American Intelligence Media

American Intelligence Media

alt

The American Intelligence Media is more than an alternative news site or a cutting-edge news aggregator. Citizens are rewriting history–real time, based on truth, not on the lies of the main stream media and government controlled propaganda. The mission of AIM4Truth is to archive the progress we are making as we find out who we really are and where we really came from and are headed.

Truth News Headlines November 18, 2017
Saturday, November 18, 2017 2:27 PM

Saudi ‘Corruption’ Probe Widens: Dozens Of Military Officials Arrested

.

The Saudi Purge is a Global Crisis

.

Tom Fitton on Al Franken, Election Integrity, Clinton Emails Discovered

.

Sarah Sanders Asked About Hillary Condemning Trump’s Sexual Behavior – Her Response Is A Flamethrower

.

The alt media’s favorite doctor, Dr. Ted Noel explains Nancy Pelosi’s medical ailments. 

.

.

The US Issues A Travel Warning For This Holiday Season

.

“Helpless, Raging” Charlottesville Families Shocked By These 2018 Obamacare Premiums…”It’s Horrific”

.

Next-Generation Crazy: The Fed Plans For The Coming Recession

“Think of the Fed – and the other major central banks – as a person who does a stupid but not necessarily criminal or pathological thing, and then starts committing ever-more serious crimes to cover up the original act. Each new atrocity is justifiable in the moment, since it keeps the perpetrator out of jail, but the later stages of the process seem criminally-insane to rational bystanders.”

.

JPMorgan Busted Laundering Money After Calling Bitcoin a Money Laundering Tool

.

Big Ag GAG: 29 states quietly pass “preemptive seed laws” that prevent debate and local government autonomy over genetically engineered crops

.

The Firestorm of Citizen and Civilian Revolt: Q Clearance Patriot #4chan #QAnon As you listen to Lionel explain how the alternative media has enlightened people in ways that corporate media and  government-run public schools have failed to do, let’s thank Michael McKibben who invented the technology that allowed scalability and maneuverability in the digital realm, which has birthed the internet of today, a totally unfettered information environment.
What doesn’t belong in this place of freedom and liberty are the energies of censorship, suppression, and tyranny. 
(This is a livestream so expect a bumpy ride.)

.

While filming the upcoming interview with Michael McKibben, innovator and chairman of Leader Technologies, Betsy pointed out that Michaelis the most relevant entrepreneur of our time. His amazing coding breakthrough permitted social media to bust wide open with unlimited scalability, giving us the unfettered, unlimited global connections that we know today.

Of course Michael knows this, as he explained to Betsy, “Anytime you see a log-in requirement, our technology is working in the background.”

Betsy replied, “Michael, your breakthrough, that was stolen by the IBM Eclipse Foundation, is definitely a blue ocean creation that all entrepreneurs dream of inventing.”

“Entrepreneurs around the world, especially my dear friends and colleagues in the Entrepreneur Organization and graduates of the Entrepreneur Masters Program, would love to hear your story of how you worked day and night with an amazing team of really smart engineers for several years, and hundreds of thousands lines of codes to create this breakthrough technology that would totally transform the internet landscape,” Betsy (Tyla) explained.

“Equally so, Michael, they would feel your deepest pain in spending hours of time, filled with hope and vision, to create a legacy for yourself, your family, your shareholders, and the world, only to have it ripped away by a corrupt patent system, which instead of protecting you as an American entrepreneur and innovator, left you isolated, disbelieved, and financially ruined.”

Entrepreneurs around the world realize that Michael McKibben created a blue ocean product. Because of his bravery in taking on the risk of creation and execution that every entrepreneur does when he or she launches their creative ideas into the world, we have all benefited from his technology.

Are you familiar with the Blue Ocean Strategy?

.

And if Michael’s breakthrough in technology wasn’t awesome enough, you should see what he has in mind for helping us break free from the cabal’s control of social media into a win-win program that benefits ALL humanity.

In the next few days you will hear directly from Michael in a blockbuster interview conducted by Douglas Gabriel, under the loving direction of Tyla Gabriel as she introduces you to two of the most interesting men in the world. Stay tuned.

.
Did you hear our warm-up interviews with Michael McKibben yet?

The Big Lie


Presidential Tweets Today

.


Weapon of Mass Intelligence

American Intelligence Media free app available on Apple and Android. Our app is a discreet way to check the day’s headlines and truth news. If anyone suspects that you are gathering intel, let them think that you are checking your tweets.

Truth News Headline posts do not stay on our website permanently. These are current events that are symptoms of the greater history that is evident in our deeply researched foundation articles. The daily headlines “float” on the mountain of evidence that we are amassing for the day of truth and reconciliation or judgement.
If you wish to read and research Truth News Headlines beyond our posting dates, please follow us by email. You will receive Truth News Headlines in an email format which can be saved for as long as you need them.


Truth News Headlines Evening November 17, 2017
Friday, November 17, 2017 9:40 PM

Wall Street Traders Used Chat Rooms To Rig Treasury Auctions, Federal Lawsuit Alleges

.

PUTIN & TRUMP COULD… SAVE THE WORLD.

.

FBI Informant in Clinton Uranium One Bribery Case has Video of Briefcases Full of Money!

.

Pelosi, Soros Headline Left’s Biggest Dark Money Conference

.

Ned Ryun on Roy Moore: ‘I Strongly, Strongly Suspect Somebody out of the McConnell Camp Planted the Story’

.

Fox News’ Shep Smith Methodically Debunks Uranium One Conspiracy Theories.

Fox News Viewers Demand Shep Smith be Fired After Error-Filled Uranium One Report: ‘Send Him to CNN’

.

Peter Schweizer on Fox and Friends discussing Uranium One

.

Judicial Watch: New Clinton Classified Emails Discovered

.

Sick Hillary Clinton, Still Wearing a Medical Boot, Propped up at Book Signing

These “medical boots” that we see politicians wearing remind us of wheel boots used to keep a car from being moved. 

.

.

Birds of a feather…..

.

Trump: Al Franken Groping Picture ‘Speaks A Thousand Words’

 .
.
.

How Uncle Sam Inflates Away Your Life

Remember, your life-savings is just that.  It represents your life.  Specifically, it’s stored up time you traded a portion of your life to earn.  So, too, it’s a measure of your financial discipline and ability to save and invest overtime in lieu of supersized spending.

When Uncle Sam confiscates your life-savings via the inflation tax something more is happening.  Not only are you being robbed of your money, you’re being robbed of your life.  Your life’s simply inflated away.  Poof!

.

Fusion GPS Founder Told Congress He Regrets That His Research Ended Up In Kremlin Hands

.

.

How to Recognize You’re In The 5th Dimension. In the video above, Ralph advocates being vegan, but this is not the path for everyone so please don’t feel that this is a requirement for elevated consciousness. Ralph also discusses the ethers about which you may want to know more. We recommend The Eternal Ethers: A Theory of Everything by Douglas Gabriel.

.

.


Presidential Tweets Today

.


Weapon of Mass Intelligence

American Intelligence Media free app available on Apple and Android. Our app is a discreet way to check the day’s headlines and truth news. If anyone suspects that you are gathering intel, let them think that you are checking your tweets.

Truth News Headline posts do not stay on our website permanently. These are current events that are symptoms of the greater history that is evident in our deeply researched foundation articles. The daily headlines “float” on the mountain of evidence that we are amassing for the day of truth and reconciliation or judgement.
If you wish to read and research Truth News Headlines beyond our posting dates, please follow us by email. You will receive Truth News Headlines in an email format which can be saved for as long as you need them.


Truth News Headlines November 17, 2017
Friday, November 17, 2017 1:24 AM

Texas Shifts Away From The Federal Reserve: State’s New Silver Gold Bullion Depository

“The facility will not only provide a secure place for individuals, business, cities, counties, government agencies and even other countries to store gold and other precious metals, the law also creates a mechanism to facilitate the everyday use of gold and silver in business transactions. In short, a person will be able to deposit gold or silver in the depository and pay other people through electronic means or checks – in sound money.”

.

Saudi Arabia Offers Arrested Royals A Deal: Your Freedom For Lots Of Cash

.

.

Nigel Farage VS George Soros

.

At this rate, there will be no one left in Congress or Hollywood.   Looks like Senator AL Franken is a breast man. Pictured are Joy Behar and Leeann Tweeden

.

Sylvester Stallone Accused of Sexually Assaulting 16-Year-Old Girl

.

.

In verifying this photo, we note that the meme editor may have flipped the horizontal perspective 180 degrees. In any event, this appears to be genuine. There are other photos of Weinstein with his wife, and Hillary speaking in the same dress.

.

Is Roger Stone the Mastermind Behind Al Franken’s Sexual Harassment Scandal?

.

FLASHBACK Donald Trump assembles Bill Clinton’s accusers before debate with Hillary

.

.

Yale’s Endowment CIO Has Some Really Bad News For Public Pensions…

.

.

Former Asst FBI Director Unleashes on Hillary, Crimes “20 Times” Worse Than Watergate

.

Identity of Secret Informant In FBI’s Clinton Probe Unveiled

.

Uranium One deal informant sued to recoup more than $700K lost in bribes

.

@caityjohnstone/ive-been-banned-from-facebook-for-sharing-an-article-about-false-flags-678c24358fde" target="_blank">I’ve Been Banned From Facebook For Sharing An Article About False Flags

.

MISTRIAL: Menendez Escapes Conviction After Jury Deadlocks

.

Nearly 30 million still without health insurance: report

. .

Raw notes from the Conclave. Tidbits that may interest Truth Warriors and help connect dots. 

.

#clinton-rwanda-pretext" target="_blank">See reference to Barrick Gold and the Rwandan massacre

… President George H. W. Bush served as an advisor to Tempelsman’s company, Barrick Gold Corporation. Barrick directors include: Brian Mulroney, former PM of Canada; Edward Neys, former U.S. ambassador to Canada and chairman of the private PR firm Burston-Marsteller; former U.S. Senator Howard Baker; J. Trevor Eyton, a member of the Canadian Senate; and Vernon Jordan, one of Bill Clinton’s lawyers. Barrick Gold’s mining partners have included Adastra Mining-formerly named America Mineral Fields (AMFI, AMX, other names), formerly based in, of all places, Hope, Arkansas, Bill Clinton’s hometown…

.

This record was unavailable anywhere online. A senior Conclave member dug it out of microfiche records in a state library, page by page.

See this link for the full PDF document: 1996-02-28-S-Hrg-104-499-Economic-Espionage-Hearing-before-Select-Committee-on-Intelligence-Subcommittee-on-Terrorism-Technology-104-th-Congress-Y-4-IN-8-19-S-Hrg-104-499

Prepared Statement of Louis Freeh [FBI Director]

ECONOMIC ESPIONAGE

Good morning Mr. Chairman and distinguished members of the committees. At the request of the committees, I am pleased to have this opportunity to appear before you to discuss economic espionage, and to provide examples of this serious assault on our nation’s intellectual property and advanced technologies.

