Attention Activists: Your Phone May Not Be Safe at Protests

Attention Activists: Your Phone May Not Be Safe at Protests

Ever wondered why your cell phone reception suddenly becomes terrible at protests? Ever worried that police could use electronic spoofing devices to suck up your mobile data because you are in the streets exercising your rights?

You might have been onto something.

Mobile “IMSI catchers”, currently on the market and being pushed to police and intelligence agencies worldwide, enable these creepy, stealth spying tactics. And if they build it and hawk it, history tells us police will buy it and deploy it.

On Tuesday, July 3, 2012, electronic privacy advocate and technology researcher Chris Soghoian tweeted a link to a photograph of a talk he gave at TED in Scotland in late June. Behind him in the photograph is another image, this one taken by privacy researcher Eric King at a surveillance trade show. (King’s Twitter bio contains a quote from a representative of the notorious ISS World — a global surveillance trade firm that often hosts such trade shows: the rep called him an “Anti-lawful interception zealot blogger.” High praise.)

Look at the slide behind Soghoian; that’s the photo in question. It shows an IMSI catcher strapped onto a model, under the model’s shirt.

IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.

As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.

Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.

Here’s a creepy video that a purveyor of IMSI catchers made to advertise its product:

Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.

Police in the United States claim they do not need a warrant to use an IMSI catcher or other spoofing device to track your location. A case to determine whether or not the courts agree is working itself through the system.

Privacy International’s Eric King took the photo on the slide behind Soghoian at a surveillance trade show, where he says the tool was “pitched to me as being perfect for covert operations in public order situations.” In other words, at protests. 

 

The FBI uses IMSI catchers and claims it does so legally, even though it says it doesn’t need a warrant to deploy them. The Electronic Privacy Information Center is currently pursuing FOIA litigation to find out exactly how the bureau uses the “Stingray” (a brand name IMSI catcher); unsurprisingly, the FBI wasn’t forthcoming with documents to reveal its legal standard or other information about how it uses the tool. Stay tuned for more information as that case makes its way through the courts.

Meanwhile, how can you protect yourself against IMSI catchers? Unfortunately, you probably can’t. And the threats are not just from government. As Soghoian and others warned in a friend of the court brief,

Finally, the communications privacy of millions of law-abiding Americans is already threatened by the use of this and similar interception technologies by non-US government entities, such as stalkers, criminals, and foreign governments engaged in espionage. As such, the public interest is best served by greater public discussion regarding these tracking technologies and the security flaws in the mobile phone networks that they exploit, not less.

Yet again, we are faced with a situation in which our technology has outpaced our law reform. It’s time for Congress to change that.


To get a more detailed sense of how the technology actually works, watch this excellent talk from DefCon 2011, with Chris Paget: “Practical Cellphone Spying”. He spoofs the phones of the people in the audience during the talk; it’s well worth watching if you have some time.

 

For more on IMSI catchers and the state of the law, click here.

 

SOURCE: PrivacySOS

Raytheon Awarded $636 Million for Exoatmospheric Kill Vehicle

Raytheon Awarded $636 Million for Exoatmospheric Kill Vehicle

Just what we need.. Another flying death robot.. in space.   -DCMX Editor

Raytheon Company (NYSE: RTN) was awarded a $636 million development and sustainment contract to provide the Exoatmospheric Kill Vehicle to The Boeing Company, which is the prime contractor for the Ground-based Midcourse Defense program. Raytheon booked the award during its second quarter.

EKV represents the centerpiece for the Missile Defense Agency’s GMD as the intercept component of the Ground Based Interceptor, also known as GBI, which is designed to engage high-speed ballistic missile warheads in space.

“When it comes to developing, testing and deploying technologies that enable the intercept of threats in space, Raytheon is a world leader,” said Dr. Taylor W. Lawrence, Raytheon Missile Systems president. “We are proud to contribute to our nation’s first line of defense against the threat of ballistic missiles.”

Under conditions of the contract, which extends through November 2018, Raytheon will provide EKV development, fielding, testing, system engineering, integration, configuration management, equipment manufacturing and refurbishment, and operation and sustainment.

About the EKV
Leveraging more than two decades of kill vehicle technology expertise, the EKV is designed to destroy incoming ballistic missile threats by colliding with them, a concept often described as “hit to kill.”

EKV has an advanced multi-color sensor that is used to detect and discriminate incoming warheads from other objects.

The EKV also has its own propulsion, communications link, discrimination algorithms, guidance and control system and computers to support target selection and intercept.

EKV is deployed and operational today.

EKV has had eight successful intercepts throughout the life of the program.

Source : Raytheon Corporation (NYSE: RTN)

Poisoned: Who Killed Former Palestinian Leader Yasser Arafat?

Poisoned: Who Killed Former Palestinian Leader Yasser Arafat?

Now we know he was poisoned – but by whom?

Yasser Arafat died on November 11, 2004, of a mysterious ailment. His enemies spread the rumor he had AIDS: David Frum, with typical classiness, claimed he had contracted AIDS as a consequence of having sex with his bodyguards. Now, however, it has been revealed Arafat was poisoned: the cause of his death was exposure to very high levels of polonium-210 [pdf], a rare radioactive substance. An investigation conducted by Al Jazeera showed Arafat’s personal items, released to the media organization by his widow, contained several times the normal level of polonium that would normally be detected on such items. The Palestinian leader’s terminal symptoms were similar to those experienced by victims of polonium poisoning: the substance targets the gastrointestinal tract and the subject wastes away.

Arafat’s Ramallah compound had been bombed several times by the Israelis, and they had the place surrounded – yet still he persisted. They couldn’t get him out. Worse, his plight was becoming a metaphor for the condition of his people, who were – and still are – prisoners in their own land. A former adviser claimed he was poisoned by the Israelis, who detained the Palestinian ambulance used to deliver Arafat’s medications to the Ramallah compound. At the time, one tended to write this off as a purely polemical exercise: in light of the new evidence, however, the question has to be asked.

Simply by continuing to exist in the face of such a sustained assault, Arafat was defeating the Israelis every day. They had to get rid of him. Did they? We’ll never know for sure, but it is worth noting that Israeli threats to kill him preceded his untimely death by less than a year. As is well-known, Israeli intelligence has carried out numerous assassinations: it is simply another tool in their international operations, one they have never hesitated to utilize. A passport-falsification scheme involving New Zealand, Britain, France, Spain, and a number of other countries was widely believed to have been meant to equip the Mossad’s crack team of assassins, who could slip into – and out of – target areas at will.

The Israelis hated Arafat with a particular passion, for two reasons:

1) His longevity – The Palestinian movement is thick [pdf] with factions, but thin when it comes to recognizable leaders. Arafat was the principal leader, and no one since his death has achieved his stature. He was a political survivor, having lived through numerous assassination attempts, and deflected the schemes of internal enemies to displace him. Simply by sticking around for so long, he became a living symbol of the Palestinian struggle for self-determination – and that is one big reason why the Israelis got rid of him.

2) His secularism – The Israelis encouraged the growth of groups such as Hamas in the beginning, in order to split away the more religious elements from the decidedly secular Palestine Liberation Organization/Fatah, which Arafat headed. It is easy to sell the Palestinians as crazed jihadists when a group like Hamas or Islamic Jihad is the most visible champion of their cause: the secular PLO presented the Israelis with a public relations problem. There’s another reason for the Israelis to have knocked him off.

One aspect of this case is extremely odd: polonium-210 is the same poison Alexander Litvinenko was dosed with. Litvinenko, a former KGB official, converted to Islam, joined the Chechen rebels, and became an associate of Boris Berezovsky, the notorious Russian oligarch wanted on charges of embezzlement in his home country. Litvinenko and Berezovsky are the Russian version of 9/11 Truthers: they believe practically every terrorist attack on Russian cities has been “staged” by Vladimir Putin in order to keep him in power. When he became ill, Litvinenko charged the Russian spy agency with poisoning him – although that seems highly unlikely.

Polonium-210 isn’t something you can buy off the shelf at your local Walmart. It isn’t even something a mad scientist might cook up in his home lab. About 100 grams are produced each year for specialized technical uses. The only entities with access to this sort of thing are state actors, or, at least, a private organization with very substantial resources at its disposal.

What’s interesting is that a diplomatic cable, dated Dec. 26, 2006 and published by WikiLeaks, details the conversation of a US diplomat with Russian spook Anatoly Safonov in which Safonov claims the Russians told the British about the importation of “nuclear materials” into London during the Litvinenko affair – and were told that the whole thing was “under control before the poisoning took place.” In the course of the same conversation, Safonov – Putin’s chief representative on terrorism-related matters – went on to describe a number of threats and their possible sources:

Safonov noted the daunting number of countries that posed particular terrorism threats, mentioning North Korea, Pakistan, South Africa, Libya, Iran, India, and Israel (sic?). He described a range of dangers, stressing the more immediate threats posed by nuclear and biological terrorism, but also acknowledging the risks of chemical terrorism.”

While the use of “sic” is meant to indicate our diplomat’s incredulity at the inclusion of Israel in this list, what we now know about how Arafat died should tear away the blinders from several sets of eyes – yes, even at the US State Department.

NOTES IN THE MARGIN

I note with sadness and a real sense of loss the departure of Scott Horton, the host of Antiwar.com Radio, from our staff. We wanted to keep him on, but we just couldn’t afford him anymore. Times are tough, but this is a big blow: Scott’s interviews with the Big Names in the foreign policy universe are always informed, and in his inimitable style he always laced his programs with humor and a keen intelligence. I can’t even begin to tell you how much he will be missed, ­ but that’s life these days, unfortunately.

SOURCE: AntiWar.com

Documentary: The Power of Nightmares – Organized Terrorism a Tool of Global Control?

Documentary: The Power of Nightmares – Organized Terrorism a Tool of Global Control?

Should we be worried about the threat from organised terrorism or is it simply a phantom menace being used to stop society from falling apart?

In the past our politicians offered us dreams of a better world. Now they promise to protect us from nightmares.

The most frightening of these is the threat of an international terror network. But just as the dreams were not true, neither are these nightmares.

In a new series, the Power of Nightmares explores how the idea that we are threatened by a hidden and organised terrorist network is an illusion.

It is a myth that has spread unquestioned through politics, the security services and the international media.

THE POWER OF NIGHTMARES
Three part series
Tuesday, 18 January, 2005
2320 GMT on BBC Two

At the heart of the story are two groups: the American neo-conservatives and the radical Islamists.

Both were idealists who were born out of the failure of the liberal dream to build a better world.

These two groups have changed the world but not in the way either intended.

Thoe with the darkest fears became the most powerful

Together they created today’s nightmare vision of an organized terror network.

A fantasy that politicians then found restored their power and authority in a disillusioned age. Those with the darkest fears became the most powerful.

The rise of the politics of fear begins in 1949 with two men whose radical ideas would inspire the attack of 9/11 and influence the neo-conservative movement that dominates Washington.

Both these men believed that modern liberal freedoms were eroding the bonds that held society together.

The two movements they inspired set out, in their different ways, to rescue their societies from this decay. But in an age of growing disillusion with politics, the neo-conservatives turned to fear in order to pursue their vision.

They would create a hidden network of evil run by the Soviet Union that only they could see.

The Islamists were faced by the refusal of the masses to follow their dream and began to turn to terror to force the people to “see the truth”‘.

The Power of Nightmares will be broadcast over three nights from Tuesday 18 to Thursday, 20 January, 2005 at 2320 GMT on BBC Two. The final part has been updated in the wake of the Law Lords ruling in December that detaining foreign terrorist suspects without trial was illegal.

The Multiple Ways Monsanto is Putting Normal Seeds Out of Reach

The Multiple Ways Monsanto is Putting Normal Seeds Out of Reach

People say if farmers don’t want problems from Monsanto, just don’t buy their GMO seeds.

Not so simple. Where are farmers supposed to get normal seed these days? How are they supposed to avoid contamination of their fields from GM-crops? How are they supposed to stop Monsanto detectives from trespassing or Monsanto from using helicopters to fly over spying on them?

Monsanto contaminates the fields, trespasses onto the land taking samples and if they find any GMO plants growing there (or say they have), they then sue, saying they own the crop. It’s a way to make money since farmers can’t fight back and court and they settle because they have no choice.

And they have done and are doing a bucket load of things to keep farmers and everyone else from having any access at all to buying, collecting, and saving of NORMAL seeds.

1.  They’ve bought up the seed companies across the Midwest.

2.  They’ve written Monsanto seed laws and gotten legislators to put them through, that make cleaning, collecting and storing of seeds so onerous in terms of fees and paperwork and testing and tracking every variety and being subject to fines, that having normal seed becomes almost impossible (an NAIS approach to wiping out normal seeds). Does your state have such a seed law? Before they existed, farmers just collected the seeds and put them in sacks in the shed and used them the next year, sharing whatever they wished with friends and neighbors, selling some if they wanted. That’s been killed.

In Illinois, which has such a seed law, Madigan, the Speaker of the House, his staff is Monsanto lobbyists.

3.  Monsanto is pushing anti-democracy laws (Vilsack’s brainchild, actually) that remove community’ control over their own counties so farmers and citizens can’t block the planting of GMO crops even if they can contaminate other crops. So if you don’t want a GM-crop that grows industrial chemicals or drugs or a rice growing with human DNA in it, in your area and mixing with your crops, tough luck.

Check the map of just where the Monsanto/Vilsack laws are and see if your state is still a democracy or is Monsanto’s. A farmer in Illinois told me he heard that Bush had pushed through some regulation that made this true in every state. People need to check on that.

4.  For sure there are Monsanto regulations buried in the FDA right now that make a farmer’s seed cleaning equipment illegal (another way to leave nothing but GM-seeds) because it’s now considered a “source of seed contamination.” Farmer can still seed clean but the equipment now has to be certified and a farmer said it would require a million to a million and half dollar building and equipment … for EACH line of seed. Seed storage facilities are also listed (another million?) and harvesting and transport equipment. And manure. Something that can contaminate seed. Notice that chemical fertilizers and pesticides are not mentioned.

You could eat manure and be okay (a little grossed out but okay). Try that with pesticides and fertilizers. Indian farmers have. Their top choice for how to commit suicide to escape the debt they have been left in is to drink Monsanto pesticides.

5.  Monsanto is picking off seed cleaners across the Midwest. In Pilot Grove, Missouri, in Indiana (Maurice Parr), and now in southern Illinois (Steve Hixon). And they are using US marshals and state troopers and county police to show up in three cars to serve the poor farmers who had used Hixon as their seed cleaner, telling them that he or their neighbors turned them in, so across that 6 county areas, no one talking to neighbors and people are living in fear and those farming communities are falling apart from the suspicion Monsanto sowed. Hixon’s office got broken into and he thinks someone put a GPS tracking device on his equipment and that’s how Monsanto found between 200-400 customers in very scattered and remote areas, and threatened them all and destroyed his business within 2 days.

So, after demanding that seed cleaners somehow be able to tell one seed from another (or be sued to kingdom come) or corrupting legislatures to put in laws about labeling of seeds that are so onerous no one can cope with them, what is Monsanto’s attitude about labeling their own stuff? You guessed it – they’re out there pushing laws against ANY labeling of their own GM-food and animals and of any exports to other countries. Why?

We know and they know why.

As Norman Braksick, the president of Asgrow Seed Co. (now owned by Monsanto) predicted in the Kansas City Star (3/7/94) seven years ago, “If you put a label on a genetically engineered food, you might as well put a skull and crossbones on it.”

And they’ve sued dairy farmers for telling the truth about their milk being rBGH-free, though rBGH is associated with an increased risk of breast, colon and prostate cancers.

I just heard that some seed dealers urge farmers to buy the seed under the seed dealer’s name, telling the farmers it helps the dealer get a discount on seed to buy a lot under their own name. Then Monsanto sues the poor farmer for buying their seed without a contract and extorts huge sums from them.

Here’s a youtube video that is worth your time. Vandana Shiva is one of the leading anti-Monsanto people in the world. In this video, she says (and this video is old), Monsanto had sued 1500 farmers whose fields had simply been contaminated by GM-crops. Listen to all the ways Monsanto goes after farmers.

Do you know the story of Gandhi in India and how the British had salt laws that taxed salt? The British claimed it as theirs. Gandhi had what was called a Salt Satyagraha, in which people were asked to break the laws and march to the sea  and collect the salt without paying the British. A kind of Boston tea party, I guess.

Thousands of people marched 240 miles to the ocean where the British were waiting. As people moved forward to collect the salt, the British soldiers clubbed them but the people kept coming. The non-violent protest exposed the British behavior, which was so revolting to the world that it helped end British control in India.

Vandana Shiva has started a Seed Satyagraha – nonviolent non-cooperation around seed laws – has gotten millions of farmers to sign a pledge to break those laws.

American farmers and cattlemen might appreciate what Gandhi fought for and what Shiva is bringing back and how much it is about what we are all so angry about – loss of basic freedoms. [The highlighting is mine.]

 

The Seed Satyagraha is the name for the nonviolent, noncooperative movement that Dr. Shiva has organized to stand against seed monopolies. According to Dr. Shiva, the name was inspired by Gandhi’s famous walk to the Dandi Beach, where he picked up salt and said, “You can’t monopolize this which we need for life.” But it’s not just the noncooperation aspect of the movement that is influenced by Gandhi. The creative side saving seeds, trading seeds, farming without corporate dependence–without their chemicals, without their seed.

