Drone Attacks Update, Civilians still Targeted
Obama’s Drone Joke
Massive Cylinder UFO Captured on Film!!
Cyber Security Going Crazy
Obama Romney Benghazi Libya Corruption & Cover-UP
Other Random News
Show Transcript
Introduction: MegaNews Recap
Good evening ladies and gentlemen, October twenty-sixth, two thousand and twelve. Extra training and thanks for this opportunity to sit here again another night with you talking about the news, talking about the most relevant things going on out there in the world that you should probably know about. Just like everything you’ll find on DecryptedMatrix.com — quality articles, things humans should know by default, by design, for a reason. Information that is empowering, information that’s disturbing, information that is enlightening, information that you can do something with to better understand your surroundings, understand why the world is so crazy and is the way that it is. There’s a reason. It’s complex but yet simple. Unfortunately no one can really tell you — it’s something you have to find for yourself.
So that’s what we do here at DecryptedMatrix, one step at a time. Thanks to Revealing Talk Radio. Head over to the Facebook page, like the Facebook page, get on there. We’d really appreciate it. It drives likes and helps spread the word. Check out some other cool shows while you’re there. Head over to DecryptedMatrix.com — it’s tablet friendly. Tonight we’ve got an interesting lineup. We’re going to talk about as much news as possible. I think it’s important we just hit the highlights and maybe not go too deep, not get off track and waste time on any one specific subject. We’ll hop around a little bit.
Ender’s Game and Tonight’s Lineup
Your book recommendation: Ender’s Game. So you techies out there — right now both books by Orson Scott Card are really interesting. The dark side of Ender’s Game — we’ll explore that toward the end. I absolutely recommend you read Ender’s Game. There’s never been a better time than now. It eerily predicts the future — the video game society, war-based society, tablet computers, wireless networks, anonymous online bulletin boards. This book was written at least twenty years ago, maybe twenty-five years ago, maybe longer.
We’ll talk about Obama’s executive order, the cyber executive order. Then we’ll think about our predator drones out there — Skynet actually dropping friends and drones from the sky, almost poltergeist-type stuff. We have to touch on that. Then Berlusconi — still pursuing charges. Silvio Berlusconi, now no longer prime minister after he failed to please those banks and put together an austerity program. He didn’t do it, so he got taken down because of some charges involving some underage girls. So you know, if you’re not in line with the New World Order agenda and the banking system, if you’re a world leader and you’re not falling in line with everyone else in the agenda, things don’t go so well for you.
Also, next week — special episode for All Saints’ Eve, All Hallows’ Eve. We know it as Halloween. Time to dress up, be scary, pretend to be someone else. If we check our history and where it really comes from, its true origins — there’s some real, actually incomparable information to be found. It should be known. So tune in next week. It’s going to be an awesome special episode — real history of Halloween and its connection to Christianity.
GMO Scientist Fired, Goldman Sachs, and Eye-Tracking Technology
Goldman Sachs director gets two years for insider trading. I mean, come on. What a joke. Good job. He’s part of the U.S. government practically. Insider trading gets two years in prison — far less than what prosecutors demanded. We can laugh at the two years in a cushy place. A Goldman Sachs guy going down for insider trading — he’s probably not doing much different than any of those other knuckleheads that he runs with.
On transparency and serious science: scientists discover GMOs cause disease and are immediately fired and their team disbanded. This barely received any media attention at the time. A renowned British biochemist — going back to the late nineties — exposed the shocking truth about how genetically modified organisms cause organ damage, reproductive failure, digestive dysfunction, impaired immunity, cancer, among many other conditions. He was immediately fired from his job and the team of researchers who assisted him were dismissed from their posts within twenty-four hours of the findings being made public. Dr. Pusztai, who was considered to be one of the world’s most respected and well-learned biochemists, had for three years led a team of researchers from Scotland’s prestigious Rowett Institute. To his team’s surprise, they discovered that contrary to the industry rhetoric, GM food was responsible for causing severe health damage in lab rats. That was quickly relayed to the media out of concern for public health. You get the truth out about how dangerous these profitable GMOs are? You’re fired, your research team is disbanded, probably discredited and humiliated. Why? Because they told the truth. Is this the future you want to live in? I certainly don’t.
A Danish company is developing eye-control software for phones and tablets. The Danish company hopes to clinch deals with major mobile phone and tablet makers after developing software that enables users to control devices with their eyes. You can use it for basic controls like turning the next page in a book or playing games. The software uses infrared light reflected from the pupil of the eye, recorded by the device’s camera, enabling users to scroll or click on their screen with their eyes. When you are reading a book and get to the bottom of the page, it automatically knows to turn the next page. When you look away from the screen, it will pause. Four PhD students founded the company a year ago. They received a hundred thousand and fifteen thousand euros in funding just this past August to start developing this technology.
