Saturday, October 25, 2014

Despite hypocritical protests by European governments, on the contrary, Snowden disclosed that those “3rd party” partners are joined at the hip with their “Five Eyes” cousins. In a recent interview with Der Spiegel, Snowden was asked if “German authorities or German politicians [are] involved in the NSA surveillance system?” “Yes, of course. We’re in bed together with the Germans the same as with most other Western countries. For example, we tip them off when someone we want is flying through their airports (that we for example, have learned from the cell phone of a suspected hacker’s girlfriend in a totally unrelated third country–and they hand them over to us. They don’t ask to justify how we know something, and vice versa, to insulate their political leaders from the backlash of knowing how grievously they’re violating global privacy.” Disclosing new information on how UKUSA functions today, Snowden told the German newsmagazine: “In some cases, the so-called Five Eye Partners go beyond what NSA itself does. For instance, the UK’s General [sic] Communications Headquarters (GCHQ) has a system called TEMPORA.”

Free MacBook Pro 17 Inch i7 (click here)

Those who follow Glenn Beck might be aware that Tuesday marks the release of his latest book, “Agenda 21,” the suspenseful and perhaps sobering tale of a futuristic America in which a UN-led program spawned an authoritarian state where individuals are stripped of all personal rights and freedoms. Oddly, Beck’s novel is not simply a work of fiction, but based on an actual program created by the United Nations by the very same name — “Agenda 21″ — which, according to the UN’s own website, is a “comprehensive plan of action to be taken globally, nationally and locally by organizations of the United Nations system, governments and major groups, in every area in which human impacts on the environment.” In so many words, the United Nations seeks to co-opt, via individual governments, and eventually, a “one-world government,” privately held land under the auspices of ensuring its “sustainability.” Worse still, the UN’s Agenda 21 has even laid out plans for “depopulation” or rather, “population control.” If it sounds like something out of George Orwell’s 1984, that is because Agenda 21′s tenets are eerily in line with the demented alternate reality Orwell himself had imagined while scribing the pages of his famed novel. “Sustainable development” is the catch-phrase Beck urged his Monday evening viewers to be leery of. Where one can live and what land should be designated for would, under fully-realized Agenda 21 plan, be controlled by the United Nations and a future one-world government. Consider the following section from the UN website on Agenda 21′s plan for “promoting sustainable human settlement development.” Free MacBook Pro 17 Inch i7 (click here) Emphasis added: The overall human settlement objective is to improve the social, economic and environmental quality of human settlements and the living and working environments of all people, in particular the urban and rural poor. Such improvement should be based on technical cooperation activities, partnerships among the public, private and community sectors and participation in the decision-making process by community groups and special interest groups such as women, indigenous people, the elderly and the disabled.These approaches should form the core principles of national settlement strategies. In developing these strategies, countries will need to set priorities among the eight program areas in this chapter in accordance with their national plans and objectives, taking fully into account their social and cultural capabilities. Furthermore, countries should make appropriate provision to monitor the impact of their strategies on marginalized and disenfranchised groups, with particular reference to the needs of women. 7.5. The program areas included in this chapter are: (a) Providing adequate shelter for all; (b) Improving human settlement management; (c) Promoting sustainable land-use planning and management; (d) Promoting the integrated provision of environmental infrastructure: water, sanitation, drainage and solid-waste management; (e) Promoting sustainable energy and transport systems in human settlements; (f) Promoting human settlement planning and management in disaster-prone areas; (g) Promoting sustainable construction industry activities; (h) Promoting human resource development and capacity-building for human settlement development. Watch below as Beck explains exactly what Agenda 21 is and how everyday Americans are already experiencing its implementation, perhaps without even realizing it. The videos that follow feature Agenda 21 experts — even one self-proclaimed “liberal democrat” — delving deeper into this sinister-sounding agenda. They discuss how the program has slipped under the radar, working its way into everyday life slowly but surely, and what the outcomes of full implementation would be. Free MacBook Pro 17 Inch i7 (click here) ———————— People are shocked by the scope of secret state spying on their private communications, especially in light of documentary evidence leaked to media outlets by former NSA contractor Edward Snowden. While the public is rightly angered by the illegal, unconstitutional nature of NSA programs which seize and store data for retrospective harvesting by intelligence and law enforcement officials, including the content of phone calls, emails, geolocational information, bank records, credit card purchases, travel itineraries, even medical records–in secret, and with little in the way of effective oversight–the historical context of how, and why, this vast spying apparatus came to be is often given short shrift. Revelations about NSA spying didn’t begin June 5, 2013 however, the day when The Guardian published a top secret FISA Court Order to Verizon, ordering the firm turn over the telephone records on millions of its customers “on an ongoing daily basis.” Before PRISM