How To Secure Your Android Phone Like the NSA

How To Secure Your Android Phone Like the NSA

Rejoice, paranoid security fanatics! There’s finally a version of Android that enables your obsessive need to lock and control each and every file on your mobile device. There’s just one catch: you’ve got to trust the National Security Agency to use it. The NSA has released its security-enhanced version of Android, named SE Android… because G-men have slightly less imagination than your average sea sponge. You can download the source code now and compile it on any operating system you want, so long as you want to compile it on Fedora Linux. Other operating systems should work, but haven’t been tested.

To build SE Android, you’ll need to download and compile the latest code from the Android Open Source Project, then applying the custom SE Android code on top of it. So what do the extra bells and whistles do? Basically every single file and folder that Android has access to can be locked down tight, with considerable encryption and put in place to protect them. Network securityis enhanced on both WiFi and mobile networks, and the already considerable app permission system is enhanced with multi-level security.

Currently SE Android is only intended for emulators and the Nexus S, and son’t expect much support if you intend to expand its horizons. The project wiki assumes that you’re already familiar and comfortable with building Android from source, and know your way around Linux/Unix-based systems. Tin foil hats are sold separately.

via AndroidCommunity

 

TrapWire Tied to Anti-Occupy Internet-spy Program Tartan by NTrepid Abraxas Cubic

TrapWire Tied to Anti-Occupy Internet-spy Program Tartan by NTrepid Abraxas Cubic

How do you make matters worse for an elusive intelligence company that has been forced to scramble for explanations about their ownership of an intricate, widespread surveillance program? Just ask Cubic, whose troubles only begin with TrapWire.

Days after the international intelligence gathering surveillance system called TrapWire was unraveled by RT, an ongoing investigation into any and all entities with ties to the technology has unturned an ever-increasing toll of creepy truths. In only the latest installment of the quickly snowballing TrapWire saga, a company that shares several of the same board members as the secret spy system has been linked to a program called Tartan, which aims to track down alleged anarchists by specifically singling out Occupy Wall Street protesters and the publically funded media — all with the aid of federal agents.

Tartan, a product of the Ntrepid Corporation, “exposes and quantifies key influencers and hidden connections in social networks using mathematical algorithms for objective, un-biased output,” its website claims. “Our analysts, mathematicians and computer scientists are continually exploring new quantification, mining and visualization techniques in order to better analyze social networks.” In order to prove as such, their official website links to the executive summary of a case study dated this year that examines social network connections among so-called anarchists, supposedly locating hidden ties within an underground movement that was anchored on political activists and even the Public Broadcasting Station [.pdf].

“Tartan was used to reveal a hidden network of relationships among anarchist leaders of seemingly unrelated movements,” the website claims. “The study exposed the affiliations within this network that facilitate the viral spread of violent and illegal tactics to the broader protest movement in the United States.”

Tartan is advertised on their site as a must-have application for the national security sector, politicians and federal law enforcement, and makes a case by claiming that “an amorphous network of anarchist and protest groups,” made up of Occupy Oakland, PBS, Citizen Radio, Crimethinc and others, relies on “influential leaders,” “modern technology” and “illegal tactics” to spread a message of anarchy across America.

“The organizers of Occupy Wall Street and Occupy DC have built Occupy networks through online communication with anarchists actively participating in the movements’ founding,” the executive summary reads. On the chart that accompanies their claim, the group lists several political activism groups and broadcast networks within a ring of alleged anarchy, which also includes an unnamed FBI informant.

Although emails uncovered in a hack last year waged at Strategic Forecasting, or Stratfor, suggested that Occupy groups had been under private surveillance, the latest discovery of publically available information implies that the extent to which the monitoring of political activists on American soil occurred may have extended what was previously imagined.

Things don’t end there, though. While the TrapWire tale is still only just beginning, the Ntrepid Corporation made headlines last year after it was discovered by the Guardian that the company was orchestrating an “online persona management” program, a clever propaganda mill that was touted as a means “to influence regional and international audiences to achieve U.S. Central Command strategic objectives,” according, at least, to the Inspector General of the US Defense Department [.pdf]. The investigation eventually revealed that the US Central Command awarded Ntrepid $2.76 million worth of taxpayer dollars to create phony Internet “sock puppets” to propagate US support.

One year later, the merits of Tartan’s analytics are now being brought into question, but so are the rest of the company’s ties. A trove of research accumulated by RT, Project PM founder Barrett Brown, PrivacySOS.org and independent researchers Justin Ferguson and Asher Wolf, among others, has linked Tartan with an even more unsettling operation.

Margaret A. Lee of Northern Virginia is listed on several websites as serving on the Ntrepid board of directors as secretary, a position she held alongside Director Richard Helms, CFO Wesley R Husted and President Michael Martinka. And although several parties are going to great lengths to deny the ties, a paper trail directly links Lee and company to Abraxas — and thus Cubic — and, of course, TrapWire, the very surveillance system that is believed to be blanketing the United States.

According to the Commonwealth of Virginia’s State Corporation Commission, TrapWire Inc. was registered to Margaret A Lee on March 7, 2009. Other publically available information reveals that, at least at one point, Wesley Husted served as chief financial officer for TrapWire, Inc., where Richard H Helms held the title of CEO.

Various sources have since claimed that Helms, a former CIA agent that once ran the agency’s European division, has severed ties with TrapWire, yet the other connections remain intact.

In RT’s earlier research in the TrapWire case, it was revealed that TrapWire’s parent company, Cubic Corporation, acquired an online identity masking tool called Anonymzer in a 2010 merger, and also controls the fare card system at some of the biggest public transportation systems in the world. According to the latest findings, Cubic’s control extends beyond just that, though. Under their Ntrepid branch, Cubic controlled an operation that spied on political activists with FBI informants and attempted to link them to crimes across America.

Whether or not the TrapWire system was implemented in such operations is unclear, and Cubic continues to maintain that they are not involved with the surveillance network.

Last week, Cubic Corporation issued a press release claiming, “Abraxas Corporation then and now has no affiliation with Abraxas Applications now known as Trapwire, Inc.”

“Abraxas Corp., a risk-mitigation technology company, has spun out a software business to focus on selling a new product,” the article reads. “The spinoff – called Abraxas Applications – will sell TrapWire, which predicts attacks on critical infrastructure by analyzing security reports and video surveillance.”

Not only does a 2007 report in the Washington Business Journal insist that the companies are practically one in the same, though, but a 2006 article in the same paper reveals that Abraxas had just acquired software maker Dauntless. Researchers at Darkernet have since linked Lee, Husted and Helms to the Abraxas Dauntless Board of Directors as well.

Justin Ferguson, the researcher who first exposed TrapWire two weeks ago, has noted that Lee, Helms and Husted were listed on Abraxas Dauntless’ filings with Virginia as recently as December 2011. They also are all present on the TrapWire filings dated September 2011 and the latest annual filing made with the Florida Department of State, Division of Corporations on behalf of Ntrepid.

Nevertheless, in a conversation this week with Project PM’s Barrett Brown, Cubic Corp. Communication Director Tim Hall dismisses this tie again.

“There is no connection at all with Abraxas Applications and Trapwire and or Ntrepid,” Hall allegedly insists, according to audio uploaded to YouTube.

Brown, on his part, says he has obtained Cubic’s 2010 tax filings that show that Ntrepd, like Abraxas, is “wholly owned” by Cubic.

Other trademark information publically available online says that the Abraxas Corporation first filed to claim the name TrapWire in 2004 and was granted a license for such in January of 2007.

 

TrapWire Training Courses Reveal Possible Purpose for its Creation

Although certain people reportedly playing key roles in the web-like leadership structure of TrapWire deny their involvement with the massive surveillance system, there is evidence that the engine driving this global company runs on the ambition of a common core of officers and directors.

Given the potential flood of legal challenges to its constitutionality, the corporation believed to be behind TrapWire is heading for higher ground, denying any association with the surveillance technology.

In a statement published on its website on August 13, Cubic Corporation attempted to sever the ties binding it to TrapWire. “Cubic Corporation (NYSE: CUB) acquired Abraxas Corporation on December 20, 2010. Abraxas Corporation then and now has no affiliation with Abraxas Applications now known as Trapwire, Inc. Erroneous reports have linked the company with Trapwire, Inc.,” the company insisted.

Despite such denials, many are rightly worried about any corporate connection — no matter how tenuous — between Cubic and TrapWire given the former’s access to the personal data of Americans through its other corporate interests. The synergy of such access with a massive surveillance apparatus could threaten the privacy of millions, as well as the freedom from unwarranted searches and seizures protected by the Fourth Amendment.

As for the scope and significance of TrapWire, the size of it cannot be exaggerated.

TrapWire is a massive and technologically advanced surveillance system that has the capacity to keep nearly the entire population of this country under the watchful eye of government 24 hours a day. Using this network of cameras and other surveillance tools, the federal government is rapidly constructing an impenetrable, inescapable theater of surveillance, most of which is going unnoticed by Americans and unreported by the mainstream media.

Unlike other elements of the central government’s cybersurveillance program, word about TrapWire was not leaked by Obama administration insiders. The details of this nearly unbelievable surveillance scheme were made public by WikiLeaks, the anti-secrecy group founded by Julian Assange. The TrapWire story percolated from the millions of e-mails from the Austin, Texas-based private intelligence-gathering firm Stratfor, published this year by WikiLeaks. Covering correspondence from mid-2004 to 2011, these documents expose Stratfor’s “web of informers, pay-off structure, payment-laundering techniques and psychological methods.”

This coterie of Stratfor co-conspirators is apparently angry about the leaks, considering that the WikiLeaks servers have been under near-constant Distributed Denial of Service (DDoS) attacks since the TrapWire revelations began attracting the notice of alternative journalists. Some outlets report that the cyberattacks are being carried out by agents of the American intelligence community determined to prevent the full depth of this scandal from being explored by reporters.

Exactly what is TrapWire? According to one description of the program, from Russia Today:

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence.

Although many of the details remain undisclosed, it is known that the infrastructure of TrapWire was designed and deployed by Abraxas, an intelligence contractor based in northern Virginia headed and run by dozens of former American surveillance officers. As one article described it: “The employee roster at Abraxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.”

The network is believed to be immense. An article published by transparency advocacy group Public Intelligence claims that Stratfor e-mails suggest that TrapWire is in use by the U.S. Secret Service, the British security service MI5, the Royal Canadian Mounted Police, as well as counterterrorism divisions in both the Los Angeles and New York Police Departments and the LA fusion center. The e-mails also suggest that TrapWire is in use at military bases around the country. A July 2011 e-mail from a “Burton” to others at Stratfor describes how the U.S. Army, Marine Corps, and Pentagon have all begun using TrapWire and are “on the system now.” Burton described the Navy as the “next on the list.”

A survey of WikiLeaks e-mails containing information about TrapWire reveals another facet of this ever-expanding tool for tracking and targeting individuals.

In a report filed by online news gathering site darkernet.in, a list of the training courses offered to end users shines a little light on the otherwise purposefully obscured goals of this global monitoring behemoth.

The first course listed in the darkernet article is called the Surveillance Awareness Workshop. This class is reportedly “designed to instruct network and security personnel to use and navigate the TrapWire software system to familiarize themselves with the indicators of surveillance, terrorist surveillance methodologies, facility vulnerabilities, and the identification of probable surveillance zones that exist within each facility.”

The goal is that those with their fingers on the buttons and eyes on the consoles will learn to “view their facility the same way as would a terrorist, and then to be alert to the indicators of pre-attack surveillance.”

Pre-attack is a statist way of saying “guilty until proven innocent.” These agents — typically law enforcement or federal intelligence officers — reportedly will learn to spot suspicious behavior that points to the target’s propensity for participation in illegal activities.

This sort of advance profiling is eerily similar to the philosophy undergirding the signature strike that is becoming the go-to tactic in the Obama administration’s drone war.

A signature strike is not a strike on a particular suspect, but rather an attack on a person or group of people demonstrating behavior that is typical of those who might be associated with terror.

Perhaps the TrapWire “pre-attack surveillance” and the drone war “signature strike” are just two identifiable examples of a wider, more insidious government movement toward a society where one can be found guilty in advance of any crime based solely on one’s likelihood to act unlawfully and then be summarily executed based on that probability alone.

The second class offered by the makers of TrapWire according to the Internet investigation is designed along similar lines. It is called the Terrorist Pre-Attack Operations Course (TPOC).

Darkernet reports that participation in TPOC “will enhance overall security awareness and improve participants’ understanding of terrorist and criminal pre-attack surveillance and intelligence collection operations.”

Once again, the watchers are taught to better understand “terrorists” and what behavior they display just prior to the commission of a crime.

Unlike actual laws, these technologies and the courses improving their capabilities in the hands of users do not offer definitions of “terrorist” or “criminal.” One is left to one’s own understanding, it would seem, in the matter of conceiving of who is and is not a terrorist.

Today, the typical target might be a Muslim seen frequenting a subway station, for example. However, as the gulf separating the rulers and the ruled widens, perhaps a future TrapWire operator will target a gun-owner or attendant at a rally opposing a government policy as a potential threat and will initiate the requisite “intelligence collection operations.” The end result of those operations may be indefinite detention or death by Hellfire missile.

Finally, the last class listed in the darkernet article is called the Deception Detection and Eliciting Responses (DDER) course. This class will “teach students to detect deception and elicit responses in individuals including those which have been identified by TrapWire as having been engaged in suspicious behavior.”

So, once the target’s image pops up on one of the myriad cameras tracking the movements of every citizen (all are targets and potential terrorists, apparently) and the intelligence officers are called in to begin building a dossier on the target, the responding agents will use their newly-acquired interrogation skills to get the truth out of the target. “We have ways of making you talk,” in other words.

Given the aversion of the wizards running the surveillance state to allowing the curtain to be pulled back exposing the incredible extent of its domestic surveillance activities, it is more likely than not that TrapWire’s use in the tracking of Americans is wider and more institutional than most of us would like to believe.

A link to a complete listing of all TrapWire courses and the associated material is found here.

Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech

Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech

 

You are looking at an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled an is equipped with a Camera and Microphone.  It can land on you and may have the potential to take a DNA sample, or leave RFID tracking nano-technology on (or in) your skin.  It can fly through an open window, or it can attach to your clothing until you take it in your home.

 

 

Proof Smart Meters Are Being Used to Spy On Us

Proof Smart Meters Are Being Used to Spy On Us

IF you have ever wondered if your smart meter is being used to spy on you, well now there is proof that governments and private organisations are using data collected from smart meters to spy on you.

Information about power usage, which can be used to identify when a home is being occupied, is being shared with third parties of which includes government agencies, private organisations and off-shore data processing centres.

This unethical breach of privacy was discovered on the website of one of Australia’s largest electricity retailer, Origin Energy.

Electricity customers, who sign up for an online service that provides the account holder with detailed information about their electricity usage, are unwillingly agreeing to share their private information with third parties.

A 496 word Privacy/Consent policy form explicitly states that customers who wish to sign up for the service that provides them with information about their electricity usage, must agree that the following organisations have access to their private data:

  • Government authorities
  • Electricity installers
  • Mail houses
  • Data processing analysts
  • IT service providers
  • Smart energy technology providers
  • Debt collection agencies
  • Credit reporting agencies

A spokesperson for the electricity company (Origin Energy) responsible for this revelation was recently quoted as saying “the additional information requested about each household adds to the richness of the Origin Smart experience” (Source: The Age).

One private organisation that is being given personal information of Origin Energy customers is Tendril, a self-described consumer engagement application and services provider and an organisation that believes smart grids can help fight climate change.

Alarmingly, Tendril’s own website doesn’t explicitly state how it uses data gathered by its clients and for what purposes the data can and cannot be used for.

What implication this has for Australian residents is unknown.

There has been an overwhelming opposition to the roll-out and installation of smart meters around the world.

Smart Meter opt-out coalitions are present in almost all major municipalities that have smart meters present. Unfortunately, in many municipalities an opt-put option is not available.

The author (Andrew Puhanic) was forced to have a smart meter installed on his property, with the only notice given about the installation being a letter informing the ‘month’ that the smart meter would be installed.

The greatest concern with smart meter data being shared with third parties is the fact that the third-party organisation could easily identify (over time) a pattern of when you do and do not use electricity.

This information could fall into the wrong hands and could be used to determine when your home is un-occupied.

In Australia, the erosion of privacy was escalated further by a new proposal to force internet and telephone companies to retain customer records for more than two years. For more information about this proposal, click here.

Households that are forced to have smart meters installed must be assured that the information their electricity company collects is not shared with third parties.

Ultimately, smart meters are designed to collect information about household electricity usage and now there is proof that electricity companies are openly sharing information collected by smart meters.

Written by Andrew Puhanic

How to store a book in DNA

How to store a book in DNA

About four grams of DNA theoretically could store the digital data humankind creates in one year

Although Harvard geneticist George Church’s next book, Regenesis: How Synthetic Biology Will Reinvent Nature and Ourselves, doesn’t hit the shelves until Oct. 2, but it has already passed an enviable benchmark: 70 billion copies — roughly triple the sum of the top 100 books of all time.

That’s because Church, the Robert Winthrop Professor of Genetics at Harvard Medical School and a founding core faculty member of the Wyss Institute for Biomedical Engineering at Harvard University, and his team encoded the book in DNA, which they then read and copied.

Biology’s databank, DNA has long tantalized researchers with its potential as a storage medium: fantastically dense, stable, energy efficient and proven to work over a timespan of some 3.5 billion years.

While not the first project to demonstrate the potential of DNA storage, Church’s team married next-generation sequencing technology with a novel strategy to encode 1,000 times the largest amount of data previously stored in DNA.

The researchers used binary code to preserve the text, images and formatting of the book at a density of 5.5 petabits (1 million gigabits) per cubic millimeter. “The information density and scale compare favorably with other experimental storage methods from biology and physics,” said Sri Kosuri, a senior scientist at the Wyss Institute and senior author on the paper. The team also included Yuan Gao, a former Wyss postdoc who is now an associate professor of biomedical engineering at Johns Hopkins University.

And where some experimental media — like quantum holography — require incredibly cold temperatures and tremendous energy, DNA is stable at room temperature. “You can drop it wherever you want, in the desert or your backyard, and it will be there 400,000 years later,” Church said.

Reading and writing in DNA is slower than in other media, however, which makes it better suited for archival storage of massive amounts of data, rather than for quick retrieval or data processing. “Imagine that you had really cheap video recorders everywhere,” Church said. “Just paint walls with video recorders. And for the most part they just record and no one ever goes to them.

But if something really good or really bad happens you want to go and scrape the wall and see what you got. So something that’s molecular is so much more energy efficient and compact that you can consider applications that were impossible before.”

About four grams of DNA theoretically could store the digital data humankind creates in one year

Although other projects have encoded data in the DNA of living bacteria, the Church team used commercial DNA microchips to create standalone DNA. “We purposefully avoided living cells,” Church said. “In an organism, your message is a tiny fraction of the whole cell, so there’s a lot of wasted space. But more importantly, almost as soon as a DNA goes into a cell, if that DNA doesn’t earn its keep, if it isn’t evolutionarily advantageous, the cell will start mutating it, and eventually the cell will completely delete it.”

In another departure, the team rejected “shotgun sequencing,” which reassembles long DNA sequences by identifying overlaps in short strands. Instead, they took their cue from information technology, and encoded the book in 96-bit data blocks, each with a 19-bit address to guide reassembly. Including jpeg images and HTML formatting, the code for the book required 54,898 of these data blocks, each a unique DNA sequence. “We wanted to illustrate how the modern world is really full of zeroes and ones, not As through Zs alone,” Kosuri said.

The team discussed including a DNA copy with each print edition of Regenesis. But in the book, Church and his co-author, the science writer Ed Regis, argue for careful supervision of synthetic biology and the policing of its products and tools. Practicing what they preach, the authors decided against a DNA insert — at least until there has been far more discussion of the safety, security and ethics of using DNA this way. “Maybe the next book,” Church said.

This work was supported by the U.S. Office of Naval Research (N000141010144), Agilent Technologies and the Wyss Institute.

The Electromagnetic War On Humanity

The Electromagnetic War On Humanity

It gets worse by the hour. While France wisely outlawed wi-fi in its schools due to its serious effects on children, more appliances, transmitters, signals, antennas, phone masts, dishes, and electronic gadgetry is being added by the minute.

And we’re supposed to be excited about it.

Just look at this insane ad intended to sex-up the electromagnetic crap blasting our biosignals to smithereens.

Looks like V-rizin’ wants to “Rule the Air!” with their death-dealing microwaves.

The Orwellian voice-over?

“Signal – Airborne, beautiful and strong. There to insure the most powerful transmitter is YOU!”

 

The Sinister Assumptive Message

“Oh how we love getting blasted with our phone signals!! You rock, Verizon!..bring on the microwaves, robo-automation and anything else! We are techno-crazy and love it so!”

Wrong, you bastards. Don’t tell us what we want, Big Corp, we’re sick of it! And for those falling for this…wake the hell up!

Your playing with our health, well being and environment is about to come to an end.

Diabolical Microwaves

The effects of these cell towers and other microwave technologies bear witness to their perfidy. While they make light of these death-dealing devices and pretend they’re innocuous, the unwitting sheeple wither and die from mutated brain cells, injured immune and nervous systems, organ damage, and our children are predicted to have genetically altered offspring within 2 generations!

Never mind seriously influencing our minds.

We Live in ‘Electromagnetic Soup’

The “electrosmog” that first began developing with the rollout of the electrical grid a century ago and now envelops every inhabitant of Earth is responsible for many of the diseases that impair or kill them.

In 2007, the Bioinitiative Working Group released a 650-page report citing more than 2,000 studies (many very recent) that detail the toxic effects of EMFs from all sources. Chronic exposure to even low-level radiation (like that from cell phones), can cause a variety of cancers, impair immunity, and contribute to Alzheimer’s disease and dementia, heart disease, and many other ailments.

“For the first time in our evolutionary history, we have generated an entire secondary, virtual, densely complex environment — an electromagnetic soup — that essentially overlaps the human nervous system,” says Michael Persinger, PhD, a neuroscientist at Laurentian University who has studied the effects of EMFs on cancer cells.

