Who Really Owns and Controls the Military-Industrial
Complex?
The
Millennium Report Exclusive:
The following exclusive report is quite lengthy and exhaustive. There is no other series of disclosures about the Military-Industrial Complex on the Internet as revealing and radioactive.
The classified information and privileged data contained in this report are well worth downloading before they are disappeared forever from the World Wide Web.
There are two other very important exposés that ought to be read in tandem with this one. They, too, disclose much secret information about The Highlands Forum. As follows:
GOOGLE: Conceived, Funded and Directed By The CIA — Part I
GOOGLE: Conceived, Funded and Directed By The CIA — Part II
Only after reading Part I, will the many plots and sub-plots of Part II make much more sense.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Who Owns and Controls the Military-Industrial Complex?
The Highlands Forum EXPOSED
By Anonymous Patriots
We
are not only incensed that our elected officials are turning a blind eye to the
transnational enemy within our country and around the world, we
are disgusted with these warlords, both military and corporate, that send our
sons and daughters to wars-for-profit to have their blood spilled for their own
families’ profits. As citizens of the world, we are filled with anger when we
see men, women, and children slaughtered and displaced so that the few at the
top can earn profits from blood and guns. We are sick and tired of wars ad
nauseam, from our fathers who were killed in Viet Nam, our neighbors on
9-11, displaced war refugees around the world, not to mention the millions of
starving children around the world who could use the money we spend on DARPA
and their war tools for clean water, food, and education.
This
anger has arisen in us to the point that we had to find out WHO IS IN
CHARGE. Unlike many of our politicians, we know that naming our enemy is
the first step towards identifying and disarming them.
Many
readers to this site will be quite familiar with the usual suspects: the
Rothchilds, Rockefellers, and big banksters who command the top tier of the
human wealth pyramid. We also know that they work closely with government
agencies to plan and implement continuing military, cyber, and economic wars.
We
have all read about how the Bilderberg Club, Illuminati, and the Knights of
Malta coordinate these machinations with the Vatican. We know that the U.S.
Federal Reserve is just a private corporation with a monopoly to print Federal
Reserve notes that manipulates and plunders the U.S and global economy.
It
is what we don’t know that interested us. So we decided to follow the money. Who
are the war profiteers that are plundering American lives, wealth, and
democracy?
In
this article, the Anonymous Patriots are back again. Armed with the internet
and a keen ability to interpret the geopolitical landscape, we have traced
these GLOBAL WAR CRIMINALS back to the economic machinations that make them
richer and more powerful with every military invention that they hoist on us.
We are tired of becoming poorer, sicker, and more enslaved by these ruling
sub-humans and ask you to arm yourselves with the knowledge we have gleaned
from our research.
Then,
be a patriot. Send this article to as many people as you can, as quickly as you
can, so that the truth will be preserved when TPTB think about taking down this
website.
Brief Background
(We
apologize that our articles are so long, but much needs to
be said. You might want to cut and paste the article into a Word document so
that it is easier to navigate and read.)
To
begin our journey, please review this list of the top ten or so military
contractors, or Military Warlords.
Lockheed
Martin Corporation, The Boeing Company, Raytheon Company, General Dynamics Corporation,
Northrop Grumman Corporation, Leidos Holdings, Inc., Huntington Ingalls
Industries, L-3 Communications Holdings Inc., United Technologies Corporation,
BAE Systems PLC, SAIC, McKesson Corporation, Bechtel Group Inc., Veritas
Capital Fund, Booz Allen Hamilton Holding Corporation.
Now
let’s look at the top shareholders of the top military contractors, who we call
the Corporate or Bankster Warlords.
Vanguard
Group, State Street Corp, Capital Research Global Investors, Templeton
Investment Counsel LLC, Barclays Bank Plc, BlackRock Investment Management (UK)
Ltd., Schroder Investment Management, Capital World Investors, Bank of America
Corporation, JPMorgan Chase & Co., Bank of New York Mellon Corp, Black Rock
Advisors, Black Rock Fund Advisors, Old Republic International, Wellington
Management Company, BlackRock Institutional Trust Company, N. A., Evercore
Trust Company, N. A., FMR, LLC, , Invesco Ltd., Franklin Resources, Goldman
Sachs Group Inc., T. Rowe Price Group, Inc.
What
is worth noting about this list is that you can find some of the usual
suspects: Rothschilds, Rockefellers, Morgans, Warburgs, and the rest of the
Bankster Warlords behind some of these names. These Americans are in the
business of war, every type of war or conflict that enables them to sell their
war products. Like any for-profit business they have products to sell and to
make good profits they need a vibrant, robust customer base.
“Peace-on-earth-goodwill-toward-men” is not a market that will purchase their
war services and wares.
To
make things even more complex so that we can never figure out who is in charge,
every one of these corporations owns major shares in every other corporation. They
are intertwined like a grape vine. If we look closer we find that every
one of these corporations conducts international business and is invested in
international military ventures. They are not governed by any one nation as
they transcend nations.
This type of Corporate Warfare is transnational.
It
is beyond being international or global. These companies work outside of the
control of American as a nation. They work against Americans with their
transnational economic warfare and make money from both sides of any military
or corporate warfare. No matter who wins or loses, no matter how many of our
children die in their war theaters, and no matter who the politicians are, they
make money. And then they invest this money back into the same business because
the business of war is extremely profitable.
Essentially,
they are war criminals just like Henry Schroder, who funded both Hitler and
England. This type of banking
warfare is common throughout history.
Henry
Schroder was a German banker who went to England to help start England’s
central banking system. Blackwater, Templeton, and many of the other companies
listed above are English and German who are all tied to the Bank of England in
ways that no one can explain because the English Parliament is not allowed to
question the Queen’s business. No one knows who owns the Bank of England
or who the shareholders are. This should raise some eyebrows and make
the conspiracy theorists ecstatic, and for good reason. It is fair to say that
the lion’s share of war profits in America go to England.
The Queen of England Makes Money from War
Accordingly,
all the unsubstantiated conspiracies about the Queen of England have some merit after
following the money back to the bankster warlords who set up the U.S. Federal
Reserve. But unlike most conspiracy theories suggest, the Federal Reserve regional
banks are not the true culprits. The true culprits are the original investors
in the corporations, listed above, who serve the military through all types of
wars – physical conflict, information, and economics.
It is the interwoven fabric of the investments of the
war-supporting corporations that have created a system that is inbred and tied
to England…and then to Rome.
Simply
through the association of the royal families of the world who are members of
the Knights of Malta you have an economic intelligence community that is
insider trading at a transnational level. The Bilderberg Group, the Club of
Rome, or DARPA are associations of powerful people with deep investments in
military concerns who must protect their financial interests and pass wealth
onto their family members. That is why so many of the richest families
intermarry – to keep it “all in the family.”
The
richest and most powerful people in the world belong to the Knights of Malta,
the Equestrian Order of the Holy Sepulchre of Jerusalem, the Order of the
Garter, the Teutonic Knights and many other orders that vow allegiance to the
Vatican. If we wish to broaden the perspective, one can add that the Society of
Jesus, the Jesuits, are involved at all levels and have worked tirelessly as the
soldiers of the Pope to create the ultimate spy network.
The Vatican Makes Money from War
All
banking started in Italy and was connected to the Vatican.
It
is fair to say that the central banking ideas of Italy have been replicated in
the central banking systems used throughout the world. Central banking comes
from the Vatican and through the different agencies of the Vatican (Knights of
Malta) the world economy is manipulated by insider trading information
that is being shared with the Vatican via the vows of allegiance that every
Knight of Malta makes.
The
Vatican profits by war because it takes in hundreds of billions a year through
refugee placement services and humanitarian aid provided to war-torn areas. The
more war – the richer the Vatican becomes. That is why the Vatican supports
unbridled migrations of people and the chaos that ensues from war. The Knights
of Malta are one of the largest charities in the world. The Catholic Church has
thousands of different tax-free, charitable organizations that receive money to
help in humanitarian causes. No one knows how much money the Catholic
Church receives each year.
The
Vatican Bank has been caught many times laundering money on a huge scale.
Just
like the almost unfathomable interwoven inbreeding of the bankster warlords,
the double-speak of the Vatican is filled with lies. The Vatican says one thing
and does the opposite. The Vatican itself gives no money away to any charity.
The oldest and richest corporation in the world gives nothing to charity but is
a “front” for the largest charity corporation on the planet.
The
Vatican also created Canon Law which developed into Common Law, Admiralty Law,
and other forms of law. America attorneys still take an oath to the Temple Bar
in the City of London. This is a reference to the Templar’s Headquarters in the
City of London. The Templars were a Catholic order that more or less
established banks from Europe to Jerusalem during the Crusades. Again, whether
we look at the history of banking or law, all roads lead to Rome. Therefore,
when we hear the theorists get all worked up about the conspiracies rampant in
the military industrial complex, we should perhaps listen a little more
carefully and do our own research to find that the simply version is supported
by the detailed version.
But
that still leaves the question of who “runs” the military industrial
complex.
The Long War is Forever
This
question is actually quite simple to answer. Conspiracy
theorists (yes, that’s us folks) will tell you that DARPA drives the engines of
the military through farming out its “wish list” to private corporations to
compete for the contract to build the desired technology. This is true. DARPA
is well known for funding multiple initial projects and then further funding the
winner. Often these “winners” create corporations that are given military
contracts that pay the corporation to make the “war device” and the
shareholders of the company glean the profits.
The Internet, Cisco Systems, Google, and Facebook are all
inventions of DARPA.
