served on the Fed’s Board of Directors in St. Louis since 2008. Old National Bancorp received a total of $550 million in low-interest loans from the Federal Reserve’s Term Auction Facility during the financial crisis.
    1. James Rohr, the Chairman and CEO of PNC Financial Services Group, served on the Fed’s Board of Directors in Cleveland from 2008-2010. PNC received $6.5 billion in low-interest loans from the Federal Reserve during the financial crisis.
    1. George Fisk, the CEO of LegacyTexas Group, was a director at the Dallas Federal Reserve in 2009. During the financial crisis, his firm received a $5 million low-interest loan from the Federal Reserve’s Term Auction Facility.
    1. Dennis Kuester, the former CEO of Marshall & Ilsley, served as a board director on the Chicago Federal Reserve from 2007-2008. During the financial crisis, his bank received over $21 billion in low-interest loans from the Fed.
    1. George Jones, Jr., the CEO of Texas Capital Bank, has served as a board director at the Dallas Federal Reserve since 2009. During the financial crisis, his bank received $2.3 billion in total financing from the Fed’s Term Auction Facility.
    1. Douglas Morrison, was the Chief Financial Officer at CitiBank in Sioux Falls, South Dakota, while he served as a board director at the Minneapolis Federal Reserve Bank in 2006. During the financial crisis, CitiBank in Sioux Falls, South Dakota received over $21 billion in total financing from the Federal Reserve.
    1. L. Phillip Humann, the former CEO of SunTrust Banks, served on the Board of Directors at the Federal Reserve Bank in Atlanta from 2006-2008. During the financial crisis, SunTrust received $7.5 billion in total financial assistance from the Fed.
    1. Henry Meyer, III, the former CEO of KeyCorp, served on the Board of Directors at the Federal Reserve Bank in Cleveland from 2006-2007. During the financial crisis, KeyBank (owned by KeyCorp) received over $40 billion in total financing from the Federal Reserve.
  1. Ronald Logue, the former CEO of State Street Corporation, served as a board member of the Boston Federal Reserve Bank from 2006-2007. During the financial crisis, State Street Corporation received a total of $42 billion in financing from the Federal Reserve.

SOURCE: ReaderSupportedNews.org

Hopi Prophecy: Spritiual Awareness & Balance

Hopi Prophecy: Spritiual Awareness & Balance

The end of all Hopi ceremonialism will come when a “Kachina” removes his mask during a dance in the plaza before uninitiated children [the general public]. For a while there will be no more ceremonies, no more faith. Then Oraibi will be rejuvenated with its faith and ceremonies, marking the start of a new cycle of Hopi life.

World War III will be started by those peoples who first revealed the light (the divine wisdom or intelligence) in the other old countries (India, China, Islamic Nations, Africa.)

The United States will be destroyed, land and people, by atomic bombs and radioactivity. Only the Hopis and their homeland will be preserved as an oasis to which refugees will flee. Bomb shelters are a fallacy. “It is only materialistic people who seek to make shelters. Those who are at peace in their hearts already are in the great shelter of life. There is no shelter for evil. Those who take no part in the making of world division by ideology are ready to resume life in another world, be they Black, White, Red, or Yellow race. They are all one, brothers.”

The war will be “a spiritual conflict with material matters. Material matters will be destroyed by spiritual beings who will remain to create one world and one nation under one power, that of the Creator.”

That time is not far off. It will come when the Saquasohuh (Blue Star) Kachina dances in the plaza and removes his mask. He represents a blue star, far off and yet invisible, which will make its appearance soon. The time is foretold by a song sung during the Wuwuchim ceremony. It was sung in 1914 just before World War I, and again in 1940 before World War II, describing the disunity, corruption, and hatred contaminating Hopi rituals, which were followed by the same evils spreading over the world. This same song was sung in 1961 during the Wuwuchim ceremony.