there was ECHELON: the top secret surveillance program whose all-encompassing “dictionaries” (high-speed computers powered by complex algorithms) ingest and sort key words and text scooped-up by a global network of satellites, from undersea cables and land-based microwave towers. Past as Prologue Confronted by a dizzying array of code-named programs, the casual observer will assume the spymasters running these intrusive operations are all-knowing mandarins with their fingers on the pulse of global events. Yet, if disastrous US policies from Afghanistan and Iraq to the ongoing capitalist economic meltdown tell us anything, it is that the American superpower, in President Nixon’s immortal words, really is “a pitiful, helpless giant.” In fact, the same programs used to surveil the population at large have also been turned inward by the National Security State against itself and targets military and political elites who long thought themselves immune from such close attention. Coupled with Snowden’s disclosures, those of former NSA officer Russell Tice (first reported here and here), revealed that the agency–far in excess of the dirt collected by FBI spymaster J. Edgar Hoover in his “secret and confidential” black files–has compiled dossiers on their alleged controllers, for political leverage and probably for blackmail purposes to boot. Free MacBook Pro 17 Inch i7 (click here) While Tice’s allegations certainly raised eyebrows and posed fundamental questions about who is really in charge of American policy–elected officials or unaccountable securocrats with deep ties to private security corporations despite being deep sixed by US media, they confirm previous reporting about the agency. When investigative journalist Duncan Campbell first blew the lid off NSA’s ECHELON program, his 1988 piece for New Statesman revealed that a whistleblower, Margaret Newsham, a software designer employed by Lockheed at the giant agency listening post at Menwith Hill in North Yorkshire, England, stepped forward and told the House Permanent Select Committee on Intelligence in closed session, that NSA was using its formidable intercept capabilities “to locate the telephone or other messages of target individuals.” Campbell’s reporting was followed in 1996 by New Zealand investigative journalist Nicky Hager’s groundbreaking book, Secret Power, the first detailed account of NSA’s global surveillance system. A summary of Hager’s findings can be found in the 1997 piece that appeared in CovertAction Quarterly. As Campbell was preparing that 1988 article, a report in the Cleveland Plain Dealer alleged that arch-conservative US Senator Strom Thurman was one target of agency phone intercepts, raising fears in political circles that “NSA has restored domestic, electronic, surveillance programs,” said to have been dialed-back in the wake of the Watergate scandal. Ironically enough, congressional efforts to mitigate abuses by the intelligence agencies exposed by the Church and Pike Committees in the 1970s, resulted in the 1978 creation of the Foreign Intelligence Surveillance Court. However, as The New York Times reported July 7, that court “in more than a dozen classified rulings . . . has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans,” a “parallel Supreme Court” whose rulings are beyond legal challenge. In an 88-page report on ECHELON published in 2000 by the Electronic Privacy Information Center (EPIC) Newsham said that when she worked on the development of SILKWORTH at the secret US base, described as “a system for processing information relayed from signals intelligence satellites,” she told Campbell and other reporters, including CBS News’ 60 Minutes, that “she witnessed and overheard” one of Thurman’s intercepted phone calls. Like Thomas Drake, the senior NSA official prosecuted by the Obama administration under the 1917 Espionage Act, for information he provided The Baltimore Sun over widespread waste, fraud and abuse in the agency’s failed Trailblazer program, Newsham had testified before Congress and filed a lawsuit against Lockheed over charges of sexual harassment, “corruption and mis-spending on other US government ‘black’ projects.” Free MacBook Pro 17 Inch i7 (click here) A year earlier, in a 1999 on the record interview with the Danish newspaper Ekstra Bladet, Newsham spoke to journalists Bo Elkjaer and Kenan Seeberg, telling them of her “constant fear” that “certain elements” within the US secret state would “try to silence her”; a point not lost on Edward Snowden today. “As a result,” the newspaper reported, “she sleeps with a loaded pistol under her mattress, and her best friend is Mr. Gunther–a 120-pound German shepherd that was trained to be a guard and attack dog by a good friend in the Nevada State Police.” “To me,” the whistleblower said, “there are only two issues at stake here: right or wrong. And the longer I worked on the clandestine surveillance projects, the more I could see that they were not only illegal, but also unconstitutional.” “Even then,” between 1974 and 1984 when she worked on ECHELON, it “was very big and sophisticated.” “As early as 1979 we could track a specific person and zoom in on his phone conversation while he was communicating,” Newsham averred. “Since our satellites could in 1984 film a postage stamp lying on the ground, it is almost impossible to imagine how all-encompassing the system must be today.” When queried about “which part of the system is named Echelon,” Newsham told the reporters: “The computer network itself. The software programs are known as SILKWORTH and SIRE, and one of the most important surveillance satellites is named VORTEX. It intercepts things like phone conversations.” Despite evidence presented in her congressional testimony about these illegal operations, “no substantive investigation took place, and no report was made to Congress,” Campbell later wrote. “Since then,” the British journalist averred, “investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident, but was designed into the