” All this is talked about in the language that Gandhi left us as a legacy. We work with three key concepts.”

” (One) Swadeshi…which means the capacity to do your own thing–produce your own food, produce your own goods….”

“(Two) Swaraj–to govern yourself. And we fight on three fronts–waterfood, and seed. JalSwaraj is water independence–water freedom and water sovereignty. Anna Swaraj is food freedom, food sovereignty. And Bija Swaraj is seed freedom and seed sovereignty. Swa means self–that which rises from the self and is very, very much a deep notion of freedom.

“I believe that these concepts, which are deep, deep, deep in Indian civilization, Gandhi resurrected them to fight for freedom. They are very important for today’s world because so far what we’ve had is centralized state rule, giving way now to centralized corporate control, and we need a third alternate. That third alternate is, in part, citizens being able to tell their state, ‘This is what your function is. This is what your obligations are,’ and being able to have their states act on corporations to say, ‘This is something you cannot do.’”

” (Three) Satyagraha, non-cooperation, basically saying, ‘We will do our thing and any law that tries to say that (our freedom) is illegal… we will have to not cooperate with it. We will defend our freedoms to have access to water, access to seed, access to food, access to medicine.’”

SOURCE: SurvivingTheMiddleClassCrash.com

NZ Judge: Raid on Megaupload’s Kim Dotcom Illegal, Search Warrants Unlawful

NZ Judge: Raid on Megaupload’s Kim Dotcom Illegal, Search Warrants Unlawful

Published: 28 June, 2012, 10:15

The High Court of New Zealand has ruled that the police raid on Kim Dotcom’s mansion was unlawful along with seizure of the hard drives that were later cloned and illegally taken from New Zealand to the US by the FBI.

­The warrants issued to search Dotcom’s mansion were general and did not clearly describe the offences they stipulated, ruled Justice Helen Winkelmann.

“They were general warrants, and as such, are invalid,” she explained.

The New Zealand police force is currently holding talks with the Crown Law on the next course of action and has refrained from commenting on the judgment.

The ruling released on Thursday by Justice Helen Winkelmann insists the warrants were too vague concerning the scope of the search and the items authorized to be seized by police.

SOURCE: RT.com

Super Mega Bilderberg Infographic Flowchart of Connected Banks, Politicians, Corporations, Control Groups

Super Mega Bilderberg Infographic Flowchart of Connected Banks, Politicians, Corporations, Control Groups

Click to Enlarge

 

Bilderberg Group

From Wikipedia, the free encyclopedia
Formation 29 May 1954 (58 years ago)
Membership ~150 invitees, smaller core group
Chairman of the Steering Committee Henri de Castries
Website www.bilderbergmeetings.org

The Bilderberg Group, Bilderberg conference, or Bilderberg Club is an annual, unofficial, invitation-only conference of approximately 120 to 140 guests from North America and Western Europe, most of whom are people of influence.[1][2] About one-third are from government and politics, and two-thirds from finance, industry, labour, education and communications. Meetings are closed to the public.

Contents

Origin

The original conference was held at the Hotel de Bilderberg, near Arnhem in the Netherlands, from 29 to 31 May 1954. It was initiated by several people, including Polish politicians Józef Retinger and Andrew Nielsen, concerned about the growth of anti-Americanism in Western Europe, who proposed an international conference at which leaders from European countries and the United States would be brought together with the aim of promoting Atlanticism – better understanding between the cultures of the United States and Western Europe to foster cooperation on political, economic, and defense issues.[3] Retinger approached Prince Bernhard of the Netherlands who agreed to promote the idea, together with former Belgian Prime Minister Paul Van Zeeland, and the head of Unilever at that time, Dutchman Paul Rijkens. Bernhard in turn contacted Walter Bedell Smith, then head of the CIA, who asked Eisenhower adviser Charles Douglas Jackson to deal with the suggestion.[4] The guest list was to be drawn up by inviting two attendees from each nation, one of each to represent conservative and liberal points of view.[3] Fifty delegates from 11 countries in Western Europe attended the first conference, along with 11 Americans.[5]

The success of the meeting led the organizers to arrange an annual conference. A permanent Steering Committee was established, with Retinger appointed as permanent secretary. As well as organizing the conference, the steering committee also maintained a register of attendee names and contact details, with the aim of creating an informal network of individuals who could call upon one another in a private capacity.[citation needed] Conferences were held in France, Germany, and Denmark over the following three years. In 1957, the first US conference was held on St. Simons Island, Georgia, with $30,000 from the Ford Foundation. The foundation supplied further funding for the 1959 and 1963 conferences.[4]

Role

The role of the Bilderberg meetings in the flow of events since its founding in 1954 is a matter of debate among scholars and journalists, such as G. William Domhoff and Caroline Moorehead. In his 1980 essay The Bilderberg and the West, researcher Peter Thompson argues that the Bilderberg group is a meeting ground for top executives from the world’s leading multinational corporations and top national political figures to consider jointly the immediate and long-term problems facing the West. According to Thompson, Bilderberg itself is not an executive agency. However, when Bilderberg participants reach a form of consensus about what is to be done, they have at their disposal powerful transnational and national instruments for bringing about what it is they want to come to pass. That their consensus design is not always achieved is a reflection of the strength of competing resisting forces outside the capitalist ruling class and within it.[6]

Organizational structure

Meetings are organized by a steering committee with two members from each of approximately 18 nations.[7] Official posts, in addition to a chairman, include an Honorary Secretary General.[8] There is no such category in the group’s rules as a “member of the group”. The only category that exists is “member of the Steering Committee”.[9] In addition to the committee, there also exists a separate advisory group, though membership overlaps.[10]

Dutch economist Ernst van der Beugel became permanent secretary in 1960, upon Retinger’s death. Prince Bernhard continued to serve as the meeting’s chairman until 1976, the year of his involvement in the Lockheed affair. The position of Honorary American Secretary General has been held successively by Joseph E. Johnson of the Carnegie Endowment, William Bundy of Princeton, Theodore L. Eliot, Jr., former U.S. Ambassador to Afghanistan, and Casimir A. Yost of Georgetown’s Institute for the Study of Diplomacy.[11]

A 2008 press release from the ‘American Friends of Bilderberg’ stated that “Bilderberg’s only activity is its annual Conference. At the meetings, no resolutions are proposed, no votes taken, and no policy statements issued” and noted that the names of attendees were available to the press.[12] The Bilderberg group’s unofficial headquarters is the University of Leiden in the Netherlands.[13]

According to the ‘American Friends of Bilderberg’, the 2008 agenda dealt “mainly with a nuclear free world, cyber terrorism, Africa, Russia, finance, protectionism, US-EU relations, Afghanistan and Pakistan, Islam and Iran“.[12]

Chairmen of the Steering Committee

Participants

Federal Reserve Chairman Ben Bernanke leaving the 2008 Bilderberg Conference

Historically, attendee lists have been weighted towards bankers, politicians, and directors of large businesses.[16]

Heads of state, including Juan Carlos I of Spain and Queen Beatrix of the Netherlands, have attended meetings.[8][17] Prominent politicians from North America and Europe are past attendees. In past years, board members from many large publicly traded corporations have attended, including IBM, Xerox, Royal Dutch Shell, Nokia and Daimler.[8]

The 2009 meeting participants in Greece included: Greek prime minister Kostas Karamanlis; Finnish prime minister Matti Vanhanen;[18] Sweden foreign minister Carl Bildt; United States Deputy Secretary of State James Steinberg; U.S. Treasury Secretary Timothy Geithner; World Bank president Robert Zoellick; European Commission head José Manuel Barroso; Queen Sofia of Spain; and Queen Beatrix of the Netherlands.[19]

In 2009 the group hosted a dinner meeting at Castle of the Valley of the Duchess in Brussels on 12 November to promote the candidacy of Herman Van Rompuy for President of the European Council.[20]

The membership of the Bilderberg group is drawn largely from West European and North American countries.[21] Writing in 1980, policy analyst Holly Sklar noted that, from the 1950s, elites in the West became concerned that the United Nations was no longer controlled by Western powers, and that this concern was expressed in the participant selection process of the Bilderberg group.[21] Sklar also quoted observations from human rights journalist Caroline Moorehead in a 1977 article critical of the Bilderberg group’s membership, who in turn quoted an unnamed member of the group: “No invitations go out to representatives of the developing countries. ‘Otherwise you simply turn us into a mini-United-Nations,’ said one person. And, ‘we are looking for like-thinking people and compatible people. It would be worse to have a club of dopes.'”[16][21] In her article, Moorehead characterized the group as “heavily biased towards politics of moderate conservatism and big business” and claims that the “farthest left is represented by a scattering of central social democrats”.[16]

Recent meetings

Recent meetings:

Privacy

The meeting hotels are inaccessible for any other guest for the full period of the conferences and sentineled by private security staffs as well as by local police authorities. During the Bilderberg Meeting at Vouliagmeni (Greece) in 2009, for instance, the British Guardian reporter Charlie Skelton was arrested twice after having taken pictures of vehicles.[29]

Conspiratorial interpretations of Bilderberg Group activities

According to chairman Étienne Davignon, a major attraction of Bilderberg group meetings is that they provide an opportunity for participants to speak and debate candidly and to find out what major figures really think, without the risk of off-the-cuff comments becoming fodder for controversy in the media.[30] However, partly because of its working methods to ensure strict privacy, the Bilderberg group is accused of conspiracies.[30][31][32][33][34] This outlook has been popular on both extremes of the political spectrum, even if they disagree on what the group wants to do. Some on the left accuse the Bilderberg group of conspiring to impose capitalist domination,[35] while some on the right have accused the group of conspiring to impose a world government and planned economy.[36]

In 2001, Denis Healey, a Bilderberg group founder and, for 30 years, a steering committee member, said: “To say we were striving for a one-world government is exaggerated, but not wholly unfair. Those of us in Bilderberg felt we couldn’t go on forever fighting one another for nothing and killing people and rendering millions homeless. So we felt that a single community throughout the world would be a good thing.”[37] In 2005 Davignon discussed these accusations with the BBC: “It is unavoidable and it doesn’t matter. There will always be people who believe in conspiracies but things happen in a much more incoherent fashion… When people say this is a secret government of the world I say that if we were a secret government of the world we should be bloody ashamed of ourselves.”[34]

In a 1994 report Right Woos Left, published by the Political Research Associates, investigative journalist Chip Berlet argued that right-wing populist conspiracy theories about the Bilderberg group date back as early as 1964 and can be found in Schlafly’s self-published book A Choice, Not an Echo,[38] which promoted a conspiracy theory in which the Republican Party was secretly controlled by elitist intellectuals dominated by members of the Bilderberger group, whose internationalist policies would pave the way for world communism.[39] Also, in August 2010 former Cuban president Fidel Castro wrote an article for the Cuban Communist Party newspaper Granma in which he cited Daniel Estulin’s 2006 book The Secrets of the Bilderberg Club,[40] which, as quoted by Castro, describes “sinister cliques and the Bilderberg lobbyists” manipulating the public “to install a world government that knows no borders and is not accountable to anyone but its own self.”[35]

G. William Domhoff, a research professor in psychology and sociology who studies theories of power,[41] sees the role of international relations forums and social clubs such as the Bilderberg group as a place to share ideas, reach consensus, and create social cohesion within a power elite.[42] He adds that this understanding of forums and clubs such as the Bilderberg group fits with the perceptions of the members of the elite. Domhoff warns progressives against getting distracted by conspiracy theories which demonize and scapegoat such forums and clubs.[42] He argues that the opponents of progressivism in the United States are conservatives within the corporate elite and the Republican Party.[42] It is more or less the same people who belong to forums and clubs such as the Bilderberg group, but it puts them in their most important roles, as capitalists and political leaders, which are visible and therefore easier to fight.[42]

Politico journalist Kenneth P. Vogel reports that it is the “exclusive roster of globally influential figures that has captured the interest of an international network of conspiracists,” who for decades have seen the Bilderberg meetings as a “corporate-globalist scheme”, and are convinced powerful elites are moving the planet toward an oligarchic “new world order”.[43] He goes on to state that these conspiracist’s “populist paranoid worldview”, characterized by a suspicion of the ruling class rather than any prevailing partisan or ideological affiliation, is widely articulated on overnight AM radio shows and numerous Internet websites.[43]

Author James McConnachie comments that conspiracy theorists have a point, but that they fail to communicate it effectively.[44] He argues that the Bilderberg group acts in a manner consistent with a global conspiracy, but does so without the same “degree of nefariousness”, a difference not appreciated by conspiracy theorists, who “tend to see this cabal as outright evil.”[1] McConnachie concludes: “Occasionally you have to give credit to conspiracy theorists who raise issues that the mainstream press has ignored. It’s only recently that the media has picked up on the Bilderbergers. Would the media be running stories if there weren’t these wild allegations flying around?”[1]

Proponents of Bilderberg conspiracy theories in the United States include individuals and groups such as the John Birch Society,[36][45] political activist Phyllis Schlafly,[45] writer Jim Tucker,[46] political activist Lyndon LaRouche,[47] radio host Alex Jones,[1] and politician Jesse Ventura, who made the Bilderberg group a topic of a 2009 episode of his TruTV series Conspiracy Theory with Jesse Ventura.[48][original research?] Non-American proponents include Russian-Canadian writer Daniel Estulin.[49]

See also

References

  1. ^ a b c d BBC News (7 June 2011). Bilderberg mystery: Why do people believe in cabals?. Retrieved 14 June 2011.
  2. ^ “Japan–U.S. Relations—Past, Present and Future”. The Daily Yomiuri. 8 December 1991. “Rockefeller: The idea (of creating the Trilateral Commission) was incorporated in a speech that I made in the spring of 1972 for the benefit of some industrial forums that the Chase held in different cities around Europe,… Then Zbig (Zbig Brzezinski) and I both attended a meeting of the Bilderberg Group … and was shot down in flames. There was very little enthusiasm for the idea. I think they felt that they had a very congenial group, and they didn’t want to have it interfered with by another element that would—I don’t know what they thought, but in any case, they were not in favor.”
  3. ^ a b Hatch, Alden (1962). “The Hôtel de Bilderberg”. H.R.H.Prince Bernhard of the Netherlands: An authorized biography. London: Harrap. ISBN B0000CLLN4. “The idea was to get two people from each country who would give the conservative and liberal slant”
  4. ^ a b Valerie Aubourg (June 2003). Organizing Atlanticism: the Bilderberg Group and the Atlantic Institute 1952–63.
  5. ^ a b c Rockefeller, David (2002). Memoirs. Random House. p. 412. ISBN 0-679-40588-7.
  6. ^ Thompson, Peter (1980). “Bilderberg and the West”. In Sklar, Holly. Trilateralism: The Trilateral Commission and Elite Planning for World Management. South End Press. p. 158. ISBN 0-89608-103-6.
  7. ^ a b “Inside the secretive Bilderberg Group”. BBC News. 29 September 2005. Retrieved 5 August 2008.
  8. ^ a b c “Bilderberg Meeting of 1997 Assembles”. PR Newswire. 13 June 1997.
  9. ^ “Parliamentary questions: Answer given by Mr Prodi on behalf of the Commission”. European Parliament. 15 May 2003.
  10. ^ Entry for Conrad Black, The International Who’s Who. Europa Publications. 2000.
  11. ^ “Bilderberg: List of Invitees”. United States Department of Defense. 31 January 1996. Retrieved 6 June 2009.
  12. ^ a b c “Bilderberg Announces 2008 Conference”. businesswire.com. BusinessWire. 2008. Retrieved 7 June 2008.
  13. ^ Marcus Klöckner (17 May 2009). “Bilderberg meetings remain a mystery”. Stars and Stripes.
  14. ^ a b “Twenty-fifth Bilderberg meeting held in St joseph MO”. Facts on File World News Digest. 14 May 1977.
  15. ^ Who’s Who. 1999.
  16. ^ a b c Caroline Moorehead (18 April 1977). “An exclusive club, perhaps without power, but certainly with influence: The Bilderberg group”. The Times.
  17. ^ Mark Oliver (4 June 2004). “The Bilderberg group”. The Guardian (London).
  18. ^ “Prime Minister Vanhanen and Minister of Finance Katainen to attend Bilderberg Conference”. Finnish Government. 13 May 2009.
  19. ^ “Bilderberg Group Meets In Athens Amid Tight Security”. NASDAQ.
  20. ^ Bruno Waterfield (16 Nov 2009). “EU Presidency candidate Herman Van Rompuy calls for new taxes”. The Daily Telegraph (London). “during a secret dinner to promote his candidacy hosted by the elite Bilderberg Group.”
  21. ^ a b c Thompson, Peter (1980). “Bilderberg and the West”. In Sklar, Holly. Trilateralism: The Trilateral Commission and Elite Planning for World Management. South End Press. pp. 172, 178–180, 182. ISBN 0-89608-103-6.
  22. ^ “Asia Times Online :: Asian News, Business and Economy.”. Retrieved 22 August 2007.
  23. ^ Panetta, Alexander (2006). “Secretive Bilderbergers meet”. Toronto Star (Toronto Star Newspapers Limited). Retrieved 12 June 2006.
  24. ^ What was discussed at Bilderberg?, Turkish Daily News, 5 June 2007. Retrieved 18 August 2007.
  25. ^ “Balkenende to Meet Bush in Washington”. nisnews.nl. NIS News Bulletin. 2008. Retrieved 25 May 2008.
  26. ^ “The most powerful elite will meet in Athens”. GRReporter. 23 March 2009. “the club will organize its meeting in Athens between 14 and 16 May”
  27. ^ “Charlie Skelton’s Bilderberg files”. The Guardian (London). 15 May 2009. Retrieved 15 May 2009.
  28. ^ Skelton, Charlie (2 June 2010). “Bilderberg 2010: Plutocracy with palm trees”. The Guardian (London). Retrieved 2 June 2010.
  29. ^ Skelton, Skelton (18 May 2009). “Our man at Bilderberg: Six days to lost innocence”. The Guardian (London).
  30. ^ a b “A special report on global leaders”. The Economist: pp. 12–14. 22 January 2011.
  31. ^ Wilford, Hugh (September 2003). “CIA plot, socialist conspiracy, or new world order? the origins of the Bilderberg group, 1952–55”. Diplomacy & Statecraft 14 (3): 70–82. Retrieved 28 March 2011.
  32. ^ Madeleine Bunting (25 May 2001). “Weekend break for the global elite”. The Guardian (London).
  33. ^ Duffy, Jonathan (3 June 2004). “Bilderberg: The ultimate conspiracy theory”. BBC News.
  34. ^ a b Bill Hayton (29 September 2005). “Inside the secretive Bilderberg Group”. BBC News. Retrieved 19 March 2011.
  35. ^ a b Weissert, Will (10 August 2010). Fidel Castro fascinated by Bilderberg Club conspiracy theory. Retrieved 16 October 2010.
  36. ^ a b Wallechinsky, David; Wallace, Irving (1975). The People’s Almanac. Doubleday. ISBN 0-385-04060-1.[1]
  37. ^ Ronson, Jon (10 March 2001). “Who pulls the strings? (part 3)”. The Guardian (London). Retrieved 14 May 2009.
  38. ^ Phyllis Schlafly, A Choice Not An Echo: The Inside Story of How American Presidents Are Chosen (Pere Marquette Press, 1964) ISBN 0-686-11486-8
  39. ^ Chip Berlet (1994). “The New Right & The Secular Humanism Conspiracy Theory”.
  40. ^ Daniel Estulin, Los secretos del club Bilderberg (Ediciones del Bronce, 2006).
  41. ^ Domhoff, G. William (2005). Who Rules America? Power, Politics, and Social Change. McGraw-Hill Humanities/Social Sciences/Languages; 5 edition. ISBN 0-07-287625-5.
  42. ^ a b c d Berlet, Chip (September 2004). Interview: G. William Domhoff. Retrieved 1 October 2009.
  43. ^ a b Vogel, Kenneth P. (15 March 2009). Bilderbergers excite conspiracists. Retrieved 3 November 2010.
  44. ^ James McConnachie, Robin Tudge, The Rough Guide to Conspiracy Theories (London: Rough Guides Ltd, 2005) ISBN 978-1-84353-445-7
  45. ^ a b Berlet, Chip (2000). John Birch Society. Retrieved 6 October 2010.
  46. ^ Iain Hollingshead (4 June 2010). The Bilderberg Group: fact and fantasy. Retrieved 20 June 2011.
  47. ^ King, Dennis (1979). “NCLC’S Private Intelligence Agency”. Our Town (Manhattan: Our Town). Retrieved 14 May 2009.
  48. ^ “List of Season 1 episodes for Conspiracy Theory with Jesse Ventura”. truTV. 30 December 2009. Retrieved 11 January 2011.
  49. ^ Bruce Ramsey (30 July 2009). “That Bilderberg Book”. The Seattle Times. Retrieved 23 January 2011.