And
we hardly have to mention the cost over-runs on every military contract. These
contracts, paid for by American tax payers, are for hundreds of billions of
dollars and the corporation is allowed and encouraged to make a big profit so
the interwoven Corporate Warlords get their cut of the pie. When Rumsfeld
audited the 7 trillion dollar Pentagon budget, 2.3 was missing. This is
typical and still, to date, it hasn’t been “found.”
Even
worse than the Corporate Warlord’s profits is the fact that every one of the
top military contractors does business in international markets. This means
that every military contract is, will be, or can be shared with other
nations, including the very “enemies” for which the war-device is produced.
Transnational
Corporate Warlords are selling the same “military secrets” to our enemies. Just
read the web sites of any top military contractor where they proudly proclaim
their international business in military devices. These transnational
corporations are also using their influence to destabilize markets, economies,
countries and currencies to create new business. Once DARPA gets the
militarized version of the invention, the source code usually is made public.
This may seem crazy, but it always feeds the enemy our new weapon designs so
that they can keep up the appearance of a “weapons race.”
Transnational corporations are dismantling America
through political and military manipulation of the economy and
the Corporate and Banking Warlords are having a party amidst the seeming chaos
and confusion. These warlords know full well that the CIA manipulates currency
as a continuing war. The International Monetary Fund, the World Bank, the
International Bank of Settlements advance the causes of these Corporate
Warlords. Destabilizing countries creates the need for international
intervention.
The military industrial complex created the War on Terror
and calls it the “long, soft war” because it will
never end. The pronouncement of the War on Terror was the declaration of the
overthrowing of American Democracy by warlord oligarchy. Only a few people
benefit from this war and often the politicians who declare the “New World
Order” take up positions in corporations that profit from war. Former
presidents and prime ministers become Corporate Warlords and make a
fortune.
American Democracy is Doomed
If
the following corporations continue to exist, American Democracy
will fall and become the military arm of the triangle of power between New
York, the City of London and Vatican City. These seeming vague indications will
be elaborated on in the rest of this article but for now let’s review an
outline of who owns and controls the military industrial complex.
“For
we are opposed around the world by a monolithic and ruthless conspiracy that
relies primarily on covert means for expanding its sphere of influence – on
infiltration instead of invasion, on subversion instead of elections, on
intimidation instead of free choice, on guerrillas by night instead of armies
by day. It is a system which has conscripted vast human and material resources
into the building of a tightly knit, highly efficient machine that combines
military, diplomatic, intelligence, economic, scientific and political
operations. Its preparations are concealed, not published. Its mistakes are
buried not headlined. Its dissenters are silenced, not praised. No expenditure
is questioned, no rumor is printed, no secret is revealed.”
-
John F. Kennedy, April 27, 1961
John
Kennedy found out shortly after he spoke these words that the “monolithic and
ruthless conspiracy” was also at home in the United States. It was surely one
of the causes of his assassination for in those days few knew of the treasonous
behavior of Corporate and Banking Warlords. In our time, the greedy warlords
are proud of what they do and the government supports them in full knowledge
that transnationalism is destroying America.
Pentagon Missing Trillions
“The
military’s money managers last year made almost $7 trillion in adjustments to their
financial ledgers in an attempt to make them add up, the Pentagon’s inspector
general said in a report released Friday. The Pentagon could not show
receipts for $2.3 trillion of those changes.
-
Pentagon’s
Finances in Disarray, John M. Donnelly, The Associated
Press, 2001
This
type of waste indicates the scale upon which the military industrial complex
seemingly answers to no one. No one
checks whether DARPA inventions are moral. All military inventions, even
if they advertise them as helpful, are weaponized. What DARPA releases
is only the tip of the iceberg and is public.
But
there is a more secret group that directs the military in its future goals. One
group, essentially one man, has been behind creating the direction of military
and commercial warfare for decades. He founded the
Highland Group which hosts forums for DARPA, Department of Defense, CIA, FBI,
In-Q-Tel, Homeland Security, SAIC, and many other government agencies and
organizations.
All
Highland Forums are private, invitation only, have no written agenda and
basically are secret and did not happen. Except for the fact that the Corporate
Warlords who are invited become privy to the direction of research for the US
military, which subsequently creates the directions of Corporate Warlords.
Nothing is written down so that no one is held responsible. The Highland Forums
have been directing DARPA research and the research of the CIA’s research and
development component called In-Q-Tel.
The Highland Forum, Richard Patrick O’Neill, and the Long War
Let’s
take a closer look at the Highland Forums. The description below is taken from
their website:
Highland
Forums Program Description Overview
“Information
Warfare, Information Operations, Information Assurance, and Operational
Resilience Information is an instrument of national, global, and corporate
power. As such, control over its use, its protection, and its manipulation, are
national and global security issues. This Research Program examines
strategic and tactical offensive and defensive aspects of information
operations (IO) by state and non-state actors to achieve political,
military, and economic goals through IO means, including computer network
operations (CNO), computer network attack (CNA), computer network exploitation
(CNE), computer network defense (CND), psychological operations (PSYOPS),
perception management, media manipulation, propaganda, strategic influence, and
public diplomacy, among others.”
Richard
Patrick O’Neill, the director of Highlands Group describes his work on their
website as: “A core element of the Highlands Group activity has been the
Highlands Forum. Over the past 18 years almost fifty major meetings and twenty
enrichment sessions have been held around the country. Each succeeding session,
small and cross-disciplinary in nature, brought remarkable people–from Nobel
laureates and Pulitzer winners to young tech pioneers; from science fiction
authors to corporate CEO’s; from scientists to military leaders–to link
innovators from the “core and the edge”, without an outcome in mind, exploring
a theme and a set of ideas, looking for novelty and emergence. The in-depth
proceedings of those events are posted to the Secretary of Defense Highlands
Forum website, along with interviews, original papers, and book reviews.” http://www.highlandsgroup.net/perspectives.php?ID=17
One
of the only descriptions found on the internet about a presentation at a
Highlands Forum is given below to show the direction the group is taking to
ensure that “war” continues universally.
The Web and the Long, “Soft” War, by Irving Wladawsky-Berger at http://blog.irvingwb.com/blog
“A few weeks ago I attended a very stimulating meeting, the Highlands Forum. The Forum is sponsored by the Office of the US Secretary of Defense to explore new ideas and emerging trends that will help support high-level Department of Defense (DoD) policy and strategy, especially as they relate to information and information technologies.
The
Highlands Forum was organized in 1994 by retired US Navy captain Dick O’Neill.
It is chaired by the Principal Deputy Assistant Secretary of Defense for
Networks and Information Integration. Each meeting is centered on a specific
topic. Around 25 experts from government, industry, academia, the arts and the
professions are invited to discuss their ideas on the subject – to be part a
kind of strategic conversation.
While
our discussions were generally technology-based, you cannot ponder how IT, the
Web and related technologies could impact DoD without also thinking hard about
the global environment that DoD, and society in general will face over the next
decade and beyond. DoD’s primary task is “to deter conflict – but should
deterrence fail, to fight and win the nation’s wars.”
Then
there is the War on Terror, which DoD has started to refer to as
the Long War, a term that I first heard at the Forum. The Long
War is perhaps as much about winning the hearts and minds of people and
nations, as it is about defeating, or at least containing an enemy that
is often hard to find. While one absolutely needs the weapons and military
training to win the classic, hot conflicts, the soft or cultural aspects
of the conflict are at least as important that over time could
undermine democratic principles, free markets and our standard of living.
It
is a fact that the Internet, started by DoD for very legitimate defense
purposes, has become the world’s platform for communication, information
and innovation. Perhaps DoD should once again take on a lead role, this time in
supporting research and pilot programs that will accelerate the development of
some of the most complex and critical applications and emerging technologies
that are driving the evolution of the Web for the very different requirements
of the 21st Century.
I
would justify the investments as part of our efforts to prepare for and
fight the Long War, as well as to help our armed forces become even
more highly skilled, collaborative, information-based organizations. I think
that a major part of the Long War is to get as many people and countries around
the world to be part of and benefit from our increasingly interconnected
economies. We need to help them see a potentially promising
future for them and their families.
History of the CIA’s Version of DARPA – “In-Q-Tel”
“The
lie can be maintained only for such time as the state can shield the people
from political, economic and/or military consequences of the lie. It thus
becomes vitally important for the state to use all of its powers to repress
dissent, for the truth is the mortal enemy of the lie, and thus by
extension, the truth becomes the greatest enemy of the state.”
- Dr.
Joseph M. Goebbels, Ministry of Enlightenment, Third Reich
The
CIA has a legacy of operating at the cutting edge of science and technology
with a reputation for bold innovation and risk taking, often working in advance
of the private sector and other branches of government.
By
the late 1990s, the pace of commercial innovation had overtaken the ability of
government agencies to develop and incorporate new technologies. The tech
industry was innovating far too rapidly to ignore. Commercial technologies from
the startup world addressed many of the same information technology,
biotechnology, communications, and energy challenges that faced the
intelligence community.
In
1998, CIA identified technology as a top strategic priority, and set out a bold
and radical plan to create a new venture that would help increase the agency’s
access to private sector innovation. In-Q-Tel was chartered in February 1999 by
a group of private citizens at the request of the Director of Central
Intelligence and with the support of the U.S. Congress. IQT was tasked with
building a bridge between the IC and a new set of technology innovators.