I am also pleased that the committees have had the opportunity to consult with Professor James P. Chandler from George Washington University. I had the pleasure of meeting with Professor Chandler last week. He makes a most compelling argument for legislation to address a problem that he estimates is costing American companies billions of dollars, with over a million jobs lost from stolen intellectual property. His reputation as a national expert on economic espionage is well deserved and I think the committee will find his written testimony most convincing.

CITATION:

S. Hrg. 104-499. (Feb. 28, 1996). Economic Espionage: Hearing before the Select Committee on Intelligence United States Senate and the Subcommittee on Terrorism, Technology, and Government Information of the Committee on the Judiciary United States Senate, 104th Congress, Second Session, Feb. 28 (1996). Y 4.IN 8/19:S.Hrg 104-499, Serial No. J-104-75 (testimony of Louis Freeh acknowledging Professor James P. Chandler, p. 10). Last accessed Jan. 8, 2012  online at Internet Archive, USA Gov. Doc., Call No. 39999059839439 <http://www.archive.org/details/economicespionag00unit>.

.


Presidential Tweets Today

.


Weapon of Mass Intelligence

American Intelligence Media free app available on Apple and Android. Our app is a discreet way to check the day’s headlines and truth news. If anyone suspects that you are gathering intel, let them think that you are checking your tweets.

Truth News Headline posts do not stay on our website permanently. These are current events that are symptoms of the greater history that is evident in our deeply researched foundation articles. The daily headlines “float” on the mountain of evidence that we are amassing for the day of truth and reconciliation or judgement.
If you wish to read and research Truth News Headlines beyond our posting dates, please follow us by email. You will receive Truth News Headlines in an email format which can be saved for as long as you need them.


Trump Conquers the New World Order
Sunday, November 5, 2017 10:45 PM

Within a previous article, the Anonymous Patriots suggested a procedure for draining Washington’s stagnant, corrupt, quick-sand swamp. It was a to-do list for ending George H. W. Bush’s attempt to create a New World Order from within the White House that attempted to usurp the U. S. Constitution and Bill of Rights. In this article, we remind our readers of this list and give you an update on our progress.

Folks, we are winning. 

The White House mafia bosses that have come after Daddy Bush have all kowtowed to George senior as though he were King George of England. His deep cover C. I. A. leadership role in the assassination of J.F.K. has been thoroughly exposed as has his fleecing of the U.S.S.R. via his C.I.A. covert activities, the assassination attempt on Ronald Reagan, the Iran/Contra Scandal, the attacks on 911, and many, many other crimes that the corrupt FBI, DOJ, and Congress has refused to honestly investigate and swiftly prosecute.

They thought their evil would outlast We the People. But the Bush-Obama-Clinton criminal cartel has failed. Time is on our side, not theirs. Their entrenched and corrupt bureaucracies, agencies, and covert operations will be exposed, scaled back, defunded, and shut down over Trump’s eight years in office. The criminals will age, wither, and die, leaving only the carcass of their sins to be judged by history and a far higher power than our own.

We need to continue to educate and enlighten those around us so that we can keep up the daily momentum in destroying George H. W. Bush’s New World Order. We need to continue to stay focused on the dismantling agenda below:

Enforce the Rule of Law

Trump has started an all-out war in bringing back the rule of law and the rats are jumping ship. Even the worst (fake) criminal law enforcers and the top D. C. lawyer “fixers” like Comey, Mueller, McCabe, Brennen, Rogers, Clapper, Rosenstein, Weissman, and many others are taking up arms against a sitting president and trying every legal trick they can, but to no avail. D. C. criminals will be indicted and prosecuted while Trump remains invulnerable.

End All American Association with the UN

Trump has openly threatened to decrease the American contributions to the United Nations by 50% next year! He has already stopped funding UNESCO by a billion dollars. He has “called-out” the UN Refugee program as a fraud and pointed at the abuses of UN “peace keeping troops.” It looks like the UN will soon be a thing of the past.

Withdrawal from the Climate Accords

We advocated that America should withdraw from the five trillion dollar commitment to the Climate Accords, which we call “a fundraiser for Al Gore.”  Everywhere, the real data is now coming out that shows the $200 billion dollar fraud of climate warming, that was predicted to end humanity soon, is government sponsored propaganda and a scheme of redistributing wealth and destroying the middle class.

This pathetic lie was based upon fraudulent data provided by fake scientists who had to spew climate lies to get government grants for further research. Thanks, Donald, for saving America $5 trillion.

End all Globalist Accords

We hoped to see the end of all “globalist accords” that drain Americans through unjust federal taxes that are then redistributed to other nations through NAFTA, the Iran Nuclear Deal, TPP, TIPP, NATO, and many other organizations, treaties, pacts, and alliances. Trump’s Art of the Deal has saved the Republic from the transnational corporations that have been selling out America for decades.

Default on the Debt

No real change can manifest in the economic prison nation of America until the fake debt owed to the U. S. Federal Reserve is defaulted on after the Fed has been audited and all assets belonging to the United States of America are taken back from this fraudulent scheme to permanently entrap Americans in fake “war” debt.

It will take delicate care to investigate, audit, and gain control of the Federal Reserve system (a private corporation) and its central banks throughout the United States.  A complete audit of U. S. gold holdings and the gold holdings of all central banks in the U. S. will need to be coordinated at the same time. Once the Federal Reserve is audited and all its assets frozen by the U.S. Treasury, we recommend that the U.S. default on its debt to this corrupt private corporation.

In our plan, the Fed will declare bankruptcy and the U.S. Treasury will seize all assets of the Federal Reserve System, which includes twelve central banks throughout America. The gold, fiat currencies, and bonds will be given to the Treasury’s Exchange Stabilization Fund which already establishes U.S. monetary policy for the Federal Reserve.

The $24.5 trillion owed to the Federal Reserve will either be dropped in the bankruptcy or the Treasury can print useless fiat currency to pay the debt as they recently did for $4.5 trillion to cover the purchase of U. S. bonds being sold by China, Saudi Arabia, and other countries in “off book transactions.”

It is important to remember that ending the Federal Reserve will not crash the currency, bond, or stock markets. All three of those are controlled currently by the Exchange Stabilization Fund through back door trading done by the ESF and the U. S. Treasury. It has been proven that the ESF controls all three “free” markets.

As we have seen through the many gold, silver, and interest rate “fixing” lawsuits brought against the major international banks, the U. S. Treasury, U. S. Securities and Exchange Commission, and the U. S. Commodity Futures Trading Commission is aware that the markets are “fixed.” Billions in penalties have been leveled against these major banks for fixing the markets. The U.S. Treasury cannot allow markets to “run wild.”

Eventually, Trump can end U. S. fiat currency and create a new currency with a basket of commodities to back it up, including gold, silver, other precious metals, and commodities. The old “Federal Reserve notes” will become useless after a recall of old currency that weeds out money that has not been taxed – off shore accounts and tax havens.

This action immediately eradicates all off-shore tax-haven money, illegal drug money, stolen and laundered money, and currency held by foreign nations that has left America illegally. The new currency will be established after the hidden C. I. A. gold and assets have been audited and seized by the U. S. Treasury.

No one knows how many thousand tons of stolen war gold the C. I. A. (George H. W. Bush’s Barrick Gold Corporation) has amassed but it is enough to tip the balance of world gold holdings to America. This gold will cushion the radical but simple changes that must take place to eradicate globalism from the current U. S. systems that are controlled by the same shareholders who own the majority of shares in the top defense corporations – who are, by the way, almost all globalists bankers who loan money to, and sell weapons to the very enemies we are fighting.

In our nationalist Trump utopia, we had hoped that the greatest threat to world economies would end – the insane $500 trillion dollar derivatives markets controlled by the Bank for International Settlement, the most corrupt bank in the world, that must simply be abolished along with all derivatives and hedge fund betting.

Dissolve the Council on Foreign Relations

Patriots continue to demand that the transnational, international, globalist, Jesuit controlled, Rockefeller funded war-machine called the Council on Foreign Relations be dissolved and its war-hawk policies be destroyed. This anti-American group has decided U. S. foreign policy for decades and has told presidents what they will do and not do.

Trump met with Henry Kissinger, the most powerful and evil political warlord in the CFR who is wanted in multiple nations for crimes against humanity, and told him “no thank you” for his advice. Trump does not listen to this globalist bunch of greedy bankers, brokers, and warlords.

Rescind the National Defense Authorization Act

We advocate that all of Obama’s executive overreach concerning the National Defense Authorization Act be rescinded. These unprecedented additions made it legal for the Department of Defense to operate in the U. S. – for the first time in history. Propaganda was also legalized and Americans are now targeted as “war actors” and “enemies of the state.” Obama created a police state that used illegal surveillance on Trump and all Americans. Now it is time for Trump to turn the tables on the real enemies of our state – the corporate intelligence agencies and the corporate warlords.

Withdraw from the North Atlantic Treaty Organization

A key action factor to dismantling George H. W. Bush’s New World Order is to withdraw from the North Atlantic Treaty Organization, the Atlantic Council and all treaties or accords that require America to defend other nations. Trump has insinuated numerous times that NATO is outdated and the member countries don’t pay their fair share.

Close the New York Stock Exchange (ICE, Inc.)

Sever the ties (chains) with the New York Stock Exchange and its owner Intercontinental Exchange Inc. (ICE, Inc).  ICE is the most powerful player in stocks, bonds, mortgage-backed securities, futures, and derivatives. Basically, ICE is the biggest “gambling casino” in the world where fractional investments, high-speed trading, and the total control of the “private tax shelter”, called markets, rules American investment and retirement capital.

One quadrillion in trades happen on the New York Stock Exchange per year – all of which are basically tax-free throughout the year of investing. Markets are scams run by the ICE gambling casino. They don’t need to exist at all. Each of the 12,000 or so companies on the NY Stock Exchange can raise their own capital privately and then there would be no “longs and shorts”, “puts and calls”, futures, hedging, derivatives or other “legal forms of gambling.”

The stock markets can simply close – they are private corporations that work hard to steal from U. S. taxpayers.

End the Mortgage Electronic Registration System

Unplug the Mortgage Electronic Registration System, (MERS) and stop gambling with American home mortgages on the stock market by bundling them into mortgage-backed securities that have already caused one stock market crash. Use U. S. land and mortgages as a new type of Land Bank backed by mortgages that are tracked by the state counties (using blockchain technology) where the title is issued, not the lending institutions and banks who are controlling members of MERS.