So pretty soon your phone screen will know when you’re looking at it. The next thing — they could call it something super awesome and gimmicky. A quantum phone, who knows. Never mind that it’s a tracking device and frequency emitter. Apparently the human body has the inherent ability to use mind-control-like abilities and can affect the holographic nature of reality with the mind to a greater extent than we’ve been led to believe — perhaps even communicate with each other telepathically by nature, without the need for artificial technology.
Executive Cyber Order and Internet Control
Obama is seizing control of cyberspace. This is too important. A new copy of the draft executive order on cybersecurity — this would use the powers of the presidency. Obama would order U.S. spy agencies to share classified intelligence on cybersecurity threats with companies that run critical infrastructure programs — power plants, water plants, railroads, and other vital industries — to help protect them from electronic attacks.
For some time, government officials have insisted that Iran is planning a cyber attack on the communications infrastructure of the United States. Reports say Defense Secretary Leon Panetta said the U.S. Armed Forces are ready to retaliate if Iran or any other country attempts an attack on our security. The White House has been pushing the issuing of this order, and it has been coming for months. We all know what’s happening. Regardless of the latest leak, the White House declined to say when the president will sign.
So the incentive for granting the president sweeping power over the internet is close to completion. Janet Napolitano herself, in testimony before the Senate Committee on Homeland Security, indicated that the order was being drafted by diverse high-level bureaucrats. Control of the nation’s internet infrastructure would be the Department of Homeland Security’s responsibility. This is leading to a total takeover, folks — of information, how information is shared.
They want it to sound as noninvasive and friendly as possible, that it’s there to protect you. It has nothing to do with that. Iran is not a threat. I’ve found no evidence of this. Other researchers have found no evidence of this. Ahmadinejad, in interviews on DecryptedMatrix, says he wants peace and harmony for all people on earth. No one should look at a loss of life — life is beautiful, it should be respected, and they’re not wanting to build a bomb, they have no interest in that. Those words you will never see in an interview on U.S. television because Israel and the United States are conveniently in bed with each other. They want you to believe that Iran is this big nasty threat that needs to be dealt with, when it’s just another quest for a military base and a takeover occupation that never goes away.
Look at any of them — does the U.S. ever leave? The U.S. goes and starts a war somewhere, do they ever leave? We find out that the Gulf of Tonkin never really happened — those documents got leaked. Now we find out the Gulf of Tonkin was a lie, which means Vietnam was a lie. All of those deaths were based on a lie, just like weapons of mass destruction in Iraq. That was all a lie.
Benghazi, Predator Drones, and the Disposition Matrix
Going back to drones — America’s fleet of Predators may be infected by some sort of mysterious force. In Djibouti in March 2011, a Predator drone lost contact with its ground targets and engines without any human interaction. Often the fuel lines close. Technicians concluded it was a software infection — a bug in the brains of the drone — but they never actually pinpointed the problem.
These drone operators and the commandos spend their days and nights inside their compound as they plot raids against terrorist camps and hideouts. Everybody on the base is aware of what they do, but the topic is taboo. The task force general and ground commander reveals his name to no one wanting to know. The ground crew — supervisors, operators, and mechanics who care for these Predator drones — the only contact comes when an individual occasionally calls the compound to say it’s time to ready the drone for takeoff or prepare for landing. This is super-secret stuff. Investigators have to peel back the onion to find out any information. This is huge fraud.
Now, the Benghazi task force. There are two reasons this matters. The first is the Mitt Romney connection. Mitt Romney and his team — they were in on this Benghazi thing. The world first heard about the Benghazi attack in Libya at something like 10:08 PM. Hillary Clinton brought it to the world at that time. John Hankey exposed this recently, and he pointed out: folks, recall that the world learned of the Benghazi attack and how the administration was handling it at 10:08. If you look at Mitt Romney’s statement — two minutes later he’s got a full statement drafted. He doesn’t agree with the policies of the administration and doesn’t believe Hillary Clinton handled it the right way. The media then attacked and went on the offensive about the handling. Two minutes after Hillary Clinton delivers the news to the world on TV about that happening — what’s Romney’s response? He has a full explanation and an attack on the administration.
