Nanochips and Smart Dust – Weaponized Control of the Mind-Emotion Nexus

The Dangerous New Face of the Human Microchipping Agenda

READ the post at SOURCE

Posted in 5G IoT, Alert, Awakening humans, Call to action, Cell signalling function, Chemtrails, CON, Empower harmlessness/truth, Fallen One [s], Genetic engineering, Inner Technology, Media malfeasance, Nano technology, Perpetrated harm, Public Notice, Science and technology, Silence is agreement, Trans-humanism, UN Agenda 21 And 2030, Wireless Wi-Fi | Tagged , , , , , , , , | 3 Comments

Truth About Pet Cancer Chapter 1 – Cancer History, Prevention, Treatment

The Truth About Pet Cancer
Published on Oct 17, 2017

Despite every effort, pet cancer rates continue to rise. We asked WHY… The Truth About PET Cancer Miniseries is Now Playing right here:

We’re on a mission to save every pet out there. If you’re an animal lover, please share this with all the pet parents you know with the SHARE button above.

Rodney Habib, Dr. Karen Becker, and Ty Bollinger (The Truth About Cancer) are hosting our brand new 5 Chapter miniseries where we share exactly what to do to prevent and even heal your furry friends from cancer.

If you love your furry friends as much as we do, you won’t want to miss one minute of this 5 Chapter miniseries.

As veterinarians race to find a cure… or a method of pet cancer prevention, new thinking has changed everything…

Follow our journey as we interview the top medical professionals and cancer research scientists to get The Truth About Pet Cancer.

Did you know…

– In the 1970’s Golden Retrievers won average would live to be
17 years old. NOW – they only 9 years.

– Just 50 years ago only 1 in 100 dogs got cancer. NOW, it’s 1 in 1.65 dogs that will be diagnosed with cancer. That’s 66% of all dogs.

– Cancer is the leading cause of death among cats

SOURCE with thanks

Please share to help the pets and their owners. Thank you.

Doreen Ann Agostino
Without Prejudice and Without Recourse

Posted in Empower harmlessness/truth, Revelations, Science and technology | Tagged , , | Leave a comment

Survival of Spaceship Earth 1972 – The Ultimate Rockefeller Depopulation Propaganda Film

On your far right holding the larger document is Maurice Strong, the man who put the UN into the environmental ‘business’

On Oct 16.17 The Corbett Report published a video ‘Survival of Spaceship Earth (1972)’ [below]. I found a condensed version of the video with Maurice Strong, the man behind the ‘green’ curtain, which prompted me to connect the dots.

Survival of Spaceship Earth 1972 (condensed version)

Published on Feb 15, 2015

Too many on the spaceship (earth) not sustainable. Must keep ship sustainable (balance population and resources) The UN plan for world gov. and depopulation. They use propaganda to get you to accept their plan. Time to wake up to reality!!!

The Strangest Documentary You’ll Ever See

By The Corbett Report
Oct 16.17

Imagine, if you will, a documentary on population control and resource restriction produced by the United Nations.

A documentary that opens with Rue McClanahan of “Golden Girls” fame pretending to be sexually aroused by the prospect of hundreds of world leaders cooped up in a UN conference room talking about the environment.

A documentary that illustrates a point about abortion-as-population-control by repeatedly and rapidly cross-cutting between a screaming, bloody newborn in the delivery room and a close-up of a gun barrel. (Gun shot. Screaming baby. Gun shot. Screaming baby. Gun shot. Screaming baby.)

A documentary featuring that renowned environmental crusader, John D. Rockefeller III, as an “expert” commentator on the dangers of overpopulation.

A documentary narrated by no less a personage than Perry Mason himself, Raymond Burr.

A documentary in which Hugh Downs, standing in front of the UN headquarters as the melodramatic soundtrack swells in the background, tells us that the only hope for the “problem” of humanity on planet earth lies with the UN.

Now stop imagining this phantasmagorical orgy of nonsense and pull up a cozy chair, because you’re about to witness just such a documentary…

Find out more about the craziest UN globalist propaganda documentary you’ll ever see in this week’s edition of The Corbett Report Subscriber

For free access to this editorial at

From Doreen

The Yellow Brick Road to Climate Change

Maurice Strong, a self-confessed socialist, was the man who put the United Nations into the environmental business. Strong was the driving force behind the idea of world governance by the United Nations. 

The Great CON of man is consent. The documentary is to CON-vince humans to consent to one world governance under the United Nations. For decades they have been laying the foundation to unleash UN Agenda 21, 2030 Sustainable Development, disarmament, DNA/Identification*, one world currency [cashless], one world police [UN], and one world religion headed by the Fallen One a.k.a. Satan the anti-Christ; the absence of Christ Consciousness.

*The mark of the beast is a number. Modify the number of Human DNA Chromosomes with Technology and you have a controlled beast. From the video ‘My Name is Cain … Tubal Cain’

How Did We Get Into Digital Prison?

Without a cell phone to receive a Steemit text message to verify email, and receive a Steemit password it is not possible to set up an account etc. This is mild compared to control mechanisms ahead unless people wake up now to defeat a common enemy, take back their health, birth rights, lives, family, dignity, property, and Souls which are being!

Synthetic sentience

The internet itself is approaching the horizon line of becoming a form of “collective organism” to which we, the human species, have become engaged in an irreversible symbiosis.

Survival of Spaceship Earth (1972)

Published on May 14, 2013

Prior to ‘the’ meeting in Stockholm, 1972, a film was produced with the intent to emphasize the need for change in an ever evolving calamity that was befalling mankind and planet earth at the time. The film, Survival of Spaceship Earth attempts to exclaim, not just explain, but to make plain and loud, the severity of subjects like: population control; urbanization; employment; crime; pollution; war; weather & climate; over consumption; attitude; the ocean; disease; and food production, in the early 1970′s.