The CIA’s – Science Applications International Corporation (SAIC)
Leidos,
a joint spin-off of Science
Applications International Corporation (SAIC), is an American
defense company headquartered in Reston, Virginia,
that provides scientific, engineering, systems integration, and technical
services. Leidos works extensively with the United
States Department of Defense (4th largest DoD contractor FY2012),
the United
States Department of Homeland Security, and the United
States Intelligence Community, including the National Security
Agency, as well as other U.S. government civil agencies and selected
commercial markets. On September 27, 2013, SAIC changed its name
to Leidos and spun off a $4
billion government services and information
technology company, which retains the name Science
Applications International Corporation.
SAIC
Projects
The Defense
Intelligence Agency (DIA) transitioned a Remote Viewing Program to
SAIC in 1991 which was renamed the Stargate Project.
The Stargate Project was the code name for a U.S. Army unit
established in 1978 at Fort
Meade, Maryland, by the Defense
Intelligence Agency and SRI International (a
California contractor) to investigate the potential for psychic phenomena in
military and domestic applications. This primarily involved remote viewing, the
purported ability to psychically “see” events, sites, or information from a
great distance.
In
March 2001 SAIC defined the concept for the NSA Trailblazer Project.
Trailblazer was a continuation of the earlier ThinThread program
which the United
States National
Security Agency (NSA) pursued during the 1990s. The program
involved wiretapping and sophisticated analysis of the resulting data, but
according to the article, the program was discontinued three weeks before
the September
11, 2001 attacks due to the changes in priorities and the
consolidation of U.S. intelligence authority.
The
“change in priority” consisted of the decision made by the director of NSA
General Michael V. Hayden to go with a concept called Trailblazer, despite the
fact that ThinThread was a working prototype that claimed to protect the
privacy of U.S. citizens. ThinThread was dismissed and replaced by the Trailblazer Project,
which lacked the privacy protections. A consortium led by Science
Applications International Corporation was awarded a $280 million
contract to develop Trailblazer in 2002.
Trailblazer was
a United States National Security
Agency (NSA) program intended to develop a capability to analyze data
carried on communications networks like the internet. It was intended to track
entities using communication methods such as cell phones and e-mail. In 2002,
NSA contracted SAIC for $280 million to produce a “technology demonstration
platform” for the agency’s project, a “Digital Network Intelligence” system
to analyze data carried on computer networks.
In
1945 the Joint
Intelligence Objectives Agency was established and given direct
responsibility for Operation Paperclip.
The program recruited former Nazi scientists, some
of whom had been identified and prosecuted as war during the Nuremberg Trials.
Several secret U.S. government projects grew out of Operation
Paperclip. These projects included Project CHATTER (established
1947), and Project
BLUEBIRD (established 1950), which was renamed Project ARTICHOKE in
1951. Their purpose was to study mind control, interrogation, behavior
modification and related topics.
MITRE
SAIC and Leidos (Solutions for National Security, Health, and
Engineering) are for-profit companies that primarily work for various arms
of the U.S. government. The MITRE
Corporation is a Federally Funded Research and Development Company
(FFRDC). MITRE is a private, not-for-profit corporation that operates FFRDCs –
federally funded research and development centers. If you’ve ever flown in a
jet or used GPS, you’ve benefited from technology with roots in an FFRDC. But
despite the name, FFRDCs are about much more than R&D. These unique
organizations serve as long-term strategic partners to the government,
providing objective guidance in an environment free of conflicts of interest.
They work with their government partners – also called sponsors – to assist
with systems engineering and integration, research and development, and study
and analysis.
For all intents and purposes, this makes MITRE a pseudo-government organization. This is largely because the government is their only client. In practice this means that meetings and decisions that are closed to contractors and consultants from other firms often have MITRE folks advising the government decision makers.
Cyberspace – A New Operational Domain
In
2011, the United States (U.S.) Department of Defense (DOD)
named cyberspace a new operational domain. The cyberspace domain provides
critical capabilities that enable the U.S. Military to conduct operations in
all domains (land, sea, air, space, and cyberspace). The U.S. Cyber Command and
the Military Services are working to integrate the cyberspace domain with the
other operational domains in order to conduct military command and control and
achieve national security objectives. To effectively integrate cyberspace
operations, DoD requires situational awareness of the Mission, Network, and
Adversary based on analysis of operational data in order to make timely and
effective decisions.
Cyber
Weapons are the New Arms for War
The
military has for years been developing offensive capabilities, giving it the
power not just to defend the U.S. but to assail its foes. Using
so-called cyber-kinetic attacks, Alexander and his forces now have the
capability to physically destroy an adversary’s equipment and infrastructure,
and potentially even to kill. Alexander has concluded that such cyber
weapons are as crucial to 21st-century warfare as nuclear arms were in the
20th. And he and his cyber warriors have already launched their first attack.
The cyber-weapon that came to be known as Stuxnet was created and built by the
NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The
first known piece of malware designed to destroy physical equipment, Stuxnet
was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking
control of an industrial control link known as a Scada (Supervisory Control and
Data Acquisition) system, the sophisticated worm was able to damage about a
thousand centrifuges used to enrich nuclear material.
But
Stuxnet is only the beginning. Alexander’s agency has recruited thousands of
computer experts, hackers, and engineering PhDs to expand U.S. offensive
capabilities in the digital realm. The Pentagon has requested $4.7 billion
for “cyberspace operations,” even as the budget of the CIA and other
intelligence agencies could fall by $4.4 billion. It is pouring millions into
cyber defense contractors. And more attacks may be planned.
On
a remote stretch of desert in central Utah, the National Security Agency has
built a massive, 1 million-square-foot data warehouse. Costing more than $1.5
billion, the highly secret facility is designed to house upward of trillions of
intercepted phone calls, e-mail messages, internet searches and other
communications intercepted by the agency as part of its expansive eavesdropping
operations. The NSA is also completing work on another data warehouse, this one
in San Antonio, Texas.
“The
essential element in the black art of obscurantism is not that it wants to
darken individual understanding but that it wants to blacken our picture of the
world, and darken our idea of existence.”
-
Friedrich
Nietzsche, Human, All Too Human
A Description of Psyops from a Military Document
“Intelligence
and Electronic Warfare Support to Psychological Operations” is
based upon “Special Operations Forces Intelligence and Electronic Warfare
Operations” Field Manual No. 34-36 published on 30 September 1991 by
Department of the Army Headquarters in Washington DC.
Missions
PSYOP
missions are planned products and psychological actions in peace or war that
are directed toward foreign enemy, friendly, and neutral
audiences. The purpose is to influence attitudes and behaviors to achieve national
political and military objectives.
PSYOP
supports varied military, political, and diplomatic actions across the
operational continuum. These missions can be strategic, operational, or
tactical missions.
Strategic
PSYOP missions are conducted at the national or theater level to
advance broad, long-term psychological objectives in support of national
psychological objectives.
Operational
PSYOP missions are conducted to achieve mid-term objectives in support of
theater campaigns and major operations.
Tactical
PSYOP missions are conducted to achieve immediate or short-term objectives in
support of tactical military operations.
Any
of the above categories of PSYOP may support more than one level of the
operational continuum. That is why distinctions between the categories of PSYOP
are often blurred.
Special
operation forces (SOF), whether operating unilaterally or in cooperation with
conventional forces across the entire operational continuum, must always
consider non-military factors and objectives.
PSYOP
missions:
Play
a critical and integral role in achieving or addressing these non-military
objectives.
Aid
in accomplishing tactical, operational, and strategic military objectives.
May
be the only military force employed.
Must
be integrated with all operations to prevent contradictory or conflicting
messages.
Some Declassified In-Q-tel Projects
“The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country.”
-
Edward Bernays, Propaganda
Recorded Future – Using
what they call a “Temporal Analytics Engine,” Recorded Future (RF) provides
forecasting and analysis tools to help analysts predict future events by
scanning sources on the internet, and extracting, measuring,
and visualizing
the information to show networks and patterns in the past, present,
and future. As of 2015 the engine was described as “Web Intelligence
Engine Visible
Technologies – social media monitoring.
Digital Reasoning – Since
2012, the firm has sold its Synthesys software to banks and hedge
funds, including UBS and Point72 Asset
Management. Financial institutions use Synthesys to scan internal
e-mails within a given company in search of unfamiliar patterns between
employees, in terms of word-specific content, frequency and interpersonal
connections. The aim is to predict fraud before it occurs.
Palantir – Palantir
Technologies, Inc. is a private American software and services
company, specializing in data analysis. The
company is known for two software projects in particular: Palantir
Gotham is used by counter-terrorism analysts at offices in the United
States Intelligence Community and United
States Department of Defense, fraud investigators at the Recovery
Accountability and Transparency Board, and cyber analysts at Information
Warfare Monitor.
CallMiner
– Phone speech analytics software
MASINT – Remote tracking,
surveillance, and extraction of brain-waves typifying thought-forms, emotional
states, analytic mind states, and others
Mohomine mohoClassifier
– Organizes mass data
3VR – 3VR Inc. develops software enabling
organizations to mine data from video. 3VR works with leading banks,
governments, law enforcement and retailers at the moment.
Adaptx – Creates
digital pens that speed up field data collection.
Basis Technology – Synthesizes
the foreign chatter and provides software for text analytics in over twenty
languages. They work primarily in applied natural language processing,
deriving meaning from the ways people actually use language.
Cloudera – Large-scale
data storage. Cloudera Enterprises is
one of the most cost-effective ways for companies to securely carry out
large-scale data analysis and storage.