system from the start.” (emphasis added) This would explain why members of Congress, the federal Judiciary and the Executive Branch itself, as Tice alleges, tread lightly when it comes to crossing NSA. However, as information continues to emerge about these privacy-killing programs it should also be clear that the agency’s prime targets are not “terrorists,” judges or politicians, but the American people themselves. In fact, as Snowden stated in a powerful message published by WikiLeaks: “In the end the Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless. No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised–and it should be.” How did we get here? Is there a direct line from Cold War-era programs which targeted the Soviet Union and their allies, and which now, in the age of capitalist globalization, the epoch of planet-wide theft and plunder, now targets the entire world’s population? ECHELON’s Roots: The UKUSA Agreement Lost in the historical mists surrounding the origins of the Cold War, the close collaboration amongst Britain and the United States as they waged war against Nazi Germany and Imperial Japan, by war’s end had morphed into a permanent intelligence-military alliance which predated the founding of NATO. With the defeat of the Axis powers, a new global division of labor was in the offing led by the undisputed superpower which emerged from the conflagration, the United States. Self-appointed administrator over Europe’s old colonial holdings across Africa, Asia and the Middle East (the US already viewed Latin America as its private export dumping ground and source for raw materials), the US used its unparalleled position to benefit the giant multinational American firms grown larger and more profitable than ever as a result of wartime economic mobilization managed by the state. By 1946, the permanent war economy which later came to be known as the Military-Industrial Complex, a semi-command economy directed by corporate executives, based on military, but also on emerging high-tech industries bolstered by taxpayer-based government investments, was already firmly entrenched and formed the political-economic base on which the so-called “American Century” was constructed. While resource extraction and export market domination remained the primary goal of successive US administrations (best summarized by the slogan, “the business of government is business”), advances in technology in general and telecommunications in particular, meant that the system’s overlords required an intelligence apparatus that was always “on” as it “captured” the flood of electronic signals coursing across the planet. The secret British and US agencies responsible for cracking German, Japanese and Russian codes during the war found themselves in a quandary. Should they declare victory and go home or train their sights on the new (old) adversary–their former ally, the Soviet Union–but also on home grown and indigenous communist and socialist movements more generally? In opting for the latter, the UK-US wartime partnership evolved into a broad agreement to share signals and communications intelligence (SIGINT and COMINT), a set-up which persists today. In 1946, Britain and the United States signed the United Kingdom-United States of America Agreement (UKUSA), a multilateral treaty to share signals intelligence amongst the two nations and Britain’s Commonwealth partners, Canada, Australia and New Zealand. Known as the “Five Eyes” agreement, the treaty was such a closely-guarded secret that Australia’s Prime Minister was kept in the dark until 1973! In 2010, the British National Archives released previously classified Government Communications Headquarters (GCHQ) files that provide an important historical overview of the agreement. Also in 2010, the National Security Agency followed suit and published formerly classified files from their archives. Accompanying NSA’s release was a 1955 amended version of the treaty. It’s secretive nature is clearly spelled out: “It will be contrary to this Agreement to reveal its existence to any third party unless otherwise agreed by the two parties.” In 2005, 2009 and 2013, The National Security Archive published a series of previously classified documents obtained from NSA under the Freedom of Information Act that revealed agency thinking on a range of subjects, from global surveillance to cyberwar. What we have learned from these sources and reporting by Duncan Campbell and Nicky Hager, are that the five agencies feeding the surveillance behemoth, America’s NSA, Britain’s GCHQ, Canada’s Communications Security Establishment (CSE), Australia’s Defense Signals Directorate (DSD) and New Zealand’s Government Communications Security Bureau (GCSB), are subdivided into first and second tier partners, with the US, as befitting a hyper-power, forming the “1st party” and the UK, Australia, Canada and New Zealand forming “2nd party” partners. Under terms of UKUSA, intelligence “products” are defined as “01. Collection of traffic. 02. Acquisition of communications documents and equipment. 03. Traffic analysis. 04. Cryptanalysis. 05. Decryption and translation. 