SOURCE with thanks

The Ultimate Rockefeller Depopulation Propaganda Film

Published on May 28, 2015

Aaron takes on the 1972 United Nations propaganda film that has the captains of the planet take control over the world’s growing population, using Malthusian rhetoric to demand that “less people be invited to be born” and that every trick in the book be used for control. This shameless parade features such regular eugenicists as John D. Rockefeller III, Obama Science Czar John P. Holdren, Agenda 21 chief Maurice Strong and numerous other psuedo-scientists using their clout to demand development taxes from the rich countries lest a “population bomb” be dropped on the world… and that’s just a preview of things to come under carbon taxes, environmental laws and “microliving” under the austerity of a world where humans must be the “solution to the disease they created.”

Severe damage has already been done to the human genome with vaccines, chemtrails, GMO food, wireless technology, and who knows what else?

Kevin Galalae recently published a video explaining the hidden objectives and methods of the international system of covert depopulation and coerced globalization that I will share in another Blog.

Please inform others to end our silence, which is agreement. Thank you.

Doreen Ann Agostino
Without Prejudice and Without Recourse

Posted in 5G IoT, Autonomous artificial intelligence, Awakening humans, Call to action, Desynchronize, Empower harmlessness/truth, Fallen One [s], Greater well-being, Inner Technology, Population control, Power vs. Force, Public Notice, Trans-humanism, UN Agenda 21 And 2030 | Tagged , , , , , , , , | 1 Comment

Planetary Lock Down Almost Complete – Silence Is Agreement!

How US Military Control of Social Media Has Already Imprisoned Us and Thrown Away the Key

Long before we could imagine the evil of the elite pedophile globalists of the world, they had already started locking down planet earth. They knew that humanity’s wakening consciousness would jeopardize their planetary reign so they had to find a way to imprison our minds, direct our thinking, and limit our expanding consciousness.

They did it right under our noses.

They did it with our own hard-earned money.

While we were busy rearing our children and tending our families, they were quietly implementing Alinsky’s rules and Soros’ regimes. They are evil people who prey on our children, profit from our blood, rape our women and countries, and control us with their money illusions. They don’t care about our national borders, cultural uniqueness, spiritual paths, or personal liberty. YOU are THEIRS to be “farmed” any way that brings them greater wealth, longer life, and wicked pleasures.

You have now awakened and realized that the nightmare is actually on the other side of your dreamy sleep. What do you do? First and foremost is to educate yourself on what has occurred since you stopped paying attention. The American Intelligence Media has been writing Citizens Intelligence Reports for several years now so that you can become highly informed patriots. Patriots need to know precisely who the enemy is, how they have weaponized the world, and what we can do to throw off our digital shackles.

The global elites know that education is the key to enlightenment. For this reason, you will find more and more outlets for self-education becoming censored and shut down by the planetary rulers. They simply can’t have us know what is going on as there are far too many of us and too few of them.

In this Citizens Intelligence Report we want to alert you to the grave dangers of the weaponization of the internet and social media. A new technological revolution is taking place that will affect all of us. They make it sound so cool and fun – the Internet of Things—but it is nothing more than a self-imposed prison that will eventually control you 24/7 once you connect into the network.

The more you participate in the automatic information fed directly to your devices that is personalizing your news, entertainment, business, and “life-patterns”, the more you will think you are free and fully informed. Actually, you will become more and more limited by what your pattern-of-life generates as your individualized algorithms. A mechanical virtual world will be created around you that becomes your personalized digital prison that, at first, may seem like digital heaven, but later rears its ugly head of control and enslavement. By then, it will be too late for any of us to break free.

Your new digital prison is being created every time you do an internet search, click a ‘like’ button on Facebook, type a phrase into your computer, choose something to watch on television, or speak a word into your phone. Every speck of “information” that you participate in is used to make your personalized digital life-pattern profile.

Even your bank account and everything you spend is being gathered in an NSA program called Marina [1] that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone automatically pings the route and distance to your destination.

Your phone can also activate all your devices that are connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker starts and your TV comes on with your usual show as the heating pad in your easy chair turns on to your favorite setting.

There is no end to the “machine intelligence” support you can get from mechanically augmented reality. Now Facebook and its fake, phony, stooge inventor Mark Zuckerberg wants you to put on a 3-D visor and enter a self-created virtual reality world where it feels you are free to do as you please.

How Did We Get Into Digital Prison?

We have created this world by being lazy and not asking the hard questions—who owns and controls this technology, what is the ultimate goal of the Internet of Things, does this technology serve or enslave humanity? Eric Schmidt, the CEO of Alphabet has bragged about this new system that claims it is ‘ready to go’.

Google, somehow, morphed into a “mother company” that is named Alphabet which owns all 26 subsidiaries of Google, including the only AI on the planet called Google Deep Mind. Alphabet seems to have unlimited money and unlimited technology patents that are supported wholesale by Wall Street and the U.S. military-industrial complex.

Essentially, Google has always been owned and operated by the dark side of our military-industrial complex. Like Cisco Systems, Inc. before them, Google (Alphabet) was incubated through the U.S. Defense Advance Research Project Agency (DARPA) and the CIA’s private corporate venture capital company called In-Q-Tel. (Ask yourself how it is that a government entity can hold private companies and enjoy private profits outside of Congressional oversight, but we digress.)

Google, Cisco, Facebook, Twitter, and most other search engines and social networks all run on allegedly “open source” code given out by DARPA/In-Q-Tel to universities and corporations to develop. Open source means free to the user without the need to pay royalties or fees to the inventor or creator. Basically, whoever is able to take this weaponized open source code (with encryption back door keys already built in) and develop it for the consumer wins the military contracts.

Then Wall Street (Goldman Sachs and JPMorgan Chase usually) sweeps in with venture capital, and in short time values the new tech company in the tens and hundreds of billions. After that, the banks loan whatever money these companies need to buy out all their competition. These newly acquired “Silicon Valley corporate stooges” then become front-men for even more weaponized military systems. This now includes Facebook, LinkedIn, Instagram, Pinterest, YouTube, Tumblr and Amazon.

Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that he is simply having fun. Since most American and global businesses have some component on the internet, the militarization of the internet can be as powerful as the threat of global nuclear annihilation. Just imagine if the internet was turned off tomorrow – permanently, never to return.

Most of what we think of as modern life would end, and many people would never recover. Economies would collapse, wars would rage, and many of us wouldn’t know what to do or what to think. Modern life would collapse because the weapon of the internet already controls modern life. The life of the pygmy in Indonesia would go on uninterrupted, but American life would screech to a halt. We might not be able to “reboot” for years. This thought begs the question, “How did we let this happen?”