The Emergence to the future Fifth World has begun. It is being made by the humble people of little nations, tribes, and racial minorities. “You can read this in the earth itself. Plant forms from previous worlds are beginning to spring up as seeds [as described in SW-II, Effects and Coming Events # 1]. This could start a new study of botany if people were wise enough to read them. The same kinds of seeds are being planted in the sky as stars. The same kinds of seeds are being planted in our hearts. All these are the same, depending how you look at them. That is what makes the Emergence to the next, Fifth World.

“These comprise the nine most important prophecies of the Hopis, connected with the creation of the nine worlds: the three previous worlds on which we lived, the present Fourth World, the three future worlds we have yet to experience, and the world of Taiowa, the Creator, and his nephew, Sotuknang.”

The Hopi and others who were saved from the Great Flood made a sacred covenant with the Great Spirit never to turn away from him. He made a set of sacred stone tablets, called Tiponi, into which he breathed his teachings, prophecies, and warnings. Before the Great Spirit hid himself again, he placed before the leaders of the four different racial groups four different colors and sizes of corn; each was to choose which would be their food in this world. The Hopi waited until last and picked the smallest ear of corn. At this, the Great Spirit said:

“It is well done. You have obtained the real corn, for all the others are imitations in which are hidden seeds of different plants. You have shown me your intelligence; for this reason I will place in your hands these sacred stone tablets, Tiponi, symbol of power and authority over all land and life to guard, protect, and hold in trust for me until I shall return to you in a later day, for I am the First and I am the Last.”

The Great Chieftain of the Bow Clan led the faithful ones to this new land, but he fell into evil ways. His two sons scolded him for his mistake, and after he died they assumed the responsibilities of leadership. Each brother was given a set of Tiponi, and both were instructed to carry them to a place to which the Great Spirit directed them. The elder brother [of the shining light] was told to go immediately to the east, toward the rising sun, and upon reaching his destination to start back immediately to look for his younger brother, who remained on Turtle Island [the Continental United States of America]. His mission was to help his younger brother to bring about the Purification Day, at which time all evildoers would be punished or destroyed, after which real peace, brotherhood, and everlasting life would be established. The elder brother would restore all land to his younger brother, from whom the Evil one among the white men had taken it. The elder brother [of the shining light] also would come to look for the Tiponi tablets and fulfill the mission given him by the Great Spirit.

The younger brother was instructed to travel throughout the land and mark his footsteps as he went about. Both brothers were told that a great white star would appear in the sky; when that happened, all people would know that the elder brother had reached his destination. Thereupon all people were to settle wherever they happened to be at that time, there to remain until the elder brother returned.

The Hopi settled in the area now known as Four Corners, where the state lines of Arizona, New Mexico, Utah and Colorado meet. They lived in humble simplicity and the land produced abundant crops. This area is the “heart” of Turtle Island [the U.S.] and of Mother Earth, and it is the microcosmic image of the macrocosm of the entire planet. Each Hopi clan perpetuates a unique ceremony, and the ceremonies together maintain the balance of natural forces of sunlight, rain and winds, and reaffirm the Hopi respect for all life and trust in the Great Spirit.

The Hopi were told that after a time White Men would come and take their land and try to lead the Hopi into evil ways. But in spite of all the pressures against them, the Hopi were told they must hold to their ancient religion and their land, though always without violence. If they succeeded, they were promised that their people and their land would be a center from which the True Spirit would be reawakened.

It is said that after many years the elder brother might change the color of his skin, but his hair will remain black. He will have the ability to write, and he will be the only person able to read the Tiponi. When he returns to find his younger brother, the Tiponi will be placed side by side to show all the world that they are true brothers. Then great judgment will take place, for the elder will help the younger brother to obtain real justice for all Indian brothers who have been cruelly mistreated by the white man since he came to Turtle Island.