FireEye – FireEye
is one of the most advanced cybersecurity firms and specializes in
protecting against botnet attacks and also works to combat the malware that
brings computers into the network.
The Ember Corporation –
Ember Corporation
focuses on developing networking systems that simplify wirelessly networking
low-power products. They’re focused on smart energy, remote monitoring, and
remote control uses of their tech.
Infinite Z – Virtual-holographic
simulation a reality through an interactive 3D environment.
OpenSpan – Makes
software that enables organizations to see exactly what employees are
doing on their computer: what programs they’re using, what progress they’re
making, etc.
Seventh Sense – Develops
health monitoring products that interface with human skin
Sonitus Medical – Makes
a hearing system that transmits sound imperceptibly through the mouth. The
SoundBite hearing system plays off the principle of bone conduction to transmit
audial messages. A nearly invisible in-the-mouth hearing and communication
platform is non-invasive and connects directly to the inner ear, allowing the
user to hear transmitted messages through their skull.
Spotter RF – Makes
super-powerful radars in a handheld form that can track a person walking
anywhere within a 148 acre space, and it’s handheld.
Visible Technologies – Extracts
business solutions from social media chatter with software that allows users to
extract business value from social communities, and also give customer insights
for brands online.
Walleye – Makes
handheld devices that can see into and through solid objects
DARPA Applications
Social Media in Strategic Communication (SMISC)
program is an attempt to get better at both detecting
and conducting propaganda campaigns on social media. SMISC has two goals.
First, the program needs to help the military better understand what’s going on
in social media in real time – particularly in areas where troops are deployed.
Second, Darpa wants SMISC to help the military play the social media
propaganda game itself.
The
Pentagon is building a tool to identify social media propaganda campaigns that
produces counter-spin through computer artificial intelligence.
http://www.washingtonsblog.com/2011/07/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes.html
Interactive Facial Recognition in Real Time –BBC
facial recognition programs help predict the success or failure of television
programming. In the past, the BBC has used its facial recognition technology,
built by in-house startup CrowdEmotion, to track 4,500 faces as people watched
show trailers to see what kinds of emotions the commercials produced. They’ve
also looked at how hundreds of study participants react to programs
like Top Gear and Sherlock. http://fortune.com/2016/02/13/bbc-ads-crowdemotion/
The
company CrowdSight uses facial recognition software in real time. They
advertise on their website: “Understand and Predict your Audience! Deliver
Better Experiences by Knowing their Emotional Behavior and Engagement in
Real-time. CrowdSight Software Development Kit (SDK) is a flexible and
easy-to-integrate Crowd Face Analysis Software which allows you to gather
real-time, anonymous information about your audience while they behave
spontaneously in different life environments. Understand your audience emotional
reactions and engagement towards your products, content and campaigns, and
recognize important demographics such as age, gender and ethnicity, in
real-time. CrowdSight works offline and on the most popular desktop and mobile
platforms (Windows, Mac, Linux, iOS, Android).”
Visual Evoked Potential (VEP)
– A VEP is an electrical potential recorded after a subject is presented
with a type of visual stimuli. There are several types of VEPs.
Steady-state
visually evoked potentials (SSVEPs) use potentials generated by exciting the
retina, using visual stimuli modulated at certain frequencies. SSVEP’s stimuli
are often formed from alternating checkerboard patterns and at times simply use
flashing images. SSVEP has proved to be successful within many BCI systems.
This is due to several factors, the signal elicited is measurable in as large a
population as the transient VEP and blink movement and electro-cardiographic
artefacts do not affect the frequencies monitored.
Synthetic Telepathy and Silent Communication – In a
$6.3 million Army initiative to invent devices for telepathic
communication, Gerwin
Schalk, underwritten in a $2.2 million grant, found that it is possible to
use ECoG signals to discriminate the vowels and consonants embedded in spoken
and in imagined words. The results shed light on the distinct mechanisms
associated with production of vowels and consonants, and could provide the
basis for brain-based communication using imagined speech. Research into
synthetic telepathy using sub-vocalization is
taking place at the University of California, Irvine under lead scientist Mike
D’Zmura.
The
first such communication took place in the 1960s using EEG to create Morse code
using brain alpha waves. Using EEG to communicate imagined speech is less
accurate than the invasive method of placing an electrode between the skull and
the brain. On February 27, 2013 the group of Miguel Nicolelis at Duke University and
IINN-ELS successfully connected the brains of two rats with electronic
interfaces that allowed them to directly share information, in the
first-ever direct brain-to-brain interface. On 3 September 2014, scientists
reported that direct communication between human brains was possible over
extended distances through Internet transmission of EEG signals.
Sentient
World Simulation – The DoD is developing a parallel to
Planet Earth, with billions of individual “nodes” to reflect every man, woman,
and child this side of the dividing line between reality and AR. Called the
Sentient World Simulation (SWS), it will be a “synthetic mirror of the real
world with automated continuous calibration with respect to current real-world
information”, according to a concept paper for the project.
“SWS
provides an environment for testing Psychological Operations (PSYOP),” the
paper reads, so that military leaders can “develop and test multiple courses of
action to anticipate and shape behaviors of adversaries, neutrals, and
partners.” SWS also replicates financial institutions, utilities, media
outlets, and street corner shops. By applying theories of economics and human
psychology, its developers believe they can predict how individuals and mobs
will respond to various stressors.
http://www.theregister.co.uk/2007/06/23/sentient_worlds/
Insight Program – DARPA
awarded a $14 million contract to SAIC for the DARPA
Insight program, which is intended to help U.S. intelligence experts detect
threat networks, irregular warfare, and terrorist operations by combining
intelligence information from imaging sensors, crowd-source and other social
network or text-based sensors, as well as from other sources for further
analysis. The program seeks to fill gaps in current U.S. intelligence,
surveillance and reconnaissance (ISR) systems that center on the inability to
exploit and cross-cue several different intelligence sources automatically.
The
DARPA Insight program seeks to develop integrated human/machine reasoning into
intelligence equipment to encompass operator knowledge and reasoning when
dealing quickly with complex data from many different sensors. SAIC experts
will concentrate on these areas in building the Insight next-generation ISR
analysis system.
SAIC
experts will build model-based behavioral correlation, modeling, prediction,
and threat network analysis tools that combine intelligence information across
many different sources automatically to improve the efficiencies of
multi-intelligence sensors. The company also will develop a unified
data-management and processing environment that integrates new intelligence
sensors and software algorithms.
EM fields and Hidden symbols – DARPA
is revealing programs, which have existed for years, to develop methods and
techniques to incept thoughts and ideas into the mind. They reveal how once a
mind has been programmed with the memory patterns, words and symbols can
trigger the programing without the need of the original device.
Mind Control Project – The aim of this program is to remotely disrupt political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. The program, conducted by The Center for Strategic Communication, is based at Arizona State University. This research aims to literally induce or disrupt the operation of narratives within the brain. In other words, this research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research has tremendous interrogation possibilities and could potentially be used to more successfully spread propaganda or stop political upheaval to an unsuspecting public. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects”.
Transcranial
Magnetic Stimulation is a very powerful tool used to impair the brain
functioning of individuals. See the videos below for a brief demonstration of
the effects of TMS:
Once
the research group determines which parts of the brain are associated with
cognitive reasoning and narrative comprehension, they attempt to impair those
sections in order to “create a fundamental basis for understanding how to
disrupt or enhance aspects of narrative structure and/or brain functioning to
minimize or maximize persuasive effects on subject proclivity to engage in
political violence.
Once
it is determined that disruption of certain portions of the brain can enhance
persuasive messaging, individuals can be persuaded to do things they normally
would not do and believe things they normally would not believe.
It
offers the capability to induce or disrupt the operation of narratives in the
brain, and develops the capability to induce narrative validity.
Mechanical
disruptions of narrative processing may be, ultimately, replicated through
targeted strategic communication campaigns that approximate the narrative
disruptions induced via magnetic stimulation.
Through
extensive research, they may be able to replicate the machine’s brain
disrupting functioning simply through carefully crafted and researched
persuasive messages and propaganda. With enough data, the government could
spread propaganda through the media that people will almost automatically
believe, whether it is true or not.
In
terms of interrogation possibilities, Transcranial Magnetic Stimulation can be
forced upon individuals to make them believe certain things, say certain
things, and perhaps admit to acts they did not actually commit (as the TMS can
induce narrative validity), or commit acts they normally would not commit.
The Brain Project – This
area of study has received $100 million in funding via Obama’s ten-year BRAIN
Project, as well as a $1.3
billion commitment from Europe. Concurrently, there is heavy military
funding through agencies such as the Defense Advanced Research Projects Agency
(DARPA). This raises the question of transparency when a “black budget” often
justifies total secrecy in the name of national security.
Neuroscientists Successfully Plant False Memories – MIT
neuroscientists have shown that they can plant false memories. They also found
that many of the neurological traces of these memories are identical in nature
to those of authentic memories. Most of the research in this area currently
revolves around how to induce and eliminate fear. The study also provides
further evidence that memories are stored in networks of neurons that form
memory traces for each experience we have. Scientists already know how to
set off an emotional response in combat veterans by simulating a specific set
of frequencies that have become associated with wartime experience.
Total Information Awareness –
Under the umbrella of a system known as Total Information Awareness, DARPA
spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total
Information Awareness concept created a veritable buffet of advanced surveillance
and data mining programs, many of which ultimately were folded into NSA’s
PRISM. We now know that PRISM culled
citizens’ personal data from companies like Microsoft, Google, and Facebook,
and was later leaked by whistleblower Edward Snowden.