“We”, the users of the Internet and all things digital, were happy to use the new technology without asking basic questions like: Who actually owns the cables the Internet travels through? Can “they” turn it off? Why was so much power given over to the internet? At this point, is there an alternative or way out of this digital?

The answers to the questions above can be given, and there is a solution to this looming problem. But first we must see the internet and all of its “wonders” for exactly what they are – weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools that they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by nonsensical entertainment, religion is replaced by consumerism, and the real world by virtual reality. 

Patent Theft and Weaponization of the Internet

Not counting the social networking technology that was stolen, taxpayers of the United States, through the CIA’s private venture capital company In-Q-tel, largely funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized these devices and systems against the citizens of the world.

‘We the People’ demand that these companies, and any other like them that have been financially seeded and funded by U.S. taxpayers, BE GIVEN TO THE PEOPLE AS A PUBLIC UTILITY and that the fictitious owners of these companies be prosecuted for patent infringement and/or theft.

In numerous articles from Americans for Innovation, the Anonymous Patriots have found unequivocal evidence that IBM’s Eclipse Foundation stole the original ideas and source code for Google and Facebook from Columbus, Ohio innovator Leader Technologies, Inc. through their patent attorney James P. Chandler III. Chandler was mentor of Barack Obama, Eric Holder, Robert Mueller, James Comey and John Podesta, to name but a few.

james-p-chandlerChandler represented Leader Technologies, Inc. from the moment Leader realized their innovations were patentable in early 2000. But rather than file the patents immediately, Chandler suspiciously advised Leader to “reduce to practice” the invention before he would file them.

Hindsight shows that Chandler gave that advice in order to steal the actual source code when it was ready. Chandler bamboozled Leader into taking custody of a copy of the source code in 2002 which he immediately gave to the IBM Eclipse Foundation which then disseminated it to Zuckerberg/Facebook and other companies.


David J. Kappos, IBM’s attorney (who also served later as Obama’s Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office from 2009 to 2013) was also a student of Chandler at the time of the theft. This theft is one of if not the largest theft of intellectual property and trade secrets in history. It was clearly part of the the weaponization of these digital platforms.

For more information, please see our Citizens Intelligence Reports on these subjects:

Weaponization of Social MediaWeaponization of Social Media

.Patent theft 2.
Patent Theft by IBM

 How Does Patent Theft Work?

Digital Prison Mechanisms 

Once the Silicon Valley high-tech “dummy” companies are established by stooges who are pre-selected for their willingness to incorporate military “back doors” into all of their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every devise that broadcasts a signal – phone, computer, or any devise on the Internet of Things. Any intelligence agency can simply type in a query and access the metadata collected from every digital devise on the internet or that uses Wi-Fi or cell phone towers.

Among these spying tools is the RIOT (Rapid Information Overlay Technology]) program by Raytheon which leaked to the public on Nov. 16, 2010.[2]

This information is used to target individuals for consumer behaviors as well as DoD intelligence collection. If an internet user is targeted, there are hundreds of ways to “attack” the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.

The object of the intelligence is simple: Control the user. Social networks on the internet are military experiments in social manipulation. This is what is called PSYOPS – or psychological operations.  

Another program used to gather the Internet metadata is XKeyscore, a secret computer system first used by the NSA for searching and analyzing global Internet data, which it collects on a daily basis. It enables almost unlimited surveillance of anyone anywhere in the world.

The NSA’s databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored. It can also access your browsing histories or Google search terms that you’ve entered, and can alert them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects ALL data, on EVERYBODY, ALL THE TIME. [3]

Another component of NSA data collection is a program called Marina, a database and analysis tool set for intercepted internet metadata. The database stores metadata up to a year. The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of the target. It also has the capability to look back on the last 365 days’ worth of metadata seen by the collection system, whether or not the target was tasked for collection. The stored metadata is mainly used for pattern-of-life analysis.

Americans are not exempt because metadata is not considered data by U.S. law. (See Section 702 of the FISA Amendments Act).

Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation (SWS). This program is developing a parallel to Planet Earth, with billions of individual nodes (prisons) to reflect every man, woman, and child.

SWS will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. It provides an environment for testing psychological operations so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners, including U.S. citizens. SWS also mimics financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.

These four programs – XKeyscore, Marina, RIOT, and Sentient World Simulation – create some of the environments which intend to imprison and control those who willingly enter into the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even “neutrals” are the target of these systems.

No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet. Just look how President Donald Trump uses Twitter as a weapon against the corporate media. There is a battle for information and every person is in the middle of the battle whether they like it or not.

jade-helm-master-the-human-domainThe largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Master the Human Domain.” Just the very name of the exercise should show you where the U.S. military is focusing its time and energy– on U.S. citizens. It also clearly tells us the intent of the U.S. military is – to Master the Human Domain. So much for America freedom and liberty.

Some History About DARPA/In-Q-Tel “Front Men”

The Defense Advanced Research Projects Agency (DARPA) has controlled technological innovation since 1958 when it was created by the military-driven Department of Defense. DARPA is the father of war-fighting, both conventional and digital. DARPA was controlled by a man they called “Yoda”, who leads a group called the Highlands Forum that directs all military research and development – the weaponization of every U.S. patent, over 4,000 of which have been stolen. 

DARPA’s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum, have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing.

The U. S. military wants our enemies to have the technology so that it can spy upon them and keep up with them in weaponry. If both sides have the same technology and weapons, then more money needs to be spent on bigger and better weapons continually and the military industrial complex thrives and gets richer.

Their business plan is simple: Make sure the customer has a need for military products and services by supplying their enemies with competing products and services, a business cycle that never stops and guarantees that the military industrial complex will always be selling something to someone.

History of In-Q-Tel – a CIA Venture Capital Investment Firm

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. The inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the unregulated and unconstitutional private military-industry network around the Highlands Forum has become increasingly successful in dominating U.S. defense policy.

Basically, the CIA needed to launder all of its stolen gold and set up many companies to wash its illegal money. Why do you think they call the CIA ‘The Company’?