Further reading

Quantum Researchers Able to Stop and Restart Light

Quantum Researchers Able to Stop and Restart Light

In two independent experiments that defy the notions of Einstein, researchers have been able to stop, then restart a beam of light.

Ordinarily, light travels at the speed of 186,282 miles per second, but the research team of Lene Hau, a professor of physics at Harvard, who in 1999 was able to slow light down to 38 miles per hour, has been able to trap light in a cloud of sodium atoms super-cooled to near ‘absolute zero.’

“It’s nifty to look into the chamber and see a clump of ultracold atoms floating there,” Hau says. “In this odd state, light takes on a more human dimension; you can almost touch it.” [1]

In an independent experiment, an easier approache was tried by the team of Ronald Walsworth and Mikhail Lukin at the Harvard-Smithsonian Center for Astrophysics (CfA).

They shot laser beams through a dense cloud of rubidium and helium gas. (Rubidium, in its solid or natural form, is a soft, silver-white metal.) The light bounced from atom to atom, gradually slowing down until it stopped. No supervacuum or ultra-cold was needed. In fact, the chamber where the light stopped was at a temperature of 176 degrees F. [1]

Both experiments accomplish almost the same thing, however, in the CfA experiment researchers were only able to store about half of the incoming light, and the storage time was about half that of Hau’s experiment.

Think of both contraptions as sophisticated light switches that control not just light but information. Incoming light can carry information expressed by changes or modulations of its frequency, amplitude, and phase. When the light stops, that information is stored just like information is stored in the electronic memory of a computer. To access the information, you turn on a control laser, and out it comes. [1]

Remarkably, scientists are somewhat uncertain about the implications and practicality of this research.

“We hope for wonderful things,” says David Phillips, who worked on the CfA “stop light” project. “Our imagination hasn’t figured out what the possibilities are yet.” [1]

However, there appear to be clear implications for using experiments like this to ultimately improve the speed of computers, potentially creating the possibility to shift from binary computing to quantum encoding of data.

Computers operating by these so-called quantum effects are much more efficient that those available today, or even on the drawing board. (“Quantum” refers to changes in the energy levels of the atoms.) Today’s machines represent information in bits, electronic combinations of zeros and ones. Bits represented by quantum states of atoms could carry much, much more information. Cubic inch for cubic inch, quantum computers could tackle problems that would stymie the most super of conventional computers. For example, they could perform many calculations simultaneously. [1]

The eminent physicist Albert Einstein theorized that it was impossible for light to travel at a speed faster than 186,282 miles per second, and in this case he has not yet been proven wrong.

Watch the following video for amazing footage of Hau’s research:

 

Sources for this article include:
[1] www.news.harvard.edu

This article is offered under Creative Commons license. It’s okay to republish it anywhere as long as attribution bio is included and all links remain intact.

RESEARCH CREDIT: WAKING TIMES

Top Spy Accused of Being a 3-Way Hitman for Blackwater, CIA, & the Mafia.

Top Spy Accused of Being a 3-Way Hitman for Blackwater, CIA, & the Mafia.

Enrique “Ricky” Prado’s resume reads like the ultimate CIA officer: veteran of the Central American wars, running the CIA’s operations in Korea, a top spy in America’s espionage programs against China, and deputy to counter-terrorist chief Cofer Black — and then a stint at Blackwater. But he’s also alleged to have started out a career as a hitman for a notorious Miami mobster, and kept working for the mob even after joining the CIA. Finally, he went on to serve as the head of the CIA’s secret assassination squad against Al-Qaida.

That’s according to journalist Evan Wright’s blockbuster story How to Get Away With Murder in America, distributed by Byliner. In it, Wright — who authored Generation Kill, the seminal story of the Iraq invasion — compiles lengthy, years-long investigations by state and federal police into a sector of Miami’s criminal underworld that ended nowhere, were sidelined by higher-ups, or cut short by light sentences. It tracks the history of Prado’s alleged Miami patron and notorious cocaine trafficker, Alberto San Pedro, and suspicions that Prado moved a secret death squad from the CIA to Blackwater.

“In protecting Prado, the CIA arguably allowed a new type of mole — an agent not of a foreign government but of American criminal interests — to penetrate command,” Wright writes.

In this sense, there are two stories that blur into each other: Prado the CIA officer, and Prado the alleged killer. The latter begins when Prado met his alleged future mob patron, Alberto San Pedro, as a high school student in Miami after their families had fled Cuba following the revolution. Prado would later join the Air Force, though he never saw service in Vietnam, and returned to Miami to work as a firefighter. But he kept moonlighting as a hitman for San Pedro, who had emerged into one of Miami’s most formidable cocaine traffickers, according to Wright.

San Pedro hosted parties for the city’s elite, lost a testicle in a drive-by shooting outside of his house, rebuilt his house into a fortress, tortured guard dogs for sport, and imported tens of millions of dollars’ worth of cocaine into the United States per year, Wright adds. His ties reportedly included an aide to former Florida Governor Bob Graham, numerous judges, lobbyists and a state prosecutor. His ties also included a friendship with former CNN anchor Rick Sanchez, then a local TV reporter.

Prado, meanwhile, was dropping bodies, alleges Wright. Investigators from the Miami-Dade Police Department’s organized crime squad suspected him of participating in at least seven murders and one attempted murder. He attempted to join the CIA, but returned to Miami after not completing the background check (due to his apparent concern over his family ties). But was admitted after the Reagan administration opened up a covert offensive against leftist Central American militants, where he reportedly served training the Contras.

More startling, the Miami murders allegedly continued after Prado joined the CIA. One target included a cocaine distributor in Colorado who was killed by a car bomb. Investigators believed he was killed over concerns he would talk to the police.

Years later, in 1996, Prado was a senior manager inside the CIA’s Bin Laden Issue Station, before the Al-Qaida mastermind was a well-known name. Two years later, the bombings of the U.S. embassies in Kenya and Tanzania elevated Prado to become the chief of operations inside the CIA’s Counterterrorist Center, headed by then-chief Cofer Black, later an executive for the notorious merc firm Blackwater. “As the title implied, the job made Prado responsible for all the moving pieces at the CTC — supervising field offices on surveillance, rendition, or other missions, and making sure that logistics were in order, that personnel were in place,” according to Wright.

Prado was also reportedly put in charge of a “targeted assassination unit,” that was never put into operation. (The CIA shifted to drones.) But according to Wright, the CIA handed over its hit squad operation to Blackwater, now called Academi, as a way “to kill people with precision, without getting caught.” Prado is said to have negotiated the deal to transfer the unit, which Wright wrote “marked the first time the U.S. government outsourced a covert assassination service to private enterprise.” As to whether the unit was then put into operation, two Blackwater contractors tell Wright the unit began “whacking people like crazy” beginning in 2008. Prado also popped up two years ago in a report by Jeremy Scahill of The Nation, in which the now ex-CIA Prado was discovered to have built up a network of foreign shell companies to hide Blackwater operations, beginning in 2004. The Nation also revealed that Prado pitched an e-mail in 2007 to the DEA, explaining that Blackwater could “do everything from everything from surveillance to ground truth to disruption operations,” carried out by foreign nationals, “so deniability is built in and should be a big plus.”

But it’s hard to say where Prado’s alleged criminal ties end. It’s possibly his ties dried up, or moved on. Even mobsters, like Alberto San Pedro, retire. Another theory has it that Prado wanted to break his ties to the Miami underworld — and San Pedro — all along, and sought out legitimate employment in the military, in firefighting and the CIA as an escape. But, the theory goes, he stayed in because he still owed a debt to his patrons.

The other question involves the CIA itself. It’s no secret the agency has associated with dubious types, but the agency is also “notoriously risk averse,” Wright writes. Yet the agency is also protective. And letting Prado on board wouldn’t be the agency’s first intelligence failure.

SOURCE: WIRED

Obama’s Social Security Number Tied To An Alias Harrison J Bounel

Obama’s Social Security Number Tied To An Alias Harrison J Bounel

 

The Plot Thickens: Debt Collector; Obama’s Social Security number reserved for Connecticut applicants also tied to an alias Harrison J Bounel. The debt collector also claims Obama has used two other Social Security numbers in Illinois. This interview covers several issues ranging from O’s SS# to his property tax filings in Chicago to 50+ different addresses tied to Obama and Michelle across the country. The interview aired on TruNews Radio 5/18/2011. – http://obamareleaseyourrecords.blogspot.com/2011/05/plot-thickens-debt-collec…

http://www.ObamaReleaseYourRecords.com

http://www.BirtherReport.com

 

SEE Also:

OBAMA Doesn’t know his own birth date!

 

Starchild DNA:Skull Likely Not Human, Possibly ET

Starchild DNA:Skull Likely Not Human, Possibly ET

 

Introduction to three important discoveries in the Starchild Skull’s DNA.

Each is historic in its own way.

 

ABOUT THE STARCHILD SKULL

The Starchild Skull is a human-like bone skull independently radiocarbon dated at 900 years old (+/- 40 years). It is unlike any other skull that has ever been found or presented for inspection. It is unique in the world.

The “Starchild” name resulted from early X-rays of a maxilla fragment detached from the skull. It had two visible teeth and five unerupted crowns embedded in the bone above. That, combined with a slightly-less-than-normal-adult size of the skull and the infant size of the maxilla fragment indicated a child of 5 or 6. However, subsequent examination by experts has led them to suggest  that this age is not necessarily accurate.

From extremely shallow eye sockets to total lack of frontal sinuses, the Starchild skull’s physical traits cannot be accounted for by any known combination of deformities. The bone itself has a biochemical signature more like tooth enamel than bone, unlike anything currently known. And inside that unusual bone are microscopic fibers and a red residue that so far defy explanation.

In addition to writing and lecturing, Lloyd Pye is Director of the Starchild Project, a research organization that has been investigating the Starchild Skull since February of 1999.

Lloyd initially thought the skull’s unusual physical characteristics must be the result of some kind of deformity, but he soon learned no technically valid explanation for it existed. The most unusual features of the skull include bone that is half as thick and heavy as normal human bone but is significantly more durable; fibers and residue within the matrix of the bone; and an abundance of skull deformations that would be fatal in any normal human. The Starchild Skull is unique in every significant aspect.

STARCHILD SKULL
DNA BREAKTHROUGH

In 2010 a modified “shotgun” DNA recovery technique successfully recovered numerous coherent base-pair segments of the Starchild Skull’s nuclear DNA. They were analyzed by the National Institutes of Health BLAST program, and a substantial portion of the Starchild’s nuclear DNA was found to have “no significant similarity” to any DNA previously found on Earth. This is historic!

 

Starchild Skull DNA Analysis Report—2011

SUMMARY:
Early in 2011, a geneticist attempting to recover Starchild Skull DNA identified four fragments that matched with human mitochondrial DNA (mtDNA). Comparing those fragments with matching fragments from human mtDNA produced an astonishing result. In every comparison, the Starchild presented many more nucleotide differences than are normally found among humans. In one comparison detailed in this report, the compared segments of human mtDNA came from one of its most highly conserved regions. Across 167 nucleotides in this segment, only 1 single variation is found among the 33 human haplogroups. In contrast, the same length of Starchild mtDNA has 17 differences! Of those 17, a significant number should be confirmed by multiple repetitions of the test. If several are confirmed (which is highly likely), it will be enough evidence to establish a new earthly species. [In 2010 just such a new prehuman species, Denisova, was confirmed by having a significant number of differences in its mtDNA. This will be explained later in this report.]

1.   Introduction To The Starchild Skull

2.   What You Need To Know About DNA

3.   What You Need To Know About DNA Testing

4.   2003 DNA Testing

5.   454 Life Sciences Technology

6.   2010 DNA Testing & Results

7.   2003 vs 2011 Mitochondrial DNA Testing

8.   2011 DNA Testing & Results

9.   What Does This Mean?

10. Conclusion & Call To Action

 

Introduction To The Starchild Skull:
The Starchild Skull is a 900-year-old human-like bone skull with distinctly non-human characteristics. It was unearthed in a mine tunnel near Mexico’s Copper Canyon around 1930. The Starchild Project is an informal research group that has coordinated numerous scientific investigations since its founding in February of 1999.

 

By 2003, the Starchild Project had completed enough research to strongly suspect the Starchild was something never seen before by science. At minimum, it presented a level of deformity and function previously thought impossible, and perhaps something much more significant: a new type of human-like being living on Earth 900 years ago.

Formal research was carried out by credentialed experts in the USA, Canada, and UK. It included cranial analysis, dental analysis, X-ray analysis, CT scan analysis, radiocarbon dating (C-14), microscopic analysis of multiple bone preparations, scanning electron microscopy (SEM), bone composition analysis, statistical analysis, inorganic chemistry analysis, DNA analysis, and other investigations into possible natural explanations such as genetic defects, birth defects, and skull deformation resulting from cultural practices. (Complete details of these studies can be found in the book “The Starchild Skull” by Lloyd Pye)

The collective conclusions were that the combination of skull features were unique and could not be explained by any known deformity or combination of deformities, mutation, cultural practices, genetic disorders, or illness. If a human were born today with physical abnormalities like the Starchild, it could not survive. Yet something about the essential nature of this being permitted it to do what would be impossible for a normal human.

Realizing the ultimate answer could come only from genetic testing, in 2003 the Starchild Project commissioned a DNA analysis of the Starchild Skull’s bone by Trace Genetics of Davis, California. (Trace Genetics was acquired by DNA Print Genomics in 2005.) Its owners and principal geneticists were Dr. Ripan Malhi and Dr. Jason Eshleman, specialists in the recovery of ancient DNA, meaning DNA from samples more than 50 years old. Dr. Malhi and Dr. Eshleman had previously worked on the high profile 5,000 to 9,000 + year old Kennewick Man skeleton found in Washington State in 1996.