Evidence Extraction and Link Discovery program
(EELD) – Sole purpose is to gather as much information about both
terror suspects and average American citizens as possible, using phone records,
computer searches, credit card receipts, parking receipts, books checked out of
the library, films rented, and more. Goal is to assess megadata on 285
million people a day in real-time.
Scalable Social Network Analysis
(SSNA) – Program monitors telephone calls, conference calls, and ATM
withdrawals … also sought to develop a far more invasive surveillance
technology.
Activity Recognition and Monitoring
(ARM) – With England’s CCTV surveillance cameras as a model, ARM
created a massive database of people going about their everyday lives. Using
advanced facial recognition software, the program highlighted any behavior that
was outside the realm of a preprogrammed “ordinary,” the definition of which
remains classified.
Deep Exploration and Filtering of Text
(DEFT) – Operating on a 28 million dollar budget, this program
utilizes advanced computer algorithms to analyze text-based messages in all
shapes and forms, from text messages to reports, with the aim being to
comprehend “implied and hidden meanings through probabilistic
inference.”
Nexus 7 – With a
classified budget, this particularly program studies and tracks social network
content. First used in Afghanistan in a defense capacity, when aimed at
domestic networks the use of the program is a mystery.
Narrative Networks Program –
Developed classified techniques used to manipulate trust in humans. For its
Narrative Networks (N2) program, DARPA collaborated
with a CIA agency called the Intelligence Advanced Research Projects Agency
(IARPA) to develop methods of overwriting messages in the human mind. The
program was described as having two parts: first, to understand what happens in
the human mind when someone sees or hears a message; second, to figure out how
to control how the brain interprets the message.
Mind Control Devices from In-Q-Tel and DARPA
“The
secrecy involved in the development of the electromagnetic mind-altering
technology reflects the tremendous power that is inherent in it. To put it
bluntly, whoever controls this technology can control the minds of men – all
men.”
-
Nexus Magazine 1998
Real-time Contextual Overlays for Live Streams – A
system and method for contextualizing and live-updating overlay data for live
media streams. Overlays
can be generated in real-time and in response to live events.
US
20130311595 A1 November 21, 2013.
Google
Inc.
Method and Apparatus for Remotely Determining Emotional
States – A waveform energy having a predetermined
frequency and intensity is generated and wirelessly transmitted towards a
subject. Physiological or
physical parameters of blood pressure, pulse rate, pupil size, respiration rate
and perspiration level are measured for evaluating criminal intent in security
sensitive areas. US
5507291 A – April 5, 1994
Sounds of Silence – The Silent Subliminal Presentation
System (SSPS) – Silent Subliminal Presentation System
was developed for commercial use in 1992. A silent communications system in
which nonaural carriers, in the very low (ELF) or very high
audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum
are amplitude – or frequency- modulated with the desired intelligence
and propagated acoustically or vibrationally, for inducement in to
the brain, typically through the use of loudspeakers, earphones, or
piezoelectric transducers. The modulated carriers may be transmitted directly
in real time or may be recorded and stored on mechanical, magnetic, or optical
media for delayed or repeated transmission to the listener. US
Patent#5,159,703
Flame – The program is
able to turn on a target’s Web cam and record video remotely and without
detection.
Multidisciplinary Research Program of the University
Research Initiative (MURI),
Recognize/predict
social contexts, relationships, networks, and intentions from social media,
taking into account non-verbal communication such as gestures,
micro-expressions, posture, and latent semantics of text and speech. Create
algorithms for prediction and collection of latent signals and their use in
predicting social information.
Beware – Analyses people’s
social media activity, property records, the records of friends, family or associates,
among other data, to assign suspects a so-called “threat-score.” That
“threat-score” can then be used by police to pre-judge if a suspect is going to
be dangerous, and to adapt their approach accordingly.
Iraqi Silent Sound Program – US
Psy-Ops teams set up FM transmitters, utilizing Iraqi frequencies and
overpowered the local station. Along with patriotic and religious music, PsyOps
transmitted “vague, confusing and contradictory military orders and
information.” A
sophisticated electronic system designed to ‘speak’ directly to the mind of the
listener; to alter and entrain his brainwaves, to manipulate his brain’s
electroencephalographic (EEG) patterns and thus artificially implant
negative emotional states – feelings of intense fear, anxiety, despair and
hopelessness were created in the Iraqi troops. This effective subliminal system
implants emotions in the minds of the targeted subject.
Nervous system manipulation by electromagnetic fields
from monitors – US Patent and Trade Office, Patent
#6,506,148 on subliminal behavior modification, 1/14/2003, United
States Patent 6,506,148, Loos, January 14, 2003.
Abstract: It is possible to manipulate the nervous
system of a subject by pulsing images displayed on a nearby computer monitor or
TV set. For the latter, the image pulsing may be imbedded in the program
material, or it may be overlaid by modulating a video stream.
Physiological
effects have been observed in a human subject in response to stimulation of the
skin with weak electromagnetic fields that are pulsed with certain frequencies
near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer
monitors and TV tubes, when displaying pulsed images, emit pulsed
electromagnetic fields of sufficient amplitudes to cause such excitation. It is
therefore possible to manipulate the nervous system of a subject by pulsing
images displayed on a nearby computer monitor or TV set.
For
the latter, the image pulsing may be imbedded in the program material, or it
may be overlaid by modulating a video stream, either as an RF signal or as a
video signal. The image displayed on a computer monitor may be pulsed
effectively by a simple computer program. For certain monitors, pulsed
electromagnetic fields capable of exciting sensory resonances in nearby
subjects may be generated even as the displayed images are pulsed with
subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna
Beach, CA 92651), Appl. No.: 872528
Filed:
June 1, 2001
Other Projects – Directed-energy
weapons (DEWS), Remote Neural Monitoring (RNM) weapons, Remote EEG Readers,
Remote Electro-Muscular Shock/Incapacitation weapons, Remote Microwave weapons,
Remote Voice to Skull weapons, Remote Neural Monitoring technologies, and EMF
brain-wave monitoring, tracking, and harvesting technologies.
Google Created by CIA and Highlands Forum
One
of the most interesting articles that highlights the way the DoD
incubates war-technology is described in great detail by Nafeez Ahmed. This
article shows that Google was funded throughout its inception by the CIA. Google
was created as a weaponized war-tool as indicated by the many new inventions
that DARPA and In-Q-Tel are focused on.
Nafeez
Ahmed explains the Google-CIA connection in this excellent article:
Essentially,
the United States intelligence community funded, nurtured and incubated Google
as part of a drive to dominate the world through control of information. Seed-funded
by the NSA and CIA, Google was merely the first among a plethora of private
sector start-ups co-opted by U.S. intelligence to retain ‘information
superiority.’
The
origins of this strategy trace back to a secret Pentagon-sponsored group that
for the last two decades has functioned as a bridge between the U.S. government
and elites across the business, industry, finance, corporate, and media
sectors. The group has allowed some of the most powerful special interests in
corporate America to systematically circumvent democratic accountability and
the rule of law to influence government policies, as well as public opinion in
the US and around the world. The results have been catastrophic: mass
surveillance and perception management amidst a permanent state of global war.
The
U.S. intelligence community is implicated in nurturing the web platforms we
know today, for the precise purpose of utilizing the technology as a mechanism
to fight global ‘information war’ - a war to legitimize the power of the few
over the many. In reality, Google is a smokescreen behind which lurks the US
military-industrial complex.
Highland Forum Dominates U.S. Defense Policy
In
1999, the CIA created its own venture capital investment firm,
In-Q-Tel, to fund promising start-ups that might
create technologies useful for intelligence agencies. But the inspiration for
In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit.
Known as the ‘Highlands Forum,’ this private network has operated as a bridge
between the Pentagon and powerful American elites outside the military since
the mid-1990s. Despite changes in civilian administrations, the network around
the Highlands Forum has become increasingly successful in dominating US defense
policy.
As
mentioned previously, SAIC stands for the U.S. defense firm, Science
Applications International Corporation, which changed its name to Leidos in
2013, operating SAIC as a subsidiary. SAIC/Leidos is among the top 10
largest defense contractors in the US, and works closely with the U.S.
intelligence community, especially the NSA. The agency is the company’s largest
single customer and SAIC is the NSA’s largest contractor.
Richard
Patrick O’Neill, founding president of the Pentagon’s Highlands Forum served
his last post as deputy for strategy and policy in the Office of the Assistant
Secretary for Defense for Command, Control, Communications and Intelligence,
before setting up Highlands.
Since
1973, Andrew Marshall has headed up one of the Pentagon’s most powerful
agencies, the Office of Net Assessment (ONA), the U.S. defense secretary’s
internal ‘think tank’ which conducts highly classified research on future
planning for defense policy across the US military and intelligence community.
Marshall, now 93 years old and nicknamed “Yoda” by insiders, as “the DoD’s most
elusive” but “one of its most influential” officials. Vice President Dick
Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz
are widely considered the hawks of the neoconservative movement in American
politics – were among Marshall’s star protégés.
The
Highlands Forum’s influence on US defense policy has operated through three
main channels: its sponsorship by the Office of the Secretary of Defense
(around the middle of last decade this was transitioned specifically to
the Office
of the Undersecretary of Defense for Intelligence, which is in charge of
the main surveillance agencies); its direct link to Marshall’s ONA; and its
direct link to DARPA.