Change Banking Rules and End the Glass-Steagall Act

The Glass-Steagall Act allows commercial bankers to also be investment bankers – which is simply insider trading. End derivative swaps, fractional banking, investment banking, and replace them with state banks, land banks, community banks, and postal banks. Trump has directly addressed these issues repeatedly and may, once he is in his second term, truly change the criminal activity of banks and brokers.

End Corporate Control of the Food and Drug Administration

Stop corporate control of the Food and Drug Administration. Stop Monsanto’s poisonous glyphosates, pharmaceutical poisons, pharmaceutical control of vaccines, immunity for drug companies, and end mandatory vaccinations. Do not permit Monsanto, or Big Pharma lobbyist or employees anywhere near government, especially in the FDA.

Secure the Border

Secure American borders to protect US citizens. Enforce all immigration laws and rules. End all sanctuary cities. Deport all illegals and respect all U. S. immigration laws. We have seen Trump be victorious in this area again and again.

Enact Term Limits for Congress

Create term limits for all state and federal congressional members. Reform election rules so that only public dollars support candidates not corporate Super Pacs driven by corporate donations. Trump has said he supports term limits and political reform that ends the control of Washington by career politicians.

End Lobbying

There is no need for biased, vested interests to “buy control” in Washington D. C. except to undermine, manipulate, and control our government through corporate corruption. Trump has taken action against lobbyists and even made rules about limiting participation in lobbying after holding public office.

No Dual-Citizens in Congress

Prohibit “dual-citizenship” for congressional members. Only American citizens, without dual citizenship, may hold public office in any state or federal elected office.

Audit HUD

Audit the Housing and Urban Development Agency which has traditionally been known for being the slush-fund for the C. I. A. and the Department of Defense.  Thank you, Dr. Carson, for finding $200 billion in fraud so far.

Repeal Obamacare

Repeal Obamacare and deregulate insurance companies while investigating medical practices in general throughout America. Curtail the medical industries monopoly on pricing and services. Create medical insurance options that are affordable and useful.  Trump has already worked hard on these ideas and will eventually get congress to create a reasonable plan.

Arrest George Soros

Arrest George Soros for treason, sedition, and fraud for fomenting violence, killings, and economic terrorism through a conspiracy of anti-America political organizations (not-for-profit, tax-exempt NGOs) and his “color revolutions” (regime change) in many countries, including the Purple Revolution in America to overthrow a duly elected president.

Restructure the IRS

Revamp, if not eliminate, the IRS and make filing taxes as simple as possible. End the need for tax lawyers and tax accountants. Abolish payroll taxes replacing it with a flat sales tax on all purchases. No more tax exemptions, no more off-shore tax havens, no more movement of money out of America to avoid taxes.

Everyone pays the same taxes.

If you purchase more – you pay more taxes. The rich will no longer “avoid” taxes through legal tax loopholes. Corporations will pay their fair share – finally. Trump is working hard currently to create the biggest tax changes in modern history and to bring back the wealth that has left America through corporate scams.

Ban Anti-American Globalist Organizations in the U.S.

Ban the operation of globalist organizations in the United States that have demonstrated ill-will towards America through undermining U. S. Constitutional rights by claiming the superiority of corporate rights: Trilateral Commission, Council on Foreign Relations, DARPA, In-Q-Tel, SAIC, Bilderberg Society, Knights of Malta, Council on Foreign Relations, Highland Forum Group, etc.

This also includes NGOs that operate within the U.S. with agendas to undermine American Christian moral values and debase American civil liberties. Trump is a nationalist who is demolishing the substructure of the globalists, the New World Order, the devotees of the United Nations, or whatever you want to call these anti-Americans.  Even the word “globalism” has become a dirty word during Trump’s administration.

End Tech Monopolies

Tech monopolies were originally designed and funded with military resources (tax-payer money) through patent theft by DARPA, In-Q-Tel, SAIC, Leidos, and other Department of Defense agencies that created the Internet, CISCO Systems, Microsoft, Apple, Intel, Google, Facebook, and all the others. These tech giants should become U. S. publicly-owned utilities since tax-payers paid for the original source code that was then given out as open-source material to these tech giants who now profit by the weaponization of that technology against Americans.

Trump is not in bed with the “fake” tech barons like Obama was and therefore you see them shaking in their boots for fear of anti-trust actions Trump could take against them. We already see that some tech warlords are now having to pay taxes in the countries they were hiding in to avoid taxes in the United States. Zuckerberg is always running, running, running. Trump has given him something to run from – anti-trust lawsuits and jail-time.

Just look what patriots have prepared over almost a 20 year span, waiting for the right time to expose the deep corruption in the tech industry.

Tech Company – Washington Corruption Exposed

.

Don’t stop now…..keep going with these steps to continue unwinding the progress towards globalization and government tyranny.

End all climate control efforts: geo-engineering, chemtrails, HAARP, microwave transmissions, etc.

Start a moratorium on all genetic manipulation, growing of clones for embryos, stem cell recovery programs.

Stop the protection of big tobacco and abolish the use of the most powerful narcotic in existence – nicotine.

End all refugee programs in America until we end hunger in America for our own citizens. 

Stop giving U. S. tax dollars to universities unless each American citizen can get a free college education. End foreign student enrollment in American public universities. End sports as a part of university education. Universities should be completely free to all state residents.

Allow no one who has worked for the CIA or FBI to hold public office after they have left those agencies.

End the illegal Federal Department of Education and re-establish the state’s right to administer education. End the Common Core curriculum movement and teach civics to students so that they know how their government runs. Trump is currently dismantling the U. S. Department of Education.

Repeal the Patriot Act (U. S. Freedom Act) and all Obama executive orders that take civil rights from Americans.

End all off-shore banking, tax havens, and other methods of stealing American money without paying taxes.

End all bombing of foreign countries and remove any troop deployments that are not fully sanctioned by the U. S. Congress.

Take away the Catholic Church’s tax-exempt status for the crimes its priests have inflicted upon children and others. Seize all Catholic assets in America and distribute the funds to the many, many victims whose cases have not been heard. End all formal ties with the Vatican or any of its affiliates.

Create non-aggression agreements with China, Russia, and all other nuclear nations. End nuclear proliferation and dismantle all weapons of mass destruction.

End Planned Parenthood abortions and the use of fetal tissue, embryo harvesting and other inhumane practices concerning birth.

End Big Pharma’s control of U. S. citizens by mandatory immunizations.

End covert U. S. military terrorism throughout the world through the CIA utilizing the 662 U. S. military bases in foreign nations.

Trump is Working on the List

The Anonymous Patriots are impressed with the work Trump has already done in dismantling the New World Order. One mighty presidential action after the next is leaving the globalists crying and trying to pick up the pieces of their shattered plans.

Trump is “not their president” and he is messing up the entire system that has been developing since 1913 when the Fed made its bid to “take over the Republic” via international bankers, brokers, and warlords.

Since the founding of the United Nations (League of Nations), international elites have been fighting to take over the flow of money in America. The United Nations almost supplanted the U. S. Congress when George H. W. Bush went to war with Iraq with only a U. N. Resolution to back his private oil war. The U. S. Congress did not vote to go to war either time in Iraq or the many other countries Bush, Clinton, and Obama have bombed, and subsequently fleeced.

President Obama ignored the U. S. Constitution as he bombed seven countries without a declaration of war or even the support of the U. S. Congress or the United Nations. Two million dead and 55 million refugees later, Europe is invaded by the refugees created by Obama and Hillary Clinton. These wars will not be easy to get out of, but Trump is doing a great job removing America from these White House sponsored, terrorist attacks on other sovereign nations.

There is no need to repeat the horrifying crimes and treason committed by the Bush/Clinton/Obama mafia families that are coming to light in the news every day. All the other living presidents hate Trump because their fake “good names” in the corporate propaganda media are coming unraveled. Each day, news arises of the blatant corruption, greed, and lawlessness of the former U. S. presidents and their cronies.

Now that our bucket-list of wishes is almost empty, perhaps we should take our corrupt former presidents and put them in the bucket and take them out with the trash – where they belong – and say good-bye to the their dream of the New World Order.

.

WE ARE WINNING!

.

The American Brand: Our Mission


Scientific Materialism Shattered with Return of Nibiru
Wednesday, November 1, 2017 8:18 PM

You are not only being deceived about the geopolitical nature of our world, you are also being kept in the dark about the true nature of the cosmos. For example, did you read that Nibiru came streaking through our solar system in October 2017?

For the first time, astronomers are tracking a distant visitor streaking through our solar system

In the last few Truth News Headlines, we have posted videos that describe the universe in a different way than what you may have been taught in school. If you missed those videos, here they are again:

The Universe is Electric
This is how Earth really moves around the Sun

.

If you are ready to go beyond the material-physical description of the cosmos and delve into the mysteries of magnetic cords, paleomagnetism, the Schumann Wave, the Pleiades, anunnaki,and the tattvas and ethers, listen to Betsy and Thomas describe their own journey to the Aurora Borealis just as the Mayan Long Calendar was coming to an end in 2012.

Nibiru-Planet X Has Come and Gone 

.

After listening to the audio above, you may be interested in learning more about CERN:

Why Cern’s Big Bang Research is a Big Fraud

CERN: Biggest Science Scam in History

Thank you, Arthur, an Aim4Truth reader, who recently pointed out an amazing website to us. Thomas refers to this site in the Nibiru audio above.

The site is:

Suspicious0bservers

The particular video that Tomas recommends you watch from this site isTop 6 Climate Change Problems.

.

.

The Eternal Ethers: A Theory of Everything 

.

How Nibiru’s Return Accelerates the Schumann Wave

.

Ready to explore the true nature of the heart? Ready to see how the heart is connected to the cosmos? Then enjoy this presentation:

The Heart is Not a Pump

 


Hillary paid Facebook to rig elections while colluding with Russian Uranium One
Thursday, October 26, 2017 10:17 PM

Citizens Intelligence Report by the American Intelligence Media

Crime 1: Her private email server hid unpublished 2009-2010 State Department contracts with Facebook managed by Dmitry Shevelenko.

Crime 2: Hillary’s Facebook “election winning template” clearly violates The Hatch Act.

Crime 3: Hillary’s contracts obstructed justice in Leader v. Facebook.

Crime 4: Hillary colluded with Facebook to set State Department Internet policy.

Oct. 26, 2017—On May 26, 2009, Russian oligarch Yuri Milner invested $200 million in Facebook private stock brokered by his Russian partner Goldman Sachs. Milner had worked for Obama’s 2008 bailout director Larry H. Summers when he was chief economist for the World Bank in the early 1990’s as a researcher along with Sheryl K. Sandberg, who later became Summer’s chief of staff at the U.S. Treasury, then started Gmail and is now Facebook’s chief operating officer. While Sandberg started Gmail for Google, Milner started Mail.ru. The intent to takeover global communications is evident in hindsight.