The transformed elder brother, the True White Brother, will wear a red cloak or a red cap, similar to the pattern on the back of a horned toad. He will bring no religion but his own, and will bring with him the Tiponi tablets. He will be all-powerful; none will be able to stand against him. He will come swiftly, and in one day gain control of this entire continent. It is said, “If he comes from the East, the destruction will not be so bad. But if he comes from the West, do not get up on your housetops to see because he will have no mercy.”

The True White Brother will bring with him two great, intelligent and powerful helpers, one of whom will have a sign of a swastika (a masculine symbol of purity), and the sign of the sun. The second great helper will have the sign of a celtic cross with red lines (representing female life blood) between the arms of the cross.

When the Great Purification is near, these helpers will shake the earth first for a short time in preparation. After they shake the earth two times more, they will be joined by the True White Brother, who will become one with them and bring the Purification Day to the world. All three will help the “younger brother” (the Hopi and other pure-hearted people) to make a better world. In the prophecies, the two helpers are designated by the Hopi word for “population,” as if they were large groups of people.

The Hopi were warned that if these three great beings failed, terrible evil would befall the world and great numbers of people would be killed. However, it was said that they would succeed if enough Hopi remained true to the ancient spirit of their people. The True White Brother and his helpers will show the people of earth a great new life plan that will lead to everlasting life. The earth will become new and beautiful again, with an abundance of life and food. Those who are saved will share everything equally. All races will intermarry and speak one tongue and be a family.

Hopi prophecy states that World War III will be started by the people who first received the Light — China, Palestine, India and Africa. When the war comes, the United States will be destroyed by “gourds of ashes” which will fall to the ground, boiling the rivers and burning the earth, where no grass will grow for many years, and causing a disease that no medicine can cure. This can only mean nuclear or atomic bombs; no other weapon causes such effects. Bomb shelters will be useless, for “Those who are at peace in their hearts already are in the Great Shelter of Life. There is no shelter for evil. When the Saquahuh (blue Star) Kachina dances in the plaza and removes his mask, the time of the great trial will be here.” The Hopi believe that only they will be saved.

The Hopi also have prophesied that “Turtle Island could turn over two or three times and the oceans could join hands and meet the sky.” This seems to be a prophecy of a “pole shift” — a flipping, of the planet on its axis. The Hopi call this imminent condition — and that of society today — “Koyaanisqatsi”, which means “world out of balance…a state of life that calls for another way. ”

The following extraordinary Hopi prophecy was first published in a mimeographed manuscript that circulated among several Methodist and Presbyterian churches in 1959. Some of the prophecies were published in 1963 by Frank Waters in The Book of the Hopi. The account begins by describing how, while driving along a desert highway one hot day in the summer of 1958, a minister named David Young stopped to offer a ride to an Indian elder, who accepted with a nod. After riding in silence for several minutes, the Indian said:

“I am White Feather, a Hopi of the ancient Bear Clan. In my long life I have traveled through this land, seeking out my brothers, and learning from them many things full of wisdom. I have followed the sacred paths of my people, who inhabit the forests and many lakes in the east, the land of ice and long nights in the north, and the places of holy altars of stone built many years ago by my brothers’ fathers in the south. From all these I have heard the stories of the past, and the prophecies of the future. Today, many of the prophecies have turned to stories, and few are left — the past grows longer, and the future grows shorter.

“And now White Feather is dying. His sons have all joined his ancestors, and soon he too shall be with them. But there is no one left, no one to recite and pass on the ancient wisdom. My people have tired of the old ways — the great ceremonies that tell of our origins, of our emergence into the Fourth World, are almost all abandoned, forgotten, yet even this has been foretold. The time grows short.

“My people await Pahana, the lost White Brother, [from the stars] as do all our brothers in the land. He will not be like the white men we know now, who are cruel and greedy. we were told of their coming long ago. But still we await Pahana.

“He will bring with him the symbols, and the missing piece of that sacred tablet now kept by the elders, given to him when he left, that shall identify him as our True White Brother.

“The Fourth World shall end soon, and the Fifth World will begin. This the elders everywhere know. The Signs over many years have been fulfilled, and so few are left.

