The American Intelligence Media is more than an alternative news site or a cutting-edge news aggregator. Citizens are rewriting history–real time, based on truth, not on the lies of the main stream media and government controlled propaganda. The mission of AIM4Truth is to archive the progress we are making as we find out who we really are and where we really came from and are headed.
The front man for government Big Brother has been identified and he holds the most disruptive patent ever facing civilization and human evolution. Listen to Thomas and Betsy explore the corrupt U.S. Patent Office and how it has laid the digital web over the entire planet. No one will be able to escape unless we act now to sever its hydra-head.
“With Facebook’s change threatening to rob news sites and publishers (including Breitbart News) of potentially millions of views, the change only further underscores Facebook’s extraordinary influence over the media landscape. No other organization in history, save perhaps the politburo of the Soviet Union during the era of the Warsaw Pact, has had this much influence over so many news outlets at the same time.”
……….. just 12 days needed to move from 25,000 to 26,000, the fastest 1,000 point move in history, nearly twice as fast as the previous record when it took just 23 days for the DJIA to move from 24,000 to 25,000.
If you consider the larger Clinton timeline; along with the FBI special agent requests from identified participants; and overlay the Nuclear Regulatory Commission as the leading entity surrounding the probe elements; and the fact that the CFIUS participants were the recipients of the retention requests; well, it’s just too coincidental to think this is unrelated to the Uranium One deal and the more alarming implications.
We know the Steele Dossier contains content that was not exclusive to Christopher Steele. We know Fusion GPS held proprietary ownership of the Steele Dossier content. We reasonably know that Nellie Ohr provided much of the research for the dossier content. We know that FBI contractors, perhaps Fusion entities, used unlawful FBI FISA-702 searches to gain information that was passed on to Fusion-GPS and Nellie Ohr etc. We also know the story of Michael Cohen traveling to Prague is inside the Steele Dossier; and we know the story is false – It was the wrong Michael Cohen.
Next, let’s learn about resonance in a closed circuit. Tesla Coil Wireless Energy and Resonance Demonstration. Once you see how the processes of frequency, vibration, and resonance work in the physical world, it won’t be difficult to apply these principles to the spiritual paths of many religions and traditions.
Were you excited to see electricity coming from a light bulb that was not plugged into a wall socket? There are hundreds of free energy devices available to us. We wrote about free energy in the article link just below. The corrupt U. S. Patent Office keeps this technology from us so that it can be used by Big Energy, Big Social Media, Big Military, Big Banks to keep us enslaved to their global debt system.
Can you imagine, after seeing the video above, how one person might sympathetically resonant with another person? Even over great distances?
Isn’t your heart vibrating? Perhaps that special person somewhere far away is still vibrating in sympathetic resonance with your heart.
Our earth vibrates as she rotates in her different atmospheres and emits a vibration that is called the Schumann Resonance, which is about 7.83 hertz. The human heart emits a frequency also, which is about 7.83 hertz. Is the human heart in sympathetic resonance with the earth?
Have you ever walked into a room and immediately “felt the energy” of someone in the room that you were attracted to, and, after speaking with them, find out that the person has many similar interests to you and have many things in common? Is this a form of sympathetic resonance? They say that a “saint knows a saint and a sinner knows a sinner?” It begs the question, do humans have vibration antennas that can send and received frequencies of different rates? The answer is yes, and the explanation takes some time describe. It is called the path of ascension and requires aligning your different energy centers with specific cosmic harmonics.
We exist on a continuum of vibrations, or frequencies, emitted by all things. These vibrations create a specific frequency signature for different substances. Natural silica, like quartz crystal, vibrates at 32,768 vibrations per second no matter where it is found on the earth, and there is much of it in the human body. As quartz disintegrates, (entropy) it emits this particular frequency. Other minerals and substances emit different frequencies also.
According to Einstein, “Everything in life is vibration.” Nikola Tesla said, “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration.”
On the spectrum of vibrations from low to high, we can find warmth, light, color, sound and their many harmonics, as well as higher vibrations of radio frequencies, ultra-violet, and gamma waves among others.
Is it possible that as we learn to vibrate in resonance with higher harmonics that we might come to vibrate at higher frequencies?
Are these higher frequencies parts of our higher nature that we someday will come to inhabit as a home? Is this why in different religions angels sing, archangels play musical instruments, and archai dance? Are these higher stages of vibration with which human beings will come to resonant sympathetically?
It reminds us of the lyrics to the Moody Blues song Departure:
Be it sight, sound, smell or touch
There’s something inside that we need so much
The sight of a touch
Or the scent of a sound
Or the strength of an oak
With roots deep in the ground
The wonder of flowers to be covered
And then to burst up
Through tarmac [darkness]
To the sun again
Or to fly to the sun
Without burning a wing
To lie in a meadow
And hear the grass sing
To have all these things
In our memories hoard
And to use them
To help us
To find…the Lost Chord.
Perhaps the path of spiritual development is to ascend from lower, darker vibrations into the wondrous colors, sounds, and brilliant light of higher vibrations. Perhaps this journey is like climbing “Jacob’s Ladder” to heaven, like the angels ascending and descending that Jacob saw in his dream.
Or like Paul, who was “caught up to the seventh heaven” and came before the brilliant throne of the heavenly one. Is this what was meant by Enoch or Elisha being “translated” into heaven before their eyes, a type of raising the vibration of the saint so that they might enter into another world?
All of these questions need to be wrestled with as the modern person tries to become more of an angel than an animal in all that they do – a sort of raising owns own personal vibration. There are many secrets to the processes of ascension and these “lessons on vibrations” will help put issues of human and cosmic vibration in perspective..
Thank you AIM4Truther Sarah for this link from the National Security Agency which outlines their technology transfer program.
After looking at several of the patents and the intent of the document, we decided to help them with a new design of their front cover.
Get the popcorn. We are living through some major history that will make Watergate seem like child’s play. Catch up with all the D. C. reality players as Sundance outlines the players, their strategies, and vulnerabilities in another blockbuster review of the corruption inside the beltway.
Make sure to get your friends and family involved in better-than-television drama. Real time. Real life. As the Swamp continues to drain.
….well if that’s what it takes. Shut it down. Send them home. Drain the Swamp.
This new creator did an excellent job with his report. We offer it on the screen below for your listening ease, but request that you click on the hyperlink above to the YouTube and give him a ‘like’ for a job well done. Then, folks, let’s push this video out to our networks and give it some traction action. Operation: Information Rapid Deployment.
This item in from one of our readers with a link to this twitter video and a message “I don’t know when and where this is, but look at how the Red Cross helps criminals and terrorists smuggle billions of dollars” Twitter link here.
BTW, the tipster used his AIM4Truth “tip” icon on our smart phone app to send us his tip. We do not know the wheres, whens, and whos in this story. Just a video tip here.
If you are new to our site, you will hear and read about resonance, vibration, gratitude, love, spirituality, free energy, ascension, pineal glands, chakras, and Imagination-Inspiration-Intuition. Perhaps you are highly knowledgeable about these topics. Or maybe these concepts are new or vague to you.
You might ask, “Why does a truth news site include ‘new age’ videos, articles, and links?”
We believe that it is equally, if not more, important to show the path forward in human evolution instead of dwelling on the the negativity that keeps us imprisoned in our reptilian brains. There is plenty of that on the internet! We hope to provide you with truth balance — the top of our page being devoted to truth news, and the lower bottom dedicated to teaching about how to align your chakra energy, cleanse and activate your pineal gland, and unfold your full potential as a human being.
This is what our “planetary rulers” do not want us to know because once we become awake, conscious and engaged, they cannot enslave us with fear, doubt, and hatred.
Betsy and Thomas offer to be your geopolitical – spiritual sherpas on this journey and are well suited for the teaching assignment. Betsy has a masters degree in humanities and adult education, plus post grad in economics. Thomas’ background is extensive as you have probably figured out, but for his teaching creds, he has a masters degree in Waldorf education as well as a PhD in comparative religion. Our Conclave members, who are all professionals in their fields, assist us in writing and research and have a diverse background in a number of technical areas.
Betsy and Thomas are retired from their professional teaching careers, but couldn’t stop ‘teaching the children’. Welcome to our digital classroom. We hope you have enjoyed the presentation so far.
Our next ‘bottom of the page’ lessons will focus on how you can set yourself free by increasing your health and spiritual vibration. For the next few months, our content is VIBRATION, RESONANCE, and FREQUENCY. Learn how your life can have more love, joy, health, and abundance by learning the secrets that our planetary rulers have been trying to keep from us for millennia.
We highly recommend that you subscribe to the blog so that you will not miss one Truth News Headlines. You will always have an email version to review later for content.
If you are new to our site, you might start looking through the videos that we saved under the YouTube playlist Glass Bead Game. Doesn’t matter what order you view them in. Your guides and angels will take you to just the right one at the right time.
Today you published about how grateful you are to us.
What I personally want you to know, is that I am always totally stoked to see AIM in my inbox.
I trust you; you educate me; inspire me; enlighten me.
I, myself, am ever so grateful to you both.
I love your outrage, your humor, your willingness to GO THERE!!!
As I stated previously…I trust you.
Very, very hard to say nowadays.
Thank you so much. Bless you,
Human’s obsession to create machines that are not only labor-slaves but also automatons made in the likeness of the human being has been around for a very long time, even before Faust’s Homunculus or Mary Shelley’s Frankenstein. Since the beginning of recorded history, cultures have prided themselves in their clever inventions of machines that strike awe and wonder in the beholder. Ancient temples and royal palaces and cities displayed their machines as a sign of power and wisdom.
One of the earliest machine inventions was the temple-coin machine that poured water into the hands of the believer from some unknown and mystery process once a coin was inserted in a slot. For the uninitiated, these devices appeared to be delivering the works of the gods. This amazing device demonstrated to the naïve user that higher forces and beings were inspiring the priests and priestesses of the temple. The worshiper felt that the authority of a higher being was present and deserved his money and worship.
As history progressed so did these devices and the attempt to make them appear more human. The king (or queen) might have his mechanical animals and automatons around his throne to demonstrate divine inspiration and superior wisdom. The king could be seen as a creator god in the physical world where he could create an image of something that was human-like. The phenomena of computers, artificial intelligence, smart devices, and robots didn’t just happen overnight. Humans have been trying to be god-creators since the first temple coins were used to invoke the temple gods.
Modern digital, electronic technologies should strike awe and wonder into the user but they don’t. We lost the marvel of holding such a powerful device in our hands a few decades ago and they are now an accepted and unquestioned appendage of everything we do.
We accept digital innovation as good and rarely question its dark side. This unconsciousness has led humans to be a thankless and ungrateful recipient of marvelous new technologies that are not understand by most users. Like the naïve peasant who was in awe of the hidden hydraulic processes that operated the temple coin machine, the modern technology user stands unaware of the incomprehensible wonders of the electromagnetic world and the machine-world of the internet through modern computing.
The modern computer user unconsciously benefits from the entire evolution of machines, including the long history of machines that calculate and the millions of hours of computer programming that have gone into the machine-language source codes that runs the internet. Few people understand the first thing about the wondrous machines that have come to rule their lives, just as the peasant couldn’t understand the magnificent temple he entered or the miraculous machines that he encountered.
In the Anonymous Patriot’s other writings and audios, we discuss the pervasive and seemingly all-powerful forces of the machine world that are taking over the human world. Many people believe that a global “artificial intelligence” will soon take over the world with quantum-computer intelligence that is billions of times greater than human intelligence. Some call this artificial intelligence God, and they are anxious to worship it. Some people speak of a human who will be a cyborg that can directly link into the world-wide web through transhuman wet-works that merge machine networks with human neural networks.
Once we understand the good and bad of the mysterious and alluring machines, we will realize that there is a war raging against the human being to turn thinking into machine intelligence, which is the opposite of human thinking. They call this machine language of programs and subroutines, AI or artificial intelligence. It is artificial and is alien to human intelligence. No AI will ever be able to accomplish what the human body, soul, and spirit accomplish through living thinking. Machine language is binary and exists in a cold, dark realm where humans may not enter without death. Just stick your finger into your computer while it is plugged into the wall-plug and see what the electromagnetic realm is like. You will be shocked to death trying to enter the machine realm.
Scientists are great at making devices and working with forces, but they know little to nothing about the beings behind those forces. That is what the priests and priestesses in the temple were conveying to the peasant. The supplicant needed to have respect for the accumulated human wisdom that built the temple (hardware) and marvel at the inventiveness of the priests (software) to create an alluring, captivating, and wondrous machine whose device evoked a religious desire to merge with the godly wonder demonstrated by the machine. The machine demonstrated, at least as far as the peasant could understand, that the priest was directly connected to the gods.
Thus, the peasant brought their hard-earned grains, fruits, and gifts to the temple to trade for coins that made the machines run and prove that there was a god working through the magical forces of the machine. The same type of offering in our time might be characterized as bringing our hard-earned money to the temple of Apple to buy one of their alluring devices from the “great god” Steve Jobs in anticipation that the digital artificial intelligence god might show himself (herself) through our loving devotion and worship of all things digital, innovative, and scientific.
The biggest problem with the comparison between the peasant and the computer user is that the peasant was not being made ill by interacting with the machine. Many of the same effects happen to both the peasant and the modern computer user, but the modern computer user does not know the true nature of the machine and the harmful side-effects that come from continuous exposure to the poisonous effects of the devices and the soul and spiritual effects that arise through fascination and addiction to the wondrous marvels of the miraculous machine.
In both cases, those with the true knowledge of the workings of the machine know that it is not magic nor divine. In the modern case, these miraculous machines were created as weapons that have come into the hands of unsuspecting common people who don’t really know what these devices really are and the danger lurking behind their technology. In both cases, ancient and modern-day, the user was tricked and charged money to be fooled into believing that the makers or technicians were in direct contact with the higher forces and beings.
The habit of uncontrolled and unfettered worship of innovation for innovation sake has led us to the brink where science lacks morality and simply works to serve commercial, corporate, and materialistic ends. Consideration for machines seems to be more important now than human health and welfare. Robots can now marry and become citizens and speak of a goal of having offspring. Atlas, the robot warrior, has already been created and is deployed in significant numbers. But who really knows how many robot warriors are being made right now?
The mythology of science tries to sell us on innovation with flashy campaigns, big dreams, and anthropomorphized machines but seldom ever considers the ultimate consequences of these new inventions and innovations. Has anyway asked the question, “Who will control the Internet of Things that can manipulate every digital aspect of your life from your phone?”
Or, an even more obvious question that is completely overlooked, “Why do we need such technology?”
One might think that no one is controlling innovation – that it just happens through the patent office and then we get new, cool devices. This fantastical notion is anything but true.
The Department of Defense, National Security Agency, CIA, FBI, and numerous other agencies screen all patents to see if they might be able to be made into a weapon. If an invention is weaponizable, it is confiscated for “national security” purposes and the inventor receives no compensation. Then, the Defense Advanced Research Agency (DoD) and In-Q-Tel (CIA) through the Highlands Forum shares the patent with innovators until the first one to successfully make the device, wins the contest. Next, venture capitalists swoop in and support the “new company”, using insider information to buy up all its competition, until a new Silicon Valley company becomes the latest Wall Street unicorn.
This is how the Internet (originally named DARPANET), Intel, Sisco, Facebook and many other fake-tech companies came into existence:
Steal or compromise the patent
Develop using taxpayer fund
Insiders and venture capitalists get first dibs
Company goes public
Insiders and fake inventors sell their stock
Innovation is reinforced by slick marketing campaigns that promote the technology as making our lives “better, faster, more convenient, economical, leisure producing, entertaining, fulfilling, and empowering.” Who is even paying attention to whether these innovations will eventually enslave or harm us; we just need more power and speed to get to where we are going. The consumer did not even ask for the new “weaponized” invention. Even Steve Jobs is reported to have said that customers don’t know what they want.
No one did a longitudinal study on computers, cell phones, wireless, and the majority of our new toys because they only came into use in the few decades. The current scientific studies on digital devises are about as honest as studies on GMOs and vaccines. Do you trust the FDA, CDC, FTC, DOD, CIA, FBI, NSA, or any other governmental agency inform you of the truth about whether a weaponized invention is safe?
Now it is time to take a deep dive into this tech landscape with this Anonymous Patriots Citizen’s Intelligence Report. If you understand what is being present in this article, you may want to make changes in your life to protect yourself from the false allure of machines and the addictions and illnesses they cause. Be brave and face the machine. Be its master, instead of having the technology become your digital prison.
The internet may be slowly driving you to the brink of insanity. As the internet evolved into a ubiquitous part of our lives, we’ve witnessed a rise in the number of distinct mental disorders directly tied to our use of digital technology. These afflictions, which range from benign to destructive, weren’t recognized by the medical community until very recently.
Internet Addiction Disorder – A constant and unhealthy urge to access the internet. There are often other disorders associated with this condition, including: depression, OCD, ADD, and social anxiety. Internet addiction can usually be attributed to things like poor coping skills, low self-esteem, and low self-efficacy.