On Jun. 16, 2009, Hillary Clinton approved the Vladimir Putin-controlled ROSATOM to purchase 20% of America’s uranium reserves through Uranium One. The Clinton Foundation had already received more than $145 million in pay-to-play donations from Uranium One beneficiaries.

Hillary’s treason in her compromise of America’s energy reserves using Russian surrogates is evident. That treason is compounded by a simultaneous $1 billion financing by Cisco, Intel and Google of Vladimir Putin’s Moscow, Russia technology center Skolkovo on Jun. 27, 2010, just two days before Hillary approved the uranium sale to ROSATOM. See also “Cisco Commits $1 Billion for Multi-year Investment in Skolkovo.” ThinkRUSSIA. Aug. 11, 2010.

On Jun. 29, 2010, just two days after the Cisco/Intel/Google $1 billion donation, Moscow-based Renaissance Capital paid Bill Clinton $500,000 for a speech even though Renaissance was the lead analyst covering recommending a “buy” on Uranium One. On Mar. 30, 2011, Russian oligarch Yuri Milner overpaid $100 million for a gaudy mansion in the center of Silicon Valley in an ostentatious display of a rogue C.I.A.-inspired arrogance, after his $200 million private Facebook investment.

What is becoming equally evident is Hillary’s simultaneous compromise of America’s elections, digital networks and court proceedings through secret “election winning template” contracts with Facebook using Russian surrogates.

On Sep. 26, 2009, Hillary Clinton and the State Department entered into a secret contract with Facebook for $120,000 (GSA SAQMMA09M1870) to build “a template for winning elections using advanced Facebook marketing.” The next month, on Oct. 16, 2009, Hillary promoted Facebook on a video presentation to a U.S. State Department-funded Alliance for Youth Movements Summit in Mexico City. This contract was not known because Hillary had hidden it on her private email server in the basement of her house. It first came to light through the dogged work of Judicial Watch who obtained it in Apr. 03, 2014.

See also #election-rigging-by-facebook-and-hillary-2009" target="_blank">TIMELINE.

(Note: The Timeline takes a few minutes to download because of its file size. It may be too large to load on your phone or tablet so serious researchers should use a PC for download. It’s worth the effort! You will know it is open when red bordered boxes appear on the screen.)

Facebook contract with Office of Economic Security Information Programs

Between Sep. 26, 2009 and Sep. 30, 2010, Hillary entered into three (3) contracts with Facebook for $385,000.

This collusion with Facebook was wantonly criminal on many levels.

Columbus innovator Leader Technologies, Inc. was suing Facebook for patent infringement on Nov. 19, 2008 in Delaware federal district court. Reagan-appointed judge Joseph J. Farnan, Jr. was assigned the case.

While the case was preparing for trial, and despite four motions to compel, Mark Zuckerberg stonewalled providing his 2003-2004 Harvard computer devices and emails for review in the case. We now know that his attorneys at Gibson Dunn LLP had custody of 28 Harvard computer hard drives and emails. After stonewalling for a year, they lied to the court and said they had lost the information.

We believe Facebook and Zuckerberg hid this information because it will prove that Zuckerberg is a mere stooge of the rogue C.I.A. and was given the programming code from the IBM Eclipse Foundation to start Facebook. It will prove that IBM was given the code from James P. Chandler, III who stole it from his legal client Leader Technologies, Inc.

What Leader had no way of knowing was that Chandler was working intimately at the highest level with the Secretary for the Department of Defense’s Highlands Forum to weaponize the Internet. He held illegal private meetings with favored private companies to set policy on how the Internet would be controlled and profited from by the military-industrial complex.

This cabal of military-industrial complex criminals have used Leader’s invention for 17 years for free. Leader’s shareholders across the country are starting to file Miller Act Notice to demand that President Donald Trump pay them for using their property without compensation.

While Zuckerberg was openly lying to the court, Hillary Clinton and the State Department  entered into secret contracts with Facebook to build “a template for winning elections using advanced Facebook marketing.” These contracts were managed by “Dmitry Shevelenko” whose Russian background has been obscured by the shadow government.

Obstruction of Justice

In American courts, litigants have a solemn right to a fair trial. Litigants have the right to assume that no government representative will use their position of public trust to interfere in the case in favor of either side. When a government representative interferes in a case, that crime is called “obstruction of justice” for obvious reasons. Those interfering are attempting to influence the outcome of the case in favor of one of the parties.

Election tampering

In American elections, citizens have a solemn right to a free and fair election. Citizens have the right to assume that no government representative will use their position of public trust to interfere in an election in favor of either candidate. When a government representative interferes in an election, that crime is called “election tampering” and is a violation of The Hatch Act.

Fraud & Racketeering

In American public contracts, citizens have a solemn right to transparency regarding the spending of public funds. Except in special circumstances, government representatives may not use their position of public trust to favor certain private parties in uncompetitive contracts. When a government representative enters into no-bid contracts and colludes with the General Service Agency (GSA) to hide the existence of those contracts, that crime is called “fraud.” When such fraud involves parties across state lines, that crime is “racketeering.”

Pay Leader for 17 years of free use of their social networking invention; federal government can raise $200-500+ billion in surcharge revenues from social networking without raising taxes!

In conclusion, the crimes described above alone are enough by themselves to convict an average American of racketeering and treason. The evidence of these crimes come from Hillary Clinton’s private email server.

The Russian collusion nexus between Uranium One and Facebook election rigging is stunning.

Readers are encouraged to get this article to your elected representatives.

Ask them to: (1) pay Leader Technologies for the last 17 years of free use of their social networking invention that Hillary obstructed, and (2) prosecute Hillary and her racketeers for her Uranium One and digital election rigging racketeering and treason.


Lock Down on Prison Planet Almost Complete
Monday, October 16, 2017 8:32 PM

A conversation about the article below: Patent Theft Steals From All Americans.
A 530-page free PDF book with hundreds of hyperlinked documents is available here: Facebook Corruption

How the US Military Control of Social Media Has Already Imprisoned You and Thrown Away the Key

Long before we could imagine the evil of the elite pedophile globalists of the world, they had already started locking down planet earth. They knew that humanity’s wakening consciousness would jeopardize their planetary reign so they had to find a way to imprison our minds, direct our thinking, and limit our expanding consciousness.

They did it right under our noses.

They did it with our own hard-earned money.

While we were busy rearing our children and tending our families, they were quietly implementing Alinsky’s rules and Soros’ regimes. They are evil people who prey on our children, profit from our blood, rape our women and countries, and control us with their money illusions. They don’t care about our national borders, cultural uniqueness, spiritual paths, or personal liberty. YOU are THEIRS to be “farmed” any way that brings them greater wealth, longer life, and wicked pleasures.

You have now awakened and realized that the nightmare is actually on the other side of your dreamy sleep. What do you do? First and foremost is to educate yourself on what has occurred since you stopped paying attention. The American Intelligence Media has been writing Citizens Intelligence Reports for several years now so that you can become highly informed patriots. Patriots need to know precisely who the enemy is, how they have weaponized the world, and what we can do to throw off our digital shackles.

The global elites know that education is the key to enlightenment. For this reason, you will find more and more outlets for self-education becoming censored and shut down by the planetary rulers. They simply can’t have us know what is going on as there are far too many of us and too few of them.

In this Citizens Intelligence Report we want to alert you to the grave dangers of the weaponization of the internet and social media. A new technological revolution is taking place that will affect all of us. They make it sound so cool and fun – the Internet of Things—but it is nothing more than a self-imposed prison that will eventually control you 24/7 once you connect into the network.

The more you participate in the automatic information fed directly to your devices that is personalizing your news, entertainment, business, and “life-patterns”, the more you will think you are free and fully informed. Actually, you will become more and more limited by what your pattern-of-life generates as your individualized algorithms. A mechanical virtual world will be created around you that becomes your personalized digital prison that, at first, may seem like digital heaven, but later rears its ugly head of control and enslavement. By then, it will be too late for any of us to break free.

Your new digital prison is being created every time you do an internet search, click a ‘like’ button on Facebook, type a phrase into your computer, choose something to watch on television, or speak a word into your phone. Every speck of “information” that you participate in is used to make your personalized digital life-pattern profile.

Even your bank account and everything you spend is being gathered in an NSA program called Marina [1] that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone automatically pings the route and distance to your destination.

Your phone can also activate all your devices that are connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker starts and your TV comes on with your usual show as the heating pad in your easy chair turns on to your favorite setting.

There is no end to the “machine intelligence” support you can get from mechanically augmented reality. Now Facebook and its fake, phony, stooge inventor Mark Zuckerberg wants you to put on a 3-D visor and enter a self-created virtual reality world where it feels you are free to do as you please.

How Did We Get Into Digital Prison?

We have created this world by being lazy and not asking the hard questions—who owns and controls this technology, what is the ultimate goal of the Internet of Things, does this technology serve or enslave humanity? Eric Schmidt, the CEO of Alphabet has bragged about this new system that claims it is ‘ready to go’.

Google, somehow, morphed into a “mother company” that is named Alphabet which owns all 26 subsidiaries of Google, including the only AI on the planet called Google Deep Mind. Alphabet seems to have unlimited money and unlimited technology patents that are supported wholesale by Wall Street and the U.S. military-industrial complex.

Essentially, Google has always been owned and operated by the dark side of our military-industrial complex. Like Cisco Systems, Inc. before them, Google (Alphabet) was incubated through the U.S. Defense Advance Research Project Agency (DARPA) and the CIA’s private corporate venture capital company called In-Q-Tel. (Ask yourself how it is that a government entity can hold private companies and enjoy private profits outside of Congressional oversight, but we digress.)

Google, Cisco, Facebook, Twitter, and most other search engines and social networks all run on allegedly “open source” code given out by DARPA/In-Q-Tel to universities and corporations to develop. Open source means free to the user without the need to pay royalties or fees to the inventor or creator. Basically, whoever is able to take this weaponized open source code (with encryption back door keys already built in) and develop it for the consumer wins the military contracts.

Then Wall Street (Goldman Sachs and JPMorgan Chase usually) sweeps in with venture capital, and in short time values the new tech company in the tens and hundreds of billions. After that, the banks loan whatever money these companies need to buy out all their competition. These newly acquired “Silicon Valley corporate stooges” then become front-men for even more weaponized military systems. This now includes Facebook, LinkedIn, Instagram, Pinterest, YouTube, Tumblr and Amazon.

Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that he is simply having fun. Since most American and global businesses have some component on the internet, the militarization of the internet can be as powerful as the threat of global nuclear annihilation. Just imagine if the internet was turned off tomorrow – permanently, never to return.