And it appears that, more than a century after Thomas Edison switched on his first light bulb, the health consequences of that continual overlap are just now beginning to be documented. (Source)

http://sacredg.files.wordpress.com/2008/08/protectyourself.jpg?w=278&h=210

They Didn’t Have to Use These Damaging Frequencies–They CHOSE To!

Retired British military intelligence scientist Barrie Trower who for years worked in microwave and stealth warfare, has been speaking out and supplying scientific documentation regarding the serious dangers of EMFs, and getting results.

He said,

During the 1950s and 1960s during the Cold War, it was realised by accident that microwaves could be used as stealth weapons when the Russians beamed the American embassy during the Cold War and it gave everybody working in the embassy cancer, breast cancers, leukemias whatever, and it was realised then that low level microwaves were the perfect stealth weapon to be used on dissident groups around the world, because you could make dissident groups sick, give them cancer, change their mental outlook on life without them even knowing they were being radiated.

The electromagnetic spectrum is a band that goes from gamma rays and x-rays at one end, the very high energy waves, and it comes down through visible light, which is also some radiation, and then it goes through infrared microwaves, tv and radio. Now the only ones which really affect us in the communications industry are the microwaves, and microwaves have a special ability to interfere with water, which is how microwave ovens work, and we are made of water.

All of our chemical and electrical signals involve water in the body, somehow, electrical communications in the body. So, the industry has picked the worst possible part of the electromagnetic spectrum to give to young children and to adults (with regards to cell phones).

The Frightening Effects of WiFi and Cell Phone Radiation on Young Girls

Trower: I have three research papers. I am a scientific adviser to five organisations. Part of my brief is I read international scientific papers, I retranslate them into a language that most people can understand, which is how I advise.

I have three papers showing that low level microwaves can interfere with the genetics in the ovarian follicles. Now what that means in everyday language, different from boys, young girls when they’re born, they will have up to four hundred eggs in their ovaries. The microwaves can damage the genetic structure, we now know, in those ovaries. So, when this young girl grows up, gets married, and has children, if she has a daughter, this particular mitochondrial genetic damage is irreparable. There is nothing at all that can repair it.

(See full transcript of interview with Barrie Trower here)

Barrie Trower Speaks about Microwave Radiation

On August 24, 2010, Mr. Barrie Trower, a British physicist who was a microwave weapons expert and who worked for the Royal Navy and the British Secret Service, gave a talk at the University of Toronto about the health effects of WiFi and other forms of microwave radiation.

Mr. Trower came out of retirement because he was concerned that the microwave frequencies and intensities to which children are exposed in schools are similar to those used for microwave weapons.  He provided Dr. Havas with a copy of a talk he gave to the King of Botswana earlier this year (April 2010) and that document can be viewed here.

Link to article in Toronto Star August 26, 2010:  ”U.K. Expert Warns against Wi-Fi.”

Here is a PDF of his credentials and a presentation to the Welsh Parliament.

For a genuine visit with Mr. Trower and to hear his full views, this is for you:

These Same Wicked PTBs Electrify Our Atmosphere – And Put Towers Near Schools, Hospitals and Population Centers

If you’ve driven around under our metalisized skies, noticing these proliferating phone towers or masts, you’ll notice how many have been diabolically placed near or directly on schools, institutions, medical facilities, strip malls, businesses and housing areas. You can be sure the ‘Phone Company’ is well aware of what they’re doing and the dangerous effects–they just lie to the underlings.

That’s why things like THIS happen when the informed take drastic action to draw attention to this horrific reality.

We’re dealing with intentional harm to our young people and overall population by the same corporate devils who genetically modify our crops, poison our air and water, and add carcinogenic genetically altering additives to our food.

Are All These Towers Just For Cell Phones…or Mind and Thought Manipulation?

The use of EMFs (electromagnetic frequencies) is one of our elite controllers most effective stealth technologies. Besides breaking down human health, the human brain is known to operate at a certain frequency, and is easily accessed and manipulated within that range using the ‘right’ technology. You can be sure the Powers That Be are using these for other purposes as well.

The day is now approaching in which government mind control technologies will be directed at you, your neighbors, and your loved ones. Every single day, equipment is being erected and installed in this country with the hidden purpose of exerting mind control over the entire population.  Everywhere in this country (and overseas), ELF/microwave transmission towers are being erected. No one is saying anything, but you’re expected to presume that they’re for cell phones. (Do you really think that we need that much ‘cell phone’ transmission capability, every few blocks? Do you realize how very little energy is used by genuine cell phone usage? Yet these towers are capable of putting out levels of power that exceed cell phone requirements by a wide margin.

These mind control technologies have been in place for a long time. It’s not an accident that the frequency band chosen for cell phone use just happens to match the second order waves that Wilhelm Reich discovered in the late1940′s to effect thought transmission and allow the mind to be manipulated without the victim realizing it. Reich worked on this project secretly for the CIA for over 5 years, from 1947-1952,  until he realized who the CIA was planning to use the mind control on -the American people. He was outraged that he was deceived and used for such a treasonous motive and swore never to cooperate with the CIA, FDA, etc. again. Reich was covertly murdered in Federal prison in 1957, just a few weeks before he was due to be released, having been in prison for 2 years on a trumped up charge leading to a contempt of court citation.

A method was discovered to disable these ELF towers from exerting their mind control functions by placing a simple device known as an orgone generator within a radius of 1,300 feet of these towers. These microwave towers are used in conjunction with HAARP based technology to not only affect subliminal mind control influences, but also to control the weather, the creation of artificially induced drought conditions are also greatly influenced by the population-reduction chemtrail spraying operations which take place daily over the skies in America and in many other countries) . Source

Can We Stop Cell Phone Tower Construction?

Deadly Cell-Phone Towers

from Lynn Quiring, RPh, CCN, NMDLogical Health LLC

‘Unfortunately, there is not much one can do to stop the proliferation and continued build out of cell phone towers and structures. Although thought to be legislation about deregulation issues, the Telecommunications Act of 1996 (TCA) was really an open invitation for the cell phone industry to place their towers anywhere they wanted. Section 704 of the TCA basically states that local authorities can’t ban the placement of towers in their jurisdictions. The law says: “No State or local government or instrumentality thereof may regulate the placement, construction, and modification of personal wireless service facilities on the basis of the environmental effects of radio frequency emissions to the extent that such facilities comply with the Commission’s regulations concerning such emissions.” So legally the local government can’t refuse the construction of a cell phone tower in your neighborhood! Any challenge by local communities could easily end up in federal court. Our lawmakers have basically given the cell phone industry free reign to install these towers wherever they want. And, by the way, the cell phone industry helped write this legislation that our government officials passed as law! The public, therefore, now has no voice and no vote. Is there something wrong with this picture? Why didn’t our public officials represent the people instead of big business? Why would you let the very industry you’re trying to regulate write it’s own laws?

How Many Cell Phone Towers Are Near You?

The average person lives within one-half mile of a cell phone tower. Have you ever wondered how close you live or work to one of these towers? Would it bother you if one were right in your backyard? How many of these towers and antennas do you think there are in your immediate area? Find out by visiting the website www.antennasearch.com/. Simply type in your address and you’ll get a listing and a map of all the towers and antennas within a short radius of your address. Like most people you’ll probably gasp when you see the numbers. These towers are literally everywhere. Hundreds and hundreds of them are probably located within a few miles of your home or office.

What Can We Do?

Obviously, we can’t escape the exposure. We’ve established that fact. So what can we do to minimize the damage?

Here are few ideas: We need to limit our exposure any way possible. Don’t live near a cell phone tower if you have a choice. Don’t buy a home near one even if the price is right. Limit your use of wireless devices. Go back to ‘wired’ connections whenever possible. Maximize your health through proper nutrition and good hydration. Eat foods high in antioxidants and take supplements. Eat organically as much as possible. There is no safe distance to locate away from a mast tower. Obviously, the closer to the tower the greater the exposure risk so do locate as far away as possible. Whenever possible encourage your local government officials to consider transitioning to the use of fiber optic cable. Most of it has already been laid underground. It’s just not being used. There are no masts with fiber optics and the small amount of radiation at the exits can be neutralized with technology now available. Discourage the use of Wi-Fi in schools by meeting with your school officials and school boards. Wi-Fi hotspots are popping up everywhere now. Even whole cities are going wireless with the installation of Wi-Fi. Again, it’s all done through a wireless signal, which is damaging to your health. Don’t let cell phone companies install cell phone antennas on the roofs of schools where your children attend. The radio waves are disruptive to their ability to focus, not to mention the health hazards we’ve already outlined. If you can’t change your current situation there is some hope. There are some intervention devices now available that you can use in your home, school and office to help lessen the risk of exposure. Some very good cutting-edge technology has been developed that will intervene and help mitigate the damage being done by wireless connections.’ (Source)

The Smart Meter Onslaught

This is the nastiest wave yet. They’re attacking residences with extremely powerful rapid intermittent blasts under the guise of checking your energy consumption.

Not the case. They’re not only monitoring your every activity, but you’re being bombarded with the most sinister waves yet.

A tremendously helpful site can be found HERE..at freedomtaker.com. Read it carefully and take advantage of its info. We’re being killed off if we let them, don’t be the next.

Protect Yourself and Your Family

If you look up EMF protection devices, you’ll find plenty.

One particular technology I find particularly intriguing is the Orgone Technology mentioned above. This is believed to work at the quantum level and to be able to convert the negative entropy of these destructive waves into a positive force. There is a growing army of enthusiasts who are experimenting with orgonite devices and getting amazing results.

Be sure to research it.

Knowing what we do regarding the crystalline structure of the universe, I find it intuitively makes a lot of sense, especially when coupled with prayer or intention. Our own magnificent bodies are crystalline, for which reason we need to realize we are either receiving and amplifying this negative entropy, or helping to convert it to a positive force.

It’s certainly something worth researching. But in whatever form we can, we should resist with consciousness in every form possible.

Conclusion

http://cdn.crooksandliars.com/files/uploads/2009/02/no-ostrich_0_20c70.gif

We’re under attack.

We need to be informed, aware and willing to inform others, as well as effect changes to help people escape the effects of these debilitating technologies as much as possible. As more and more people become aware of these facts, the change of consciousness and behavior that ensues will continue to transform our planet.

These are serious times we live in, and we need to respond accordingly.

Any way we can.

Love, Zen

Mysterious Bird-like Drone Captured In Iraq and Pakistan, Origins Still Unknown

Mysterious Bird-like Drone Captured In Iraq and Pakistan, Origins Still Unknown

The quite strange unarmed bird-like drone which was recovered by Pakistani forces in August of 2011 apparently did not just fly over Pakistan, but was also apparently spotted by Iraqi insurgents at least two years before making its way to Pakistan.

One might jump to the conclusion that the drone belongs to the United States since the U.S. is involved a great deal of drone operations in Pakistan – which the Pakistani parliament has unanimously declared must end. It also appears to be similar to some of the drone projects which are leaning towards designs influenced by birds and insects.

A reader of The Aviationist tipped them off to a video posted on May 28, 2009 showing the drone captured by the Iraqi Hezbollah in Iraq which is eerily similar to the drone which was captured in Pakistan.

The providence of the drone is shrouded in a thick veil of mystery since no nation would take responsibility for the device which has, according to Danger Room, “silver wings and a span about the size of a grown man’s outstretched arms, the drone was clearly more than a hobbyist’s toy: the remains of a camera were near the crash site, a camera that fit into the robotic bird’s belly, ostensibly for spying on insurgents.”

Danger Room points out that the drone is quite similar to, but definitely not exactly the same as, Festo’s “SmartBird” drone.

The dimensions of the two drones are similar and the designs obviously look alike as well although, “It’s clearly not the same drone, as the wings are obviously different: the mystery drone’s wings are straighter and more sharply angled than the SmartBird’s sleeker, more rounded wings, which mimic those of the gull,” according to Danger Room.

The nation or entity behind the drone is difficult to determine outside from speculation based on the nations currently involved in operations in Pakistan.

However, Danger Room seems to think it belong so the U.S. in writing, “Iraqi Hezbollah date its photos of the mystery drone to May 2009 in Basra, a major city in southern Iraq. Back then, U.S. troops were training their Iraqi counterparts on new-line intelligence, surveillance and reconnaissance systems. Hmm.”

While the video and screenshots don’t reveal any technical information on the drone which is all that new, it does show that the drone in Iraq and that in Pakistan are closely related.

Both have a design which relies on flapping wings, a trapezoidal tail feather and a spherical camera placed in the belly of the bird.

However, the drone recovered in Pakistan has a tailfin on the underside of the rear feather which the drone in Iraq is missing and the version found in Iraq is a duller color than the reflective silver drone in Pakistan.

“The fact that it was probably already flying in Iraq two years before crashing in Pakistan, proves that the bird-like UAV is not a toy but a small combat proven spy drone,” writes The Aviationist’s David Cenciotti.

This deals a significant blow to those who have repeatedly claimed that it was actually just a DIY drone, evidenced by Danger Room tagging the latest post with “DIY Drones.”

However, since we really have no idea who made the drone or who was operating it, one cannot say with certainty that it is not a DIY creation of some group somewhere although I find this quite unlikely.

That being said, it wouldn’t be all that damaging for the United States to confirm that it is our drone given that we are already running deadly drone operations around the globe.

Ultimately, it’s impossible to speculate on the issue with any degree of certainty since we know very little about the drone and its origin but it will be fascinating to see if more information comes out or if more appearances of the strange device begin to surface.

Did I forget anything or miss any errors? Would you like to make me aware of a story or subject to cover? Or perhaps you want to bring your writing to a wider audience? Feel free to contact me at [email protected] with your concerns, tips, questions, original writings, insults or just about anything that may strike your fancy.

Please support our work and help us start to pay contributors by doing your shopping through our Amazon link or check out some must-have products at our store.

More at EndtheLie.com
Autonomous Robots Developed By DARPA Will Not Question Orders

Autonomous Robots Developed By DARPA Will Not Question Orders

The Defense Advanced Projects Research Agency (DARPA) Autonomous Robotic Manipulation (ARM) program seeks to find ways to utilize different remote robotic manipulation systems that are controlled by humans. This program is divided into 3 aspects:

• Hardware: to design dexterous multi-fingered robotic hands
• Software: develop complex algorithms for grasping, manipulation and sensory perception
• Outreach: beta-testing robotics in public forums to further study robotic autonomy

In 2010, DARPA revealed a robot at the Association for Unmanned Vehicle Systems International Conference in Denver that was interactive in a public forum. Participants would write software and have the robot preform specified tasks. The goal of this event was to show that robots were being developed by the US government to preform “dangerous tasks” such as disarming an explosive device thereby reducing “significant human interaction”.

Universities and other government-controlled agencies such as Carnegie Mellon University, HRL Laboratories, iRobot, NASA-Jet Propulsion Laboratory, SRI, and the University of Southern California, provided teams of researchers to write software for DARPA.

Boston Dynamics, Inc., has been awarded a $10.9 million contract to manufacture humanoid robots that are bi-pedal, built like humans and have a sensor head with on-board computing capabilities.

These robots are being created to assist in excavation and rescue missions, according to DARPA. They could also be employed to evacuation operations during either man-made or natural disasters.

This week, the Project Offices for Unmanned Aircraft Systems (UAS), Apache Attack Helicopter and Armed Scout Helicopter revealed the Manned Unmanned System Integration Capability (MUSIC) at Michael Army Airfield, Dugway Proving Ground, Utah. During the exercise, MUSIC showed that the US Army could use drones armed with lethal weapons that were wired for precise communication with their operator.

The RQ-7 Shadow is another enhanced drone with weapons capabilities. As the US Army endeavors to combine ground forces with drone technology, their tactical operation’s success is multiplied.

The use of government-sponsored universities such as Cornell, MIT and Delft University of Technology in the Netherlands has created prototypes for bi-pedal robots that will someday be the synthetic army or police force.

Stanford University’s Aerospace Robotics Laboratory (ARL) wants to introduce autonomous robots into law enforcement situations; such as response in lieu of police SWAT teams.

Drones for law enforcement are being developed with the creation of the Talon SWAT/MP that can be configured with a multitude of weaponry. Some include a multi-shot TASER, LRAD, 40mm grenade launcher, and a 12-gage shotgun.

An earlier version of Talon, developed for the Israeli Defense Forces and the Israeli Ministry of Defense’s Directorate of Defense, was of the VIPeR series that were equipped with a 9 mm mini-Uzi with scope and pointer, or grenade launcher.

In 2006, Los Angeles began using aerial drones to spy over citizens under the guise of tracking suspects. The Federal Aviation Administration (FAA) subsequently ended that program. The police force retaliated citing that “there is an immediate need by state and local public safety personnel for unmanned aerial systems.”


The Naval Research Laboratory has developed SAFFiR, the Shipboard Autonomous Firefighting Robot. SAFFiR is an autonomous bipedal humanoid robot, based on the CHARLI-L1 robot created at Virginia Tech. This robot can interact with humans with a comprehensive response system that utilizes language – including slang to make it more familiar. A robot that can hold a conversation and fight fires is quite impressive.

In 2009, with funding from the Pentagon, DARPA created the Multifunction Utility/Logistics and Equipment (MULE) which was a size of a Humvee. This robot car used sensors to drive autonomously and calculate its target, await remote instructions or decide to fire.

MULE’s potential has been in the works for the last 3 years. Its advancement and use as a battlefield vehicle is being tested and readied for deployment. The remote controls mirror those of a gaming console which gives the operator the ease of playing a “video game” while at the same time instructing a deadly piece of equipment on targeted missions.

Unmanned ground vehicles have been in use since Iraq and Afghanistan. They are armed for combat with the same capabilities as ground troops. MULE’s development as an autonomous weapon for the purpose of allowing a robot to decide on whether or not to carry out a mission is advantageous to the US military.

A force of robotic “peacekeepers” that are programed to become violent without remorse – will enable the government to organize and act where human law enforcement and/or trained soldiers may hesitate.

Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones

In 2008, a Reston, VA based corporation called Oceans’ Edge, Inc. applied for a patent. On March, 2012 the company’s application for an advanced mobile snooping technology suite was approved.

The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and outgoing, as well as manipulate the phone itself. Oceans’ Edge says that the tool is particularly useful because it allows law enforcement and corporations to work around mobile phone providers when they want to surveil someone’s phone and data activity. Instead of asking AT&T for a tap, in other words, the tool embeds itself inside your phone, turning your device against you.

A former employee of Oceans’ Edge notes on his LinkedIn page that the company’s clients included the FBI, Drug Enforcement Agency, and other law enforcement.

Oddly enough, Oceans’ Edge, Inc. describes itself as an information security company on its sparsely populated website. The “About Us” page reads:

Oceans Edge Inc. (OE) is an engineering company founded in 2006 by wireless experts to design, build, deploy, and integrate Wireless Cyber Solutions.
Our team is composed of subject matter experts in the following areas:
  • Wireless Cyber Security
  • Mobile Application Development
  • Wireless Communication Protocols
  • Wireless Network Implementation
  • Lawful Intercept Technology
With this expertise, we deliver engineering services and wireless technology solutions in critical mission areas for our government and commercial customers.
But while the company may offer “cyber security” solutions to government and corporations, as the website claims, the firm only has one approved patent on file with the US Patent and Trademark Office.
Remote mobile spying

The patent is for a “Mobile device monitoring and control system.” The applicants summarize the technology thusly:

Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described.

In other words, the technology works to snoop on mobile phones by secretly installing itself on phone hardware. The targeted phone is thus compromised in two ways: first, the attacker can spy on all the contents of the phone; and second, the attacker can operate the phone from afar. That’s to say, it doesn’t just let the attacker read your text messages. It also potentially lets him write them.

The summary goes on:

One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.

The technology therefore also enables automated data storage of all of a phone’s activity in the attacker’s database. So if someone used this technology to spy on your phone, they would be able to use the Oceans’ Edge product to automatically store everything you do on it, to go back to later.

In case you aren’t sure who would want this kind of spook technology or why, Oceans’ Edge explains in the patent application:

A user’s employment of a mobile device, and the data stored within a mobile device, is often of interest to individuals and entities that desire to monitor and/or record the activities of a user or a mobile device. Some examples of such individuals and entities include law enforcement, corporate compliance officers, and security-related organizations. As more and more users use wireless and mobile devices, the need to monitor the usage of these devices grows as well. Monitoring a mobile device includes the collection of performance metrics, recording of keystrokes, data, files, and communications (e.g. voice, SMS (Short Message Service), network), collectively called herein “monitoring results“, in which the mobile device participates.