Drs. Malhi and Eshleman took samples of the Starchild bone, along with control samples from a human skull reportedly found lying beside the Starchild’s buried skeleton. Carbon 14 dating of the two skulls confirmed they died at or near the same time, 900 years ago, and later analysis of staining on both skulls, and the inorganic chemistry of their bone, supported the C-14 result that both were exposed to similar conditions after death. That made the human an ideal control to compare contamination and degradation of its DNA against the Starchild’s.

BACK TO TOP

What You Need To Know About DNA:
All humans have two types of DNA.

Mitochondrial DNA (mtDNA) comprises the genomes of all mitochondria, which are subcellular (within a cell) elements located in the cytoplasm of eukaryotic cells (those with a nucleus). Mitochondria are responsible for energy production in cells. They are inherited through female eggs; thus, mtDNA is inherited only from mothers, grandmothers, great-grandmothers, etc., for countless generations to a species’ point of genetic origin.

Nuclear DNA (nuDNA) is the combination of genetic material from both parents, and comprises the human genome. NuDNA gives humans their unique individual attributes.

All DNA is created from only four building blocks called nucleosides, which are bound together the way train cars are coupled, with the help of a binder made of phosphoric acid. These four nucleosides are adenosine, guanosine, thymidine and cytidine, abbreviated as A, G, T, and C. Nucleosides with the attached phosphate couplers are called nucleotides.

The four resulting nucleotides link together in DNA to form chains that are different in their order and length for each gene. Whether short or long, when linked together these nucleotide chains comprise the 30,000 genes that are organized into the 46 chromosomes (23 from each parent) within the nucleus of almost every cell in the human body. Each chromosome is basically an enormously long, uninterrupted chain of the four nucleotides connected in a specific order that is unique to the chromosome’s host and species.

Regardless of length, each chain of nucleotides is complexed with (connected to) another DNA chain that faithfully reproduces the connection order of nucleotides in the first chain, but in a mirrored manner. Each nucleotide in one chain is always connected to a specific nucleotide in the opposite chain to create what is known as a base pair. Base pairs always occur as T-A (or A-T) and G-C (or C-G). Those 46 chromosomes taken together contain over 3 billion base pairs, which in total comprises the human genome.

BACK TO TOP

What You Need To Know About DNA Testing:
In 2003, Trace Genetics began their sequencing analyses of the DNA recovered from both skulls. The methodology they utilized was based on PCR (Polymerase Chain Reaction), a powerful amplification technique that enabled analysis of tiny amounts of DNA too small to be detected by other methods. The principal drawback of using the PCR technique was its dependence on employing correctly designed primers for its amplification.

To design primers correctly, the target DNA sequence had to be known from the start, or at least the relatedness of known DNA to unknown DNA had to be understood, such as that between chimp DNA and human DNA (97% related). This made using PCR for unknown DNA sequences (those not catalogued) extremely problematic, if not impossible.

Primers are designed strings of nucleotides similar to those in DNA, but much shorter, often only 25 to 30 nucleotides long. Unlike DNA, which is double-stranded, primers are single-stranded. When added to a sample of DNA being tested, a primer is designed to find its complimentary strand and bind to it at a specific locus (point of contact).

To create primers that accurately reproduce the sequence of nucleotides (their order of connection) at a specific locus requires knowing the exact sequence at the target locus. Imagine a human-specific primer is the string of nucleotides shown in grey (below left). When such a primer is added to a DNA sample, it will seek to connect with its other half (shown in blue) in the mirrored fashion mentioned above.

When a primer locates its counterpart (a complementary sequence, or complement), the PCR process is able to proceed and a positive result will register by whatever measurement an investigator chooses to utilize. Thus, with primers designed to conform to human DNA, a positive registration of a PCR result indicates that human DNA is present in the sample. Conversely, if the primers cannot find their complements, no human DNA is present.

BACK TO TOP

2003 DNA Testing:
To test the DNA of the Starchild Skull and the control skull, Dr. Eshleman and Dr. Malhi used the PCR technique with primers designed on the basis of known human sequences.

On the first attempt with the control skull, both mtDNA and nuDNA were detected, revealing it was a female whose mtDNA belonged to haplogroup A. The Starchild’s mtDNA was also recovered on the first attempt, but it belonged to haplogroup C. Haplogroups are how geneticists classify macro groups of people with similar yet slightly different mtDNA. The exact number of haplogroups differs depending on which reference is consulted, but 33 groups are commonly used for genetic comparisons.

This result indicated that the female and the Starchild could not be maternally related because their mtDNA did not belong to the same haplogroup. (Remember, everyone inherits only their mother’s mtDNA, their grandmother’s, etc.)

Recovering mtDNA so easily from both samples meant they were well preserved during 900 years in a dry mine tunnel. The fact that the Starchild’s mtDNA apparently belonged to a normal human haplogroup indicated that its maternal line was entirely human.

If the Starchild’s nuclear DNA responded positively to primers designed to recover human nuDNA, that would establish its nuDNA as also human, confirming it as an astoundingly bizarre deformity, but 100% human. However, if its nuclear DNA proved to be other than entirely human, the Starchild Skull would represent a new type of humanoid—period.

In six full attempts (above), Dr. Eshleman and Dr. Malhi could not detect the Starchild’s nuclear DNA by PCR. Given that nuDNA was easily recovered from the control skull with the same level of DNA degradation, and the Starchild’s mtDNA was also easily detectable by PCR, the failure strongly indicated its nuclear DNA was present, but too different from human DNA to be detected by human-specific primers.

Though compelling, this result was not absolute proof that the Starchild had a non-human father. Also, if it were some kind of human-alien hybrid, the presence of mtDNA inherited from a human mother would suggest that a large portion of its nuDNA should also come from the mother. So, why wasn’t this clearly human counterpart more easily detectable?

With only PCR-based detection techniques at their disposal in 2003, Dr. Malhi and Dr. Eshleman had no way to address the critical question of exactly how far the father was from human. Was it a razor-thin margin, barely enough to avoid detection by primers? Or was it a substantial margin, enough to confirm that he had an alien genetic heritage? (In this context, “alien” can mean anything from “foreign to normal human genetics within the framework of that subject as it is currently understood,” to “definitely not from planet Earth”…. or anything in between.)

With Trace Genetics unable to determine how different the father’s DNA was from human, the Starchild Project could offer no conclusion that would stand up to the intense scrutiny certain to descend on a claim that the Starchild’s father might be of non-terrestrial origin.

The upside was that the mtDNA result proved the Starchild Skull’s DNA was viable (not degraded to a point where nothing could be recovered from it), leaving open the possibility that later, using improved technology, its all-important nuclear DNA could be recovered.

BACK TO TOP

454 Life Sciences Technology:
In 2006, a company called 454 Life Sciences of Branford, Connecticut, announced they had developed a new DNA analysis methodology that enabled sequencing of any unknown DNA sample without prior knowledge of any of its sequences. The only requirement was that the sample to be sequenced had to actually be DNA (in a chemical sense).

The 454 technique was also based on using primers, but these primers were standardized for every imaginable analysis, not specific to the DNA to be analyzed. It was exactly what was needed to recover and sequence the Starchild’s elusive nuclear DNA.

Unfortunately, the first full genome analyses using the 454 methodology were extremely expensive (millions of dollars each), and so could be afforded only by those involved in well-known, high-profile cases such as sequencing the Neanderthal genome.

By 2009, 454 sequencers were in use worldwide and were competing with next-generation genome sequencers from other companies, so the cost of sequencing entire genomes was decreasing steadily. The Starchild’s DNA was now a candidate for such comprehensive genetic analysis, even though its burial for 900 years meant that as much as 90% of the DNA recovered from its bone would come from contaminating bacteria.

Nonetheless, as demonstrated by the Neanderthal genome project, even very extensive contamination can be identified and eliminated from data sets by modern bioinformatics. Specialized computer tools enable various degrees of filtering, one of which removes all bacterial sequences to isolate only information pertaining to the Starchild Skull’s nuDNA. That means its entire genome derived from the genetic package provided to it by both parents—its human mother and its potentially non-human father.

Although access to advanced DNA recovery technology was rapidly expanding, the price for recovering and sequencing ancient DNA remained well beyond the Starchild Project’s meager financial resources. Then, in early 2010, that tide of frustration suddenly turned.

BACK TO TOP

2010 DNA Testing & Results:
A geneticist from an established and well-accredited research facility in the U.S.A. offered to attempt to analyze the Starchild Skull’s nuclear DNA using sophisticated genetic analysis techniques such as genome amplifications and classic shotgun sequencing, which were not available to Dr. Malhi and Dr. Eshleman due to the narrow specialization and commercial nature of the Trace Genetics business model.

As with any DNA analysis that involves enzymatic amplification, the techniques used by the new geneticist still relied on primers, but he used different approaches that were not narrowly connected to the origin of the DNA samples, and were not species-specific.

It was very labor-intensive work, and thus not cost effective for a full genome recovery. However, the geneticist’s goal was to find a few fragments of the Starchild’s “missing” nuclear DNA, which would clearly demonstrate that the entire genome was recoverable and therefore an investment in 454 sequencing would be warranted.

In February 2010, the geneticist was provided with a bone sample from the Starchild Skull. In March, he had recovered dozens of fragments of DNA from the sample, much of which resulted from the inevitable bacterial contamination. Nonetheless, others were clearly fragments of the Starchild Skull’s nuclear DNA, so after 11 years of effort—success!


All of the recovered fragments were completely characterized using the classic Sanger sequencing technique, and analyzed by capillary electrophoresis (also known as automated sequencing). These are standard DNA sequencing techniques. After obtaining sequencing data, the geneticist compared the new sequences to millions of sequences recovered by other researchers from all over the world, looking for a match.

Those worldwide results have been deposited into a massive database maintained by the National Institutes of Health (NIH) in Washington, D.C. That database was created by NIH scientists from genomes and partial genomes of thousands of plant and animal species—from sponges to humans—that have been recovered with the help of NIH funding.

The comparisons were conducted using a sophisticated computer program called the Basic Local Alignment Search Tool (BLAST), an NIH application that can analyze nucleotide sequences of any length, short or long, and attempt to match them to any of the millions of sequences in the database that represent essentially every living species on Earth.

All of the sequenced fragments recovered from the Starchild Skull DNA sample were run through the BLAST program. As anticipated, a large percentage of recovered fragments were matched perfectly with DNA catalogued from various species of bacteria.

Also anticipated were the results for several fragments like the one seen below. That fragment was 265 base pairs in length, and it was found to correlate with a segment on human chromosome #1. This proves some of the Starchild’s nuclear DNA is analogous with segments of human DNA, and those parts of its genome are human or human-like.

These results were not surprising since the 2003 Trace Genetics test concluded that the Starchild had a human mother. However, these were not the only results. Other BLAST results, like the one below for a 342 nucleotide fragment, gave a very different answer.

It states that within the millions of DNA base pair strings catalogued in the NIH database, none were even “similar” to this section of the Starchild Skull’s DNA! And please note that this astonishing result was obtained with the search parameters set to the broadest match criteria that seeks even a “somewhat similar” match, not only an exact match.

For all of the Starchild’s DNA fragments, a wide net was cast into the NIH database with the hope there would be minimal doubt about results. Indeed, they were unequivocal: Some of the Starchild’s nuDNA is different from anything previously found on Earth!

The largest composite fragment that could not be matched in the database was several thousand nucleotides long! However, until some biological sense can be extracted from these non-matching nuDNA fragments, it’s too early to draw any definitive conclusions.

So, how can “biological sense” be extracted from them? One way would be if such DNA fragments are found to represent the coding part of a gene. That would mean it could be translated into a protein, and attempts could be made to predict the function of the protein.

Such a coding fragment is yet to be found among the recovered samples of the Starchild DNA because, as it happens, only about 3% of the total human genome is coding sections. Therefore, it is extremely unlikely that random sampling will miraculously discover a coding section, and all of the Starchild fragments have been obtained randomly.

The Starchild Project’s team considered this development a vital step forward in the quest to establish the truth about the Skull’s genetic heritage. However, skeptics and would-be debunkers soon pointed out that the submission parameters of a BLAST search could be manipulated by an unscrupulous researcher adjusting them to gain a favored result.

When those trying to discredit the Starchild Project suggest its results have been faked or fudged, they fail to acknowledge that all Project members have put their professional and personal reputations at stake. Project members have by far the most to lose from invalid results—much less faked results—so each of them works hard to ensure that appropriate steps are taken to secure accurate, repeatable results at every point in the process.

To serve that policy, the nuclear DNA results so far obtained have undergone sequential verification, but it must be stressed that they are now, and will remain, only fragmentary, and they will ultimately require subsequent repetitions for absolute confirmation. This will be completed by our geneticist and his colleagues as time and funding permit.

BACK TO TOP

2003 vs 2011 Mitochondrial DNA Testing:
Early in 2011, the geneticist sequenced some fragments from the Starchild Skull DNA sample that, when examined by a program similar to BLAST, revealed they were segments of mitochondrial DNA rather than nuclear DNA. This was an intriguing development.

Up to that point, he had accepted the Trace Genetics result of 2003 (that the Starchild’s mtDNA was entirely human) as accurate. However, the primer series utilized in 2003 recovered only relatively small and quite specific segments of human mtDNA. The situation at that time left room for error and therefore should be clearly understood.

When the primers employed in 2003 found corresponding fragments on the Starchild’s mtDNA, the primers rendered a positive signal from the PCR indicating “this particular part of the mtDNA is human, or highly human-like.” However, that did not mean other untouched sections of the mtDNA would not vary considerably from the human mtDNA. And this, apparently, is what happened—the 2003 sampling proved to be too small.

2011 DNA Testing & Results:
Mitochondrial DNA is quite distinct from nuclear DNA. While both mtDNA and nuDNA exist as double-strand molecules forming the famous “double helix,” nuDNA is segregated into 46 chromosomes (in humans). Due to the massive amount of DNA in chromosomes (each consisting of millions of base pairs), DNA is tightly packed into multiple folds and is encased in a shell by large amounts of proteins called histones.

In contrast, mtDNA forms a tiny circle consisting of 16,569 base pairs. Despite its small size, its function is crucial to life. Unlike nuDNA, the vast majority of it works, so mutations seldom become permanent. In fact, in the entire course of human existence, mtDNA has accumulated only 120 ± variations across the entire population. Compare that to nuDNA, whose 3 + billion base pairs have as much as 15 million variations.

Human mtDNA contains 37 genes, 15 of which are larger and depicted above, and 22 of which are tiny bits of transport RNA (tRNA) not included. Of the 15 larger, 2 encode for mitochondria-specific RNA (ribonucleic acid) that constitutes a crucial component of mtDNA’s protein-making machinery (called ribosomes), but does not actually encode proteins. That is carried out by the 13 other large genes in the mtDNA, which do encode proteins for the production of energy and other critical functions of the mitochondria.

Mitochondria are the power plants of all cells that contain them, with a similar function in the biology of all species on Earth. MtDNA is one of the most thoroughly researched and well-understood aspects of human genetics. The coding capacity of mtDNA is used very efficiently, having exactly enough genes to carry on its job of producing proteins.

Since the beginning of eukaryotic cells (those with a nucleus) around 2 billion years ago, the mitochondria in them have carried out the most fundamental aspects of sustaining life. This has been true from yeasts to dinosaurs to humans. Their critical functioning is why very few differences are found between the mtDNA sequences of closely related species.

Mutational change in the human mtDNA nucleotide sequence is exceptionally rare (only 120 ± among all humans), and each mutation is well documented. The chart below is a screen capture of the output from a computer program that compares the entire mtDNA sequences of 33 different human haplogroups, one sequence for Neanderthal, and two for the recently discovered Denisova type of hominid. This output is called DNA alignment.

At the top, highlighted in dark blue, is the Human mtDNA Cambridge Reference Sequence (CRS), which represents the sequences of one particular individual chosen as a reference, so everything else can be compared to that standard. The sequence depicted here starts at nucleotide #1255 (out of 16,569) and continues across to #1350. Notice this block of 95 nucleotides contains no variations in any haplogroup. Every base pair nucleotide is identical across all 33 groups of humans, the Neanderthal, and the two Denisova.

Both Neanderthal and Denisova have mtDNA more varied than human mtDNA, but they still contain many long unvarying segments. Neanderthals differ from the human CRS by 200 ± base pairs. The Denisova differ from it by 385 ± base pairs, which is why they are designated as separate from humans and Neanderthals. As a comparison, chimp mtDNA differs from the human CRS by 1,500 ± base pairs, as seen in the following graph.

MtDNA is so highly conserved because nature applies a very strong selective pressure against changes in its most critical regions. When changes do occur in such places, it can lead to disruption of a crucial activity, which can lead to dysfunction and death. As a result, an unfavorable mutation is not passed along. However, mutations that do not change proteins, and those in regions that do not encode proteins, can and do slowly accumulate.

This explains why only 0.0072% (120th of 16,569 bp) of human mitochondrial DNA has any variation across its 33 haplogroups. Below is an example of variation in human mtDNA. The haplogroup L1a has a C (cytidine) nucleotide, while at the same location all the other haplogroups have a T (thymidine) nucleotide. (The program’s output highlights all variations to aid researchers.)

Each variation like the one above is called a Single Nucleotide Polymorphism (SNP), and for human mtDNA such “snips” are catalogued in databases maintained by the National Institutes of Health. The fewer substitutions a DNA segment has, the more conserved it is. Human mtDNA, with only 120 ± variations in 16,569 base pairs, is considered very highly conserved.