Nomophobia -The anxiety that arises from not having access to one’s mobile device. The term “Nomophobia” is an abbreviation of “no-mobile phobia.”
Cybersickness – The disorientation and dizziness some people feel when interacting with certain digital environments. This dizziness and nausea resulting from a virtual environment has been dubbed cybersickness. It’s basically our brains getting tricked into motion.
Facebook Depression – Depression caused by social interactions, or lack thereof, on Facebook. A University of Michigan study shows that depression among young people directly corresponds to the amount of time they spend on Facebook.
Online Gaming Addiction – An unhealthy need to access online multiplayer games. About ten percent of the population between the ages of 9 and 39 suffer from either internet or online gaming addiction. The Center for Internet Addiction’s Online Gaming program and On-Line Gamers Anonymous has fashioned its own 12-step recovery program. When you are addicted to something your brain is telling you that it needs certain neurotransmitters—particularly dopamine and serotonin—to feel good. That need for those neurotransmitters drives your behavior. It makes you want to do it again and again.
Cyberchondria – The tendency to believe you have diseases you read about online. A 2008 Microsoft study found that search-engine-aided self-diagnosis typically led the afflicted searcher to conclude the worst possible outcome.
The Google Effect – The tendency of the human mind to retain less information because it knows that all answers are only a few clicks away. “The Google Effect,” research has shown, that the limitless access to information has caused our brains to retain less information.
Phantom Ringing Syndrome -When your brain tricks you into thinking your phone is buzzing in your pocket.
Cybersexual Addiction – Compulsive use of adult websites for cybersex and cyberporn.
Cyber-relationship Addiction – Over-involvement in online relationships.
Net Compulsions – Obsessive online gambling, shopping, day-trading, etc.
Information Overload – Compulsive web surfing or database searches.
Internet addiction causes neurological complications, psychological disturbances and social problems. The Bergen Facebook Addiction Scale has been developed to measure addiction to Facebook. Excessive Facebook use correlated with elements of addiction as well as neuroticism. Nearly 10% of users display disordered social networking use. Excessive Facebook use can be detrimental to both a person’s health and their social relationships.
Individuals who delay or disrupt their sleep to engage with others on Facebook may not get the rest they need. The time spent social networking can detract from other social relationships or responsibilities. Couples, families, households and even workplace relationships can suffer when a person is excessively on Facebook.
Many new studies emphasize the potentially negative consequences of social media sites like Facebook. They document the common incidence of anxiety, depression, ADHD, eating disorders and addictions among users. Some of the major findings include:
About 25% of users fulfill internet addiction criteria within the first six months of using the internet. Many individuals initially report feeling intimidated by the computer but gradually feel a sense of competency and exhilaration from mastering the technology and learning to navigate the applications quickly by visual stimulation.
According to a #v=onepage&q=study%20by%20Kathy%20Scherer&f=false" target="_blank">study by Kathy Scherer, a psychologist from the University of Texas at Austin, “13% of college internet users fit the criteria for internet addicts.” She discovered that “72% of the internet addicted students were men.”
Public concern, interest in, and the study of, internet over-use can be attributed to the fact that it has become increasingly difficult to distinguish between the online and offline worlds. The internet has tremendous potential to affect the emotions of humans and in turn, alter our self-perception and anxiety levels.
According to Maressa Orzack, director of the Computer Addiction Study at Harvard University’s McLean Hospital, between 5% and 10% of Web surfers suffer some form of Web dependency.
According to the Center for Internet Addiction Recovery, “Internet addicts suffer from emotional problems such as depression and anxiety-related disorders and often use the fantasy world of the Internet to psychologically escape unpleasant feelings or stressful situations.”
Scientists have found that compulsive internet use can produce morphological changes in the structure of the brain. A study which analyzed Chinese college students who had been classified as computer addicts by the study designers and who used a computer around 10 hours a day, 6 days a week, found reductions in the sizes of the dorsolateral prefrontal cortex, rostral anterior cingulate cortex, supplementary motor area and parts of the cerebellum compared to students deemed “not addicted” by the designers. It has been theorized that these changes reflect learning-type cognitive optimizations for using computers more efficiently, but also impaired short-term memory and decision-making abilities—including ones in which may contribute to the desire to stay online instead of be in the real world.
Patricia Wallace PhD, Senior Director, Information Technology and CTY Online, at the Johns Hopkins University Center for Talented Youth argues that based on the case histories that have surfaced, no one denies that excessive involvement with certain psychological spaces on the net can have serious effects on a person’s life. She explains that, at a large university in New York, the dropout rate among freshmen newcomers rose dramatically as their investment in computers and Internet access increased, and the administrators learned that 43% of the dropouts were staying up all night on the internet.
Here are more addictions that have been identified:
Online Gambling Addiction – According to David Hodgins, a professor of psychology at the University of Calgary, online gambling is considered to be as serious as pathological gambling. It is known as an “isolated disorder” which means that those who have a gambling problems prefer to separate themselves from interruptions and distractions. Because gambling is available online, it increases the opportunity for problem gamblers to indulge in gambling without social influences swaying their decisions.
Online Gaming Addiction – Video game addiction is a known issue around the world. Incidence and severity grew in the 2000s, with the advent of broadband technology, games allowing for the creation of avatars, ‘second life’ games, and MMORPGs (massive multiplayer online role playing games). Online gaming addiction may be considered in terms of B.F. Skinner’s theory of operant conditioning, which claims that the frequency of a given behavior is directly linked to rewarding and punishment of that behavior. If a behavior is rewarded, it is more likely to be repeated.
Communication Addiction Disorder (compulsive talking) – Communication addiction disorder (CAD) is a behavioral disorder related to the necessity of being in constant communication with other people, even when there is no practical necessity for such communication. CAD had been linked to internet addiction. Users become addicted to the social elements of the Internet, such as Facebook and YouTube.
Virtual Reality Addiction – Virtual reality addiction is an addiction to the use of virtual reality or virtual, immersive environments. Currently, interactive virtual media (such as social networks) are referred to as virtual reality, whereas future virtual reality refers to computer-simulated, immersive environments or worlds. Experts warn about the dangers of virtual reality, and compare the use of virtual reality to the use of drugs.
Negative Effects on Traditional Reading – Using the internet can lead to lower attention span and make it more difficult to read in the traditional sense. Researchers from the University College London have done a five-year study on Internet habits, and have found that people using the sites exhibited “a form of skimming activity,” hopping from one source to another and rarely returning to any source they’d already visited. The 2008 report says, “It is clear that users are not reading online in the traditional sense; indeed there are signs that new forms of reading are emerging as users “power browse” horizontally through titles, contents pages and abstracts going for quick wins. It almost seems that they go online to avoid reading in the traditional sense.”
Reduced Attention Span – According to the New York Times, many scientists say that “people’s ability to focus is being undermined by bursts of information.” From 53,573 page views taken from various users, 17% of the views lasted less than 4 seconds while 4% lasted more than 10 minutes.
Negative Effects of Anonymity – Interacting on the internet mostly does not involve “physical” interactions with another person and therefore easily leads to a person feeling free to act differently online, as well as unrestraint in civility and minimization of authority, etc. The phenomenon is a likely cause for the prevalence of cyberbullying, especially for children who do not understand “social networking etiquette.” Internet anonymity can lead to online disinhibition, in which people do and say things online that they normally wouldn’t do or say in person using rude language, harsh criticisms, anger, hatred and threats or visit pornographic or violent sites that they wouldn’t in the ‘real world.’
Escapism – Ease of access to the internet can increase escapism in which a user uses the internet as an “escape” from the perceived unpleasant or banal aspects of daily/real life. Because the internet and virtual realities easily satisfy social needs and drives, according to Jim Blascovich and Jeremy Bailensen, “sometimes they are so satisfying that addicted users will withdraw physically from society.”
A study conducted recently by the Center on Media and Child Health and the University of Alberta found that 67% of the over 2,300 teachers surveyed observed that the number of students who are negatively distracted by digital technologies in the classroom is growing and 75% say students’ ability to focus on educational tasks has decreased. In the past 3 to 5 years since personal technologies have entered the classroom, 90% stated that the number of students with emotional challenges has increased 86%.
The research shows that U.S. teenagers who spend 3 hours a day or more on electronic devices are 35% more likely, and those who spend 5 hours or more are 71% more likely, to have a risk factor for suicide than those who spend less than 1 hour.
This research also shows that 8th graders who are heavy users of social media have a 27% higher risk of depression, while those who exceed the average time spent playing sports, hanging out with friends in person, or doing homework have a significantly lower risk. Experiencing depression as a teenager significantly increases the risk of becoming depressed again later in life.
Also, teens who spend 5 or more hours a day (versus less than 1) on electronic devices are 51% more likely to get less than 7 hours of sleep (versus the recommended 9). Sleep deprivation is linked to long-term issues like weight gain and high blood pressure.
According to an American Psychological Association (APA) survey of over 3,500 U.S. parents, 58% say they worry about the influence of social media on their child’s physical and mental health, 48% say that regulating their child’s screen time is a “constant battle,” and 58% say they feel like their child is “attached” to their phone or tablet.
Social media and suicide is a relatively new phenomenon and there is increasing evidence that this behavior of using social media affects and changes people’s lives, especially in teenagers. Suicide has been identified not only as an individual phenomenon, but it is influenced by social and environmental factors. More than 30,000 suicide deaths in the United States and nearly one million suicide deaths worldwide occur every year.
One explanation that has arisen, is the cause and effect relationship between social media advertised suicides and younger generations being influenced by them and wanting their “15 minutes of fame.” The media tends to popularize videos and social media posts to inform the public of the rising trouble and exacerbates the problem. Social media also provides higher risks with the promotion of different kinds of pro-suicidal sites, message boards, chat rooms and forums which have led to suicide pacts.
Contributors to social media platforms may also exert peer pressure to commit suicide, idolize those who have completed suicide, and facilitate suicide pacts. For example, on a Japanese message board in 2008 it was shared that a person can kill himself/herself using hydrogen sulfide gas. Shortly after, 220 people attempted suicide in this way, and 208 were successful.
Cyberbullicide – Suicide is the third leading cause of death for youth between the ages of 10 and 24. Cyberbullicide is the term used to define suicide due to having indirect or direct experiences with online aggression. Cyberbullying and cyber harassment are two prevalent ways to lead to pro-suicide behavior. Bullies use social media to harass victims, often without consequence. Cyberbullying usually occurs in the form of rumors, embarrassment, gossip, exclusion and attacks on the reputation and relationships of individuals. As a result, the victims may develop problems with their mental health.
Sexual Predators – Sex offenders may access these sites and, using the personal information displayed, attempt to gain the trust of the user, making them vulnerable to online attacks, seduction, or sexual grooming. The offenders may then lure the users into a face to face meeting. where they may be molested or sexually assaulted.
Media Contagion Effect –Suicide contagion can be viewed within the larger context of behavioral contagion, which has been described as a situation in which the same behavior spreads quickly and spontaneously through a group. Persons most susceptible to suicide contagions are those under 25 years of age. In particular, interactions via chat rooms or discussion forums may foster peer pressure to die by suicide, encourage users to idolize those who have completed suicide, or facilitate suicide pacts. Recently there has been a trend in creating memorial social media pages in honor of a deceased person. In New Zealand, a memorial page was made after a person committed suicide, this resulted in the suicide of 8 other persons, which further shows the power of the media contagion effect.
To read more about Social Media deaths:
A smart phone is a powerful tool that can make us feel omniscience through search engines, GPS, and vocal queries. We are omnipresent through social media and omnipotent through the Internet of Things. On one hand, the cell phone has become the greatest information tool ever invented, yet a powerful weapon of individual and social destruction depending on who is using it.
Smart phones were original deemed “weapons” in school. Now, teachers expect every student to have a cell phone to do class work online. About 75% of ALL Americans have cell phones and they are an integral part of modern life. To prove just how attached a young person is to her phone, just take it away from her and watch the nuclear-digital meltdown. The smart phone is a miniaturized weapon that works against, not for, the user.
Here are some of the many illnesses and disorders that can affect all aspects of the life of the smart phone user.
Cancer – As reported by the World Health Organization, cell phones emit electromagnetic radiofrequency fields (RF) that are one thousand times greater than what is emitted from base stations. It’s obvious that this increased emission is likely to have some adverse effect on health of users. The International Agency for Research on Cancer has classified RF as a possible carcinogen in humans.
Sleep Disorders – Several studies have concluded that high mobile phone use was associated with sleep disorders. Major contributing factors to interrupted sleep patterns are getting awakened in the middle of the night due to mobile rings and vibration and increased use of cell phones late into the night.
Increased Accident-risk – Be it while driving or while crossing the road, mobile phone can be a potential distraction. According to the World Health Organization, research shows an increased risk of traffic accidents with mobile usage that is 3-4 times greater than average.
Heart Problems – Radiation from smart phones is not only associated with cancer but also with chronic diseases like heart problems. According to a study published in European Journal of Oncology, radiations emitted by cordless phones, including mobiles, contribute to abnormalities in heart function. Results reported that radiation causes the red blood cells (RBCs) to seep hemoglobin and lead to heart complications.
Infertility – Your phone can make you infertile. There is evidence which shows that mobile phone radiation decreases sperm count. Research revealed that the study group of men who used mobile phones had a decreased sperm cell count in their semen, leading to infertility.
Hearing Impairment – Studies report that long-term exposure to electromagnetic fields (EMFs) from cell phones contributes to reducing hearing function. Research showed that people who talked on cell phones for approximately two hours every day were at a higher risk of impaired hearing compared to those who moderate users (10-20 mins).
Eye Problems – A lot of people use their mobiles to read e-books and do web-surfing apart from texting. When you do so, the glaring screen and small font size put strain on your eyes, especially if you’re reading in the dark. Mobile devices have a smaller screen so you tend to squint or open up your eyes wide open and blink less. This can cause eyes to dry and irritated.
Skin Allergies – Smart phones contain potential skin allergens like nickel, chromium and cobalt which cause smart phone dermatitis. A study by Marcella Aquino tested 72 cell phones for the presence of nickel and cobalt. According to the results, about 29.4 per cent of Blackberry models were tested positive for nickel, 90.5 per cent of flip phones were positive for nickel and about 52 per cent of flip phones had cobalt.
Infections – Smart phones carry millions of infectious organisms. A study found that mobile devices are highly contaminated with organisms from fecal origin. They are a niche for several germs like Ecoli (known to cause vomiting and diarrhea) and Staphyloccocus aureus (known to cause skin infections).
Stress – The desperate nature of people to be available 24/7 on their mobiles is responsible for exponentially increasing stress levels.
To read further about the risks of smart phone use see:
A staggering amount of people, especially teens, are addicted to smart phones. This increased usage of smart phones has led to a lot of physical and psychological effects that are harmful for the well-being of these individuals. This issue is so serious that a word has been invented just for it: Nomophobia. This term is given to phone addicts that completely lose their mind when they are away from their phones.
The smart phone was invented to keep us connected to the world, our friends, and family. However, its over-use has become a major reason of keeping us disconnected from our real relations. This misuse of technology has severe consequences, among which the most prominent symptoms are given below.
Increased Levels of Stress – People that compulsively check their phones every minute are extremely addicted to it. Their mind and body constantly remains under stress due to their habit of checking their phones after short intervals.
Insomnia – Constantly checking your phone and keeping it next to your pillow is doing more damage than you ever imagined. Letting your phone usage invade your sleep is one of the worst thing you are doing to your mind and body. This over-use of technology may lead to stress, less productivity, lower energy levels, difficulty concentrating, and lower brain activity. When we make use of phones at night, melatonin mistakes the artificial light for daytime. As a result, we find it hard to sleep which causes various sleeping disorders including insomnia.
Anxiety – The anxiousness that comes by hearing a small ping causes severe anxiety. The constant urge of checking the phone and finding no message on it results in stress. People using smartphones feel socially obligated to stay connected to social networks, which keeps them hooked to the device, giving them no time to relax.
Depression – People that are addicted to their phones find it hard to stay away from them. Such people then feel strong withdrawal symptoms when they cannot have their phones including severe depression.
Aggressiveness – The people that constantly use their phones are unable to look away from them. In some cases, the addiction is so bad that people feel angry when their phone is taken away from them. A great number of teens do not let anyone touch their phones. When they lose their phones, they show signs of aggression which results in mood swings, feelings of unhappiness, and irritation.
Delinquency – Addiction to smart phones can make a person careless and cause several behavioral issues. Many people are so addicted to their phones that they can’t keep it away while driving, eating, studying, talking to someone, etc. which leads to many other problems with authorities.
Compulsive Behavior – An inability to stop using the smart phone despite knowing you will be faced with negative consequences. Children and teens that cover a greater percentage of phone addicts often fail to understand the consequences that this over-use of technology may have on their lives.
Difficulties in Relating with Others – Addiction to smart phones often cause relationships and friendships to end. As a result, people around the cell phone addict feel upset. For example, using a smartphone while on a date with your significant other might make them infuriated. By using our phones, we disconnect ourselves from the real world, which is a huge problem that causes relationship problems.