The application goes on to explain that the tool is beneficial to law enforcement or other customers because it allows them to avoid dealing with pesky mobile phone providers when they want to covertly spy on people’s mobile communications. Instead of the FBI going to AT&T or T-Mobile to get access to your cell data, they can just surreptitiously install this bug on your phone. They’ll get all your data — and your phone company might never know.
Mobile device monitoring can be performed using “over the air” (OTA) at the service provider, either stand-alone or by using a software agent in conjunction with network hardware such a telephone switch. Alternatively, mobile devices can be monitored by using a stand-alone agent on the device that communicates with external servers and applications. In some cases, mobile device monitoring can be performed with the full knowledge and cooperation of one of a plurality of mobile device users, the mobile device owner, and the wireless service provider. In other cases, the mobile device user or service provider may not be aware of the monitoring. In these cases, a monitoring application or software agent that monitors a mobile device can be manually installed on a mobile device to collect information about the operation of the mobile device and make said information available for later use. In some cases, this information is stored on the mobile device until it is manually accessed and retrieved. In other cases, the monitoring application delivers the information to a server or network device. In these cases, the installation, information collection, and retrieval of collected information are not performed covertly (i.e. without the knowledge of the party or parties with respect to whom the monitoring, data collection, or control, or any combination thereof, is desired, such as, but not limited to, the device user, the device owner, or the service provider). The use of “signing certificates” to authenticate software prior to installation can make covert installation of monitoring applications problematic. When software is not signed by a trusted authority, the software may not be installed, or the device user may be prompted for permission to install the software. In either case, the monitoring application is not installed covertly as required. Additionally, inspection of the mobile device can detect such a monitoring application and the monitoring application may be disabled by the device user. Alternatively, OTA message traffic may be captured using network hardware such as the telephone switch provided by a service provider. This requires explicit cooperation by the service provider, and provides covert monitoring that is limited to message information passed over the air. As a result, service provider-based monitoring schemes require expensive monitoring equipment, cooperation from the service provider, and are limited as to the types of information they can monitor.
The applicants describe some of the challenges they had to overcome, which include:
Additional challenges are present when the monitoring results are transmitted from a mobile device. First, many mobile devices are not configured to transmit and receive large amounts of information. In some instances, this is because the mobile device user has not subscribed to an appropriate data service from an information provider. In other instances, the mobile device has limited capabilities.
In other words, make sure you get that unlimited data plan, or else it’ll be really hard for the FBI to spy on your mobile phone! It’ll take up so much of your data usage that you’ll notice and maybe even complain to your mobile provider! That would be awkward.
Second, transmitting information often provides indications of mobile device activity (e.g. in the form of activity lights, battery usage, performance degradation).
Bad battery performance that the geeks at the Apple genius bar can’t explain? Maybe your device has been compromised.
Third, transmitting information wirelessly requires operation in areas of intermittent signal, with automated restart and retransmission of monitoring results if and when a signal becomes available.
The monitoring program has got to be clever enough to stop and restart every time you go out of range of your cell network, or you turn the phone off.
Fourth, many mobile devices are “pay as you go” or have detailed billing enabled at the service provider. The transmission of monitoring results can quickly use all the credit available on a pre-paid wireless plan, or result in detailed service records describing the transmission on a wireless customer’s billing statement.
When the snoops steal your information, you might have to pay for the pleasure of being spied on. That’s because your mobile phone provider might read the spying activity as your activity. After all, it’s coming from your phone.
Lastly, stored monitoring results can take up significant storage on a mobile device and the stored materials and the use of this storage can be observed by the device user.
Is there a large chunk of space on your phone that seems full, but you can’t figure out why? Perhaps a snoop tool like that devised by Oceans’ Edge, Inc. is storing data on your phone that it plans to later capture.
Given all of those potential problems, the technologists had a lot of work cut out for them. Here’s how they addressed those problems:
From the foregoing, it will be appreciated that effective covert monitoring of a mobile device requires the combination of several technologies and techniques that hide, disguise, or otherwise mask at least one aspect of the monitoring processes: the covert identification of the mobile devices to be monitored, the covert installation and control of the monitoring applications, and the covert exfiltration of collected monitoring results. As used herein, “covert exfiltration” refers to a process of moving collected monitoring results from a mobile device while it is under the control of another without their knowledge or awareness. Thus covert exfiltration processes can be those using stealth, surprise, covert, or clandestine means to relay monitoring data. “Collected monitoring results” as used herein includes any or all materials returned from a monitored mobile device to other devices, using either mobile or fixed points-of-presence. Examples of collected monitoring results include one or more of the following: command results, call information and call details, including captured voice, images, message traffic (e.g. text messaging, SMS, email), and related items such as files, documents and materials stored on the monitored mobile device. These materials may include pictures, video clips, PIM information (e.g. calendar, task list, address and telephone book), other application information such as browsing history, and device status information (e.g. device presence, cell towers/wireless transmitters/points-of-presence used, SIM data, device settings, location, profiles, and other device information). Additionally, the capability to covertly utilize a mobile device as a covertly managed camera or microphone provides other unique challenges. 
Thus covert monitoring of a mobile device’s operation poses the significant technical challenges of hiding or masking the installation and operation of the monitoring application, its command and control sessions, hiding the collected monitoring results until they are exfiltrated, surreptitiously transmitting the results, and managing the billing for the related wireless services. The exemplary illustrative technology herein addresses these and other important needs.
In short, Oceans’ Edge Inc., a company founded and operating in the heart of CIA country, says it has a technology that can secretly install itself on mobile phones and push all the contents of the devices to an external database, doing so entirely under the radar of both the target and the target’s mobile provider. It even boasts that the tool allows for covertly managing phone cameras and microphones.
What kind of contracts does this company have, and with which government agencies? A cursory internet search didn’t turn up much, except for a couple of bids to work on a military information operations program and a cyber defense project. Neither one of those programs has an obvious link to the mobile snooping device described in the patent application.

Since we don’t know which agencies are using this technology or how, it’s hard to say to what extent this kind of secret monitoring is taking place in the US. We have some evidence suggesting that the FBI and DEA are using this tool (thanks, Chris Soghoian, for the tip). If those agencies really are using this technology, they should get warrants before they compromise anyone’s phone.

Is the government getting warrants to use this tool? We don’t know.

Oceans’ Edge Inc., like many purveyors of surveillance products, claims that its technology is only deployed for “lawful interception,” but it makes no claims about what that actually means. There’s no mention of judicial oversight, warrants, or any kind of due process. As I’ve written elsewhere on this blog, given the state of the law concerning surveillance in the digital age, we shouldn’t let our guard down simply because a company claims its surveillance tools are used lawfully. That’s because we do not know how these tools are being deployed, and yet we know that the state of surveillance law in the US at present grants the government wide latitude to infringe on our privacy in ways that are often improper or even unconstitutional.

In most cases (with a few notable exceptions), lawmakers haven’t worked to address this issue.

As we can see, surveillance technologies are developing rapidly. It’s past time for our laws to catch up.

1984 | Thought Crime to Destroy New World Order?

1984 | Thought Crime to Destroy New World Order?

http://youtu.be/3NHmOfwI1Kw

Christopher Greene explains how thought crime will destroy the New World Order paradigm.

GreeneWave is a completely independent alternative media channel focused on the economy and politics and dedicated to bringing controversial news and truth to the public. Featuring popular video/radio host Christopher Greene, GreeneWave has established itself as an early pioneer on the Web, broadcasting to tens-of-thousands of people every day and covering news and events that the mainstream media ignores.

About Christopher

GreeneWave started in 2010 when I decided to quit my job as a broker at Merrill Lynch. After witnessing the collapse of global stock markets in 2008 and seeing just how badly it had devastated and ruined the lives of the people that I cared about, I decided that it was time for me to take action and do something about it! So at that very moment I dropped everything that was convenient or comfortable to me and started GreeneWave.

I realized at the time that this was a bit crazy and also a shot in the dark (that I could potentially fail miserably) but I decided to do it anyway because it was the right thing to do and I wanted to share a message of truth with the public and help others. A little over a year later what started from just a few subscribers and barely any traffic at all has grown to tens-of-thousands of subscribers, a brand new radio show, our first appearance on national television and millions of video views on YouTube.

Much of what we predicted since the very beginning has come true in real life (the collapse and fragmentation of the Eurozone, worse median peak-to-trough declines in residential real estate than during the 1930′s Great Depression, the invasion of Libya, the Occupy Wall Street movement, bailouts-to-infinity and now a growing police state in America).

Please don’t let this happen to a Country and a world that I and many of you love! Join The Wave today and support GreeneWave. I realize that not all of you have the ability to drop everything and take the risk of becoming an activist full-time like myself. But it is my hope that the millions of you out there that feel the same way I do about freedom and liberty will help support those people and organizations like GreeneWave that fight for these ideals on your behalf. Please help GreeneWave grow in 2012 and fight tyranny face-to-face. “We can’t do it alone but with your help we can change the world!”

 

 

Pre-Crime Software Moves One Step Closer to Reality

Pre-Crime Software Moves One Step Closer to Reality

The era of Big Data is upon us. Major corporations in the areas of advertising, social media, defense contracting, and computing are forming partnerships with government agencies to compile virtual dossiers on all humans.

This data integration initiative is taking place across the board in our largest federal agencies and departments as part of an Office of Science and Technology outline (PDF) that includes a $200 million upfront investment, as well as a $250 million annual investment by military departments into human-computer interaction.

The $200 million in the Obama program will be spread among the National Institutes of Health, Department of Defense, National Science Foundation, the Department of Energy, the U.S. Geological survey, and DARPA to see that the information they collect will move quickly “from data to decisions.”

Seeing the vast potential of Big Data management and applications, Oblong Industries – the actual creator of the software that appeared in the movie Minority Report, (known by its propriety name g-speak) – is now offering a commercial version in the marketplace. An AFP article posted at Raw Story is quick to point out that the software has been stripped of its “pre-crime” detection analytics. But should this blanket dismissal by a mainstream news agency be comforting in light of stated U.S. government goals that seek to turn science fiction into science reality?

John P. Holdren, Obama’s science czar, and author of the controversial eugenics tome, Ecoscience, is one of those directing the solution to the data overload problem. This alone should force us to be hyper-vigilant.

We also know that the NSA is constructing a massive new $2 billion data center that aims to expand its spy activities by September, 2013:

A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

(…)

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter. It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration… (Source)

The FBI has recently announced that facial recognition will be coming to a state near you:

Recently-released documents show that the FBI has been working since late 2011 with four states—Michigan, Hawaii, Maryland, and possibly Oregon—to ramp up the Next Generation Identification (NGI) Facial Recognition Program. When the program is fully deployed in 2014, the FBI expects its facial recognition database will contain at least 12 million “searchable frontal photos.” (p. 6) (Source)

While Oblong Industries claims to have disabled the analytics portion of the software that could be used in pre-crime screening taken right from the Minority Report film, they state that private companies and law enforcement agencies could certainly augment their scaled-back version by introducing their own analytics.

Furthermore, the earlier-mentioned AFP article downplays the significance of the software by stating that “Oblong currently has no government customers in the United States or abroad but offers itself as ‘a core technology provider.'”

However, two of Oblong’s current clients are Boeing – the world’s second largest defense contractor and drone specialists; and #12 General Electric – specialists in electronic warfare components and military communication systems. Their combined annual sales are more than $35 billion, which makes it quite likely that new technology will be embraced and proliferated. (Source)

Oblong’s own website states that their company “works with Global Fortune 500 companies, government agencies, and universities to develop custom g‑speak solutions.” Their application areas include:

  • financial services
  • network operations centers
  • logistics and supply-chain management
  • military and intelligence
  • automotive
  • natural resource exploration
  • data mining and analytics
  • bioinformatics
  • trade shows and theatrical presentations
  • medical imaging
  • consumer electronics interfaces

(Source: Oblong Industries “Client Solutions”)

To reinforce the obvious, Oblong’s Chief Executive, Kwin Kramer, has stated flatly that, “We think law enforcement and intelligence are big data users and we think our technology is the leader.”

It is also worth noting that the g-speak “Minority Report” technology was developed at MIT and has been 30 years in the making. MIT has quite a storied history of connections to intelligence agencies; the CIA having actually started the Massachusetts Institute of Technology Center for International Studies (MIT-CIS) in 1950. (Source)

The implied connections are in plain view on MIT’s own website: http://web.mit.edu/policies/14/14.5.html

And Orwell smiles.
Until recently, we might have held out hope that it was the vastness of data collection that was the weakest point for potential tyrants, as it was nearly impossible to sift through, manage, and apply all of it. With the birth of Big Data applications that are literally coming straight from science fiction, however, we might do well to accept the possibility of a truly dystopian reality descending upon us even faster than the speed of thought.

For a glimpse into the cool sales pitch behind Oblong Industries’ Big Data management software, please view the following video. While we should keep an open mind to how advancements in computer tech can be exciting and rewarding, while offering novel ways of human interaction, it is most important to ensure that these technologies are not hoarded by governments and elites who have a clear history of negatively impacting true human development, as well as freedom of movement, expression and self-determination.

 

ByNicholas West

SOURCE: ActivistPost.com

 

Smart Meters Getting Removed Due to Heath Effects

Smart Meters Getting Removed Due to Heath Effects

UPDATE, Nov. 3, 2011: Glendale CA resident also has ‘smart’ meter replaced with analog meter by utility GWP. Video: http://www.youtube.com/watch?v=T_jT3-36KRg

SANTA CRUZ, CA—Just as PG&E enters the final phase of its deployment of wireless “smart” meters in California, the largest of the state’s Investor Owned Utilities (IOU’s) has reversed course, quietly beginning to replace the ‘smart’ meters of those reporting health impacts with the old trusty analog version.  Consumer rights and health groups immediately seized on the news, demanding that millions of Californians unhappy with their new wireless meters get their analogs returned immediately at no cost.

‘Smart’ meters are new wireless utility meters being installed as part of the “smart” grid initiative, spearheaded by technology firms and backed by the Obama administration and the Department of Energy.  Promises ranging from lower utility bills to enhanced renewable generation capacity have failed to materialize, with widespread reports of higher bills, privacy violations, fires and explosions, and commonly reported health impacts such as headaches, nausea, tinnitus, and heart problems associated with powerful wireless transmissions.   Widely disparate political groups- from members of the Green Party to the Tea Party and Occupy protesters have attacked the program, and dozens of grassroots organizations have sprouted up over the past several months to fight what they call an undemocratic, unconstitutional and dangerous assault on people in their own homes and neighborhoods.  Dozens of people have been detained or arrested for peaceful civil disobedience and even simply speaking out against deployments.

In California, more than 47 cities and counties have demanded a halt to installation, and a dozen local governments have passed laws prohibiting the controversial technology. [2]The ‘smart’ meter issue has further angered a public already seething at the utilities over repeated gas explosions, safety breaches at nuclear reactors, and an increasingly extortionate rate structure.  Word of California’s ‘smart’ meter nightmare has spread across the country and around the world, prompting some utilities to place smart meter plans on hold, and recently Nevada’s PUC to call for investigations into the health effects and other smart meter problems.

Now in a dramatic turnaround that could signal the beginning of a widespread recall of wireless ‘smart’ meters, on October 28th PG&E re-installed a classic spinning disc analog meter on the home of Santa Cruz, CA resident Caitlin Phillips, who had been suffering headaches and other symptoms from her ‘smart’ meter.   The move comes in response to verbal directives from the California Public Utilities Commission President Michael Peevey, who recently told members of the public that the utility “will provide for you to go back to the analog meter if that’s your choice.”  The CPUC has been slow to respond to thousands of ordinary citizens reporting health effects from the new meters.

When a Wellington Energy installer (contracted with PG&E) came to install a smart meter at her home, Caitlin asked the installer to get off her property and not install, because of what a neighbor had told her about possible health damage and privacy violations.   “When I returned home later, I discovered a smart meter on my house.   That night I awoke to severe anxiety, headache, and buzzing in my teeth, and realized the new smart meter was on the other side of the wall from my bed.”  Caitlin reported her experience to PG&E and the CPUC, who both declined to rectify the situation.  When the symptoms persisted, Caitlin sought the assistance of the Scotts Valley based group Stop Smart Meters! who provided an analog meter and referred her to a professional who could help her remove her ‘smart’ meter.  As soon as the analog was installed, Caitlin’s symptoms disappeared.

Frustrated and outraged about her treatment by the utility and the PUC, Caitlin travelled to San Francisco to speak at a commission meeting on Oct. 20th.   About a week later, PG&E crews were at her house replacing her temporary analog meter with a brand new official PG&E analog meter.  This is believed to be the first time PG&E have willingly replaced an analog meter on the home of someone suffering from health effects.

An “opt-out” proceeding overseen by an Administrative Law Judge is underway at the CA Public Utilities Commission, yet those suffering (in some cases severe) health impacts have been stuck in limbo as utilities refuse to remove the harmful meters upon request- until now.

“There are hundreds of thousands- if not millions- of people suffering in their homes from forced ‘smart’ meter radiation,” said Joshua Hart, Director of the grassroots organization Stop Smart Meters!  “The utilities and PUC’s must respond promptly to all requests that analogs be returned.  The alternative is that people will increasingly turn to independent professionals to remove unwanted ‘smart’ meters from their homes, a reasonable action we assert is within our legal rights. Protecting your family’s health is not tampering.”

PG&E and other utilities have also been responding to health complaints by replacing wireless ‘smart’ meters with digital meters that are “wireless-ready.”  These digital meters have been associated with health problems from “dirty electricity” frequencies that pass into a home via the electrical wiring.  These “trojan horse” meters have been roundly rejected by those who report continuing health impacts after installation. Susan Brinchman, Director of San Diego based Center for Electrosmog Prevention. said “At this point, the burden of responsibility is on the utilities to demonstrate that any new meter they want to install on our homes is safe.  Communities have the right to retain analog meters at no extra charge.  Period.”

Video Interview of Caitlin on KION News: [Warning: this news site crashes some browsers]: http://www.kionrightnow.com/story/15936211/santa-cruz-woman-fights-smartmeter-wins

SOURCE: StopSmartMeters.org

 

Hate Drones, Love Privacy? Manufacturer Douglas McDonalad Says You’re A Criminal

 

“If you’re concerned about it, maybe there’s a reason we should be flying over you, right?” said Douglas McDonald, the company’s director of special operations and president of a local chapter of the unmanned vehicle trade group.

LAKOTA, N.D. – The use of unmanned aerial drones, whose deadly accuracy helped revolutionize modern warfare high above the battlefields of Iraq and Afghanistan, is now spreading intrigue and worry across the plains of North Dakota.

airforce_drone_groundedAmid 3,000 acres of corn and soybeans and miles from the closest town, a Predator drone led to the arrests of farmer Rodney Brossart and five members of his family last year after a dispute over a neighbor’s six lost cows on his property escalated into a 16-hour standoff with police.

It is one of the first reported cases in the nation where an unmanned drone was used to assist in the arrest of a U.S. citizen on his own property; and a controversial sign of how drones, in all shapes, sizes and missions, are beginning to hover over American skies.

Far from just the menacing aircraft bearing Hellfire Missiles and infrared cameras from combat, Unmanned Aerial Systems, the preferred term in the industry, now include products so small they fit in the palm of your hand and can look as innocent as remote-controlled hobby airplanes.

They can quickly scout rural areas for lost children, identify hot spots in forest fires before they get out of control, monitor field crops before they wither or allow paparazzi new ways to target celebrities. The government has predicted that as many as 30,000 drones will be flying over U.S. skies by the end of the decade.

But can drones fly in domestic airspace without crashing into an airplane? Can they be used in a way that doesn’t invade privacy? Who’s watching the drone operators — and how closely?

“All the pieces appear to be lining up for the eventual introduction of routine aerial surveillance in American life — a development that would profoundly change the character of public life in the United States,” the American Civil Liberties Union warned in a policy paper on drones last year titled, “Protecting Privacy From Aerial Surveillance.”

In the North Dakota case, fearing that the Brossarts had armed themselves, local law enforcement asked for the assist from the Predator — unarmed but otherwise identical to the ones used in combat — that’s stationed at Grand Forks Air Force Base as a SWAT team converged on the property.

It put Rodney Brossart front and center in the debate over the burgeoning use of domestic drones, and the threat they may represent when authorities are given the ability to watch everything from above.

“I’m not going to sit back and do nothing,” Brossart said recently, sitting in the shade outside his small house where farm equipment, trailers and the top half of a school bus sit in the yard in various states of disrepair. As drone use expands nationwide, he’s worried. “I don’t know what to expect because of what we’ve seen.”

Groups from the Electronic Privacy Information Center to the American Library Association have joined to raise concerns with the Federal Aviation Administration about the implications of opening up U.S. air space to drones, as have Reps. Edward Markey and Joe Barton, co-chairs of the Congressional Bi-Partisan Privacy Caucus.

But the federal government already has been quietly expanding their use in U.S. air space. Even as the wars abroad wind to an end, the military has been pleading for funding for more pilots. Drones cannot be flown now in the United States without FAA approval. But with little public scrutiny, the FAA already has issued at least 266 active testing permits for domestic drone operations, amid safety concerns. Statistics show unmanned aircraft have an accident rate seven times higher than general aviation and 353 times higher than commercial aviation.

Under political and commercial pressure, the Obama administration has ordered the FAA to develop new rules for expanding the use of small drones domestically. By 2015, drones will have access to U.S. airspace currently reserved for piloted aircraft.

“Think about it; they are inscrutable, flying, intelligent,” said Ryan Calo, the director of privacy and robotics for the Center for Internet and Society at Stanford Law School. “They are really very difficult for the human mind to cleanly characterize.”

While drone use in the rest of the country has been largely theoretical, here in eastern North Dakota it is becoming a way of life.

Drivers on Hwy. 2 near the Grand Forks base say they often see the U.S. Customs Predator B (the B indicates it is unarmed) practicing “touch and go” landings in the morning. A local sheriff’s deputy talked of looking up from writing reports in his patrol car one night to see a drone quietly hovering over him. Don “Bama” Nance, who spent 20 years in the Air Force before retiring to Emerado, now cuts the grass on the base golf course.

“They’re always overhead on the third hole,” he said.

The Grand Forks base has been flying drones sine 2005, when it switched missions from flying tankers to unmanned aerial systems. So, too, have the storied Happy Hooligans of the North Dakota Air National Guard, which has flown drone missions in Iraq and Afghanistan from its base in Fargo.

And use is growing. Predators operated by Customs and Border Patrol completed more than 30 hours of flight in 2009 and more than 55 hours in 2010, mapping the flooded Red River Valley areas of North Dakota and Minnesota. In 2011, the Predator B flew close to 250 hours in disaster relief support along the northern border.

The Grand Forks base, which now has two Predators flying, expects to have as many as 15 Northrop Grumman Global Hawks and six to eight General Atomics Predators/Reapers. That will add an additional 907 Air Force personnel to the base.

For this wide swath of eastern North Dakota, that is part of the appeal: jobs. The University of North Dakota has eagerly partnered with the military and defense contractors, and often operating behind locked doors and secrecy, university officials are working to make the area a hub of unmanned aircraft activity. The state has invested an estimated $12.5 million to make it happen. The local Economic Development Corporation has added a drone coordinator in charge of recruiting more companies to join the 16 drone-related ones that have already set up shop.

“Where aviation was in 1925, that’s where we are today with unmanned aerial vehicles,” said Al Palmer, director of UND’s Center for Unmanned Aircraft Systems Research, Education and Training. “The possibilities are endless.”

A new major

The University of North Dakota operates a fleet of seven different types of unmanned aircraft. In 2009, it became the first college in the country to offer a four-year degree in unmanned aircraft piloting. It now has 23 graduates and 84 students majoring in the program, which is open only to U.S. citizens.