Most of what we think of as modern life would end, and many people would never recover. Economies would collapse, wars would rage, and many of us wouldn’t know what to do or what to think. Modern life would collapse because the weapon of the internet already controls modern life. The life of the pygmy in Indonesia would go on uninterrupted, but American life would screech to a halt. We might not be able to “reboot” for years. This thought begs the question, “How did we let this happen?”

“We”, the users of the Internet and all things digital, were happy to use the new technology without asking basic questions like: Who actually owns the cables the Internet travels through? Can “they” turn it off? Why was so much power given over to the internet? At this point, is there an alternative or way out of this digital?

The answers to the questions above can be given, and there is a solution to this looming problem. But first we must see the internet and all of its “wonders” for exactly what they are – weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools that they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by nonsensical entertainment, religion is replaced by consumerism, and the real world by virtual reality.

Patent Theft and Weaponization of the Internet

Not counting the social networking technology that was stolen, taxpayers of the United States, through the CIA’s private venture capital company In-Q-tel, largely funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized these devices and systems against the citizens of the world.

‘We the People’ demand that these companies, and any other like them that have been financially seeded and funded by U.S. taxpayers, BE GIVEN TO THE PEOPLE AS A PUBLIC UTILITY and that the fictitious owners of these companies be prosecuted for patent infringement and/or theft.

In numerous articles from Americans for Innovation, the Anonymous Patriots have found unequivocal evidence that IBM’s Eclipse Foundation stole the original ideas and source code for Google and Facebook from Columbus, Ohio innovator Leader Technologies, Inc. through their patent attorney James P. Chandler III. Chandler was mentor of Barack Obama, Eric Holder, Robert Mueller, James Comey and John Podesta, to name but a few.

Chandler represented Leader Technologies, Inc. from the moment Leader realized their innovations were patentable in early 2000. But rather than file the patents immediately, Chandler suspiciously advised Leader to “reduce to practice” the invention before he would file them.

Hindsight shows that Chandler gave that advice in order to steal the actual source code when it was ready. Chandler bamboozled Leader into taking custody of a copy of the source code in 2002 which he immediately gave to the IBM Eclipse Foundation which then disseminated it to Zuckerberg/Facebook and other companies.

David J. Kappos, IBM’s attorney (who also served later as Obama’s Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office from 2009 to 2013) was also a student of Chandler at the time of the theft. This theft is one of if not the largest theft of intellectual property and trade secrets in history. It was clearly part of the the weaponization of these digital platforms.

For more information, please see our Citizens Intelligence Reports on these subjects:

Weaponization of Social Media

.

.Patent Theft by IBM

How Does Patent Theft Work?

Digital Prison Mechanisms

Once the Silicon Valley high-tech “dummy” companies are established by stooges who are pre-selected for their willingness to incorporate military “back doors” into all of their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every devise that broadcasts a signal – phone, computer, or any devise on the Internet of Things. Any intelligence agency can simply type in a query and access the metadata collected from every digital devise on the internet or that uses Wi-Fi or cell phone towers.

Among these spying tools is the RIOT (Rapid Information Overlay Technology]) program by Raytheon which leaked to the public on Nov. 16, 2010.[2]

This information is used to target individuals for consumer behaviors as well as DoD intelligence collection. If an internet user is targeted, there are hundreds of ways to “attack” the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.

The object of the intelligence is simple: Control the user. Social networks on the internet are military experiments in social manipulation. This is what is called PSYOPS – or psychological operations. 

Another program used to gather the Internet metadata is XKeyscore, a secret computer system first used by the NSA for searching and analyzing global Internet data, which it collects on a daily basis. It enables almost unlimited surveillance of anyone anywhere in the world.

The NSA’s databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored. It can also access your browsing histories or Google search terms that you’ve entered, and can alert them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects ALL data, on EVERYBODY, ALL THE TIME. [3]

Another component of NSA data collection is a program called Marina, a database and analysis tool set for intercepted internet metadata. The database stores metadata up to a year. The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of the target. It also has the capability to look back on the last 365 days’ worth of metadata seen by the collection system, whether or not the target was tasked for collection. The stored metadata is mainly used for pattern-of-life analysis.

Americans are not exempt because metadata is not considered data by U.S. law. (See Section 702 of the FISA Amendments Act).

Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation (SWS). This program is developing a parallel to Planet Earth, with billions of individual nodes (prisons) to reflect every man, woman, and child.

SWS will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. It provides an environment for testing psychological operations so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners, including U.S. citizens. SWS also mimics financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.

These four programs – XKeyscore, Marina, RIOT, and Sentient World Simulation – create some of the environments which intend to imprison and control those who willingly enter into the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even “neutrals” are the target of these systems.

No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet. Just look how President Donald Trump uses Twitter as a weapon against the corporate media. There is a battle for information and every person is in the middle of the battle whether they like it or not.

The largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Master the Human Domain.” Just the very name of the exercise should show you where the U.S. military is focusing its time and energy– on U.S. citizens. It also clearly tells us the intent of the U.S. military is – to Master the Human Domain. So much for America freedom and liberty.

Some History About DARPA/In-Q-Tel “Front Men”

The Defense Advanced Research Projects Agency (DARPA) has controlled technological innovation since 1958 when it was created by the military-driven Department of Defense. DARPA is the father of war-fighting, both conventional and digital. DARPA was controlled by a man they called “Yoda”, who leads a group called the Highlands Forum that directs all military research and development – the weaponization of every U.S. patent, over 4,000 of which have been stolen.

DARPA’s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum, have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing.

The U. S. military wants our enemies to have the technology so that it can spy upon them and keep up with them in weaponry. If both sides have the same technology and weapons, then more money needs to be spent on bigger and better weapons continually and the military industrial complex thrives and gets richer.

Their business plan is simple: Make sure the customer has a need for military products and services by supplying their enemies with competing products and services, a business cycle that never stops and guarantees that the military industrial complex will always be selling something to someone.

History of In-Q-Tel – a CIA Venture Capital Investment Firm

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. The inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the unregulated and unconstitutional private military-industry network around the Highlands Forum has become increasingly successful in dominating U.S. defense policy.

Basically, the CIA needed to launder all of its stolen gold and set up many companies to wash its illegal money. Why do you think they call the CIA ‘The Company’?

In-Q-Tel also uses a company called SAIC, the U.S. defense firm Science Applications International Corporation, which changed its name to Leidos in 2013, now operating SAIC as a subsidiary. SAIC/Leidos is among the top 100 largest defense contractors in the U..S, and works closely with the U.S. intelligence community, especially the NSA. The agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.

The Highlands Forum (Group)

Since 1973, Andrew Marshall has headed up one of the Pentagon’s most powerful agencies, the Office of Net Assessment (ONA), the U.S. defense secretary’s internal ‘think tank’ which conducts highly classified research on future planning for defense policy across the U.S. military and intelligence community. Out of Marshall’s work in the ONA came an independent group called the Highlands Forum.

Marshall, now 93 years old, is the DoD’s most elusive but one of its most influential officials. He created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation-only, not open to the public, and no written records are kept, except for the snippets that participants reveal in their braggadocio and biographies, which are considerable.

Marshall created this type of secret platform so that no one could prove the Highland Forum exists or that it has the greatest power over high-tech warfare on the planet. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz, who are  widely considered the hawks of the neoconservative movement in American politics, were among Marshall’s star protégés.

The Highlands Forum’s influence on U.S. defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense; its direct link to Marshall’s ONA; and its direct link to DARPA/In-Q-Tel and the Highlands Forum.

The Highlands Forum has served as a two-way ‘influence bridge’: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector.

There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale. 

Around 1994, the Highlands Group was chaired by Richard O’Neill as an official Pentagon project at the appointment of Bill Clinton’s then defense secretary William Perry. In O’Neill’s own words, the group would function as the Pentagon’s ‘ideas lab.’

Total participants in the DoD’s Highlands Forum number over a thousand; although meetings and sessions largely consist of small closed workshop style gatherings of maximum 25–30 people, bringing together experts and officials depending on the subject.

The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA to the ONA, and is deeply plugged into the Pentagon’s policy research task forces. In 2001, under the Total Information Awareness Program, President Bush secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants.

From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA’s secret eavesdropping systems.

This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Donald Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be based on the premise that the Department of Defense will ‘fight the net’ as it would an enemy weapons system.” The U.S. should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.

As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.

O’Neill said his job as Forum chairman was to scope case studies from real companies across the private sector, such as eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiority — how to dominate the information market — and leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the Department of Defense.

Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoor keys so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.

The Highland Forum directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA.

For more information on this topic, see our Citizens Intelligence Report entitled Who Really Owns the Military Industrial Complex: The Highlands Forum Exposed.

DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel microprocessers, Cisco routers, Google search engines, Facebook social networks, the IBM Internet of Things, cellphones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.

The Highlands Forum has been the headquarters of weaponizing military patents, intellectual property and trade secrets for five decades. Andrew Marshall has the blood of millions on his hands, yet he is considered an America hero instead of a warlord criminal.

Intel (In-Q-Tel) Inside 

Inside every Intel microprocessor is a smaller processor that lets Intel – who works for the Department of Defense – control every aspect of your computer remotely no matter what encryption codes or firewalls you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.

It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. According to WikiLeaks, there is even secret diskless memory embedded on each chip that spies can use to store and retrieve data and instructions on each chip that is inaccessible to the user and supposedly only used for internal operations and maintenance. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.

Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel “Inside” your computer. Intel collects “intelligence” but it also provides a “back door” to control, or “turn off” your computer at will just like it has been demonstrated that Cisco routers have a “back door” open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.

Samsung calls the on/off feature “Fake Off” meaning the TV looks like it is off, but is merely pretending to be off.

“I don’t have anything to hide”

But why shouldn’t DARPA, through Intel, have open access to all your files and your computer? DARPA funded all the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare.

Just as the Internet was originally named after its founding group, DARPA, ARPARNET, microprocessors also were military creations that were permitted into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful digital platforms of cyber warfighting.

Most semiconductor chips are made in Singapore, Taiwan, China, or Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.

In-Q-Tel is Warfare Technology – Weaponized Venture Capital & Banking

Since Bill Clinton in 1999,In-Q-Tel funds promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum. The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.

The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tank for inventing and controlling innovations that can be turned into weapons.In-Q-Tel is a bottomless source of funding for the CIA provided without any Congressional oversight.

Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.

Since 1999, there efforts have been supplemented by other quasi-secret organizations including The IBM Eclipse Foundation and the National Infrastructure Advisory Council.

For more information on this topic, see our Citizens Intelligence Report entitled DARPA Vader and the Evil Intel Empire Inside Uncovering the DoD Sith Lords that Control Your Laptop

Cisco Systems Monopoly

Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allowed a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.

The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor put millions of customers and their private information at risk and jeopardized the security of electrical power facilities, public utilities, and transportation systems.