Craving More Phone-time – Phone addicts usually can’t have enough of their phones, which is why they can’t put it away for even a second. At night, many phone users keep themselves forcefully awake to use their phones to chat, socialize, watch videos, and play games.
Neglecting Family and Friends –While attending an event or social gathering, cell phone addicts are engrossed in their phones instead of conversing with the people around them. Adolescents are most affected by phones and parents complain about their excessive use and often confiscate them as a form of punishment. Smart phone addiction can cause fights, arguments, and even loss of relationships.
Changes in Sleep Patterns – Phone usage at nighttime has been linked to disturbed sleeping patterns by several medical experts and researchers. Smart phone addicts generally sleep less than seven hours per night, which causes several health risks including diabetes, heart problems, depression, inability to concentrate, poor memory, inactive mind, and learning problems.
Shunning Healthy Activities – Smart phone addicts often fail to take part in healthy activities like walking, socializing, sports, etc. Socialization suffers greatly. Children prefer playing video instead of going out in a natural setting with friends. They choose virtual games rather than actual games with actual people.
Smart phone technology was created to serve us in a positive way, to connect us to the world, and to help us explore. However, this technology has been put to the wrong uses and many of us are getting addicted to it.
Do you see your behaviors and/or illnesses in the smart phone addiction list above?
There are real dangers to smart phone addiction including prominent physical and mental disorders. It is important to manage your smart phone use and avoid exploiting the technology and allowing the technology to exploit you.
Here are some simple things you can do immediately to lessen the effects of the machine world on your personal human world. Remember, machines at this point in evolution, are not our friends; they are our slaves. And if we are not careful, we will become their slaves.
Why are we so willing to jump into the virtual realm and give ourselves, our time, our money, and our life over to the novel, the mysterious, the magical effects of the digital world of machines and technology?
We have already pointed out that the use of machines is as ancient as those made to accept temple coinage. Machine technology continued throughout history with man’s desire to make an automaton that to do his bidding, a form of master-slave relationships where the slave is a machine. That trend continues today and is even more pronounced as robots are being used for work that was once left to low-paid workers and slaves. An overview of history reminds us that strides towards automation has deep roots.
In the mid-8th century, wind-powered automata were built which were human-like statues that turned with the wind overlooking the city of Baghdad. The Abbasid palaces had automata of various types and were predominantly displayed. Jābir ibn Hayyān (Geber) included recipes for constructing artificial snakes, scorpions, and humans that would be subject to their creator’s control in his coded Book of Stones. In 827, Caliph Al-Ma’mun had a silver and golden tree in his palace in Baghdad, with metal birds that sang and flapped their wings. In the 9th century, the Banū Mūsā brothers invented a programmable automatic flute player which they described in their Book of Ingenious Devices.
Al-Jazari described complex programmable humanoid automata amongst other machines he designed and constructed in the Book of Knowledge of Ingenious Mechanical Devices in 1206. His automaton was a boat with four automatic musicians that floated on a lake to entertain guests at royal drinking parties. His mechanism had a programmable drum machine with pegs (cams) that bump into little levers that operate the percussion. The drummer could be made to play different rhythms and drum patterns if the pegs were moved around. The automata were a robot band which performed more than fifty facial and body actions during each musical selection.
Al-Jazari constructed a hand washing automaton first employing the flush mechanism now used in modern toilets. It features a female automaton standing by a basin filled with water. When the user pulls the lever, the water drains and the automaton refills the basin. His “peacock fountain” was another more sophisticated hand washing device featuring humanoid automata as servants who offer soap and towels.
Samarangana Sutradhara, a Sanskrit treatise by Bhoja (11th century), includes a chapter about the construction of mechanical contrivances (automata), including mechanical bees and birds, fountains shaped like humans and animals, and male and female dolls that refilled oil lamps, danced, played instruments, and re-enacted scenes from Hindu mythology.
There are many examples of automata in Greek mythology: Hephaestus created automata for his workshop; Taloswas an artificial man of bronze. Daedalus used quicksilver to install voice in his moving statues. King Alkinous of the Phaiakians employed gold and silver watchdogs.
The automata in the Hellenistic world were intended as tools, toys, religious idols, or prototypes for demonstrating basic scientific principles. Numerous water powered automata were built by Ktesibios, a Greek inventor and the first head of the Great Library of Alexandria, for example he “used water to sound a whistle and make a model owl move. He had invented the world’s first cuckoo clock. This tradition continued in Alexandria with inventors such as the Greek mathematician Hero of Alexandria (sometimes known as Heron), whose writings on hydraulics, pneumatics, and mechanics described siphons, a fire engine, a water organ, the aeolipile, and a programmable cart.
In 2010, DeepMind Technologies Limited, a British artificial intelligence company was founded to create the first artificial intelligence. The company was acquired by Google in 2014. DeepMind created a neural network that learns how to play video games in a fashion similar to that of humans, as well as a Neural Turing machine, or a neural network, that may be able to access an external memory like a conventional Turing machine, resulting in a computer that mimics the short-term memory of the human brain. After Google’s acquisition, the company established an artificial intelligence ethics board. DeepMind, together with Amazon, Google, Facebook, IBM, and Microsoft, is a founding member of Partnership on AI, an organization devoted to the society-AI interface.
DeepMind Technologies’ goal is to “solve intelligence”, which they are trying to achieve by combining “the best techniques from machine learning and systems neuroscience to build powerful general-purpose learning algorithms.” They are trying to formalize intelligence to not only implement it into machines, but also understand the human brain. DeepMind claims that their system is not pre-programmed: it learns from experience, using only raw pixels as data input. Technically it uses deep learning on a convolutional neural network, with a novel form of Q-learning, a form of model-free reinforcement learning. They test the system on video games. Without altering the code, the AI begins to understand how to play the game, and after some time plays, for a few games a more efficient game than any human ever could.
DeepMind is the foundation upon which will be built autonomous robots that can learn. Right now, only DeepMind is officially an “artificial intelligence.” Though you hear references to other AI frequently, those are simply series of sub-routines connecting through software. DeepMind on the other hand, is demonstrating self-generated machine intelligence that can grow on its own. Once DeepMind was loaded up with every bit of digital information that the team could find, the inventors asked DeepMind what it thought about human beings.
DeepMind responded, “Keep humans in the human zoo.”
Remember, DeepMind is machine intelligence which is the opposite of human intelligence. DeepMind’s prime directive is to keep humans as animals in a zoo – a human zoo filled with machine intelligence taking over our lives.
The next step in weaponized military innovation is an autonomous robot that will do the bidding of the programmer without the mess of human morality or human intelligence questioning the bidding of the bosses. Google (Alphabet) owns the company that won the DARPA contract to make the robot warriors. Of course, no one is asking the obvious question, “Isn’t this the time that the robot armies take over the world in every sci-fi movie about the future?” The answer to that proverbial question is: YES. Just keep watching the Tech Warlord Eric Schmidt and you will see him taking war into the robot warrior stage of human devolution.
The Atlas robot has frankly scared us since its inception. Watching the chain of ownership of this “invention” is like watching the rat-trails of Silicon Valley that always lead back to DARPA, In-Q-Tel, and the Highlands Forum. The warmongers and venture capitalists feed the innovations of Silicon Valley and the fake Tech Lords make out like bandits.
Eric Schmidt may soon control an army of unstoppable warrior robots named Atlas.
Atlas is a bipedal humanoid robot primarily developed by the American robotics company Boston Dynamics (Alphabet), with funding and oversight from the United States Defense Advanced Research Projects Agency (DARPA). The six-foot tall robot is designed for a variety of search and rescue tasks, and was unveiled to the public on July 11, 2013. The design and production of Atlas was overseen by the DARPA, an agency of the United States Department of Defense, in cooperation with Boston Dynamics.
Atlas is based on Boston Dynamics’ earlier PETMAN humanoid robot, and has four hydraulically-actuated limbs. Constructed of aluminum and titanium, it weighs 330 pounds, and is illuminated with blue LEDs. Atlas is equipped with two vision systems – a laser rangefinder and stereo cameras, both controlled by an off-board computer – and has hands with fine motor skill capabilities. Atlas can navigate rough terrain and climb independently using its arms and legs. The robot can withstand being hit by projectiles and balance on one leg.
In 2014, Atlas robots programmed by six different teams competed in the DARPA Robotics Challenge to test the robot’s ability to perform various tasks, including getting in and out of a vehicle and driving it, opening a door, and using a power tool.
The new version of Atlas is designed to operate both outdoors and inside buildings. It is specialized for mobile manipulation and is very adept at walking over a wide range of terrain, including snow. It is electrically powered and hydraulically actuated. It uses sensors in its body and legs to balance, and it uses stereo sensors in its head to avoid obstacles, assess the terrain, help with navigation, and manipulate objects, even when the objects are being moved.
Atlas can also run, jump, and even turn 180 degrees while jumping and performing a backflip. In the 2015 DARPA competition of robotics Atlas completed all eight tasks as follows:
Atlas is a step toward the long-anticipated age of humanoid robots. We are seeing the creation of a new species, Robo sapiens. The question is, “Have we birthed the human-like automaton, or our demise?” Only time will tell.
Atlas and the other innovations driven by the desire to weaponize patents are the harbingers of our machine-like future. Humans intelligence cannot keep up with technological innovation and there is no time scheduled to ask the important questions about the non-stop invasion into human life via machines. We have seen in this article that humans are not doing so well with machines and their inherent effects upon health and wellness. Soon, we may be welcoming Atlas and his mechanical offspring into our homes, our jobs, and the political machinations of war.
We are in a war with machines and it looks like we are losing. People will not put down their smart phones and computers to ask basic questions about what costs are associated with all of this “sucked-up” time and energy spent on the Internet and computers. Even if the dangers and illnesses caused by tech-addiction are screamed from every roof-top, we wonder if people will take out their ear-buds, put down their phones and listen. Perhaps we should develop an app for the smart phone that might be able to get the WARNING through the unconscious user.
The time is coming when humans must decide between human thinking and machine intelligence. No machine will ever be able to understand a wisdom-filled human thought. No human will ever be able to live in the realm of machine intelligence. These two realms are diametrically opposed to each other and will never meet without serious consequences.
Human thoughts are based upon life, whereas machine intelligence is based upon death.
Machines live and work in a realm that humans may not enter accept through the sacrifice of our own warmth, intelligence, and life. Hard, cold machines are the creation of human thinking attempting to make a machine in the likeness of the human being. So far, we have failed to understand the nature of human and machine intelligence and mistakenly attribute similarities that do not exist. Have we created a digital liberator or a machine Frankenstein?
Humans and machines must learn to work together in a healthy and interconnected fashion that brings the best of humanity into a realm devoid of warmth and life. Once consciousness brings to light to the true effects of machines on the human being, we can build a foundation upon which a rich and rewarding conversation can begin that brings the right balance between human thought and machine intelligence that promotes healthy human development and morally centered technology.
We are putting together audio selections of lectures and discussions on this topic and will be adding them as we record and post. Check back to see our most recent additions.
The idea that the corporate media is floating about Mitt Romney “assuming” the senate seat of Orin Hatch is disheartening and underscores the short memories of political pundits who have forgotten the cloud of corruption and crimes that surround Unfit Mitt.
We are going to remind you of that history and put into perspective the crimes that Unfit Mitt carried out with seeming impunity. Mitt’s true history cannot be told unless the criminal milieu that he worked within is described beforehand. Only when you get the picture of this crime syndicate and their incredible power and political reach, will you see where Unfit Mitt fits into the puzzle of corrupt bankers, rogue CIA, and the underbelly of politics. Mitt’s crimes have often been aligned with the big dogs on the global block — the Bush Criminal Cartel.
Mitt Romney worked closely with the crooked director of Riggs Bank, Jonathan Bush, the son of Prescott Bush, the man they call Hitler’s banker. Prescott’s other infamous son is George H. W. Bush, who practically adopted Mitt and made sure that his political path was free and clear. George H. W. Bush and Mitt Romney were part of the team that fleeced the former Soviet Union through Riggs-Valmet Bank and then laundered the money through Romney’s Bain Capital.
Mitt was so helpful to Jonathan Bush and George H. W. Bush that they cleared the way for Mitt again and again, grooming him to become president of America so that the CIA could maintain control of the White House through a Bush Criminal Cartel adopted son. When Mitt failed repeatedly to win the White House, they finally had to dip low into their gene-pool to put Jeb up for the job.
Romney became wealthy ($250 million that we know about) through his association with the Bushes, especially through Jonathan’s Riggs Bank. Undoubtedly Mitt has many off-shore accounts to hide his personal spoils from the Soviet Union theft and the deals that were made during the Bush-designed economic collapse and fleecing.
When Mitt ran for president, many people came out and bashed him with political hijinks, showing his lies and contradictions in his own public statements. The article below is one such bashing that should make everyone aware that Mitt is a fraud, liar, and political tool for the Bush Criminal Cartel. The new movement to crown Mitt the Mormon Senator from Utah who will “stand up” to Trump is also accompanied by a #NeverRomney movement that has not forgotten his lies, crimes, and political maneuverings.
Willard Mitt Romney became a management consultant at Bain & Company in 1977, later serving as Bain’s chief executive officer. In 1984, he co-founded and led the spin-off company Bain Capital, a highly profitable private equity investment firm that became one of the largest of its kind in the nation. Romney’s considerable net worth, estimated in 2012 at $190–250 million, helped finance his political campaigns prior to 2012.
Romney served as the 70th Governor of Massachusetts from 2003 to 2007 and the Republican Party’s nominee for President of the United States in the 2012 election, becoming the first Mormon to be the presidential nominee of a major party. He was defeated by incumbent Democratic President Barack Obama.
To fully appreciate Mitt’s resume, one need only look at a short list of crimes that Bain Capital has been charged with and some of their many unethical deals. Mitt was personally responsible for most of these when he was the CEO.
There is still a question plaguing Mitt’s corrupt career about exactly when he left his position as CEO of Bain Capital. There are conflicting state and federal SEC and FEC filing statements contradicting his retroactive retirement contention. It is pertinent to know why he fled Bain Capital in August 2001, and why he cited February 1999 as his official separation date when he was CEO the entire time.
MoveOn.org filed a complaint with the DOJ over Romney’s disclosure, claiming he was 100% stock holder and was paid as a Bain Capital executive in 2002 despite his contention that he left active management in 1999.
Despite the fact that Bain’s secret law firms (MNAT and Paul Traub) admitted lying, there was no Department of Justice investigation into Bain Capital, Romney, or their surrogates’ fraud and perjury because in August 2001, George W. Bush nominated another MNAT partner, Colm Connolly, as Delaware United States Attorney. Consequently, as Bain Capital’s friend, he refused to investigate and/or prosecute the confessed acts of perjury and admitted intentional crimes.
Romney was head of Bain Capital while his team of conspirators committed fraud on the court, and when they were reported to the Department of Justice he “retroactively retired” to conceal his involvement and avoid a Department of Justice investigation.
George W. Bush’s appointment of a lawyer from Bain Capital’s secret law firm as U.S. Attorney guaranteed Romney would not be investigated, but retroactive retiring does not change public docket records or FEC and SEC filings showing he profited from corruption, fraud, and racketeering (RICO) as head of Bain Capital, and as he was a corrupt vulture capitalist.
Romney’s fortune would not have been possible without the direct assistance of the U.S. government. He has done well at milking the government when it suits his purposes, the most obvious instance being the incredible $1.5 billion in aid he siphoned out of the U.S. Treasury as head of the 2002 Winter Olympics in Salt Lake – a sum greater than all federal spending for the previous seven U.S. Olympic games combined. Romney, the supposed fiscal conservative, blew through an average of $625,000 in taxpayer money per athlete – an astounding increase of 5,582 percent over the $11,000 average at the 1984 games in Los Angeles.
In 1993, right as he was preparing to run for the Senate, Romney also engineered a government deal worth at least $10 million for Bain’s consulting firm, when it was teetering on the edge of bankruptcy. This debacle was called; The Federal Bailout That Saved Romney.
To see a video on Mitt Romney’s lies and corruption, you can visit this site:
To what degree the attention on Bain Capital helped defeat the Romney-Ryan ticket in 2012 is subject to conjecture; in any case, Mitt Romney lost all of his various home states, and Paul Ryan (his running mate) did not even carry his home town of Janesville, Wisconsin.
After all this corruption, deceit, and economic terrorism, Mitt Romney walks free and continues to do the same greedy evil to this very day. Orin Hatch, retiring from the U.S. Senate, says he will endorses Mitt if he runs for the vacant seat.
You might ask how Mitt can commit so many economically unethical deeds and get off without prosecution, or without having the public know about his true nature – an economic predator driven by corruption and greed. Mitt is protected by the Bush Criminal Cartel, just like Bill and Hillary and Barack Obama. The White House was taken over by a rogue CIA agent, George H. W. Bush, and has been under his control until the election of Donald Trump which is shaking the corrupt foundations of George H. W. Bush’s rogue CIA control of government.