06. Acquisition of information regarding communications organizations, procedures, practices and equipment.” “Such exchange,” NSA informed us, “will be unrestricted on all work undertaken except when specifically excluded from the agreement at the request of either party and with the agreement of the other.” “It is the intention of each party,” we’re told, “to limit such exceptions to the absolute minimum and to exercise no restrictions other than those reported and mutually agreed upon.” This certainly leaves wide latitude for mischief as we learned with the Snowden disclosures. Amid serious charges that “Five Eyes” were illegally seizing industrial and trade secrets from “3rd party” European partners such as France and Germany, detailed in the European Parliament’s 2001 ECHELON report, it should be clear by now that since its launch in 1968 when satellite communications became a practical reality, ECHELON has evolved into a global surveillance complex under US control. The Global Surveillance System Today The echoes of those earlier secret programs reverberate in today’s headlines. Last month, The Guardian reported that the “collection of traffic” cited in UKUSA has been expanded to GCHQ’s “ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analyzed. That operation, codenamed Temporal, has been running for some 18 months.” Then on July 6, The Washington Post disclosed that NSA has tapped directly into those fiber optic cables, as AT&T whistleblower Mark Klein described to Wired Magazine in 2006, and now scoops-up petabyte scale communications flowing through the US internet backbone. The agency was able to accomplish this due to the existence of “an internal corporate cell of American citizens with government clearances.” “Among their jobs documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.” Following up on July 10, the Post published a new PRISM slide from the 41-slide deck provided to the paper by Edward Snowden. The slide revealed that “two types of collection” now occur. One is the PRISM program that collects information from technology firms such as Google, Apple and Microsoft. The second source is “a separate category labeled ‘Upstream,’ described as accessing ‘communications on fiber cables and infrastructure as data flows past’.” Recently, Der Spiegel, reported that NSA averred the agency “does NOT target its 2nd party partners, nor request that 2nd parties do anything that is inherently illegal for NSA to do.” This is an outright falsehood exposed by former Canadian Communications Security Establishment (CSE) officer Mike Frost. In a 1997 CovertAction Quarterly exposé, Frost recounted how “CSE operated alone or joined with NSA or GCHQ to: intercept communications in other countries from the confines of Canadian embassies around the world with the knowledge of the ambassador; aid politicians, political parties, or factions in an allied country to gain partisan advantage; spy on its allies; spy on its own citizens; and perform ‘favors’ that helped its allies evade domestic laws against spying.” “Throughout it all,” Frost insisted, “I was trained and controlled by US intelligence which told us what to do and how to do it.” Everyone else, Der Spiegel reports, is fair game. “For all other countries, including the group of around 30 nations that are considered to be 3rd party partners, however, this protection does not apply. ‘We can, and often do, target the signals of most 3rd party foreign partners,’ the NSA boasts in an internal presentation.” It should also be clear that targeting isn’t strictly limited to the governments and economic institutions of “3rd party foreign partners,” but extends to the private communications of their citizens. Der Spiegel, citing documents supplied by Snowden, reported that the agency “gathered metadata from some 15 million telephone conversations and 10 million Internet datasets.” The newsmagazine noted that “the Americans are collecting from up to half a billion communications a month in Germany,” describing the surveillance as “a complete structural acquisition of data.” Despite hypocritical protests by European governments, on the contrary, Snowden disclosed that those “3rd party” partners are joined at the hip with their “Five Eyes” cousins. In a recent interview with Der Spiegel, Snowden was asked if “German authorities or German politicians [are] involved in the NSA surveillance system?” “Yes, of course. We’re in bed together with the Germans the same as with most other Western countries. For example, we tip them off when someone we want is flying through their airports (that we for example, have learned from the cell phone of a suspected hacker’s girlfriend in a totally unrelated third country–and they hand them over to us. They don’t ask to justify how we know something, and vice versa, to insulate their political leaders from the backlash of knowing how grievously they’re violating global privacy.” Disclosing new information on how UKUSA functions today, Snowden told the German newsmagazine: “In some cases, the so-called Five Eye Partners go beyond what NSA itself does. For instance, the UK’s General [sic] Communications Headquarters (GCHQ) has a system called TEMPORA.” “TEMPORA,” the whistleblower averred, “is the signals intelligence community’s first ‘full-take’ Internet buffer that doesn’t care about content type and pays only marginal attention to the Human Rights Act. It snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit.” “Right now,” Snowden said, “the buffer can hold three days of traffic, but that’s being improved. Three days may not sound like much, but remember that that’s not metadata. ‘Full-take’ means it doesn’t miss anything, and ingests the entirety of each circuit’s capacity. If you send a single ICMP packet and it routes through the UK, we get it. If you download something and the CDN (Content Delivery Network) happens to serve from the UK, we get it. If your sick daughter’s medical records get processed at a London call center . . . well, you get the idea.” We do; and thanks to Edward Snowden we now know that everyone is a target ————————— PROJECT MONARCH PROGRAMMING DEFINITIONS 1. ALPHA - This is considered "regular programming." This is actually what would be considered a "base Personality" control. The original purpose of Alpha was to program (train/condition the mind through torture) of the espionage agent to perform certain difficult tasks. This program also locks in photographic memory, improves physical strength up to 5 times, and visual acuity is radically improved to 40 times normal limits, along with a host of other super-human traits. Alpha programming is accomplished through deliberately subdividing the victim's personality, which in essence causes a left brain right brain division allowing for a programmed union of L and R through neuron pathway stimulations and you've got . a person who can now utilize both sides of his/her brain for any simple task. 2. BETA -This is a combination of Alpha ; "logic" programming and Beta primordial (primitive mind) sex programming. This programming eliminates learned moral convictions and stimulates the primitive sexual instincts devoid of inhibitions. This training Program (usually for women) is for developing the "ultimate prostitute"...a sex machine. This is the most used (by the abusers knowledgeable of the Project Monarch) program. Children of knowledgeable persons are being preconditioned through incest and "sold" into the conspiracy for additional Beta conditioning to eventually satisfy the bizarre perversions of politicians, bankers, drug lords, or anyone deemed valuable to the conspiracy. 