Publicly, Cisco blamed the government for not telling them about this vulnerability, but that was simply the pot calling the kettle black – the government was blaming itself for the vulnerability, thus manipulating public opinion with a boldfaced deception.

Cisco has been accused of remotely monitoring users’ connections through Cisco’s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.

Cisco has also been accused of building a firewall backdoor developed by NSA into its routers. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they’re delivered. These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

In fact, hiding in plain sight, Cisco registers the Dual_EC_DRBG NSA encryption back door key with NIST (National Institute of Standards and Technology on all products for export.) This key relies on an inbuilt flaw in the encryption standard which only the NSA knows and can exploit at will to break in to any hardware, software or firmware.

DARPA’s Google

The U.S. intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.

In 1994  two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA wanted to control and monitor digital information, particularly the data flowing over the internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It has users’ e-mail addresses and knows where they are physically located, and what they are searching for on the web. Google has a “profile” on every user.

The government can “command” that any company, including Google, to turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Google’s terms of service, the company advises its users that it may share its “personal information” with outside organizations, including government agencies, in order to “detect, prevent, or otherwise address fraud, security or technical issues” and to “protect against harm to the rights, property or safety of Google.”

Google’s terms of service go further, they actually assume control of all user information with clever sleight of legal hand: “When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.”

The NSA partnered with Google, just one of hundreds of companies who have been brought into the NSA’s circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install backdoors or other forms of privileged access.

The NSA helps the companies find weaknesses in their products.But it also pays the companies not to fix some of them. Those weaknesses  give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure.

Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain ‘information superiority.’

The origins of this strategy trace back to Bill Clinton and the Highlands Forum which has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the U.S. and around the world. The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war.

The U.S. intelligence community is implicated in nurturing today’s web platforms for the precise purpose of utilizing the technology as a mechanism to fight the global ‘information war’ -  a war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the U.S. military-industrial complex.

NSA’s Microsoft

Microsoft shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order.

What We Have Learned So Far

  • Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA/In-Q-Tel projects that flourished with new technologies created and funded by the military for cyberwarfare.
  • Most high-tech moguls are simply “front men” selling DARPA and In-Q-Tel (the CIA’s DARPA) products that control our lives and spy on us continually.
  • Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.
  • Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on “virtually every exchange on the Internet.”
  • IBM hired many of Germany’s mind control scientists from WWII and carried on those experiments through the CIA that formed in 1947; those experiments took on many different names including MKUltra. Those German scientists had used IBM computers during the war to catalogue “undersirables” like Jews, gypsies, homosexuals, Poles and Russians and it organized the trains to the death camps for individuals marked for extermination and hideous experimentation.
  • IBM/Cisco System’s “Internet of Things” plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.
  • The internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyberwarfare.
  • The U. S. government has helped build, monitor, regulate, and control all physical aspects of Internet transmissions and broadcasts through the U. S. Board of Broadcasting Governors, which is a part of the Department of Defense. Every transmission through the internet or through cellphone towers is completely controlled by the U. S. government.
  • The U. S. government can “turn off”, filter, manipulate, and control the Internet through the federally controlled transmission cables that span the world. If the U. S. wanted to turn off North Korea’s internet access, it is as simple as a keystroke. Thus, the U. S. government has been boldly lying about the Internet since its inception.

What Evil is the Highlands Forum Up to Now?

By 2008, the NSA effectively resurrected the Total Information Awareness project with a focus on Internet data-mining via comprehensive monitoring of e-mails, text messages, and Web browsing. We also now know that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA’s XKeyscore.

Goldman Sachs is CIA

Goldman Sachs (with JPMorgan in tow) is the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the U.S. military intelligence community.

The convergence of these powerful financial and military interests around the Highlands Forum–through George Lee’s sponsorship of the Forum’s new partner, the MIIS Cybersec initiative–is revealing in itself. MIIS Cybersec’s director, Dr, Itamara Lochard, has long been embedded in Highlands.

Dr. Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.

Dr. Lochard maintains a comprehensive database of 1,700 non-state groups including insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors, to analyze their organizational patterns, areas of cooperation, strategies and tactics.

Her views disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the U.S. Air Force’s Institute for National Security Studies on US strategy toward ‘non-state armed groups.’ The study on the one hand argued that non-state armed groups should be urgently recognized as a ‘tier one security priority,’ and on the other that the proliferation of armed groups provide strategic opportunities that can be exploited to help achieve policy goals.

There have and will be instances where the United States may find collaborating with armed group is in its strategic interests. But sophisticated tools must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests.

In 2009, it also emerged from a Google patent application that the company had deliberately been collecting ‘payload’ data from private WI-fi networks that would enable the identification of “geolocations.” In the same year, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security.

It is not just Google that is a key contributor and foundation of the US military-industrial complex. It is the entire Internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the U.S. intelligence community (or powerful financiers embedded in that community) — which sustain the internet and the telecoms infrastructure. It is also the myriad of start-ups selling cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community.

Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.

Brainwashing 3.0

In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, who are principal investigators in the ‘Neurobiology of Narrative Framing’ project at the University of Southern California. Evoking Zalman’s emphasis on the need for Pentagon psychological operations to deploy “empathetic influence,” the new DARPA-backed project aims to investigate how narratives often appeal “to strong, sacred values in order to evoke an emotional response,” but in different ways across different cultures.

The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon’s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.

The research is based on extracting narratives from millions of American, Iranian, and Chinese weblogs, and subjecting them to automated discourse analysis to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers/listeners from different cultures to gauge their reaction different narratives “where each story makes an appeal to a sacred value to explain or justify a morally-questionable behavior of the author.” Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.

DARPA’s goal is to mine millions of American weblogs as part of its ‘neurobiology of narrative framing’ research. As the Pentagon’s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy.

U.S. Patent Office Works For DARPA/In-Q-Tel

Just as Leader Technologies was ripped off by NSA/FBI/CIA ATTORNEY James Chandler and the IBM Eclipse Foundation for their patents that are essential to Facebook for scalability, so too many inventors have had their patents stolen by the U.S. Patent Office.

This rip-off and theft is rationalized as legal once the patent committee determines that a patent may have some impact upon U.S. “national security.”  Over five thousand patents have been legally confiscated (stolen) by the U. S. Patent Office, including many free energy patents that directly compete with oil and gas, and given to DARPA/In-Q-Tel for further development and weaponization. Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place.

This national security rationalization for the theft of intellectual property fundamentally violates the Fifth Amendment Takings Clause which states that “private property [shall not] be taken for public use, without just compensation.”

If an inventor of a patent that is confiscated by the U. S. Patent Office tries to continue work on the patent, that inventor may end up in jail. The rules of this patent confiscation are located in 35 U.S. Code § 181 – Secrecy of certain inventions and withholding of patent, which provides that the government can take any patent and make it secret and use it at their discretion, or just make sure that it never gets developed.

There are strict penalties if the inventor even speaks of the patent after it has been “confiscated.”

Members of DARPA and In-Q-Tel provide the Defense Department and the CIA with these “secret” patents so that they might first be weaponized for military purposes. Often, patents are then given to fake companies, supported with U.S. tax dollars, who bring the patent to market.

This is what happened with the patent theft of Leader Technologies that was then used by the front companies Goggle and Facebook, which are actually directed by the Department of Defense and the CIA. Clearly the law the dark state chooses to ignore is Leader’s overarching property rights in the Fifth Amendment Takings Clause, which takes precedent.

The Patent Office did not withhold Leader’s patents, and therefore cannot rely on its confiscation six years earlier when Leader’s intellectual property was a trade secret disclose only to its duplicitous attorney James P. Chandler.

Patent theft is only the tip of the iceberg. Industrial espionage is common in all industries. Alphabet/Google and Facebook have seemingly endless money to “absorb” any competition through buying them and keeping competition at abeyance. There are many other ways to “suppress” technologies that threaten the “big” companies, whether oil, tech, pharmaceuticals, agriculture/food, energy production. Big corporations use governments, especially multi-national organizations, to do their bidding. Big corporations spend huge amounts of money on lobbying governments to “pay to play.”

And when money can’t accomplish the goals, they resort to stealing patents and killing inventors.

Suppression and sabotage of technologies has been the norm since the dawn of the twentieth century when fossil fuels and the petrodollar came to rule world economics. Over 5000 new patents have been “deemed” secret and have been suppressed by existing patent laws. There are U. S. patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens “national security.”

Under Vice President Nixon, in the early 1950s, illegal, secret patent legislation was written, permitting the U.S. government to steal technology from inventors and/or suppress it should a case be made the technology might threaten the status quo.

The shocked inventors also were informed that they could be jailed up to 20 years if they made the theft of their technology known to the public.

35 U.S. Code § 186 – Penalty

Whoever, during the period or periods of time an invention has been ordered to be kept secret and the grant of a patent thereon withheld pursuant to section 181, shall, with knowledge of such order and without due authorization, willfully publish or disclose or authorize or cause to be published or disclosed the invention, or material information with respect thereto, or whoever willfully, in violation of the provisions of section 184, shall file or cause or authorize to be filed in any foreign country an application for patent or for the registration of a utility model, industrial design, or model in respect of any invention made in the United States, shall, upon conviction, be fined not more than $10,000 or imprisoned for not more than two years, or both.

(July 19, 1952, ch. 950, 66 Stat. 807Pub. L. 100–418, title IX, § 9101(b)(3), Aug. 23, 1988, 102 Stat. 1568Pub. L. 112–29, § 20(j), Sept. 16, 2011, 125 Stat. 335.)

Very clearly, the patent system is merely a lure for unsuspecting innovators to share their ideas so that the military-industrial complex can steal them at will.

Want to know about the free energy devices that this corrupt patent system is suppressing from the people? See our Citizens Intelligence Report entitled

THE FREE ENERGY REVOLUTION HAS BEGUN

..

Other DARPA/In-Q-Tel Programs

We have discussed the companies that you may already know have control over your life, but there are many, many more that we don’t know about. Many of us are reliant, even addicted, to these the internet, cellphones, and Facebook pages and groups. It has been shown that the internet creates different illnesses and some researchers say the internet is more addictive than drugs.

But what is worse is that DARPA/In-Q-Tel already has many programs that are not publicly known about and are being used right now to control U. S. citizens with cyberwarfare technologies. Let’s take a look at some of those other programs described by whistleblowers, like the Vault 7 Wiki-leaks, and see what those programs are intending to do for the U. S. military.

Total Information Awareness – Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook.

PRISM – A clandestine national security electronic surveillance program operated by the United States National Security Agency which can target customers of participating corporations outside or inside the United States.

Sounds of Silence – The Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude – or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent #5,159,703.

ThinThread– A U.S. National Security Agency program involved wiretapping and sophisticated analysis of the resulting data.