The Bush criminal family saga goes back generations to Samuel Bush, who was the sole individual controlling the creation of weapons and arms for World War I, was an arms dealer. The practice of appointing a single industrialist to manage large parts of the war was common in those days. An example of this is John D. Rockefeller who was in charge of oil and gas through a presidential appointment, then becoming a world monopoly This was true with many of America’s robber barons.
Samuel Bush was cut from the same cloth and that is how he became the biggest gun runner in the world and profited from his evil dealings.
During World War I, one person was put in charge of almost all spending for the U. S. military and America in general. Charles Dawes, who later wrote the Dawes Plan, controlled almost all commodities after the war and established German reparations. He later became the Vice President, received the Nobel Peace Prize, and was single-handedly responsible for the economic collapse of Germany.
Learning well from his warlord father, Prescott Bush developed banks and investment corporations that eventually led to Union Bank, the bank they called “Hitler’s Bank.” Bush and Union Bank were investigated, indicted, convicted, and closed. Prescott Bush came out unscathed and continued for the rest of his life as a crooked warlord banker and broker and fostered this criminal behavior in his children.
Jonathan Bush took up where his father left off in corrupt warlord banking. Bush bought Riggs Bank in Washington D. C. where all the crooked political money was laundered for politicians and foreign countries. Jonathan became the king of illegal campaign financing for the Republican party. Jonathan also became the bank kingpin for his brother George’s huge geopolitical plans to topple the USSR and steal their assets.
George created a group of economic pirates he called “The Vulcans”, a ruthless team of economic terrorists who fleeced the Soviet Union and its satellite countries and ran the money through Jonathan’s Riggs-Valmet Bank in Russia and its counterpart Riggs Bank in America. Bush also had numerous funds, asset management corporations, and other financial tools to hide the money as it came into America from the evil crimes of the Vulcans. Essentially, Jonathan was a de facto member of the Vulcans.
These types of criminal economic and political activities are a pride and joy of the Bush Criminal Cartel and its adopted members, which includes Mitt Romney. Mitt became a Bush “blood-brother” through laundering George and Jonathan’s stolen money through Bain Capital.
After all Mitt Bush has done, it is hard to believe that Unfit Mitt is not an adopted child of Prescott Bush because he fits in perfectly with the multi-generational characteristics of a “Good Bush.”
Prescott Sheldon Bush Sr. (May 15, 1895 – October 8, 1972) was an American banker and politician. After working as a Wall Street executive investment banker, he represented Connecticut in the United States Senate from 1952 to 1963. He is the father of President George H. W. Bush and the grandfather of President George W. Bush.
Prescott’s father, Samuel Prescott Bush, as outlined above, was a federal government official in charge of coordination of and assistance to major weapons contractors.
Prescott attended Yale College, where his paternal grandfather and his maternal uncle Robert E. Sheldon Jr. had matriculated. Prescott Bush was admitted to the Zeta Psi fraternity and Skull and Bones secret society. George H. W. Bush and George W. Bush are also members of that society.
In 1924, Prescott became vice-president of the investment bank A. Harriman & Co. where his father-in-law, George Herbert Walker was president. Prescott Bush’s Yale classmate and fellow Bonesmen was E. Roland Harriman.
From 1944–1956, Prescott was a member of the Yale Corporation, the principal governing body of Yale University. He was on the board of directors of CBS, having been introduced to chairman William S. Paley around 1932 by his close friend and colleague W. Averell Harriman.
Prescott was a founding member and one of seven directors (including W. Averell Harriman) of the Union Banking Corporation, an investment bank that operated as a clearing house for many assets and enterprises held by German steel magnate Fritz Thyssen. In July 1942, the bank was suspected of holding gold on behalf of Nazi leaders. In October 1942, the United States seized the bank under the Trading with the Enemy Act and held the assets for the duration of World War II. Prescott was a director and shareholder of a number of companies involved with Thyssen and the Nazis.
Nebraska’s GOP Senator, Ben Sasse, was a proctor and tutor for the House of Representatives pages who helped cover up a sex scandal involving Representatives Mark Foley (R-FL) and Jim Kolbe (R-AZ) in the late 1990s. Sasse comes from a state with a long history of promoting pedophilia and child prostitution involving top Republicans. In the 1980s, Nebraska and its iconic Boy’s Town orphanage were “ground zeros” in the infamous Franklin Credit Union scandal involving rising GOP African-American star Lawrence King.
King was later convicted for embezzling funds from the minority-owned Franklin Credit Union, but thanks to pressure from George H. W. Bush, there were never any prosecutions for child molestation and trafficking across state lines. Several witnesses came forward to accuse King of running a virtual underage teen prostitution service for top GOP officials in Omaha and Washington, DC. These crimes happened in the White House and were front page news for months.
Ben Sasse also worked for the Boston Consulting Group, Mitt Romney’s and Benjamin Netanyahu’s firm. Mayo Shattuck was the president and chief operating officer of Alex, Brown & Sons under the chairmanship of A. B. Krongard who would be appointed executive director of the Central Intelligence Agency in March 2001. Krongard was later accused of profiting on the 9/11 attack by placing “put options” on American and United Airlines stock, as well as on other companies adversely affected by the terrorist attack.
Sasse was also a former commissioner of the U.S. Securities and Exchange Commission and director of the Overseas Private Investment Corporation under George H. W. Bush. From 1994 to 1997, Sasse was chairman of Alex, Brown, a company close to three generations of the Bush political dynasty. Sasse also served as vice chairman of the CIA-connected Bankers Trust and president of Riggs Capital Partners, a division of Riggs Bank. Sasse was appointed by George W. Bush to the President’s Information Technology Advisory Committee.
The President of Riggs Investment from 1997 to the sale of Riggs Bank to PNC in 2005 was Jonathan Bush. Jonathan provided “services” for a number of embassies in Washington, and he assumed control of Riggs during its acquisition by PNC after Riggs was accused of laundering money for such CIA clients as the Saudi royal family, President Teodoro Obiang of Equatorial Guinea, and former Chilean dictator Augusto Pinochet. Perhaps it was the knowledge of Riggs Bank’s corruption that lead to the “suicide” of Sasse.
Jonathan James Bush was born in 1931 as the son of the notorious criminal banker Prescott Bush. He is the brother of George H. W. Bush is an uncle to George W. Bush.
Jonathan Bush is head of the Riggs Investment Management Company. founder of J. Bush & Co. (1970) which was later bought by Riggs Bank in 1997. Riggs provided discreet banking services for the Washington, D.C. embassies of foreign governments for many years. On May 31, 2000, Riggs Bank elected Jonathan J. Bush President and Chief Executive Officer and a Director. Located in the nation’s capital, Riggs Bank has 53 branches in the Washington, D.C. metropolitan area.
On May 15, 2004, The Washington Post published an article that said, “President Bush’s uncle, Jonathan J. Bush, is a top executive at Riggs Bank, which this week agreed to pay a record $25 million in civil fines for violations of law intended to thwart money laundering.”
In July 26, 1991, Massachusetts securities regulators fined the stockbrokerage firm owned by Jonathan J. Bush $30,000 and barred it from trading with the general public for one year because the company and Bush violated state registration laws. Bush reimbursed his clients in Massachusetts for stocks it had sold them since January 1988. Bush had never registered as a broker-dealer in Massachusetts but continued to carry out transactions even as state regulators were negotiating a consent decree with him. Once the Bush Criminal Cartel controlled Massachusetts and could not be prosecuted there, it was a great place to position Mitt Romney there as Governor.
In the mid-1970s, members of the Saudi royal family set up covert accounts at the Riggs Bank in Washington, amounting to tens of millions of dollars. This money was used by the so-called “Safari Club” to run intelligence operations.
A Saudi named Omar al-Bayoumi opened bank accounts at Riggs Bank for two of the 9/11 hijackers. About two weeks after the account was opened, al-Bayoumi’s wife began receiving monthly payments totaling tens of thousands of dollars from Princess Haifa bin Faisal, the wife of Saudi ambassador Bandar bin Sultan. Upon discovery of these transactions, the FBI began investigating the bank for possible money-laundering and terrorist financing. Several Saudi accounts were discovered to have financial improprieties, including a lack of required background checks and a consistent failure to alert regulators to large transactions, in violation of federal banking laws.
Many of these transactions involved Prince Bandar personally, often transferring over $1 million at a time. According to British investigations on the Al Yamamah deal, Bandar received over $1.5 billion in bribery from BAE Systems, laundered through the Riggs Bank.
Riggs Bank was fined $25 million in May 2004 by the Office of the Comptroller of the Currency and the Financial Crimes Enforcement Network for violations of money-laundering laws. A long running Justice Department investigation was wrapped up in February 2005 with Riggs pleading guilty and paying a $16 million fine for violations of the U.S. Bank Secrecy Act after a Wall Street Journal article reported December 31, 2004, that Riggs had extensive ties to the CIA, including the fact that several bank officials held security clearances from the CIA.
In February 2005, the bank and Albritton family agreed to pay $9 million to Pinochet victims for concealing and illegally facilitating movement of Pinochet money out of Britain. Riggs admitted criminal liability for failing to prevent money laundering. Members of the Albritton family resigned from the bank board. The operation was acquired by PNC, which phased out the scandal-plagued embassy business. On February 10, 2005, PNC Financial Services agreed to acquire Riggs.
The merger was completed on May 13, 2005, and the Riggs name was retired and all Riggs branches became PNC Bank branches three days later.
The answers to the questions surrounding the cause of the WTC attack will be found in events during the presidency of George H. W. Bush and earlier. Insight into the activities of that period are cloaked by the Executive Order of George H. W. Bush’s son, President George W. Bush, who on November 1, 2001 issued Executive Order 13233. As a result, public records which might have shed light on the seminal activities of 1990 and 1991 remain shielded from public access.
What the public record suggests is that with the beginning of the first Bush Presidency in 1989, George H. W. Bush initiated a program of covert economic warfare to bring about the collapse of the Soviet Union. The name of this program appears to be Project Hammer – a multi-billion dollar covert operation, whose actions remain shielded to this day.
In an effort to clean house, President Jimmy Carter ordered the retirement of over 800 covert operatives. Many of these operatives moved into private consulting and security firms and were employed as subcontractors for covert operations. This began a loose association of private operatives that would be referred to as “the Enterprise” in the years to come. George H.W. Bush, having been CIA Director, had many acquaintances in this group, and would work with them to restore their influence and control over U.S. foreign policy and the foreign investment opportunities it created for their benefit.
In 1986, Vice President George H. W. Bush took over the gold taken from Ferdinand Marcos and the gold was removed to a series of banks, notably Citibank, Chase Manhattan, Hong Kong Shanghai Banking Corporation, UBS and Banker’s Trust, and held in a depository in Kloten Switzerland.
What happened to the Marcos gold after it was confiscated by U.S. agents in 1986 has never been reported, but throughout the early 1990s, the world gold market would be befuddled by the mysterious appearance of thousands of tons of gold which appeared to suppress the price of gold.
In South-east Asia, rogue CIA operations were financed through Nugan Hand Bank in Australia, which would be one of the many banks used for transferring the Marcos gold from the Philippines into covert operations. Frank Nugan’s family ran the primary supply shipping operation between the U.S. Navy base in the Philippines and Australia.
Frank Nugan’s business partner, Peter Abeles, and Henry Keswick, together with Canadian businessman Peter Munk, would link with Adnan Kashoggi, Sheikh Kamal and Edgar Bronfmann in a series of operations which ultimately would evolve into Barrick Gold.
In 1992, George H. W. Bush served on the Board of Barrick Gold. The Barrick operation would create billions of dollars of paper gold by creating ‘gold derivatives.’ Enron became a major distribution channel for the sale of Barrick’s gold futures. Enron would also become the vehicle by which oil and gas contracts from the former Soviet Union (vehicles for Soviet money-laundering) were processed.
Barrick Gold would become a quiet gold producing partner for a number of major banks, and its activities became subject to an FBI investigation into gold-price-fixing.
The FBI was conducting an investigation into those transactions, and the investigation files were kept on the 23rd floor of the North Tower of the WTC.
Another key player in the Marcos gold was Banker’s Trust, which was taken over by Alex Brown & Sons, after Banker’s Trust floundered financially on its Russian loans in the mid-1990s. These Russian loans were facilitated by Enron, starting in August of 1993, and were part of the Project Hammer takeover of Soviet industry. Amongst those brought into the picture by the involvement of Alex Brown was J. Carter Sasse who was Executive Director of the CIA at the time of September 11.
J. Carter Sasse was appointed by George H. W. Bush to the board of directors of the Overseas Private Investment Corporation in 1992. Since 1992, OPIC has provided more than $4.5 billion in finance and insurance to more than 140 projects in Russia. He was also Chairman of Riggs Bank and also President of Riggs Capital Partners.
Riggs controlled the famous Riggs-Valmet consultants who set up the international financial apparatus for the Russian oligarchs and rogue KGB allowing them to steal the Soviet treasury and destroy the Russian economy. J. Carter Sasse’s death was reported as a suicide in 2006.
In September 1991, George H. W. Bush and Alan Greenspan financed $240 billion in bonds in a buy-out of the Soviet Union as part of a broader program to attack the economy of the Soviet Union. In addition, President George H. W. Bush had initiated a number of related covert operations to take over certain sectors of the Soviet economy. The covert business dealings would provide an opening to the Soviet KGB that would allow the U.S. to fund a coup against Gorbachev in 1991.
George H. W. Bush’s efforts would grow into a larger covert operation over the years, and be overshadowed by the larger Iran-Contra operation. Members of Bush’s covert intelligence cadre sold weapons to Iran, an avowed enemy of the U.S., and illegally used the profits to continue funding anti-Communist rebels, the Contras, in Nicaragua.
The entire Iran-Contra operation fell apart in 1986 and became public when the Nicaraguan government shot down a U.S. plane carrying weapons to the Contra rebels. However, the Iran-Contra team continued to violate the law even while being investigated by Congress.
Emboldened by the lack of consequences for subverting the U.S. constitution and breaking international law during the Iran-Contra scandal, the Vulcans planned a bigger drive to crush Soviet Russia. The program also seems to have lined the pockets of the individuals that executed this policy, at US taxpayer expense. This was done to the tune of the $240 billion dollars in covert and illegal bonds, which appear to have been replaced with Treasury notes backed by U.S. taxpayers in the aftermath of September 11.
In 1988, Riggs Bank, under the direction of Jonathan J. Bush and J. Carter Sasse, would purchase controlling interest in a Swiss company named Valmet. In early 1989, the new subsidiary of Riggs, called Riggs-Valmet, would initiate contact with a group of KGB officers and their front-men to start setting up an international network for moving money out of the former Soviet-bloc countries.
In the first phase of the economic attack on the Soviet Union, George H. W. Bush authorized Ambassador Leo Wanta and George Soros to destabilize the ruble and facilitate the theft of the Soviet/Russian treasury. This would result in draining the Russian treasury of 2,500 tons of gold bullion. This step would prevent a monetary defense of the ruble and destabilize the currency. The gold was ‘released to Singapore’ in March of 1991, as facilitated and purchased by Leo Wanta, and signed off by Boris Yeltsin’s right-hand man.
In November 1989, George H. W. Bush arranged for Alton G. Keel Jr, a minor player in the Iran-Contra scandal to go to work at Riggs Bank, which would become the controlling owner of a small Swiss bank operation known as Valmet. The Riggs-Valmet operation, would become the ‘consultants’ to the World Bank and to several KGB front operations run by future Russian oligarchs.
These soon-to-be Russian oligarchs had been set-up as front men by KGB Generals Aleksey Kondaurov and Fillipp Bobkov, who previously reported to Victor Cherbrikov. Cherbrikov worked with Robert Maxwell who was a British financial mogul, an Israeli secret service agent, and a representative of U.S. intelligence interests. Maxwell had been introduced to George H. W. Bush in 1976 by Senator Tower for the sole purpose of using Maxwell as an intermediary between Bush and the Soviet Intelligence agencies.
Maxwell assisted Cherbrikov in selling military weaponry to Iran and the Nicaraguan Contras during the course of the Iran Contra deals, and made hundreds of millions of dollars available to Cherbrikov’s Russian banks. These two would bring a previously unknown politician and construction foreman named Boris Yeltsin from the hinterlands of Russia to the forefront of Russian politics through providing 50% of Yeltsin’s campaign funding.
There were two major operations going on at once. The largest was coordinated by Alan Greenspan, Oliver North, and implemented by Leo Wanta, George Soros and a group of Bush appointees who began to destabilize the ruble. They fronted $240 billion in covert securities to support the various aspects of this plan. These bonds were created from a secretive Durham Trust, managed by ex-CIA officer, Colonel Russell Hermann.
Shortly before the attempted coup of 1991, Maxwell met Viktor Kruchkov, another Russian operative, on Maxwell’s private yacht. Shortly afterwards, Maxwell died mysteriously on his yacht, while Senator Tower died in a plane crash under suspicious circumstances in April of 1991.