“This is the First Sign: We are told of the coming of the white-skinned men, like Pahana, but not living like Pahana men who took the land that was not theirs. And men who struck their enemies with thunder.

“This is the Second Sign: Our lands will see the coming of spinning wheels filled with voices. In his youth, my father saw this prophecy come true with his eyes — the white men bringing their families in wagons across the prairies.”

“This is the Third Sign: A strange beast like a buffalo but with great long horns, will overrun the land in large numbers. These White Feather saw with his eyes — the coming of the white men’s cattle.”

“This is the Fourth Sign: The land will be crossed by snakes of iron.”

“This is the Fifth Sign: The land shall be criss-crossed by a giant spider’s web.”

“This is the Sixth sign: The land shall be criss-crossed with rivers of stone that make pictures in the sun.”

“This is the Seventh Sign: You will hear of the sea turning black, and many living things dying because of it.”

“This is the Eight Sign: You will see many youth, who wear their hair long like my people, come and join the tribal nations, to learn their ways and wisdom.

“And this is the Ninth and Last Sign: You will hear of a dwelling-place in the heavens, above the earth, that shall fall with a great crash. It will appear as a blue star. Very soon after this, the ceremonies of my people will cease.

“These are the Signs that great destruction is coming. The world shall rock to and fro. The white man will battle against other people in other lands — with those who possessed the first light of wisdom. There will be many columns of smoke and fire such as White Feather has seen the white man make in the deserts not far from here. Only those which come will cause disease and a great dying. Many of my people, understanding the prophecies, shall be safe. Those who stay and live in the places of my people also shall be safe. Then there will be much to rebuild. And soon — very soon afterward — Pahana will return. He shall bring with him the dawn of the Fifth World. He shall plant the seeds of his wisdom in their hearts. Even now the seeds are being planted. These shall smooth the way to the Emergence into the Fifth World.

“But White Feather shall not see it. I am old and dying. You — perhaps will see it. In time, in time…”

The old Indian fell silent. They had arrived at his destination, and Reverend David Young stopped to let him out of the car. They never met again. Reverend Young died in 1976, so he did not live to see the further fulfillment of this remarkable prophecy.

The signs are interpreted as follows: The First Sign is of guns. The Second Sign is of the pioneers’ covered wagons. The Third Sign is of longhorn cattle. The Fourth Sign describes the railroad tracks. The Fifth Sign is a clear image of our electric power and telephone lines. The Sixth Sign describes concrete highways and their mirage-producing effects. The Seventh Sign foretells of oil spills in the ocean. The Eighth Sign clearly indicates the “Hippy Movement” of the 1960s. The Ninth Sign was the U.S. Space Station Skylab, which fell to Earth in 1979. According to Australian eye-witnesses, it appeared to be burning blue.

Another Hopi prophecy warns that nothing should be brought back from the Moon — obviously anticipating the Apollo 11 mission that returned with samples of lunar basalt. It this was done, the Hopi warned, the balance of natural and universal laws and forces would be disturbed, resulting in earthquakes, severe changes in weather patterns, and social unrest. All these things are happening today, though of course not necessarily because of Moon rocks.

The Hopi also predicted that when the “heart” of the Hopi land trust is dug up, great disturbances will develop in the balance of nature, for the Hopi holy land is the microcosmic image of the entire planet; any violations of nature in the Four Corners region will be reflected and amplified all over the Earth.

In 1959, a six-man delegation of traditional Hopi leaders led by the late spiritual leader, Dan Katchongva, traveled to the United Nations Building in New York to fulfill a sacred mission in accordance with ancient Hopi instructions. Because of their prophetic knowledge, the Hopi leaders felt it was time to go east to the edge of their motherland, where “a house of mica” [The United Nations building] would stand at this time, where Great Leaders from many lands would be gathered to help any people who are in trouble.”