Notice that the first haplogroup in the chart below the Control Reference Sequence (CRS) is haplogroup A (HPT A). This is the haplogroup that was matched to the human female skull found with the Starchild Skull. The next down is haplogroup C (HPT C), matched to the Starchild with small fragments of its mtDNA in 2003.

When Trace Genetics detected the Starchild’s mtDNA, they used human-specific primers that amplified segments only a few dozen nucleotides long. These segments were targeted for diagnostic analysis because they contained human haplogroup-specific changes that could determine whether mtDNA belonged (or not) to a specific haplogroup.

If the targeted segments also happened to be a part of a highly conservative sequence of human mtDNA that has a crucial biological function, the segments could be similar even among very different species (i.e., humans and chimps), leading to confusing conclusions.

In early 2011, our geneticist analyzed four newly sequenced fragments from the Starchild Skull’s mtDNA samples. A computer program similar to the BLAST program mentioned earlier matched the four Starchild fragments to catalogued fragments of human mtDNA.

BACK TO TOP

One fragment matched a segment in the chart shown earlier, seen expanded below. This is a highly conserved segment of human mtDNA, with only 1 nucleotide variation among 33 human haplogroups present (L1b). There is also one in Neanderthal and one in Denisova .


click for larger view

This chart goes from #1262 to #1426 (164 nucleotides). Now imagine a line added across the top labeled “Starchild Skull” containing 167 nucleotides, but covering only 157 of the human mtDNA nucleotides to which it matched. Discrepancies like this (167/157) occur because the computer program is designed to find matches between two or more DNA fragments, in this case the human CRS and the Starchild Skull’s mtDNA. If it calculates that a sequence would match if more or fewer letters were in either code, it inserts gaps containing dashes to produce better aligned results, as seen in the diagram below:

In the comparison above, the first four letters match. However, at the fifth space a jumble would begin within the sample if the gap (containing a dash) was not inserted where it is. This is how the computer program works; it seeks to record the highest possible number of matches between two samples, so it inserts gaps, and each gap provides a negative penalty score as the program calculates the highest total of matches.

To make the Starchild’s mtDNA match the human CRS, the program added gaps marked as dashes either to the Skull’s mtDNA or to the CRS to obtain the highest matching score between them. Adding spaces to such misalignments in both samples provides a total cumulative difference, which in this case is a10-gap differential (167 – 157 = 10).

It is important to distinguish that adding gaps is not the same as outright changes in the nucleotides, as was seen earlier with the single C found in a row of Ts. Such changes are only one of three ways that differences are recorded when samples are being compared.

(1) The SNP just referenced is a substitution, when one nucleotide is replaced by another; (2) an insertion is when an extra nucleotide is found in a sample and the program has to introduce a gap into the other sequence to accommodate the extra nucleotide; and (3) a deletion, which is when a nucleotide is missing from one of the samples, and once again the program introduces a gap into the sequence to align it with the other sequence.

In the latter two cases, insertions and deletions, the program makes no distinction between which is the cause of the gap. All it does is insert the gaps into either sequence to keep the matching count as high as possible. Those gaps are called insertion-deletions, or indel(s).

Indels are clear points of variation between samples, but not all of them can be considered ironclad. All DNA testing requires multiple “runs” to be certain of every result. When the same sample is sequenced again and again, any of the three possibilities above might be corrected. Several runs will establish which variations can be catalogued as confirmed.

Now return to the Starchild’s 167 mtDNA nucleotides compared to 157 nucleotides of the human CRS in a highly conserved region where only one single variation is found among 33 human haplogroups. In such a strongly conserved area, multiple differences in a matched sample would immediately alert geneticists that something major might be unfolding.

Below is a screen shot of the 167 Starchild mtDNA nucleotides compared to the 157 in the human CRS. The top line of each row (highlighted in pink) is the Starchild Skull sequence, which starts at 167 and works backward to 1. In the complementary Human CRS sequence (the second line of each row) the base pairs start at #1269 and end at #1426 (157 total) in the mirrored fashion mentioned earlier.

Within the 167 comparisons above are 17 variations! Seventeen! That is 17 indels of difference between the Starchild mtDNA and the mtDNA of 33 human haplogroups!

After repeated sequencing, some of those 17 differences could be confirmed as reading errors by the program, but it is virtually impossible that all of them would be errors.

BACK TO TOP

What Does This Mean?
In any comparison of DNA samples between the human CRS and an “unknown” species (which technically categorizes the Starchild), even a few variations between them in a short stretch of highly conserved nucleotides strongly indicates that the entire mtDNA genome of that species would contain many more than the 120 ± carried by the human haplotypes.

Such a difference, which is not hypothetical but actually exists within the Starchild Skull, is by itself sufficient reason to suspect a new species has been identified! Clearly such an extraordinary claim requires extraordinary evidence, but the preliminary results achieved so far with the Starchild DNA are immensely encouraging, to the point of near certainty.

To calculate the exact percentage of difference between the Starchild Skull and humans will require its entire genome to be sequenced using sophisticated technology such as the machines provided by 454 Life Sciences and/or similar companies such as Illumina. We intend to perform that sequencing as soon as we have the financial ability to do so.

In the interim, our research team is releasing this report to focus on the 167/157 RNA segment of mtDNA because it is easy to understand. Several other mtDNA comparisons have been carried out, each much longer than the one here, and three of those are depicted and analyzed in the Starchild Skull Essentials eBook (available HERE).

Remember that the information found by comparing mtDNA segments cannot and should not be considered thoroughly verified, as some sequencing errors are undoubtedly present. Each mtDNA segment must be sequenced several times to establish exactly how many differences exist between the Starchild Skull and the human CRS, and this kind of targeted testing, rather than shotgunning at random, is time-consuming and expensive.

Nonetheless, based on the preliminary results now in hand, our research team is very confident that when the Starchild’s entire genome is recovered and sequenced, the total number of confirmed differences will be so staggering that it can only lead to a conclusion that the Starchild represents an entirely new humanoid species, and that species is “alien.”

How could an “alien” have any human DNA, or even survive on our planet? Surprisingly, the genomes of many animal species have certain similarities (or homology) with humans. Proteins are the building blocks of all animal life on Earth, and the DNA that guides the production of proteins is very similar across all species. The genome of chimps is ± 97% the same as humans. Gorillas are 95% the same. Rats are 70%, mice 65%. Etc.

As mathematicians like to say, “Numbers don’t lie.” In this case, the 17 differences found in one short segment of Starchild Skull mtDNA makes it seem possible—even probable—that when the entire 16,570 ± nucleotides in the Starchild’s mtDNA are sequenced, they will contain far more than the 120 ± variations shared by the 33 human haplogroups.

Add to those 17 the number of differences found in three much longer fragments discussed in the eBook, and the total is mind-boggling. That number convincingly indicates that the Starchild will carry far more differences than the 200 ± of Neanderthals. It will carry far more than the 385 ± of Denisova. Can it possibly, or conceivably, reach the 1500 ± of chimps? Only further investigation will tell, but this is already a monumental discovery.

BACK TO TOP

Conclusion & Call To Action:
After 12 years of struggle, the Starchild Skull is truly poised to make history. When we have secured the funding needed to carry out the recovery and sequencing of its entire genome, it will provide uncontestable proof that at least once, 900 years ago, a being somewhat like us but definitely not human lived and died and was buried on our planet.

Unfortunately, achieving that historic moment requires far more than the Starchild Project team can deliver without substantial help. A wealthy investor—not merely a donor, an investor—must be found to provide the funding necessary to do what must be done.

In this extraordinarily special case, the investment needed is $7 million USD. Why that amount? Every step of the DNA recovery and sequencing process will have to be verified with multiple repetitions until no possible doubt remains about any specific result. Also, in order that those completed results can be confirmed by independent researchers, the entire process must be recorded on film for academic scrutiny and historic posterity.

The Starchild Project intends to incorporate some of that footage into creating two theater-quality documentary films during the 1.5 to 3 years required for the DNA’s recovery and analysis. These films will cover the Starchild Skull’s entire story, from its discovery to completion of the DNA analyses. They will be valuable both historically, as the record of this milestone event in human history, and financially, as market research indicates they will be enthusiastically welcomed in virtually every country on Earth.

It should be obvious to anyone that much more than $7 million can be made from two high quality films about such a pivotal shift in human awareness. If anyone reading this report personally knows anyone who might be interested in taking a front-and-center position as this historic event unfolds, please ask them to email: [email protected].

A business proposal is available to any serious potential investor. The film project already has its producers, director, entertainment attorney, accountant, production team, and the enthusiastic cooperation of a state film council. Everything is in place except for the investment, the final hurdle that now requires only one astute decision to clear it.

Final Note:
Explanations and terminology in this report are aimed at non-experts. Those with expert knowledge in genetics will naturally find its concepts and descriptions simplified.

The identity of certain research team members requires temporary anonymity. Their names will be revealed when they are ready to formally release reports for peer scrutiny.

Potential investors who want to know more, or to verify our geneticist’s work, can meet with him and tour his lab if they sign a Non-Disclosure Agreement. This will be on a case-by-case basis.

BACK TO TOP

 



 

Make it Happen 2012 – Anonymous Transmission

Make it Happen 2012 – Anonymous Transmission

Protesting, Police Violence, Transparency, Global Government, all being manipulated against Humanity’s interests.  2012 is the year we take back our FREEDOMS.

We do not forgive

We do not forget

We are legion

Expect us

 

 

UK intelligence collusion with Muammar Gaddafi’s Libya ‘exposed’

UK intelligence collusion with Muammar Gaddafi’s Libya ‘exposed’

The UK’s intelligence-sharing relationship with Muammar Gaddafi’s Libyan regime before its collapse last year has come under new scrutiny amid claims MI5 handed on defectors’ details and MI6 colluded in an operation to ensnare Islamic extremists.

According to the Mail on Sunday, agents for the British Secret Service supplied confidential information to their Libyan counterparts about people who had fled Gaddafi.

And the Sunday Telegraph claims that MI6 worked in conjunction with Libya to set up a radical mosque in a western European city to lure in al-Qaida terrorists.

Both stories are the result of previously unreleased classified documents in Libyan archives being disclosed by the new government in Tripoli.

The Home Office said it would ‘take seriously’ any allegations against the security services.

Image: Abdel Hakim Belhadj is taking legal action over his alleged illegal rendition (Picture: AP)

A spokeswoman told the BBC that parliament’s Intelligence and Security Committee was already evaluating the government’s relationship with Libya and would ‘take account of any allegations raised’.

‘We do not know the full details of this case, but we take such claims seriously,’ she said.

Last week it was revealed a former Libyan rebel who helped overthrow Gaddafi was taking legal action against former foreign secretary Jack Straw over his alleged illegal rendition.

Lawyers for Abdel Hakim Belhadj claim Mr Straw personally permitted his rendition to Libya when the former rebel sought asylum in the UK in 2004.

Source: http://www.metro.co.uk/news/896912-uk-intelligence-collusion-with-muammar-gaddafis-libya-exposed

Election Riggers Exposed: So Black Box Voting Gets DMCA Threat from Accenture

Election Riggers Exposed: So Black Box Voting Gets DMCA Threat from Accenture

From: “Bev Harris” <bev[at]blackboxvoting.org>
Date: Sun, 24 Jun 2012 10:30:03 -0400
Subject: Accenture hits BBV with Cease & Desist Demand

To support the work of Black Box Voting: http://www.blackboxvoting.org/donate.html
You can discuss this here: http://www.bbvforums.org/​forums/messages/8/82118.html

Amazingly, Accenture, which sold its crap-on-a-stick high-school sophomoric completely insecure malfunctioning voter registration software to a bunch of states, so unsuccessfully that Colorado refused to pay and others, like Wisconsin and Shelby County, bought out the source code in order to try to bandaid it into a functional system, has decided to issue a cease and desist against Black Box Voting for exposing its flawed software to the public.

Last time a voting system company did a DMCA takedown notice (Diebold, in 2004) it got socked with punitive charges for abusing the Digital Millennium Copyright Act, trying to use it to block distribution of material clearly published in the public interest.

If you want a copy of the voter registration software I posted Thursday, might as well get it right now — and mirror it, torrent it, dropbox it, or whatever. I’ll probably pull it down by June 27, not because their claim is valid, but because there are higher priorities for spending my time during this election season and thanks to Slashdot and some pals in Europe, this software has now been widely mirrored elsewhere.

Here is the DMCA issued to Black Box Voting:

Date: Fri, 22 Jun 2012 17:17:41 -0400 (EDT)
From: Rackspace AUP Team
Subject: Please Review Immediately – DMCAHello,

We have received a notice pursuant to the Digital Millennium Copyright Act (“DMCA”) from Accenture Global Services Ltd regarding certain content appearing at the above-referenced website (the “Website”). A copy of this notice has been sent to you via email at [redacted]. This company alleges that material posted on your company’s website infringes on their copyright. Please remove the content claimed to be infringing from the Website and confirm to me in writing that you have done so by 8:00 A.M. Central Time, 6/27/2012. If the allegedly infringing content is not removed and/or I have not received your written confirmation by that time, Rackspace will suspend network access to the server(s) hosting the Website.

Please note that you may provide a counter notification, stating that the posted material is not infringing the alleged copyright, in accordance with the provisions of 17 U.S.C. §512(g)(3) to Rackspace’s designated agent:

Director of Compliance
Rackspace Hosting

(Note that Rackspace is only doing what it’s required to do. They are a superb web hosting company, and have helped keep the Black Box Voting sites up and secure for many years now.)

After releasing it into the wild, we can all see that the system is hardly worth the $20 MILLION Accenture tried to charge the state of Colorado, with equally exhorbitant fees hitting taxpayers in other states and counties.

There are multiple possible explanations for how this system doubles and triples reported votes for some voters (oddly, in White Republican suburbs), and for why it likes to alter people’s political party and erase their voter history.

SUMMARY OF FINDINGS ON ACCENTURE’S VOTER REGISTRATION SYSTEM

Accenture’s “ESM” voter registration / voter history system is really just a bunch of Microsoft Access tables riddled with faulty joins, lacking referential integrity, and also open to malicious play using easily written hidden Visual Basic or Java scripts residing on any computer linked into it. It cannot be made secure without completely redesigning the architecture.

Watch “Hacking Democracy” (search it on YouTube) for a real-life example of how simple it is to bypass all passwords using a VBA script, to implement anything you want with hidden code commands in systems built on this platform, which is also used for the Diebold GEMS system.

Yah, so where is “Accenture Global Services” based out of anyway? It was the Cayman Islands. Or is it now another tax-evading corporate secrecy haven, used not only to avoid paying taxes but to prevent the American public from knowing anything about the creepy white men who control corporate ownership?

PERMISSION TO REPRINT GRANTED WITH LINK TO BLACKBOXVOTING.ORG

* * * * *

TWO WAYS TO SUPPORT BLACK BOX VOTING:
(1) With your mouth and your keyboard – talk about and reprint our important bulletins!
(2) With crucially important tax deductible donations (Monthly sponsorhips are the best way to keep us going!): http://www.blackboxvoting.org/donate.html or mail to:
Black Box Voting
330 SW 43rd St Suite K
PMB 547
Renton WA 98057

 


 

Hacking Democracy

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Hacking Democracy

The controversial electronic voting documentary
Directed by Simon Ardizzone
Russell Michaels
Produced by Simon Ardizzone
Russell Michaels
Robert Carrillo Cohen
Starring Bev Harris
Kathleen Wynne
Andy Stephenson
Harri Hursti
Herbert Hugh Thompson
Ion Sancho
Release date(s) November 2, 2006

DVD released March 27, 2007

Running time 82 minutes
Language English

Hacking Democracy is a 2006 documentary film by producer Robert Carrillo Cohen and producer / directors Russell Michaels and Simon Ardizzone, shown on HBO. Filmed over three years it documents American citizens investigating anomalies and irregularities with ‘e-voting‘ (electronic voting) systems that occurred during the 2000 and 2004 elections in the U.S.A., especially in Volusia County, Florida. The film investigates the flawed integrity of electronic voting machines, particularly those made by Diebold Election Systems, and the film culminates dramatically in the on-camera hacking of the in-use / working Diebold election system in Leon County, Florida.

In 2007 Hacking Democracy was nominated for an Emmy award for Outstanding Investigative Journalism.[1]

Contents

Demonstrated flaws

The documentary follows Bev Harris and Kathleen Wynne, director and associate director for nonprofit election watchdog group Black Box Voting, as they attempt to discover the extent to which it would be possible to alter results on the electronic voting machines of Diebold Election Systems (now Premier Election Solutions). Andy Stephenson, an employee of Black Box Voting from July-December 2004, assisted with comparisons of audit documents in Volusia County and obtained a secret videotape of Harris interviewing a voting machine testing lab. Kathleen Wynne captured live video of Harris finding voting machine records in a Volusia County trash bag, and captured video of Cuyahoga County elections workers admitting that the initial 3% recount ballots had not been randomly selected during the 2004 presidential election. Harris and Wynne then embarked on a series of five voting machine hack tests with Dr. Herbert Hugh Thompson and Harri Hursti in 2005 and 2006. During the course of the documentary, multiple methods of tampering with the votes are shown.