It works with Northland Community College in Thief River Falls, Minn., which developed the first drone maintenance training center in the country and proudly shows off its own full-size Global Hawk.

The university also serves as an incubator for companies that might want to expand the industry. In five days, Unmanned Applications Institute International, which provides training in operating drones, can teach a cop how to use a drone the size of a bathtub toy.

“If you’re concerned about it, maybe there’s a reason we should be flying over you, right?” said Douglas McDonald, the company’s director of special operations and president of a local chapter of the unmanned vehicle trade group. “But as soon as you lose your kid, get your car stolen or have marijuana growing out at your lake place that’s not yours, you’d probably want one of those flying overhead.”

Earlier this year, the Grand Forks Sheriff’s Department was provided its own drone by the university for $1 as part of a project to develop policies and procedures for law enforcement.

“We are not out there to abuse people’s rights, but at the same time we’re out there to protect public safety,” said Grand Forks Sheriff Robert Rost. “The public perception is that Big Brother is going to be snooping on them and that is not the case at all. It will not be misused.”

Still, not everyone is enthusiastic about drones. The Air Force has proposed expanding seven additional nautical miles of restricted air space near Devils Lake to conduct laser training with drones. Of the 43 public comments on the proposal, 42 opposed it, largely out of safety concerns and fears that it would interfere with commercial and general aviation. Nevertheless, the FAA approved the airspace expansion late last month.

Between the base and Grand Forks, Arnie Sevigny flies his own silent drone protest: a raggedy kite shaped like a jet fighter whipping in the wind 100 feet in the air and tied down with a stake on his property a few miles from the base. “No camera. No invasion of privacy,” Sevigny joked. “What do you need a drone for anyhow? They use the satellites they already have to see the head of a dime in your hand.”

And for all the assurances, there is much that isn’t said or revealed. Some of the equipment used by the university can’t be seen by the public because of federal privacy rules. Although legal, anyone photographing outside the base can find themselves being questioned by county, state and Air Force law enforcement. When asked how many times U.S. Border Protection has dispatched drones at the request of local police, a spokeswoman for the agency said it does not keep those figures.

Even Brossart doesn’t know what the drone that led to his family’s arrests saw. Despite demands made in court, the Predator’s footage has not been produced to his attorneys. “They don’t want to show what happened,” he said, “because it will show exactly what they did.”

A judge is expected to rule within days on whether the charges against Brossart, who has had a number of run-ins with authorities over the years, should be dismissed, in part, because the warrantless use of the “spy plane” was part of a pattern of outrageous government conduct that violated Brossart’s Fourth Amendment rights.

With case law murky on the domestic use of drones, Brossart’s attorney, Bruce Quick, said the courts, Congress and state legislatures will likely have to address the issue. “It’s not just criminal defense attorneys. It’s just people concerned about civil liberties in general,” he said. “I don’t think a lot of us like the idea of our privacy being given away.”

Mark Brunswick • 612-673-4434

SOURCE: StarTribune.com

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

Most of us don’t think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history. The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that the despots and dictators of the past could only dream of.

Previous generations never had to deal with “pre-crime” surveillance cameras that use body language to spot criminals or unmanned drones watching them from far above. Previous generations would have never even dreamed that street lights and refrigerators might be spying on them. Many of the incredibly creepy surveillance technologies that you are about to read about are likely to absolutely astound you. We are rapidly heading toward a world where there will be no such thing as privacy anymore. Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you. The world is changing at a breathtaking pace, and a lot of the changes are definitely not for the better.

The following are 14 incredibly creepy surveillance technologies that Big Brother will be using to watch you….

#1 “Pre-Crime” Surveillance Cameras

A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime.

Does that sound insane?

Well, authorities are taking this technology quite seriously. In fact, dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.

#2 Capturing Fingerprints From 20 Feet Away

Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?

This kind of technology is actually already here according to POPSCI….

Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.

Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.

#3 Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American cops are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).

These pornoscannerwagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

You can see a YouTube video presentation about this new technology right here.

#4 Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind. The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore. But obviously the potential for abuse with this kind of technology is extraordinary. The following is from a recent article by Dick Pelletier….

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We’re friends, not enemies.

Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people’s minds so that they didn’t want to kill anymore.

Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship.

Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person’s notion of groups and identities; even inspiring them to commit violence. See DARPA proposal request HERE.

#5 Unmanned Drones In U.S. Airspace

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies “before they jump into the pool,” said John Appleby, a manager in the DHS Science and Technology Directorate’s division of borders and maritime security.

The fact that very few Americans seem concerned about this development says a lot about where we are as a nation. The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

#6 Law Enforcement Using Your Own Cell Phone To Spy On You

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year….

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that show that cell phone radiation is harmful to humans.

#7 Biometric Databases

All over the globe, governments are developing massive biometric databases of their citizens. Just check out what is going on in India….

In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.

#8 RFID Microchips

In a previous article, I detailed how the U.S. military is seeking to develop technology that would enable it to monitor the health of our soldiers and improve their performance in battle using RFID microchips.

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

Now, one school system down in Texas actually plans to start using RFID microchips to track the movements of their students….

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

#9 Automated License Plate Readers

In a previous article, I quoted a Washington Post piece that talked about how automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

#10 Face Reading Software

Can computers tell what you are thinking just by looking at your face?

Don’t laugh.

Such technology is actually being actively developed. The following is from a recent NewScientist article….

IF THE computers we stare at all day could read our faces, they would probably know us better than anyone.

That vision may not be so far off. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better adverts.

#11 Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining“, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

#12 Street Lights Spying On Us?

Did you ever consider that street lights could be spying on you?

Well, it is actually happening. New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities. The following is from a recent article by Paul Joseph Watson for Infowars.com….

Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

#13 Automated ISP Monitoring Of Your Internet Activity

As I have written about before, nothing you do on the Internet is private. However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.

Specifically, they’re coming for you on Thursday, July 12.

That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.

Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.

Spying On Us Through Our Appliances

Could the government one day use your refrigerator to spy on you?

Don’t laugh.

That is exactly what CIA Director David Petraeus says is coming….

Petraeus says that web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ said Petraeus.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously ‘dumb’ home appliances such as fridges, ovens and lighting systems.

For many more ways that Big Brother is spying on you, please see these articles….

Every Breath You Take, Every Move You Make – 14 New Ways That The Government Is Watching You

30 Signs That The United States Of America Is Being Turned Into A Giant Prison

The things that I have written about above are just the things that they admit to.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

So how far will all of this go?

Has Big Brother already gone way too far?

Please feel free to post a comment with your opinion below….

Source: The American Dream

Soul Rape: New Scanners Will Instantly Know Everything About You From 50m Away

Soul Rape: New Scanners Will Instantly Know Everything About You From 50m Away

Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body, clothes, and luggage with a new laser-based molecular scanner fired from 164 feet (50 meters) away. From traces of drugs or gun powder on your clothes to what you had for breakfast to the adrenaline level in your body—agents will be able to get any information they want without even touching you.

And without you knowing it.

The technology is so incredibly effective that, in November 2011, its inventors were subcontracted by In-Q-Tel to work with the US Department of Homeland Security. In-Q-Tel is a company founded “in February 1999 by a group of private citizens at the request of the Director of the CIA and with the support of the U.S. Congress.” According to In-Q-Tel, they are the bridge between the Agency and new technology companies.

Their plan is to install this molecular-level scanning in airports and border crossings all across the United States. The official, stated goal of this arrangement is to be able to quickly identify explosives, dangerous chemicals, or bioweapons at a distance.

The machine is ten million times faster—and one million times more sensitive—than any currently available system. That means that it can be used systematically on everyone passing through airport security, not just suspect or randomly sampled people.

Analyzing everything in real time

But the machine can sniff out a lot more than just explosives, chemicals and bioweapons. The company that invented it, Genia Photonics, says that its laser scanner technology is able to “penetrate clothing and many other organic materials and offers spectroscopic information, especially for materials that impact safety such as explosives and pharmacological substances.” [PDF]

Formed in Montreal in 2009 by PhDs with specialties in lasers and fiber optics, Genia Photonics has 30 patents on this technology, claiming incredible biomedical and industrial applications—from identifying individual cancer cells in a real-time scan of a patient, to detecting trace amounts of harmful chemicals in sensitive manufacturing processes.

Hidden Government Scanners Will Instantly Know Everything About You From 164 Feet Away

Above: The Genia Photonics’ Picosecond Programmable Laser scanner is capable of detecting every tiny trace of any substance on your body, from specks of gunpowder to your adrenaline levels to a sugar-sized grain of cannabis to what you had for breakfast.

Meanwhile, In-Q-Tel states that “an important benefit of Genia Photonics’ implementation as compared to existing solutions is that the entire synchronized laser system is comprised in a single, robust and alignment-free unit that may be easily transported for use in many environments… This compact and robust laser has the ability to rapidly sweep wavelengths in any pattern and sequence.” [PDF]

So not only can they scan everyone. They would be able to do it everywhere: the subway, a traffic light, sports events… everywhere.

How does it work?

The machine is a mobile, rack-mountable system. It fires a laser to provide molecular-level feedback at distances of up to 50 meters in just picoseconds. For all intents and purposes, that means instantly.

The small, inconspicuous machine is attached to a computer running a program that will show the information in real time, from trace amounts of cocaine on your dollar bills to gunpowder residue on your shoes. Forget trying to sneak a bottle of water past security—they will be able to tell what you had for breakfast in an instant while you’re walking down the hallway.

The technology is not new, it’s just millions times faster and more convenient than ever before. Back in 2008, a team at George Washington University developed a similar laser spectrometer using a different process. It could sense drug metabolites in urine in less than a second, trace amounts of explosive residue on a dollar bill, and even certain chemical changes happening in a plant leaf.

And the Russians also have a similar technology: announced last April, their “laser sensor can pick up on a single molecule in a million from up to 50 meters away.”

So if Genia Photonics’ claims pan out, this will be an incredible leap forward in terms of speed, portability, and convenience. One with staggering implications.

Observation without limits

There has so far been no discussion about the personal rights and privacy issues involved. Which “molecular tags” will they be scanning for? Who determines them? What are the threshold levels of this scanning? If you unknowingly stepped on the butt of someone’s joint and are carrying a sugar-sized grain of cannabis like that unfortunate traveler currently in jail in Dubai, will you be arrested?

And, since it’s extremely portable, will this technology extend beyone the airport or border crossings and into police cars, with officers looking for people on the street with increased levels of adrenaline in their system to detain in order to prevent potential violent outbursts? And will your car be scanned at stoplights for any trace amounts of suspicious substances? Would all this information be recorded anywhere?

Hidden Government Scanners Will Instantly Know Everything About You From 164 Feet Away

Above: A page from a Genia Photonics paper describing its ability to even penetrate through clothing.

There are a lot of questions with no answer yet, but it’s obvious that the potential level of personal invasion of this technology goes far beyond that of body scans, wiretaps, and GPS tracking.

The end of privacy coming soon

According to the undersecretary for science and technology of the Department of Homeland Security, this scanning technology will be ready within one to two years, which means you might start seeing them in airports as soon as 2013.

In other words, these portable, incredibly precise molecular-level scanning devices will be cascading lasers across your body as you walk from the bathroom to the soda machine at the airport and instantly reporting and storing a detailed breakdown of your person, in search of certain “molecular tags”.

Going well beyond eavesdropping, it seems quite possible that U.S. government plans on recording molecular data on travelers without their consent, or even knowledge that it’s possible—a scary thought. While the medical uses could revolutionize the way doctors diagnose illness, and any technology that could replace an aggressive pat-down is tempting, there’s a potential dark side to this implementation, and we need to shine some light on it before it’s implemented.

The author of this story is currently completing his PhD in renewable energy solutions, focusing on converting waste to energy in the urban environment. Even while most of this information is publicly available, he wanted to remain anonymous.

 

SOURCE: Gizmodo

The Truth Behind The Energy Lie (Supression Of Technological Evolution, The Evidence)

The Truth Behind The Energy Lie (Supression Of Technological Evolution, The Evidence)

http://youtu.be/W8ZlL19Y_Lk

The Energy Crisis is a lie, here is the evidence.

No Body Of Men Has The Right To Deny The Technological Evolution Of Mankind… If a civilization truly wishes to consider itself civilized, it must embrace all technological and scientific advances. The suppression of any technological advance, can not be tolerated if we wish to be a ‘civil’ization. we must ask ourselves if we are working for the benefit of all mankind, or working for the benefit of a few businessman and politicians. The fact that we are unnecessarily poisoning our planet, our home, when their are numerous solutions, raises several questions as to why these technologies are being suppressed. The root of the problem is almost entirely one thing, greed. We as a society can no longer focus our entire efforts into what is profitable, because what is profitable is not always right, and what is right is not always profitable.

This contains a 7-part movie covering various inventors and suppressed inventions. such as, Nikola Tesla, Marco Rodin, Stan Meyers, John Hutchison, Water powered cars(HHO gas) water, dirt, and air batteries, “kelvins thunderstorm”, Stirling engines, the “n-machine”, and several others, well worth watching, even if you know a lot about “free energy” you may learn something you didn’t know.

Genetically Engineered Mosquitoes released into the wild

Genetically Engineered Mosquitoes released into the wild

Australian research scientists have developed a strategy for fighting Dengue fever, a viral disease spread by mosquitoes that affects more than 50 million people annually and causes fever and crippling joint and muscle pain—and in some cases even death.

Dengue kills FAR more people worldwide than influenza, yet it is rarely even mentioned by Western media.

A bacterium named Wolbachiapipientis naturally infects many insect species and has the ability to interfere with its host’s reproductive ability in such a way that entire populations become infected within just a few generationsi. When Wolbachia infects mosquitoes, the mosquitoes’ ability to transmit Dengue virus is almost completely blocked.

Researchers are encouraged that these bacterially infected mosquitoes are safe to humans and, once set loose, are capable of spreading on their own and overtaking the wild mosquito populations that transmit disease to humans.

In two northern Australian towns, between 10,000 and 20,000 of these infected mozzies were released (“mozzie” is Australian for mosquito), and wild mosquito infection rates neared 100 percent—meaning, mosquitoes that can infect humans were almost completely replaced by the ones that can’t.

This approach is a change from the swarms of genetically engineered mosquitoes being bred by companies like Oxitec, a British biotechnology company that has released millions of mutant mosquitoes into the fields of unsuspecting Australians.

Oxitec has found a way to genetically manipulate Aedes aegypti, the mosquito species mainly responsible for transmitting Dengue and yellow fever viruses to humans. These “frankenskeeters” represent a new and terrifying twist in potential GMO (genetically modified organisms) dangers—another product of modern science outpacing common sense when big money is thrown into the equation.

Dengue is a Far Worse Problem than Influenza

Dengue fever is on the rise worldwide and spreading faster than any other insect-borne viral disease. It is a threat to people in more than 100 countries, potentially affecting 2.5 billion people worldwide. Dengue infection typically causes high fever, crushing headache, severe pain behind your eyes, rash, and excruciating pain in your joints and spine, which is why it’s sometimes called “break bone fever.” Dr. Renu Daval-Drager of the World Health Organization says some cases of Dengue can be fatal, particularly the more serious Dengue hemorrhagic fever.

This under-recognized infectious disease used to be restricted to tropical areas; however, it has recently made its way into Texas, Florida and other southern states and is endemic in 125 countries. And Dengue has reached epidemic levels in Central America.

Outbreaks of Dengue virus occur primarily in areas where Aedes aegypti and sometimes Aedes albopictus mosquitoes live and breed. This includes most tropical areas of the world—the same places where malaria is found. Dengue is also spread by travelers who become infected while visiting Dengue-infested regions.

In the Americas, all four Dengue virus types are now present. Worldwide, there are about three to five million cases of influenza annually. However, there are about 100 million cases of Dengue fever annually, worldwide—20 times more cases than influenza!

In the past, the best means for preventing the spread of Dengue involved sustainable, community-based, integrated mosquito control, with limited reliance on chemical insecticides. However, new high-tech strategies are being developed to further combat the spread of this deadly virus. Some of these strategies involve genetically manipulating mosquitoes and then releasing them back into the wild, which can have any number of unforeseen consequences.

No Biotechnology is Without Some Risk

The scientific community has expressed concern about introducing a new type of mosquito that is infected with a bacterium that could be transmitted to humans. However, researchers claim Wolbachia bacterium is completely benign to humans.

According a report by Institute of Science in Society (ISIS)ii:

“In our research Wolbachia-infected insects are feeding on our researchers all the time and there is no sign of any human illness associated with insect Wolbachia. Wolbachia is an insect bacterium that has not been detected living inside humans or any other vertebrates. It can be made to infect human tissue culture cells in the laboratory but these laboratory systems are very artificial and do not predict the actual ability of Wolbachia to infect an actual human being.”

However, Daniel Strickman, national program leader for veterinary and medical entomology at the US Department of Agriculture, remains unconvinced. Strickman expresses some discomfort with releasing an agent that could spread out of control, in a way that does not occur in nature. He states there is a risk that, by making the mosquitoes less susceptible to dengue infection, they may become more susceptible to other viruses such as Japanese encephalitis.

Lead Australian Wolbachia researcher Scott O’Neill claims this problem is “extremely unlikely” as mosquitoes infected with Wolbachia are actually less susceptible to a wide range of pathogens they would normally transmit.iii

One thing can be said for certain—this approach to combating Dengue fever renders all attempts at genetically engineered (transgenic) mosquitoes obsolete. Transgenic mosquitoes are less effective, less efficient, more costly and far more risky.iv Unfortunately, GE “mutant mosquitoes” have already been released into the environment, without public consent, in several countries.

How all these changes affect other species consuming these altered insects remains to be seen.

Genetically Modified “Suicide Mosquitoes” Secretly Released in Grand Cayman Island

Can scientists simply release flying, human-biting genetically modified creatures into the air anytime they wish? Apparently, the answer to this question is “yes.” And they have.

Oxitec has created male Aedes aegypti mosquitoes that live long enough in the wild to mate, but their offspring die before reaching adulthood, reducing the rates at which they can transmit Dengue virus to humans. The genetically engineered bugs contain a gene that kills them unless they are given tetracycline, a common antibiotic. In the lab, with tetracycline provided, multiple generations of the mosquitoes can be bred. Males are then released into the wild, where tetracycline is not available, and their offspring die without it.

The company claims the technique is safe because only the males are released into the environment—it’s only female mosquitoes that bite and spread diseases.

The problem is, millions of these GE bugs have been released into the open air by Oxitec as a means of field-testing their new “Dengue-proof” mosquitoes, without sufficient review and public consultation. They have conveniently chosen several countries with weak regulations. In 2009, Oxitec released their designer insects onto Grand Cayman Island, an island in the Caribbeanv.

The experiment will go down in scientific history as the first release of GM insects that could bite humans. Not surprisingly, it was conducted in secret.

Once the locals got wind of this, they responded with a fair amount of public outrage—and rightly so! But it didn’t stop there. Oxitec subsequently released their frankenskeeters in Malaysia, Brazilvi, Panama, India, Singapore, Thailand, and Vietnam. And they are seeking approval from the US Agriculture Department to perform similar open-air testing in the Florida Keys.

Even supporters of this technology worry that public reaction will be similar to the one that has stalled acceptance of genetically engineered crops. Regulation has not caught up with science, and GE insects are a brand new adversary in this brave new world of genetic modification. Many companies are “making hay” while regulations are lacking.

Oxitec reports the results of their open-air testing exceeded expectations. The genetically engineered males were found to be only half as successful in mating as the wild ones, which is a rate sufficient to repress the population. Oxitec also reports that a 2010 trial on Cayman Island reduced the population of the targeted mosquitoes by 80 percent for three months. But what is the price of this progress? What will be the cost to humans and to the environment?

Just as with genetically engineered (GE) foods, the long-term effects of GE insects are completely unknown—the Earth and its inhabitants are being used as a laboratory for grand scale genetic experiments. It’s a blatant violation of human rights with regard to human experimentation.

Antibiotic-Dependent, Blood-Sucking Genetically Engineered Mosquitoes… What Could Possibly Go Wrong?

Unfortunately, like so many other things, neither the government nor the biotech companies can offer peer-reviewed scientific proof of the safety of their biotechnology—they have blithely rushed ahead without any concern about the long-term effects. Once released, these insects cannot be “recalled.” There are several problemsvii with the assumption that these genetically engineered bugs are safe for the human population. For starters:

  1. The potential exists for these genes, which hop from one place to another, to infect human blood by finding entry through skin lesions or inhaled dust. Such transmission could potentially wreak havoc with the human genome by creating “insertion mutations” and other unpredictable types of DNA damage.viii
  2. According to Alfred Handler, a geneticist at the Agriculture Department in Hawaii, mosquitoes can develop resistance to the lethal gene and might then be released inadvertently. Todd Shelly, an entomologist for the Agriculture Department in Hawaii, said 3.5 percent of the insects in a laboratory test survived to adulthood, despite presumably carrying the lethal gene.
  3. The sorting of male and female mosquitoes is done by hand. As a result, up to 0.5 percent of the released insects are female. Even that small of a percentage could lead to a temporary increase in the spread of Dengue—not to mention potentially transmitting the altered gene to humans.
  4. Tetracycline and other antibiotics are now showing up in the environment, in soil and surface water samples. These genetically engineered mosquitoes were designed to die in the absence of tetracycline, assuming they would NOT have access to that drug in the wild. With tetracycline exposure (for example, in a lake) these mutant insects would actually thrive in the wild, potentially creating a nightmarish scenario.

The problem is that genetically modified female mosquitoes can still bite humans. This means the protein, which kills their own larvae, might be injected into humans when the mosquitoes suck their blood, with unknown and potentially ghoulish consequences.

And those are just the mosquitoes…

Moths, Too

Oxitec is also the creator of genetically engineered pink bollworm moths, and swarms of this creature have already been unleashed over the fields of Arizona in an effort to overtake natural bollworm populations, which are a pest.5 The company appears to be edging its way toward becoming the next “Monsanto,” already having a monopoly on genetically modified insects. Their next frankenbug is a genetically engineered diamond-back or cabbage moth, slated for release over England.