3. DELTA - This program was originally designed to train special agents and espionage agents' minds for becoming fearless terrorists devoid of fear and basic self preservation instincts capable of incredible feats of physical endurance and murder. The new revised edition of Delta has pulled from the Delta program information on training the new breed of man - one who kills and, if caught, self-destructs. This program is now applied to some Beta prostitutes who double as drug mules...to protect the identity of their owners if they are caught, they die -of "natural causes." 4. THETA -Psychic programming ...the "exotic one". But not to be confused with the paranormal phenomenon of fortune telling or future forecasting. Those are examples of a magician's craft - while Theta psychic programming was and is the exploration of an unpredictable fact of human science. The initial results of Theta programmed subjects were inconsistent that the Theta project was virtually abandoned before its research completion date. Duke University, North Carolina, among other prominent "institutions", devoted many years to this project with what equated to poor results. It seems that the region of the brain able of transmitting and/or receiving "mental messages" has not yet evolved to a level for dependable communication...with any predictable, reliable consistency. The Soviets, however, invested billions of dollars into their version of psychic research and claimed/proved remarkable successes. With the advances in directed energy research... Theta "psychic driving" is obsolete. But the Theta program "head" was not dead yet. Theta couldn't die because of the Soviet's reported successes...it evolved into bio-medical human telemetry and directed target energy involving lasers and/or electromagnetic...the results of which were referred to as "electronic possession". The ultimate challenge for the 21st century exorcist... providing he worked a day job-as a skilled CIA supported Neurosurgeon. A few years ago, this programming technique involved the surgical implantation of sodium/lithium powered high frequency receiver/ transducers coupled to a multi-range discharge capacitor that when signaled by remote control would electronically stimulate designated parts of the brain to signal the victim to respond according to his/her program. These experiments were only partially successful with a high mortality and paralysis rate. However, the technical mind control equipment evolution would advance to levels well beyond the grasp of any reader. Now it seems that "implants" will eventually become as common in numbers as are the victims of trauma based psychological mind control...but non implanted ,non programmed victims will hold the largest majority...the 1990's version of mind control requires neither implant or program...just computer driven directed energy using microwave...anybody can become a target. THE COMPONENTS Originally the physical components thought to be necessary to program/deprogram were rather complex and cumbersome...enough "laboratory decadence" to make Dr. Frankenstein blush. There were elaborate sound and light-proof sensory depravation isolation chambers, some using exotic suspension fluids that could mimic weightlessness. Direct current high voltage with very low amperage electroshock devices are the most important tools of the trade as the brain is electrically powered. Voltages ranged from .072 volt to 200,000 depending on application and to what part of the body it was to be administered. There are "strap on" head and foot devices that could deliver a mind altering shock of an exact duration according to the subject's brainwave activity and/or heartbeat. Other portable hand held stun gun type devices can deliver shock up to 200,000 volts for a variety of reasons, but primarily for instant control of the conscious mind. A great deal of successful research and development went into the effects of harmonics or inaudible to the conscious ear sound waves that affect the RNA covering of neuron pathways to the subconscious. Harmonics generators, code named ether-wave, are capable of subconscious mind embedding detailed messages (commands linked to audible triggers). This is known as electronic programming and is a standard programming device in all forms of Project Monarch. Hence the reason many Monarch survivors (drug mules/prostitutes) recall being taken onto certain US military bases and "Freedom Ranch" a.k.a. trauma centers for "programming". Mind altering drugs...natural and synthetic compounds that can instantly alter certain brain/thought functions were developed from modern medical technology and from ancient witchcraft formulas. The revised components list is not so comprehensive and obvious. For instance, a sound proofed burial casket makes a great sensory depravation chamber similar to one being used now at a Kentucky (CIA) conditioning camp". There, Delta, Alpha, and Beta victims of this conspiracy are regularly taken by their owners for " reconditioning " a n d reprogramming for drug muling runs or "assignments". Most make it out of this man-made-hell alive, some don't...but as it is said, there's always more where those came from. Whereas, the only other equipment components needed are devices to hang victims upside down