They were to go when the motherland of the Hopi and other Indian brothers were about to be taken away from them and their way of life was in danger of being completely destroyed by evil ones among the White Men and by some other Indian brothers who were influenced by the White Race. This is a clear and present danger: the betrayal of Indian-U.S.A. treaties, land sales, and coal and uranium mining are destroying the Hopi land and its people — and all other peoples and lands, in eventual effect…

According to prophecy, at least one, two or three leaders or nations would hear and understand the Hopi warnings, as “It is told that they too should know these ancient instructions”. Upon hearing the message of the Hopi, they would act immediately to correct many wrongs being done to the chosen race — the Red Man who was granted permission to hold in trust all land and life for the Great Spirit. This prophecy would seem to have failed. Hopi prophecy also declares that the doors of the “Glass House” would be closed to them. This was the case at first, though they have delivered their message to the United Nations Assembly since then:

“When the Great Leaders in the Glass House refuse to open the door to you when you stand before it that day, [Repeated, again in 1993] do not be discouraged or turn about on the path you walk, but take courage, determination, and be of great rejoicing in your hearts, for on that day the White Race who are on your land with you have cut themselves from you and thereon lead themselves to the Greatest Punishment at the Day of Purification. Many shall be destroyed for their sins and evil ways. The Great Spirit has decreed it and no one can stop it, change it, or add anything to it. It shall be fulfilled!”

On August 7, 1970, a spectacular UFO sighting was witnessed by dozens of people and photographed by Chuck Roberts of the Prescott (Arizona)”Courier”. This sighting occurred after a “UFO calling” by Paul Solem and several Hopi Indians. This sighting was interpreted by some Hopis as being a partial fulfillment of a certain Hopi prophecy given by the Great Spirit Maasau and inscribed on Second Mesa, warning of the coming of Purification Day, when the true Hopi will be flown to other planets in “ships without wings.”

Hopi prophecy also tells us that there will be a mass migration of Indians northward from Mexico and Central and South America. The migration will be led by a 130-year old Indian named Etchata Etchana. The movement will come after the huge fire and explosion that will herald the advent of the True White Brother.

According to Hopi belief, the survivors of the Great Deluge thousands of years ago split up into four groups that moved north, south, east and west. Only one group completed their journey — to the North Pole and back — under the guidance of a brilliant “star” in which the Great Spirit Maasau traveled. When he landed, he drew a petroglyph on Second Mesa, showing a maiden (with the traditional “butterfly” hair arrangement) riding in a wingless, dome-shaped craft. The petroglyph signified the coming Day of Purification when the true Hopi will fly to other planets in “ships without wings.”

The prophecy also warns that there will be three divisions among the Hopi The first division was in 1906 between the Traditionalists and the Modernists. The Traditionalists were forced to leave Oraibi and move to Hotevilla. The second division took place in the wake of the spectacular appearance of UFOs in August, 1970.

PROPHECY ROCK

Drawing pf Prophecy Rock

Near Oraibi, Arizona, there is a petroglyph known as Prophecy Rock which symbolizes many Hopi prophecies. Its interpretation is:

The large human figure on the left is the Great Spirit. The bow in his left hand represents his instructions to the Hopi to lay down their weapons. The vertical line to the right of the Great Spirit is a time scale in thousands of years. The point at which the great Spirit touches the line is the time of his return.

The “life path” established by the Great Spirit divides into the lower, narrow path of continuous Life in harmony with nature and the wide upper road of white man’s scientific achievements. The bar between the paths, above the cross, is the coming of white men; the Cross is that of Christianity. The circle below the cross represents the continuous Path of Life.

The four small human figures on the upper road represent, on one level, the past three worlds and the present; on another level, the figures indicate that some of the Hopi will travel the white man’s path, having been seduced by its glamour.

The two circles on the lower Path of Life are the “great shaking of the earth” (World Wars One and Two). The swastika in the sun and the Celtic cross represent the two helpers of Pahana, the True White Brother.