The first is through editing the database file that contains the voting totals. This file is a standard Microsoft Access database, and can be opened by normal means outside of the encompassing voting program without a password. Some jurisdictions have disabled Microsoft Access, making it more difficult to alter the database, but this protection was shown to be bypassed by Dr. Herbert Hugh Thompson through a Visual Basic program which searched for a string of text and edited the file through external means. However, alterations of the results in either of these fashions would be caught if a vigilant elections official compared the results with voting machine tapes.[2]

Another hacking technique was demonstrated through hacking the actual computer code used in the Diebold Accu-Vote memory cards. This method was discovered by Finnish computer security expert Harri Hursti and is known as “the Hursti Hack“. In this hack, Harri Hursti rigged the Diebold optical scan voting system to make the wrong candidate win by adding negative (minus) votes to one race. This resulted in that race having votes literally subtracted from its vote total. These methods were tested by the Leon County Supervisor of Elections, Ion Sancho, on the actual Diebold optical scan voting system used by Tallahassee, Florida in all their prior elections. This method demonstrated, contrary to a previous Diebold statement, that a person attempting to rig the votes of a precinct would need access to only the memory card, not the optical scan voting system or tabulation software. This method, when cross-checked between the optical scan voting system and tabulation software, appears legitimate, and further produces a false zero-vote print-out to verify that the memory card has no votes inside it before voting begins. Following this historic hack Ion Sancho stated: “If I had not known what was behind this I would have certified this election as a true count of a vote.”[2]

Reaction

Even though no one from Diebold Election Systems admitted to having seen the film,[3] Diebold President David Byrd suggested that Hacking Democracy was “replete with material examples of inaccurate reporting”, and demanded that it not be aired.[4][5] His criticism was based on an earlier film made by the same three filmmakers. However, HBO refused to remove it from their schedules. In addition Diebold wrote a letter to HBO referring to the famous vote changing ‘Hursti Hack’ featured in the film, stating that “Harri Hursti is shown attacking a Diebold machine in Florida. But his attack proved later to be a complete sham.”

California’s Secretary of State commissioned a Special Report by scientists at UC Berkeley to investigate the Hursti Hack. Page 2 of their report states:

Harri Hursti’s attack does work: Mr. Hursti’s attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server.

One of Diebold’s objections to the film was that it failed to mention that Avi Rubin, a Johns Hopkins computer science professor and vocal Diebold critic, may have a conflict of interest. Rubin at one point owned stock options in VoteHere, which sells auditing software and systems for voting machines. However, Rubin disposed of his stock options and withdrew from the VoteHere advisory board in August 2003, and says he had not had any meaningful contact since joining over two years before, except occasionally receiving press clippings.[6]

DVD release

The film was released on DVD on March 20, 2007. It includes deleted scenes, a trailer and director biographies.

See also

References

  1. ^ “The 28th Annual Emmy Awards for News & Documentary: The Nominations”. EmmyOnline.org. Retrieved 2007-11-17.
  2. ^ a b Interviews & Features | TVGuide.com[dead link]
  3. ^ “HBO defends “Hacking” from criticism”. Monsters & Critics.
  4. ^ Janofsky, Michael (2006-10-31). “Diebold demands that HBO cancel documentary on voting machines”. Bloomberg News. Retrieved 2006-11-03.
  5. ^ Lerer, Lisa (2006-11-01). “Diebold Gives HBO A Thumbs Down”. Forbes.
  6. ^ “Statement of Avi Rubin on Relationship with VoteHere Inc.”. Johns Hopkins University. 2003-08-17. Retrieved 2007-11-17.

External links

Reviews

Germans & Russians Used Fluoride to Make Prisoners ‘Stupid & Docile’

Germans & Russians Used Fluoride to Make Prisoners ‘Stupid & Docile’

“To whom it may concern: I, Oliver Kenneth Goff, was a member of the Communist Party and the Young Communist League from May 2, 1936 to October 9, 1939. During this period of time, I operated under the alias of John Keats and the number 18-B-2. My testimony before the Government is incorporated in Volume 9 of the Un-American Activities Report for the year 1939.
“While a member of the Communist Party, I attended Communist underground training schools outside the City of New York in the Bues Hall and 113 East Wells Street, Milwaukee, Wisconsin. The East Wells Street School operated under the name of the Eugene Debs School. Here, under the tutoring of Eugene Dennis, M. Sparks, Morris Chyilds, Jack Kling and others, we were schooled in the art of revolutionary overthrow of the established Government.

“We discussed quite thoroughly the fluoridation of water supplies and how we were using it in Russia as a tranquilizer in the prison camps. The leaders of our school felt that if it could be induced into the American water supply, it would bring about a spirit of lethargy in the nation; where it would keep the general public docile during a steady encroachment of Communism. We also discussed the fact that keeping a store of deadly fluoride near the water reservoir would be advantageous during the time of the revolution, as it would give us opportunity to dump this poison into the water supply and either kill off the populace or threaten them with liquidation, so that they would surrender to obtain fresh water.

“We discussed in these schools, the complete art of revolution: the seizure of the main utilities, such as light, power, gas and water, but it was felt by the leadership that if a program of fluoridating the water could be carried out in the nation, it would go a long way toward the advancement of the revolution.” Oliver Kenneth Goff, 1957

Matrix III – Volume Two – Use of Sodium Fluoride for Population Behaviour Control

“It is a matter of record that sodium fluoride has been used for behavior control of populations. In an “Address in reply to the Governor’s Speech to Parliament,” [Victorian Hanstard, August 12, 1987, Nexus, Aug/Sept 1995], Mr. Harley Rivers Dickinson, Liberal Party Member of the Victorian Parliament for South Barwon, Australia, made a statement on the historical use of fluorides for behaviour control.

“Mr. Dickinson reveals that, “At the end of the Second World War, the United States Government sent Charles Elliot Perkins, a research worker in chemistry, biochemistry, physiology and pathology, to take charge of the vast Farven chemical plants in Germany. While there, he was told by German chemists of a scheme which had been worked out by them during the war and adopted by the German General Staff. This scheme was to control the population in any given area through mass medication of drinking water. In this scheme, sodium fluoride will in time reduce an individual’s power to resist domination by slowly poisoning and narcotising a certain area of the brain, and will thus make him submissive to the will of those who wish to govern him. Both the Germans and the Russians added fluoride to the drinking water of prisoners of war to make them stupid and docile.”

“According to Chemical Engineering News in 1988, each year in the United States, 80,000 tons of hydrofluosilicic acid, 60,000 tons of sodium silicofluoride and 3,000 tons of sodium fluorides are put into public water supplies (Chemical Engineering News, Vol 66, August 1, 1988, pg. 39). In view of all known research, it would be safe and accurate to rephrase the previous sentence and say that each year the United States Government allows 143,000 tons of fluoride products to be added to public water supplies in order to numb, disempower, and render docile a large percentage of the population. Present estimates in 1995 run about 200,000 tons annually. Now, why on earth would any oligarchic group (a small group) want to do this to tens of millions of people, deliberately and knowingly?

“All of these fluoride chemicals are byproducts of the aluminum and chemical fertilization industries that are considered to be hazardous wastes by the EPA, says the scientific assessment of the health risks of fluorides in 1985 “omits 90% of the literature which suggests fluoride is a mutagen – causes cellular and genetic mutation.” (Water Fluoridation: A Case of Truth Decay). Several scientists in the United States and other countries have done research or written reports questioning the benefits of water fluoridation or suggesting health risks, were discouraged by their employers from actually publishing their findings.”

Anyone who questions the use of fluoride in the drinking water is labeled a nut case. Fluoride helps prevent tooth decay! I have been drinking bottled water for 30 years. In 1991, I woke up and besides researching the “Federal” Reserve, the IRS, the UN and other one world government mechanisms, I also began looking at the fluoride issue. In 1993, I had all the metal fillings removed from my teeth and my daughter’s. These metal fillings were replaced with gold; a very expensive undertaking. We also stopped using any products with fluoride, i.e. toothpaste, mouthwash and any application from our dentist. The difference in our dental health changed dramatically.

My mother, her brother and my grandparents (from Sicily) never used toothpaste in their lifetime, they used baking soda. Same as my father’s side of the family who came over from Munich. Both sets of grandparents died with all their teeth and never had gum disease. My mom and my uncle both have their own teeth, no bridges, no root canals, no gum disease. To this day, they use baking soda. They live in areas where the water has never been fluoridated. My four brothers and sisters have all had gum disease to some degree and huge problems with their teeth. They all use products with fluoride, all have metal fillings and two of them still drink tap water. I find these differences interesting.

Some may think it’s just a bunch of conspiracy fodder, but having read thousands of pages from hundreds of documents, both historical and from research, there’s no doubt in my mind that fluoride is deadly and explains much about why Americans are so apathetic and lethargic about the very real dangers crushing our Republic. The American people simply have no will to resist and you can see it all across this country. Fluoride was introduced into the drinking water in this country around 1954. Think about it. Add into the mix the millions of gallons of diet soda pop consumed by Americans every day, ingesting deadly aspartame, also contained in more than 5,000 food products being eaten everyday, along with Splenda to “sweeten” and what you have is a population loading their bodies with deadly poisons. See the video ‘Sweet Misery’

While I haven’t drank more than a half dozen cans of soda in my entire life, I did use toothpaste and mouthwash which contains fluoride until 1993 when I made major changes. Everyday I thank God for my good health, but I also have worked very hard at staying healthy and keeping my weight within seven pounds from the day I graduated from high school. It’s not easy, but it all boils down to will power, self control and a desire not to be a burden to myself or my family in my later years.

Education is everything. Research means giving up your fun times to thoroughly explore an issue. I have taken the time to scan several documents which contain thoroughly researched documentation and data on fluoride. Dentists all across this country will tell you that fluoride is good for your teeth and gums. City fathers will continue to tell you fluoridating the drinking water is good for you. Most of them refuse to even look at all the scientific research that’s available. Thousands of cities across this country fluoridate their water. Conversely, hundreds of of cities in the U.S. refuse to fluoridate their water and dozens of countries refuse to poison their citizenry by fluoridating their water supply.

For the sake of your health and your family, I urge you to take the time to read all this important, fully documented research. You will see the major players and recognize names and companies (like Alcoa) who have been involved in this fluoride scam for decades. Americans deserve the truth and they deserve accurate information so they can make informed choices. Also, read the book The Fluoride Deception.

Click here to my Reading Room and you will see the section on fluoride. Read on-line or print out the 73 pages and share it with others. Friendly advice: keep your body free of toxic poisons – no matter how “good” you think it tastes. In my humble opinion, if the FDA says it’s okay, that’s the product to keep out of your body. Go natural!

http://www.westonaprice.org/envtoxins/fluoridationfraud.html

http://www.newswithviews.com/Devvy/kidd102.htm
© 2005 Devvy Kidd – All Rights Reserved

Mysterious Ancient Megaliths Of Mount Shasta A Place Of Forgotten Land

Mysterious Ancient Megaliths Of Mount Shasta A Place Of Forgotten Land

 

MessageToEagle.com – Mount Shasta, is a place shrouded in mystery. This is an enigmatic place where ancient myths and modern mysteries blend like a dream against a scenery of outstanding natural beauty.

Located near the northern side of beautiful Mount Shasta, close to Lake Shastina, there is ancient archaeological mystery.

Mount Shasta is sacred to American Indians living in this region. It was believed that Shasta is inhabited by the spirit chief Skell who descended from heaven to the mountain’s summit.

In modern days, the mountain has become famous for its odd, vortex-like cloud activity. Many people who come here believe Mount Shasta is a portal to another dimension, which could explain the unusually high UFO activity in the area, they say.

Mount Shasta has become famous for its lenticular clouds.
Image credit: Mount Shasta Bioregional Ecology Center

What is less known, are the remnants of ancient, megalithic structures of sacred and monumental importance which can also be found here.

Little is known about these mysterious ancient megaliths and a new upcoming documentary produced by Mount Shasta Film can shed more light on this enigmatic place.

According to Dustin Neff, the producer “Mount Shasta: California’s Mystical Mountain will be a feature-length documentary film focusing on the natural beauty and metaphysical phenomenon the Mountain is world-famous for.”

Dustin Neff, producer of the documentary Mount Shasta: California’s Mystical Mountain

“When I moved here in 2004 I wondered why nobody had ever thought to make a documentary about the Mountain, or film the abundance of natural beauty we’re fortunate to have here in our own backyard? The stories, history and scenery are all amazing.

 

Very little is known about the ancient megaliths of Mount Shasta. Image credit & copyright: Dustin Neff

 

It took me seven years to get around to it, but in late 2011, having nurtured a lifelong interest in filmmaking and having always been drawn to the Mountain by its otherworldly history and mystique, I decided to acquire a high definition video camera and go into production filming the first feature-length documentary of its kind.I’m glad I waited because the technology and tools available to the independent filmmaker are vastly more powerful and exciting to work with today than they were even a few years ago.

My initial goal in production was to spend at least a year (maybe, two) filming the natural beauty of the mountain and the surrounding area in all seasons.

Today, as I go back through the footage it’s like watching a dream pass before my eyes, and there is still so much more out there I’d like to explore and discover.

 

Mysterious ancient stones near Mount Shasta. Image credit & copyright: Dustin Neff

 http://vimeo.com/43351754

I don’t really know where this journey will lead, or where it will end, all I know for certain is that it feels like I’ve just set foot upon the mysterious shore of some forgotten land,” says Dustin Neff.

 

SOURCE: http://www.messagetoeagle.com/mountshastamegaliths.php

@ MessageToEagle.com.

War Toys: US Kicks-off Global Drones Race – Ultimately to Collect Data and Search Citizens

War Toys: US Kicks-off Global Drones Race – Ultimately to Collect Data and Search Citizens

Last week, Venezuelan President Hugo Chavez showcased his country’s first unmanned drone. It seems that an international race to dominate the sky has gone underway and the South American country has become a player in the game of drones with the help of Iran, Russia and China. Retired Army Colonel Douglas Macgregor joins us to explain why more and more countries are rushing to get their hands on an unmanned aircraft.

Like us and/or follow us:

http://twitter.com/RT_America
http://www.facebook.com/RTAmerica

 

Air Force Set to Be Deployed Inside U.S. to Collect Data and Search Citizens

 

By Alex Thomas
theintelhub.com
June 7, 2012

The United States Air Force, through the use of unmanned aerial drones, is set to be deployed inside the United States to collect data, investigate places of interest, and share data with local police agencies.

An unclassified Air Force Memo from late April documents the fact that the military is operating drone aircraft domestically and that, through a complete end run around the Constitution, can essentially share it with local law enforcement even if it has no relation to terrorism.

While many articles have already been published detailing the fact that the military is or will be sharing information they collect with local law enforcement, a more startling fact has been largely ignored by the corporate controlled media. (until now)

In a recently published op-ed, Andrew Napolitano outlined the fact that once the military identifies something of interest they can apply to a military commander for permission to conduct searches of American property and or citizens which in turn is a form of martial law.

“It gets worse. If the military personnel see something of interest from a drone, they may apply to a military judge or “military commander” for permission to conduct a physical search of the private property that intrigues them. And, any “incidentally acquired information” can be retained or turned over to local law enforcement. What’s next? Prosecutions before military tribunals in the U.S,” wrote Napolitano.

The Electronic Frontier Foundation has also publicly commented on the fact that the Air Force is now openly recording information on the American people in domestic situations.

“We’ve seen in some records that were released by the Air Force just recently, that under their rules, they are allowed to fly drones in public areas and record information on domestic situations,” explained Jennifer Lynch, of the EFF.

Madison Ruppert, writing for EndtheLie.com, detailed the broad exceptions to a guideline that is supposed to limit the military from non-consensual surveillance.

While the U.S. Air Force’s guidelines claim that drones are not allowed to carry out “non-consensual surveillance” on U.S. citizens or property, there are plenty of exceptions to this allowing such surveillance to occur.

Some of these many exceptions outlined in the Air Force documents include:

– Investigating or preventing clandestine intelligence activities by foreign powers, international narcotics activities, or international terrorist activities

– Protecting DoD employees, information, property and facilities

– Preventing, detecting or investigating other violations of law

Seems pretty broad, doesn’t it? “Other violations of law” leaves the door wide open for the drones to be used for just about everything. After all, jaywalking is a violation of law. Does this mean that if a drone captures someone jaywalking, the use of military drones in U.S. airspace is somehow justified?

That’s right, the Air Force now has the authority to carry out drone surveillance on American citizens for essentially any violation of law.

Sadly, we now live in a country were 30,000 drones are set to be launched by various law enforcement agencies, the military, and private companies.

The idea of the military not being used against the American people has now been completely thrown out the window with the only hope citizens of this country have left being the support of individual military members who choose to go against these Unconstitutional directives.

 

 

The Mark of the Beast: Implantable RFID Chips

The Mark of the Beast: Implantable RFID Chips

The Dawning of the Worldwide Human Tracking System – Implantable RFID Chips

“And in those days shall men seek death, and shall not find it; and shall desire to die, and death shall flee from them.” Revelation 9:6

What is presented on this page is not fantasy, or our idea of something that could happen in the near future. Every item here will tell you about advances in technology that either are in place, or in the end stages of development and about to be released. Every item here will show you not only the plan, but the actuals tools that the New World Order (NWO) has in place to track you right now at this very moment to monitor you, and control you. We also tell you why they are doing this, and how it all will end. The bible, in the book of Revelation, calls this the mark of the beast. What the apostle John could only stare at in awe and wonder in the revelation that Jesus showed him of the end times, not knowing fully what he saw, we get to see become real. These are the end times foretold in the book of Revelation.