The
Highlands Forum has served as a two-way ‘influence bridge’: on the one hand,
for the shadow network of private contractors to influence the formulation of
information operations policy across U.S. military intelligence; and on the
other, for the Pentagon to influence what is going on in the private sector. There
is no clearer evidence of this than the instrumental role of the Forum in
incubating the idea of mass surveillance as a mechanism to dominate information
on a global scale.
In
1989, Richard O’Neill, then a U.S. Navy cryptologist, wrote a paper for the
U.S. Naval War College, ‘Toward a methodology for perception
management.’ O’Neill’s paper for the first time outlined a strategy for
“perception management” as part of information warfare (IW).
O’Neill’s
proposed strategy identified three categories of targets for IW:
adversaries – so they believe they are vulnerable; potential partners – so they
perceive the cause as just; and civilian populations and political
leadership – so they perceive the cost as worth the effort.
Around 1994, the
Highlands Group was founded by O’Neill as an official Pentagon project at the
appointment of Bill Clinton’s then defense secretary William
Perry. In O’Neill’s own words, the group would function as the
Pentagon’s ‘ideas
lab.’ Total participants in the DoD’s Highlands Forum
number over a thousand, although sessions largely consist of small closed
workshop style gatherings of maximum 25–30 people, bringing together experts
and officials depending on the subject.
The
Forum has inside access to the chiefs of the main U.S. surveillance and
reconnaissance agencies, as well as the directors and their assistants at DoD
research agencies, from DARPA, to the ONA and is deeply plugged into the
Pentagon’s policy research task forces. In 2001, under the Total Information
Awareness Program, President Bush had secretly
authorized the NSA’s domestic surveillance of Americans without
court-approved warrants. From then on, Highlands Forum partner SAIC played a
key role in the NSA roll out from inception. SAIC was then among a consortium
receiving a $280 million contract to develop one of the NSA’s secret
eavesdropping systems.
This
was also the year that the Bush administration drew up its Information
Operations Roadmap. Describing the internet as a “vulnerable weapons
system,” Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be
based on the premise that the Department [of Defense] will ‘fight the net’ as
it would an enemy weapons system.” The U.S. should seek “maximum control” of
the “full spectrum of globally emerging communications systems, sensors, and
weapons systems,” advocated the document.
As
of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a
big data-mining project called ExecuteLocus,
despite the colossal $1 billion failure of its preceding contract, known as
‘Trailblazer.’ Core components of TIA were being quietly continued under new
code names. The
new surveillance program was then fully transitioned from DARPA’s jurisdiction
to the NSA.
In
addition to the CIA, In-Q-Tel (the CIA’s version of DARPA) has also been backed
by the FBI, NGA, and Defense Intelligence Agency, among other agencies.
O’Neill
said his job as Forum president was to scope case studies from real companies
across the private sector, like eBay and Human Genome Sciences, to figure out
the basis of U.S. Information Superiority — how to dominate the information
market — and leverage this for what the president and the secretary of defense
wanted to do with regard to transformation of the DoD.
By
2007, Facebook received its second round of $12.7 million worth of funding from
Accel Partners. Facebook’s 2008 round of funding was led by Greylock Venture
Capital, which invested $27.5 million. Apart from Breyer and Zuckerberg,
Facebook’s only other board member is Peter Thiel, co-founder of defense
contractor Palantir which provides all sorts of data-mining and visualization
technologies to U.S. government, military and intelligence agencies, including
the NSA
and FBI, and which itself was nurtured to financial viability by Highlands
Forum members.
By
2008, the NSA was effectively resurrecting
the TIA project with a focus on Internet data-mining via comprehensive
monitoring of e-mail, text messages, and Web browsing. We also now know (thanks
to Snowden) that the NSA’s XKeyscore ‘Digital
Network Intelligence’ exploitation system was designed to allow analysts to
search not just internet databases like emails, online chats and browsing
history, but also telephone services, mobile phone audio, financial
transactions and global air transport communications — essentially the entire
global telecommunications grid. Highlands Forum partner SAIC played a key role,
among other contractors, in producing and administering the
NSA’s XKeyscore.
The
investment firm responsible for creating the billion dollar fortunes of the
tech sensations of the 21st century, from Google to Facebook, is intimately
linked to the U.S. military intelligence community. The convergence of these
powerful financial and military interests around the Highlands Forum, through
George Lee’s sponsorship of the Forum’s new partner, the MIIS Cybersec
initiative, is revealing in itself. MIIS Cybersec’s director, Dr, Itamara
Lochard, has long been embedded in Highlands.
Dr
Itamara Lochard is a senior Highlands Forum member and Pentagon information
operations expert. She directs the MIIS CyberSec initiative that now supports
the Pentagon Highlands Forum with funding from Goldman Sachs partner George
Lee, who led the valuations of Facebook and Google. Dr. Lochard maintains a
comprehensive database of
1,700 non-state groups including insurgents, militias, terrorists, complex
criminal organizations, organized gangs, malicious cyber actors and strategic
non-violent actors, to analyze their organizational patterns, areas of
cooperation, strategies and tactics.
Her
views disclose much about what the Highlands Forum has been advocating all
these years. In 2004, Lochard was co-author of a study for the U.S. Air Force’s
Institute for National Security Studies on US strategy toward
‘non-state armed groups.’ The study on the one hand argued that non-state armed
groups should be urgently recognized as a ‘tier one security priority,’ and on
the other that the proliferation of armed groups provide strategic opportunities
that can be exploited to help achieve policy goals. There have and will be
instances where the United States may find collaborating with armed group is in
its strategic interests. But sophisticated tools must be developed to
differentiate between different groups and understand their dynamics, to
determine which groups should be countered, and which could be exploited for US
interests.
In
2009, it also emerged from a Google patent application that the company had
deliberately been collecting ‘payload’ data from private wifi networks that
would enable the identification of “geolocations.” In the same year, we now
know, Google had signed an agreement with the NSA giving the agency open-ended
access to the personal information of its users, and its hardware and software,
in the name of cyber security. It is not just Google that is a key contributor
and foundation of the US military-industrial complex: it is the entire
internet, and the wide range of private sector companies — many nurtured and
funded under the mantle of the U.S. intelligence community (or powerful
financiers embedded in that community) — which sustain the internet and the
telecoms infrastructure; it is also the myriad of start-ups selling
cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can
then be adapted and advanced for applications across the military intelligence
community.
Ultimately,
the global surveillance apparatus and the classified tools used by agencies
like the NSA to administer it, have been almost entirely made by external
researchers and private contractors like Google, which operate outside the
Pentagon.
In
2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio,
who are principal investigators in the ‘Neurobiology of Narrative Framing’
project at the University of Southern California. Evoking Zalman’s emphasis on
the need for Pentagon psychological operations to deploy “empathetic
influence,” the new DARPA-backed project aims
to investigate how narratives often appeal “to strong, sacred values in order
to evoke an emotional response,” but in different ways across different
cultures. The most disturbing element of the research is its focus on trying to
understand how to increase the Pentagon’s capacity to deploy narratives that
influence listeners in a way that overrides conventional reasoning in the context
of morally questionable actions.
The
research is based on extracting narratives from millions of American,
Iranian and Chinese weblogs, and subjecting them to automated discourse
analysis to compare them quantitatively across the three languages. The
investigators then follow up using behavioral experiments with
readers/listeners from different cultures to gauge their reaction different
narratives “where each story makes an appeal to a sacred value to explain or
justify a morally questionable behavior of the author.” Finally, the scientists
apply neurobiological fMRI scanning to correlate the reactions and personal
characteristics of subjects with their brain responses.
DARPA’s
goal is to mine millions of American weblogs as part of its ‘neurobiology of narrative
framing’ research. As the Pentagon’s extensive funding of propaganda on
Iraq and Afghanistan demonstrates, population influence and propaganda is
critical not just in far-flung theatres abroad in strategic regions, but also
at home, to quell the risk of domestic public opinion undermining the
legitimacy of Pentagon policy.
According
to the Securities and Exchange Commission, from 2008 to 2013, the five largest
US defense contractors lost 14 percent of their employees, as the winding down
of U.S. wars in Iraq and Afghanistan led to lack of business and squeezed
revenues. The continuation of the ‘Long War’ triggered by ISIS has, for now,
reversed their fortunes. Companies profiting from the new war include many connected
to the Highlands Forum, such as Leidos, Lockheed Martin, Northrup Grumman, and
Boeing. War is profitable.
Yet
in the long-run, the information imperialists have already
failed. This investigation is based entirely on open source techniques,
made viable largely in the context of the same information revolution that
enabled Google.
US Military Uses PsyOps Weapons on Iraq
“PSYOPS
seek to exploit human vulnerabilities in enemy governments, militaries and
populations to pursue national and battlefield objectives…. The feasibility had
been established of projecting large, three-dimensional objects that appeared
to float in the air. Washingtonpost.com has learned that a super secret program
was established in 1994 to pursue [this] very technology for PSYOPS
application. The ‘Holographic Projector’ is described in a classified Air Force
document as a system to ‘project information power from space … for special
operations deception missions.'”
-
Washington
Post article on PSYOPS, 2/1/1999
For
those who don’t believe that the American military will use the “new weapons”
created by DARPA and In-Q-Tel, we offer this article written about the use of
electronic warfare on Iraqis that also affected our own soldiers.