Trailblazer Project – U.S. National Security Agency program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.

Turbulence – Turbulence is a National Security Agency information-technology project started circa 2005. It was developed in small, inexpensive “test” pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers.

Tailored Access Operations – Intelligence-gathering unit of the NSA that is capable of harvesting approximately two petabytes of data per hour. 

Boundless Informant– A system deployed by the NSA to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States.

Bullrun– A highly classified NSA program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).

Stuxnet – Is the first discovered malware that spies on industrial systems, and it was used to attack Iran’s nuclear facilities. It is believed to have originated from the United States under the Bush administration.

Carnivore– A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications.

DCSNet – The Federal Bureau of Investigation’s point-and-click surveillance system that can perform instant wiretaps on any telecommunications device located in the United States.

Fairview – A mass surveillance program directed at foreign mobile phone users.

ICREACH – Surveillance front-end GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records.

Magic Lantern – A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications.

Main Core – A personal and financial database storing information of millions of U. S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources.

MAINWAY – A NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States.

MUSCULAR – Overseas wiretapping of Google’s and Yahoo’s internal networks by the NSA.

MYSTIC – Is a voice interception program used by the National Security Agency.

Room 641A – A telecommunication interception facility operated by AT&T for the U.S. National Security Agency.

Sentry Eagle – It monitors and attacks an adversary’s cyberspace through capabilities include SIGINT, Computer Network Exploitation, Information Assurance, Computer Network Defense, Network Warfare, and Computer Network Attack. The efforts included weakening U. S. commercial encryption systems.

Special Collection Service – A black budget program that is responsible for “close surveillance, burglary, wiretapping, breaking and entering.” It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.

Terrorist Finance Tracking Program – A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration’s “Global War on Terrorism.”

Multi-state Anti-Terrorism Information Exchange (MATRIX) – A data mining system originally developed for the Florida Department of Law Enforcement.
Insight Program – It detects threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. Develops integrated human/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors.

EM Fields and Hidden Symbols – Uses techniques to incept thoughts and ideas into the mind. Once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device. 

Nervous System Manipulation by Electromagnetic Fields from Monitors – US Patent and Trade Office, Patent #6,506,148 on subliminal behavior modification, 1/14/2003, United States Patent 6,506,148, Loos, January 14, 2003. Abstract: It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. The image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528 Filed: June 1, 2001

Narrative Networks Program – Developed classified techniques used to manipulate trust in humans. For its Narrative Networks program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind.

Mind Control Project – Remotely disrupts political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects.” Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation. MIT neuroscientists have shown that they can plant false memories. Most of the research in this area currently revolves around how to induce and eliminate fear.

Controlling Americans Through the Internet

It is important to remember that since Barack Obama added new language in the National Defense Authorization Act of 2012, Americans are now seen as possible terrorists and are military targets and enemies of the state, unless proven otherwise.  In essence, all of the above cyberwarfare programs are being used on Americans indiscriminately and with ill intent.

The Patriot Act, later called the U. S. Freedom Act is the exact opposite of its name – it takes away freedom from patriots and lets multi-national corporations and the “run-away military” use the American people as a cyberwarfare testing grounds.

This fact is little known: the U. S. military is now allowed to act within the borders of America and target Americans as hostile war-actors (as the military calls us). We are in an information war and the stacks are high – American freedom or military/corporate control. This battle wages while many people are complacent and perfectly happy with their digital experiences.

The internet is a weapon and it is our job to find out what the battle is all about and make sure that we retain our U. S. Civil Rights and American freedom and liberty. We must call out DARPA, In-Q-Tel, Highland Forum, and the U.S. Patent Office for their patent thefts, continuous lies, and cyberwarfare manipulations and demand that U. S. taxpayer dollars that funded these evil weaponized tools be acknowledged and that all cyber-tools be turned over to Americans without the spy systems and information control systems attached.

Humanity must now fight to restore freedom and privacy before it is lost forever.

To evolve as human beings into the next century, we need a free and private internet and social networks that are not manipulated as a tools to lock us inside the prison of our minds. Remember that the intent is to “master the human domain” via the mechanical domain controlled by ahrimanic warlords who wish to take our freedoms away.

.


#_ftn1" name="_ftnref1" target="_blank">[1] Katherine Losse, Mark Zuckerberg’s anathemized former speechwriter, revealed in her book The Boy Kings (2012) that the term at Facebook for Marina was “dark profiles.”

#_ftnref1" name="_ftn1" target="_blank">#katherine-losse" target="_blank">http://www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html#katherine-losse

http://www.fbcoverup.com/docs/congress/2012-11-27-Briefing-for-Representative-Jim-Jordan-FACEBOOK-NOUVEAU-TOTALITARIANISM-AND-USE-OF-TARP-FUNDS-Nov-27-2012.pdf

Losse, Katherine. The Boy Kings. New York: Simon & Schuster, 2012, p. 201- 202. Print, eBook.

#_ftnref1" name="_ftn1" target="_blank">[2]Urch, Brian. (Nov. 16, 2010). Raytheon’s Riot [Rapid Information Overlay Technology] Program Mines Social Network Data Like a Google for Spies. Raytheon. https://www.fbcoverup.com/docs/library/2010-11-16-Raytheon-s-Riot-Rapid-Information-Overlay-Technology-Program-Mines-Social-Network-Data-Like-a-Google-for-Spies-Whistleblower-The-Guardian-Raytheon-Nov-16-2010.mp4

#raytheon-riot" target="_blank">http://www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html#raytheon-riot

[3] #nsa-sniff-it-all" rel="nofollow" target="_blank">http://www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html#nsa-sniff-it-all

See link below for an amazing document and time table that lays it all out:

2012-10-19-Briefing-for-Representative-Jim-Jordan-OH-HOUSE-OVERSIGHT-COMMITTEE-American-and-Russian-Opportunists-Undermining-U-S-Sovereignty-and-Corruption


Analyzing the Mandalay Massacre False Flag
Thursday, October 5, 2017 1:13 AM

The Anonymous Patriots of the American Intelligence Media are educating readers about false flags and propaganda techniques so that they can recognize perception management that accompanies false flag incidents. If you haven’t read our “internet classic” False Flags are Legal Propaganda, by all means, please do so.

Now, we are going to apply the techniques outlined in this article above to examine whether the Mandalay Massacre is a false flag event. Keep in mind that a false flag event does not mean that people are not injured or murdered during its execution. We are not saying that people weren’t injured or killed in Las Vegas. We are just using this event to show you how to use the tools of discernment to analyze any and all news reports.

To determine if a news report is true, first look at the photos and videos for incongruities, crisis actors, or any of the twelve signs of perception management. This is what we did in examining the San Bernardino incident and concluded that it was a false flag event:

HOW A “FALSE FLAG WITHIN A FALSE FLAG” OPERATION UNFOLDED IN SAN BERNARDINO

 

We also did the same in analyzing the Orlando Pulse Nightclub shooting:

Orlando Shootings:

Another B-Grade Production by the Department
of  Defense’s Bureau of Broadcast Governors?

.

The first thing to do is look for tell-tale signs of a false flag:

fake scenes,

police and other emergency personnel standing around doing nothing,

stationary ambulances,

no one helping the alleged wounded,

tents already set up even as initial pictures are being taken,

FBI swooping in immediately,

the “lone shooter” commits suicide,

reports of multiple shooters,

eye-witness accounts conflict with MSM narrative,

photos are staged and have no attribution,

interviews are fake,

an active shooter drill just happened,

no aerial footage,

personal cell-phone videos conflict with MSM staged videos and photos,

crime scene photography released immediately,

crime scene contaminated,

family members of shooter questioned and immediately released,

too many “planted” weapons,

shooter not physically able to carry out the attack,

multiple locations identified as the scene of the shooter,

photographs of the dead are out of focus,

many “perfect” photos are taken by anonymous photographers,

none of the wounded victims interviewed,

no video of the dead and wounded leaving the scene or arriving at the hospital,

“staged” aspects of the event caught on personal phones,

same characters appear in the “staged” photos repeatedly,

no emergency medical personnel active,

authorities “standing around” like a drill with “dead bodies” on the ground with no blood visible, and many other indicators.

BUSTED. The Mandalay Massacre had all of those indicators. Next, we are going to show you pictures and videos that will show you all kinds of screwy things. These anomalies are not apparent the first time you look at them because they were created for shock-effect to make you believe immediately – and then look away. We ask you to “not look away” this time, but look carefully and find obvious problems like you would if you were watching a really bad Hollywood movie. Let your own eyes show you the truth that the lying, fake, propaganda, corporate media is keeping you from seeing.

.

To get your super sleuth juices warmed up, here are some visual discrepancies that you may have already figured out while reading headlines and articles or viewing photos and videos.

.

The hotel guest in the room next door to Stephen Paddock’s saw multiple shooters and saw police shoot a “security guard.”

Lights and sounds of weapon fire came from the fourth floor, not the 32 floor.

No mussel bursts were seen coming from the 32 floor though many videos captured that area during the time of the shootings.

Most witnesses on video said the “fake weapon fire” came from the stage and sounded more like firecrackers.

Though there are many videos, not one of them captured a single person being shot.

Not one person was photographed being put into an ambulance.

No helicopter aerial footage was released.

The dispatcher was told there were three or more shooters.

The police identified a shooter on the 29th floor who was completely ignored after the 32nd floor shooter was found dead.

Police took 72 minutes to arrive in the most policed town in America.

Hotel security let 23 rifles into a casino that has state-of-the-art surveillance.

The same hotel security did nothing for 72 minutes though witnesses informed the hotel which room the shooter was in.

Police waited in the stairwell for a long time even though no more shots were being fired.

The FBI took all the evidence but left one of the murder weapons for “show.”

The FBI cleared Paddock’s girlfriend with a phone conversation even though she may have had critical information on Paddock’s weaponry, state of mind, and who knows what else

According to medical professionals, Paddock was on valium, a drug which slows you down not hype you up into a killer.

Why was it reported by police that a “strobe” light was flashing from the 4th floor synchronized with the weapon fire but they never followed through on that observation?

Why would Paddock need 23 rifles for an attack?

Let’s Look at the Visual Circumstantial Evidence

Here is picture #1 where there is something covered that may be a “dead body” – at least that is what the picture suggests. People are reported to have been murdered at a concert, but it is obvious that the people pictured don’t seem to care about other victims. They will get to them after their break. Notice the two ambulances in the picture, both with their doors closed, certainly not in go-position for the 600 wounded who may need stretchers and a ride to the hospital depending on their injuries.

In this picture we have EMT just hanging around, not going anywhere and certainly not helping any injured people.

Do we really even need another picture to know that this is a fake scene, probably a drill gone “active.” Or may be just the drill that took place a few nights prior.