The Mark of the Beast

The first thing you need to understand about the mark of the beast is that it is a worldwide system that collects and gathers information, and ties it in with personal records of all kinds. This will culminate in a chip, implanted in your body, that will personally connect you to the system. Today you see that information is already being collected when you use your debit card, the loyalty card at the supermarket, your car has computer chips that enable it to function – everything is controlled by a chip that feeds the information to various databases around the world. Even the Internet itself is part of this system.

http://vimeo.com/32380647
It’s hard to now imagine life ‘pre-iPhone’, and soon we won’t be able to remember what life was like without the RFID chip.

We have become a worldwide, connected society whose every move is being tracked and cataloged. For now, it’s all voluntary, and the New World Order has to reply on making cool devices to lure us in to wanting to be tracked – iPhone, smart phones, RFID chips – but the day is coming where you will be forced to have a chip put inside your body. When that day comes, you will know who the Antichrist is because he will be the one in power over the whole world. Accepting that chip will mean you side with the Antrichrist, and against God. Accepting the chip will doom your soul to Hell forever. Whatever you do, do notever let anyone put a chip inside your body. It will be better to side with God and die at the Antichrist’s hand then to accept the chip and spend eternity in Hell.

What Is RFID? (Radio Frequency IDentification)

Radio Frequency IDentification is an automatic data capture technology that uses tiny tracking chips affixed to products. These tiny chips can be used to track items at a distance–right through someone’s purse, backpack, or wallet. Many of the world’s largest manufacturing companies would like to replace the bar code with these “spy chips,” meaning that virtually every item on the planet–and the people wearing and carrying those items–could be remotely tracked. There is currently NO REGULATION protecting consumers from abuse of this technology. source – spychips.com

The Mark of the Beast is lurking in the heart of the RFID chip

For years you have been told, through readers of bible prophecy and conspiracy theorists, that the mark of the beast was coming soon and that people who receive an implantable microchip. This has been swirling around for about the past 30 years or so. Well, the years ticked by with no progress on making a chip that could do that, and eventually people began to file rumor that under “bogus” and forgot about it. When all of a sudden, we have this:

http://vimeo.com/32380487

Sure sounds like the mark of the beast to me….

Now, I ask you, does that sound like a conspiracy theory to you?

What it does sound like is the Vice-President of the United States telling the Chief Justice of the Supreme Court that “one day you will rule on implantable chips in human beings”. Wow…take a moment, let it sink in. And that’s how it goes with most conspiracy theories, they have a very strong basis in reality. And yes, there is a government plan to put a chip in your body, and you need to decide if this is a good thing or a bad thing. Just how strong is the push to bring this technology to the people? This strong –

http://vimeo.com/32380893

The Mark of the Beast has hit every aspect of our government, and it goes so much deeper than you
can imagine.

Tommy Thompson, former Wisonsin Gov and HHS Sec’y supports VeriChip implants in humans, and
so would you if you had over 150,000 shares of stock in VeriChip Corporation. Interesting Note:
when Thompson is asked where the chip is place, he says you “put it in your right arm”, and just
coincidentally that’s one of the two places the book of Revelation says it is to go.  Hmmmm…

Microchips implanted in Mexican officials.

Dateline – Mexico: July 14, 2004

“Carlos Altamirano is scanned to show the 16-digit code of his implanted VeriChip chip in this file photo from July 2003 in Mexico City. Now the same technology is being used by Mexico’s attorney general and hundreds of others.” source – MSNBC.com


Photo of a man being chipped with the mark of the beast

They will use any and every excuse to sell it to us.

Chipping kids to prevent kidnappings, chipping the elderly to guard against Alzheimer’s, chipping diabetics, chipping people with allergies, chipping people to prevent medical mistakes…and the list goes on and on. It all sounds good, it all sounds so right – using technology to better our lives. But
it’s not good, and it’s not right. What it is, is the Mark of the Beast as foretold by God
(see left side story).

http://vimeo.com/32381050

IBM is showing us the future – believe it.

Should you get chipped? All depends on whose side you are on.

God’s Side, or Satan’s. Because this system is what the Antichrist will use during the Tribulation.
When fully activated, it will be the Devil’s mark, take it at your own peril. This is what God says will happen to every one who takes the mark:

“And the third angel followed them, saying with a loud voice, If any man worship the beast and his image, and receive [his] mark in his forehead, or in his hand, The same shall drink of the wine of the wrath of God, which is poured out without mixture into the cup of his indignation; and he shall be tormented with fire and brimstone in the presence of the holy angels, and in the presence of the Lamb: And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor night, who worship the beast and his image, and whosoever receiveth the mark of his name.
Rev 14: 9,10

The mark of the beast in advertising

The New World Order is very clever. When they want to advance their agenda of a One World Government with every under their control, they have many ways to get the job done. One of these ways is through marketing and advertising.

TheSun.com has an interesting story today about a new technology being test marketed in Japan
right now. This product is a billboard with facial recognition software to scan your face, determine
your gender, and then deliver an appropriate ad.

“Retailers are targeting individual shoppers with digital billboards like those in the hit Tom Cruise
film Minority Report. Cameras in the advert hoardings identify the age and sex of passers-by then display relevant products. The makers claim images of faces are erased immediately but some consumers fear the billboards will capture their expressions and responses to the ads. The signs are being tried out in Japan. Digital advertising expert Omaid Hiwaizi, 40, from London agency Chemistry, said: “Companies will be watching closely to see if they do well.” source – thesun.com

Sounds kinda cool, doesn’t it? Like something you would have a lot of fun “playing with” as you are walking down the street. And that’s exactly what the NWO is counting on. Because that is how they will get you to accept 24-hour facial surveillance of each and every person on this planet. They
make it fun, make it catchy…they make it something you look at with awe and admiration. And the whole time, what they are really doing, is laying the snares to stamp, catalog and process each and every one of us. When the system is finished, this is what the bible says will be the result:

“And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number [is] Six hundred threescore [and] six.” Revelation 13: 16-18

Truly this is end times bible prophecy being fulfilled before our very eyes.

Note: If the implantable RFID chip does turn out to the the Mark of the Beast, which seems highly
likely, it will not be until the actual reign of the Antichrist that it will have it’s power and significance.
The Bible is quite clear that receiving the Mark, during the Tribulation, is completely and obviously
tied to the worship of the antichrist. No one will take the mark by accident. You will be asked to
swear allegiance to the antichrist as an act of worship. Anyone receiving the mark during the time
of the Great Tribulation will know exactly why they are getting it. It will be because they will be
acknowledging, falsely, the antichrist as God.

 


Positive ID, formerly known as VeriChip, is the company that created the implantable RFID chip for human use.

So if you were today to get a senior relative with Alzheimer’s chipped or a young child chipped to thwart a kidnapping, that would not be considered receiving the mark of the beast. However, NTEB highly advises against having anyone you know and loved chipped. Ever. Resist it, reject it, fight it with your dying breath. The mark of the beast is real.


 

The mark of the beast as found in everyday news stories

Wal-Mart Radio Tags to Track Clothing

“Wal-Mart Stores Inc. plans to roll out sophisticated electronic ID tags to track individual pairs of jeans and underwear, the first step in a system that advocates say better controls inventory but some critics say raises privacy concerns. Starting next month, the retailer will place removable “smart tags” on individual garments that can be read by a hand-held scanner. Wal-Mart workers will be able to quickly learn, for instance, which size of Wrangler jeans is missing, with the aim of ensuring shelves are optimally stocked and inventory tightly watched. If successful, the radio-frequency ID tags will be rolled out on other products at Wal-Mart’s more than 3,750 U.S. stores.


Marc F. Henning for The Wall Street Journal Apparel supervisor Sonia Barrett uses a handheld scanner to read EPC labels
on men’s denim jeans on July 19, while checking inventory at the Walmart Supercenter Store No. 1 in Rogers, Ark.

“This ability to wave the wand and have a sense of all the products that are on the floor or in the back room in seconds is something that we feel can really transform our business,” said Raul Vazquez, the executive in charge of Wal-Mart stores in the western U.S. Before now, retailers including Wal-Mart have primarily used RFID tags, which store unique numerical identification codes that can be scanned from a distance, to track pallets of merchandise traveling through their supply chains. Wal-Mart’s broad adoption would be the largest in the world, and proponents predict it would lead other retailers to start using the electronic product codes, which remain costly. Wal-Mart has climbed to the top of the retailing world by continuously squeezing costs out of its operations and then passing on the savings to shoppers at the checkout counter. Its methods are widely adopted by its suppliers and in turn become standard practice at other retail chains.” source – Wall Street Journal

http://vimeo.com/32381240

Mark of the beast in vending machines:
Vending machines that use fingerprint and retinal scans to sell you chips

“MYFOXNY.COM – Your thumbprint might soon be the key to an afternoon candy bar. A Massachusetts based vending machine company is joinng the growing ranks of companies that are field-testing new technologies. Next Generation Vending and Food Service is experimenting with biometric vending machines that would allow a user to tie a credit card to their thumbprint. “For a certain demographic that is pretty cool,” says company president John S. Ioannou. Next Generation is currently testing about 60 of the biometric machines in various locations in the northeast.


The Diji-Touch vending machine records your thumnprint and retinal scan to sell you things

The company is also testing other technologies. Ioannou says the key to the transforming the vending machine business is making the consumer feel more engaged. The days might be numbered where a consumer watches a bag of chips roll through the machine and drop. Next Generation is also testing a machine that includes a 46″ touch-screen display that acts similarly to an iPhone display. The user can click on an item, flip the image and even see the nutrional information on the back of the packaging. Ioannou says initial results are good saying, “The feedback is extraordinary.” The machines include internally mounted cameras to monitor what is going on outside of the machine. The company is also installing wireless or Ethernet connections on all of its current machines so there will be real-time reporting of the amount of goods in the machine for restocking purposes. Monitors will even be able to report when a coin is stuck in the machine. All of the current machines will be upgraded by the end of 2011.” source – MyFoxNY

They are training us to allow our thumbprints to be on file in order to buy snack food. They are getting us to buy into a world system that, when complete, will monitor and track our every move, record every purchase. To what end, you say? So that when this system that the bible calls the mark of the beast is complete, you will not be able to buy anything or sell anythingwithout the permission of the Goverment. You will be completely and totally controlled. They will apply this technology to everything. And then one day, when the system is complete, they will link together your thumb print, your eye scan, your financial information, your bank cards, your automatic deposit paycheck, the computer sensors inside your car, your smart phones, your home computer, your medical records, and even brain waves into one, complete system that the Goverment will control. Without their permission you will buy nothing, sell nothing, and go nowhere untracked. Mark of the beast in your trash can: High-tech garbage carts with RFID chips force recycling or pay $100 fine

CLEVELAND, Ohio — It would be a stretch to say that Big Brother will hang out in Clevelanders’ trash cans, but the city plans to sort through curbside trash to make sure residents are recycling – and fine them $100 if they don’t. The move is part of a high-tech collection system the city will roll out next year with new trash and recycling carts embedded with radio frequency identification chips and bar codes. The chips will allow city workers to monitor how often residents roll carts to the curb for collection. If a chip show a recyclable cart hasn’t been brought to the curb in weeks, a trash supervisor will sort through the trash for recyclables.” source – Cleveland.com


Soon, every trash and recycle bin in America will be armed with an RFID chip to report on every thing you do…

NTEB reported on this happening in the UK, and warned that it would soon slither across the ocean and set up shop here in America. Big Brother plans on putting an RFID chip in EVERY thing, to track your every move. And the very last thing they will chip will be YOU. Guaranteed.

 Mark of the beast in your health club:
24 Hour Fitness rolls out finger scanners at gyms

(AP) – 4 hours ago SAN RAMON, Calif. – Members of the 24 Hour Fitness chain no longer need to worry about forgetting their membership cards and IDs when they go to the gym: All they need to bring are their fingers. The San Ramon-based company is now using fingerprint scanners at its 60 San Francisco Bay area locations to verify members’ identities. It also has started offering so-called “Cardless Check-In” this month at some gyms in other states. To enter the gym, 24 Hour Fitness members need to punch in a 10-digit code and have an index finger scanned by a device that compares the fingerprint to one on file. The scanners underscore the growing use of biometric technology, which uses unique physical features such as hands, eyes and faces to identify people.” source – Google Mark of the beast in your school:
Connecticut students to get RFID tracking tags.

In the tony town of New Canaan, students might someday get tracking tags along with their textbooks. No decisions have yet been made, but school officials plan to look into the possibility of adding radio frequency tags to student or staff ID cards, or place them on school property, like laptops, the New Canaan Advertiser reports. The company that makes the devices is SecureRF Corporation, based in Westport. It has applied for a $100,000 grant from the National Science Foundation to conduct science research and wants New Canaan High School to use the technology, the Advertiser reports.” source – NBC

 Mark of the beast in Outer Space:
The Government’s New Right to Track Your Every Move With GPS.

Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn’t violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway – and no reasonable expectation that the government isn’t tracking your movements.


The mark of the beast will cover the whole earth

That is the bizarre – and scary – rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants – with no need for a search warrant. It is a dangerous decision – one that, as the dissenting judges warned, could turn America into the sort of totalitarian state imagined by George Orwell. It is particularly offensive because the judges added insult to injury with some shocking class bias: the little personal privacy that still exists, the court suggested, should belong mainly to the rich.

The court went on to make a second terrible decision about privacy: that once a GPS device has been planted, the government is free to use it to track people without getting a warrant. There is a major battle under way in the federal and state courts over this issue, and the stakes are high. After all, if government agents can track people with secretly planted GPS devices virtually anytime they want, without having to go to a court for a warrant, we are one step closer to a classic police state – with technology taking on the role of the KGB or the East German Stasi.” source – Yahoo News

 Mark of the beast in your smart phone:
Apple’s plan to track your every move.

As one of the world’s most successful innovator and creator of cutting-edge technology that millions of people adopt the second it’s released, paying close attention to what they do is very important. So here are some of the new features being planned in future releases fof their products, particularly for the iPhone.


Apple presents the Mark of the Beast app – it’s the entire phone.

  • A system that can take a picture of the user’s face, “without a flash, any noise, or any indication that a picture is being taken to prevent the current user from knowing he is being photographed”;
  • The system can record the user’s voice, whether or not a phone call is even being made;
  • The system can determine the user’s unique individual heartbeat “signature”;
  • To determine if the device has been hacked, the device can watch for “a sudden increase in memory usage of the electronic device”;
  • The user’s “Internet activity can be monitored or any communication packets that are served to the electronic device can be recorded”; and
  • The device can take a photograph of the surrounding location to determine where it is being used.

In other words, Apple will know who you are, where you are, and what you are doing and saying and even how fast your heart is beating. In some embodiments of Apple’s “invention,” this information “can be gathered every time the electronic device is turned on, unlocked, or used.” When an “unauthorized use” is detected, Apple can contact a “responsible party.” A “responsible party” may be the device’s owner, it may also be “proper authorities or the police.” source – EFF.org 

Mark of the beast in your money:
420 banks demand 1-world currency

“The Institute of International Finance, a group that represents 420 of the world’s largest banks and finance houses, has issued yet another call for a one-world global currency, Jerome Corsi’s Red Alert reports. “A core group of the world’s leading economies need to come together and hammer out an understanding,” Charles Dallara, the Institute of International Finance’s managing director, told the Financial Times. An IIF policy letter authored by Dallara and dated Oct. 4 made clear that global currency coordination was needed, in the group’s view, to prevent a looming currency war.The narrowly focused unilateral and bilateral policy actions seen in recent months – including many proposed and actual measures on trade, currency intervention and monetary policy – have contributed to worsening underlying macroeconomic imbalances,” Dallara wrote. “They have also led to growing protectionist pressures as countries scramble for export markets as a source of growth.” Dallard encouraged a return to the G-20 commitment to utilize International Monetary Fund special drawing rights to create an international one-world currency alternative to the U.S. dollar as a new standard of foreign-exchange reserves. ” source – WND

RFID Tracking devices used in school badges, the mark of the beast

Radio frequency identification – the same technology used to monitor cattle – is tracking students in the Spring and Santa Fe school districts. Identification badges for some students in both school districts now include tracking devices that allow campus administrators to keep tabs on students’ whereabouts on campus. School leaders say the devices improve security and increase attendance rates. “It’s a wonderful asset,” said Veronica Vijil, principal of Bailey Middle School in Spring, one of the campuses that introduced the high-tech badges this fall.


Seventh-grader Samantha Seger shows her ID badge, which Brittan School uses to monitor students’ movements on
campus. Chronicle photo by Lacy Atkins Credit: LACY ATKINS.