When he was asked about the response, he said, “Oh yeah, I had time to consult with my whole team.” He confirmed it — “I consulted with everyone on my team.” Really, Willard? In two minutes? In two minutes, your busy team had time to all consult over how you felt about the Benghazi attack and you had your statement drafted to break minutes later? Absolute lie. So this is the first hint that the Benghazi thing was somehow staged or at least anticipated, because they knew it was going to happen. The Ambassador Stevens situation was deeply concerning.
The second reason is drones. They have drones everywhere, folks. They have drones in countries blowing up people in countries that we’re not even at war with. The United States is not even at war with these countries. We have evidence of many drone strikes, yet the drone footage from Benghazi — where are the drones? They had drones flying around. Where’s the footage the drones picked up? No one is talking about it. The Benghazi drone footage is being suppressed.
Just recently in Djibouti, a drone entered low-hanging cloud that obscured its camera sensor. Making matters worse, the GPS malfunctioned, giving incorrect altitude readings. The crew tried to bring the drone in for a remote-controlled landing, but it crashed half a mile short of the runway in a residential area. Fire trucks rushed to the scene — it had crashed in a vacant lot. Its single Hellfire missile had not detonated, thankfully. Predator drones crashing or malfunctioning in mysterious ways — but that’s not something we can talk about. It’s classified. Even asking about Predator drones could get you in trouble.
We now have evidence that one in fifty people killed by drones in countries that the U.S. is not even at war with could maybe possibly be a terrorist — which is really just a military-aged male defending his geography from occupation. They’ve come up with this concept of extrajudicial killings, folks. The president has created a list in secret — it’s “national security” — and they justify on this list who’s the biggest bad guy and how they’re going to kill them “legally” with a drone. There’s no judicial process, there’s no review, it’s not open to the public. It just happens. It’s called the Disposition Matrix.
A few outlets have broken the story, and it’s absolutely disgusting that the U.S. tries to justify the killing of a sixteen-year-old American, Abdulrahman al-Awlaki. His father had views that are opposed to the U.S.A., therefore the son was a target too. That is how close we are to the danger, folks.
You know that Obama’s got a joke for you — he’s got a little joke about drones. He told his buddies about his daughters, Sasha and Malia, and guys showing up to date them. He said, “I’ve got two words for you: Predator drones.” And then he says, “You think I’m joking?” No, he’s not kidding, folks. That is already happening. My guess is the policies go much higher than Mr. Obama. It doesn’t really matter how good a puppet they put up there — they’re all the same. The face changes; the agenda doesn’t. Do you notice that? You do now.
German Gold Audit and Fake Gold Bars
The German federal court has said the country’s central bank should conduct an audit and physically inspect its gold reserves worldwide, including gold in the custody of the Federal Reserve Bank of New York. In addition, the Reserve Bank of New York holds Bundesbank gold that is also stored in London, Paris, and Frankfurt. For decades, the Bundesbank has relied on written confirmation of its gold holdings from the New York Fed. According to the report from the German court, the last time Bundesbank officials physically inspected the central bank’s gold holdings was stated to have taken place in 1979.
So who knows what’s really going on. Interestingly, the Bundesbank had been taking the word of other central bankers about the existence, location, and size of its gold reserves. The court, which only has advisory power and cannot force the Bundesbank to follow its recommendations, said the need for inspections was critical. The Bundesbank is actually going to follow the recommendation to verify the gold. It also plans to ship some one hundred and fifty tons of gold back to Germany for a more thorough examination.
What they mean by that, ladies and gentlemen, is that some gold out there is being fulfilled with filler. There’s fake gold — bars coated in gold over tungsten. They use tungsten because it is the closest density to gold. So experts obviously know what the size and weight of the gold should be. Because of the density, it must weigh precisely the right amount. The best way to fake it, apparently, is with tungsten. Gold bars have been popping up — fake ones filled with tungsten, gold-plated tungsten bars that weigh almost correctly. China may have even gotten some of these fake bars, or some of ours have been faked. Who knows. But it’s not surprising that countries like Germany are asking to audit the gold in the reserves.
Many people know the gold supposedly in Fort Knox — there’s no way it’s all there. They’ve gotten greedy, at the very least. They’ve probably sold the gold so they could make money. They have been artificially trying to suppress the price by manipulating the market. Jim Sinclair, who runs JSMineSet.com — he doesn’t give specific trading or financial advice, nor does he tell you what to buy — but you can look at the evidence and see. If you really pay attention to it, it’s pretty obvious that they’re fudging the numbers. For a long time, the gold that’s supposed to exist doesn’t actually exist.