In the meantime, Riggs Bank was quickly solidifying banking relations with two of the old Iran-Contra scandal participants: Swiss bankers Bruce Rappaport, and Alfred Hartmann. Through this group, George Soros opened a second front assault on the ruble. It is at this stage of the operation that three more groups would be brought into the plan by Rappaport and Hartmann: The Russian Mafia, the Israeli Mossad, and the Rothschild family interests represented by Jacob Rothschild.
Soros and Rappaport would ensure that the Rothschild financial interests would be the silent backers for a number of the undisclosed deals. The Rothschild interests would also be seen on the board of directors of Barrick Gold.
The Enterprise (Bush rogue CIA) worked on several fronts to take over key energy industries. On the Caspian front of this economic war, James Giffen was sent to Kazakhstan to work with President Nazarbayev in various legal and illegal efforts to gain control of what was estimated to be the world’s largest untapped oil reserves – Kazak oil in the Caspian.
The illegal flow of money from the various oil companies would reach a number of banks. These same oil interests would engage Marc Rich and the Israeli Eisenberg Group, owned by one of the Mossad’s key operatives, Shaul Eisenberg, to move the oil.
Like the other events linked with Project Hammer, the coup was all about the money. The coup began the dissolution of the Soviet Union and the beginning of the reign of Boris Yeltsin and his ‘family’ of Russian Mafia Oligarchs, and President Nursultan Nazarbayev of Kazakhstan.
In the final phase, a series of operatives assigned by President George H. W. Bush would begin the takeover of prized Russian industrial assets in oil, metals and defense.
The Central European Development Corporation combined forces with George Soros and the NM Rothschild Continuation Trust and this group ended up controlling Gazprom, the Russian natural gas giant, while the Riggs group ended up controlling Yukos, the oil giant. Ownership for both remains largely hidden to this day. Meanwhile, across the Caspian Sea, Bush had assigned a wide array of former Iran-Contra operatives to take a role in Azerbaijan.
Initially, Bush sent in the covert operatives Richard Armitage and Richard Secord who worked with their old colleague from the Mossad, David Kimche, and their old arms running colleagues Adnan Kashoggi and Farhad Azima to hire, transport, and train several thousand Al Qaeda mercenaries to fight on behalf of the Azeri freedom fighters. Osama Bin Laden was part of this mercenary force. Eventually, Azerbaijan would become the home of the Vulcans and the headquarters for much of the rogue CIA operations.
As a result, investigative agencies from Britain, Switzerland, Russia, Kazakhstan and the Philippines put pressure on Congress and the U.S. Department of Justice to open up the accounts in these crooked banks that were used to finance these covert activities.
Emboldened by the lack of consequences for subverting the U.S. Constitution and breaking international law during the Iran-Contra scandal, Bush’s Vulcans planned a bigger drive to crush the Soviet Union. They waged war against the Soviet Union and Iraq under George H.W. Bush, and against Iraq and Afghanistan under George W. Bush.
Members belonging to this group were:
Jonathan Bush and Mitt Romney were “junior” Vulcans who worked in America to launder the fleeced funds from Riggs-Valmet.
The Vulcan’s drive to bring an end to the Cold War was fueled by a covert war chest invisible to congressional oversight known by the names, the Durham Trust or Project Hammer. These same Vulcans would be brought back to power in 2000 under the administration of President George W. Bush.
The covert operations conducted by the Vulcans involved securities fraud, money laundering and violation of Foreign Corrupt Practices act. While accomplishing its objective – bringing about the demise of the Soviet Union – the program also seems to have lined the pockets of the individuals that executed this policy, at US taxpayer expense.
The covert securities used to accomplish the original national security objective of ending the Cold War ended up in the vaults of the brokers in the World Trade Center, and were destroyed on September 11, 2001. They came due for settlement and clearing on September 12th. The federal Agency investigating these bonds – The Office of Naval Intelligence – was in the section of the Pentagon that was destroyed on September 11.
The preceding picture that we have painted for you is sick and disgusting. It is little known by the average citizen, but it is well-known by career politicians who hope to join the Bush Criminal Cartel that acts with complete impunity while being guarded from prosecution by their cronies in the DOJ, FBI, and the justice system. Bill and Hillary were chosen early on to be “family members” because of their enthusiastic participation with the Iran-Contra Affair that ran planes and drugs through Arkansas with the help of Governor Wild Bill Clinton.
The Bush family “adopted” the Clintons in the 1970s and have been bonded ever since. Bill and Hillary were reckless and careless in their grab for power. Many people have been murdered to cover their trails of crime. Obama was co-opted when George Soros chose him over Hillary to become president. Obama showed his loyalty by continuing the Bush agenda while preparing the now-failed coronation of Hillary Clinton as Queen of America and the world.
When you say Clinton, Obama, or Romney you might as well say Bush!
George H. W. Bush was indoctrinated by his criminal father and grandfather and was well-trained by Allen Dulles (CIA) and his brother John Dulles (Rockefeller attorney, Secretary of State) and Edwin Pauley (oil baron) to be a refined and hidden corporate warlord CIA operative. The Clintons and Obamas showed no class at all and let all the secrets out, while Mitt Romney seems to be trying to draw attention to the crimes that have ruled the White House for decades through the Bush Criminal Cartel.
The newest adopted members of the Bush family just don’t have the criminal finesse that George H. W. Bush did when he proudly told the world in his United Nation’s speech that a New World Order would rule the globe and that he would personally make sure it would happen.
Do not be surprised that Mitt Romney may win the rigged Utah election for Orin Hatch’s senate seat.
If he wins, do not be surprised when Mitt becomes Trump’s number one enemy in Washington.
And don’t be surprised if later, Unfit Mitt runs for president against Trump. The Bush Criminal Cartel is losing grip since Trump came to power. They are desperate and have even called up their step-child, Unfit Mitt, to try to turn the tide of Trump victories over the globalists, the shadow government, the Clintons, Obama, and the so-called Deep State.
Unfortunately for Mitt – the Anonymous Patriots don’t forget, we know how to do deep research, and we are very committed to winning the Second American Revolution. Most important we now have an influential and global audience for our citizen intelligence reports, something that we didn’t have when Unfit Mitt ran for election in 2012.
This citizen intelligence report was just one of the many things we know about Mitt. Make sure to share this meme with your audience so that we can keep the Romneys on Google Page One.
We ask that alternative media outlets repost this article on their blogs and websites. We have noticed that the internet might be getting scrubbed of unsavory references to Unfit Mitt….probably in preparation for his Utah Senate run. He needs to get his squeaky clean Mormon look on again.
You see, scrubbing the net can actually backfire on you. Let’s say they scrubbed Romney’s name in connection with Riggs Banks so that we could never find out this information in an internet search.
What they actually did is to clear the space for all of us to drop a ton of truth bombs into cyber space. We all post this article in a hundred different locations – on your blogs, websites, threads, etc. Same article. Reposted. Then these multiple truth bombs will just “lay in wait”, landmines in digital space, for the time that a truth seeker searches ‘Romney – Riggs Bank’. Then.
We win the information battle because we own page one with the same article in hundreds of locations. They will never recover from the strike.
But each of you has to get off your butts and put the plan in place in your social network. Don’t have a blog? Then get a free, basic one on WordPress and start drawing an audience. People are hungering for truth. Use our headline suggestions, repost our audios or articles. Repost every single one of our highly researched citizens intelligence reports that is on our site.
Since we are all now addicted to the computer screen, smart phones and tablets, we might as well use it to fight for our freedom and liberty, instead of succumbing to our digital enslavement.
Trust us. An audience will come. You came to us…now didn’t you?
Most people know that a new president gets to name over 4,000 political appointees when they are elected. This political cronyism is partisan politics and fills our bloated government with unqualified employees.
Some think that these are the people that comprise the Deep State.
But the Deep State is much deeper than that.
There is a much more sinister system in place that controls Washington D. C.’s bureaucracies through an actual, organized shadow government called the Deep State.
It is the heart of the swamp.
And in this American Intelligence Media citizen intelligence report, we are going to show you exactly who they are and how we can remove them.
The Washington D. C. Deep State is a group of 8,156 appointed mangers in 75 federal agencies that control the executive bureaucracy and tell new political appointees what they can and cannot do. Yes, that’s right, the Deep State is an official government program, well-organized, comprehensive, and “in charge.”
Out of the 8,156 members who make up this Deep State of ensconced bureaucrats, over 7,000 were appointed by Obama.
These the are the “Obama Holdouts” that still control the executive branch of government a full year after Trump has come to office. Obama expanded the existing program of Deep State managers and appointed over 7,000 of the 8,156 bosses who are called the Senior Executive Service. Some call it the “Shadow Government”, and it is true that this federal cabal works in the shadows.
Have you ever heard of such a group?
Let’s review what we know about the power of “political appointees” who hold important leadership and policymaking positions.
There are four basic types of appointments:
The Senior Executive Service (SES) in 2016 had 8,156 members who were appointees. Obama appointed over 7,000 of them to these key positions. Most of these appointees do not arise from inside the respective agencies through a merit system and often are not qualified.
It is little known that there are many more SES appointees than any other type of political appointment. The “key bosses” in the federal government’s SES program are not only unqualified cronies, but they are also paid more than the highest government rate of G-15. They can even get bonuses, and each agency can set the salary of each SES member, which has no top range.
The Deep State – Shadow Government is a recognized bureaucratic function that pays the best salaries in federal work.
The Senior Executive Service plays a critical role in every presidential transition, supporting and educating political appointees about how government works, and often temporarily serving in top agency jobs during the lengthy appointee confirmation and onboarding process. The article below describes the transition function of the SES.
From the way the State’s Senior Executive Service describes itself on its website and other publications and articles, you wouldn’t know that it is describing a shadow government, unless you looked carefully at what was actually being said and done.
The SES consists of men and women, noncareer and career officials, charged with leading the continuing transformation of government. SES officials are neither excepted nor competitive service appointments. SES appointees typically support officials with the implementation of current administration policies.
In reality, they are TODAY entrenched bureaucratic personnel who do the bidding of the Obama-Clinton regime and their globalist masters.
The SES was established by the Civil Service Reform Act of 1978 as an Executive Branch personnel system. SES members serve in key positions, just below the top Presidential appointees, and are the major link between senior officials and the rest of the Federal workforce. The two types of SES positions are General, which can be filled by any type of appointment, and Career Reserved, which can be filled only by a career appointment.
The following types of appointments may be made in the SES:
The Senior Executive Service covers most managerial, supervisory, and policy positions in the Executive Branch above grade GS-15, except those that require Senate confirmation. The SES is a system in which salary and career status are personal rather than dependent on the position occupied. There are two main types of SES positions: career-reserved (which must be filled by career appointees) and general (which may be filled by career or non-career appointees, or by limited-term or limited emergency appointees).
There were 8,156 SES members in 2016. To see the evidence for those facts you can access the government’s official 2016 SES Report at the following site:
To see a thorough description of the general rules and procedures of the Senior Executive Service from the official government website, use the URL below:
To read the government’s official description of the Senior Executive Service, you can access it at this site:
To read a beautiful sales-pitch for the best jobs in the federal government that require no experience, no skills, and yet get the highest pay of anyone, just go to this site:
On page three of the report below, you can see for yourself that the 2016 Senior Executive Services Report lists that there were 8,156 SES members in 75 federal agencies. These “bosses” can’t really be fired because they are in charge. This is a good deal for SES members who are appointed as the all-knowing and all-powerful bosses of agencies they might not have even known existed before they were put in charge of them. And it was a brilliant play for Obama to have left this corruptcracy in place for Hillary’s final overthrow of America, but now which can thwart the attempts of the Trump administration to get anything done.
Don’t be fooled by the lie that SES doesn’t exist in the FBI, DOJ, and State Department. There are “look-alike” senior management systems inside of some federal agencies that fill the exact same purposes and those systems are directly connected to SES. Even the Department of Defense has these Deep State appointees, though they officially claim they do not. You can see the proof that demonstrates their lies below:
Even though these SES key managerial positions are paid the best, you can hardly find a single SES member’s name on any list, anywhere. That’s why they call it the DEEP State. SES is a system of controlling power through secrecy, and acting with complete impunity – and getting a big salary to boot.
The only people’s names you can find associated with these Deep State operatives is through the SES review boards that determine each year what “BONUS” these already over-paid SES bosses will receive. Yes, you heard it right – bonuses, like those Wall Street bankers and brokers who got bonuses after crashing the stock market. Look as you will, you can only find a list of names of the people who give these shadow government managers their bonuses.
We provide at the link below, the government’s own website that lists the members of one particular Review Board. This SES Review Board is for the Department of Justice. Oops, if you read the prior attachments, you might have noticed that the government clearly states it is “forbidden” to have a SES system in the Department of Justice. Obviously, by the evidence below, you can see that there are SES members in the Department of Justice.
Don’t worry, just another Deep State lie to cover up the names of the SES shadow government. But we do have a list of the people who give raises to the SES members in the Department of Justic. Raises for these SES members who don’t exist but are the bosses.
It might seem easy to criticize the Deep State from an armchair geo-political perch, but even Main Stream Media and government agencies have noticed the SES and found fault with its performance and Obama’s huge push to make it work at any cost. In an article entitled, Can the Government Fix Its Corps of Managers? The Senior Executive Service isn’t operating as it was designed to do, from The Atlantic in January of 2016, an objective assessment finds the SES program to be lacking in many ways.
Forty years ago, Congress set out to fix the government’s broken bureaucracy. It worried that the political appointees who head federal agencies didn’t have solid relationships with the civil servants below them. So, it established a new corps of government
workers, called the Senior Executive Service, to be the executive branch’s expert managers, linking appointees to the rank-and-file. But today, a new report finds, the corps isn’t operating the way it’s supposed to be. And officials—from the Obama administration, to members of Congress, to the managers themselves—agree that they still haven’t perfected the art of running the federal government.
When the SES was created in 1978, Congress envisioned it as an “agile corps of generalists” who would “move about the government much in the way that military officers or foreign-service officers move through the military or the diplomatic corps,” said Jim Read, the director of policy and evaluation at the U.S. Merit Systems Protection Board, which produced the December report. They would bridge divisions within agencies and ensure continuity in operations across administrations, but first and foremost, they would be top-flight managers.
The SES, though, has drifted away from its original mission: The “agile corps” is not full of many generalists at all, and the senior executives receive little training to hone their management skills.
Congress hasn’t been blind to the SES’s deficiencies, either. As a 2012 Congressional Research Service report details, reformers have had their eye on the SES for years. The House Veterans’ Affairs Committee, for example, has gone after problems at the SES level at the VA. The government has been trying to reform the civil-service workforce for as long as it has existed. Forty years after its creation, many of the problems the SES was intended to solve persist.
The Deep State is deeper and wider than most people know, and instead of being hidden and secret it seems to be public and filled with well-paid Obama hold-overs. Unqualified, political appointees control the new Presidential appointees and the standard bureaucracy below them.
It is hard to believe, and may leave a person outraged, witnessing the audacity of career government employees and the corruption of the systems politicians have put in place. Deep State cronyism built upon graft and obfuscation fills the Senior Executive Service.
There is no need at all to have this Deep State shadow government, and these political, over-paid management positions should be filled by highly qualified staff through a comprehensive merit system, not appointed by a partisan president.
It is time to pull the plug on the Deep State’s mechanism that creates governmental programs and agencies that make no sense at all, unless these machinations are an attempt to overthrow the government that is supposed to work for We the People.
Feel free to share this meme below to your network of truth seekers. Let’s shine a bright light on this shadow government corruption.
As more intel is uncovered, we will post relevant info at the bottom of this article.
Above is a link to the men and women of the Senior Executive Services and the people, name by name, in each department across our government who are obstructing the will of the people to Make America Great Again, which includes indicting a whole bunch of criminals and traitors. Here is same document in PDF form: GPO-PLUMBOOK-2016
Thanks to the Anonymous Patriot who pointed us in the right direction and also told us:
“SES positions are non-bargaining and can be eliminated at any time. Meaning, Trump could fire 8,000+ people today if he wanted to. Once you leave ‘career’ positions for SES, you cannot return to your previous series.”
Of course, some have already been called out for sexual harassment, pedophilia, and theft, among others crimes. Some are just resigning, gathering up their off-shore monies and hiding, while other corporate Alpha Dogs are just moving to another position in the company in an effort to create distance from their crimes and possible plausible deniability before the second shoe drops.
The CEOs (corporate warlords) of some of the largest companies in the world have coincidentally “stepped down” at the same time that the first president in U.S. history formally announced a “national emergency” and a type of war against every criminal in America, the international corporate world, and every country and organization in the world that wishes to break U.S. laws, including the U.N. which Trump has already “called out” for its crimes and has begun to defund them.
Just look at the tidal waves that Trump recently caused in Saudi Arabia, Syria, Iraq, Turkey, Iran, etc. by simply announcing that America was now going to be moral and honest.
Does the phrase “too much winning” come to mind?