Mark of the beast? You bet’cha

But some parents and privacy advocates question whether the technology could have unintended consequences. The tags remind them of George Orwell’s Big Brother, and they worry that hackers could figure a way to track students after they leave school.” source – Houston Chronicle

Mark of the beast everywhere:
Every email, cell phone call and website to be stored by government in UK

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to “end the storage of internet and email records without good reason”. Any suggestion of a central “super database” has been ruled out but the plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism.” source – Telegraph UK 

Mark of the beast in medicine:
Novartis Pharmaceuticals to launch ‘smart pill’ with embedded chip

(Reuters) – Novartis AG plans to seek regulatory approval within 18 months for a pioneering tablet containing an embedded microchip, bringing the concept of “smart-pill” technology a step closer. The initial program will use one of the Swiss firm’s established drugs taken by transplant patients to avoid organ rejection. But Trevor Mundel, global head of development, believes the concept can be applied to many other pills. “We are taking forward this transplant drug with a chip and we hope within the next 18 months to have something that we will be able to submit to the regulators, at least in Europe,” Mundel told the Reuters Health Summit in New York. “I see the promise as going much beyond that,” he added.” source – Reuters 

Mark of the beast in your pizza:
The Big Brother Pizza Shop

This is a humorous take on a very serious topic – the coming One World Government and the Mark of the Beast which will control the lives of every man, woman and child on the face of the earth.

http://vimeo.com/32381522

Mark of the beast in your face:
NYPD Commences Use Of Iris Scans Of Suspects

NEW YORK (AP) — Along with fingerprints and mug shots, the New York City Police Department is now taking photographs of the irises of crime suspects. The NYPD says the images will be used to help avoid cases of mistaken identity. The process takes about five seconds. Every suspect will be scanned again using a handheld device shortly before they are arraigned to make sure the irises match. Police say the software, handheld device and cameras cost about $23,800 each, and 21 systems will be used around the city. Central booking in Manhattan started taking photos Monday. The devices will be in use in Brooklyn and the Bronx in the upcoming weeks, and later in Staten Island and Queens. Police say the photos cause no damage to the eye. source – CBS Local NYC 

Mark of the beast in your iPhone:
iPhone and Android Apps Breach Privacy

Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner’s real name–even a unique ID number that can never be changed or turned off. These phones don’t keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found. An examination of 101 popular smartphone “apps”–games and other software applications for iPhone and Android phones–showed that 56 transmitted the phone’s unique device ID to other companies without users’ awareness or consent. Forty-seven apps transmitted the phone’s location in some way. Five sent age, gender and other personal details to outsiders. Among the apps tested, the iPhone apps transmitted more data than the apps on phones using Google Inc.’s Android operating system. Because of the test’s size, it’s not known if the pattern holds among the hundreds of thousands of apps available. Apps sharing the most information included TextPlus 4, a popular iPhone app for text messaging. It sent the phone’s unique ID number to eight ad companies and the phone’s zip code, along with the user’s age and gender, to two of them. Both the Android and iPhone versions of Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss–players try to throw paper wads into a trash can–each sent the phone’s ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies. source – Fox News

The app that can read your mind: iPhone brainwave detector arrives
It’s a device that would be more at home on the set of a Star Wars movie than the streets of Britain. But an iPhone application has been developed that can read minds. The XWave allows users to control on-screen objects with their minds as well as train their brains to control attention spans and relaxation levels.

 

The device – that could confuse Luke Skywalker himself – is the latest in the field of emerging mind-controlled games and devices and works via a headset strapped around the user’s forehead, plugging into the iPhone jack. A state-of-the-art sensor within the device can then read the user’s brainwaves through the skull, converting them into digital signals before displaying them in various colours on the iPhone screen. And as the mind focuses on a particular task the graphics change, indicating the user’s level of concentration or relaxation. The high-tech sensor was developed by innovations giant PLX Devices using technology that has for years been used by doctors to treat epilepsy and seizures in patients. Brain train: As the mind focuses on a particular task the graphics change, indicating the user’s level of concentration or relaxation But PLX Devices founder and CEO Paul Lowchareonkul said it was a matter of time before such contraptions entered the mainstream. source – Daily Mail UK


 

Mark of the beast, bringing the image to life
Apple patent reveals plans for holographic display

“And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.” Revelation 13:15

A recently granted patent reveals that Apple, the company behind the iPod and iPhone, has been working on a new type of display screen that produces three dimensional and even holographic images without the need for glasses. The technology could be used to produce a new generation of televisions, computer monitors and cinema screens that would provide viewers with a more realistic experience. The system relies upon a special screen that is dotted with tiny pixel-sized domes that deflect images taken from slightly different angles into the right and left eye of the viewer. By presenting images taken from slightly different angles to the right and left eye, this creates a stereoscopic image that the brain interprets as three-dimensional. Apple also proposes using 3D imaging technology to track the movements of multiple viewers and the positions of their eyes so that the direction the image is deflected by the screen can be subtly adjusted to ensure the picture remains sharp and in 3D. source – Telegraph UK

Mark of the beast on ID cards
Mexico to pioneer iris technology on ID cards

Mexico will on Monday become the first country to start using iris scans for identity cards, according to the government, which claims the scheme will be highly secure. “The legal, technical and financial conditions are ready to start the process of issuing this identity document,” Felipe Zamora, responsible for legal affairs at the Mexican Interior Ministry, told journalists Thursday. The documents, which will include the eye’s image as well as fingerprints, a photo and signature, will be 99 percent reliable, Zamora said. Critics, including the National Human Rights Commission, have slammed the system, expressing concern that compiling personal data could violate individual rights. The move will be introduced gradually, with some 28 million minors taking part in a first two-year stage, due to cost 25 million dollars. The cards are due to start for adults from 2013. Iris recognition is increasingly used in airports, controlling access to restricted areas, and prisoner booking and release. source – Brietbart

 


 

The Mark of the Beast

Now you know what the mark of the beast is, and how society is rushing headlong into it’s date
with the antichrist. If the day comes when you are asked to choose whether or not you will be
implanted with a chip, you know what your answer should be. No. This is not a game, and it is not
some science-fiction story. The mark of the beast is real. The mark of the beast is happening. The mark of the beast is fulfillment of bible prophecy, and cannot be stopped. But there is one thing you can do…

Don’t take it.

Click here to read John McTernan’s excellent article on The 666 Surveillance System

Mark of the Beast Updates Page: Click here

The Mark of the Beast as found in bible prophecy.

SOURCE: http://nowtheendbegins.com/pages/mark_of_the_beast/markOF_theBEAST.htm

NASA Scientists And Astronauts Tell The World Aliens Do Exist (Video)

NASA Scientists And Astronauts Tell The World Aliens Do Exist (Video)

Recently, I published an article titled Proof Aliens Do Exist, Two Leaked Videos, following up on this topic, I have compiled a few videos in this post that show staff from NASA who say they will testify in front of congress that they personally saw pictures of UFOs and an extraterrestrial base on the moon, and Astronauts saying aliens and UFO are real.

http://www.youtube.com/watch?v=x2qaZFC2PtM

This second one is Buzz him self explaining his personal experience with a UFO in space during one of the Apollo missions.

The third one is one some might not know of Edgar Mitchell who actually explains that the aliens he saw were the stereotypical “Grey” aliens

http://www.youtube.com/watch?v=mVV6u-Y2XZU

To me it is pretty hard to give an argument against them given the circumstances revolving around who these people are. They are not your average Joe from the farm down the street who says he saw a UFO. I think lots of times these are dismissed because these videos are scattered around the web. There isn’t many places on the web that has a compilation of high profile people saying that UFOs and aliens are real, let alone found else where in society. Most of the ones I found on the web have some obvious fake stuff mixed in which then gets people confused about the real ones.

My goal is to really start compiling more of these things that really seem like to be the real thing. When things are spelled out for people, it is a lot easier to connect the dots. But then again, if all the dots were already connected, what would then be the point of discovering something new?

Here is one last video about the moon. Some people believe it to be constructed by aliens. Maybe on the next post I will dive deeper into this interesting theory. There is one fact I did find interesting though on a website called pureinsight.org, there is a paragraph that says:

“The average distance between the earth and the moon is 380,000 km, and between the sun and the earth is about 150,000,000 km. The latter is about 395 times further than the former. The diameter of the sun is about 1,380,000 km, while that of the moon is 3,400 km; the ratio of the two is again 395 times greater. Both ratios are 395. Could it be a coincidence? What does it mean?”

Very interesting fact. I didn’t know that. I checked this with this website www.physicsforums.com and it confirms it.

Very interesting stuff to say the least. Anyway I will that will leave that one for next time.

Apollo Belenus is the Paranormal editor for Before its News,

Follow on Twitter: @B4INparanormal

 

Natural Cures For Cancer – Why Are We Not Being Told About ?

Natural Cures For Cancer – Why Are We Not Being Told About ?

There’s a lot of misconception about cancer. We have been told by the so called ‘experts’ who work in accordance with the big pharmaceutical businesses that there is NO known way to cure or even prevent it, and instead they advise us to take their chemo & radio treatments for it which, quite clearly, either cause more damage than there actually is or have no effect on the cancer at all!

However, there are people out there (Rick Simpson, Jim Humble, just to name a few) who have discovered natural, safe and more effective substances to combat cancer. Hundreds, if not thousands of people worldwide have used these substances and claimed to have successfully cured themselves of various forms of cancer, including terminal, and others claim to have cured themselves of other illnesses like arthritis, migraines, MS, anxiety, depression and even AIDS & malaria by using them. But the mainstream media will not promulgate any of this, and the big pharmaceutical companies will not endorse them. Why? Maybe it’s because they’re not as profitable as their own made drugs!

The big pharmaceutical industry invests so much money by manufacturing and selling their medication drugs and by deluding the public into thinking that there is no other alternative medicine. If the people found out about these substances, the whole of this monopoly may well just fall apart.

 

Also, science has“> proven time and time again that the cause of cancer is due to under nutrition, especially due to a lack of nutrients like vitamins C & B17, and due to an acidic body. This is because the nutrients & enzymes we consume, from say a diet consisting of raw foods like fruits & vegetables, neutralize unhealthy acidic cells in the body, like cancer cells, and protect the body against the cancer causing agents that we pick up in our everyday lives from cigarette smoke, mobile phones, food & drink additives, and pollution in general. If our bodies became nutrient deficient, these carcinogens will accumulate inside of us, destroy tissues and eventually form cancers. This is why cancer is so common in todays world, as most people’s diets consist of nutrient depleted, processed foods. So the obvious way to prevent or possibly cure cancer is… simply by having a healthy diet! Drink clean water, eat more raw fruits & vegetables that make your body alkaline, unlike meat and dairy that makes it acid and cancerous!

If we all started eating more healthily by growing our own food instead of buying the carcinogen loaded, genetically altered crap from the supermarkets, and used, say stone-fruit seeds, MMS, cannabis & mangosteens as alternative medicines, this planet could almost be disease free. Who needs pharmaceuticals when the solution was already here?

 

 

RELEASED: Alan Turing Notes on Cryptography

RELEASED: Alan Turing Notes on Cryptography

Are there any insights left to be wrung from the code breaker’s papers?

Chris Vallance of the BBC reports that GCHQ has released some of Alan Turing’s papers on the theory of code breaking. They’re not on display at the National Archives at Kew. I’ve checked the web pages of the Archives and GCHQ, and there is as of my writing nothing up there, yet.

The two papers are titled, The Applications of Probability to Crypt” and Paper on the Statistics of Repetitions. They discuss the use of mathematics to cryptanalysis. This might seem a bit obvious now, but at the time cryptanalysis was largely done by smart people and not by machines. A code-breaker was more likely someone who was good at solving complex crossword puzzles than working with numbers. It was unusual to bring in someone like Turing to a cryptology lab.

It wasn’t until machine cryptography was developed after WWI that codes were developed that were so complex humans couldn’t break them. The Enigma machine is the most famous, but there were others used all around the world.

However, using statistics has been a staple of code-breakers for centuries. It was used by British code-breaker George Scovell, to break Napoleon’s codes back in the early 1800s.

The BBC quotes a GCHQ mathematician that the papers discuss “mathematical analysis to try and determine which are the more likely settings so that they can be tried as quickly as possible.” Indeed, we know that the Engima codes were broken daily through flaws in distributing daily settings for the code machines themselves as much as breaking the actual cryptography.

It will be interesting to see what is in those papers. GCHQ says they have squeezed all the juice out of them, and therefore they are not likely to hold surprises for us in the private sector. Nonetheless, many of us will be interested in reading Turing’s words on the subjects.

Jon Callas is a renowned information security expert and CTO of Entrust.

Source: http://blogs.computerworlduk.com/security-spotlight/2012/04/alan-turing-notes-on-cryptography-released/index.htm

Mitt Romney: An Agent of The State of Israel

Mitt Romney: An Agent of The State of Israel

Romney’s Israeli Handler

Orit Gadiesh, former “War Room” assistant to Ezer Weizman and Moshe Dayan, is the daughter of Israeli Brigadier General Falk Gadiesh (born Falk Gruenfeld, Berlin, 1921) and his Ukrainian-born wife. Gadiesh is chairman of the management consulting firm Bain & Company, the parent company of Bain Capital, and was the company’s managing director under CEO Mitt Romney in 1992. “She’s like a Jewish mother figure to many of the people at Bain,” ex-Bainie Dan Quinn told Fortune magazine in 1996.

Bain Capital owns Clear Channel, the largest radio station group owner in the United States. Clear Channel owns the networks which air the most popular radio talk shows, including The Rush Limbaugh Show, The Glenn Beck Program, The Sean Hannity Show, America Now with Andy Dean, Coast to Coast AM, The Savage Nation, The Mark Levin Show, and The Dave Ramsey Show. (Graphic: “Rush Limbaugh Spills the Beans on the Jewish Conspiracy” by Pat Healy)

Mitt Romney was a co-founder of Bain Capital along with Bill Bain, seen here. Bain was ousted in 1991 and Romney served as CEO of Bain & Company in 1991-1992. In May 1991, while Romney was CEO, Gadiesh was named chairman of the company’s Policy Committee, which set the company’s business strategy and policy. In 1992, under Romney, she became managing director. Orit Gadiesh, who has worked at Bain & Co. since 1977, became chairman of Bain & Co. in 1993.

Orit Gadiesh, born in Israel in 1951, has worked closely with Mitt Romney since at least 1991, and probably much longer since she joined Bain & Company in 1977, when she was 26. Romney appointed Gadiesh to his transition team when he became governor of Massachusetts in November 2002. Gadiesh is the daughter of Falk Gadiesh, an Israeli brigadier general and former member of the general staff who reorganized the Israeli army in the early 1950s after a stint at the Massachusetts Institute of Technology (MIT).

Falk’s daughter Orit was chosen to serve in Israeli military intelligence. Her first position in the Israeli military was as assistant to Ezer Weizman, the deputy chief of staff who later became president of Israel. During the early 1970s, she worked in the war room, a bunker where Gen. Moshe Dayan was in charge. As a war room assistant to Weizman, Orit provided military leaders with documents and correspondence.

Prior to joining Bain & Company, Gadiesh served in the office of the Deputy Chief of Staff of the Israeli Army. Currently, she is on the board of directors of the Peres Center for Peace, an organization headed by a former chief of staff of the Israeli military, Lt. General Amnon Lipkin-Shahak. The high-level Mossadnik Avner Azulay, managing director of the Marc Rich Foundation, is also on the executive board of the Peres Center.

ROMNEY’S INTELLIGENCE CHIEF AND CAMPAIGN ADVISER ­ Mitt Romney named Michael Chertoff, the Israeli agent who supervised the destruction of the crucial evidence of 9/11, co-chair of his counterterrorism and intelligence advisory committee in October 2011. The 9/11 cover-up continues.

Mitt Romney attended the Mossad’s “Herzliya Conference on Israeli Security” in 2007. Romney and the current Israeli prime minister Benjamin Netanyahu worked together as consultants at the Boston Consulting Group early in their careers.

Romney’s close relationship with Orit Gadiesh and Israeli military intelligence is the real reason he is the chosen candidate of the Zionist establishment. Romney is being supported by high-level Zionists, Israeli military intelligence, and their controlled media network. This relationship between the Israeli military and Mitt Romney, a presidential candidate, should be of great concern to all Americans because this is how the Israeli military plans to drag the United States into a war with Iran.
By Christopher Bollyn
6-13-12

SOURCE: http://rense.com/general95/mittagnt.html

 

Ocean X Research Team Discovers  Mysterious Egg Shaped Object on Baltic Seabed

Ocean X Research Team Discovers Mysterious Egg Shaped Object on Baltic Seabed

15/6/2012, PRESS RELEASE

THE TREASURE HUNTERS, OCEAN X TEAM, DISCOVERED SOMETHING UNIQUE WHEN THEY DOVE DOWN TO THE MYSTERIOUS CIRCLE-SHAPED OBJECT IN THE BALTIC SEA

Treasure hunters confirm they have found something abnormal in the seabed

STOCKHOLM, Sweden, June 15, 2012

The Ocean X Team dove down to the circle-shaped object in the Baltic Sea and met something they never experienced before. First they thought it was just stone or a rock cliff, but after further observations the object appeared more as a huge mushroom, rising 3-4 meters/10-13 feet from the seabed, with rounded sides and rugged edges. The object had an egg shaped hole leading into it from the top, as an opening. On top of the object they also found strange stone circle formations, almost looking like small fireplaces. The stones were covered in something resembling soot.

“During my 20-year diving career, including 6000 dives, I have never seen anything like this. Normally stones don’t burn. I can’t explain what we saw, and I went down there to answer questions, but I came up with even more questions “, says Stefan Hogeborn, one of the divers at Ocean X Team.

The path to the object itself can be described as a runway or a downhill path that is flattened at the seabed with the object at the end of it.

“First we thought this was only stone, but this is something else. And since no volcanic activity has ever been reported in the Baltic Sea the find becomes even stranger. As laymen we can only speculate how this is made by nature, but this is the strangest thing I have ever experienced as a professional diver“, continues Peter Lindberg, one of the founder Ocean X Team.

Right now, scientists are examining samples from the circle-shaped object, and experts in sonar imaging are processing data from the ship to hopefully shed more light over the mysterious object.

SOURCE: http://www.oceanexplorer.se/