Other groups are also developing genetically modified insects. One group has created Anopheles mosquitoes that are immune to the malaria parasite they normally carry, and also manufacturing male Anopheles that lack sperm.9

Realizing genetic engineering is risky technology, the World Health Organization is finalizing new guidelines about how GE insects must be deployed in developing countries, which it expects to release by the end of 2012ix.

Your Best Defense Against Dengue

Building a strong immune system is your best defense against this nasty virus. Your immune health depends on the lifestyle choices you make every day. By supporting your body’s own natural ability to defend itself against pathogens, you will not only have resistance to Dengue fever but to every other infectious illness that comes your way. Make sure you address each of the following:

  • Consume a diet rich in fresh, whole foods with abundant organic vegetables, pasture-raised meats, organic eggs and raw dairy; avoid sugar, chemicals and processed foods; be sure to get plenty of omega-3 fats; refer to my nutrition plan for more dietary information
  • Optimize your vitamin D level
  • Exercise regularly
  • Address your stress, and make sure to get plenty of sleep
  • Practice good hand washing technique

(Dr. Marcola)

 

SOURCE: http://updatednews.ca/2012/06/24/genetically-engineered-mosquitoes-released-into-the-wild/

Attention Activists: Your Phone May Not Be Safe at Protests

Attention Activists: Your Phone May Not Be Safe at Protests

Ever wondered why your cell phone reception suddenly becomes terrible at protests? Ever worried that police could use electronic spoofing devices to suck up your mobile data because you are in the streets exercising your rights?

You might have been onto something.

Mobile “IMSI catchers”, currently on the market and being pushed to police and intelligence agencies worldwide, enable these creepy, stealth spying tactics. And if they build it and hawk it, history tells us police will buy it and deploy it.

On Tuesday, July 3, 2012, electronic privacy advocate and technology researcher Chris Soghoian tweeted a link to a photograph of a talk he gave at TED in Scotland in late June. Behind him in the photograph is another image, this one taken by privacy researcher Eric King at a surveillance trade show. (King’s Twitter bio contains a quote from a representative of the notorious ISS World — a global surveillance trade firm that often hosts such trade shows: the rep called him an “Anti-lawful interception zealot blogger.” High praise.)

Look at the slide behind Soghoian; that’s the photo in question. It shows an IMSI catcher strapped onto a model, under the model’s shirt.

IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.

As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.

Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.

Here’s a creepy video that a purveyor of IMSI catchers made to advertise its product:

Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.

Police in the United States claim they do not need a warrant to use an IMSI catcher or other spoofing device to track your location. A case to determine whether or not the courts agree is working itself through the system.

Privacy International’s Eric King took the photo on the slide behind Soghoian at a surveillance trade show, where he says the tool was “pitched to me as being perfect for covert operations in public order situations.” In other words, at protests. 

 

The FBI uses IMSI catchers and claims it does so legally, even though it says it doesn’t need a warrant to deploy them. The Electronic Privacy Information Center is currently pursuing FOIA litigation to find out exactly how the bureau uses the “Stingray” (a brand name IMSI catcher); unsurprisingly, the FBI wasn’t forthcoming with documents to reveal its legal standard or other information about how it uses the tool. Stay tuned for more information as that case makes its way through the courts.

Meanwhile, how can you protect yourself against IMSI catchers? Unfortunately, you probably can’t. And the threats are not just from government. As Soghoian and others warned in a friend of the court brief,

Finally, the communications privacy of millions of law-abiding Americans is already threatened by the use of this and similar interception technologies by non-US government entities, such as stalkers, criminals, and foreign governments engaged in espionage. As such, the public interest is best served by greater public discussion regarding these tracking technologies and the security flaws in the mobile phone networks that they exploit, not less.

Yet again, we are faced with a situation in which our technology has outpaced our law reform. It’s time for Congress to change that.


To get a more detailed sense of how the technology actually works, watch this excellent talk from DefCon 2011, with Chris Paget: “Practical Cellphone Spying”. He spoofs the phones of the people in the audience during the talk; it’s well worth watching if you have some time.

 

For more on IMSI catchers and the state of the law, click here.

 

SOURCE: PrivacySOS

Raytheon Awarded $636 Million for Exoatmospheric Kill Vehicle

Raytheon Awarded $636 Million for Exoatmospheric Kill Vehicle

Just what we need.. Another flying death robot.. in space.   -DCMX Editor

Raytheon Company (NYSE: RTN) was awarded a $636 million development and sustainment contract to provide the Exoatmospheric Kill Vehicle to The Boeing Company, which is the prime contractor for the Ground-based Midcourse Defense program. Raytheon booked the award during its second quarter.

EKV represents the centerpiece for the Missile Defense Agency’s GMD as the intercept component of the Ground Based Interceptor, also known as GBI, which is designed to engage high-speed ballistic missile warheads in space.

“When it comes to developing, testing and deploying technologies that enable the intercept of threats in space, Raytheon is a world leader,” said Dr. Taylor W. Lawrence, Raytheon Missile Systems president. “We are proud to contribute to our nation’s first line of defense against the threat of ballistic missiles.”

Under conditions of the contract, which extends through November 2018, Raytheon will provide EKV development, fielding, testing, system engineering, integration, configuration management, equipment manufacturing and refurbishment, and operation and sustainment.

About the EKV
Leveraging more than two decades of kill vehicle technology expertise, the EKV is designed to destroy incoming ballistic missile threats by colliding with them, a concept often described as “hit to kill.”

EKV has an advanced multi-color sensor that is used to detect and discriminate incoming warheads from other objects.

The EKV also has its own propulsion, communications link, discrimination algorithms, guidance and control system and computers to support target selection and intercept.

EKV is deployed and operational today.

EKV has had eight successful intercepts throughout the life of the program.

Source : Raytheon Corporation (NYSE: RTN)

The Mark of the Beast: Implantable RFID Chips

The Mark of the Beast: Implantable RFID Chips

The Dawning of the Worldwide Human Tracking System – Implantable RFID Chips

“And in those days shall men seek death, and shall not find it; and shall desire to die, and death shall flee from them.” Revelation 9:6

What is presented on this page is not fantasy, or our idea of something that could happen in the near future. Every item here will tell you about advances in technology that either are in place, or in the end stages of development and about to be released. Every item here will show you not only the plan, but the actuals tools that the New World Order (NWO) has in place to track you right now at this very moment to monitor you, and control you. We also tell you why they are doing this, and how it all will end. The bible, in the book of Revelation, calls this the mark of the beast. What the apostle John could only stare at in awe and wonder in the revelation that Jesus showed him of the end times, not knowing fully what he saw, we get to see become real. These are the end times foretold in the book of Revelation.

The Mark of the Beast

The first thing you need to understand about the mark of the beast is that it is a worldwide system that collects and gathers information, and ties it in with personal records of all kinds. This will culminate in a chip, implanted in your body, that will personally connect you to the system. Today you see that information is already being collected when you use your debit card, the loyalty card at the supermarket, your car has computer chips that enable it to function – everything is controlled by a chip that feeds the information to various databases around the world. Even the Internet itself is part of this system.

http://vimeo.com/32380647
It’s hard to now imagine life ‘pre-iPhone’, and soon we won’t be able to remember what life was like without the RFID chip.

We have become a worldwide, connected society whose every move is being tracked and cataloged. For now, it’s all voluntary, and the New World Order has to reply on making cool devices to lure us in to wanting to be tracked – iPhone, smart phones, RFID chips – but the day is coming where you will be forced to have a chip put inside your body. When that day comes, you will know who the Antichrist is because he will be the one in power over the whole world. Accepting that chip will mean you side with the Antrichrist, and against God. Accepting the chip will doom your soul to Hell forever. Whatever you do, do notever let anyone put a chip inside your body. It will be better to side with God and die at the Antichrist’s hand then to accept the chip and spend eternity in Hell.

What Is RFID? (Radio Frequency IDentification)

Radio Frequency IDentification is an automatic data capture technology that uses tiny tracking chips affixed to products. These tiny chips can be used to track items at a distance–right through someone’s purse, backpack, or wallet. Many of the world’s largest manufacturing companies would like to replace the bar code with these “spy chips,” meaning that virtually every item on the planet–and the people wearing and carrying those items–could be remotely tracked. There is currently NO REGULATION protecting consumers from abuse of this technology. source – spychips.com

The Mark of the Beast is lurking in the heart of the RFID chip

For years you have been told, through readers of bible prophecy and conspiracy theorists, that the mark of the beast was coming soon and that people who receive an implantable microchip. This has been swirling around for about the past 30 years or so. Well, the years ticked by with no progress on making a chip that could do that, and eventually people began to file rumor that under “bogus” and forgot about it. When all of a sudden, we have this:

http://vimeo.com/32380487

Sure sounds like the mark of the beast to me….

Now, I ask you, does that sound like a conspiracy theory to you?

What it does sound like is the Vice-President of the United States telling the Chief Justice of the Supreme Court that “one day you will rule on implantable chips in human beings”. Wow…take a moment, let it sink in. And that’s how it goes with most conspiracy theories, they have a very strong basis in reality. And yes, there is a government plan to put a chip in your body, and you need to decide if this is a good thing or a bad thing. Just how strong is the push to bring this technology to the people? This strong –

http://vimeo.com/32380893

The Mark of the Beast has hit every aspect of our government, and it goes so much deeper than you
can imagine.

Tommy Thompson, former Wisonsin Gov and HHS Sec’y supports VeriChip implants in humans, and
so would you if you had over 150,000 shares of stock in VeriChip Corporation. Interesting Note:
when Thompson is asked where the chip is place, he says you “put it in your right arm”, and just
coincidentally that’s one of the two places the book of Revelation says it is to go.  Hmmmm…

Microchips implanted in Mexican officials.

Dateline – Mexico: July 14, 2004

“Carlos Altamirano is scanned to show the 16-digit code of his implanted VeriChip chip in this file photo from July 2003 in Mexico City. Now the same technology is being used by Mexico’s attorney general and hundreds of others.” source – MSNBC.com


Photo of a man being chipped with the mark of the beast

They will use any and every excuse to sell it to us.

Chipping kids to prevent kidnappings, chipping the elderly to guard against Alzheimer’s, chipping diabetics, chipping people with allergies, chipping people to prevent medical mistakes…and the list goes on and on. It all sounds good, it all sounds so right – using technology to better our lives. But
it’s not good, and it’s not right. What it is, is the Mark of the Beast as foretold by God
(see left side story).

http://vimeo.com/32381050

IBM is showing us the future – believe it.

Should you get chipped? All depends on whose side you are on.

God’s Side, or Satan’s. Because this system is what the Antichrist will use during the Tribulation.
When fully activated, it will be the Devil’s mark, take it at your own peril. This is what God says will happen to every one who takes the mark:

“And the third angel followed them, saying with a loud voice, If any man worship the beast and his image, and receive [his] mark in his forehead, or in his hand, The same shall drink of the wine of the wrath of God, which is poured out without mixture into the cup of his indignation; and he shall be tormented with fire and brimstone in the presence of the holy angels, and in the presence of the Lamb: And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor night, who worship the beast and his image, and whosoever receiveth the mark of his name.
Rev 14: 9,10

The mark of the beast in advertising

The New World Order is very clever. When they want to advance their agenda of a One World Government with every under their control, they have many ways to get the job done. One of these ways is through marketing and advertising.

TheSun.com has an interesting story today about a new technology being test marketed in Japan
right now. This product is a billboard with facial recognition software to scan your face, determine
your gender, and then deliver an appropriate ad.

“Retailers are targeting individual shoppers with digital billboards like those in the hit Tom Cruise
film Minority Report. Cameras in the advert hoardings identify the age and sex of passers-by then display relevant products. The makers claim images of faces are erased immediately but some consumers fear the billboards will capture their expressions and responses to the ads. The signs are being tried out in Japan. Digital advertising expert Omaid Hiwaizi, 40, from London agency Chemistry, said: “Companies will be watching closely to see if they do well.” source – thesun.com

Sounds kinda cool, doesn’t it? Like something you would have a lot of fun “playing with” as you are walking down the street. And that’s exactly what the NWO is counting on. Because that is how they will get you to accept 24-hour facial surveillance of each and every person on this planet. They
make it fun, make it catchy…they make it something you look at with awe and admiration. And the whole time, what they are really doing, is laying the snares to stamp, catalog and process each and every one of us. When the system is finished, this is what the bible says will be the result:

“And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number [is] Six hundred threescore [and] six.” Revelation 13: 16-18

Truly this is end times bible prophecy being fulfilled before our very eyes.

Note: If the implantable RFID chip does turn out to the the Mark of the Beast, which seems highly
likely, it will not be until the actual reign of the Antichrist that it will have it’s power and significance.
The Bible is quite clear that receiving the Mark, during the Tribulation, is completely and obviously
tied to the worship of the antichrist. No one will take the mark by accident. You will be asked to
swear allegiance to the antichrist as an act of worship. Anyone receiving the mark during the time
of the Great Tribulation will know exactly why they are getting it. It will be because they will be
acknowledging, falsely, the antichrist as God.

 


Positive ID, formerly known as VeriChip, is the company that created the implantable RFID chip for human use.

So if you were today to get a senior relative with Alzheimer’s chipped or a young child chipped to thwart a kidnapping, that would not be considered receiving the mark of the beast. However, NTEB highly advises against having anyone you know and loved chipped. Ever. Resist it, reject it, fight it with your dying breath. The mark of the beast is real.


 

The mark of the beast as found in everyday news stories

Wal-Mart Radio Tags to Track Clothing

“Wal-Mart Stores Inc. plans to roll out sophisticated electronic ID tags to track individual pairs of jeans and underwear, the first step in a system that advocates say better controls inventory but some critics say raises privacy concerns. Starting next month, the retailer will place removable “smart tags” on individual garments that can be read by a hand-held scanner. Wal-Mart workers will be able to quickly learn, for instance, which size of Wrangler jeans is missing, with the aim of ensuring shelves are optimally stocked and inventory tightly watched. If successful, the radio-frequency ID tags will be rolled out on other products at Wal-Mart’s more than 3,750 U.S. stores.


Marc F. Henning for The Wall Street Journal Apparel supervisor Sonia Barrett uses a handheld scanner to read EPC labels
on men’s denim jeans on July 19, while checking inventory at the Walmart Supercenter Store No. 1 in Rogers, Ark.

“This ability to wave the wand and have a sense of all the products that are on the floor or in the back room in seconds is something that we feel can really transform our business,” said Raul Vazquez, the executive in charge of Wal-Mart stores in the western U.S. Before now, retailers including Wal-Mart have primarily used RFID tags, which store unique numerical identification codes that can be scanned from a distance, to track pallets of merchandise traveling through their supply chains. Wal-Mart’s broad adoption would be the largest in the world, and proponents predict it would lead other retailers to start using the electronic product codes, which remain costly. Wal-Mart has climbed to the top of the retailing world by continuously squeezing costs out of its operations and then passing on the savings to shoppers at the checkout counter. Its methods are widely adopted by its suppliers and in turn become standard practice at other retail chains.” source – Wall Street Journal

http://vimeo.com/32381240

Mark of the beast in vending machines:
Vending machines that use fingerprint and retinal scans to sell you chips

“MYFOXNY.COM – Your thumbprint might soon be the key to an afternoon candy bar. A Massachusetts based vending machine company is joinng the growing ranks of companies that are field-testing new technologies. Next Generation Vending and Food Service is experimenting with biometric vending machines that would allow a user to tie a credit card to their thumbprint. “For a certain demographic that is pretty cool,” says company president John S. Ioannou. Next Generation is currently testing about 60 of the biometric machines in various locations in the northeast.


The Diji-Touch vending machine records your thumnprint and retinal scan to sell you things

The company is also testing other technologies. Ioannou says the key to the transforming the vending machine business is making the consumer feel more engaged. The days might be numbered where a consumer watches a bag of chips roll through the machine and drop. Next Generation is also testing a machine that includes a 46″ touch-screen display that acts similarly to an iPhone display. The user can click on an item, flip the image and even see the nutrional information on the back of the packaging. Ioannou says initial results are good saying, “The feedback is extraordinary.” The machines include internally mounted cameras to monitor what is going on outside of the machine. The company is also installing wireless or Ethernet connections on all of its current machines so there will be real-time reporting of the amount of goods in the machine for restocking purposes. Monitors will even be able to report when a coin is stuck in the machine. All of the current machines will be upgraded by the end of 2011.” source – MyFoxNY

They are training us to allow our thumbprints to be on file in order to buy snack food. They are getting us to buy into a world system that, when complete, will monitor and track our every move, record every purchase. To what end, you say? So that when this system that the bible calls the mark of the beast is complete, you will not be able to buy anything or sell anythingwithout the permission of the Goverment. You will be completely and totally controlled. They will apply this technology to everything. And then one day, when the system is complete, they will link together your thumb print, your eye scan, your financial information, your bank cards, your automatic deposit paycheck, the computer sensors inside your car, your smart phones, your home computer, your medical records, and even brain waves into one, complete system that the Goverment will control. Without their permission you will buy nothing, sell nothing, and go nowhere untracked. Mark of the beast in your trash can: High-tech garbage carts with RFID chips force recycling or pay $100 fine

CLEVELAND, Ohio — It would be a stretch to say that Big Brother will hang out in Clevelanders’ trash cans, but the city plans to sort through curbside trash to make sure residents are recycling – and fine them $100 if they don’t. The move is part of a high-tech collection system the city will roll out next year with new trash and recycling carts embedded with radio frequency identification chips and bar codes. The chips will allow city workers to monitor how often residents roll carts to the curb for collection. If a chip show a recyclable cart hasn’t been brought to the curb in weeks, a trash supervisor will sort through the trash for recyclables.” source – Cleveland.com


Soon, every trash and recycle bin in America will be armed with an RFID chip to report on every thing you do…

NTEB reported on this happening in the UK, and warned that it would soon slither across the ocean and set up shop here in America. Big Brother plans on putting an RFID chip in EVERY thing, to track your every move. And the very last thing they will chip will be YOU. Guaranteed.

 Mark of the beast in your health club:
24 Hour Fitness rolls out finger scanners at gyms

(AP) – 4 hours ago SAN RAMON, Calif. – Members of the 24 Hour Fitness chain no longer need to worry about forgetting their membership cards and IDs when they go to the gym: All they need to bring are their fingers. The San Ramon-based company is now using fingerprint scanners at its 60 San Francisco Bay area locations to verify members’ identities. It also has started offering so-called “Cardless Check-In” this month at some gyms in other states. To enter the gym, 24 Hour Fitness members need to punch in a 10-digit code and have an index finger scanned by a device that compares the fingerprint to one on file. The scanners underscore the growing use of biometric technology, which uses unique physical features such as hands, eyes and faces to identify people.” source – Google Mark of the beast in your school:
Connecticut students to get RFID tracking tags.

In the tony town of New Canaan, students might someday get tracking tags along with their textbooks. No decisions have yet been made, but school officials plan to look into the possibility of adding radio frequency tags to student or staff ID cards, or place them on school property, like laptops, the New Canaan Advertiser reports. The company that makes the devices is SecureRF Corporation, based in Westport. It has applied for a $100,000 grant from the National Science Foundation to conduct science research and wants New Canaan High School to use the technology, the Advertiser reports.” source – NBC

 Mark of the beast in Outer Space:
The Government’s New Right to Track Your Every Move With GPS.

Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn’t violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway – and no reasonable expectation that the government isn’t tracking your movements.


The mark of the beast will cover the whole earth

That is the bizarre – and scary – rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants – with no need for a search warrant. It is a dangerous decision – one that, as the dissenting judges warned, could turn America into the sort of totalitarian state imagined by George Orwell. It is particularly offensive because the judges added insult to injury with some shocking class bias: the little personal privacy that still exists, the court suggested, should belong mainly to the rich.

The court went on to make a second terrible decision about privacy: that once a GPS device has been planted, the government is free to use it to track people without getting a warrant. There is a major battle under way in the federal and state courts over this issue, and the stakes are high. After all, if government agents can track people with secretly planted GPS devices virtually anytime they want, without having to go to a court for a warrant, we are one step closer to a classic police state – with technology taking on the role of the KGB or the East German Stasi.” source – Yahoo News

 Mark of the beast in your smart phone:
Apple’s plan to track your every move.

As one of the world’s most successful innovator and creator of cutting-edge technology that millions of people adopt the second it’s released, paying close attention to what they do is very important. So here are some of the new features being planned in future releases fof their products, particularly for the iPhone.


Apple presents the Mark of the Beast app – it’s the entire phone.

  • A system that can take a picture of the user’s face, “without a flash, any noise, or any indication that a picture is being taken to prevent the current user from knowing he is being photographed”;
  • The system can record the user’s voice, whether or not a phone call is even being made;
  • The system can determine the user’s unique individual heartbeat “signature”;
  • To determine if the device has been hacked, the device can watch for “a sudden increase in memory usage of the electronic device”;
  • The user’s “Internet activity can be monitored or any communication packets that are served to the electronic device can be recorded”; and
  • The device can take a photograph of the surrounding location to determine where it is being used.

In other words, Apple will know who you are, where you are, and what you are doing and saying and even how fast your heart is beating. In some embodiments of Apple’s “invention,” this information “can be gathered every time the electronic device is turned on, unlocked, or used.” When an “unauthorized use” is detected, Apple can contact a “responsible party.” A “responsible party” may be the device’s owner, it may also be “proper authorities or the police.” source – EFF.org 

Mark of the beast in your money:
420 banks demand 1-world currency

“The Institute of International Finance, a group that represents 420 of the world’s largest banks and finance houses, has issued yet another call for a one-world global currency, Jerome Corsi’s Red Alert reports. “A core group of the world’s leading economies need to come together and hammer out an understanding,” Charles Dallara, the Institute of International Finance’s managing director, told the Financial Times. An IIF policy letter authored by Dallara and dated Oct. 4 made clear that global currency coordination was needed, in the group’s view, to prevent a looming currency war.The narrowly focused unilateral and bilateral policy actions seen in recent months – including many proposed and actual measures on trade, currency intervention and monetary policy – have contributed to worsening underlying macroeconomic imbalances,” Dallara wrote. “They have also led to growing protectionist pressures as countries scramble for export markets as a source of growth.” Dallard encouraged a return to the G-20 commitment to utilize International Monetary Fund special drawing rights to create an international one-world currency alternative to the U.S. dollar as a new standard of foreign-exchange reserves. ” source – WND

RFID Tracking devices used in school badges, the mark of the beast

Radio frequency identification – the same technology used to monitor cattle – is tracking students in the Spring and Santa Fe school districts. Identification badges for some students in both school districts now include tracking devices that allow campus administrators to keep tabs on students’ whereabouts on campus. School leaders say the devices improve security and increase attendance rates. “It’s a wonderful asset,” said Veronica Vijil, principal of Bailey Middle School in Spring, one of the campuses that introduced the high-tech badges this fall.