The short line that returns to the straight Path of Life is the last chance for people to turn back to nature before the upper road disintegrates and dissipates. The small circle above the Path of Life, after the last chance, is the Great Purification, after which corn will grow in abundance again when the Great Spirit returns. And the Path of Life continues forever…

The Hopi shield in the lower right corner symbolizes the Earth and the Four-Corners area where the Hopi have been reserved. The arms of the cross also represent the four directions in which they migrated according to the instructions of the Great Spirit.

The dots represent the four colors of Hopi corn, and the four racial colors of humanity.

 

 

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

Most of us don’t think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history. The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that the despots and dictators of the past could only dream of.

Previous generations never had to deal with “pre-crime” surveillance cameras that use body language to spot criminals or unmanned drones watching them from far above. Previous generations would have never even dreamed that street lights and refrigerators might be spying on them. Many of the incredibly creepy surveillance technologies that you are about to read about are likely to absolutely astound you. We are rapidly heading toward a world where there will be no such thing as privacy anymore. Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you. The world is changing at a breathtaking pace, and a lot of the changes are definitely not for the better.

The following are 14 incredibly creepy surveillance technologies that Big Brother will be using to watch you….

#1 “Pre-Crime” Surveillance Cameras

A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime.

Does that sound insane?

Well, authorities are taking this technology quite seriously. In fact, dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.

#2 Capturing Fingerprints From 20 Feet Away

Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?

This kind of technology is actually already here according to POPSCI….

Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.

Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.

#3 Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American cops are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).

These pornoscannerwagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

You can see a YouTube video presentation about this new technology right here.

#4 Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind. The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore. But obviously the potential for abuse with this kind of technology is extraordinary. The following is from a recent article by Dick Pelletier….

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We’re friends, not enemies.

Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people’s minds so that they didn’t want to kill anymore.

Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship.

Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person’s notion of groups and identities; even inspiring them to commit violence. See DARPA proposal request HERE.

#5 Unmanned Drones In U.S. Airspace

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies “before they jump into the pool,” said John Appleby, a manager in the DHS Science and Technology Directorate’s division of borders and maritime security.

The fact that very few Americans seem concerned about this development says a lot about where we are as a nation. The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

#6 Law Enforcement Using Your Own Cell Phone To Spy On You

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year….

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that show that cell phone radiation is harmful to humans.

#7 Biometric Databases

All over the globe, governments are developing massive biometric databases of their citizens. Just check out what is going on in India….

In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.

#8 RFID Microchips

In a previous article, I detailed how the U.S. military is seeking to develop technology that would enable it to monitor the health of our soldiers and improve their performance in battle using RFID microchips.

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

Now, one school system down in Texas actually plans to start using RFID microchips to track the movements of their students….

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

#9 Automated License Plate Readers

In a previous article, I quoted a Washington Post piece that talked about how automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

#10 Face Reading Software

Can computers tell what you are thinking just by looking at your face?

Don’t laugh.

Such technology is actually being actively developed. The following is from a recent NewScientist article….

IF THE computers we stare at all day could read our faces, they would probably know us better than anyone.

That vision may not be so far off. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better adverts.

#11 Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining“, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

#12 Street Lights Spying On Us?

Did you ever consider that street lights could be spying on you?

Well, it is actually happening. New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities. The following is from a recent article by Paul Joseph Watson for Infowars.com….

Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

#13 Automated ISP Monitoring Of Your Internet Activity

As I have written about before, nothing you do on the Internet is private. However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.

Specifically, they’re coming for you on Thursday, July 12.

That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.

Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.

Spying On Us Through Our Appliances

Could the government one day use your refrigerator to spy on you?

Don’t laugh.

That is exactly what CIA Director David Petraeus says is coming….

Petraeus says that web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ said Petraeus.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously ‘dumb’ home appliances such as fridges, ovens and lighting systems.

For many more ways that Big Brother is spying on you, please see these articles….