In-Q-Tel also uses a company called SAIC, the U.S. defense firm Science Applications International Corporation, which changed its name to Leidos in 2013, now operating SAIC as a subsidiary. SAIC/Leidos is among the top 100 largest defense contractors in the U..S, and works closely with the U.S. intelligence community, especially the NSA. The agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.

The Highlands Forum (Group)

Since 1973, Andrew Marshall has headed up one of the Pentagon’s most powerful Andrew Marshallagencies, the Office of Net Assessment (ONA), the U.S. defense secretary’s internal ‘think tank’ which conducts highly classified research on future planning for defense policy across the U.S. military and intelligence community. Out of Marshall’s work in the ONA came an independent group called the Highlands Forum.

Marshall, now 93 years old, is the DoD’s most elusive but one of its most influential officials. He created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation-only, not open to the public, and no written records are kept, except for the snippets that participants reveal in their braggadocio and biographies, which are considerable.

Marshall created this type of secret platform so that no one could prove the Highland Forum exists or that it has the greatest power over high-tech warfare on the planet. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz, who are  widely considered the hawks of the neoconservative movement in American politics, were among Marshall’s star protégés.

The Highlands Forum’s influence on U.S. defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense; its direct link to Marshall’s ONA; and its direct link to DARPA/In-Q-Tel and the Highlands Forum.

Highlands Forum

The Highlands Forum has served as a two-way ‘influence bridge’: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector.

There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale. 

oNeillAround 1994, the Highlands Group was chaired by Richard O’Neill as an official Pentagon project at the appointment of Bill Clinton’s then defense secretary William Perry. In O’Neill’s own words, the group would function as the Pentagon’s ‘ideas lab.’

Total participants in the DoD’s Highlands Forum number over a thousand; although meetings and sessions largely consist of small closed workshop style gatherings of maximum 25–30 people, bringing together experts and officials depending on the subject.

The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA to the ONA, and is deeply plugged into the Pentagon’s policy research task forces. In 2001, under the Total Information Awareness Program, President Bush secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants.

From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA’s secret eavesdropping systems.

This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Donald Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be based on the premise that the Department of Defense will ‘fight the net’ as it would an enemy weapons system.” The U.S. should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.

As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.

O’Neill said his job as Forum chairman was to scope case studies from real companies across the private sector, such as eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiority — how to dominate the information market — and leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the Department of Defense.

Highland Group Exposed

Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoor keys so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.

The Highland Forum directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA.

For more information on this topic, see our Citizens Intelligence Report entitled Who Really Owns the Military Industrial Complex: The Highlands Forum Exposed.

DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel microprocessers, Cisco routers, Google search engines, Facebook social networks, the IBM Internet of Things, cellphones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.

The Highlands Forum has been the headquarters of weaponizing military patents, intellectual property and trade secrets for five decades. Andrew Marshall has the blood of millions on his hands, yet he is considered an America hero instead of a warlord criminal.

Intel (In-Q-Tel) Inside 

Intel 1Inside every Intel microprocessor is a smaller processor that lets Intel – who works for the Department of Defense – control every aspect of your computer remotely no matter what encryption codes or firewalls you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.

It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. According to WikiLeaks, there is even secret diskless memory embedded on each chip that spies can use to store and retrieve data and instructions on each chip that is inaccessible to the user and supposedly only used for internal operations and maintenance. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.

Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel “Inside” your computer. Intel collects “intelligence” but it also provides a “back door” to control, or “turn off” your computer at will just like it has been demonstrated that Cisco routers have a “back door” open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.

Samsung calls the on/off feature “Fake Off” meaning the TV looks like it is off, but is merely pretending to be off.

“I don’t have anything to hide”

But why shouldn’t DARPA, through Intel, have open access to all your files and your computer? DARPA funded all the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare.

Just as the Internet was originally named after its founding group, DARPA, ARPARNET, microprocessors also were military creations that were permitted into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful digital platforms of cyber warfighting.

Most semiconductor chips are made in Singapore, Taiwan, China, or Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.

Internet Warzone

In-Q-Tel is Warfare Technology – Weaponized Venture Capital & Banking

Since Bill Clinton in 1999, In-Q-Tel funds promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum. The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.

The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tank for inventing and controlling innovations that can be turned into weapons. In-Q-Tel is a bottomless source of funding for the CIA provided without any Congressional oversight.

Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.

Since 1999, there efforts have been supplemented by other quasi-secret organizations including The IBM Eclipse Foundation and the National Infrastructure Advisory Council.

For more information on this topic, see our Citizens Intelligence Report entitled DARPA Vader and the Evil Intel Empire Inside Uncovering the DoD Sith Lords that Control Your Laptop

Cisco Systems Monopoly

Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allowed a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.

The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor put millions of customers and their private information at risk and jeopardized the security of electrical power facilities, public utilities, and transportation systems.

Publicly, Cisco blamed the government for not telling them about this vulnerability, but that was simply the pot calling the kettle black – the government was blaming itself for the vulnerability, thus manipulating public opinion with a boldfaced deception.

Cisco has been accused of remotely monitoring users’ connections through Cisco’s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.

Cisco has also been accused of building a firewall backdoor developed by NSA into its routers. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they’re delivered. These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

In fact, hiding in plain sight, Cisco registers the Dual_EC_DRBG NSA encryption back door key with NIST (National Institute of Standards and Technology on all products for export.) This key relies on an inbuilt flaw in the encryption standard which only the NSA knows and can exploit at will to break in to any hardware, software or firmware.

DARPA’s Google

The U.S. intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.

In 1994  two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA wanted to control and monitor digital information, particularly the data flowing over the internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It has users’ e-mail addresses and knows where they are physically located, and what they are searching for on the web. Google has a “profile” on every user.

The government can “command” that any company, including Google, to turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Google’s terms of service, the company advises its users that it may share its “personal information” with outside organizations, including government agencies, in order to “detect, prevent, or otherwise address fraud, security or technical issues” and to “protect against harm to the rights, property or safety of Google.”

Google’s terms of service go further, they actually assume control of all user information with clever sleight of legal hand: “When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.”