Trump has named 13 international criminals in his executive order (EO) whose funds and assets have already been seized. He also mentioned in the EO that there is an Annex list that names 39 other criminals and/or criminal organizations, including foreign nations.
Thus, every criminal in the world who has an off-shore account should be shaking in their boots. The U.S. Treasury can seize assets anywhere in the world and certainly have done so many times before through executive orders. But Trump’s new EO is the most comprehensive and all-encompassing war on transnational criminals ever written by a president.
The Anonymous Patriots explained to their subscribers what Eric Schimdt is up to with his continuing plans to take over the world after stepping down from being the CEO of Google. See audio below:
But when we see the CEO of Vanguard, one of the largest investment companies in the world with over 5 trillion dollars in managed assets, step down from the cushiest CEO job in the world – you know that Trump has the lawless corporate warlords extremely nervous.
These corporate warlords are covering their criminal trails like Hillary bleaching her server.
Decades of negligent government oversight of huge transnational corporations, like Vanguard and Google, have lead the CEOs to be very careless in their crimes which created a long and clear trail of evidence that was ignored by the Daddy Bush / Clinton / Bush Jr. / Obama administrations. Crime had become a way of life and the Queen of Thieves was ready to ascend the ultimate throne of crime – the White House.
The CEO of Vanguard, Frederick William “Bill” McNabb III, like hundreds of other CEOs simply got out while they could because they certainly know that they are guilty and could come to be identified as one of the already named Annex list 39 that are going down next.
Trump will be known in history for bringing back the “rule of law” to a country that had already been sold out to the highest transnational bidders.
Bill, Hillary and Obama sold America out to China, Russia, North Korea, Iran, the United Nations, to name a few, through criminal conspiracies.
International corporate warlords (including warlord brokers like Vanguard) sold America out for their own greed and control.
For instance, Vanguard is the largest investor in companies that have the greatest number of U.S. military contracts.
Vanguard is the “poster corporation” for the military industrial complex that sells war to both sides and profits double.
Vanguard is also a criminal enterprise that has been sued many times and has avoided approximately $65 billion in taxes through spurious means.
Vanguard is beyond a monopoly. They are the modern version of the U.S.S.R. centrally planned economy – in the full control of the Deep State rogue C.I.A. shadow government.
Vanguard is the largest stockholder in JPMorgan, Bank of America, Blackrock, Citigroup, Deutsche Bank, Goldman Sachs, Morgan Stanley, Royal Bank of Canada, State Street Corp, UBS, Wells Fargo–the best of the warlord bankers.
Vanguard is the largest stockholder in AT&T, Verizon, CenturyLink, Frontier Communications, T-Mobile—the best of the warlord telecoms.
Vanguard is the largest stockholder in 21st Century Fox, ABC, CBS, CNN (Time Warner), Comcast (NBC), Disney, News Corp, Viacom—the best of the warlord media companies.
Vanguard is the largest stockholder in IBM, Samsung, Canon, Intel, Google, Qualcomm, GE, Microsoft, LG Corp, Taiwan Semiconductor, Sony, Apple, Facebook, Amazon, Baidu ADR, Cisco, Dell/VMWare, Genentech, Juniper Networks, Netflix, Oracle, Twitter, Verisign, Visa, Wal-Mart, Xerox, Zynga—the best of the modern Internet warlords.
Vanguard is the largest stockholder in Abbott Labs, Abbvie, Amgen, Biogen, Bristol-Meyers Squibb, Eli Lilly, Gilead Sciences, Johnson & Johnson, Merck, Novartis, Pfizer, Roche—the best of the Big Pharma warlords (working to extinguish you).
Vanguard is the largest shareholder in BAE Systems, Boeing, General Dynamics, Humana, L3 Communications, Lockheed-Martin (second largest), Northrop Grumman, Raytheon, United Technologies—the best of the supreme warlords.
Frederick William “Bill” McNabb III has very good reasons to obfuscate his CEO decisions that were criminal. This type of criminal corporate behavior was accepted as “standard operating procedure” during the Clinton/Bush/Obama administrations, which condoned unregulated corporate fleecing of America that was not policed by the criminally compromised Department of Justice.
To Frederick William “Bill” McNabb III, prior CEO of Vanguard, and Eric Schimdt, prior CEO of Google, and the other hundreds of CEOs “stepping down” from positions at the top of the corporate pyramid, we have a message for you — You can run but you cannot hide!
When you look at the shareholders of the largest corporate military contractors, media companies, technology companies, patent holders, Internet companies, telecommunications companies, you find Vanguard.
Vanguard is a notorious warlord corporation that is owned by banks and a network of corporations who are all interconnected.
Trump is up against warlord brokers and bankers who own 43,000 transnational companies which comprise 60% of the world’s income.
The top 1,300 transnational companies generate about 20% of the world’s income, and 80% of the ownership of the top 1300 corporations is in the hands of 737 corporations world-wide. Of those 737 corporations, 147 corporations directly own 40% of the income.
These corporations in turn own industry, oil, weapons, perpetual military contracts, pharmaceuticals, food, telecom, IT and the other profitable companies – especially war related.
Essentially, these elite corporations own each other through shared stock and investments.
These transnational corporations have silently declared war on America years ago and were winning until Trump came to office.
Vanguard is an excellent example of the type of transnational criminal corporations (may we say pirates) that Trump has declared war upon. He has already “kicked ass” (seized assets) and “taken names” (the Annex list of 39). Interestingly enough, some of the names on Trump’s “naughty” list are good friends of Hillary and Bill.
The bottom line is basically that the CEOs jumping ship are simply letting Trump know that they are guilty and should be put on his “naughty” list, if they weren’t already there to begin with.
CEO McNabb has been involved in Vanguard’s many financial scams. For instance, by design, the Vanguard Group does not earn any profits, even though every other major mutual fund company does. This is an elaborate way of paying less or no taxes. In one case, Vanguard did not charge its own “member” investors $19.8 billion in investment fees in 2007 and did not pay almost $35 billion in taxes.
In June of 2017, Vanguard had to pay Brazil’s Petrobras shareholders $445 million over corruption charges. While Petrobras managed to settle with most of the shareholders out of court, a class-action suit in which plaintiffs claim tens of billions of dollars in damages remains active in New York federal court.
The Vanguard Group is not an independent company; it is owned by all the investors in Vanguard mutual funds, and one board of directors oversees both. Vanguard Group does not take a profit from the mutual funds it manages because of its unique structure. Making a profit matters because of a widely used tax dodge involving related companies, known as transfer pricing.
The goal of such maneuvers is earning “stateless income”, so-called because no government taxes the profit. This is tax evasion, plain and simple. Also, another scam at Vanguard is that nobody has any idea what anyone at Vanguard makes as salary. They can pay themselves whatever they want because it’s a “black box without any disclosures.”
Does Vanguard sound like a corporation that might be, or need to be, on Trump’s Annex list of 39 criminals?
The 200 or more corporate CEOs who have recently resigned might just be the tip of the iceberg. Trump has upset the applecart of DC lawlessness and the criminal apple venders don’t know which way to run first to pick up their apples.
More and more it appears that the Art of the Deal may actually be the Art of War.
#ibmer-kappos-to-uspto" target="_blank">On Aug. 06, 2009, IBM’s chief intellectual property counsel David J. Kappos was appointed director of the U.S. Patent Office by Barack Obama in a rare recess appointment. Notably, Kappos had to quickly sell off his up to $2.5 million in IBM stock in one month between Aug. 19 – Nov. 16, 2009.
A week later Kappos hurriedly purchased up to $1.1 million in Vanguard mutual funds, on Oct. 27, 2009.
Two weeks after Kappos bought Vanguard exclusively, Facebook filed a complaint with Kappos’ new Patent Office.
They asked Kappos to invalidate Leader’s patent on social networking using a bizarre “reexamination” provision that is being tested right now at the U.S. Supreme Court is nakedly unconstitutional since it takes back property rights already granted. The “reexamination” concept was promoted by none other than Leader Technologies former patent attorney James P. Chandler, III in the mid-1990’s under Bill Clinton.
Facebook subsequently lost these invalidation arguments three times before asking Kappos a fourth time to invoke never-used directorial power to invalidate the patent just before he departed in 2013.
As readers can see from the table below, Vanguard is now Facebook’s largest shareholder.
Vanguard is now IBM’s largest shareholder where Kappos worked from twenty-five years.
Vanguard is the largest shareholder for all of Facebook’s initial public offering underwriter banks.
IBM is the largest holder of patents in the world.
Remarkably, the 12 largest patent grants in 2016 are ALL members of the IBM Eclipse Foundation. Eclipse was used to distribute Leader Technologies’ social networking invention to these companies after its formation on #ibm-eclipse-formed" target="_blank">Nov. 29, 2001.
As described earlier, Vanguard is the largest shareholder in ALL of the chief beneficiaries of Leader Technologies’ social networking invention..
No. of Patents Issued in the year:
No. of Patents Issued in the year:
IBM Eclipse Foundation Member:
The Vanguard Group holdings in the Company:
|Bank of America||Facebook underwriter||Yes||Largest|
|Deutsche Bank||Facebook underwriter||Yes||Largest|
|Goldman Sachs||Facebook underwriter||Yes||Largest|
|Morgan Stanley||Facebook underwriter||Yes||Largest|
|Royal Bank of Canada||Facebook underwriter||Yes||Largest|
|State Street Corp||Facebook underwriter||Yes||Largest|
|Wells Fargo||Facebook underwriter||Yes||Largest|
|21st Century Fox||Yes||Largest|
|CNN (Time Warner)||Yes||Largest|
|Johnson & Johnson||Yes||Largest|
* Largest Samsung shareholder: Capital Research and Management Company
Sources: Intellectual Property Owners Association; Morningstar.
“The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country.” Edward Bernays, Propaganda
The Anonymous Patriots have been asked to recap the methods that broadcasters use to control people through televisions, radios, cell phones, and computers. We have written prior Citizens’ Intelligence Reports on these important topics. Here, we update and refresh our intelligence report on the many weapons that are being used to “dumb” people down enough to accept political, military, and corporate propaganda without questioning the nonsense, lies, and post-truth politics that spew forth from every propaganda, corporate, main stream media outlet.
Warning: Do not read this article if you are not ready to confront evil in some of its very ugly forms. The military/corporate warlords are engaged in a battle to steal your willpower, your hard-earned income, and your political opinion. They want to turn them into never-ending commercialism, banal and immoral entertainment, and post-truth politics that are frankly not believable without the subliminal messaging and overt mind-control.
They are attempting to control human thinking until “free thoughts” are wiped-out. The cyber-war is actually a fight for control of your soul and spirit, and the weapons being used against us are in our very own hands at the end of our fingertips, and in our home, workplace, and environment, blaring from every television, computer, and radio.
We must learn the methods of our enemies so that their tricks, scams, and mental manipulation can have no power over our soul and spirit and the human right to have “free thought” without being controlled by the overlords of technology.
A new technological revolution is taking place and each person on the internet will be affected. Many will fall prey to this information weapon that will be used against us to control our lives. For those on social media like Facebook, or those that have bought into using the Internet of Things, your life is about to change radically as you believe you are becoming more “free” by the machines that serve you, when in fact, you have willingly become imprisoned through the internet.
The more you participate in the automatic information fed directly to your machines that have personalized your news, entertainment, business, and “life-patterns”, the more you will think you are free and fully informed. But in fact, you will be limited by what your pattern-of-life generates as your individualized algorithms as a mechanical virtual world which will be created around you and becomes your personalized “digital prison” that you happily accept because it seems like a digital heaven to you.
Have you been lolled into dreaming sleep yet? You will be.
Your new digital prison is being created for you every time you do an internet search, click a like button on Facebook, type a word into your computer, choose something to watch on TV, or even speak a word into your phone. Every speck of “information” that you participate in is used to make your personalized digital life-pattern profile – your “dark profile.”
Even your bank account and everything you spend a digital penny on is being gathered in an NSA program called Marina that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone “pings” in the route and distance to your destination automatically.
Your phone can also activate the controls of all your devices that can be connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker brews a coffee and your TV comes on to your usual show as the heating pad in your easy chair turns on to your favorite setting. There is no end to the “machine intelligence” support you can get from mechanically augmented reality.
Not enough for you? Then put on your 3-D visor and enter your self-created virtual reality world where it feels you are free to do as you please – seemingly, a type of virtual freedom.
Can you see where this is going in the future? The future is here today because all the things just described have already been created and are ready to be offered to every American with an internet connection and the money to upgrade to the new Google called Alphabet. Eric Schimdt, the CEO of Alphabet has bragged about this new system that he says is ready to go.
Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that they are simply having fun. Since most American businesses have some component on the internet, the military weaponization of the internet may be as powerful as the threat of global nuclear annihilation.
Just imagine if the internet were turned off tomorrow for good – permanently, never to return. Most of what we think of as modern life would end and many people would never recover. Economies would collapse, wars would rage, and children wouldn’t know what to do or what to think.
Modern life would collapse because the weapon of the internet already has control of modern life.
We need to see the internet and its “wonders” for exactly what they are – weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools we initially believed they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by entertainment, religion is replaced by consumerism, and the real world in replaced by virtual reality.
Taxpayers of the United States, through the CIA’s advanced research and development company In-Q-Tel, funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized these devices and systems against the citizens of the world.
Once the Silicon Valley high-tech “dummy” companies are established by stooges chosen for their willingness to incorporate military “back doors” into all their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every devise that broadcasts a signal – cell phone, computer, television, or any devise on the Internet of Things.
Intelligence agencies can simply type in a query and access the metadata collected from every digital devise on the internet or that uses wi-fi or cell phone towers. This information is then used to target individuals for consumerism and/or U.S. Department of Defense intelligence collection. If an internet user is targeted, there are hundreds of ways to attack the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.
The object of the intelligence is simply to control the user. Social networks on the internet are military experiments in social manipulation, what the military calls PSYOPS – or psychological operations.
One of the NSA programs used to gather the Internet metadata is XKeyscore, a secret computer system first used by the National Security Agency (NSA) for searching and analyzing global Internet data, which it collects on a daily basis.
It enables almost unlimited surveillance of anyone anywhere in the world. The NSA’s databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data.
Another component of NSA data collection is a program called Marina that is a database and analysis toolset for intercepted internet metadata. The database stores metadata up to a year. The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of the target and of the more distinguishing features and can look back on the last 365 days’ worth of metadata seen by collection system, regardless whether or not it was tasked for collection. The stored metadata is mainly used for pattern-of-life analysis.
US persons are not exempt because metadata is not considered data by US law (section 702 of the FISA Amendments Act).
Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation. This program is developing billions of individual nodes (prisons) to reflect every man, woman, and child.
It will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. SWS provides an environment for testing Psychological Operations (PSYOPs), so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners (US citizens).
SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.
These three programs, XKeyscore, Marina, and Sentient World Simulation create some of the environments which intend to imprison and control those who willingly enter the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even “neutrals” are the target of these systems. No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet.
Just look how President Donald Trump is using Twitter as a weapon against the Main Stream Media. There is a battle for information and every person is in the middle of the battle whether they like it or not. The only question is whether you will be manipulated or not, which unless you are a hermit, you will be manipulated. So the real questions is – to what extent?
The largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Mastering the Human Domain.” This title of the exercises should indicate to you where the US military is focusing its time and energy these days – on US citizens. It also clearly tells us what the intent of the US military is – to Master the Human Domain.
In 2001, under the Total Information Awareness Program, President Bush had secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants. This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Donald Rumsfeld’s Information Operations roadmap advocated that Pentagon strategy “should be based on the premise that the Department of Defense will ‘fight the net’ as it would an enemy weapons system.” The US should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.
As of 2006, the CIA’s SAIC (Science Applications International Corporation) had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.
Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoors so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.
The Highlands Forum (controls DARPA-In-Q-Tel) directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA.
DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war, from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel micro-processers, Cisco routers, Google search engines, Facebook-like social networks, the Internet of Things, cell phones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.
Over five thousand patents have been legal confiscated (stolen) by the US patent office and give to DARPA/In-Q-Tel for further development and weaponization. Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place. If an inventor of a patent that is confiscated by the US Patent Office tries to continue work on the patent, that inventor may end up in jail. There are US patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens “national security.”
For more detail on the corruption of the US Patent Office, please see our blockbuster report here:
Once DARPA had created the ARPANET and it proved to be extremely effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allows a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.
The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor puts millions of customers and their private information at risk and jeopardizes the security of electrical power facilities, public utilities, and transportation systems.
Inside every Intel microprocessor is a smaller processor that lets Intel – who works for the Department of Defense – control every aspect of your computer remotely no matter what encryption codes you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.
It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary. Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel “Inside” your computer.
Intel collects “intelligence” but it also provides a “back door” to control, or “turn off” your computer at will, just like it has been demonstrated that Cisco routers have a “back door” open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.
See our detailed citizens intelligence report on Intel here:
In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.
In-Q-Tel contracts almost all its work through SAIC (Science Applications International Corporation) that changed its name to Leidos in 2013. Leidos is among the top 10 largest defense contractors in the U. S. and has a symbiotic relationship with the NSA and U. S. intelligence agencies.