Seventh-grader Samantha Seger shows her ID badge, which Brittan School uses to monitor students’ movements on
campus. Chronicle photo by Lacy Atkins Credit: LACY ATKINS.

Mark of the beast? You bet’cha

But some parents and privacy advocates question whether the technology could have unintended consequences. The tags remind them of George Orwell’s Big Brother, and they worry that hackers could figure a way to track students after they leave school.” source – Houston Chronicle

Mark of the beast everywhere:
Every email, cell phone call and website to be stored by government in UK

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to “end the storage of internet and email records without good reason”. Any suggestion of a central “super database” has been ruled out but the plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism.” source – Telegraph UK 

Mark of the beast in medicine:
Novartis Pharmaceuticals to launch ‘smart pill’ with embedded chip

(Reuters) – Novartis AG plans to seek regulatory approval within 18 months for a pioneering tablet containing an embedded microchip, bringing the concept of “smart-pill” technology a step closer. The initial program will use one of the Swiss firm’s established drugs taken by transplant patients to avoid organ rejection. But Trevor Mundel, global head of development, believes the concept can be applied to many other pills. “We are taking forward this transplant drug with a chip and we hope within the next 18 months to have something that we will be able to submit to the regulators, at least in Europe,” Mundel told the Reuters Health Summit in New York. “I see the promise as going much beyond that,” he added.” source – Reuters 

Mark of the beast in your pizza:
The Big Brother Pizza Shop

This is a humorous take on a very serious topic – the coming One World Government and the Mark of the Beast which will control the lives of every man, woman and child on the face of the earth.

http://vimeo.com/32381522

Mark of the beast in your face:
NYPD Commences Use Of Iris Scans Of Suspects

NEW YORK (AP) — Along with fingerprints and mug shots, the New York City Police Department is now taking photographs of the irises of crime suspects. The NYPD says the images will be used to help avoid cases of mistaken identity. The process takes about five seconds. Every suspect will be scanned again using a handheld device shortly before they are arraigned to make sure the irises match. Police say the software, handheld device and cameras cost about $23,800 each, and 21 systems will be used around the city. Central booking in Manhattan started taking photos Monday. The devices will be in use in Brooklyn and the Bronx in the upcoming weeks, and later in Staten Island and Queens. Police say the photos cause no damage to the eye. source – CBS Local NYC 

Mark of the beast in your iPhone:
iPhone and Android Apps Breach Privacy

Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner’s real name–even a unique ID number that can never be changed or turned off. These phones don’t keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found. An examination of 101 popular smartphone “apps”–games and other software applications for iPhone and Android phones–showed that 56 transmitted the phone’s unique device ID to other companies without users’ awareness or consent. Forty-seven apps transmitted the phone’s location in some way. Five sent age, gender and other personal details to outsiders. Among the apps tested, the iPhone apps transmitted more data than the apps on phones using Google Inc.’s Android operating system. Because of the test’s size, it’s not known if the pattern holds among the hundreds of thousands of apps available. Apps sharing the most information included TextPlus 4, a popular iPhone app for text messaging. It sent the phone’s unique ID number to eight ad companies and the phone’s zip code, along with the user’s age and gender, to two of them. Both the Android and iPhone versions of Pandora, a popular music app, sent age, gender, location and phone identifiers to various ad networks. iPhone and Android versions of a game called Paper Toss–players try to throw paper wads into a trash can–each sent the phone’s ID number to at least five ad companies. Grindr, an iPhone app for meeting gay men, sent gender, location and phone ID to three ad companies. source – Fox News

The app that can read your mind: iPhone brainwave detector arrives
It’s a device that would be more at home on the set of a Star Wars movie than the streets of Britain. But an iPhone application has been developed that can read minds. The XWave allows users to control on-screen objects with their minds as well as train their brains to control attention spans and relaxation levels.

 

The device – that could confuse Luke Skywalker himself – is the latest in the field of emerging mind-controlled games and devices and works via a headset strapped around the user’s forehead, plugging into the iPhone jack. A state-of-the-art sensor within the device can then read the user’s brainwaves through the skull, converting them into digital signals before displaying them in various colours on the iPhone screen. And as the mind focuses on a particular task the graphics change, indicating the user’s level of concentration or relaxation. The high-tech sensor was developed by innovations giant PLX Devices using technology that has for years been used by doctors to treat epilepsy and seizures in patients. Brain train: As the mind focuses on a particular task the graphics change, indicating the user’s level of concentration or relaxation But PLX Devices founder and CEO Paul Lowchareonkul said it was a matter of time before such contraptions entered the mainstream. source – Daily Mail UK


 

Mark of the beast, bringing the image to life
Apple patent reveals plans for holographic display

“And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.” Revelation 13:15

A recently granted patent reveals that Apple, the company behind the iPod and iPhone, has been working on a new type of display screen that produces three dimensional and even holographic images without the need for glasses. The technology could be used to produce a new generation of televisions, computer monitors and cinema screens that would provide viewers with a more realistic experience. The system relies upon a special screen that is dotted with tiny pixel-sized domes that deflect images taken from slightly different angles into the right and left eye of the viewer. By presenting images taken from slightly different angles to the right and left eye, this creates a stereoscopic image that the brain interprets as three-dimensional. Apple also proposes using 3D imaging technology to track the movements of multiple viewers and the positions of their eyes so that the direction the image is deflected by the screen can be subtly adjusted to ensure the picture remains sharp and in 3D. source – Telegraph UK

Mark of the beast on ID cards
Mexico to pioneer iris technology on ID cards

Mexico will on Monday become the first country to start using iris scans for identity cards, according to the government, which claims the scheme will be highly secure. “The legal, technical and financial conditions are ready to start the process of issuing this identity document,” Felipe Zamora, responsible for legal affairs at the Mexican Interior Ministry, told journalists Thursday. The documents, which will include the eye’s image as well as fingerprints, a photo and signature, will be 99 percent reliable, Zamora said. Critics, including the National Human Rights Commission, have slammed the system, expressing concern that compiling personal data could violate individual rights. The move will be introduced gradually, with some 28 million minors taking part in a first two-year stage, due to cost 25 million dollars. The cards are due to start for adults from 2013. Iris recognition is increasingly used in airports, controlling access to restricted areas, and prisoner booking and release. source – Brietbart

 


 

The Mark of the Beast

Now you know what the mark of the beast is, and how society is rushing headlong into it’s date
with the antichrist. If the day comes when you are asked to choose whether or not you will be
implanted with a chip, you know what your answer should be. No. This is not a game, and it is not
some science-fiction story. The mark of the beast is real. The mark of the beast is happening. The mark of the beast is fulfillment of bible prophecy, and cannot be stopped. But there is one thing you can do…

Don’t take it.

Click here to read John McTernan’s excellent article on The 666 Surveillance System

Mark of the Beast Updates Page: Click here

The Mark of the Beast as found in bible prophecy.

SOURCE: http://nowtheendbegins.com/pages/mark_of_the_beast/markOF_theBEAST.htm

US Space Command: The Proof is in the Patches

US Space Command: The Proof is in the Patches

Written by David Wilcock

As you may already know, I have been fortunate enough to interact with multiple witnesses who have worked in various levels of the UFO cover-up — some at levels significantly above the need-to-know basis of the President of the United States.

When you speak with the top-level insiders in the black-ops community, you often hear them mention THE RULES.

These projects are so compartmentalized that only the high-level people are even aware that THE RULES exist — or of how far-reaching they are.

It has taken me years of interviews to explore and unravel this strange subject — particularly because of the potential for confusion.

Sometimes, when insiders talk about THE RULES, they are talking about guidelines their own group insists they follow — such as secrets they must keep, disinformation they are expected to pass along, who gets to know how much, what mistakes are bad enough to get you killed, et cetera.

However, over the course of many conversations, I increasingly realized there was another level of THE RULES — a level they have absolutely no control over.


WHAT ARE “THE RULES”?

In this greater cosmic sense, THE RULES are a set of principles that the insider black-ops community has felt, for at least the past century, were as fixed and unchangeable as the Universe itself.

They also believed THE RULES would continue, unaltered, for millions of years. Apparently they have time-viewing technology that led them to believe this was the case.

The idea that this was a manipulated timeline, and not necessarily the real future, was far too mind-blowing for them to ever consider — particularly since you have people living within these timelines, and you can go and visit them and live there yourself.

Nonetheless, all ETs visiting the Earth must operate within THE RULES. It is impossible for them not to.


WHO MAKES “THE RULES?”

One day, only a few weeks ago, I finally got smart enough to bluntly ask one of my main contacts, “Who makes THE RULES?”

The reply was: “Who makes gravity? Who makes the sun rise and set? Who makes the Galaxy spin?

“We don’t know who makes THE RULES, David, but we have no choice but to follow them. There is no workaround. There is no other way. That’s why they’re THE RULES.”

This is a strange subject, and will undoubtedly lead to some folks laughing and thinking I’m crazy… but this is what you hear about when you talk to these insiders yourself.

At the highest levels of the UFO cover-up, it is well-understood that events on Earth, and indeed throughout the inhabited galaxy, are being managed and controlled — by unseen forces.

Some things are allowed to happen… and others are not.

 

THE ‘QUARANTINE’

As one key example of THE RULES, our Earth is under a ‘Quarantine’ that prevents most ETs from being able to enter our airspace in a way that would be visible to the naked eye — except in rare, unpredictable and brief bursts of time.

This is the main reason why we don’t see more visible UFOs — particularly in the case of negatively-oriented ETs. In fact, without this Quarantine, negative ETs would have invaded and taken over this planet eons ago.

This Quarantine also appears to allow those planetary controllers here on Earth to do whatever they want. Or so they thought.

The Quarantine is maintained by a vast network of super-advanced, indestructible satellites surrounding the Earth — built by very high-level ETs. These satellites keep humanity locked in — and everyone else locked out.

The insiders do not know who built these satellites, nor precisely why they are there. It’s simply another part of THE RULES.

When you view the patches of US Space Command or Navy Space Command, they picture the Earth surrounded by two circles, similar to the typical depiction of electron orbitals around an atom.

This symbolizes the Quarantine — which protects us from the bad guys.

 

LET’S SEE SOME PATCHES

On this official military website, you can find a patch commemorating the 25th anniversary of Air Force Space Command — from 1982 to 2007. You can see the two rings around the Earth clearly depicted, as well as a stylized image of a back-engineered ET spacecraft in flight:

air-force-space-command-25th-anniversary

 

From what I’ve heard, these triangular craft are enormous in size — taking quite some time to walk from one end to the other — and are already in operation throughout the galaxy. The shape you see in these emblems is almost exactly what they look like.

There is an official website you can visit for the Naval Space Command and the US Space Command. There is also a Wikipedia page for the US Space Command, linked from an even more detailed Unified Combatant Command page.

UNITED STATES SPACE COMMAND

If you read this US Space Command page, you will find very specific information about who was in charge, when they were in charge, and what they allegedly were up to… and it includes the following emblem, featuring the rings I’m talking about:

united_states_space_command_emblem

Notice the crosses on each of the rings. We’ll get back to that in a minute.

You can also read about US Space Command in this article on Space.com — in an interview with Gene McCall, chief scientist for the Air Force Space Command. Naturally, the article attempts to put a mundane spin on the story and does not include any real ‘juice’ of Disclosure.

AIR FORCE SPACE COMMAND

You again see the rings around the Earth in the Air Force Space Command patch. This was originally featured on the official Air Force Space Command website, which has since been taken down.

However, at this website, there is a comprehensive series of mirrored links to what was originally on these official websites — along with the now-defunct links. I suggest saving your own copy in case it gets taken down.

When you go to this mirror site and sort through the images and text, this triangular metallic flying machine image appears over and over again on various badges and emblems — along with the two “quarantine rings”:

airforce_spacecommand

 

Also, again notice the two crosses on either side of the delta-shaped spacecraft — crosses that directly contact the rings.

These, I believe, are meant to be Knights Templar crosses.

 

THE “KNIGHTS TEMPORAL”

In a Project Camelot interview, Gordon Novel revealed that these insiders like to refer to themselves as the Knights Temporal:

http://www.projectcamelot.org/lang/en/gordon_novel_interview_transcript_en.html

K: When you say “we,” who’s we?

The Knights Temporal

G: Well, I have a group of folks that I call the Knights Temporal.

The most prominent aerospace engineers and physicists in the world today are all part of a team we call the RAM group. We call ourselves the Knights Temporal.

We took a page out of the idea of the Templars, who basically blackmailed the Pope to give them the fiefdoms over Europe. They created the banking orders we have today.

Since we believe the technology is rooted in time, we call ourselves the Knights Temporal. The alien technology, the UFO, is basically a flying time machine. That’s what we believe, and it’s all we know about it.

What Novel does not say here is that these international bankers did not merely “take a page out of the idea of the Templars.” These groups are the direct descendants of the Knight Templars — and have still kept all their secrets.

 

NAVAL SPACE COMMAND

The same two “quarantine rings” appear in the emblem for the Naval Space Command, also mirrored at the above site:

naval_spacecommand

 

“TOP HAND” AT VANDENBURG AFB

This next patch can be found on the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see a cross on one of the Earth’s protective rings. The sword, as we shall see, appears to be a Knight Templar blade.

With the line “Strengthen the Shield,” there is a clear implication here that the two rings around the Earth could be some sort of ‘shield’ that we want to make sure stays strong.

Further, there is the suggestion that this shield may be at least partially enforced by that same weird delta-shaped craft:

top-hand-sharpen-the-sword-strengthen-the-shield

 

AFSST 76TH SPACE OPS

Also check out this “AFSST 76th Space Ops” patch from the same site — the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see one of the “quarantine rings” as well as the same flying metallic triangle — this time with wings around it just in case you didn’t get the point that it flies.

Two smaller delta-shaped craft also flank the AFSST acronym at the bottom:

afsst-mission-complete

Here’s a shot of the original Strategic Air Command page in case it disappears. Notice the Knight Templar glove holding lightning bolts in the insignia at the top left:

strategic-air-command-patches

JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE

The “quarantine rings” and flying metallic triangles show up again in the emblem for the Joint Functional Component Command for Space, which has its own official Wikipedia page here:

uss-stratcom-jffcc-space

As it says on the Wikipedia page, according to Lieutenant General William L. Shelton, “Our prime mission directive in JFCC SPACE is to ensure our freedom of action in space, while preventing adversary use of space against us.”

 

SCHRIEVER AIR FORCE BASE

These badges from Schriever Air Force Base follow the same theme — quarantine rings and peculiar aircraft operating far outside the Earth’s atmosphere.

Notice the difference in size between the small black delta-shaped craft and the larger metallic delta-shaped craft in the first badge below.

That size difference may not be an indication that one is closer than the other — it may acutally be a direct indication of how huge the larger craft is in comparison to the black one:

space-test-experimentation-space-test-squadron

This next badge is particularly interesting because of the emblem that appears at the bottom:

usaf-history-heritage

I have been told this Pegasus “Master of Space” logo is worn by staff who have direct, high-level involvement with extraterrestrial human civilizations — typically those working for Space Command.

The Pegasus legend of the ‘winged horse’, used by the Gods to travel in Greek mythology, may well indicate some sort of extraterrestrial craft.

This follows the same chain of reasoning presented in Episode Two of this season’s Ancient Aliens on History Channel, which I am a repeat participant in.

 

THIRD PAGE OF BADGES FROM SCHRIEVER AFB

There are so many goodies on the third page of badges from the Schriever AFB site — delta craft, Templar swords, Templar gloves, quarantine rings, et cetera — that I had to just post the whole thing:

military-space-patches-1

There are many, many indications of the Knight Templars here — and indeed, many insiders have said the Air Force is much more involved in the UFO cover-up than other organizations.

You probably caught the Masonic compass in the image on the bottom right. There is a Templar glove below it holding a sword of fire.

I was particularly fascinated by the Templar Knight gloves that had a mysterious energetic force coming off of them on the 310th Communications Flight badge — suggesting the mastery of hidden Universal powers:

310_communications_flight

 

FOURTH PAGE OF SCHRIEVER AFB BADGES

The fourth page of badges from the Schriever AFB contains additional enigmas — including a straight-ahead Templar skull and crossbones symbol:

military-space-patches-4


The 50th Contracting Squadron badge at the top left may be a nod to the fact that human beings appear all over the galaxy — hence we see the image of a human body away from the Earth, and the Pegasus logo alongside it.

The 50th Space Communications Squadron badge at the top right has the Templar glove, again with the suggestion of a “Thunderbolt” coming out of it.

According to the second episode of this season’s Ancient Aliens, which I did plenty of research for but didn’t get in fast enough to make the cut, the many ancient ‘Thunderbolt’ legends appear to refer back to a working ET weapon that was used in historic times.

Such a weapon then later became mythologized in such stories as Zeus’ Thunderbolt, Thor’s Hammer, Odin’s Spear, Poseidon’s Trident, Vajra’s Spear, et cetera.

 

THOUGHTFORM ENTITIES AND PROTECTING EARTH

The nasty-looking hooded being on the 23D Space Operations HQ badge, second over from the bottom left, clearly seems to represent the “Thoughtform Entities” I have been told these guardians of Earth are actively defending us against.

Notice the being has at least two faces — one made by the two winglike eyes in the middle, and another in profile view on the left-hand side, where a pointy nose, brow and chin are all clearly visible.

The rear of the head, in profile view, suggests pointy ears. I have indeed heard from an insider, recently, that at least one ET group does in fact have pointy ears — and looks very similar to certain ‘gargoyle’ faces we see on many Templar-designed buildings.

23d-space-operations-squadron-semper-vigilans

Whether you agree with what they’re doing or not, the people I speak to are absolutely convinced that the Earth would be much worse off if they were not doing their jobs.

This desire to protect humanity from outside negative forces is a strong rationale for why they continue to stay involved in these jobs, even though there are many questionable ethics involved.

It is certainly interesting to see a hooded being looming over the Earth on a badge dedicated to “space operations.”

FIFTH PAGE OF BADGES FROM SCHRIEVER AFB

The fifth and final page of badges from Schriever AFB has even more goodies. First, here’s the full view:

military-space-patches-2


Notice the two stylized birds flanking the star on the bottom-center image. They most definitely appear to be depictions of the Phoenix.

What better symbol to choose if you’re describing a journey through a stargate — where you appear to ‘die’ and dematerialize on one end, only to be ‘reborn’ from the other?

As you’ll see in a minute, this was the original Air Force logo!

Now let’s explore some more of these images in detail.

THE STARGATE

First of all, as we see below in its larger form, we have a badge that may very well be showing us a pentagonal Stargate vortex emerging from the Northwest United States:

21st-space-operations-sq-gateway-to-the-stars

More than one insider has told me that the ‘ancient’ stargates look like tunnels lined with individual points of light, in a clear geometric relationship to each other, and which spiral in on themselves as you look more deeply into the wormhole.

The points of light may very well be in a pentagonal relationship to each other along the circumference of the circle, though no one has told me this. I also never thought to ask until now — but it may very well be.

A slight hint of this stargate pattern appears in the movie Minority Report, when you look off to the right in this particular shot:

minority_report_interface

Getting back to this 21st Space Operations badge, it even features the words ‘gate’ and ‘star’ right in the description — Gateway to the Stars.

 

IS THE AIR FORCE LOGO PARTLY INTENDED TO DEPICT A STARGATE?

The five-pointed star with a circle inside of it is a common feature of the basic Air Force badge, which went through two different stages of development. This is apparently another homage to the stargates or ‘portals’ being used at the insider levels.

I already pointed out the original Air Force logo, where the pentagon is flanked with stylized Phoenix birds on either side. This logo then went through an evolution into its current form, as these images depict:

new_af_aaf

aflogo_history

air_force_logo

 

 

WHAT TYPE OF AIR TRAFFIC ARE THEY CONTROLLING?

Check this one out from the Air Force Communicators and Air Traffic Controllers Association.

In the center you have the pentagonal Air Force / stargate logo — flanked with the Phoenix birds of fire.

Then you’ve got a jet on the right and “something else” on the left — our delta-shaped craft once again — protecting a triangular-shaped Earth in the same ‘quarantine loops’ I’ve been showing you:

warfighting-integration-chief-information-officer

The triangle shape appears to indicate the tetrahedral energy signatures that run through the Earth and other planets, as Richard C. Hoagland has been asserting since at least 1993.

The tetrahedral energy appears at the 19.5-degree latitude, north or south, on any given planet.

On solid planets it emerges as volcanoes, such as Hawaii on Earth and the enormous Olympus Mons on Mars.

On gas planets we have the Great Red Spot of Jupiter, the Great Dark Spot of Neptune, cloud bands on Saturn, et cetera — all at the magic 19.5-degree latitude.

 

DEFENDERS OF THE DOMAIN

One of the most compelling pieces from Schriever AFB is this next badge below.

Here, we see a simplified but undeniable diagram of the Global Grid I have written about for so many years.

The real Grid is not made of a square pattern like this, but is otherwise extremely similar — including the spherical ‘nodes’ where the lines cross.

We also see a Knight Templar in full royal regalia:

schriever_defenders-information-assurance

Even the clovers carved into the knight’s mask are obvious, stylized versions of the Templar cross:

information-awareness-close

 

THE NORAD LOGO

The official NORAD logo (NORth American Aerospace Defense command) also contains the ‘quarantine loops’ around the Earth.

This time the loops appear stylized as wings — and we also see the Templar sword with stylized ‘thunderbolts’ coming off of it:

north_american_aerospace_defense_command

 

310TH SPACE WING

More goodies can be found on the official page for the 310th Space Wing:

310-space-wing-division

This next badge from the above website caught my eye in particular.