by their ankles, cattle prods the cylinder type that are inserted deep into the vagina or rectum for a "simulated orgasm with the devil". High voltage (up to 200,000 volts DC) hand held law enforcement type stun guns are a must tool for the victim's owner to erase certain memory (if used on the muscle area of the victims within 2 hours of the "to-be-forgotten" event, and to control the victim's "insane" fits of rage if they are mistakenly triggered to perform a pre- conditioned task and they are at the moment in the "wrong personality". The only other components the Beta owner must posses are a diary or a damn good memory of their programs, key, and a working knowledge of hypnosis. In other words, a small brief case will contain everything a Beta owner "needs" to control his slave...completely ...forever. THE FORMULA The formula for Beta programming is the exact same as for Alpha, the only difference is that through a series of specific tortures and commands the Beta victim retreats deeper into her primitive mind and the results are a woman with a child like insatiable sexual appetite. This re- tapped sexual appetite was "developed" in her formative years through constant incest with her father figure. What begins as unbearable pain to a child's mind quickly "switches" to an sexual desire for the very person who was abusing her...daddy. This reversal is the key to all programming -Pain becomes pleasure, up is down, etc. Hence the reason Colonel Michael Aquino, attached to the DIA, adopted the satanic philosophy of reversing everything including bad is good. WARNING The following information, although intended for multi- generational family abuse systems, is adequate to divide a person's base personality for enslavement purposes, but for humanitarian reasons, I cannot publish the actual programming information, If you try this at home -you are on your own, and when our nation "wakes up"...you will become a target for prosecution. First, slow body metabolism by reducing caloric intake say, for an average 125 lb. female 19-30 years of age to 300 per day -reduce to 0 intake of all sugar, lower protein intake accordingly, (This action will literally starve the brain into submission). From time to time water depravation may be necessary to swell the brain by raising the temperature making memory of experienced events difficult or impossible to recall by the victim a.k.a. the "kiss and not tell syndrome". Combine with 3 to 10 seconds-f 120,000 volts to leg or back. Vomiting and flu like symptoms will occur but memory is now hidden behind a wall of "black lightening". Sleep depravation - absolutely a must in preconditioning and continued maintenance for new programming. Victims must not experience more than two hours continuous uninterrupted sleep. Maximum sleep allowed 3 hours per 24 hour day. Days should be spent in heavy physical exercise to the point of constant exhaustion. This action stimulates the brain to overproduce endorphins and thus temporarily silence the logic center. This action also is responsible for reversing the brain's functions from right to left or vice versa. Victims will respond to most any command robotically and hypnotic programming becomes a breeze. Hanging the victims upside down for periods of time, one-two hours per day will further trick the brain into dissociation from reality and can reverse such primordial brain functions as turning pain into pleasure - up will become down - out will become in, and above all the person administering the tortures will become omnipotent in the victim's now rearranged mind. This phenomena is likened to the Stockholm Syndrome. Daily tortures administered should focus on any of the known victims former idiosyncrasies. This could include introducing ant into the ear canal or coverings the victim in say (harmless) spiders or snakes (rubber facsimile will work) or exposing them to loud noises (firecrackers) disguised as bombs, heated needles or toothpicks under the fingernails, even constant tickling. These idiosyncrasies then became "tortures-of-the-mind" tortures that there are no escape from. When the operator ceases torturing the victims short of death, he's considered benevolent and "worship" by the victim will again commence ...even stronger than before. The controllers voiced wishes will become instead commands to the victim and all moral decision making processes (sex, murder, etc.) totally bridged (ignored) by the "new mind" of the victim. High voltage electroshock has multi use purposes - for Torture, left brain right brain function, reversals, and, depending on the amount of voltage administered and the location on the body, to compartmentalize programs or to set in new ones. Electroshock is also used as a "harmless" not so subtle reminder to carry out commands. High DC voltage is a key component as it, too, produces an instant euphoric state due to the increased endorphin production, coupled with the victim's total lack of physical control. Sensory depravation can be accomplished through hanging in conjunction with eye and ear covers - or with more elaborate sound and light proof rooms or even burial caskets. I am more familiar with specially heated salt water tanks where buoyancy accomplishes weightlessness, and fitted electroshock movement sensitive sensors are positioned on the victims to stimulate the mental sensation of loss of consciousness while wide awake and should the victims move externally, high voltage is automatically administered and the victim actually looses consciousness momentarily. This process is repeated over and over until the brain is trained to stop all external body movement from the conscious mind. Then the victim can be audibly commanded and programmed to a calendar date to perform a task:...say 50 years in the future Without even being cued by an operator...flawlessly. This program becomes a part of the primitive mind -the same one that tells the victim's heart to beat, etc. Death or health programs can easily be put in place and are not diffusible