Scalar Weapons Used in Iraq, Britain, Microwaving
Iraq ‘Pacifying’ Rays Pose New Hazards In Iraq, by
William Thomas (www.rense.com )
On
the rooftop of a shrapnel-pocked building in the ruins of Fallujah, a team of
GI’s stealthily sets up a gray plastic dome about two-feet in diameter. Keeping
well back from the sight lines of the street and nearby buildings, they plug
the cable connectors on the side of the “popper” into a power unit. The grunts
have no clue what the device does. They are just following orders.
“Most of the
worker-bees that are placing these do not even know what is inside the “domes”
just that they were told where to place them by Intel weenies with usually no
nametag,” reports my source, a very well informed combat veteran I will call
“Hank”.
The grunts call the
plastic devices “poppers” or “domes”. Once activated, each hidden transmitter
emits a widening circle of invisible energy capable of passing through metal,
concrete and human skulls up to half a mile away. “They are saturating the area
with ULF, VLF and UHF freqs,” Hanks says, with equipment derived from US Navy
undersea sonar and communications.
But it’s not being
used to locate and talk to submarines under Baghdad. After powering up the
unit, the grunts quickly exit the area. It is their commanders, fervent hope
that any male survivors enraged by brutal American bombardments that damaged
virtually every building in this once thriving “City of Mosques”, displacing a
quarter-million residents while murdering thousands of children, women and
elders in their homes – will lose all incentive for further resistance and
revenge.
A dedicated former
soldier, whose experiences during and after Desert Storm are chronicled in my
book, Bringing The War Home, Hank stays in close touch with his unit
serving “in theater” in Iraq. When I asked how many “poppers” are being used to
irradiate Iraqi neighborhoods, he checked and got back to me. There are “at
least 25 of these that have been deployed to theater, and used. Some have
conked out and been removed, so I do not know how many are currently active and
broadcasting.”
Hank is concerned
that innocent Iraqi families and unsuspecting GIs alike are being used as test
subjects for a new generation of “psychotronic” weapons using invisible beams
across the entire electromagnetic spectrum to selectively alter moods, behavior
and bodily processes.
“The “poppers, are
capable of using a combo of ULF, VLF, UHF and EHF wavelengths in any
combination at the same time, sometimes using one as a carrier wave for the
others,” Hank explains, in a process called superheterodyning. The silent
frequencies daily sweeping Fallujah and other trouble spots are the same Navy
“freqs that drove whales nuts and made them go astray onto beaches.”
Microwaving Iraq
The
Gulf War veteran observes that occupied Iraq has become a “saturation
environment” of electromagnetic radiation. Potentially lethal
electromagnetic smog from high-power US military electronics and experimental
beam weapons is placing already hard-hit local populations-particularly
children — at even higher risk of experiencing serious illness, suicidal
depression, impaired cognitive ability, even death.
American troops
constantly exposed “up close” to their own microwave transmitters, battlefield
radars and RF weapons are also seeing their health eroded by electromagnetic
sickness. It’s common, Hank recalls, for GIs to warm themselves on cold desert
nights by basking in the microwaves radiating from their QUEEMS communications
and RATT radar rigs.
Constant microwave
emissions from ground-sweeping RATT rigs and SINGARS mobile microwave networks
are much more powerful than civilian microwave cell phone nets linked in many
clinical studies to maladies ranging from asthma, cataracts, headaches, memory
loss, early Alzheimer’s, bad dreams and cancer.
Clinical tests have
repeatedly shown how microwaves “rev up” incipient cancer cells several hundred
times. Triggered by nuclear radiation, and turned rogue by electromagnetic
warfare unleashed by US forces, human cancer cells have been found to continue
proliferating wildly — even after the power source is turned off
Microwaving Wombs at Greenham Common
Another
harrowing example involves the sudden illness and cancer deaths of US
embassy staff in Moscow after being deliberately targeted with very weak pulsed
microwaves by Soviet experimenters and fascinated CIA onlookers running
“Project Phoenix” in 1962.
Very Low Frequency
(VLF) weapons include the dozens of “poppers” currently deployed in Iraq, which
can be dialed to or “long wave” frequencies capable of traveling great
distances through the ground or intervening structures. As air force Lt Col.
Peter L. Hays, Director of the Institute for National Security Studies reveals,
“transmission of long wavelength sound creates biophysical effects; nausea,
loss of bowels, disorientation, vomiting, potential internal organ damage or
death may occur.”
GI’s “Driven Nuts” by Electromagnetics in Iraq
Like
so many other American blunders among the ruins of Babylon, the
intended microwave “pacification” of rebellious neighborhoods is having
unintended effects. In actual “field-testing” in the Sunni Triangle, Hank has
learned that the hidden, dome-shaped devices “are removing inhibitions”. Armed
individuals, already highly motivated to kill American forces are reportedly
“losing all restraint” when exposed to the electromagnetic beams.
According to Hank’s
buddies in Baghdad, the frequency-shifting “poppers” “are having some remarkable
effects on the locals as well as our own people.” But these effects differ.
Possibly, Hank surmises, because Americans come from daily domestic and
military environments saturated with electromagnetic frequencies, while many
Iraqis still live without reliable electricity in places largely free from
electromagnetics before the American invasion.
According to members
of Hank’s former unit, constant exposure to invisible emissions from radar and
radio rigs — as well as to their own microwave weapons — is backfiring. “Our
people are driven nuts,” Hank says. “It makes them stupid for two or three
days.”
The Desert Storm
veteran compared the emotional effects of constant exposure to military
microwaves to a lingering low-pressure weather system that never goes away.
“You feel way down for days at a time,” he emphasizes
As a consequence,
AWOL rates among “spaced out” US troops are as high as 15%, Hank reports. For
many deserters, it is not cowardice or conscience that is causing them to
absent themselves from duty. “They are feeling so depressed,” Hank explains.
“They don’t feel good. So they leave.”
According to Hank’s
front-line buddies, Iraqis exposed to secret beam weapons “get laid back,
confused and mellow, and then blast out in a rage, as opposed to our folks
going on what could only be called a “bender” and turning into a mean drunk for
a while.”
Once they wander away
from direct electromagnetic-fire, startled GIs come to their senses. They
return to their units, Hank explains, saying, “What was I thinking?”
The recovery rate
among US troops “seems to be about a day or so, where the locals are not
getting over it in less than a week or more on average,” Hank has learned.
It is Hank’s hope
that his revelations will prompt public debate over the secret use of
electromagnetic weapons in Iraq. But lost in the arguments over these
supposedly “non-lethal” weapons is a much bigger question: What are Americans
doing there?
Whether soldier or
civilian at home, it is our imperative duty to stop supporting those
responsible for ongoing “weapons tests” in Iraq. As electrochemical “beings of
light,” the strongest electromagnetic force on Earth is human conscience, acted
upon.
Where Do We Go From Here?
Now
that we have the answer to the original question: Who owns and
controls the military industrial complex, we need to ask another
question.
Who
are these Corporate and Banking Warlords in a war with?
Unfortunately,
it is very clear that Americans are the target of the long, soft war of
terrorism. Each
American is a potential terrorist or at least a possible dissenter who doesn’t
support the current administration’s policies. Hundreds of war-tools have lined
the pockets of the Corporate and Banking Warlords while the military puts
civilians in the cross-hairs. American Democracy has been taken over by
transnational greed and power.
We pay taxes so that the DoD can create war-tools that are used against
US, the citizens of the U.S.
These
realities are a basis for declaring a patriotic war on the following
transnational corporations and agencies that have already
declared war on American citizens. The following list represents some of the
people who need to be investigated and brought to justice:
The
Department of Defense
The
National Security Agency
DARPA
In-Q-Tel
Highlands
Group and all attendees of Highlands Forums
The
Federal Reserve
The
Counsels on Foreign Relations
The
International Monetary Fund
The
World Bank
The
International Court of Settlements
All
Transnational Corporations and Banks
The
Bank of England
The
Vatican Bank
The
Knights of Malta
Any
of these corporations found guilty should be held responsible for the crimes
and banned from further business in the United States of America; their
principals should be tried for the crimes that have perpetrated, whether it is
treason, crimes against humanity, insider trading, or murder.
There
is an internal war going on in America. But with the military use of the
war-tools described above, perception management is controlled and no one even
asks how the president and the Department of Defense are able to wage this war.
In a previous article, False Flags are Legal Propaganda, we spelled out
in great details the way the National Defense Authorization Act has been
modified each year to empower this war against Americans.
In
another posting, we showed readers an example of how false flag events can be
used against Americans through the techniques of perception management.
We
swallow their lies whole without question as they used our tax money to develop
psychological warfare devices that we have described in our posts. How can we
awaken our fellow countrymen and the world when subliminal perception
management has made us passive to their evil?
This
is a call for action for all patriots involved in any aspect of the following
treasonous war against American democracy to stand up and refuse to participate
in this criminal activity. We must file lawsuit after lawsuit based upon
whistle-blower complaints that bring to light the dark evil of the Warlords.
Resist your programming and help slow down the machinations of the rich and
warlike used against citizen. Demand authorities to be transparent. Demand to
know the truth and fight against the forces of greed and selfishness that
drives evil war-machines.
Appendix
US Patents for Mind Control
Devices
USP
# 3,951,134 (April
20, 1976), Apparatus & Method for Remotely Monitoring &
Altering Brain Waves
Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject’s brain waves. The interference waveform … is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.
Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject’s brain waves. The interference waveform … is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.
USP
# 5,159,703 (Oct.
27, 1992), Silent Subliminal Presentation System
Abstract: A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain.
Abstract: A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain.
USP
# 5,017,143 (May
21, 1991), Method and Apparatus for Producing Subliminal Images
Abstract: A method and apparatus to produce more effective visual subliminal communications. Graphic and/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior.