You also know that the gold that was supposed to be underneath the World Trade Center twin towers was no longer there. A truckload was actually found about a mile and a half away, hidden in tunnels, as if it was stopped and couldn’t go any farther. They said, “We found our gold, it was recovered, no big deal.” No — they found a sliver of what the gold was supposed to be. That’s a massive gold heist that most people had no idea about. Even many in the alternative crowd pushing for 9/11 truth are clueless that there was even a massive gold heist that took place, which in essence proves that somebody in high places knew what was coming and moved the gold just in time. One truck got away conveniently so they could say, “That was the gold, it was actually recovered. No big deal, nothing to see here.”
Surveillance Technology, Drones, and the Dark Side of Ender’s Game
You’ve got to pay attention. Surveillance cameras with activity forecasting — it’s happening. Computer software programs to detect and report so-called “suspicious behavior” could eventually replace fallible humans in modern surveillance cameras. The U.S. government is funding so-called automatic video surveillance technology. Researchers at Carnegie Mellon University disclosed details about their work this week, including that the software can predict what people will do in the future. The main applications are in video surveillance, both civil and military.
This has been in the works for years, starting in all major cities. They’re using it to track your movement, your face, in real time. Now we’ve got these PhD researchers saying, “Do you know what we’re developing? Programming and software to detect and report suspicious behavior.” But that’s only a tiny slice of it. It’s good that some of this gets out, but this has actually been happening for a long time and is massively underplayed.
On the technology front, little tiny robot drones are now very good at teaming up. They can communicate with each other and solve real-world problems, complex tasks. Some people talk about the idea of singularity — human brainpower converging with artificial intelligence, weaponry with artificial intelligence. Not so sure that’s a good idea. Scary stuff when technology starts to think for itself and starts acting in self-preservation mode. That’s dangerous.
A not-so-dangerous technology breakthrough: researchers at MIT have improved wireless network speeds by an order of magnitude — not by adding base stations or boosting transmitter wattage, but by using algebra to eliminate the network-clogging task of resending dropped packets of data. It’s about providing new ways for mobile devices to solve for missing data. This technology will make the transition seamless between Wi-Fi, LTE, and other wireless approaches. Any IP network can benefit from this technology. Several companies have licensed the underlying technology in recent months, but the details are subject to nondisclosure agreements. The research was done at MIT, the University of Porto in Portugal, Harvard University, Caltech, and the Technical University of Munich. The licensing is being done through a MIT-Caltech startup called Code-On Technologies. So it looks like the best and brightest in internet technology have come together to figure out more efficient use of the frequencies that are already being leveraged. Pretty neat — we’ll have to keep our eyes peeled to see how quickly this technology gets implemented.
On jailbreaking — it’s now legal under the DMCA for your phone, but not for tablets. But how do you define what a tablet is? They’re using that as an excuse not to exempt tablets. The exemptions that were recently renewed kept phone jailbreaking legal, but the tablet jailbreak exemption was not renewed because the definition is so varied — it could be a laptop computer, it could be a big phone, it could be a workstation. They’re withholding judgment and waiting for Congress to clarify. It’s crazy what’s going on out there with how the rights and freedoms you have to modify your own purchases and your own equipment are being restricted.
There’s an awesome Rolling Stone article on Jeremy Hammond, the accused hacker-activist from Anonymous — “Enemy of the State.” Pretty interesting. Check it out and hear it from his perspective. You’ll find out a lot more than you probably expected.
To close the show this week, we’ve talked technology the last couple of days, we’ve talked about Anonymous and all the things that Anonymous has accomplished and brought to light. Coming back to Ender’s Game — it’s such a popular book for good reason, across generations. But there’s a story within the story. In our modern era, there’s a superpower — bigger, richer, stronger than any nation — that sees itself as a victim, forced to invade its neighbors repeatedly. Pearl Harbor, 9/11 — using fear to bomb nations into oblivion, believing its own eyes because its motives are pure.
There’s a good article linking the story of Ender’s Game to the story of how Hitler rose to power — programmed to be who he was, programmed by someone, by some force, to become someone who in his own eyes was doing good by exterminating a race. If you’ve read Ender’s Game — not really a spoiler — Ender was manipulated into destroying an entire race of aliens, the Buggers, that they were told were the enemy. Programmed from birth to fight the enemy, to be the soldier. You’ve got to check out this article on DecryptedMatrix — “The Little-Known Dark Side of Ender’s Game.” That’s all we’ve got for the week, folks. Max Maverick, Revealing Talk Radio, DecryptedMatrix, signing off. See you next week.