The NSA partnered with Google, just one of hundreds of companies who have been brought into the NSA’s circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install backdoors or other forms of privileged access.

The NSA helps the companies find weaknesses in their products. But it also pays the companies not to fix some of them. Those weaknesses  give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure.

Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain ‘information superiority.’

The origins of this strategy trace back to Bill Clinton and the Highlands Forum which has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the U.S. and around the world. The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war.

The U.S. intelligence community is implicated in nurturing today’s web platforms for the precise purpose of utilizing the technology as a mechanism to fight the global ‘information war’ -  a war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the U.S. military-industrial complex.

NSA’s Microsoft

Microsoft shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order.

What We Have Learned So Far

  • Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA/In-Q-Tel projects that flourished with new technologies created and funded by the military for cyberwarfare.
  • Most high-tech moguls are simply “front men” selling DARPA and In-Q-Tel (the CIA’s DARPA) products that control our lives and spy on us continually.
  • Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.
  • Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on “virtually every exchange on the Internet.”
  • IBM hired many of Germany’s mind control scientists from WWII and carried on those experiments through the CIA that formed in 1947; those experiments took on many different names including MKUltra. Those German scientists had used IBM computers during the war to catalogue “undersirables” like Jews, gypsies, homosexuals, Poles and Russians and it organized the trains to the death camps for individuals marked for extermination and hideous experimentation.
  • IBM/Cisco System’s “Internet of Things” plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.
  • The internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyberwarfare.
  • The U. S. government has helped build, monitor, regulate, and control all physical aspects of Internet transmissions and broadcasts through the U. S. Board of Broadcasting Governors, which is a part of the Department of Defense. Every transmission through the internet or through cellphone towers is completely controlled by the U. S. government.
  • The U. S. government can “turn off”, filter, manipulate, and control the Internet through the federally controlled transmission cables that span the world. If the U. S. wanted to turn off North Korea’s internet access, it is as simple as a keystroke. Thus, the U. S. government has been boldly lying about the Internet since its inception.

What Evil is the Highlands Forum Up to Now?

By 2008, the NSA effectively resurrected the Total Information Awareness project with a focus on Internet data-mining via comprehensive monitoring of e-mails, text messages, and Web browsing. We also now know that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA’s XKeyscore.

Goldman Sachs is CIA

Goldman Sachs (with JPMorgan in tow) is the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the U.S. military intelligence community.

The convergence of these powerful financial and military interests around the Highlands Forum–through George Lee’s sponsorship of the Forum’s new partner, the MIIS Cybersec initiative–is revealing in itself. MIIS Cybersec’s director, Dr, Itamara Lochard, has long been embedded in Highlands.


Dr. Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.

Dr. Lochard maintains a comprehensive database of 1,700 non-state groups including insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors, to analyze their organizational patterns, areas of cooperation, strategies and tactics.

Her views disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the U.S. Air Force’s Institute for National Security Studies on US strategy toward ‘non-state armed groups.’ The study on the one hand argued that non-state armed groups should be urgently recognized as a ‘tier one security priority,’ and on the other that the proliferation of armed groups provide strategic opportunities that can be exploited to help achieve policy goals.

There have and will be instances where the United States may find collaborating with armed group is in its strategic interests. But sophisticated tools must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests.

In 2009, it also emerged from a Google patent application that the company had deliberately been collecting ‘payload’ data from private WI-fi networks that would enable the identification of “geolocations.” In the same year, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security.

It is not just Google that is a key contributor and foundation of the US military-industrial complex. It is the entire Internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the U.S. intelligence community (or powerful financiers embedded in that community) — which sustain the internet and the telecoms infrastructure. It is also the myriad of start-ups selling cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community.

Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.

Brainwashing 3.0

In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, damasiowho are principal investigators in the ‘Neurobiology of Narrative Framing’ project at the University of Southern California. Evoking Zalman’s emphasis on the need for Pentagon psychological operations to deploy “empathetic influence,” the new DARPA-backed project aims to investigate how narratives often appeal “to strong, sacred values in order to evoke an emotional response,” but in different ways across different cultures.

The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon’s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.

The research is based on extracting narratives from millions of American, Iranian, and Chinese weblogs, and subjecting them to automated discourse analysis to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers/listeners from different cultures to gauge their reaction different narratives “where each story makes an appeal to a sacred value to explain or justify a morally-questionable behavior of the author.” Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.

DARPA’s goal is to mine millions of American weblogs as part of its ‘neurobiology of narrative framing’ research. As the Pentagon’s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy.

U.S. Patent Office Works For DARPA/In-Q-Tel

Just as Leader Technologies was ripped off by NSA/FBI/CIA ATTORNEY James Chandler and the IBM Eclipse Foundation for their patents that are essential to Facebook for scalability, so too many inventors have had their patents stolen by the U.S. Patent Office.

This rip-off and theft is rationalized as legal once the patent committee determines that a patent may have some impact upon U.S. “national security.”  Over five thousand patents have been legally confiscated (stolen) by the U. S. Patent Office, including many free energy patents that directly compete with oil and gas, and given to DARPA/In-Q-Tel for further development and weaponization. Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place.

This national security rationalization for the theft of intellectual property fundamentally violates the Fifth Amendment Takings Clause which states that “private property [shall not] be taken for public use, without just compensation.”

If an inventor of a patent that is confiscated by the U. S. Patent Office tries to continue work on the patent, that inventor may end up in jail. The rules of this patent confiscation are located in 35 U.S. Code § 181 – Secrecy of certain inventions and withholding of patent, which provides that the government can take any patent and make it secret and use it at their discretion, or just make sure that it never gets developed.

There are strict penalties if the inventor even speaks of the patent after it has been “confiscated.”

Members of DARPA and In-Q-Tel provide the Defense Department and the CIA with these “secret” patents so that they might first be weaponized for military purposes. Often, patents are then given to fake companies, supported with U.S. tax dollars, who bring the patent to market.

This is what happened with the patent theft of Leader Technologies that was then used by the front companies Goggle and Facebook, which are actually directed by the Department of Defense and the CIA. Clearly the law the dark state chooses to ignore is Leader’s overarching property rights in the Fifth Amendment Takings Clause, which takes precedent.