It is a seemingly earlier version of the same 310th Communications Flight badge I showed you before. Again we see the delta-shaped craft and the Earth with quarantine rings in the middle.

We also prominently see the knights’ gloves with thunderbolts coming off of the fingers.

Again, this badge suggests the Templar Knights may have possessed mystical capabilities to manipulate energy — either by thought alone, or with some form of ‘thunderbolt’ technology, as we see in many ancient myths:

310_communications

310_flight_text

PLENTY OF EVIDENCE

Of course, none of this is absolutely conclusive proof that there is any off-planet work going on within Space Command, nor that they have access to stargate ‘portal’ technology or interstellar delta-shaped craft.

However, I have spoken to several different insiders who have given me various pieces of this puzzle — and they all fit together very well.

When independent witnesses keep telling you the same things, you start paying attention.

It is highly, highly interesting that we see so much redundancy in the symbolism of these various military badges — over and over again. I’ve only given you a brief sample of what you can uncover with your own research.

 


THE QUARANTINE DROPS AFTER 2012

Everyone ‘in the know’ is well aware of THE RULES, and the Quarantine that exists around the Earth.

Apparently you can’t just fly a ship out of Earth’s atmosphere without opening a hole in the Quarantine first. This had to be done for all the Apollo missions, I am told, as otherwise they would have never made it out of here alive.

The ETs that have been working with the US and other governments for the past century apparently possess technology that allows for short-term openings to be made in the Quarantine.

Space Command is very glad we have the Quarantine, as it protects us from outside invading forces. When random holes occur, Space Command uses their own ships to further defend the Earth — as their badges indicate.

Another very interesting point I’ve been told is that Space Command and its affiliates have reason to believe the Quarantine will drop some time after 2012. This is a significant part of the transformation we are now going through.

At this point, the Earth will enter into open contact with its ET neighbors.

There is also the implication or suggestion that the dropping of this Quarantine will also enhance the mystical and psychic abilities of the average person as well.

 

EVERYTHING CAN BE FOUND IN “THE LAW OF ONE”

The ‘Quarantine’ is one of a variety of very specific data points that were revealed in the Law of One series, most of which came through in 1981 to Don Elkins, Carla Rueckert and Jim McCarty of L/L Research.

The best way to introduce yourself to this staggeringly complex body of information — all of which is now free to read online — is to consult the Study Guide I have posted at this site. I highly recommend you explore this research, and feel it is one of the best possible uses of your time.

I have pointed out to several insiders now that everything they’re telling me — all the most significant data points — can be found in this one series from 1981.

I consistently urge that they read it, as they would be shocked to discover how well the material lines up with what they already know.

However, everyone is ‘too busy’ — and the big discovery still remains waiting in the wings.


LAW OF ONE ON THE ‘QUARANTINE’

If you feel you have the time, here’s a full list of all the places where the ‘quarantine’ is discussed in the Law of One series — and it is a fascinating read:

http://lawofone.info/results.php?search_string=quarantine&search_type=any&numeric_order=1&ss=1&sc=0

These two sets of quotes from Sessions Six and Twelve really stand out for me:

6.25 Questioner: Do any of the [positive Confederation ETs] come here at this time in spacecraft? In the past, say, thirty years?

Ra: I am Ra. We must state that this information is unimportant. If you will understand this, we feel that the information may be acceptably offered. The Law of One is what we are here to express. However, we will speak upon this subject.

Each planetary entity which wishes to appear within your third-dimensional space/time distortion requests permission to break quarantine, as you may call it, and appear to your peoples.

The reason and purpose for this appearance is understood, and either accepted or rejected. There have been as many as fifteen of the Confederation entities in your skies at any one time; the others available to you through thought.

At present [1981] there are seven which are operating with craft in your density.

Their purposes are very simple: to allow those entities of your planet to become aware of infinity, which is often best expressed to the uninformed as the mysterious or unknown.

 

12.3 Questioner: Is there any effort on the part of the Confederation to stop the Orion chariots [piloted by negative, “service to self” ETs] from arriving here?

Ra: I am Ra. Every effort is made to quarantine this planet.

However, the network of guardians, much like any other pattern of patrols on whatever level, does not hinder each and every entity from penetrating quarantine — for if a request is made in light/love, the Law of One will be met with acquiescence.

If the request is not made, due to the slipping through the net, then there is penetration of this net.

12.5 Questioner: I don’t understand how the Confederation stops the Orion chariots from coming through the quarantine?

Ra: I am Ra. There is contact at the level of light-form or lightbody-being, depending upon the vibratory level of the guardian.

These guardians sweep reaches of your Earth’s energy fields to be aware of any entities approaching. [DW: The satellites I have heard about from the insiders appear to be the automated detection system that alerts these ‘Guardians’.]

An entity which is approaching is hailed in the name of the One Creator.

Any entity thus hailed is bathed in love/light, and will of free will obey the quarantine due to the power of the Law of One.

12.6 Questioner: What would happen to the entity if he did not obey the quarantine after being hailed?

Ra: I am Ra. To not obey quarantine after being hailed on the level of which we speak would be equivalent to your not stopping upon walking into a solid brick wall.

12.7 Questioner: What would happen to the entity if he did this? What would happen to his chariot?

Ra: I am Ra. The Creator is one being. The vibratory level of those able to breach the quarantine boundaries is such that upon seeing the love/light net it is impossible to break this Law.

Therefore, nothing happens. No attempt is made. There is no confrontation.

The only beings who are able to penetrate the quarantine are those who discover windows or distortions in the space/time continua surrounding your planet’s energy fields.

Through these windows they come. These windows are rare and unpredictable.

 

This is only one of many hundreds of examples where I have found a perfect correspondence between what the top-level insiders tell me and what we find written in the Law of One series.

 

THE ‘QUANTUM LEAP’

I have worked for years to flesh out the Law of One’s cosmology into a scientific thesis — with stunning results, as you can find in my videos, conferences, radio shows, articles and books.

A window of 2011 to 2013 was given in the Law of One series as a time where a ‘quantum leap’ would occur in Earth’s history, propelling us into an amazingly beautiful new Golden Age.

Once this shift fully takes place — which may involve 100 to 700 years for the full transition to complete — the average human being will have all the abilities attributed to Jesus and other ‘Ascended Masters’ — and more.

Even though it may take some time for this transformation to occur, there is no question that the initial ‘quantum leap’ in 2011-2013 is something absolutely remarkable, breathtaking and unprecedented in Earth’s history.


A GALACTIC TRANSFORMATION

This ‘quantum leap’ is the result of our Solar System traversing into a more highly-charged region of the galaxy — wherein the actual physics of matter, energy and consciousness irreversibly shift.

This galactic transformation propels the Earth into an energetic state called ‘Fourth Density’ — as opposed to our current ‘third.’

These same energy states appear in the human body as the seven chakras. They also constitute what most people mistakenly call “dimensional levels”, which apparently exist as planes of existence throughout the entire Universe.

The shift into fourth-density is essentially a graduation from the yellow, self-oriented center to the green, heart-oriented perspective.

No mention of the Mayan Calendar ever occurred in The Law of One, as Dr. Don Elkins knew nothing about it — nor the importance of the 2012 date in many ancient prophecies.

It is highly ironic that the most accurate and comprehensive body of 2012 prophecy information makes no mention of the Mayan Calendar whatsoever… nor any of the other common talking points related to 2012.

 

THE MOST ADVANCED SCIENTIFIC INFORMATION ON EARTH

Obviously, until this shift actually happens, we cannot be certain of what will occur — nor of exactly how it will occur.

Nonetheless, there are hundreds of specific, highly technical scientific data points in the Law of One series that have since been proven correct.

This makes it highly unlikely that the whole model will fall apart when it comes to the Fourth-Density Shift.

I have yet to find a single contradiction or error in the Law of One cosmology. In fact, the more I follow up on the leads we were given, the more advanced and beautifully perfect the model becomes.

I struggled for many years with the frequently-mentioned concept of a parallel universe where time is three-dimensional — but finally this year I solved this greatest of all mysteries, and truly understood how and why it was the key to everything.

My upcoming book The Source Field Investigations — due for release next May — is significantly more evolved than any other presentation I’ve given on this subject.

The CONVERGENCE film script has now been brought fully up to date with these latest breakthroughs as well, and we hope to have a finished draft ready to show directors, actors and investors by early January.

RESEARCH CREDIT:

 

SEE ALSO..

 

Who dumps technology more advanced than NASA on to NASA and thinks nothing of it? This admission of at least this segment of a secretive space program is quite revealing. It will probably slip by mainstream media, but sit up and take notice, this is a serious admission here.

NASA gets two military spy telescopes for astronomy

(Washington Post) The secretive government agency that flies spy satellites has made a stunning gift to NASA: two exquisite telescopes as big and powerful as the Hubble Space Telescope. They’ve never left the ground and are in storage in Rochester, N.Y.

It’s an unusual technology transfer from the military-intelligence space program to the better-known civilian space agency. It could be a boost for NASA’s troubled science program, which is groaning under the budgetary weight of the James Webb Space Telescope, still at least six years from launch.

Or it could be a gift that becomes a burden. NASA isn’t sure it can afford to put even one of the two new telescopes into orbit.

The telescopes were built by private contractors for the National Reconnaissance Office, one of 16 U.S. intelligence agencies. The telescopes have 2.4-meter (7.9-foot) mirrors, just like the Hubble, but they have 100 times the field of view. Their structure is shorter and squatter.

They’re “space qualified,” as NASA puts it, but they’re a long way from being functioning space telescopes. They have no instruments — there are no cameras, for example. More than that, they lack a funded mission and all that entails, such as a scientific program, support staff, data analysis and office space. They will remain in storage while NASA mulls its options.

“It’s great news,” said NASA astrophysics director Paul Hertz. “It’s real hardware, and it’s got really impressive capabilities.”

The announcement Monday raised the obvious question of why the intelligence agency would no longer want, or need, two Hubble-class telescopes. A spokeswoman, Loretta DeSio, provided information sparingly.

“They no longer possessed intelligence-collection uses,” she said of the telescopes.

She confirmed that the hardware represents an upgrade of Hubble’s optical technology.  MORE HERE

Anything fishy here? Two telescopes on mothballs better than Hubble? Are they toying with us? This is just nuts news.

Secret Space Program?

You really think we get the whole story about anything, especially regarding military or technological advancements?

I personally met a man in New Mexico who used to work at the infamous Area 51. You can imagine how I tried to wangle information out of him, but he was tight-lipped. When I came back at him the third time after trying to act indifferent he finally said, “Let’s just put it this way. The stuff I worked on back in the 60′s still hasn’t come out.”

And my impression was he was a low-level tech.

There’s a lot of testimony as well as conjecture about Moon and Mars missions and the like you can read about on line, as well as many other “forbidden” realms of research. That we’re surrounded by technology that far surpasses what has been introduced into the mass mind is a no-brainer, so to speak.

It’s thought that black-op advances are decades if not centuries ahead of “known” technologies.

So What.

These psychos are on a path of self destruction—-hence—psycho-path.  We just don’t want it to be at the expense of the innocent. Nice thing is we can’t be eliminated, we’re multi-dimensional eternal consciousness.

Now THAT has their knickers in a twist!

Be well, be aware. But this tech stuff we do need to keep an eye on to see what these wackos are up to.

Keep on informing, helping others find out who they truly are, and keep the wake up rolling.

Love, Zen

 

The ‘New Berlin’ base: Nazis in the Antarctic

The ‘New Berlin’ base: Nazis in the Antarctic

Update from E.S, a German-speaking researcher, who has been in direct touch with Barabou Vedu, and who has done some excellent work.

Click here

The large document which can be downloaded here (a book of 400 pages, with maps, diagrams, equations, and hand drawings) was sent anonymously, on two disks, to a well-known UFO organization. There is little information about the author, and the material has not been seen before.

The disks were then passed on to a respected German investigator. This person, whom we know well, passed them on to Project Camelot for publication stating that the material might be highly significant.

We do not read German, so we do not know the precise content. But it’s clear that this is extraordinary material. It appears to document extensive, detailed information about a base in Antarctica originally established by the Nazis, advanced physics, mind control, something apparently resembling the ‘Montauk chair’, and alien involvement in the affairs of the human race.

Included in the document are dozens of pages of higher mathematics, apparently detailing the physical theory of interdimensional travel. Whoever assembled this did so with a very great deal of time, trouble and technical knowledge.

The author states he has been a victim of mind control and/or mental illness, and appears to document a bizarre personal journey. But he also certain of what he is reporting. He recounts a large number of very peculiar dreams, but also describes the Antarctic base in detail. Most compelling are the many pages of mathematical physics, which of course cannot be hoaxed.

Strangely, a number of pages which contain the physics have a commentary in imperfect English, as if they have been partially autotranslated. We don’t yet know how this has come about, or if the text was written that way in the original.

Many questions are raised, of course – none the least being how one escapes from Antarctica. But the answers may present themselves to those with the resources to study the document thoroughly.

We intend to get it all translated, which may take time and require professional involvement. We are publishing this immediately because our experience suggests that it is an effective insurance policy not to sit on potentially explosive material privately for too long.

We welcome all and any responses to this, and invite German-speaking researchers and anyone with a knowledge of advanced mathematical physics to contact us privately to discuss the contents. Project Camelot makes no claims for this document, but is publishing it simply because of its potential importance for others to investigate thoroughly.

Click here to download (PDF 18.6 Mb)

_____________________________

German Researcher’s summary

We asked the German researcher to write a summary of the book for the benefit of English-speaking readers:

About the book

I obtained the book from a German UFO society. They had received the book itself (around 400 pages) and two CDs containing the text and several drawings. The envelope had no address on it. However, the postmark reveals that it had been sent from Berlin.

The book was written by “Barabou Vedu in cooperation with R. Eckelt” (both anonymous). The author, Barabou Vedu, claims that his writings are an actual report from his experiences on an old alien base, where he was being kept “somewhere in the eternal ice” until he was 15 years old. He claims that people on the base spoke English and “Indian” language.

About the base

The author says that the base is no longer under extraterrestrial but under human control. He says the reason why there are so many human scientists on the base is because this is a place where many exotic phenomena can be observed, like “vectorial viewing into the future”, “soul travel via machine”, “technical telepathy” or what he calls “eye-movies” (living another’s experiences by proxy).

The author says that the base where he lived it is located not far from another alien base which bears the name “New Berlin”. He suspects that the base where he lived was part of the “New Berlin” base. He describes it as a huge building of glass and plastic, several square kilometers in area. During his stay, he says never left the base physically.

How he left the base

Around the year 1996, the author says that he left the base due to the first signs of schizophrenia; however, he has no conscious memory of how exactly he was “thrown out”. He woke up outside the base in a mountainous area “somewhere in Tajikistan”, where he was welcomed by four Turkish people that he later identified as “one of their criminal mind-control-gangs”. He stayed with them for a while, but then fled and traveled to Germany by train, a trip which took about three weeks. He says that after his arrival in Germany, he was officially accepted as a refugee.

Why he wrote the book

Because of recurring flashbacks, nightmares and “apparent signs of post-traumatic stress”, he was assigned to a psychiatric hospital in May 1998. He says that no-one there would believe any of the stories he had to tell which is why he decided to start lying to the doctors. He eventually managed to discharge himself and decided to confide in a person he trusts, whom he told about his past in order to cope with his fears and nightmares.

It seems that the book is a direct result of these conversations. The author says that it was a good idea to write everything down because it was an effective way to “get rid of everything”. One may suspect that the aforementioned person “R. Eckelt” is the one who gained Barabou’s trust and helped him to write down his memories.

His memories

The author says that he and the other humans on the base followed a schedule. They received their food from a tube which came out of the wall. He describes it as a kind of “brown paste”, which tasted like fruit. In order to receive food, they were obliged to follow certain tasks for which they received “bonus points”. Not fulfilling a task resulted in receiving no points, and therefore no food.

One of the main tasks that he and the other humans had was to “follow the thought structures of humans outside the base”, using a technology he calls the “Bereschewan-seat”. The seat itself is described as far too small for a human being – it seems to have been created for beings with another anatomy.

In order to use the seat, the author says they had to put on a specific suit with a cable which ended in a machine. Using the seat, it was apparently possible to see and feel the world outside as if one would experience it with one’s own senses (sight, smell, sound, touch etc). The author says that he was eventually obliged to draw what he saw. Sometimes he was ordered to distract people outside the base from their original thoughts and to “implant” different, more violent thoughts. The author furthermore suggests that this manipulation has been going on for a long time – and probably from the future.

The author says that among the humans, there were also other beings present on the base. He refers to them as “Lemurs” – reddish, greenish robots which he suspects are inhabited by human souls who failed to accomplish their tasks. Another type of being mentioned is described as small and humanoid in appearance with brown, hairless skin. Humans living on the base worshipped them, considering them to be “Gods”. In one part of the book, the author describes how he once saw one of these brown beings sitting perfectly at ease on the Bereschewan seat, a detail which suggests that the seat was their technology.

I have only read, in detail, a quarter of the book so far. There are many more things in the book which are not described in this summary.

A glance at the text

The book is almost entirely written in German, although some paragraphs are written in bad English and seem to have been translated either by a German-speaking person or by an automatic translator. As for consistency of the content, no apparent contradictions can be observed. On the contrary, throughout the book, the author keeps relating again and again to details he has already mentioned before.

There is one chapter which contains numerous formulae and diagrams about what the author describes as “Our theory of everything”. This complex mathematical physics seems to describe an advanced model of a multidimensional universe, and how to travel through it. He states that investigating these formulas might prove the authenticity of his claims, but possibly only “in 20 or 30 years from now”.

First steps undertaken so far

A very experienced remote viewer has been asked to assist to give an opinion on the book’s authenticity. One initial session has been done so far and more are planned.

Recommendations

A complete translation into English would be advisable so that researchers from around the world can investigate this independently. The book is obviously linked to the persistent reports that Hitler discovered an alien base in Antarctica and went there before the end of World War II. Therefore a thorough investigation of parallels between the book and existing Alien-Nazi-Antarctica research seems to be a good idea.

_____________________________

Theoretical physicist’s summary

We asked a theoretical physicist if he would comment on the mathematical physics section of the book. He is a respected academic with a Ph.D. in Theoretical Physics (quantum mechanics, electrodynamics and relativity) and over 200 international scientific publications in journals from several countries. His first language is not English, but his English is nonetheless excellent.

1. The mathematics is genuine. The education level of the author would have to be Ph.D.

2. It is a model. In Physics we have many models, and we must consider them all with respect if they don’t lead to experimental contradictions.

3. For example, String Theory is a model. Some people accept it, and others (such as Roger Penrose) do not believe in Strings. But the final word is in the experiment.

4. This presents a Photon Model which reproduces known results in Physics, but it also admits (which is important) the involvement of the Ether. In my personal opinion: Current Physics will advance if it accepts the existence of the Ether.

5. This is an innovative model… and in a few aspects it reminds me of extensions from other models (for example, Tewari’s model for the electron).

6. The ‘Ghost-balls’ remind me of some of Tesla’s experiments.

7. It employs 5 and/or 6 dimensions, which is normal in Physics. For example, the Kaluza-Klein Theory uses a 5-dimensional space.

In summary: the model presented in this material has genuine ideas and mathematics. Separately from that, it may or may not be successful in describing Nature. If this material is rejected, then one must reject many, many similar scientific papers that each day are published in the Journals of Physics.

_____________________________

David Wilcock’s Analysis

January 22, 2008

Hey guys,

You can publish this if you like.

I took a VERY detailed line-by-line look at this PDF. You didn’t mention the fact that almost all the illustrations are captioned in English, not in German. We need to get this text translated into English as soon as possible.

In my professional estimation this is a very substantial move forward in disclosure. There’s no telling whether the author’s dreams have any impact other than for his own subconscious symbol set – and it does appear that at least a third of the book’s content goes into various pieces of dream data.

Nonetheless, there are MANY correlations with other pieces of data. You look at the testimony in the black-ops marked-up version of Morris Jessup’s “Case for the UFO” – from Carlos Allende and two other insiders – and you see this ongoing discussion of the “S-M”, which apparently are the “Space Men,” and the “L-M,” which apparently are the Little Men / Lemurian-Men. I’ve already started writing about this on my website.

Here is Part Three of the article series where I began tackling this:

New Philadelphia Experiment Revelations, Part III

Here is Part One if you want to read it sequentially, as it goes into the Rainbow Project (Philadelphia Ex) and the new things I’ve learned about it recently… followed by a link to the marked-up version of the Case book:

New Philadelphia Experiment, Part I

You will notice that the physics model I begin outlining in Part One of this article series, New Philadelphia Experiment Revelations, is very, very similar to what we hear at the end of this book from an alleged German insider witness.

The data about “Lemurs” in this German witness’ book has many strong correlations with the data I’ve been gathering about the alleged Lemurians… enough so that they appear to be one and the same thing.

The excerpts from Allende et al’s liner notes of Case for the UFO appear to be describing, in part, a war that occurred between a terrestrial ET species centered in the Pacific – i.e. the Lemurians – and a non-terrestrial invading species which is very likely the Anunnaki, or what they refer to in code as only the S-M, or “Space-Men.”

It is entirely likely that while most of humanity was in a primitive state, at least one ET race was able to colonize the planet, and may also have interbred with native humans to some degree. It is also possible that evolution proceeded along parallel tracks on Earth, and the “Lemurians” are a particular strain of human being that advanced far more quickly and was driven into hiding due to a still-ongoing war with the so-called Anunnaki.

It seems clear from the testimony in Case for the UFO that there were wars where the Anunnaki harvested asteroids, using powerful gravity-control technologies, and fired them at Lemurian cities with devastating effects. This is apparently what forced them to take refuge into undersea bases, where they still reside to this day.

It is likely that a more informed review of the Sumerian texts would tease out the details of this war, since someone like Sitchin might not understand all of it without the proper context.

It is also quite possible, given Burisch’s testimony, that the “Lemurians” are actually travelers from one aspect of humanity’s future, as he has repeatedly described – and attempted to colonize the Earth at a time when humans of the era posed no threat, only to find themselves embroiled in a major war with an opposing ET faction.