through conventional psychiatry without knowledge of exact keys administered by an expert psycho/hypno- therapist. I personally know of one 13 year old girl who is currently institutionalized awaiting such care due to her being locked in through the use of sophisticated harmonics equipment from birth, But US Department of Justice officials have stopped her mother (Beta victim) in their pursuit of Justice...and so goes the mother's credibility and the needed expert mental health assistance for her child. Now you've got the formula. "Try" and protect yourself from it ...nobody else will. Free MacBook Pro 17 Inch i7 (click here) THE VICTIMS, PAST AND PRESENT It is "alleged"... The first victims were captured MPD spies and dissidents from friendly and dissident nations, but unfortunately for the second group of victims, there weren't enough caught to properly study and develop the so-called Manchurian Candidate, via psychological abuse with our country's newly organized Project MK Ultra. The second group, it is alleged, were bright aggressive young men who had applied to Officers Candidate School (OCS). These men took entrance exams and psychological tests, tests that revealed whether or not they would become "candidates" for Project Monarch as their entrance psychological exams revealed they were victims of child abuse. These eager young men were allegedly told (more or less) that they couldn't go to OCS for whatever reason but they could "volunteer" for a career in Intelligence and with their Top Secret "training" they could develop incredible super human physical and psychological abilities...with a "just sign here". This true but very misleading information created powerful patriotic images in their minds...they envisioned being "special" espionage agents in just a few months instead of years at OCS. 007 stuff...well, sort of anyway. They were the first volunteers! Their fates are unknown even to their families and themselves if they're still alive. The present day Beta victims are allegedly "recruited" a little younger than 19...BIRTH. Some (but certainly not all) by fathers who got caught sending kiddy porn through the US Mails, but most were either government or MOB connected. These "caught" fathers were more or less then blackmailed by alleged CIA agents to dedicate their child to the program in exchange for money, business favors, and protection against prosecution...these pedophiles became an honorable member of a US Government Criminal Conspiracy. The father's were then educated at government expense on how to precondition their little girl/boy with tortures of the mind and body and with sex - which would give this child a "gift that keeps on giving" Multiple Personality Disorder - a super child. Some more aggressive fathers would have a half dozen children and "dedicate" as many as "Uncle" wanted. Most all became affluent or rich...except the victims...The Victims of Project Monarch. Organized crime bosses jumped in the conspiracy for the protection of their lucrative child/adult pornography business. Day Care Centers were Opened by conspiracy members for what, was dubbed a "kiddy smorgasbord". Some conspirators got "sloppy" and used to much occult or satanic trauma for the Mind Control base on the kids and they "told". But to no avail...as our government regards public exposure of their own human experiments as a "threat to National Security". West Point had Day Care Center that recently collapsed under the pressure of irate parents who themselves were students at this elite OCS school in the "free" world. The same thing happened at Presidio, California. The government (US Army C/ID) covered it up in the name of National Security and the kids, are, in counseling now -scarred mentally for life. SO for now it looks like its going to be a return to "in home supply" and implants because it's the American way...and father and Uncle Sam "knows best" as they say. Note: There are many other known methods of recruiting victims for Alpha and Beta. This was just two common identified methods, among others, in professional sports. I could write a volumes on the other methods for types of Alpha victims such as "super baseball (victim) players who from time to time forget how to pitch and embarrass their owners. Ironically enough, one of the main alleged organizers of this conspiracy is a baseball fanatic and even required two of the Beta victims he used from time to time to memorize every players batting average on four teams...this man was US Attorney General, appointed by Reagan, who resigned his post in a cloud of dishonor and is now chief legal council for our "NEW WORLD ORDER" police force...the United Nations. THE USERS AND ABUSERS The identity of some of the main users/abusers of Project Monarch Alpha/Beta programmed victims have been positively identified to me by survivors who existed at the top of this US Government Criminal Conspiracy literally for their entire lives. There are other victims who are simply too afraid to talk now, programmed with the "No Where to Run, No where to Hide" and/or "Who Ya" Gonna Call" CIA themes, but can and will eventually... because they've named their abusers from the Pentagon to the White House. These users appear to be focusing not on recreational sex, but on drugs billions of dollars annually in heroin/cocaine mulled into the US via cruise ships, airplanes private and commercial by Alpha Beta victims. The sale of these drugs is allegedly supporting the CIA's illegal covert action habits. The CIA doesn't have a "Black Budget" like the Pentagon boys...they earn theirs the "old fashion way" - by importing and selling drugs through elaborate network systems of users that the CIA has taken years to establish. They also consume a lot of their own product! I've heard from victims some of the dollar amounts that were transferred via computer on just one deal that could buy a banana republic. The Beta mules stopped carrying suitcases full of cash in mid 1986 after the shift from Cuban/Jamaican suppliers