The Patent Office did not withhold Leader’s patents, and therefore cannot rely on its confiscation six years earlier when Leader’s intellectual property was a trade secret disclose only to its duplicitous attorney James P. Chandler.

Patent theft is only the tip of the iceberg. Industrial espionage is common in all industries. Alphabet/Google and Facebook have seemingly endless money to “absorb” any competition through buying them and keeping competition at abeyance. There are many other ways to “suppress” technologies that threaten the “big” companies, whether oil, tech, pharmaceuticals, agriculture/food, energy production. Big corporations use governments, especially multi-national organizations, to do their bidding. Big corporations spend huge amounts of money on lobbying governments to “pay to play.”

And when money can’t accomplish the goals, they resort to stealing patents and killing inventors.

Suppression and sabotage of technologies has been the norm since the dawn of the twentieth century when fossil fuels and the petrodollar came to rule world economics. Over 5000 new patents have been “deemed” secret and have been suppressed by existing patent laws. There are U. S. patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens “national security.”

Under Vice President Nixon, in the early 1950s, illegal, secret patent legislation was written, permitting the U.S. government to steal technology from inventors and/or suppress it should a case be made the technology might threaten the status quo.

The shocked inventors also were informed that they could be jailed up to 20 years if they made the theft of their technology known to the public.

35 U.S. Code § 186 – Penalty

Whoever, during the period or periods of time an invention has been ordered to be kept secret and the grant of a patent thereon withheld pursuant to section 181, shall, with knowledge of such order and without due authorization, willfully publish or disclose or authorize or cause to be published or disclosed the invention, or material information with respect thereto, or whoever willfully, in violation of the provisions of section 184, shall file or cause or authorize to be filed in any foreign country an application for patent or for the registration of a utility model, industrial design, or model in respect of any invention made in the United States, shall, upon conviction, be fined not more than $10,000 or imprisoned for not more than two years, or both.

(July 19, 1952, ch. 950, 66 Stat. 807Pub. L. 100–418, title IX, § 9101(b)(3), Aug. 23, 1988, 102 Stat. 1568Pub. L. 112–29, § 20(j), Sept. 16, 2011, 125 Stat. 335.)

Patent Corruption

Very clearly, the patent system is merely a lure for unsuspecting innovators to share their ideas so that the military-industrial complex can steal them at will.

Want to know about the free energy devices that this corrupt patent system is suppressing from the people? See our Citizens Intelligence Report entitled


Other DARPA/In-Q-Tel Programs

We have discussed the companies that you may already know have control over your life, but there are many, many more that we don’t know about. Many of us are reliant, even addicted, to these the internet, cellphones, and Facebook pages and groups. It has been shown that the internet creates different illnesses and some researchers say the internet is more addictive than drugs.

But what is worse is that DARPA/In-Q-Tel already has many programs that are not publicly known about and are being used right now to control U. S. citizens with cyberwarfare technologies. Let’s take a look at some of those other programs described by whistleblowers, like the Vault 7 Wiki-leaks, and see what those programs are intending to do for the U. S. military. 

Total Information Awareness – Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook.

PRISM – A clandestine national security electronic surveillance program operated by the United States National Security Agency which can target customers of participating corporations outside or inside the United States.

Sounds of Silence – The Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude – or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent #5,159,703.

ThinThread – A U.S. National Security Agency program involved wiretapping and sophisticated analysis of the resulting data. 

Trailblazer Project – U.S. National Security Agency program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.

Turbulence – Turbulence is a National Security Agency information-technology project started circa 2005. It was developed in small, inexpensive “test” pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers.

Tailored Access Operations – Intelligence-gathering unit of the NSA that is capable of harvesting approximately two petabytes of data per hour.  

Boundless Informant – A system deployed by the NSA to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States. 

Bullrun – A highly classified NSA program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).

Stuxnet – Is the first discovered malware that spies on industrial systems, and it was used to attack Iran’s nuclear facilities. It is believed to have originated from the United States under the Bush administration. 

Carnivore – A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. 

DCSNet – The Federal Bureau of Investigation’s point-and-click surveillance system that can perform instant wiretaps on any telecommunications device located in the United States. 

Fairview – A mass surveillance program directed at foreign mobile phone users. 

ICREACH – Surveillance front-end GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records. 

Magic Lantern – A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications. 

Main Core – A personal and financial database storing information of millions of U. S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources. 

MAINWAY – A NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States. 

MUSCULAR – Overseas wiretapping of Google’s and Yahoo’s internal networks by the NSA. 

MYSTIC – Is a voice interception program used by the National Security Agency. 

Room 641A – A telecommunication interception facility operated by AT&T for the U.S. National Security Agency. 

Sentry Eagle – It monitors and attacks an adversary’s cyberspace through capabilities include SIGINT, Computer Network Exploitation, Information Assurance, Computer Network Defense, Network Warfare, and Computer Network Attack. The efforts included weakening U. S. commercial encryption systems. 

Special Collection Service – A black budget program that is responsible for “close surveillance, burglary, wiretapping, breaking and entering.” It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations. 

Terrorist Finance Tracking Program – A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration’s “Global War on Terrorism.” 

Multi-state Anti-Terrorism Information Exchange (MATRIX) – A data mining system originally developed for the Florida Department of Law Enforcement.
Insight Program – It detects threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. Develops integrated human/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors. 

EM Fields and Hidden Symbols – Uses techniques to incept thoughts and ideas into the mind. Once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device.  

Nervous System Manipulation by Electromagnetic Fields from Monitors – US Patent and Trade Office, Patent #6,506,148 on subliminal behavior modification, 1/14/2003, United States Patent 6,506,148, Loos, January 14, 2003. Abstract: It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. The image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528 Filed: June 1, 2001

Narrative Networks Program – Developed classified techniques used to manipulate trust in humans. For its Narrative Networks program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind.

Mind Control Project – Remotely disrupts political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects.” Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation. MIT neuroscientists have shown that they can plant false memories. Most of the research in this area currently revolves around how to induce and eliminate fear.