Allende et al’s testimony in “Case” further correlates a variety of UFO sightings with an apparently well-known body of data about these Lemurian craft – including the fact that a form of slag builds up on the exterior of the craft as a result of their encounters with earth materials as they travel, and they have a function where they can slough off this material, which then pours off the craft as a molten liquid. Deacon’s recent testimony also indicates the Anunnaki as an active influence, offhandedly mentioning an “Enki ship.”

I also have a mysterious testimony that came in, via a colleague, from a Russian scientist who quoted a series of books that he claims all have bits and pieces of this story. The basis of the Russian’s story is that a major Lemurian base existed in Antarctica, with the species still living and working there, and the Nazis formed a pact with them during World War II. This completely correlates with what I heard. I have been sitting on this and haven’t even told you about it before, and now we see the same thing in an entirely different form.

I actually bought every book the Russian scientist referred to in his letter but have not yet had the time to study all the references. There are an astonishing number of pieces he brought together in this one letter and I have confirmed that each book has the contents he speaks of – I just haven’t had the time to read them all in total.

I’ve long suspected that more of this Anunnaki-Lemurian war story would come out as new whistleblower testimony came to the fore, and that appears to be what is happening here.

Daniel also said there were Atlantean ruins under the ice in Antarctica, and that the Third Reich migrated to South America after World War II – specifically the southern tip of Brazil. He saw artifacts they gathered from there, implying there must be a base of at least some capacity in Antarctica that we are not normally privy to.

There are a variety of other correlations with things I heard from Daniel’s testimony that are specific and unpublished, things I’ve never gone public with and have not seen elsewhere. These alone would be sufficient to warrant a deeper investigation.

Furthermore, I studied the physics model the German author is giving, since most of it is in English. Again, there are a great deal of correlations with what I’ve heard from Daniel and from another key witness I will call Clark, who I haven’t had reason to discuss before.

These physics correlations are far too specific to be simply a product of chance – including the six-dimensional frame, the toroidal model where our 3D is but the exterior of a “hollow sphere,” and the idea (only implied here) that time-space is the region on the interior of the hollow sphere – the mirror-opposite of our own reference frame.

There is also material in the German text about the interchange of space and time causing volumetric contractions and expansions of time. This is not that far from existing relativity models, but nonetheless the specifics of how he articulates it are very similar to things I’ve heard from Daniel in the past. From what I know of physics equations I’ve seen when studying these alternative models, it does appear to be very well thought out and sound.

There should be utilities out there allowing you to do a fairly decent translation automatically within a PDF file. It’s all the better that the vast majority of the illustrations are already in English. I would consider it highly likely that a substantial percentage of the non-dream portions of this witness’ testimony will turn out to be accurate.

I think it is wise to hold back on the Russian testimony for now until we see if anyone else has correlative data to support this. The inevitable challenge we face is of people who take existing pieces and want to fabricate a story. While this may seem a great way to get your 15 minutes, I consider these hoaxes a spiritual crime, and most of them never make it through the gate anyway.

– David

_____________________________

Preface
Preliminary translation by anonymous translator

Here is the translation. I know that some sentences sound wrong… but they also do in German. This is his style.

I tried to keep the translation as original as possible. [Some notes have been added within the text.]

Regards,
[ ____ ]

Preface (Vorwort)

Hello, my name is Barabou Vedu. I was born in 1983, and until I was 15, I was trapped inside an alien base somewhere in the eternal ice. Beside English, we also spoke Indian in this base. I think in Indian my name means: “May you be his firstborn son of the Moon!” Strange name, isn’t it? Seriously, who would name his son like this? Having such a name, you might as well let yourself be lined up against a wall to be shot. Was this name supposed to just make me furious, or did it have another reason as well? In addition, my father in our base [translator’s note: later he talks about another father who also gives him a Turkish passport] had a similar idiotic name. His name was Hohunarao Vedu. I think this means in Indian: “May you be someone who will be bathed (man of) Moon.” In the world of the symbols in our base, this meant as much as: “Though you are not of pure clear spirit, you deserve to be washed clean with clear pure spirit.” This ritual of the washing clean of one’s own dirty spirit with clean clear spirit could be connected to the common baptism ritual here in the world outside.

My mother in our base also had a very strange name. Her name was Wara, which means in Indian “Swan”, I think. In the world of the symbols in our base, this meant that you belonged to the light blue-green side of the spirit on which all divine entities are at home as well. Alone, my elder brother, eight years older, had a name without a religious background. His name was simply Magba, which means in Indian as much as tenth Moonhouse. I can’t say why they spared him all this religious stuff in his name.

At the start, I spoke about our alien base being a former alien base. By this, I wanted to state that in present time our alien base is not any more under extraterrestrial control, but probably under terrestrial control. The reasons for this are obvious. For example, there were scientists in our base who spend nearly each whole day developing new physical theories. Well, which alien lets his own technologies be examined by terrestrial scientists, so that they can tell him how that works what one has carried around the whole time with oneself? One can be sure that everywhere, where scientists walk around, terrestrial powers have taken the power. So, probably, also in our base.

But in this connection I’d like to mention that the scientists of our base kept the same demonic dressing protocol concerning the choice of their clothes as we did. This protocol stated that the color of one’s clothes must match one’s current emotional state. You wore red in anger, orange in pain, yellow in fear, green in kindness, blue in love and violet in grease [translator’s note: ‘grease’ in German also means to make sure someone else doesn’t get caught while doing something]. The color white could be combined with the colors green and blue, and black with the colors orange and red. The choice of these colors for the corresponding human emotions corresponded to the coloring of their spirit, which changed colors depending on one’s state of mind.

Why so many scientists took care of our base isn’t difficult to guess. A place in which so many exotic phenomena like vector viewing into the future, “soul travel” by machines, technical telepathy, or eye-movies of people could be watched, shouts for a scientific examination. The interesting things the scientists of our base discovered during their examinations, one can readily read in the chapter “Appendix of our physical theories of tomorrow”.

This chapter about our physical theories might be a real treasure trove to physicists with an interest in the Nobel Prize. Those who think highly of themselves, and would like to prove to all of us that alien bases really exist, are free to earn their Nobel Prize at my expense. I think that’s only fair. Because I don’t own these ideas either. And I don’t see why I should take these theories with me to my grave, just because it isn’t yet the right time for these theories.

The ether-theorists of the 19th century were not that wrong in their ideas about the world. But I’m afraid they should have experimented with 4 to 5 dimensional ethers instead of three-dimensional. Because then their physics would have been perhaps a little more successful, and Einstein wouldn’t have blocked the further development of ether-physics by his SRT [Special Relativity Theory]. But that’s a completely different problem.

So what to do to prove that their ether-physics is more correct than our ether-less physics of today? The way it looks, first SRT must go before one can continue with classic ether-physics – the physics of the extraterrestrial? But this is easier said than done. Einstein is an acknowledged expert in physics. To attack him and to claim new experiments about the topic of SRT, is a hard nut to crack for modern physicists. Especially as the disproof of SRT in favor of our 4-dimensional ether-physics indeed needs very demanding experiments for light propagation.

For example, one would have to measure the linear speed of light between two places, without using reflected light. A measurement which unfortunately currently still involves high measuring-errors. But a change from the physics of relativity to the physics of ether-theory includes, as I will show in my report “Their Theories”, great physical discoveries.

Among other things, one can for example prove that the Theory Of All could be a fractal hollow-sphere-model in a 6-fold or 6-dimensional space. In such a fractal hollow-sphere-model of All, the world repeats itself in the micro as well as in the macro, again and again at each level/plane of size. No matter where and no matter in which of these level-sizes one is currently situated, the world always looks the same.

Funnily enough, one can at the same time take this Theory Of All also totally informally to a string theory. Because if the world repeats itself on the level of a universe or of a photon again and again in the micro, then one has automatically contracting since produced by gravitation, fields in a space. Combined with a 4-5 dimensional hollow-sphere form of these fields, the result in a 6-dimensional space with a shifting of space dimensions 1 — 3 to 4 — 6 are contracting strings to expanses in space.

And so we get from the original hollow-sphere-theory an incomplete string theory!

_____________________________

From Thomas Kirschner, editor of the German NEXUS Magazine:

Dear Bill,

Our team here spent a few hours analyzing the document, and I made a few calls to other “well-connected” friends.

It’s probably too early to make a definite assessment, but my general impression is to be careful.

This document consists of two parts: 95% of it is a fantastic story, and my own judgment is that it isn’t more than that. I could be wrong, of course, and some of my friends disagreed with me. Still, I would advise everybody to be extremely cautious. Besides that, this part of the book doesn’t really contain much useful information (in the sense that the material could be related to anything in the “real” world).

It does make claims that bear similarity to certain Montauk-concepts (the author talks of a certain chair that can be used for remote viewing etc.) – but anybody could come up with such a story, having read the Montauk books and other far out material.

The physics section is something else, and it seems to me rather unrelated to the rest of the book, which makes it seem to me as if the author just copied it into his own story to gain credibility. But coming back to the physics:

One of my friends is a really, really well informed scientist, who is familiar with the work of Dr. Burkhard Heim. He told me that the material seems to be definitely based on Burkhard Heim’s work, and he had the impression that it even goes beyond that – like a practical application. If that’s true, then it would be really something.

I asked for my friend’s opinion about the rest of the book, but he did not want to go into detail. However, he assured me that it is indeed “something”. He also assured me that the Russian video documentary, which I have not seen yet, would be “very revealing”.

So, that’s really all I can tell you at the moment about this book. But I learned some other interesting things in that phone conversation:

My friend assured me that the information from Henry Deacon and Dan Burisch is absolutely head on, especially the claims regarding T1 and T2 [timeline 1 and timeline 2]. He said that there are two calculations regarding that fork-point: One says that it might come already this year. The other says that it will come right at the end of 2012.

I asked him: “Why do you think that it would come now? Do you think the Mayans made a mistake?” His answer was that the Mayans were surely right, but that our calendar system could be wrong, i.e. the “real” 2012 might be earlier than we think.

Then I asked him for the physical, scientific evidence for this [the timeline split], and he said that it would come from Burkhard Heim and from physicist Kip Thorne. He urged me to Google for “Thorne” and for “Vega”.

He also said that for top-ranking scientists who work for the (shadow-) Government, Montauk is absolutely standard knowledge. Whether it happened exactly as in the famous Montauk books would be another question, but T1 and T2, as Dan Burisch describes them, are current topics of discussion.

I asked him about Planet X and if he thought that was a real danger. His comment was that it might only be for those who stayed on T2. Then I asked him how he imagined the transition from our time into T1 or T2, and he said that he imagined that we will go into some kind of tunnel, or enter a short sleep, that might only take seconds, and then we’re in the new time.

To conclude: these are all exciting topics. But let’s try to not get carried away. Remember, everything that I’ve just written is just human opinion, and each of us could be wrong.

The only “hard” evidence that can be checked out is that last section of the book, which contains scientific material. Whether that is real has still to be researched. And whether that author came up with it by himself or whether he just copied it from some book, is another unanswered question. I myself would tend to the second conclusion.

_____________________________

From E.S., German-speaking researcher :

E-mail exchange with Barabou Vedu – a Summary

After finding out his email address in late January 2008, I contacted Barabou Vedu with a couple of questions.

He replied with the following : The base New Berlin was most likely NOT founded by the Nazis: he himself was shown inside the base several “eye-movies” dating back to the 17th century. He concludes that the base must therefore be much older. As for a possible Nazi- Alien connection, he says that he does not know anything about that. He mentions that were many tall, blond and blue-eyed people present. As for the “Indian” languages spoken in the base, he says that he was often addressed in an unknown language that was called Indian. However, he only remembers a handful of words from that language.

As for the advanced physics in the last part of the book, he explains that modern physics can not progress without integrating the idea of the “Ether” into their models. He lists a number of possibilities that should result, albeit with different probabilities, from the advanced physics in the book: among these are, Space Travel at any desired speed (even greater than C), leaving our 3-dimensional space in the 4th or 5th spatial direction, use of Ether as an information storage medium, with advanced Mind Control technology as a consequence.

****************

In my next email, I asked about his personal life and circumstances. BV replied that is was rather tough going and he mentions for the first time “terrible traumatizing events” which he would rather forget forever.

He says that he finished school and then did not do anything for years as he did not comprehend that someone who wants to have a job must go out and find a job. In 2004, he finally decided to try and learn a craft. He mentions that he even dreamed of studying math and physics, but this came to nothing as he realized that intellectual work was not for him.

Being asked whether he had approached publishers with his book, he said that he had not- but that he would not mind someone doing this, so long as he could remain anonymous.

****************

I decided to challenge him on several points that I found hard to believe when I read his report.

To give just two examples, I asked where the Coca-Cola cans in the secret base came from: Barabou Vedu says he does not know, but they may have been received in exchange for Advanced Technology.

In another surreal bit of that email string, I remarked that a film about the great famine in America can hardly have been called A Film about the Great Hungary. I explained to him that Hungary is a country in central Europe. He replied, perplexed, that those films he saw about “Hungary” talked about hunger and poverty in the 30s in the USA.

I also asked him why he says that the base was in Antarctica, when on the cover page of his printed edition there is a poem that reads “The future has already begun here, under the ice of an Arctic glacier” ? I asked, which one is it now?

He replied, that while writing the report he had become more and more convinced that the base was actually NOT located in Antarctica but near the North Pole.

****************

After several more email exchanges with BV, I suggested that we finally meet in person. BV declined, but he agreed to participate in a conference call that (as Bill had suggested) I set up with BV and another German-speaking researcher.
During our phone call, we put forward the following to BV:

Q : Do you have a visual memory of your father?
BV: No, all I remember is that he used to sit in a corner and cry when I was in the (bereschewan) seat.
Q: What is your mother tongue?
BV: My mother tongue is English. I only started learning German once I got out of the base
Q: Do you have any “missing time” in your life ?
BV: Yes, between the autumn of 1996 and around March 1997, I cannot remember a single thing.
Q: Give us an example of those “terrible, traumatizing things” that you witnessed at the base ?
BV: One day my friend and mentor, Walter Pfeffer went up to the glass roof of the base, and he looked through the glass and said “Well, spring is here finally !”

We also asked BV what exactly the purpose of the base and its operations was: he said one purpose was to go into people’s minds, to read their thoughts, and influence them.

Another purpose of the Chair was to share new ideas with scientists. It was also used for telling bad people to better themselves and for making warlike people more peaceful.

As for the science, BV adamantly insists that he saw pictures (not formulas) in the “eye-movies” inside the base and that he wrote down the formulas and equations years later.

===============

I discussed the above exchanges with Bill and Kerry on several occasions: we all agree that Barabou Vedu must have gone through some very traumatizing experiences, very likely involving advanced Mind Control technology.

===============

After the phone call, we sent to BV a link to an important, leaked NSA document that summarizes in detail the different Mind Control techniques developed in the US over the last 40 years.

BV replied, commenting that the technology that was used on him must have been much more advanced than that. He suspects that the NSA scientists must have come across something very advanced in a strange place and must have been trying to replicate it ever since. With limited success, he says.

He finds interesting that the NSA’s MC masters ask their victims to write diaries.. much as he himself was encouraged to paint whatever he had seen in the eye-movies inside the base. He concludes, there are striking parallels between the NSA experiments and his own experiences, but that in his case the transmission of pictures directly into the brain was far advanced.

Lastly, and this is the last we heard from BV: He categorically refuses to consider any kind of regression or hypnosis therapy in order to come to the bottom of his strange tale.

He insists that his personal “therapy” has been the writing of the report, and the “case is closed” for him.

****************

The fact that BV lives de facto in hiding – and yet he made a great effort writing, printing and distributing his work is another, fascinating contradiction in this whole story. It is one of many, we feel. With so many fundamental questions unanswered, it is hard to believe that the “Base New Berlin” story is really to be taken at face value.

On the other hand, we clearly feel that BV is a troubled man who has suffered greatly through something that is shrouded from his conscious memory at the moment. His decision to call the case closed is understandable and we respect it. Although it may only be temporary .. as we hope.

_____________________________

Click here to download (PDF 18.6 Mb).
Click here to download as a torrent.

Click here to view the May 2006 Russian TV documentary NAZI BASES IN ANTARCTICA, which contains some extraordinary and apparently authentic images.

Click here for the Jim Marrs article ANTARCTICA: A NAZI BASE?

Click here for the NEXUS article BRITAIN’S SECRET WAR IN ANTARCTICA.

Click here for the article EXPLORING THE ANTARCTIC REICH.

Click here for the article EXPLORING THE ANTARCTIC REICH – Part 2

Click here for the excellent summary article THE NAZIS AND THE ALDEBARAN MYSTERY.

In three of the above five articles, ‘Neu Berlin’ or ‘Neuberlin’ is referenced as a Nazi base in Antarctica. The source of this in each case is a 2003 report by Russian researcher Dr Konstantin Ivanenko.

SOURCE: http://projectcamelot.org/base_new_berlin.html

TOP SECRET AEROSPACE TECHNOLOGY: Michael Schratt – Beyond Blue

TOP SECRET AEROSPACE TECHNOLOGY: Michael Schratt – Beyond Blue

http://youtu.be/woMtIHwRL2w

Michael Schratt is an aviation historian. As a cutting-edge researcher into classified projects and unidentified craft he has met with and interviewed numerous scientists and aerospace engineers, pilots and executives from NASA and the defense industry. He investigates clues to planes that have been documented as having been flown by military from within both secret and top secret programs… He firmly believes that American tax-payers have every right to know where our money is being spent. Many of the craft he has documented are being funded within black projects… And he states that billions are being spent today on these craft. Some will only be flown once.

In this fascinating interview shot on the fly, during an impromptu meeting, Michael talks about many of the more prominent cases of classified and unclassified but often mysterious planes and aircraft that have graced our skies but remain elusive from history and the public record.

http://youtu.be/OcGJpd2aW_c

Michael Schratt | Code Blue

This is the second part of the interview with Michael Schratt. I apologize for the long delay in getting this out there. I brought on board a new editor to help give this a more professional look, Ben Northenor. I think you will notice the difference!

This interview is a great overview of the UFO, above top secret, black aircraft being developed by our secret government for use in a variety of scenarios. Not the least of which is potentially Project Blue Beam. As an in depth researcher, a self-labeled aerospace historian and someone who has secret sources within the aerospace industry, Michael is a dynamite guy to have on ones team.

Note: If you enjoy this interview please consider making a donation.

Special thanks to Ben Northenor for donating his time and editing skills to Project Camelot. And to Michael Schratt for supplying the stills.

Kerry Lynn Cassidy
Project Camelot
January 2011
Los Angeles, CA

 

SOURCE: http://projectcamelotproductions.com/interviews/michael_schratt/michael_schratt.html

New ‘Terahertz’ Scanner Lets Mobile Phones See Through Walls

New ‘Terahertz’ Scanner Lets Mobile Phones See Through Walls

  • Scanner uses ‘terahertz’ spectrum – between infrared and microwaves
  • Can see through walls, wood and plastics
  • Doctors could use small, cheap devices to see tumours inside body

Comic-book superpowers could become reality as scientists have designed a phone that works as ‘X-Ray spex’.

A hi-tech chip allows a phone to ‘see through’ walls, wood and plastics – and (although the researchers are coy about this) through fabrics such as clothing.

Doctors could also use the imagers to look inside the body for cancer tumours without damaging X-Rays or large, expensive MRI scanners.

A hi-tech chip allows a phone to 'see through' walls, wood and plastics - and (although the researchers are coy about this) through fabrics such as clothing)

 

Close up of a CMOS chip - a new version of the commonly used chips would allow users to capture images 'through' walls and even inside the human body

The researchers claim it could allow DIYers to detect studs within walls, or allow businesses to detect counterfeit money.

At present, it’s designed to work over a short range – and works with a normal-sized microchip that could fit into phones or other handheld electronics.

The team’s research involves tapping into an unused range in the electromagnetic spectrum. 

But the terahertz band of the electromagnetic spectrum, one of the wavelength ranges that falls between microwave and infrared, has not been accessible for most consumer devices.

‘We’ve created approaches that open a previously untapped portion of the electromagnetic spectrum for consumer use and life-saving medical applications,’ said Dr. Kenneth O, professor of electrical engineering at UT Dallas.

‘The terahertz range is full of unlimited potential that could benefit us all.’

X-ray spex? At present, it's designed to work over a short range - and works with a normal-sized microchip that could fit into phones or other handheld electronics

 

Using the new approach, images can be created with signals operating in the terahertz (THz) range without having to use several lenses inside a device. This could reduce overall size and cost.

The second advance that makes the findings applicable for consumer devices is the technology used to create the microchip.

Chips manufactured using CMOS (Complementary Metal-Oxide Semiconductor) technology form the basis of many consumer electronic devices used in daily life such as personal computers, smart phones, high definition TV and game consoles.

‘CMOS is affordable and can be used to make lots of chips,’ Dr. O said. ‘The combination of CMOS and terahertz means you could put this chip and receiver on the back of a cellphone, turning it into a device carried in your pocket that can see through objects.’

Due to privacy concerns, Dr. O and his team are focused on uses in the distance range of less than four inches.

Consumer applications of such technology could range from finding studs in walls to authentication of important documents. Businesses could use it to detect counterfeit money.

Manufacturing companies could apply it to process control.

There are also more communication channels available in terahertz than the range currently used for wireless communication, so information could be more rapidly shared at this frequency.

Terahertz can also be used for imaging to detect cancer tumors, diagnosing disease through breath analysis, and monitoring air toxicity.

‘There are all kinds of things you could be able to do that we just haven’t yet thought about,’ said Dr. O, holder of the Texas Instruments Distinguished Chair.
The research was presented at the most recent International Solid-State Circuits Conference (ISSCC). The team will work next to build an entire working imaging system based on the CMOS terahertz system.

By Rob Waugh

PUBLISHED: 02:50 EST, 19 April 2012 | UPDATED: 03:03 EST, 19 April 2012

Source: http://www.dailymail.co.uk/sciencetech/article-2131932/The-REAL-X-Ray-spex–new-terahertz-scanner-lets-mobile-phones-walls.html