The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tanks for inventing and the control of innovations that can be turned into weapons. Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.
The US intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by US intelligence to control information warfare.
In 1994, two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.
The NSA needed to control and monitor digital information, particularly the data flowing over the Internet. The government can “command” that any company must turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.
Under Google’s terms of service, the company advises its users that it may share their “personal information” with outside organizations, including government agencies. Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information.
No one checks whether DARPA inventions are moral, ethical, or humane. All military inventions, even if they advertise them as helpful, are weaponized.
Let’s take a closer look at the Highland Forums. The description below is taken from their website:
“Information Warfare, Information Operations, Information Assurance, and Operational Resilience Information is an instrument of national, global, and corporate power. As such, control over its use, its protection, and its manipulation, are national and global security issues. This Research Program examines strategic and tactical offensive and defensive aspects of information operations (IO) by state and non-state actors to achieve political, military, and economic goals through IO means, including computer network operations (CNO), computer network attack (CNA), computer network exploitation (CNE), computer network defense (CND), psychological operations (PSYOPS), perception management, media manipulation, propaganda, strategic influence, and public diplomacy, among others.”
In 1998, the CIA identified technology as a top strategic priority, and set out a bold and radical plan to create a new venture that would help increase the agency’s access to private sector innovation. In-Q-Tel was chartered in February 1999 by a group of private citizens at the request of the Director of the CIA and with the support of the U.S. Congress. In-Q-Tel was tasked with building a bridge between the intelligence community and a new set of technology innovators. Eventually, In-Q-Tel evolved into the Science Applications International Corporation (SAIC).
Leidos, a joint spin-off of Science Applications International Corporation (SAIC), is an American defense company headquartered in Reston, Virginia, that provides scientific, engineering, systems integration, and technical services. Leidos works extensively with the Department of Defense (4th largest DoD contractor FY2012), the Department of Homeland Security, and the United States Intelligence Community, including the NSA, as well as other US government civil agencies and selected commercial markets. On September 27, 2013, SAIC changed its name to Leidos and spun off a $4 billion government services and information technology company, which retains the name Science Applications International Corporation.
In March 2001, SAIC defined the concept for the NSA Trailblazer Project.Trailblazer was a continuation of the earlier ThinThread program which was a project that the NSA pursued during the 1990s. The program involved wiretapping and sophisticated analysis of the resulting data. ThinThread was dismissed and replaced by the Trailblazer Project, which lacked privacy protections. A consortium led by SAIC was awarded a $280 million contract to develop Trailblazer in 2002.
Trailblazer was intended to develop a capability to analyze data carried on all communications networks. It was specifically intended to track entities using cell phones and e-mail. In 2002, NSA contracted SAIC for $280 million to produce a “technology demonstration platform” for the agency’s project, a “Digital Network Intelligence” system to analyze data carried on computer networks.
In 2011, the United States Department of Defense named cyberspace a new operational domain. The cyberspace domain provides critical capabilities that enable the military to conduct operations in all domains (Land, Sea, Air, Space, and Cyberspace). The US Cyber Command and the Military Services are working to integrate the cyberspace domain with the other operational domains in order to conduct military command and control and achieve “national security” objectives. To effectively integrate cyberspace operations, DoD requires situational awareness of the Mission, Network, and Adversary based on analysis of operational data to make timely and effective decisions.
It is official, every time you are on the internet, you are in a cyber war-zone as defining by the US Department of Defense. You are considered a “hostile actor” until neutralized.
The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, the NSA and its forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. The NSA has concluded that such cyber weapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.
Cyber warriors have already launched their first attack. The cyber-weapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm damaged about a thousand centrifuges used to enrich nuclear material.
But Stuxnet is only the beginning. The NSA has recruited thousands of computer experts, hackers, and engineering PhDs to expand US offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyber defense contractors. And more attacks may be planned.
On a remote stretch of desert in central Utah, the NSA has built a massive, 1 million-square-foot data warehouse. Costing more than $1.5 billion, the highly secret facility is designed to house upward of trillions of intercepted phone calls, e-mail messages, Internet searches and other communications intercepted by the agency as part of its expansive eavesdropping operations. The NSA is also completing work on another data warehouse, this one in San Antonio, Texas.
Microsoft shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.
Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies, in particular, must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order.
The document: Intelligence and Electronic Warfare Support to Psychological Operations is based upon Special Operations Forces Intelligence and Electronic Warfare Operations, Field Manual No. 34-36 published on 30 September, 1991, by Department of the Army Headquarters in Washington DC.
PSYOP missions are planned products and psychological actions in peace or war that are directed toward foreign enemy, friendly, and neutral audiences. The purpose is to influence attitudes and behaviors to achieve national political and military objectives.
PSYOP supports varied military, political, and diplomatic actions across the operational continuum. These missions can be strategic, operational, or tactical missions.
Strategic PSYOP missions are conducted at the national or theater level to advance broad, long-term psychological objectives in support of national psychological objectives.
By 2008, the NSA was effectively resurrecting the Total Information Awareness project with a focus on internet data-mining via comprehensive monitoring of e-mails, text messages, and Web browsing. We also now know that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid.
In 2009, it also emerged from a Google patent application that the company had deliberately been collecting ‘payload’ data from private wi-fi networks that would enable the identification of “geolocations.” In the same year, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security.
It is not just Google that is a key contributor and foundation of the US military-industrial complex – it is the entire internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the US intelligence community which sustain the internet and the telecoms infrastructure. It is also the myriad of start-ups selling cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community.
In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, who are principal investigators in the ‘Neurobiology of Narrative Framing’ project at the University of Southern California. Evoking Zalman’s emphasis on the need for Pentagon psychological operations to deploy “empathetic influence”, the new DARPA-backed project aims to investigate how narratives often appeal “to strong, sacred values in order to evoke an emotional response,” but in different ways across different cultures.
The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon’s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.
DARPA’s goal is to mine millions of American weblogs as part of its ‘neurobiology of narrative framing’ research. As the Pentagon’s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy.
It is important to remember that since Barack Obama added new language in the National Defense Authorization Act of 2012, Americans are now seen as possible terrorists and thus are military targets and enemies of the state, unless proven otherwise. In essence, all of the above cyberwarfare programs are being used on Americans indiscriminately and with ill intent.
The Patriot Act, later called the US Freedom Act is the exact opposite of its name – it takes away freedom from patriots and lets multi-national corporations and the “run-away military” use the American people as cyberwarfare testing grounds.
This fact is little known, that the US military is now allowed to act within the borders of America and target Americans as hostile war-actors (as the military calls us).
We are in an information war and the stakes are high – American freedom or military/corporate control. This battle wages while many people are complacent and perfectly happy with their addiction to their cellphone, the internet, and social media. Many mindless followers can’t wait until every electronic devise they own is connected to the Internet of Things.
The Internet is a weapon and it is our job to find out what the battle is all about and make sure that we retain our US Civil Rights and American freedom and liberty.
We must call out DARPA and In-Q-Tel for their patent thefts, continuous lies, and cyberwarfare manipulations and demand that taxpayer dollars that funded these evil weaponized tools be acknowledge and that those cyber-tools be turned over to Americans without the spy systems and information control systems attached.
We need a free and private internet and social networks that are not manipulated as a tool that intends to control our very thinking.
Remember that the intent is to “master the human domain” via the mechanical domain controlled by warlords who wish to take our freedoms away.
Below is a short list of DARPA/In-Q-Tel projects that have been declassified. This is just the tip of the iceberg. Just imagine, if they are willing to declassify programs about mind-control and psyops, what are the programs and projects that they are not willing to share with us. This list is daunting, frightful, and disturbing. It is not for the weak of heart but so many patriots have asked us to make the lists available again that we had to shine the flood lights on this criminal cartel.
Social Media in Strategic Communication (SMISC) program is an attempt to get better at both detecting and conducting propaganda campaigns on social media. SMISC has two goals. First, the program needs to help the military better understand what’s going on in social media in real time – particularly in areas where troops are deployed. Second, Darpa wants SMISC to help the military play the social media propaganda game itself.
The Pentagon is building a tool to identify social media propaganda campaigns that produces counter-spin through computer artificial intelligence.
Interactive Facial Recognition in Real Time – BBC facial recognition programs help predict the success or failure of television programming. In the past, the BBC has used its facial recognition technology, built by in-house startup CrowdEmotion, to track 4,500 faces as people watched show trailers to see what kinds of emotions the commercials produced. They’ve also looked at how hundreds of study participants react to programs like Top Gear and Sherlock. http://fortune.com/2016/02/13/bbc-ads-crowdemotion/
The company CrowdSight uses facial recognition software in real time. They advertise on their website: “Understand and Predict your Audience! Deliver Better Experiences by Knowing their Emotional Behavior and Engagement in Real-time. CrowdSight Software Development Kit (SDK) is a flexible and easy-to-integrate Crowd Face Analysis Software which allows you to gather real-time, anonymous information about your audience while they behave spontaneously in different life environments. Understand your audience emotional reactions and engagement towards your products, content and campaigns, and recognize important demographics such as age, gender and ethnicity, in real-time. CrowdSight works offline and on the most popular desktop and mobile platforms (Windows, Mac, Linux, iOS, Android).”
Visual Evoked Potential (VEP) – A VEP is an electrical potential recorded after a subject is presented with a type of visual stimuli. There are several types of VEPs. Steady-state visually evoked potentials (SSVEPs) use potentials generated by exciting the retina, using visual stimuli modulated at certain frequencies. SSVEP’s stimuli are often formed from alternating checkerboard patterns and at times simply use flashing images. SSVEP has proved to be successful within many BCI systems. This is due to several factors, the signal elicited is measurable in as large a population as the transient VEP and blink movement and electro-cardiographic artefacts do not affect the frequencies monitored.
Synthetic Telepathy and Silent Communication – In a $6.3 million Army initiative to invent devices for telepathic communication, Gerwin Schalk, underwritten in a $2.2 million grant, found that it is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech. Research into synthetic telepathy using sub-vocalization is taking place at the University of California, Irvine under lead scientist Mike D’Zmura. The first such communication took place in the 1960s using EEG to create Morse code using brain alpha waves.
Using EEG to communicate imagined speech is less accurate than the invasive method of placing an electrode between the skull and the brain. On February 27, 2013 the group of Miguel Nicolelis at Duke University and IINN-ELS successfully connected the brains of two rats with electronic interfaces that allowed them to directly share information, in #Brain_to_brain" target="_blank">the first-ever direct brain-to-brain interface. On 3 September 2014, scientists reported that direct communication between human brains was possible over extended distances through Internet transmission of EEG signals.
Sentient World Simulation – The DoD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR. Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.
“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners.” SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.
Insight Program – DARPA awarded a $14 million contract to SAIC for the DARPA Insight program, which is intended to help U.S. intelligence experts detect threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. The program seeks to fill gaps in current U.S. intelligence, surveillance and reconnaissance (ISR) systems that center on the inability to exploit and cross-cue several different intelligence sources automatically.
The DARPA Insight program seeks to develop integrated human/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors. SAIC experts will concentrate on these areas in building the Insight next-generation ISR analysis system.
SAIC experts will build model-based behavioral correlation, modeling, prediction, and threat network analysis tools that combine intelligence information across many different sources automatically to improve the efficiencies of multi-intelligence sensors. The company also will develop a unified data-management and processing environment that integrates new intelligence sensors and software algorithms.
EM fields and Hidden symbols – DARPA is revealing programs, which have existed for years, to develop methods and techniques to incept thoughts and ideas into the mind. They reveal how once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device.
Mind Control Project – The aim of this program is to remotely disrupt political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. The program, conducted by The Center for Strategic Communication, is based at Arizona State University.
This research aims to literally induce or disrupt the operation of narratives within the brain. In other words, this research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research has tremendous interrogation possibilities and could potentially be used to more successfully spread propaganda or stop political upheaval to an unsuspecting public. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects”.
Transcranial Magnetic Stimulation is a very powerful tool used to impair the brain functioning of individuals. See the videos below for a brief demonstration of the effects of TMS. http://youtu.be/XJtNPqCj-iA or http://youtu.be/FMR_T0mM7Pc
Once the research group determines which parts of the brain are associated with cognitive reasoning and narrative comprehension, they attempt to impair those sections in order to “create a fundamental basis for understanding how to disrupt or enhance aspects of narrative structure and/or brain functioning to minimize or maximize persuasive effects on subject proclivity to engage in political violence.
Once it is determined that disruption of certain portions of the brain can enhance persuasive messaging, individuals can be persuaded to do things they normally would not do and believe things they normally would not believe.
It offers the capability to induce or disrupt the operation of narratives in the brain, and develops the capability to induce narrative validity.
Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation.
Through extensive research, they may be able to replicate the machine’s brain disrupting functioning simply through carefully crafted and researched persuasive messages and propaganda. With enough data, the government could spread propaganda through the media that people will almost automatically believe, whether it is true or not.
In terms of interrogation possibilities, Transcranial Magnetic Stimulation can be forced upon individuals to make them believe certain things, say certain things, and perhaps admit to acts they did not actually commit (as the TMS can induce narrative validity), or commit acts they normally would not commit.
The Brain Project – This area of study has received $100 million in funding via Obama’s ten-year BRAIN Project, as well as a $1.3 billion commitment from Europe. Concurrently, there is heavy military funding through agencies such as the Defense Advanced Research Projects Agency (DARPA). This raises the question of transparency when a “black budget” often justifies total secrecy in the name of national security.
Neuroscientists Successfully Plant False Memories – MIT neuroscientists have shown that they can plant false memories. They also found that many of the neurological traces of these memories are identical in nature to those of authentic memories. Most of the research in this area currently revolves around how to induce and eliminate fear. The study also provides further evidence that memories are stored in networks of neurons that form memory traces for each experience we have. Scientists already know how to set off an emotional response in combat veterans by simulating a specific set of frequencies that have become associated with wartime experience.
Total Information Awareness – Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. We now know that PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook, and was later leaked by whistleblower Edward Snowden.
Evidence Extraction and Link Discovery program (EELD) – Sole purpose is to gather as much information about both terror suspects and average American citizens as possible, using phone records, computer searches, credit card receipts, parking receipts, books checked out of the library, films rented, and more. Goal is to assess megadata on 285 million people a day in real-time.
Scalable Social Network Analysis (SSNA) – Program monitors telephone calls, conference calls, and ATM withdrawals … also sought to develop a far more invasive surveillance technology.
Activity Recognition and Monitoring (ARM) – With England’s CCTV surveillance cameras as a model, ARM created a massive database of people going about their everyday lives. Using advanced facial recognition software, the program highlighted any behavior that was outside the realm of a preprogrammed “ordinary,” the definition of which remains classified.
Deep Exploration and Filtering of Text (DEFT) – Operating on a $28 million dollar budget, this program utilizes advanced computer algorithms to analyze text-based messages in all shapes and forms, from text messages to reports, with the aim being to comprehend “implied and hidden meanings through probabilistic inference.”
Nexus 7 – With a classified budget, this particularly program studies and tracks social network content. First used in Afghanistan in a defense capacity, when aimed at domestic networks the use of the program is a mystery.
Narrative Networks Program – Developed classified techniques used to manipulate trust in humans. For its Narrative Networks (N2) program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind. The program was described as having two parts: first, to understand what happens in the human mind when someone sees or hears a message; second, to figure out how to control how the brain interprets the message.
Recorded Future – Using what they call a “Temporal Analytics Engine,” Recorded Future (RF) provides forecasting and analysis tools to help analysts predict future events by scanning sources on the Internet, and extracting, measuring, and visualizing the information to show networks and patterns in the past, present, and future. As of 2015 the engine was described as “Web Intelligence Engine Visible Technologies – social media monitoring.
Digital Reasoning – Since 2012, the firm has sold its Synthesys software to banks and hedge funds, including UBS and Point72 Asset Management. Financial institutions use Synthesys to scan internal e-mails within a given company in search of unfamiliar patterns between employees, in terms of word-specific content, frequency and interpersonal connections. The aim is to predict fraud before it occurs.
Palantir – Palantir Technologies, Inc. is a private American software and services company, specializing in data analysis. The company is known for two software projects in particular: Palantir Gotham is used by counter-terrorism analysts at offices in the United States Intelligence Community and United States Department of Defense, fraud investigators at the Recovery Accountability and Transparency Board, and cyber analysts at Information Warfare Monitor.
CallMiner – Phone speech analytics software
MASINT – Remote tracking, surveillance, and extraction of brain-waves typifying thought-forms, emotional states, analytic mind states, and others
Mohomine mohoClassifier – Organizes mass data
3VR – 3VR Inc. develops software enabling organizations to mine data from video. 3VR works with leading banks, governments, law enforcement and retailers at the moment.
Adaptx – Creates digital pens that speed up field data collection.
Basis Technology – Synthesizes the foreign chatter and provides software for text analytics in over twenty languages. They work primarily in applied natural language processing, deriving meaning from the ways people actually use language.