Controlling Americans Through the Internet

It is important to remember that since Barack Obama added new language in the National Defense Authorization Act of 2012, Americans are now seen as possible terrorists and are military targets and enemies of the state, unless proven otherwise.  In essence, all of the above cyberwarfare programs are being used on Americans indiscriminately and with ill intent.

The Patriot Act, later called the U. S. Freedom Act is the exact opposite of its name – it takes away freedom from patriots and lets multi-national corporations and the “run-away military” use the American people as a cyberwarfare testing grounds.

This fact is little known: the U. S. military is now allowed to act within the borders of America and target Americans as hostile war-actors (as the military calls us). We are in an information war and the stacks are high – American freedom or military/corporate control. This battle wages while many people are complacent and perfectly happy with their digital experiences.

The internet is a weapon and it is our job to find out what the battle is all about and make sure that we retain our U. S. Civil Rights and American freedom and liberty. We must call out DARPA, In-Q-Tel, Highland Forum, and the U.S. Patent Office for their patent thefts, continuous lies, and cyberwarfare manipulations and demand that U. S. taxpayer dollars that funded these evil weaponized tools be acknowledged and that all cyber-tools be turned over to Americans without the spy systems and information control systems attached.

Humanity must now fight to restore freedom and privacy before it is lost forever.

To evolve as human beings into the next century, we need a free and private internet and social networks that are not manipulated as a tools to lock us inside the prison of our minds. Remember that the intent is to “master the human domain” via the mechanical domain controlled by ahrimanic warlords who wish to take our freedoms away..

[1] Katherine Losse, Mark Zuckerberg’s anathemized former speechwriter, revealed in her book The Boy Kings (2012) that the term at Facebook for Marina was “dark profiles.”

Losse, Katherine. The Boy Kings. New York: Simon & Schuster, 2012, p. 201- 202. Print, eBook.

[2] Urch, Brian. (Nov. 16, 2010). Raytheon’s Riot [Rapid Information Overlay Technology] Program Mines Social Network Data Like a Google for Spies. Raytheon.


SOURCE with thanks

Doreen Ann Agostino
Without Prejudice and Without Recourse


Posted in Alert, Awakening humans, Banksters, Call to action, CON, Desynchronize, Empower harmlessness/truth, Fallen One [s], Genetic engineering, Intender [you], Media malfeasance, Power vs. Force, Public Notice, Revelations, Science and technology, Silence is agreement | Tagged , , , , , , , | Leave a comment

The Real Reason Weather Is Manipulated

Weather weapons NIOBY: Now In Our Back Yard!

5G [microwave] and Firestorm California

Chemtrails: The Exotic Weapon

The Real Reason Weather IS Manipulated
While everyone is busy arguing that control over weather doesn’t exist, history reveals that it was developed for an ulterior motive…

View original post

Posted in Transparency | Leave a comment

InPower Movement: SB 649 was vetoed in California!!!

Sent: Monday, October 16, 2017 9:39 AM
Subject: SB 649 has been vetoed!!

Just before midnight last night, California Governor Jerry Brown vetoed Senate Bill 649!! As you may know, the bill was the wireless industry’s dream, as it would have blocked the ability of cities and counties to control the installation of microwave radiation antennas. If this legislation had passed, it would have then opened the door for the industry to take over in other regions.

There are so many safe tech advocates who worked on this matter so diligently, from many different angles. While our movement did not yet have the resources sufficient to pull the trigger on a wide implementation of the Liability Action for California legislators, a targeted campaign was done in which legislators were provided a summary and how they will be held financially liable, should the bill pass.

Moving forward, it will be key to make sure ALL legislators realize and understand across the board that they WILL be held to account as individuals — so that nothing like this bill can ever come close to passing again. Because, as we know, the industry is not yet ready to throw in the towel

And, if and when the need arises, several thousand have already indicated participation interest in a Liability Action to address SB649 and or 5G deployment at the root cause of the problem. (Re-subscribe on our main page to indicate your interests.)

Below is an email update from Paul McGavin who played an instrumental role in this battle victory

So on behalf of people everywhere, we express our sincere gratitude to Paul and the hundreds of activists and groups who led the way — with a multitude of strategies and approaches being undertaken.

* * *

Hi, Josh et. al.

The Fat Lady finally sang — a sweet lullaby from the new veto recording artist, Jerry Brown:

“the interest which localities have in managing rights of way requires a more balanced solution than the one achieved in this bill.”

Brown’s veto message is here:

Mercury News – October 16, 2017 at 12:25 am | UPDATED: October 16, 2017 at 1:41 am

Time for a small victory lap with San Jose Mayor, Sam Liccardo . . .

Thanks to everyone that showed up and helped with this fight.  Special thanks to Harry Lehmann, Bruce Kushnick and Nina Beety for their excellent, substantial analyses and to all of the scientists who are publishing the truth about the hazards of RF/MW radiation exposures.

I went to bed not knowing, but my wife woke me up and told me. This was six months of full-time effort for me. I can now resume my normal life.

I agree with Bruce, it is time to cut off the FCC, AT&T and Verizon at the knees . . .

Paul McGavin

Josh, Cal & the InPower Team

From Doreen

The InPower Movement reflects inner Power of choosing to cooperate, and collective Power of ‘liability action’. Thankfully they are gaining momentum!

Individuals who realize everything is energy, frequency, and vibration innerstand the power of gratitude. The more gratitude energy we project for this victory the more victories will return to us.

Doreen Ann Agostino
Without Prejudice and Without Recourse

Posted in 5G IoT, Awakening humans, Desynchronize, Empower harmlessness/truth, Energy, Frequency, Vibration, Holistic/Wholistic, Intender [you], Public Notice, Wireless Wi-Fi | Tagged , , , , | Leave a comment

The Real ‘Shift’ Has Nothing To Do With Politics

Our tendency to externalize responsibility is destructive and must be re-adjusted towards ourselves

October 13, 2017

Sergey Baranov, Contributor
Waking Times

If you still believe a word the politicians say, it simply means you are living in a trance and subject to mind control. Those who have already awakened to the true matrix of political reality are laughing through their tears. They are laughing because they can see through the nicely packaged lies, fabricated for you by those you trust your life to. But they also cry, because they feel helpless to change anything.