Abstract: A method and apparatus to produce more effective visual subliminal communications. Graphic and/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior.
USP
# 6,052,336 (April
18, 2000), Apparatus and Method of Broadcasting Audible Sound Using
Ultrasonic Sound as a Carrier – Abstract: An ultrasonic sound
source broadcasts an ultrasonic signal which is amplitude and/or frequency
modulated with an information input signal originating from an information
input source. The modulated signal, which may be amplified, is then broadcast
via a projector unit, whereupon an individual or group of individuals located
in the broadcast region detect the audible sound.
USP
# 5,539,705 (July
23, 1996), Ultrasonic Speech Translator and Communications System
Abstract: A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.
Abstract: A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.
USP
# 7,629,918 (Dec.
8, 2009), Multifunctional radio frequency directed energy system
Abstract: An RFDE system includes an RFDE transmitter and at least one RFDE antenna. The RFDE transmitter and antenna direct high power electromagnetic energy towards a target sufficient to cause high energy damage or disruption of the target. The RFDE system further includes a targeting system for locating the target. The targeting system includes a radar transmitter and at least one radar antenna for transmitting and receiving electromagnetic energy to locate the target.
Abstract: An RFDE system includes an RFDE transmitter and at least one RFDE antenna. The RFDE transmitter and antenna direct high power electromagnetic energy towards a target sufficient to cause high energy damage or disruption of the target. The RFDE system further includes a targeting system for locating the target. The targeting system includes a radar transmitter and at least one radar antenna for transmitting and receiving electromagnetic energy to locate the target.
USP
# 6,488,617 (Dec.
3, 2002), Method and Device for Producing a Desired Brain State
Abstract: A method and device for the production of a desired brain state in an individual contain means for monitoring and analyzing the brain state while a set of one or more magnets produce fields that alter this state. A computational system alters various parameters of the magnetic fields in order to close the gap between the actual and desired brain state. This feedback process operates continuously until the gap is minimized and/or removed.
Abstract: A method and device for the production of a desired brain state in an individual contain means for monitoring and analyzing the brain state while a set of one or more magnets produce fields that alter this state. A computational system alters various parameters of the magnetic fields in order to close the gap between the actual and desired brain state. This feedback process operates continuously until the gap is minimized and/or removed.
USP
# 6,239,705 (May
29, 2001), Intra-Oral Electronic Tracking Device
Abstract: An improved stealthy, non-surgical, biocompatible electronic tracking device is provided in which a housing is placed intraorally. The housing contains microcircuitry. The microcircuitry comprises a receiver, a passive mode to active mode activator, a signal decoder for determining positional fix, a transmitter, an antenna, and a power supply. Upon receiving a coded activating signal, the positional fix signal decoder is energized, determining a positional fix. The transmitter subsequently transmits through the antenna a homing signal to be received by a remote locator.
Abstract: An improved stealthy, non-surgical, biocompatible electronic tracking device is provided in which a housing is placed intraorally. The housing contains microcircuitry. The microcircuitry comprises a receiver, a passive mode to active mode activator, a signal decoder for determining positional fix, a transmitter, an antenna, and a power supply. Upon receiving a coded activating signal, the positional fix signal decoder is energized, determining a positional fix. The transmitter subsequently transmits through the antenna a homing signal to be received by a remote locator.
USP
# 6,091,994 (July
18, 2000), Pulsative Manipulation of Nervous Systems
Abstract: Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject’s skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1/2 Hz and 2.4 Hz. The 1/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a “knot” in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities.
Abstract: Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject’s skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1/2 Hz and 2.4 Hz. The 1/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a “knot” in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities.
USP
# 5,507,291 (April
16, 1996), Method and an Associated Apparatus for Remotely
Determining Information as to Person’s Emotional State –
Abstract: In a method for remotely determining information relating to a
person’s emotional state, a waveform energy having a predetermined frequency
and a predetermined intensity is generated and wirelessly transmitted towards a
remotely located subject. Waveform energy emitted from the subject is detected
and automatically analyzed to derive information relating to the individual’s
emotional state.
USP
# 4,877,027 (Oct.
31, 1989), Hearing System
Abstract: Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of 10 to 20 uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated.
Abstract: Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of 10 to 20 uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated.
Continue
reading this series at:
Who
Really Owns and Controls the Military-Industrial Complex? Part II
From State of the
Nation @ http://stateofthenation2012.com/?p=34801
For more information about the military industrial complex
see http://nexusilluminati.blogspot.com/search/label/warmongers
- Scroll down
through ‘Older Posts’ at the end of each section
Do you LIKE this uniquely informative site?
Hours of effort by a genuinely incapacitated invalid are
required every day to maintain, write, edit, research, illustrate, moderate and
publish this website from a tiny cabin in a remote forest.
Now that most people view these posts on mobile devices,
sites like this earn an ever diminishing pittance from advertising…
Like what you see? Please give anything you can -
Contribute any amount and receive at least one
New Illuminati eBook!
(You can use a card securely if you don’t use Paypal)
Please click below -
Spare Bitcoin
change?
Xtra Images by R. Ayana – https://c2.staticflickr.com/2/1669/24332536723_aee3f13af3_k.jpg
For further enlightening
information enter a word or phrase into the random synchronistic search box @
the top left of http://nexusilluminati.blogspot.com
And see
New Illuminati – http://nexusilluminati.blogspot.com
New Illuminati on Facebook - https://www.facebook.com/the.new.illuminati
New Illuminati Youtube Channel - https://www.youtube.com/user/newilluminati/playlists
New Illuminati’s OWN Youtube Videos
-
New Illuminati on Google+ @ For
New Illuminati posts - https://plus.google.com/u/0/+RamAyana0/posts
New Illuminati on Twitter @ www.twitter.com/new_illuminati
New Illuminations –Art(icles) by
R. Ayana @ http://newilluminations.blogspot.com
The Her(m)etic Hermit - http://hermetic.blog.com
DISGRUNTLED SITE ADMINS PLEASE NOTE –
We provide
a live link to your original material on your site (and links via social
networking services) - which raises your ranking on search engines and helps
spread your info further!
This site
is published under Creative Commons (Attribution) CopyRIGHT (unless an
individual article or other item is declared otherwise by the copyright
holder). Reproduction for non-profit use is permitted & encouraged - if you
give attribution to the work & author and include all links in the original
(along with this or a similar notice).
Feel free
to make non-commercial hard (printed) or software copies or mirror sites - you
never know how long something will stay glued to the web – but remember
attribution!
If you
like what you see, please send a donation (no amount is too small or too large)
or leave a comment – and thanks for reading this far…
Live long
and prosper! Together we can create the best of all possible worlds…
From the New Illuminati – http://nexusilluminati.blogspot.com
"WHO IS IN CHARGE" Each one of us! Yes... We still have a choice to either join the military industrial complex as a soldier, tech, investor, etc... or not.... Each one of us has the power to choose. Don't blame anyone, for as long as we choose and use money as a tool of ignorance, war will be inevitable for all money values are based on the principal of scarcity and the idea of scarcity is the root cause of most every conflict on the planet!
ReplyDeleteOne word for this: evil.
ReplyDeleteEvil is anything that seriously threatens our systems. I use systems here to represent all that is honorable & noble regarding humanity. Complete control & domination is the aim of the war machine, while raking in wicked amounts of money, which comes from the Federal Reserve, which controls the money. It's all FIAT, & what will the controllers do when the glorious dollar loses global authority & turns to straw? Those H.G Well's War of the World's looking cell-phone towers, and don't forget the ELF towers, are they able to send microwaves toward life? We already know the EMF's are harming us.
http://educate-yourself.org/mc/
The humans working for the war machine have no conscience, for what kind of human would engage in such insane, invasive, immoral, research? All this money for research into brain mapping & manipulation, and very little money for research into identifying the genetic causation & development of a reliable identification test for PSYCHOPATHY. Because it is most likely that the majority of those working in this evil research, are in fact, psychopathic themselves. Psychopaths are motivated by control over others.
This reminds me of the story of Atlantis. The people grew so arrogant & filled with hubris, that their entire civilization was self-destructed. I wonder if another reason the US populace is so apathetic, beyond diet, flouride and other known culprits, is radio-waves frequecies.
This can all go back in culture as well, to the Hebrew pantheon war god, Yahweh. How long have humans had a WAR god as the shining star to guide the morality of the West? Christianity is Jew Religion Part 2. The Torah/Old Testament is all about slaughtering and destroying the enemy, and manipulating the populace through mind control. And Jesus was fully onboard with Moses- the war criminal. If you don't think Judeo-Christian insanity has infected the minds of Westerners for the past 2000 years, you are naive.
Excellent article New Illuminati, thank-you for posting. The shit is getting real. But always remember, the insane might appear to rule things, and maybe they do rule the physical realm. But this world is but a fleck in the space of eternity. Space repells mass. One day I will be finished with the unconscious, and those who prefer to remain unconscious. Peace to you & thanks for your compassion and true concern for the innocent & good.
Money is all based on a subjective interpretation of value (belief) FYM, it's all BS! WE give it value, and it's value is shit because it now has more value than all of life. What are we willing to do for a WAR based token of DEBT? Go to WAR of course for that is the real purpose of war, to make money! Get off the kick of money and the real incentive to do anything will be LOVE. For money is a reflection of our collective belief in HATE, FEAR and LOATHING of the idea of not having enough to survive.
ReplyDelete