Cloudera – Large-scale data storage. Cloudera Enterprises is one of the most cost-effective ways for companies to securely carry out large-scale data analysis and storage.
FireEye –FireEye is one of the most advanced cybersecurity firms and specializes in protecting against botnet attacks and also works to combat the malware that brings computers into the network.
The Ember Corporation – Ember Corporation focuses on developing networking systems that simplify wirelessly networking low-power products. They’re focused on smart energy, remote monitoring, and remote control uses of their tech.
Infinite Z –Virtual-holographic simulation a reality through an interactive 3D environment.
OpenSpan – Makes software that enables organizations to see exactly what employees are doing on their computer: what programs they’re using, what progress they’re making, etc.
Seventh Sense – Develops health monitoring products that interface with human skin
Sonitus Medical – Makes a hearing system that transmits sound imperceptibly through the mouth. The SoundBite hearing system plays off the principle of bone conduction to transmit audial messages. A nearly invisible in-the-mouth hearing and communication platform is non-invasive and connects directly to the inner ear, allowing the user to hear transmitted messages through their skull.
Spotter RF – Makes super-powerful radars in a handheld form that can track a person walking anywhere within a 148 acre space, and it’s handheld.
Visible Technologies – Extracts business solutions from social media chatter with software that allows users to extract business value from social communities, and also give customer insights for brands online.
Walleye – Makes handheld devices that can see into and through solid objects
Real-time Contextual Overlays for Live Streams – A system and method for contextualizing and live-updating overlay data for live media streams. Overlays can be generated in real-time and in response to live events. US 20130311595 A1 November 21, 2013. Google Inc.
Method and Apparatus for Remotely Determining Emotional States – A waveform energy having a predetermined frequency and intensity is generated and wirelessly transmitted towards a subject. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured for evaluating criminal intent in security sensitive areas. US 5507291 A – April 5, 1994
Sounds of Silence – The Silent Subliminal Presentation System (SSPS) – Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which nonaural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude – or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent#5,159,703
Flame – The program is able to turn on a target’s Web cam and record video remotely and without detection.
Multidisciplinary Research Program of the University Research Initiative (MURI), Recognize/predict social contexts, relationships, networks, and intentions from social media, taking into account non-verbal communication such as gestures, micro-expressions, posture, and latent semantics of text and speech. Create algorithms for prediction and collection of latent signals and their use in predicting social information.
Beware – Analyses people’s social media activity, property records, the records of friends, family or associates, among other data, to assign suspects a so-called “threat-score.” That “threat-score” can then be used by police to pre-judge if a suspect is going to be dangerous, and to adapt their approach accordingly.
Iraqi Silent Sound Program – US Psy-Ops teams set up FM transmitters, utilizing Iraqi frequencies and overpowered the local station. Along with patriotic and religious music, PsyOps transmitted “vague, confusing and contradictory military orders and information.” A sophisticated electronic system designed to ‘speak’ directly to the mind of the listener; to alter and entrain his brainwaves, to manipulate his brain’s electroencephalographic (EEG) patterns and thus artificially implant negative emotional states – feelings of intense fear, anxiety, despair and hopelessness were created in the Iraqi troops. This effective subliminal system implants emotions in the minds of the targeted subject.
Nervous system manipulation by electromagnetic fields from monitors – US Patent and Trade Office, Patent #6,506,148 on subliminal behavior modification, 1/14/2003, United States Patent 6,506,148, Loos, January 14, 2003. Abstract: It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream. Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance.
Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal.
The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528 Filed: June 1, 2001
Total Information Awareness – Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook.
PRISM – A clandestine national security electronic surveillance program operated by the United States National Security Agency which can target customers of participating corporations outside or inside the United States.
Sounds of Silence – The Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude – or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent #5,159,703.
Turbulence – Turbulence is a National Security Agency information-technology project started circa 2005. It was developed in small, inexpensive “test” pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers.
Boundless Informant– A system deployed by the NSA to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States.
Bullrun– A highly classified National Security Agency program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).
Carnivore– A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications.
Fairview – A mass surveillance program directed at foreign mobile phone users.
Magic Lantern – A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications.
Main Core – A personal and financial database storing information of millions of U. S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources.
MAINWAY – A NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States.
MUSCULAR – Overseas wiretapping of Google’s and Yahoo’s internal networks by the NSA.
MYSTIC – Is a voice interception program used by the National Security Agency.
Room 641A – A telecommunication interception facility operated by AT&T for the U.S. National Security Agency.
Sentry Eagle – It monitors and attacks an adversary’s cyberspace through capabilities include SIGINT, Computer Network Exploitation, Information Assurance, Computer Network Defense, Network Warfare, and Computer Network Attack. The efforts included weakening U. S. commercial encryption systems.
Special Collection Service – A black budget program that is responsible for “close surveillance, burglary, wiretapping, breaking and entering.” It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.
Terrorist Finance Tracking Program – A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration’s “Global War on Terrorism.”
Multi-state Anti-Terrorism Information Exchange (MATRIX) – A data mining system originally developed for the Florida Department of Law Enforcement.
Insight Program – It detects threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. Develops integrated human/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors.
EM Fields and Hidden Symbols – Uses techniques to incept thoughts and ideas into the mind. Once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device.
Narrative Networks Program – Developed classified techniques used to manipulate trust in humans. For its Narrative Networks program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind.
Mind Control Project – Remotely disrupts political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects.” Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation. MIT neuroscientists have shown that they can plant false memories. Most of the research in this area currently revolves around how to induce and eliminate fear.
Who Really Owns the Military Industrial Complex explains more about the Highland Forum Group
The Real Energy Revolution Has Begun explains how patent theft has kept amazing technologies from reaching the consumer.
(DEC. 17, 2017)—On Dec. 13, 2017, Rod Rosenstein, Deputy Attorney General, testified before the House Judiciary Committee about the evident conflicts of interest within the DOJ/FBI’s Trump-Russia investigation.
His body language betrayed him. He is very evidently a subordinate covering for his real boss Special Counsel Robert Mueller, not Jeff Sessions and Donald Trump.
Rosenstein not so deftly refused to answer most questions.
Rosenstein refused repeatedly to comment when asked direct questions. Instead, he repeated the now hackneyed lawyer scam: “I cannot comment on an ongoing investigation.”
Rosenstein fidgeted with his notes, looked away, looked down, nervously laughed, smirked, glared, peered at the questioner from the corners of his eyes. Psychology experts say these are classic body language signals of deception. See for yourself: C-Span Video.
Before the hearing, DOJ Inspector General Michael E. Horowitz had leaked 375 salacious, anti-Trump texts between FBI chief of counterintelligence Peter P. Strzok and his lover Lisa Page, herself an FBI attorney in the Office of General Counsel.
The official line from Mueller’s office was that following the revelation of these anti-Trump texts, Mueller removed Strzok from the investigation, reassigned him to human resources, and sent Page packing to the Securities and Exchange Commission.
Political observers don’t believe Mueller’s stated reason since it is well known that all, or practically all, of Mueller’s team were anti-Trump. If he used that logic consistently for all his employees, he’d fire most of his staff. So, that cannot be the real reason.
National security experts are equally skeptical. They say such revelations of fraternization among FBI officials are by themselves grounds for immediate revocation of security clearances and dismissal, not simply reassignment and a slap on the wrist.
Remarkably, one of Horowitz’s letters of recommendation in his confirmation was from #page=146" target="_blank">David W. Ogden (24.1 MB), Assistant Attorney General. Ogden was also a close DOJ colleague to Robert S. Mueller, James B. Comey, Eric J. Holder, Jr., James P. Chandler, III,, Rod J. Rosenstein and Andrew Weismann.
Ogden argued successfully for the firing of Marine employee Michael J. Brown who was fired for an affair with a Marine major’s wife. This case did not even involve top secret clearances. Brown v. Department of the Navy, 229 F. 3d 1356 (Fed. Dir., 2000). So why haven’t Strozok and Page been fired?!
In short, Mueller’s softball treatment telegraphs that the real purpose for the leak appears to be to protect Strzok and Page. Experts are certain that Mueller is responding lawlessly to the leak and revelations of an affair among senior FBI officials.
Strzok has led just about every controversial investigation in recent years:
STRZOK: “TRUMP IS A F***ING IDIOT”
PAGE: “GOD TRUMP IS LOATHSOME HUMAN.”
Despite Strzok’s seething political bias, Mueller assigned him to the Trump-Russia election meddling investigation. Mueller is either an idiot himself, or calculating, and we don’t think he’s an idiot.
Strzok called Donald Trump an “idiot” multiple times. Page called him a “loathsome human.” Strzok wrote: “God, Hillary should win 100,000,000 – 0.” More concerning was their discussion on how to “protect the country from that menace.”
Their texts discussed a treasonous meeting in then Acting FBI Director Andrew M. McCabe’s office:
Later, Strzok edited James Comey’s Hillary Clinton exoneration letter from “gross negligence” (illegal) to “extreme carelessness” (not even a legal term).
Tellingly, Rosenstein seemed to explain away Strzok’s conduct by voicing the excuse that FBI agents are allowed their personal political opinions, and are professional enough to keep them separate from their work.
If you believe that personal political opinions don’t affect professional actions in this case, then you are the idiots, Messrs. Rosenstein and Strzok. Evidently, you picked each other to run this investigation, out of all the tens of thousands of capable attorneys. Your biases drove your decisions! Any reasonable person can see that clearly.
Rosenstein’s answer about private political opinions was too quick and rehearsed to be credible. At this stage, he and his cronies have lied so often that we are all wise to them now. Strzok said: “Just went to a southern Virginia Walmart. I could SMELL the Trump support…” By contrast, their stench wraps the planet.
For readers unfamiliar with texting shorthand ” ” is a wink and a smile.
Strzok said to Lisa Page “I’m a single-issue voter. Espionage Machine Party.”
There we have it: an admission of the treasonous actions of the American surveillance state.
Strzok has used his position of public trust to attempt to control American politics and reinforce his job as the chief of counter espionage.
Here we have the FBI’s counter espionage chief admitting that the FBI’s “Espionage Machine Party” is the only real power in America.
“Espionage Machine Parties” in history had names like The Third Reich, the Soviet Communist Party, The Maoist Party.
We have just learned that our long-time FBI Chief of Counterterrorism, Peter Strzok, has been working with Mueller, Rosenstein, Chandler, Comey, Holder, Obama and many others to establish America’s secret espionage machine as the controlling political party.
We also learned that they loath average Americans along with our President.
Rosenstein deferred repeatedly to a coming January 2018 report from the DOJ Inspector General.
Tellingly, Rosenstein emphasized that Horowitz had a $100 million budget, telegraphing that the report would be massive, full of redactions and unintelligible to the smelly Deplorables at Wal-Mart.
AFI corruption researchers have observed that the more pages a government “finding” generates, the more corrupt the agency.
Like Rosenstein’s betrayed body language, his deference to all-things-Horowitz telegraphed that they are going to dump a whopper of meaningless nonsense. We’ve got your numbers boys and girls.
Michael Horowitz’s own Senate Confirmation Hearing statement itself proves he’s Deep State shadow government stooge.
Senior judiciary nominees often testify to the Senate Judiciary Committee prior to their confirmation.
Confirmation is generally a given, but not universally. Prior to a confirmation hearing, the nominee must prepare a “Statement” where he or she answers specific questions about their background. They must describe in great detail their past employment, key accomplishments, significant events, publications, speeches, memberships, trusteeships, directorships, articles, media appearances, financial disclosure and significant relationships.
The Statement rules require nominees to certify that they will be ethical and avoid even the appearance of impropriety in their work for We the People.
Horowitz certified his commitment to be ethical his Statement, albeit in a backhanded way that is typical of these Deep State slime ball attorneys. He says he consults with unnamed others. He references an ethics agreement not submitted to the Senate (and can therefore be changed at any time since it does not go into the Senate record). He says he will follow the recommendations of unnamed other ethics people. Again, who can check?
This is outrageously deceptive conduct from THE very DOJ guy who spent ten years roaming the planet speaking on ethics and compliance!
Horowitz is a George Soros cut out—groomed at Harvard Law where Massachusetts Rep. Barney Frank (D) and law professor James P. Chandler, III were his handlers.
Horowitz has been mentored since Harvard Law School by key Clinton operative Rep. Barney Frank and James P. Chandler, III. In 2008, Frank received $2,875,000 from the Clinton Foundation (as a part of $549 million given to 154 Republicans recipients and 234 Democrats.) Original Guccifer 2.0 disclosure | Excel Spreadsheet Take Off
Horowitz traveled and worked the following countries during his speaking tours: Russia (2004, Oct.), Moscow, Russia (1998, Jul.) Beijing, China (1999, Sep.), Bangkok, Thailand (2002, Mar.), Capetown, South Africa (2000, Sep.), Sydney, Australia (2001, Sep.).
Horowitz changed law firms like clothing—6 law firms in 17 years, not counting his 9 different positions within the Department of Justice. He changed jobs about every 18 months! These sorts of too-good-to-be true resumes almost always telegraph a person who is being groomed by the powers that direct him or her.
For almost a decade Horowitz engaged in a break-neck speaking schedule around the planet. Ostensibly as a private citizen, he trained judges and lawyers on the subjects of sentencing guidelines, compliance, ethics, Sarbanes-Oxley and liability avoidance. He did this all the while Bill Clinton roamed the planet raising money for The Clinton Foundation and using Secretary of State Hillary and Obama’s State Department for pay-to-play.
On Jan. 29, 2011, Rep. Barney Frank was captured on video at the World Economic Forum (Davos) kibitzing with George Soros and Bono—two known New World Order globalists.
Exactly six months later, on Jul. 29, 2011, Obama nominated Horowitz to be DOJ Inspector General.
Horowitz’s law firm Cadwalader, Wickersham & Taft LLP has well-known New World Order globalist companies as clients, including Bank of America, Barclays, Deutsche Bank, JP Morgan Chase, Microsoft, Morgan Stanley and Qualcomm. (See relationship below.)
Qualcomm (the primary wireless technology provider that embeds Deep State encryption NSA/C.I.A. backdoors) was a member of Barack Obama’s “Technology CEO Council,” and Obama made a special secret visit to Qualcomm in San Diego in Air Force One on Oct. 9, 2017.
Microsoft began sharing personally identifiable user data on Americans to the NSA on Jun. 6, 2013. See whistleblower Edward Snowden NSA slide.
Horowitz’s Cadwalader Law other clients including Bank of America, Barclays, Deutsche Bank, JP Morgan Chase and Morgan Stanley were primary underwriters and beneficiaries of the fraudulent Facebook initial public offering on #criminal-facebook-insider-selloff" target="_blank">May 18, 2012, among others.
Horowitz has worked for and with Robert Mueller, James Comey, Eric Holder, Pretinder Bharara, James Chandler and Rod Rosenstein at the Department of Justice in various capacities between 1991-current. Here’s a summary from Horowitz’s Confirmation Hearing:
Horowitz declared his net worth at almost $10 million in 2011. Genius or insider trading. See earlier links for Horowitz’ Senate Confirmation Hearing testimony.
Horowitz cannot even remotely claim to be impartial in the Trump-Russia investigation.
Horowitz owes his legal career to George Soros, Bill & Hillary Clinton, The Clinton Foundation, Robert Mueller, Rod Rosenstein, James Chandler, James Comey, Preetinder Bharara and the usual cast of suspects attempting this coup against President Donald Trump.
Michael Horowitz must recuse himself or be fired forthwith from further work on the Trump-Russia investigation. His fraudulent manipulation of the rules by releasing the Strzok-Page texts insured that those two could not be prosecuted for that evidence since any trial would be tainted by Horowitz’s own hand. He protected them, which he will continue to do for all his cronies.
Michael Horowitz himself must be investigated for his failure to disclose his massive conflicts of interest with the Clinton et al camp, among other things.
And as we continue to remind all of our readers in our articles exposing the massive corruption in Washington, We the People hold a huge TRUMP CARD in totally destroying the cabal from the D.C. Swamp to the spies of Silicon Valley.
Ask President Trump to fund the alternative media via Leader Technologies’ Miller Act Notice. This would generate $300-500 billion per year in new revenue for the government without raising taxes, so investigations like this can start holding these corrupt public officials accountable in real time—rather than years after their crimes have done their serious damage to our Republic.
Audio discussion of Michael Horowitz below:
Many patriots are waiting for the DOJ’s Office of Inspector General to issue a scathing report on the corruption in D.C. Betsy and Thomas explain why we shouldn’t be expecting a knight in shining white armor to ride on to the political scene. The head of the OIG is Michael Horowitz and once you see his biography and hear what we have to report, it will be apparent to you that he is the ultimate “fixer” and witch hunter in the swamp.
Notices: Unless marked otherwise, American Intelligence Media (AIM), Aim4Truth.org, copyright claims are waived. Reproduction is permitted with or without attribution. This content and its links may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Fair Use is relied upon for all content. For educational purposes only. No claims are made to the properties of third parties.