went to Mexico. It has been confirmed that the North American Free Trade Agreement (NAFTA) treaty was Mexico' s reward for their cooperation. The abusers are really anyone the Beta victims have come in contact with...that knows what she/he is and how to activate their programmed triggers. To name a few, there are drug lords, politicians, (federal, state, and local) corrupt law enforcement personnel, big name entertainers who themselves usually own a Beta victim or two and a host of other conspiracy members. Victims are traded among members like livestock. When they reach 30 years of age they are many times used in snuff porn movies, or what is termed "thrown from the Freedom Train." The abusers are too numerous to mention here, but in the reports previously disseminated, were named - many on the Washington, DC level, and hopefully will become visible media targets once myself and concerned others wake up the populace with the well hidden truth. THE FUTURE Psychological mind control techniques, formulas and equipment, unlike nuclear weapon systems, can be reproduced without exotic and expensive component systems...in the privacy of one's own home by virtually any one with average intelligence, a little information, and no conscience tie. criminals). Mind Control Out Of Control is just as lethal as nuclear war byproducts, however through genetically engineering psychology...the "evil" seed is passed on generation to generation. Trauma based mind control, also aptly termed "white slavery" for the CHOSEN ONES IN THE 21ST Century will be predictably the largest "cottage industry" in terms of illicit profits, death, and destruction of innocent victims...unless the trend is stopped and those responsible in government and the private sector are punished and the survivors/victims given qualified rehabilitative psychiatric care. The US now has nuclear regulatory agencies which exercise caution as to who can even build nuclear weapons, power plants, x- ray machines, or even smoke detectors. But not for Mind Control - thanks to the same US government corrupt officials...it's out of control. The results of which are showing up everywhere. Multiple Personality Disordered persons are now common place - whereas before 1980 it was one of the rarest diagnosed psychiatric disorders...from 200 cases to 24,000. Which could mean a bare minimum over 250,000 undiagnosed programmed MPDs walking around waiting to explode with rage as serial killers, child abusers, etc. etc. etc., against the society that protects a few US government criminal conspirators -why? While we're waiting for the answer, another child is being raped, most likely by the very person biologically designed to protect them...their father. So in a few years - he can put a notice in his computer bulletin board..."Beta trained child for sale...Best offer...will trade for business of equal value." THE FUTURE? PROJECT MONARCH ALPHA, BETA PROGRAMMED VICTIM/ SURVIVOR IDENTIFICATION INFORMATION 1. Victim majority is female (71%). 2. Victims are Multiple Personality Disordered (100%). 3. Victims/survivors have (or are) participated in commercially and privately produced/sold legal and illegal pornography. (100%) interviewed). This pornography is often the "underground variety" of bestiality, child/adult, child/child, adult/infant, sado-masochistic, satanic/occult films and videos, magazines, and still photographs. 4. Older victims were frequently tattooed for easy identification with a "so-called" Blue or other colored MONARCH butterfly. This practice became more or less obsolete in the early 1970's and was replaced by the victim wearing butterfly hair barrettes, large butterfly ear rings, pins, necklaces, bracelets, or embroidered insignias to "advertise" their art of expertise to knowledgeable abusers. This rule applies to 100% of the victims interviewed. 5. ALL MONARCH survivors were victims of brutal sexual child abuse. Programmed survivors have been found to be multi- generational incest victims whose genealogy can be traced to either Catholicism, Mormonism, and/or members of US Intelligence Communities. 6. Many victims are frequently determined to have been the natural or adopted children of multi-generational Satanist or in some cases "renegade witchcraft" occult groups. 7. Survivors once in therapy are always adjusted to possess homicidal and/or suicidal ideations which only recently has been determined to be as a result of sophisticated trauma base psychological programming. 8. Victims almost always possess multiple electric prod (stun gun) scars and/or the resultant moles in the muscled areas of the back, arms, neck and thighs. Some victims are also (in addition to) vaginally mutilated through "body piercing" (rings placed in nipples, vaginal lips, or clitoris) or through actually elaborated carving the vaginal area. Also, scars from branding irons or knives throughout the body will depict pentagrams, animals, crosses, even certain cartoon characters. There is also a group that "forces" moles through electric shock and/or chemical application to the neck and face to further identify to abusers the victim's training/programming Information about the Illuminati click here

Thursday, October 23, 2014

Free MacBook Pro 17 Inch i7 (click here)

Software Systems Engineering verses Straight Computer Science War Games

Free MacBook Pro 17 Inch i7 (click here) Information about the Illuminati click here

Free MacBook Pro 17 Inch i7 (click here)
Free MacBook Pro 17 Inch i7 (click here) Information about the Illuminati click here

Wednesday, October 22, 2014

Free MacBook Pro 17 Inch i7 (click here)

Free MacBook Pro 17 Inch i7 (click here)


S.A.D.


Students Against Drunks


Copyright M. Rowe Mathematics  

Free MacBook Pro 17 Inch i7 (click here) Information about the Illuminati click here

Thursday, October 16, 2014

Free MacBook Pro 17 Inch i7 (click here)

Free MacBook Pro 17 Inch i7 (click here) Free MacBook Pro 17 Inch i7 (click here) Checkerboard Applet

Information about the Illuminati click here