A drill was advertised to have happened on September 29 in that area. This could have been a picture from the drill and not from the October 1 event. Who would know?

The picture above looks more like a party than an emergency scene. Are the people in the background texting on their cell phones? Looks like everyone is having a nice time. They certainly seem very calm for an area that has just had thousands of bullets rip through 600 people. Notice how the policeman in the foreground is in much sharper focus than the people just behind him. Looks like a sloppy Photoshop to us. Again, note  the “closed door” ambulance that isn’t going anywhere. And what is under the white blanket or covering? Are we supposed to think this is a body?

In the picture below, a van marked “Davis” which seems to have a logo from a Las Vegas funeral home is moving bodies into a white truck. Really? Bodies just laid around all night until a a funeral home van arrived to pick them up without any sight of a coroner, police, EMT, or other official? Why aren’t official vehicles being used? And where is  crime scene tape? Who is the person taking the picture and why are they so close to a crime scene?

In the picture below, the ambulances are nowhere near the people who need them. They are parked, like they might be if this were a picture of a drill activity. The police cars seem to be blocking the ambulance and firetruck. Notice the orange cones and tents in the picture. These are popular props used in drill activities.

Notice that the firetruck below. There is a fire hose running into the street although this was not a fire event. An ambulance is parked on top of the hose. The ambulance is blocked in and the doors closed.

“Who needs stretchers when a desk chair does just fine?” Not a medic around in this picture. The ambulance doors are closed, people look unconcerned, there appears to be a “dead body” on the pavement. No one seems to care much. One guy is on his phone with his hand casually in his pocket.

Also note the Black Hat Hero – who is on the left and who will appear in more photos.

 

What is going on in this picture below? Notice the Black Hat Hero. They could probably use some help moving this woman, yet three men just stand around watching. Who is taking this picture and why aren’t they helping in moving the woman? The person in the doorway doesn’t’ seem too concerned. Is he having a cigarette?

In the picture below we see a stretcher just sitting there, not in use. The four police in the right frame look like they are taking a collective wiz. Nine responders are just standing around — on a Vegas evening, maybe Vegas….how would we know? The “police” and “firemed” uniforms do not indicate which jurisdiction these agents are from. What Las Vegas rescue department do the “firemed” come from?

If we only had a stretcher! Notice that it is not a human body in the wheelbarrow. Also, the “already set up” tent. Note how bored the person leaning up against the tent is as the “dead body” wheels by. Also notice that the ambulance doors are closed and the vehicles are blocked in. Can you tell what jurisdiction these “emergency workers” come from? We just see generic uniforms that you could buy at a Halloween costume store

Below we can see another “bloodless dead body.” Look how casual people are walking around in the area where a person just got shot! No one seems worried about being in an open area where more shots could be fired and that they could be in danger. Notice the two men in the black hats. These are probably the location directors from the rent-a-crisis-actor company.

Below are some people “playing dead” while others stand around casually and continue to party while thousands of bullets are allegedly screaming by. Note that no one on the ground is appears to be hurt.

Now surely the picture to the left is authentic? Why are the people just milling about in the background when there is a person on the ground who was hit by a bullet in a mad man’s rage? Look around the picture. Where are the police, medics, firemen, and other authorities? Why is the man in the baseball cap so unconcerned, unworried?

The man in the wheelchair and the young woman pushing him seem to be in a hurry to get out of danger’s way. But the girl walking towards them seems to be completely unaffected by the “massacre.” Also notice that the “lit up fence area” is where most of the staged photographs were taken (see picture below). This is the area where most the people “fell down” as if shot. But look closely. You can’t see anyone with blood from bullet wounds. When the camera gets close and finally about to “prove” the massacre is real – the picture blurs like the picture below. Again, who is taking these pictures and why aren’t they helping the injured? Why would they be in a standing or elevated position to take these pictures when bullets are flying?

Our hero below seems to be covering the voluptuous blonde from raining bullets, yet the person in the background with his/her hand in the pants pocket seems pretty relaxed.

Who took the picture below? Great “meme” for the massacre. But notice that others around him couldn’t care less about his “dead” beloved. The people in the background continue to party, and if you look closely, you will see the cowboy in the wheelchair, now headed to the concession stand.

Look closely. This picture was taken after the crowd had gone and the lights were turned up for these shots. Afterwards, just a few minutes later, the lights went out just as the cameras closed in to get candid pictures. You will see that happen in some of the videos that follow.

As far as the man kneeling above… We assume he has taken this position to shield himself from bullets, yet the people in the background are partying and ordering food.

In the picture above, the young couple looks terrified, but if you look in the background, you will see people in line getting food. There is an older couple strolling along; two women are in a kneeling position. Notice the woman on the left in line who has her hands on her hips. Seriously, these do not look like people that are in a sniper situation.

In the photo to the left, we see two police with drawn weapons while two civilians stroll by.

Wouldn’t the police tell them to stand back?

Notice again, that the police and car do not identify the jurisdiction. Where does it show you anywhere that this a Las Vegas police car?.

We didn’t watch CSI all these years not to know how the Vegas police arrive on the crime scene! And they don’t look like the fake pictures we have seen so far..

.

Below we see pictured the excellent work of the FBI who not only contaminated the crime scene by immediately releasing videos and photos of the crime scene – but they also left one of the murder rifles behind after they went to the trouble to photograph it for the record. This picture is just wrong. Why would the door be open? And what jurisdiction do you see on this crime scene tape? Las Vegas? FBI?

Other visual evidence from the crime scene is so obviously fake that it is a sad attempt to convince the public that a 64 year old man carried out this crime alone and then shot himself.

Notice that one rifle is crossed over his leg, after he shot himself in the head and the gun landed five feet above his head.  (The other picture of Paddock–has a bullet through his head with a small gun lying just above him on the floor.) Hmmm? How did he shoot himself with a small gun which fell behind hi while simultaneously holding a long gun that fell on top of his leg.

The shells on the floor are nowhere near the windows he allegedly fired from. His rifles are just laid all over the room, nowhere near the windows. His ammo is not near the window. WHO TOOK THESE PICTURES?!  How convenient that these “illegal” pictures leaked immediately as proof that it was a lone wolf shooting. Like all recent U.S. false flags, the patsy is killed so that there is no need there is no need for an investigation. Case closed!

What We Can Hear as Circumstantial Evidence

Now that we have looked at the visual circumstantial evidence, we can now “listen” to what evidence exists if we wish to discern the truth of the incident. Personal phone videos tend to show the opposite of the propaganda narrative and often are taken down after they are posted. Below we have just a few of the most obvious videos that prove that the fake news narrative is a lie. We won’t be surprised if any of these videos are removed from YouTube.

The video below of the “shooting” shows people unconcerned and calling the sounds “firecrackers.” No one believes it except the few people who keep yelling “get down.” Crisis actors perhaps? Not one person is seen shot in any video we have watched. Not one person “fell to the ground” from a bullet. Many tripped in the rush to leave once people (crisis actors) started yelling that they “had to leave” and the stage lights came on and filled the area for a while. Though we have seen hours and hours of personal phone videos, not one person was seen to be shot.

This candid video below shows that no one was shot. You can hear fake gunshot sounds coming from the stage.

In the article below there is a CNN video released before the killers room could be turned into a crime scene. Notice that the guns are nowhere near the windows. One rifle is placed over his leg, shells demonstrate that the rifle wasn’t fired near the windows (shell just thrown around) and the pistol he shot himself with is nowhere near where it should be but is in the opposite direction. One rifle is neatly set up at the door, far from the windows. He fired for ten minutes, allegedly, and the police took 72 minutes to get to his room. One security guard was shot in the hallway, which makes no sense.

What happened inside the shooter’s suite at the Mandalay Bay hotel

The only “light” from the “gunshot sounds” come from the 4th floor.

Witnesses in the room next door to the shooter say there were multiple shooters and the police shot a security guard in front of them. Another “person of interest” was being chased who was wearing a security guard uniform. Also, conclusive proof that there was  “light” and “sound” coming from the 4th floor.

A video that we wanted to show you, but was removed by YouTube before we could even post this article, showed the staged “scene of death” but was not convincing. Just when the video could have shown something, the lights go out. The person speaking seems to know that the shooting is “over” and has no fear of further shooting. One minute he says there are no EMPs and the next second he says there are three. Some people are just wandering around. Again, we ask….who is filming this stuff?

The official hospital response produced no pictures of wounded and Dr. John Fildes, a trauma surgeon and UMC’s director of trauma and chair of UNLV School of Medicine surgery department, said the center “has drilled on a concert venue disaster in the past.

Las Vegas shooting: Hospital had trained for concert venue disaster

In the article below, reporters give an August news report on the Las Vegas Active Shooter Drill. Notice that it looks much like what you have already seen in this article so far – just unconcerned people just doing the job of crisis actors.

Active shooter drill tests local agencies

.

You Must Decide – the Power of Discernment

Now that you have seen visual and auditory circumstantial evidence, it is up to you to decide if this “Mandalay Massacre” was done to distract you from something they didn’t want you to see, or to give them a narrative to grab your guns, or to terrorize us into submission of their expanding State agendas to further impede and restrict activities and rights of American at public places.

Perhaps you are too upset and confused to understand how false flags happen. But be assured, they do happen and can become critical events that can change history. All you have to do is say “Sandy Hook”, and you will have a fight on your hands, especially those still brainwashed with the government narrative. To date, no evidence has come out of the Sandy Hook investigation to prove that anyone died at all. Not one death certificate was filed.

The Anonymous Patriots have called out other false flags before and have tried to share what we know to be their indicators. It is easy to tell big lies because most people will not believe that the government and the local authorities could be in on such a huge conspiracy. Actually, it only takes a few people to pull off a false flag because the MSM talking heads simply read their lines and don’t ask questions or do any real journalism. An active shooter drill often “goes active” and then becomes the very event that is reported upon.

We have pointed out many inconsistencies that any good journalist would follow in order to report truth. But they won’t. And we all know why. Only concerned patriots, citizen journalists, and the alternative media will look into these matters.

We could go one step further and look at the motives for the shooting and the history of the shooter. But, we will find confusion and no answers. The shooter was an obvious patsy and he will be forgotten quickly.

Don’t be surprised when the real “motivation” behind this false flag becomes apparent: Acall for the United Nations Small Arms Treaty to be enforced, instead of either of the two pending bills before Congress to loosen US gun laws. The timing of this mass shooting is no accident and the true motivations of the real perpetrators may never come to light because enough patriots like you and us are now awake.


 

Below, we thought you might like to see pictures of real Las Vegas rescue vehicles and personnel. Notice that the jurisdiction is clearly shown on the uniforms, crime scene tape, and vehicles–something that the pictures above did not have.