Every Breath You Take, Every Move You Make – 14 New Ways That The Government Is Watching You

30 Signs That The United States Of America Is Being Turned Into A Giant Prison

The things that I have written about above are just the things that they admit to.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

So how far will all of this go?

Has Big Brother already gone way too far?

Please feel free to post a comment with your opinion below….

Source: The American Dream

Gluten – The Hidden Killer

Gluten – The Hidden Killer

In the 1920s, the US government found that animals fed a diet of white flour developed serious neurological diseases and died. Instead of banning this deadly product like they should have, the FDA declared that most white flour products must be “enriched” with iron and a few vitamins to “correct” the problem. Unfortunately, this decision has helped create an even more insidious situation that results in diabetes, heart disease and cancer for millions of people.

Gluten sensitivity

Gluten sensitivity is becoming a raging epidemic today. Gluten sensitivity is not a disease and therefore has no cure. Gluten sensitivity is triggered by eating products containing gluten. The only way to avoid its complications is to stay away from food products containing gluten.

There are 35 diseases that can be caused by eating gluten listed in a review in the New England Journal of Medicine. Some of these symptoms are: arthritis, ADHD, depression, anxiety, IBS, lupus, frequent headaches, fatigue, eczema, loss of muscle coordination, osteoporosis, a weakened immune system, fungal overgrowth, organ inflammation, weight loss/weight gain, and malnutrition.

Gluten sensitivity increases your risk for type 1 diabetes, obesity, gastrointestinal cancers, brain disorders, autism and thyroid disease.

Gluten evils and woes

Gluten is purposefully put in some products because it increases hunger signals to make you eat more of a product by increasing the ghrelin in the digestive tract to enhance feelings of hunger – leaving you hungry for more of that product. Gluten also interferes with leptin which tells your brain you’re full and signals fat to break down. Leptin also normalizes pain sensations in the spinal cord.

• Gluten sensitivity causes inflammation that harms the body tissues by causing an autoimmune response where the immune system ends up attacking the body
• C-reactive proteins rise in response to inflammation; causing cholesterol levels to shoot up and calcium deposits to harden the arteries and blood pressure rise
• Sugar cannot fuel cancer cells by itself. Gluten and the amino acid glutamine have been studied and found to play a critical role in the cancer process.
• Gluten is an excitotoxin; which agitates and kills neuronal cells which like glutamate (think MSG), accelerates, activates, irritates and damages brain cells. A 2006 study took 131 children with ADHD and removed gluten from their diets and all 131 children were reported to have significant improvements.
• Gluten can be broken down into strange proteins that are a lot like psychedelic drugs. These are opium-like proteins are called gluteomorophins (think Autism and Manic Depressive Disorder).
• With gluten, the N Methyl D Aspartate receptors cause spinal cord neurons to become hyper to touch. Leptin in the spinal cord normalizes pain perception and gluten interferes with that process (think fibromyalgia).
University of California put people on a “Paleolithic” diet, their blood pressure dropped along with blood insulin levels. Good cholesterol went up and bad cholesterol went down – in just 10 days!
• Gluten sensitivity causes you to miss out on your fat soluble vitamins like vitamin D and K
• Eating gluten has now been related to bone density problems (think osteoporosis)

Solution: STOP EATING GLUTEN!

Gluten affects everyone negatively, some effects are very evident now but most of them are sub-clinical and will not show up for years. When disease does finally manifest, the connection to gluten will be overlooked or denied. Gluten-free is a lifestyle choice for health of body and mind. If we choose a gluten-free lifestyle for obvious health reasons, we are intentionally avoiding trouble both now and in the future.

Sources for this article

http://www.celiac.com/
CHRONIC ACQUIRED IRON OVERLOAD-A DISEASE OF CIVILIZATION. Lawrence Wilson, MD. s.l. : The Center for Development, 2011.
http://digestive.niddk.nih.gov/ddiseases/pubs/celiac/