This is the reality in which we all live today. Can we affect change in our diseased world run by the least among us?How did we come to a point when we the people have lost our voices, our confidence in ourselves and our minds along the way?

We were slowly cooked in the pot like a frog, which didn’t jump out because it didn’t feel the rising temperature of the water. Then when the water boiled, it was too late. The frog was cooked. The same is happening to us. Little by little our freedom and liberty are being stripped away.

Regardless of countless warnings from those who dedicated their lives to fighting for freedom, we remain asleep and entertained. But these warnings are not designed for entertainment. Their purpose to share and wake us up so we can do something about the growing trend towards tyranny, which eventually will swallow us like whales eats the fishes.

Unfortunately, a dystopian world is no longer a matter of science fiction but a reality waiting us around the corner. Living in the 21st century, it is hard to imagine that a world like that of Nazi Germany or the Communist Soviet Union can rise from the ashes like an evil Phoenix and enslave humanity once again, leading to an imprisoning and extermination of a large portion of the population. To us it seems rather unlikely. But is it? Do we not see it already happening? Some of us do.

The same authoritarian voices, whose echo reaches us from the archives of history, can be heard on TV every day. The preachers are different, but the message is all the same. The mainstream media, which has lost credibility during the last election in the United States, is continuing to spread propaganda regardless. The factory of lies is relentless and will keep going until the very last consumer keeps buying it. But propaganda has reached new heights. In recent days, it has employed some famous actors, who use their authoritative voice to spread the lie.

The latest video made by Morgan Freeman deserves contempt.

It was rather sad to see him do it. Up until now, he was among my favored actors. I liked his acting, look and voice. In his video he makes a statement that we are at war with Russia, which is reckless and dangerous. Let’s analyze it for a moment. Morgan Freeman is known for playing authority figures in numerous movies, a sensible voice, which many of us love and respect. But now, after playing God in the movie Bruce Almighty and Evan Almighty, Professor Samuel Norman in Lucy, Malcolm Beech, the leader of the human resistance in the movie Oblivion and many other roles in which he assumes authority, is now preaching insanity and lies.

No war has been declared with Russia, no shot or missile was fired. Not even a word of hostility has been said by president Putin toward the U.S. So how we are at war? Just because a famous actor says so?

Then he continues by saying that Putin himself, while being angry at the collapse of his country, gets revenge on America by helping Trump win. But according to what president Trump is supposedly trying to do, this makes no sense whatsoever. The attempt by the president to protect the sovereignty of the U.S.A by securing American borders, enhancing the economy by creating jobs, cutting taxes and restoring the Constitution, which is the only protection from tyranny, increasing the birth rate, trying to give Americans a better healthcare deal and building an even stronger military, thus making America great again, points clearly toward a constructive approach, beneficial to the American people. Consequently, if Putin helped Trump to become president, then logically speaking, Putin would be the best friend of American people, not an enemy as Morgan Freeman is trying to portray him. Thus, the actor’s statement is simply illogical.

Interestingly enough, another great actor, Leonardo DiCaprio, has recently given a speech at the U.N. about global warming. Regardless of the validity of the notion, the use of actors for political gain is obvious. Who will be next to come from one stage to another to play their worse role? The powers that be are rather desperate if they resort to use of famous actors to push their propaganda forward.

In fact, the message of this video is openly hostile towards Russia and can cause an escalation of tension between the two superpowers, which in fact has more in common than not.

Essentially, and perhaps without realizing it, Morgan Freeman promotes a nuclear Armageddon, which could result from the continuous effort of teasing the nuclear bear.

All this, of course, does not have to happen. The future is not written in stone. We can change its course by changing the present state of our minds, choosing peace over war, sanity over madness, friendship over hostility, cooperation over competition, constructive dialogue over destructive threats and so on. Our choices are much greater than choosing an aisle or window, paper or plastic, Coke or Pepsi, as the great Gorge Carlin has pointed out.

Freedom is like a muscle, which needs to be constantly exercised. Otherwise, it gets atrophied. The same goes for our thinking. If we don’t do it for ourselves, there will be others who will do it for us and generally speaking, this kind of social affair does not result in a healthy lifestyle.

Meanwhile, as all of this is happening, people seem to be distracted by things that simply don’t matter. Obsession with lifeless objects, shallow ideas, wasteful researches, celebrity life, etc. It is shocking to observe preoccupation with meaningless stuff in our society, when the very foundation of it is at risk.

It is puzzling to see a great deal of money being spent on a search for microbial life on other planets, which are light years away, when evolved, intelligent life on our own planet is ignored, devalued, misunderstood and destroyed. What is the point? Would it not be wiser to use this money on cancer research and save human lives instead? Just an idea. I’m sure there are more.

No wonder Elon Musk is working hard to colonize Mars. I have no doubts that he understands the threats we are facing as humanity, but is escaping our only option? We have the money, technology and the mind to affect change in this world. All we need is to come together as a human species and decide our future for good. This is within our reach. What are we waiting for? Neither the Messiah, nor aliens will arrive to help us out. Our tendency to externalize responsibility is destructive and must be re-adjusted towards ourselves. And that is the real SHIFT, which must be made, not waited for.

About the Author

Sergey Baranov is the author of Path, a book that will be of interest to any spiritual seeker who seeks honesty above all else. Living in various countries and growing up in different cultures, Sergey gained an understanding of the essential, a core commonality of human experience that lies beneath the differences to be found in every culture. By walking different paths and seeing through their limitations, Sergey found shamanism as a unifying path for all people regardless of their cultural background. He currently lives in Peru with his family where he conduct monthly San Pedro retreats.

This article (The Real Shift Has Nothing to Do With Politics) was originally created and published by Waking Times and is published here under a Creative Commons license with attribution to Sergey Baranov.

From Doreen

An informative post that puts humanity’s present opportunity to set ourselves free into perspective; please share it. Thank you.

Doreen Ann Agostino
Without Prejudice and Without Recourse

Posted in Awakening humans, Desynchronize, Empower harmlessness/truth, Energy, Frequency, Vibration, Holistic/Wholistic, Intender [you], Media malfeasance, Public Notice, Silence is agreement | Tagged , , , , , , , , , | Leave a comment
%d bloggers like this: