/b | /pol | /news | /health | /s | /o | /g | /f | /v | /o | /x | /dox


Anonymous2018-02-14 00:42:32
hanleymr@state.gov Auto-Added AriannaHuf Auto-Added david@pearsonswine.com Auto-Added rrussony@gmail.com Auto-Added hiltonhotels&resorts@res.hilton.com Auto-Added cindy.quillinan@thomsonreuters.com Auto-Added gunter@newamerica.net Auto-Added spopkin@ucsd.edu Auto-Added news@nationbooks.org Auto-Added hnnmedia@gmail.com Auto-Added edepstein@gmail.com Auto-Added meenaahamed@gmail.com Auto-Added UnitedAirlines@news.united.com Auto-Added dania@nfg.org Auto-Added View@Bloomberg.net Auto-Added salbrecht@publicwelfare.org Auto-Added mhopkins@eldoradopictures.com Auto-Added philip.sherwell@telegraph-usa.com Auto-Added rtraister@salon.com Auto-Added chubbco@sprintpcs.com Auto-Added Barry Kibrick Auto-Added StanMajor Auto-Added syndication@salon.com Auto-Added scottros@well.com Auto-Added bookings@talkradionews.com Auto-Added Tamera_Luzzatto@clinton.senate.gov Auto-Added BBurkett16 Auto-Added wendy_morigi@rockefeller.senate.gov Auto-Added bennett@theweekmagazine.com Auto-Added jacobwe@microsoft.com Auto-Added jerry.landay@verizon.net Auto-Added darius_rejali@yahoo.com Auto-Added mildred@newsouthbooks.com Auto-Added SMoore@reputation-inc.com Auto-Added paul@wiltonfilms.com Auto-Added dcalleo@jhu.edu Auto-Added pbourne@igc.org Auto-Added fmanjoo@salon.com Auto-Added szaman@prospect.org Auto-Added collingsd@yahoo.com Auto-Added DBenjamin@csis.org Auto-Added markmillerhome@sbcglobal.net Auto-Added Beth_Kseniak@condenast.com Auto-Added Darius.Rejali@directory.reed.edu Auto-Added CPaul@scpr.org Auto-Added DannyG2295 Auto-Added ifakhoury@basrh.rhc.gov.jo Auto-Added hdpf@msn.com Auto-Added Wallace.A.Terrill@us.army.mil Auto-Added editorial@salon.com Auto-Added Eric.Bates@rollingstone.com Auto-Added rejali@reed.edu Auto-Added lnichols@americanprogress.org Auto-Added Booksbrownandco Auto-Added louise.cullen@aph.gov.au Auto-Added Daniel_Collings@ksg03.harvard.edu Auto-Added NicholasQ Auto-Added maryjacoby@starpower.net Auto-Added gail@well.com Auto-Added wilhelm@breakpoint-inc.net Auto-Added mary@dctoolbox.com Auto-Added seandaniel@myaetherbb.com Auto-Added babiskin@msn.com Auto-Added Mmoynihan108 Auto-Added ammeson@qtm.net Auto-Added miner@dnc.org Auto-Added newsalerts-noreply@google.com Auto-Added nluque@graycary.com Auto-Added wandajo01@comcast.net Auto-Added Roger@RainyDayBooks.com Auto-Added SFehr19047 Auto-Added ford@sabotomme.com Auto-Added lsaunders@BrunswickGroup.com Auto-Added R.Sennett@lse.ac.uk Auto-Added edburke@tcd.ie Auto-Added Clemons@newamerica.net Auto-Added
Anonymous2018-02-14 00:36:41
giuseppe.manzo@esteri.it Auto-Added jonathan@wellsstreetpopcorn.com Auto-Added caaron@freepress.net Auto-Added LauraBush@eb.43alumni.com Auto-Added robert@bravenewfilms.org Auto-Added Press_Release@washingtoninstitute.org Auto-Added debracooper2000@gmail.com Auto-Added info@iq2us.org Auto-Added michael.sargeant@dlcc.org Auto-Added CAN@prochoiceamerica.org Auto-Added tfreedma tfreedma@aol.com Auto-Added rvandiver@ospreyglobalsolutions.com Auto-Added joepec@constellationsgroup.com Auto-Added treshamabile@mac.com Auto-Added joe@nationalmemo.com Auto-Added donotreply@thecapitoldeal.com Auto-Added washington@diplobel.fed.be Auto-Added bw@bill-white.net Auto-Added sales@cutereplica.com Auto-Added noreply-ed7cc8c8@plus.google.com Auto-Added faiz@thinkprogress.org Auto-Added Kelsey@SRMFoundation.org Auto-Added noreply-47431618@plus.google.com Auto-Added miriam@bilateralchamber.org Auto-Added spoof@americanexpress.com Auto-Added jamierubin@bloomberg.net Auto-Added laurie.verge@pgparks.com Auto-Added emily_benn@hotmail.com Auto-Added fisherm@washpost.com Auto-Added harold.holzer@metmuseum.org Auto-Added david@lytel.com Auto-Added guy@omnimap.com Auto-Added territoryahead@shop.territoryahead.com Auto-Added info@guardianmail.co.uk Auto-Added getlerm@washpost.com Auto-Added gahlburt gahlburt@aol.com Auto-Added johnmarttila@gmail.com Auto-Added info@email.events.shoebuy.com Auto-Added samekg@coudert.com Auto-Added rgaylord@mediamatters.org Auto-Added sandra.walia@pgparks.com Auto-Added email@extracare.cvs.com Auto-Added rosina@attitudenewyork.com Auto-Added dshuster98@yahoo.com Auto-Added dandelman@hotmail.com Auto-Added editors@thedemocraticstrategist.org Auto-Added nomax2@earthlink.net Auto-Added matt.brownerhamlin@gmail.com Auto-Added huffposthill@huffingtonpost.com Auto-Added enapoles@clintonfoundation.org Auto-Added waldmanm@exchange.law.nyu.edu Auto-Added bruce_blumenthal@yahoo.com Auto-Added hendrikhertzberg hendrikhertzberg@aol.com Auto-Added Perlstein Auto-Added cziemke@ida.org Auto-Added draforeman@gmail.com Auto-Added davidsol@gmail.com Auto-Added drdondr@gmail.com Auto-Added DWJSINCLAIR Auto-Added sryan@telesiscorp.com Auto-Added editors@nationalmemo.com Auto-Added edward.felsenthal@newsweekdailybeast.com Auto-Added dougschoen dougschoen@aol.com Auto-Added julia.johnson2@bbc.co.uk Auto-Added signature@e.llbean.com Auto-Added caseyaw@gmail.com Auto-Added kktowns@gmail.com Auto-Added mua21@cam.ac.uk Auto-Added LLBean@e.llbean.com Auto-Added nathaniel.higbie@gmail.com Auto-Added lorna.susi@enel.com Auto-Added
Anonymous2018-02-14 00:36:02
esigal@sigal.com Auto-Added theodore.chuan@mail.house.gov Auto-Added davidisigal@gmail.com Auto-Added lauren@laurenrshapiro.com Auto-Added theodorechuan@mail.house.gov Auto-Added Bruce_Cohen@Judiciary-dem.senate.gov Auto-Added theodore.chuang@mail.house.gov Auto-Added sayral@ps-b.com Auto-Added g.moltedo@gmail.com Auto-Added Bobby.Friedman@bbc.co.uk Auto-Added mtrbovich@uswa.org Auto-Added kmolstre@hillaryclinton.com Auto-Added gpacker@earthlink.net Auto-Added ggensler@hillaryclinton.com Auto-Added annette@elrothschild.com Auto-Added hugh.milbourn@bbc.co.uk Auto-Added shelley@scgradio.com Auto-Added comby@comcast.com Auto-Added hbuchanan@focr.org Auto-Added susanunpc@gmail.com Auto-Added Sandra_Abrevaya@durbin.senate.gov Auto-Added kerry@kerrykennedy.net Auto-Added googlealerts-noreply@google.com Auto-Added nelewi@nytimes.com Auto-Added hr15@att.blackberry.net Auto-Added melleithee@hillaryclinton.com Auto-Added info@alibris.com Auto-Added Jon.Snow@itn.co.uk Auto-Added jfarrow@hillaryclinton.com Auto-Added eriposte@gmail.com Auto-Added Melanie.Wray@bbc.co.uk Auto-Added ed.wallis@fabian-society.org.uk Auto-Added jbecker@clintonfoundation.org Auto-Added jarreau@lemonde.fr Auto-Added capricia@hillaryclinton.com Auto-Added mfuchs@hillaryclinton.com Auto-Added Valerie.Fitzsimons@rte.ie Auto-Added norman.birnbaum@WiKo-Berlin.DE Auto-Added christopher.s.dickey@gmail.com Auto-Added mbiedel@newdemmajority.org Auto-Added elliott@sandiego.com Auto-Added f.mogherini@partitodemocratico.it Auto-Added CC: nbarr@hillaryclinton.com Auto-Added darcy@tombihn.com Auto-Added Joshua.Steiner@quadranglegroup.com Auto-Added l.pistelli@partitodemocratico.it Auto-Added samiller@hillaryclinton.com Auto-Added jimkennedy@hillaryclinton.com Auto-Added MBennett@thirdway.org Auto-Added paulblumenthal@gmail.com\; christinaritch@hotmail.com\; johnritch@compuserve.com\; sdan45@mac.com Auto-Added jkennedy2006@gmail.com Auto-Added tom.baldwin@thetimes.co.uk Auto-Added Kori_Bernards@mpaa.org Auto-Added Caroline.Carow@bbc.co.uk Auto-Added ggarin@hartresearch.com Auto-Added ismoot@turcopolier.com Auto-Added imagicians@blueyonder.co.uk Auto-Added reply.223605.181968707.5510023609970606990-sbwhoeop_aol.com@en.groundspring.org Auto-Added Brian.Todd@turner.com Auto-Added shawnjjohnson@hotmail.com Auto-Added ldibartolomeo@hillaryclinton.com Auto-Added krados@sterlingpublishing.com Auto-Added gzallis@ps-b.com Auto-Added hilarionmartinez@gmail.com Auto-Added mcm7@MAIL.nyu.edu Auto-Added
Anonymous2017-09-13 19:27:16
One of my favorite quotes from Bruce Schneier, concerning phones is: "..google knows where you work, they know where you sleep, and since she has a phone they know who you sleep with"
Anonymous2017-09-02 18:57:37 File: gulag_improved5_jpeg.jpg (1663.505kb, 12800x7200)
By Google, of course...
Anonymous2017-08-29 15:01:26
We are not only incensed that our elected officials are turning a blind eye to the transnational enemy within our country and around the world, we are disgusted with these warlords, both military and corporate, that send our sons and daughters to wars-for-profit to have their blood spilled for their own families’ profits. As citizens of the world, we are filled with anger when we see men, women, and children slaughtered and displaced so that the few at the top can earn profits from blood and guns. We are sick and tired of wars ad nauseam, from our fathers who were killed in Viet Nam, our neighbors on 9-11, displaced war refugees around the world, not to mention the millions of starving children around the world who could use the money we spend on DARPA and their war tools for clean water, food, and education.

This anger has arisen in us to the point that we had to find out WHO IS IN CHARGE. Unlike many of our politicians, we know that naming our enemy is the first step towards identifying and disarming them.

Many readers to this site will be quite familiar with the usual suspects: the Rothchilds, Rockefellers, and big banksters who command the top tier of the human wealth pyramid. We also know that they work closely with government agencies to plan and implement continuing military, cyber, and economic wars. We have all read about how the Bilderberg Club, Illuminati, and the Knights of Malta coordinate these machinations with the Vatican. We know that the U.S. Federal Reserve is just a private corporation with a monopoly to print Federal Reserve notes that manipulates and plunders the U.S and global economy.

It is what we don’t know that interested us. So we decided to follow the money. Who are the war profiteers that are plundering American lives, wealth, and democracy?

In this article, the Anonymous Patriots are back again. Armed with the internet and a keen ability to interpret the geopolitical landscape, we have traced these GLOBAL WAR CRIMINALS back to the economic machinations that make them richer and more powerful with every military invention that they hoist on us. We are tired of becoming poorer, sicker, and more enslaved by these ruling sub-humans and ask you to arm yourselves with the knowledge we have gleaned from our research.

Then, be a patriot. Send this article to as many people as you can, as quickly as you can, so that the truth will be preserved when TPTB think about taking down this website.
Brief Background

To begin our journey, please review this list of the top ten or so military contractors, or Military Warlords.

Lockheed Martin Corporation, The Boeing Company, Raytheon Company, General Dynamics Corporation, Northrop Grumman Corporation, Leidos Holdings, Inc., Huntington Ingalls Industries, L-3 Communications Holdings Inc., United Technologies Corporation, BAE Systems PLC, SAIC, McKesson Corporation, Bechtel Group Inc., Veritas Capital Fund, Booz Allen Hamilton Holding Corporation.

Now let’s look at the top shareholders of the top military contractors, who we call the Corporate or Bankster Warlords.

Vanguard Group, State Street Corp, Capital Research Global Investors, Templeton Investment Counsel LLC, Barclays Bank Plc, BlackRock Investment Management (UK) Ltd., Schroder Investment Management, Capital World Investors, Bank of America Corporation, JPMorgan Chase & Co., Bank of New York Mellon Corp, Black Rock Advisors, Black Rock Fund Advisors, Old Republic International, Wellington Management Company, BlackRock Institutional Trust Company, N. A., Evercore Trust Company, N. A., FMR, LLC, , Invesco Ltd., Franklin Resources, Goldman Sachs Group Inc., T. Rowe Price Group, Inc.

What is worth noting about this list is that you can find some of the usual suspects: Rothchilds, Rockefellers, Morgans, Warburgs, and the rest of the Bankster Warlords behind some of these names. These Americans are in the business of war, every type of war or conflict that enables them to sell their war products. Like any for-profit business they have products to sell and to make good profits they need a vibrant, robust customer base. “Peace-on-earth-goodwill-toward-men” is not a market that will purchase their war services and wares.

To make things even more complex so that we can never figure out who is in charge, every one of these corporations owns major shares in every other corporation. They are intertwined like a grape vine. If we look closer we find that every one of these corporations conducts international business and is invested in international military ventures. They are not governed by any one nation as they transcend nations.

This type of Corporate Warfare is transnational. It is beyond being international or global. These companies work outside of the control of American as a nation. They work against Americans with their transnational economic warfare and make money from both sides of any military or corporate warfare. No matter who wins or loses, no matter how many of our children die in their war theaters, and no matter who the politicians are, they make money. And then they invest this money back into the same business because the business of war is extremely profitable.

Essentially, they are war criminals just like Henry Schroder, who funded both Hitler and England. This type of banking warfare is common throughout history.

Henry Schroder was a German banker who went to England to help start England’s central banking system. Blackwater, Templeton, and many of the other companies listed above are English and German who are all tied to the Bank of England in ways that no one can explain because the English Parliament is not allowed to question the Queen’s business. No one knows who owns the Bank of England or who the shareholders are. This should raise some eyebrows and make the conspiracy theorists ecstatic, and for good reason. It is fair to say that the lion’s share of war profits in America go to England.
The Queen of England Makes Money from War

Accordingly, all the unsubstantiated conspiracies about the Queen of England have some merit after following the money back to the bankster warlords who set up the U.S. Federal Reserve. But unlike most conspiracy theories suggest, the Federal Reserve regional banks are not the true culprits. The true culprits are the original investors in the corporations, listed above, who serve the military through all types of wars – physical conflict, information, and economics.

It is the interwoven fabric of the investments of the war-supporting corporations that have created a system that is inbred and tied to England…and then to Rome. Simply through the association of the royal families of the world who are members of the Knights of Malta you have an economic intelligence community that is insider trading at a transnational level. The Bilderberg Group, the Club of Rome, or DARPA are associations of powerful people with deep investments in military concerns who must protect their financial interests and pass wealth onto their family members. That is why so many of the richest families intermarry – to keep it “all in the family.”

The richest and most powerful people in the world belong to the Knights of Malta, the Equestrian Order of the Holy Sepulchre of Jerusalem, the Order of the Garter, the Teutonic Knights and many other orders that vow allegiance to the Vatican. If we wish to broaden the perspective, one can add that the Society of Jesus, the Jesuits, are involved at all levels and have worked tirelessly as the soldiers of the Pope to create the ultimate spy network.
The Vatican Makes Money from War

All banking started in Italy and was connected to the Vatican. It is fair to say that the central banking ideas of Italy have been replicated in the central banking systems used throughout the world. Central banking comes from the Vatican and through the different agencies of the Vatican (Knights of Malta) the world economy is manipulated by insider trading information that is being shared with the Vatican via the vows of allegiance that every Knight of Malta makes.

The Vatican profits by war because it takes in hundreds of billions a year through refugee placement services and humanitarian aid provided to war-torn areas. The more war – the richer the Vatican becomes. That is why the Vatican supports unbridled migrations of people and the chaos that ensues from war. The Knights of Malta are one of the largest charities in the world. The Catholic Church has thousands of different tax-free, charitable organizations that receive money to help in humanitarian causes. No one knows how much money the Catholic Church receives each year. The Vatican Bank has been caught many times laundering money on a huge scale.

Just like the almost unfathomable interwoven inbreeding of the bankster warlords, the double-speak of the Vatican is filled with lies. The Vatican says one thing and does the opposite. The Vatican itself gives no money away to any charity. The oldest and richest corporation in the world gives nothing to charity but is a “front” for the largest charity corporation on the planet.

The Vatican also created Canon Law which developed into Common Law, Admiralty Law, and other forms of law. America attorneys still take an oath to the Temple Bar in the City of London. This is a reference to the Templar’s Headquarters in the City of London. The Templars were a Catholic order that more or less established banks from Europe to Jerusalem during the Crusades. Again, whether we look at the history of banking or law, all roads lead to Rome. Therefore, when we hear the theorists get all worked up about the conspiracies rampant in the military industrial complex, we should perhaps listen a little more carefully and do our own research to find that the simply version is supported by the detailed version.

But that still leaves the question of who “runs” the military industrial complex.
The Long War is Forever

This question is actually quite simple to answer. Conspiracy theorists (yes, that’s us folks) will tell you that DARPA drives the engines of the military through farming out its “wish list” to private corporations to compete for the contract to build the desired technology. This is true. DARPA is well known for funding multiple initial projects and then further funding the winner. Often these “winners” create corporations that are given military contracts that pay the corporation to make the “war device” and the shareholders of the company glean the profits. The Internet, Cisco Systems, Google, and Facebook are all inventions of DARPA.

And we hardly have to mention the cost over-runs on every military contract. These contracts, paid for by American tax payers, are for hundreds of billions of dollars and the corporation is allowed and encouraged to make a big profit so the interwoven Corporate Warlords get their cut of the pie. When Rumsfeld audited the 7 trillion dollar Pentagon budget, 2.3 was missing. This is typical and still, to date, it hasn’t been “found.”

Even worse than the Corporate Warlord’s profits is the fact that every one of the top military contractors does business in international markets. This means that every military contract is, will be, or can be shared with other nations, including the very “enemies” for which the war-device is produced. Transnational Corporate Warlords are selling the same “military secrets” to our enemies. Just read the web sites of any top military contractor where they proudly proclaim their international business in military devices. These transnational corporations are also using their influence to destabilize markets, economies, countries and currencies to create new business. Once DARPA gets the militarized version of the invention, the source code usually is made public. This may seem crazy, but it always feeds the enemy our new weapon designs so that they can keep up the appearance of a “weapons race.”

Transnational corporations are dismantling America through political and military manipulation of the economy and the Corporate and Banking Warlords are having a party amidst the seeming chaos and confusion. These warlords know full well that the CIA manipulates currency as a continuing war. The International Monetary Fund, the World Bank, the International Bank of Settlements advance the causes of these Corporate Warlords. Destabilizing countries creates the need for international intervention.

The military industrial complex created the War on Terror and calls it the “long, soft war” because it will never end. The pronouncement of the War on Terror was the declaration of the overthrowing of American Democracy by warlord oligarchy. Only a few people benefit from this war and often the politicians who declare the “New World Order” take up positions in corporations that profit from war. Former presidents and prime ministers become Corporate Warlords and make a fortune.
American Democracy is Doomed

If the following corporations continue to exist, American Democracy will fall and become the military arm of the triangle of power between New York, the City of London and Vatican City. These seeming vague indications will be elaborated on in the rest of this article but for now let’s review an outline of who owns and controls the military industrial complex.

“For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence – on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.” John F. Kennedy, April 27, 1961

John Kennedy found out shortly after he spoke these words that the “monolithic and ruthless conspiracy” was also at home in the United States. It was surely one of the causes of his assassination for in those days few knew of the treasonous behavior of Corporate and Banking Warlords. In our time, the greedy warlords are proud of what they do and the government supports them in full knowledge that transnationalism is destroying America.
Pentagon Missing Trillions
“The military’s money managers last year made almost $7 trillion in adjustments to their financial ledgers in an attempt to make them add up, the Pentagon’s inspector general said in a report released Friday. The Pentagon could not show receipts for $2.3 trillion of those changes.” Pentagon’s Finances in Disarray, John M. Donnelly, The Associated Press, 2001

This type of waste indicates the scale upon which the military industrial complex seemingly answers to no one. No one checks whether DARPA inventions are moral. All military inventions, even if they advertise them as helpful, are weaponized. What DARPA releases is only the tip of the iceberg and is public.

But there is a more secret group that directs the military in its future goals. One group, essentially one man, has been behind creating the direction of military and commercial warfare for decades. He founded the Highland Group which hosts forums for DARPA, Department of Defense, CIA, FBI, In-Q-Tel, Homeland Security, SAIC, and many other government agencies and organizations.

All Highland Forums are private, invitation only, have no written agenda and basically are secret and did not happen. Except for the fact that the Corporate Warlords who are invited become privy to the direction of research for the US military, which subsequently creates the directions of Corporate Warlords. Nothing is written down so that no one is held responsible. The Highland Forums have been directing DARPA research and the research of the CIA’s research and development component called In-Q-Tel.
The Highland Forum, Richard Patrick O’Neill, and the Long War

Let’s take a closer look at the Highland Forums. The description below is taken from their website:

Highland Forums Program Description Overview

“Information Warfare, Information Operations, Information Assurance, and Operational Resilience Information is an instrument of national, global, and corporate power. As such, control over its use, its protection, and its manipulation, are national and global security issues. This Research Program examines strategic and tactical offensive and defensive aspects of information operations (IO) by state and non-state actors to achieve political, military, and economic goals through IO means, including computer network operations (CNO), computer network attack (CNA), computer network exploitation (CNE), computer network defense (CND), psychological operations (PSYOPS), perception management, media manipulation, propaganda, strategic influence, and public diplomacy, among others.”

Richard Patrick O’Neill, the director of Highlands Group describes his work on their website as: “A core element of the Highlands Group activity has been the Highlands Forum. Over the past 18 years almost fifty major meetings and twenty enrichment sessions have been held around the country. Each succeeding session, small and cross-disciplinary in nature, brought remarkable people–from Nobel laureates and Pulitzer winners to young tech pioneers; from science fiction authors to corporate CEO’s; from scientists to military leaders–to link innovators from the “core and the edge”, without an outcome in mind, exploring a theme and a set of ideas, looking for novelty and emergence. The in-depth proceedings of those events are posted to the Secretary of Defense Highlands Forum website, along with interviews, original papers, and book reviews.” http://www.highlandsgroup.net/perspectives.php?ID=17

One of the only descriptions found on the internet about a presentation at a Highlands Forum is given below to show the direction the group is taking to ensure that “war” continues universally.
The Web and the Long, “Soft” War, by Irving Wladawsky-Berger at http://blog.irvingwb.com/blog

“A few weeks ago I attended a very stimulating meeting, the Highlands Forum. The Forum is sponsored by the Office of the US Secretary of Defense to explore new ideas and emerging trends that will help support high-level Department of Defense (DoD) policy and strategy, especially as they relate to information and information technologies.

The Highlands Forum was organized in 1994 by retired US Navy captain Dick O’Neill. It is chaired by the Principal Deputy Assistant Secretary of Defense for Networks and Information Integration. Each meeting is centered on a specific topic. Around 25 experts from government, industry, academia, the arts and the professions are invited to discuss their ideas on the subject – to be part a kind of strategic conversation.

While our discussions were generally technology-based, you cannot ponder how IT, the Web and related technologies could impact DoD without also thinking hard about the global environment that DoD, and society in general will face over the next decade and beyond. DoD’s primary task is “to deter conflict – but should deterrence fail, to fight and win the nation’s wars.”

Then there is the War on Terror, which DoD has started to refer to as the Long War, a term that I first heard at the Forum. The Long War is perhaps as much about winning the hearts and minds of people and nations, as it is about defeating, or at least containing an enemy that is often hard to find. While one absolutely needs the weapons and military training to win the classic, hot conflicts, the soft or cultural aspects of the conflict are at least as important that over time could undermine democratic principles, free markets and our standard of living.

It is a fact that the Internet, started by DoD for very legitimate defense purposes, has become the world’s platform for communication, information and innovation. Perhaps DoD should once again take on a lead role, this time in supporting research and pilot programs that will accelerate the development of some of the most complex and critical applications and emerging technologies that are driving the evolution of the Web for the very different requirements of the 21st Century.

I would justify the investments as part of our efforts to prepare for and fight the Long War, as well as to help our armed forces become even more highly skilled, collaborative, information-based organizations. I think that a major part of the Long War is to get as many people and countries around the world to be part of and benefit from our increasingly interconnected economies. We need to help them see a potentially promising future for them and their families.”

History of the CIA’s Version of DARPA – “In-Q-Tel”

“The lie can be maintained only for such time as the state can shield the people from political, economic and/or military consequences of the lie. It thus becomes vitally important for the state to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth becomes the greatest enemy of the state.” Dr. Joseph M. Goebbels Ministry of Enlightenment, Third Reich

The CIA has a legacy of operating at the cutting edge of science and technology with a reputation for bold innovation and risk taking, often working in advance of the private sector and other branches of government.

By the late 1990s, the pace of commercial innovation had overtaken the ability of government agencies to develop and incorporate new technologies. The tech industry was innovating far too rapidly to ignore. Commercial technologies from the startup world addressed many of the same information technology, biotechnology, communications, and energy challenges that faced the intelligence community.

In 1998, CIA identified technology as a top strategic priority, and set out a bold and radical plan to create a new venture that would help increase the agency’s access to private sector innovation. In-Q-Tel was chartered in February 1999 by a group of private citizens at the request of the Director of Central Intelligence and with the support of the U.S. Congress. IQT was tasked with building a bridge between the IC and a new set of technology innovators.
The CIA’s – Science Applications International Corporation (SAIC)

Leidos, a joint spin-off of Science Applications International Corporation (SAIC), is an American defense company headquartered in Reston, Virginia, that provides scientific, engineering, systems integration, and technical services. Leidos works extensively with the United States Department of Defense (4th largest DoD contractor FY2012), the United States Department of Homeland Security, and the United States Intelligence Community, including the National Security Agency, as well as other U.S. government civil agencies and selected commercial markets. On September 27, 2013, SAIC changed its name to Leidos and spun off a $4 billion government services and information technology company, which retains the name Science Applications International Corporation.
SAIC Projects

The Defense Intelligence Agency (DIA) transitioned a Remote Viewing Program to SAIC in 1991 which was renamed the Stargate Project. The Stargate Project was the code name for a U.S. Army unit established in 1978 at Fort Meade, Maryland, by the Defense Intelligence Agency and SRI International (a California contractor) to investigate the potential for psychic phenomena in military and domestic applications. This primarily involved remote viewing, the purported ability to psychically “see” events, sites, or information from a great distance.

In March 2001 SAIC defined the concept for the NSA Trailblazer Project. Trailblazer was a continuation of the earlier ThinThread program which the United States National Security Agency (NSA) pursued during the 1990s. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.

The “change in priority” consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that claimed to protect the privacy of U.S. citizens. ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the internet. It was intended to track entities using communication methods such as cell phones and e-mail. In 2002, NSA contracted SAIC for $280 million to produce a “technology demonstration platform” for the agency’s project, a “Digital Network Intelligence” system to analyze data carried on computer networks.

In 1945 the Joint Intelligence Objectives Agency was established and given direct responsibility for Operation Paperclip. The program recruited former Nazi scientists, some of whom had been identified and prosecuted as war during the Nuremberg Trials. Several secret U.S. government projects grew out of Operation Paperclip. These projects included Project CHATTER (established 1947), and Project BLUEBIRD (established 1950), which was renamed Project ARTICHOKE in 1951. Their purpose was to study mind control, interrogation, behavior modification and related topics.

SAIC and Leidos (Solutions for National Security, Health, and Engineering) are for-profit companies that primarily work for various arms of the U.S. government. The MITRE Corporation is a Federally Funded Research and Development Company (FFRDC). MITRE is a private, not-for-profit corporation that operates FFRDCs – federally funded research and development centers. If you’ve ever flown in a jet or used GPS, you’ve benefited from technology with roots in an FFRDC. But despite the name, FFRDCs are about much more than R&D. These unique organizations serve as long-term strategic partners to the government, providing objective guidance in an environment free of conflicts of interest. They work with their government partners – also called sponsors – to assist with systems engineering and integration, research and development, and study and analysis.

For all intents and purposes, this makes MITRE a pseudo-government organization. This is largely because the government is their only client. In practice this means that meetings and decisions that are closed to contractors and consultants from other firms often have MITRE folks advising the government decision makers.
Cyberspace – A New Operational Domain

In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The cyberspace domain provides critical capabilities that enable the U.S. Military to conduct operations in all domains (land, sea, air, space, and cyberspace). The U.S. Cyber Command and the Military Services are working to integrate the cyberspace domain with the other operational domains in order to conduct military command and control and achieve national security objectives. To effectively integrate cyberspace operations, DoD requires situational awareness of the Mission, Network, and Adversary based on analysis of operational data in order to make timely and effective decisions.
Cyber Weapons are the New Arms for War

The military has for years been developing offensive capabilities, giving it the power not just to defend the U.S. but to assail its foes. Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. Alexander has concluded that such cyber weapons are as crucial to 21st-century warfare as nuclear arms were in the 20th. And he and his cyber warriors have already launched their first attack. The cyber-weapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.

But Stuxnet is only the beginning. Alexander’s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand U.S. offensive capabilities in the digital realm. The Pentagon has requested $4.7 billion for “cyberspace operations,” even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyber defense contractors. And more attacks may be planned.

On a remote stretch of desert in central Utah, the National Security Agency has built a massive, 1 million-square-foot data warehouse. Costing more than $1.5 billion, the highly secret facility is designed to house upward of trillions of intercepted phone calls, e-mail messages, internet searches and other communications intercepted by the agency as part of its expansive eavesdropping operations. The NSA is also completing work on another data warehouse, this one in San Antonio, Texas.

“The essential element in the black art of obscurantism is not that it wants to darken individual understanding but that it wants to blacken our picture of the world, and darken our idea of existence.” Friedrich Nietzsche, Human, All Too Human
A Description of Psyops from a Military Document

“Intelligence and Electronic Warfare Support to Psychological Operations” is based upon “Special Operations Forces Intelligence and Electronic Warfare Operations” Field Manual No. 34-36 published on 30 September 1991 by Department of the Army Headquarters in Washington DC.

PSYOP missions are planned products and psychological actions in peace or war that are directed toward foreign enemy, friendly, and neutral audiences. The purpose is to influence attitudes and behaviors to achieve national political and military objectives.

PSYOP supports varied military, political, and diplomatic actions across the operational continuum. These missions can be strategic, operational, or tactical missions.

Strategic PSYOP missions are conducted at the national or theater level to advance broad, long-term psychological objectives in support of national psychological objectives.

Operational PSYOP missions are conducted to achieve mid-term objectives in support of theater campaigns and major operations.

Tactical PSYOP missions are conducted to achieve immediate or short-term objectives in support of tactical military operations.

Any of the above categories of PSYOP may support more than one level of the operational continuum. That is why distinctions between the categories of PSYOP are often blurred.

Special operation forces (SOF), whether operating unilaterally or in cooperation with conventional forces across the entire operational continuum, must always consider non-military factors and objectives.
PSYOP Missions:

Play a critical and integral role in achieving or addressing these non-military objectives.

Aid in accomplishing tactical, operational, and strategic military objectives.

May be the only military force employed.

Must be integrated with all operations to prevent contradictory or conflicting messages.
Some Declassified In-Q-tel Projects

“The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country.” Edward Bernays, Propaganda

Recorded Future – Using what they call a “Temporal Analytics Engine,” Recorded Future (RF) provides forecasting and analysis tools to help analysts predict future events by scanning sources on the internet, and extracting, measuring, and visualizing the information to show networks and patterns in the past, present, and future. As of 2015 the engine was described as “Web Intelligence Engine Visible Technologies – social media monitoring.

Digital Reasoning – Since 2012, the firm has sold its Synthesys software to banks and hedge funds, including UBS and Point72 Asset Management. Financial institutions use Synthesys to scan internal e-mails within a given company in search of unfamiliar patterns between employees, in terms of word-specific content, frequency and interpersonal connections. The aim is to predict fraud before it occurs.

Palantir – Palantir Technologies, Inc. is a private American software and services company, specializing in data analysis. The company is known for two software projects in particular: Palantir Gotham is used by counter-terrorism analysts at offices in the United States Intelligence Community and United States Department of Defense, fraud investigators at the Recovery Accountability and Transparency Board, and cyber analysts at Information Warfare Monitor.

CallMiner – Phone speech analytics software

MASINT – Remote tracking, surveillance, and extraction of brain-waves typifying thought-forms, emotional states, analytic mind states, and others

Mohomine mohoClassifier – Organizes mass data

3VR – 3VR Inc. develops software enabling organizations to mine data from video. 3VR works with leading banks, governments, law enforcement and retailers at the moment.

Adaptx – Creates digital pens that speed up field data collection.

Basis Technology – Synthesizes the foreign chatter and provides software for text analytics in over twenty languages. They work primarily in applied natural language processing, deriving meaning from the ways people actually use language.

Cloudera – Large-scale data storage. Cloudera Enterprises is one of the most cost-effective ways for companies to securely carry out large-scale data analysis and storage.

FireEye – FireEye is one of the most advanced cybersecurity firms and specializes in protecting against botnet attacks and also works to combat the malware that brings computers into the network.

The Ember Corporation – Ember Corporation focuses on developing networking systems that simplify wirelessly networking low-power products. They’re focused on smart energy, remote monitoring, and remote control uses of their tech.

Infinite Z – Virtual-holographic simulation a reality through an interactive 3D environment.

OpenSpan – Makes software that enables organizations to see exactly what employees are doing on their computer: what programs they’re using, what progress they’re making, etc.

Seventh Sense – Develops health monitoring products that interface with human skin

Sonitus Medical – Makes a hearing system that transmits sound imperceptibly through the mouth. The SoundBite hearing system plays off the principle of bone conduction to transmit audial messages. A nearly invisible in-the-mouth hearing and communication platform is non-invasive and connects directly to the inner ear, allowing the user to hear transmitted messages through their skull.

Spotter RF – Makes super-powerful radars in a handheld form that can track a person walking anywhere within a 148 acre space, and it’s handheld.

Visible Technologies – Extracts business solutions from social media chatter with software that allows users to extract business value from social communities, and also give customer insights for brands online.

Walleye – Makes handheld devices that can see into and through solid objects
DARPA Applications

Social Media in Strategic Communication (SMISC) program is an attempt to get better at both detecting and conducting propaganda campaigns on social media. SMISC has two goals. First, the program needs to help the military better understand what’s going on in social media in real time – particularly in areas where troops are deployed. Second, Darpa wants SMISC to help the military play the social media propaganda game itself.

The Pentagon is building a tool to identify social media propaganda campaigns that produces counter-spin through computer artificial intelligence.


Interactive Facial Recognition in Real Time –BBC facial recognition programs help predict the success or failure of television programming. In the past, the BBC has used its facial recognition technology, built by in-house startup CrowdEmotion, to track 4,500 faces as people watched show trailers to see what kinds of emotions the commercials produced. They’ve also looked at how hundreds of study participants react to programs like Top Gear and Sherlock. http://fortune.com/2016/02/13/bbc-ads-crowdemotion/

The company CrowdSight uses facial recognition software in real time. They advertise on their website: “Understand and Predict your Audience! Deliver Better Experiences by Knowing their Emotional Behavior and Engagement in Real-time. CrowdSight Software Development Kit (SDK) is a flexible and easy-to-integrate Crowd Face Analysis Software which allows you to gather real-time, anonymous information about your audience while they behave spontaneously in different life environments. Understand your audience emotional reactions and engagement towards your products, content and campaigns, and recognize important demographics such as age, gender and ethnicity, in real-time. CrowdSight works offline and on the most popular desktop and mobile platforms (Windows, Mac, Linux, iOS, Android).” http://sightcorp.com/crowdsight/

Visual Evoked Potential (VEP) – A VEP is an electrical potential recorded after a subject is presented with a type of visual stimuli. There are several types of VEPs. Steady-state visually evoked potentials (SSVEPs) use potentials generated by exciting the retina, using visual stimuli modulated at certain frequencies. SSVEP’s stimuli are often formed from alternating checkerboard patterns and at times simply use flashing images. SSVEP has proved to be successful within many BCI systems. This is due to several factors, the signal elicited is measurable in as large a population as the transient VEP and blink movement and electro-cardiographic artefacts do not affect the frequencies monitored.

Synthetic Telepathy and Silent Communication – In a $6.3 million Army initiative to invent devices for telepathic communication, Gerwin Schalk, underwritten in a $2.2 million grant, found that it is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech. Research into synthetic telepathy using sub-vocalization is taking place at the University of California, Irvine under lead scientist Mike D’Zmura.

The first such communication took place in the 1960s using EEG to create Morse code using brain alpha waves. Using EEG to communicate imagined speech is less accurate than the invasive method of placing an electrode between the skull and the brain. On February 27, 2013 the group of Miguel Nicolelis at Duke University and IINN-ELS successfully connected the brains of two rats with electronic interfaces that allowed them to directly share information, in the first-ever direct brain-to-brain interface. On 3 September 2014, scientists reported that direct communication between human brains was possible over extended distances through Internet transmission of EEG signals.

Sentient World Simulation – The DoD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR. Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.

“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners.” SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors. http://www.theregister.co.uk/2007/06/23/sentient_worlds/

Insight Program – DARPA awarded a $14 million contract to SAIC for the DARPA Insight program, which is intended to help U.S. intelligence experts detect threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. The program seeks to fill gaps in current U.S. intelligence, surveillance and reconnaissance (ISR) systems that center on the inability to exploit and cross-cue several different intelligence sources automatically.

The DARPA Insight program seeks to develop integrated human/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors. SAIC experts will concentrate on these areas in building the Insight next-generation ISR analysis system.

SAIC experts will build model-based behavioral correlation, modeling, prediction, and threat network analysis tools that combine intelligence information across many different sources automatically to improve the efficiencies of multi-intelligence sensors. The company also will develop a unified data-management and processing environment that integrates new intelligence sensors and software algorithms.

EM fields and Hidden symbols – DARPA is revealing programs, which have existed for years, to develop methods and techniques to incept thoughts and ideas into the mind. They reveal how once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device.

Mind Control Project – The aim of this program is to remotely disrupt political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. The program, conducted by The Center for Strategic Communication, is based at Arizona State University. This research aims to literally induce or disrupt the operation of narratives within the brain. In other words, this research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research has tremendous interrogation possibilities and could potentially be used to more successfully spread propaganda or stop political upheaval to an unsuspecting public. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects”.

Transcranial Magnetic Stimulation is a very powerful tool used to impair the brain functioning of individuals. See the videos below for a brief demonstration of the effects of TMS:



Once the research group determines which parts of the brain are associated with cognitive reasoning and narrative comprehension, they attempt to impair those sections in order to “create a fundamental basis for understanding how to disrupt or enhance aspects of narrative structure and/or brain functioning to minimize or maximize persuasive effects on subject proclivity to engage in political violence.

Once it is determined that disruption of certain portions of the brain can enhance persuasive messaging, individuals can be persuaded to do things they normally would not do and believe things they normally would not believe.

It offers the capability to induce or disrupt the operation of narratives in the brain, and develops the capability to induce narrative validity.

Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation.

Through extensive research, they may be able to replicate the machine’s brain disrupting functioning simply through carefully crafted and researched persuasive messages and propaganda. With enough data, the government could spread propaganda through the media that people will almost automatically believe, whether it is true or not.

In terms of interrogation possibilities, Transcranial Magnetic Stimulation can be forced upon individuals to make them believe certain things, say certain things, and perhaps admit to acts they did not actually commit (as the TMS can induce narrative validity), or commit acts they normally would not commit.

The Brain Project – This area of study has received $100 million in funding via Obama’s ten-year BRAIN Project, as well as a $1.3 billion commitment from Europe. Concurrently, there is heavy military funding through agencies such as the Defense Advanced Research Projects Agency (DARPA). This raises the question of transparency when a “black budget” often justifies total secrecy in the name of national security.

Neuroscientists Successfully Plant False Memories – MIT neuroscientists have shown that they can plant false memories. They also found that many of the neurological traces of these memories are identical in nature to those of authentic memories. Most of the research in this area currently revolves around how to induce and eliminate fear. The study also provides further evidence that memories are stored in networks of neurons that form memory traces for each experience we have. Scientists already know how to set off an emotional response in combat veterans by simulating a specific set of frequencies that have become associated with wartime experience.



Total Information Awareness – Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. We now know that PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook, and was later leaked by whistleblower Edward Snowden.

Evidence Extraction and Link Discovery program (EELD) – Sole purpose is to gather as much information about both terror suspects and average American citizens as possible, using phone records, computer searches, credit card receipts, parking receipts, books checked out of the library, films rented, and more. Goal is to assess megadata on 285 million people a day in real-time.

Scalable Social Network Analysis (SSNA) – Program monitors telephone calls, conference calls, and ATM withdrawals … also sought to develop a far more invasive surveillance technology.

Activity Recognition and Monitoring (ARM) – With England’s CCTV surveillance cameras as a model, ARM created a massive database of people going about their everyday lives. Using advanced facial recognition software, the program highlighted any behavior that was outside the realm of a preprogrammed “ordinary,” the definition of which remains classified.

Deep Exploration and Filtering of Text (DEFT) – Operating on a 28 million dollar budget, this program utilizes advanced computer algorithms to analyze text-based messages in all shapes and forms, from text messages to reports, with the aim being to comprehend “implied and hidden meanings through probabilistic inference.”

Nexus 7 – With a classified budget, this particularly program studies and tracks social network content. First used in Afghanistan in a defense capacity, when aimed at domestic networks the use of the program is a mystery.

Narrative Networks Program – Developed classified techniques used to manipulate trust in humans. For its Narrative Networks (N2) program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind. The program was described as having two parts: first, to understand what happens in the human mind when someone sees or hears a message; second, to figure out how to control how the brain interprets the message.
Mind Control Devices from In-Q-Tel and DARPA

“The secrecy involved in the development of the electromagnetic mind-altering technology reflects the tremendous power that is inherent in it. To put it bluntly, whoever controls this technology can control the minds of men – all men.” Nexus Magazine 1998

Real-time Contextual Overlays for Live Streams – A system and method for contextualizing and live-updating overlay data for live media streams. Overlays can be generated in real-time and in response to live events. US 20130311595 A1 November 21, 2013. Google Inc.

Method and Apparatus for Remotely Determining Emotional States – A waveform energy having a predetermined frequency and intensity is generated and wirelessly transmitted towards a subject. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured for evaluating criminal intent in security sensitive areas. US 5507291 A – April 5, 1994

Sounds of Silence – The Silent Subliminal Presentation System (SSPS) – Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which nonaural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude – or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent#5,159,703

Flame – The program is able to turn on a target’s Web cam and record video remotely and without detection.

Multidisciplinary Research Program of the University Research Initiative (MURI), Recognize/predict social contexts, relationships, networks, and intentions from social media, taking into account non-verbal communication such as gestures, micro-expressions, posture, and latent semantics of text and speech. Create algorithms for prediction and collection of latent signals and their use in predicting social information.

Beware – Analyses people’s social media activity, property records, the records of friends, family or associates, among other data, to assign suspects a so-called “threat-score.” That “threat-score” can then be used by police to pre-judge if a suspect is going to be dangerous, and to adapt their approach accordingly.

Iraqi Silent Sound Program – US Psy-Ops teams set up FM transmitters, utilizing Iraqi frequencies and overpowered the local station. Along with patriotic and religious music, PsyOps transmitted “vague, confusing and contradictory military orders and information.” A sophisticated electronic system designed to ‘speak’ directly to the mind of the listener; to alter and entrain his brainwaves, to manipulate his brain’s electroencephalographic (EEG) patterns and thus artificially implant negative emotional states – feelings of intense fear, anxiety, despair and hopelessness were created in the Iraqi troops. This effective subliminal system implants emotions in the minds of the targeted subject.

Nervous system manipulation by electromagnetic fields from monitors – US Patent and Trade Office, Patent #6,506,148 on subliminal behavior modification, 1/14/2003, United States Patent 6,506,148, Loos, January 14, 2003. Abstract: It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream.

Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set.

For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528 Filed: June 1, 2001

Other Projects – Directed-energy weapons (DEWS), Remote Neural Monitoring (RNM) weapons, Remote EEG Readers, Remote Electro-Muscular Shock/Incapacitation weapons, Remote Microwave weapons, Remote Voice to Skull weapons, Remote Neural Monitoring technologies, and EMF brain-wave monitoring, tracking, and harvesting technologies.
Google Created by CIA and Highlands Forum

One of the most interesting articles that highlights the way the DoD incubates war-technology is described in great detail by Nafeez Ahmed. This article shows that Google was funded throughout its inception by the CIA. Google was created as a weaponized war-tool as indicated by the many new inventions that DARPA and In-Q-Tel are focused on.

Nafeez Ahmed explains the Google-CIA connection in this excellent article:


Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain ‘information superiority.’

The origins of this strategy trace back to a secret Pentagon-sponsored group that for the last two decades has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war.

The U.S. intelligence community is implicated in nurturing the web platforms we know today, for the precise purpose of utilizing the technology as a mechanism to fight global ‘information war’ -  a war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the US military-industrial complex.
Highland Forum Dominates U.S. Defense Policy

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.

As mentioned previously, SAIC stands for the U.S. defense firm, Science Applications International Corporation, which changed its name to Leidos in 2013, operating SAIC as a subsidiary. SAIC/Leidos is among the top 100 largest defense contractors in the US, and works closely with the U.S. intelligence community, especially the NSA. The agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.

Richard Patrick O’Neill, founding president of the Pentagon’s Highlands Forum served his last post as deputy for strategy and policy in the Office of the Assistant Secretary for Defense for Command, Control, Communications and Intelligence, before setting up Highlands.

Since 1973, Andrew Marshall has headed up one of the Pentagon’s most powerful agencies, the Office of Net Assessment (ONA), the U.S. defense secretary’s internal ‘think tank’ which conducts highly classified research on future planning for defense policy across the US military and intelligence community. Marshall, now 93 years old and nicknamed “Yoda” by insiders, as “the DoD’s most elusive” but “one of its most influential” officials. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz are  widely considered the hawks of the neoconservative movement in American politics –  were among Marshall’s star protégés.

The Highlands Forum’s influence on US defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense (around the middle of last decade this was transitioned specifically to the Office of the Undersecretary of Defense for Intelligence, which is in charge of the main surveillance agencies); its direct link to Marshall’s ONA; and its direct link to DARPA.

The Highlands Forum has served as a two-way ‘influence bridge’: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector. There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.

In 1989, Richard O’Neill, then a U.S. Navy cryptologist, wrote a paper for the U.S. Naval War College, ‘Toward a methodology for perception management.’ O’Neill’s paper for the first time outlined a strategy for “perception management” as part of information warfare (IW).

O’Neill’s proposed strategy identified three categories of targets for IW: adversaries – so they believe they are vulnerable; potential partners – so they perceive the cause as just; and civilian populations and political leadership – so they perceive the cost as worth the effort.

Around 1994, the Highlands Group was founded by O’Neill as an official Pentagon project at the appointment of Bill Clinton’s then defense secretary William Perry. In O’Neill’s own words, the group would function as the Pentagon’s ‘ideas lab.’ Total participants in the DoD’s Highlands Forum number over a thousand, although sessions largely consist of small closed workshop style gatherings of maximum 25–30 people, bringing together experts and officials depending on the subject.

The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA, to the ONA and is deeply plugged into the Pentagon’s policy research task forces. In 2001, under the Total Information Awareness Program, President Bush had secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants. From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA’s secret eavesdropping systems.

This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be based on the premise that the Department [of Defense] will ‘fight the net’ as it would an enemy weapons system.” The U.S. should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.

As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as ‘Trailblazer.’ Core components of TIA were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.

In addition to the CIA, In-Q-Tel (the CIA’s version of DARPA) has also been backed by the FBI, NGA, and Defense Intelligence Agency, among other agencies.

O’Neill said his job as Forum president was to scope case studies from real companies across the private sector, like eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiority — how to dominate the information market — and leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the DoD.

By 2007, Facebook received its second round of $12.7 million worth of funding from Accel Partners. Facebook’s 2008 round of funding was led by Greylock Venture Capital, which invested $27.5 million. Apart from Breyer and Zuckerberg, Facebook’s only other board member is Peter Thiel, co-founder of defense contractor Palantir which provides all sorts of data-mining and visualization technologies to U.S. government, military and intelligence agencies, including the NSA and FBI, and which itself was nurtured to financial viability by Highlands Forum members.

By 2008, the NSA was effectively resurrecting the TIA project with a focus on Internet data-mining via comprehensive monitoring of e-mail, text messages, and Web browsing. We also now know (thanks to Snowden) that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA’s XKeyscore.

The investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the U.S. military intelligence community. The convergence of these powerful financial and military interests around the Highlands Forum, through George Lee’s sponsorship of the Forum’s new partner, the MIIS Cybersec initiative, is revealing in itself. MIIS Cybersec’s director, Dr, Itamara Lochard, has long been embedded in Highlands.

Dr Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google. Dr. Lochard maintains a comprehensive database of 1,700 non-state groups including insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors, to analyze their organizational patterns, areas of cooperation, strategies and tactics.

Her views disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the U.S. Air Force’s Institute for National Security Studies on US strategy toward ‘non-state armed groups.’ The study on the one hand argued that non-state armed groups should be urgently recognized as a ‘tier one security priority,’ and on the other that the proliferation of armed groups provide strategic opportunities that can be exploited to help achieve policy goals. There have and will be instances where the United States may find collaborating with armed group is in its strategic interests. But sophisticated tools must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests.

In 2009, it also emerged from a Google patent application that the company had deliberately been collecting ‘payload’ data from private wifi networks that would enable the identification of “geolocations.” In the same year, we now know, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security. It is not just Google that is a key contributor and foundation of the US military-industrial complex: it is the entire internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the U.S. intelligence community (or powerful financiers embedded in that community) — which sustain the internet and the telecoms infrastructure; it is also the myriad of start-ups selling cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community.

Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.

In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, who are principal investigators in the ‘Neurobiology of Narrative Framing’ project at the University of Southern California. Evoking Zalman’s emphasis on the need for Pentagon psychological operations to deploy “empathetic influence,” the new DARPA-backed project aims to investigate how narratives often appeal “to strong, sacred values in order to evoke an emotional response,” but in different ways across different cultures. The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon’s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.

The research is based on extracting narratives from millions of American, Iranian and Chinese weblogs, and subjecting them to automated discourse analysis to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers/listeners from different cultures to gauge their reaction different narratives “where each story makes an appeal to a sacred value to explain or justify a morally-questionable behavior of the author.” Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.

DARPA’s goal is to mine millions of American weblogs as part of its ‘neurobiology of narrative framing’ research. As the Pentagon’s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy.

According to the Securities and Exchange Commission, from 2008 to 2013, the five largest US defense contractors lost 14 percent of their employees, as the winding down of U.S. wars in Iraq and Afghanistan led to lack of business and squeezed revenues. The continuation of the ‘Long War’ triggered by ISIS has, for now, reversed their fortunes. Companies profiting from the new war include many connected to the Highlands Forum, such as Leidos, Lockheed Martin, Northrup Grumman, and Boeing. War is profitable.

Yet in the long-run, the information imperialists have already failed. This investigation is based entirely on open source techniques, made viable largely in the context of the same information revolution that enabled Google. https://medium.com/insurge-intelligence/how-the-cia-made-google-e836451a959e#.nu8se9bfx
US Military Uses PsyOps Weapons on Iraq

“PSYOPS seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives…. The feasibility had been established of projecting large, three-dimensional objects that appeared to float in the air. Washingtonpost.com has learned that a super secret program was established in 1994 to pursue [this] very technology for PSYOPS application. The ‘Holographic Projector’ is described in a classified Air Force document as a system to ‘project information power from space … for special operations deception missions.'” Washington Post article on PSYOPS, 2/1/1999

For those who don’t believe that the American military will use the “new weapons” created by DARPA and In-Q-Tel, we offer this article written about the use of electronic warfare on Iraqis that also affected our own soldiers.

Scalar Weapons Used in Iraq, Britain, Microwaving Iraq ‘Pacifying’ Rays Pose New Hazards In Iraq, by William Thomas (www.rense.com )

On the rooftop of a shrapnel-pocked building in the ruins of Fallujah, a team of GI’s stealthily sets up a gray plastic dome about two-feet in diameter. Keeping well back from the sight lines of the street and nearby buildings, they plug the cable connectors on the side of the “popper” into a power unit. The grunts have no clue what the device does. They are just following orders.

“Most of the worker-bees that are placing these do not even know what is inside the “domes” just that they were told where to place them by Intel weenies with usually no nametag,” reports my source, a very well informed combat veteran I will call “Hank”.

The grunts call the plastic devices “poppers” or “domes”. Once activated, each hidden transmitter emits a widening circle of invisible energy capable of passing through metal, concrete and human skulls up to half a mile away. “They are saturating the area with ULF, VLF and UHF freqs,” Hanks says, with equipment derived from US Navy undersea sonar and communications.

But it’s not being used to locate and talk to submarines under Baghdad. After powering up the unit, the grunts quickly exit the area. It is their commanders, fervent hope that any male survivors enraged by brutal American bombardments that damaged virtually every building in this once thriving “City of Mosques”, displacing a quarter-million residents while murdering thousands of children, women and elders in their homes – will lose all incentive for further resistance and revenge.

A dedicated former soldier, whose experiences during and after Desert Storm are chronicled in my book, Bringing The War Home, Hank stays in close touch with his unit serving “in theater” in Iraq. When I asked how many “poppers” are being used to irradiate Iraqi neighborhoods, he checked and got back to me. There are “at least 25 of these that have been deployed to theater, and used. Some have conked out and been removed, so I do not know how many are currently active and broadcasting.

Hank is concerned that innocent Iraqi families and unsuspecting GIs alike are being used as test subjects for a new generation of “psychotronic” weapons using invisible beams across the entire electromagnetic spectrum to selectively alter moods, behavior and bodily processes.

“The “poppers, are capable of using a combo of ULF, VLF, UHF and EHF wavelengths in any combination at the same time, sometimes using one as a carrier wave for the others,” Hank explains, in a process called superheterodyning. The silent frequencies daily sweeping Fallujah and other trouble spots are the same Navy “freqs that drove whales nuts and made them go astray onto beaches.”
Microwaving Iraq

The Gulf War veteran observes that occupied Iraq has become a “saturation environment” of electromagnetic radiation. Potentially lethal electromagnetic smog from high-power US military electronics and experimental beam weapons is placing already hard-hit local populations-particularly children — at even higher risk of experiencing serious illness, suicidal depression, impaired cognitive ability, even death.

American troops constantly exposed “up close” to their own microwave transmitters, battlefield radars and RF weapons are also seeing their health eroded by electromagnetic sickness. It’s common, Hank recalls, for GIs to warm themselves on cold desert nights by basking in the microwaves radiating from their QUEEMS communications and RATT radar rigs.

Constant microwave emissions from ground-sweeping RATT rigs and SINGARS mobile microwave networks are much more powerful than civilian microwave cell phone nets linked in many clinical studies to maladies ranging from asthma, cataracts, headaches, memory loss, early Alzheimer’s, bad dreams and cancer.

Clinical tests have repeatedly shown how microwaves “rev up” incipient cancer cells several hundred times. Triggered by nuclear radiation, and turned rogue by electromagnetic warfare unleashed by US forces, human cancer cells have been found to continue proliferating wildly — even after the power source is turned off
Microwaving Wombs at Greenham Common

Another harrowing example involves the sudden illness and cancer deaths of US embassy staff in Moscow after being deliberately targeted with very weak pulsed microwaves by Soviet experimenters and fascinated CIA onlookers running “Project Phoenix” in 1962.

Very Low Frequency (VLF) weapons include the dozens of “poppers” currently deployed in Iraq, which can be dialed to or “long wave” frequencies capable of traveling great distances through the ground or intervening structures. As air force Lt Col. Peter L. Hays, Director of the Institute for National Security Studies reveals, “transmission of long wavelength sound creates biophysical effects; nausea, loss of bowels, disorientation, vomiting, potential internal organ damage or death may occur.”
GI’s “Driven Nuts” by Electromagnetics in Iraq

Like so many other American blunders among the ruins of Babylon, the intended microwave “pacification” of rebellious neighborhoods is having unintended effects. In actual “field-testing” in the Sunni Triangle, Hank has learned that the hidden, dome-shaped devices “are removing inhibitions”. Armed individuals, already highly motivated to kill American forces are reportedly “losing all restraint” when exposed to the electromagnetic beams. From http://www.rense.com/general62/mciro.htm:

According to Hank’s buddies in Baghdad, the frequency-shifting “poppers” “are having some remarkable effects on the locals as well as our own people.” But these effects differ. Possibly, Hank surmises, because Americans come from daily domestic and military environments saturated with electromagnetic frequencies, while many Iraqis still live without reliable electricity in places largely free from electromagnetics before the American invasion.

According to members of Hank’s former unit, constant exposure to invisible emissions from radar and radio rigs — as well as to their own microwave weapons — is backfiring. “Our people are driven nuts,” Hank says. “It makes them stupid for two or three days.”

The Desert Storm veteran compared the emotional effects of constant exposure to military microwaves to a lingering low-pressure weather system that never goes away. “You feel way down for days at a time,” he emphasizes

As a consequence, AWOL rates among “spaced out” US troops are as high as 15%, Hank reports. For many deserters, it is not cowardice or conscience that is causing them to absent themselves from duty. “They are feeling so depressed,” Hank explains. “They don’t feel good. So they leave.”

According to Hank’s front-line buddies, Iraqis exposed to secret beam weapons “get laid back, confused and mellow, and then blast out in a rage, as opposed to our folks going on what could only be called a “bender” and turning into a mean drunk for a while.”

Once they wander away from direct electromagnetic-fire, startled GIs come to their senses. They return to their units, Hank explains, saying, “What was I thinking?”

The recovery rate among US troops “seems to be about a day or so, where the locals are not getting over it in less than a week or more on average,” Hank has learned.

It is Hank’s hope that his revelations will prompt public debate over the secret use of electromagnetic weapons in Iraq. But lost in the arguments over these supposedly “non-lethal” weapons is a much bigger question: What are Americans doing there?

Whether soldier or civilian at home, it is our imperative duty to stop supporting those responsible for ongoing “weapons tests” in Iraq. As electrochemical “beings of light,” the strongest electromagnetic force on Earth is human conscience, acted upon.
Where Do We Go From Here?

Now that we have the answer to the original question: Who owns and controls the military industrial complex, we need to ask another question.

Who are these Corporate and Banking Warlords in a war with?

Unfortunately, it is very clear that Americans are the target of the long, soft war of terrorism. Each American is a potential terrorist or at least a possible descenter who doesn’t support the current administration’s policies. Hundreds of war-tools have lined the pockets of the Corporate and Banking Warlords while the military puts civilians in the cross-hairs. American Democracy has been taken over by transnational greed and power.

We pay taxes so that the DoD can create war-tools that are used against US, the citizens of the U.S.

These realities are a basis for declaring a patriotic war on the following transnational corporations and agencies that have already declared war on American citizens. The following list represents some of the people who need to be investigated and brought to justice:

The Department of Defense

The National Security Agency



Highlands Group and all attendees of Highlands Forums

The Federal Reserve

The Counsels on Foreign Relations

The International Monetary Fund

The World Bank

The International Court of Settlements

All Transnational Corporations and Banks

The Bank of England

The Vatican Bank

The Knights of Malta

Any of these corporations found guilty should be held responsible for the crimes and banned from further business in the United States of America; their principals should be tried for the crimes that have perpetrated, whether it is treason, crimes against humanity, insider trading, or murder.

There is an internal war going on in America. But with the military use of the war-tools described above, perception management is controlled and no one even asks how the president and the Department of Defense are able to wage this war. In a previous article, False Flags are Legal Propaganda, we spelled out in great details the way the National Defense Authorization Act has been modified each year to empower this war against Americans.

In another posting, we showed readers an example of how false flag events can be used against Americans through the techniques of perception management.

We swallow their lies whole without question as they used our tax money to develop psychological warfare devices that we have described in our posts. How can we awaken our fellow countrymen and the world when subliminal perception management has made us passive to their evil?

This is a call for action for all patriots involved in any aspect of the following treasonous war against American democracy to stand up and refuse to participate in this criminal activity. We must file lawsuit after lawsuit based upon whistle-blower complaints that bring to light the dark evil of the Warlords. Resist your programming and help slow down the machinations of the rich and warlike used against citizen. Demand authorities to be transparent. Demand to know the truth and fight against the forces of greed and selfishness that drives evil war-machines.
Anonymous2017-08-03 23:37:15
Google recently announced a suite of new tools for advertisers, allowing them to link a customer’s offline credit card purchases with the things they look at online. Shockingly, some privacy advocates think this sort of tracking goes too far and have called on the federal government to investigate.

The Electronic Privacy Information Center this morning filed a complaint [PDF] with the Federal Trade Commission, asking the agency to investigate Google’s Store Sales Management consumer profiling technology and stop the company from tracking customers’ in-store purchases.

According to EPIC, Google’s system, which can allegedly track 70% of all credit and debt card transactions in the U.S., puts the personal information — including product searches, location searches and payment information — of shoppers and Internet users at risk of hacks or other data breaches.

The group alleges that Google is increasing that risk by refusing to reveal details about the algorithm that “deidentifies” — or removes shoppers’ personal details — customers while tracking their purchase.

“Google claims that it can preserve consumer privacy while correlating advertising impressions with store purchases, but Google refuses to reveal—or allow independent testing of the technique that would make this possible,” the complaint states. “The privacy of millions of consumers thus depends on a secret, proprietary algorithm. And although Google claims that consumers can opt out of being tracked, the process is burdensome, opaque, and misleading.”
The Advertising Tool

Businesses are willing to spend some money on advertising and outreach, but only if they see it translate into a return. Google’s system attempts to do just this.

Back in May, Google launched the Store Sales Measurement tool as a way to connect in-store revenue for purchases to adverting purchased from Google.

The technique correlates in-store purchases with actions users take on their smartphones using Google’s Internet-based services, such as searching for products or searching for alternative locations to make purchases.

To do this, Google collects credit card transaction information from credit card companies, data brokers, and others. The company then links this information to a customer’s phone searches or internet history.

Google noted at the time that the data it collects won’t have customers’ names attached to it. The data is anonymized and then hashed over. So what advertisers see is something more like, ten users, with names like 08a862b091c379fe9767615d10873, saw these ads in the morning, and spent between $23 and $28 on those products at a certain grocery store that afternoon.
Privacy Problems

Despite this, EPIC claims that Google’s reliance on a secret, proprietary algorithm to ensure customer privacy is anything but safe.

According to EPIC, the mathematical technique that Store Sales Measurement is based on is known to have security risks, as researchers were able to hack into a CryptDB protected database of healthcare records in 2015.

Additionally, the group claims that Google would not specify if users had consented to having their credit and debit card transactions shared with advertisers.

Google claims that users can delete and/or opt out of location history tracking on both Android and iPhone devices if they do not want to be tracked. To do so, users can visit their My Activity Page, click on Activity Controls and uncheck Web and Web Activity.

Still, EPIC claims that Google’s opt-out settings and description are confusing and opaque.

Also, because Google won’t identify which companies are providing it with transaction records, customers cannot know which cards not to use or where not to shop if they do not want their purchases tracked.

“Google’s collection of massive numbers of credit card records through unidentified ‘third-party partnerships,’ and Google’s use of an opaque and misleading ‘opt-out’ mechanism are unfair and deceptive trade practices subject to investigation and injunction by the FTC,” EPIC said in the complaint.

EPIC claims that if Google’s program is allowed to move forward and does not work as described by the company, millions of consumers’ credit card transactions and other private information could be at risk for exposure.

A rep for Google tells the Washington Post that its new advertising system is “common” and that it “ensures users’ data remains private, secure, and anonymous.”

Anonymous2017-08-02 01:07:57
>year 2017
>still using google
How delusional can people be ?

#Google Is Not What It Seems
Anonymous2017-07-26 22:53:37
Google’s tracking presence is even broader. According to one recent study, Google Analytics tracks users on nearly 70 percent of the top one million websites, and Google subsidiary Doubleclick separately tracks users on almost half of the top million sites. That gives Google – or a subsidiary – access to an extensive list of who visits which websites and when. And the company can combine that information with data derived from people’s use of Google Maps, Gmail and other Google services.
Anonymous2017-07-23 02:18:23
Any i repeat any search engine is better than google do people even read this https://www.google.com/policies/privacy/ before using it ? I said this long time ago they will use your ip and all the info they have on you against you ( i mean they give it to the government) but they will make sure you either pay huge fine or you will get locked up and they will find a reason.
Anonymous2017-07-23 02:07:09
I keep laughing where the media in germany always says those poor women and children need help and just for you information ANY kid that you see on german tv is reading from tele-prompter, yes thats right google Bana Alebed and you will know everything about fake german news. Fuck this country and fuck merkel.
Anonymous2017-06-24 21:35:31
yandex is pretty good and fuck google
Anonymous2017-06-22 21:29:18
I would suggest Become Google-free and never use any of their products or services which means:

no chrome browser
no android phone
no youtube

Anonymous2017-05-13 02:01:35
A SECRET document shows in scary detail how Facebook can exploit the insecurities of teenagers using the platform.

FACEBOOK has come under fire over revelations it is targeting potentially vulnerable youths who “need a confidence boost” to facilitate predatory advertising practices.

The allegation was revealed this morning by The Australian which obtained internal documents from the social media giant which reportedly show how Facebook can exploit the moods and insecurities of teenagers using the platform for the potential benefit of advertisers.

The confidential document dated this year detailed how by monitoring posts, comments and interactions on the site, Facebook can figure out when people as young as 14 feel “defeated”, “overwhelmed”, “stressed”, “anxious”, “nervous”, “stupid”, “silly”, “useless”, and a “failure”.

Such information gathered through a system dubbed sentiment analysis could be used by advertisers to target young Facebook users when they are potentially more vulnerable.

While Google is the king of the online advertising world, Facebook is the other major player which dominates the industry worth about $80 billion last year.

But Facebook is not one to rest on its laurels. The leaked document shows it has been honing the covert tools its uses to gain useful psychological insights on young Australian and New Zealanders in high school and tertiary education.

The social media services we use can derive immense insight and personal information about us and our moods from the way we use them, and arguably none is more fastidious in that regard than Facebook which harvests immense data on its users.

The secret document was put together by two Australian Facebook execs and includes information about when young people are likely to feel excited, reflective, as well as other emotions related to overcoming fears.

“Monday-Thursday is about building confidence; the weekend is for broadcasting achievements,” the document said, according to the report.

Facebook did not return attempts by news.com.au to comment on the issue but was quick to issue an apology and told The Australian that it will conduct an investigation into the matter, admitting it was inappropriate to target young children in such a way.

“The data on which this research is based was aggregated and presented consistent with applicable privacy and legal protections, including the removal of any personally identifiable information,” Facebook said in a statement issued to the newspaper.

However there is suggestion that the research could be in breach of Australian guidelines for advertising and marketing towards children.

Many commentators have suspected Facebook engaged in this sort of cynical exploitation of the data it gathers but the leaked document is scarce proof.

Mark Zuckerberg’s company has not been shy about exploring ways it can manipulate the data it collects on users.

For one week in 2012, Facebook ran an experiment on some of its users in which it altered the algorithms it used determine which status updates appeared in the news feed of nearly 700,000 randomly selected users based on the post’s emotional content.

Posts were determined to be either negative or positive and Facebook wanted to see if it could make the selected group sad by showing them more negative posts in their feed. It deemed it could.

The results were published in a scientific journal but Facebook was criticised by those concerned about the potential of the company to engage in social engineering for commercial benefit.

Facebook’s Data Use Policy warns users that the company “may use the information we receive about you … for internal operations, including troubleshooting, data analysis, testing, research and service improvement.”

Currently information about your relationship status, location, age, number of friends and the manner and frequency with which you access the site is sold to advertisers. But according to the report, Facebook is also seeking to sell ads to users concerned with insights gleaned from posts such as those concerned with body confidence and losing weight.
Anonymous2017-05-11 03:17:45
The National Security Agency paid millions of dollars to cover the costs of major internet companies involved in the Prism surveillance program after a court ruled that some of the agency's activities were unconstitutional, according to top-secret material passed to the Guardian.

The technology companies, which the NSA says includes Google, Yahoo, Microsoft and Facebook, incurred the costs to meet new certification demands in the wake of the ruling from the Foreign Intelligence Surveillance (Fisa) court.

The October 2011 judgment, which was declassified on Wednesday by the Obama administration, found that the NSA's inability to separate purely domestic communications from foreign traffic violated the fourth amendment.

While the ruling did not concern the Prism program directly, documents passed to the Guardian by whistleblower Edward Snowden describe the problems the decision created for the agency and the efforts required to bring operations into compliance. The material provides the first evidence of a financial relationship between the tech companies and the NSA.

The intelligence agency requires the Fisa court to sign annual "certifications" that provide the legal framework for surveillance operations. But in the wake of the court judgment these were only being renewed on a temporary basis while the agency worked on a solution to the processes that had been ruled illegal.

An NSA newsletter entry, marked top secret and dated December 2012, discloses the huge costs this entailed. "Last year's problems resulted in multiple extensions to the certifications' expiration dates which cost millions of dollars for Prism providers to implement each successive extension – costs covered by Special Source Operations," it says.

Special Source Operations, described by Snowden as the "crown jewel" of the NSA, handles all surveillance programs, such as Prism, that rely on "corporate partnerships" with telecoms and internet providers to access communications data.

The disclosure that taxpayers' money was used to cover the companies' compliance costs raises new questions over the relationship between Silicon Valley and the NSA. Since the existence of the program was first revealed by the Guardian and the Washington Post on June 6, the companies have repeatedly denied all knowledge of it and insisted they only hand over user data in response to specific legal requests from the authorities.

An earlier newsletter, which is undated, states that the Prism providers were all given new certifications within days of the Fisa court ruling. "All Prism providers, except Yahoo and Google, were successfully transitioned to the new certifications. We expect Yahoo and Google to complete transitioning by Friday 6 October."

The Guardian invited the companies to respond to the new material and asked each one specific questions about the scale of the costs they incurred, the form of the reimbursement and whether they had received any other payments from the NSA in relation to the Prism program.

A Yahoo spokesperson said: "Federal law requires the US government to reimburse providers for costs incurred to respond to compulsory legal process imposed by the government. We have requested reimbursement consistent with this law."

Asked about the reimbursement of costs relating to compliance with Fisa court certifications, Facebook responded by saying it had "never received any compensation in connection with responding to a government data request".

Google did not answer any of the specific questions put to it, and provided only a general statement denying it had joined Prism or any other surveillance program. It added: "We await the US government's response to our petition to publish more national security request data, which will show that our compliance with American national security laws falls far short of the wild claims still being made in the press today."

Microsoft declined to give a response on the record.

The responses further expose the gap between how the NSA describes the operation of its Prism collection program and what the companies themselves say.

Prism operates under section 702 of the Fisa Amendments Act, which authorises the NSA to target without a warrant the communications of foreign nationals believed to be not on US soil.

But Snowden's revelations have shown that US emails and calls are collected in large quantities in the course of these 702 operations, either deliberately because the individual has been in contact with a foreign intelligence target or inadvertently because the NSA is unable to separate out purely domestic communications.

Last week, the Washington Post revealed documents from Snowden that showed the NSA breached privacy rules thousands of times a year, in the face of repeated assurances from Barack Obama and other senior intelligence figures that there was no evidence of unauthorised surveillance of Americans.

The newly declassified court ruling, by then chief Fisa judge John Bates, also revealed serious issues with how the NSA handled the US communications it was sweeping up under its foreign intelligence authorisations.

The judgment revealed that the NSA was collecting up to 56,000 wholly US internet communications per year in the three years until the court intervened. Bates also rebuked the agency for misrepresenting the true scope of a major collection program for the third time in three years.

The NSA newsletters say the agency's response to the ruling was to work on a "conservative solution in which higher-risk collection would be sequestered". At the same time, one entry states, the NSA's general counsel was considering filing an appeal.

The Guardian informed the White House, the NSA and the office of the director of national intelligence that it planned to publish the documents and asked whether the spy agency routinely covered all the costs of the Prism providers and what the annual cost was to the US.

The NSA declined to comment beyond requesting the redaction of the name of an individual staffer in one of the documents.

UPDATE: After publication, Microsoft issued a statement to the Guardian on Friday afternoon.

A spokesperson for Microsoft, which seeks reimbursement from the government on a case-by-case basis, said: "Microsoft only complies with court orders because it is legally ordered to, not because it is reimbursed for the work. We could have a more informed discussion of these issues if providers could share additional information, including aggregate statistics on the number of any national security orders they may receive."
Anonymous2017-05-11 01:35:04
Bose spies on its wireless headphone customers by using an app that tracks the music, podcasts and other audio they listen to, and violates their privacy rights by selling the information without permission, a lawsuit charged.

The complaint filed on Tuesday by Kyle Zak in federal court in Chicago seeks an injunction to stop Bose's 'wholesale disregard' for the privacy of customers who download its free Bose Connect app from Apple or Google Play stores to their smartphones.

'People should be uncomfortable with it,' Christopher Dore, a lawyer representing Zak, said in an interview.

People put headphones on their head because they think it's private, but they can be giving out information they don't want to share.'

Bose did not respond on Wednesday to requests for comment on the proposed class action case.

The Framingham, Massachusetts-based company has said annual sales top $3.5 billion.

Zak's lawsuit was the latest to accuse companies of trying to boost profit by quietly amassing customer information, and then selling it or using it to solicit more business.

Are YOUR headphones spying on you? Bose accused of violating customer's privacy rights with app that tracks their listening habits

Lawsuit claims Bose Connect app violates privacy rights by selling the information without permission
Lawsuit is seeking cash for purchasers of dozens of headphones

By Reuters

Published: 21:16 BST, 19 April 2017 | Updated: 22:03 BST, 19 April 2017




View comments

Bose spies on its wireless headphone customers by using an app that tracks the music, podcasts and other audio they listen to, and violates their privacy rights by selling the information without permission, a lawsuit charged.

The complaint filed on Tuesday by Kyle Zak in federal court in Chicago seeks an injunction to stop Bose's 'wholesale disregard' for the privacy of customers who download its free Bose Connect app from Apple or Google Play stores to their smartphones.

'People should be uncomfortable with it,' Christopher Dore, a lawyer representing Zak, said in an interview.
The complaint seeks an injunction to stop Bose's "wholesale disregard" for the privacy of customers who download its free Bose Connect app.

The complaint seeks an injunction to stop Bose's 'wholesale disregard' for the privacy of customers who download its free Bose Connect app.

Zak is seeking millions of dollars of damages for buyers of headphones and speakers, including QuietComfort 35, QuietControl 30, SoundLink Around-Ear Wireless Headphones II, SoundLink Color II, SoundSport Wireless and SoundSport Pulse Wireless.

'People put headphones on their head because they think it's private, but they can be giving out information they don't want to share.'

Bose did not respond on Wednesday to requests for comment on the proposed class action case.

The Framingham, Massachusetts-based company has said annual sales top $3.5 billion.

Zak's lawsuit was the latest to accuse companies of trying to boost profit by quietly amassing customer information, and then selling it or using it to solicit more business.


Facebook's mind reading system revealed: Optical brain...
Schematics reveal Apple's iPhone 8 WILL have a fingerprint...
Newly discovered Egyptian carnivore that hunted our...
Air Force's mysterious X-37B space plane reaches a record...

Share this article

After paying $350 for his QuietComfort 35 headphones, Zak said he took Bose's suggestion to 'get the most out of your headphones' by downloading its app, and providing his name, email address and headphone serial number in the process.

But the Illinois resident said he was surprised to learn that Bose sent 'all available media information' from his smartphone to third parties such as Segment.io, whose website promises to collect customer data and 'send it anywhere.'

Audio choices offer 'an incredible amount of insight' into customers' personalities, behavior, politics and religious views, citing as an example that a person who listens to Muslim prayers might 'very likely' be a Muslim, the complaint said.

'Defendants' conduct demonstrates a wholesale disregard for consumer privacy rights,' the complaint said.

Zak is seeking millions of dollars of damages for buyers of headphones and speakers, including QuietComfort 35, QuietControl 30, SoundLink Around-Ear Wireless Headphones II, SoundLink Color II, SoundSport Wireless and SoundSport Pulse Wireless.

He also wants a halt to the data collection, which he said violates the federal Wiretap Act and Illinois laws against eavesdropping and consumer fraud.

Dore, a partner at Edelson PC, said customers do not see the Bose app's user service and privacy agreements when signing up, and the privacy agreement says nothing about data collection.

Edelson specializes in suing technology companies over alleged privacy violations.

The case is Zak v Bose Corp, U.S. District Court, Northern District of Illinois, No. 17-02928.
Anonymous2017-04-25 15:31:45
My acne gets cleared up with Irish Spring soap, (it is horrible chemical laden stuff that I wouldnt use otherwise.) However that does not look like acne but it may help if there is some sort of similar basis. I'd ask on a skin specialist medical board so you can get a name of what it is and google resolutions. Or see a Dr and tell them you don't want pills.
Anonymous2017-03-23 15:39:55 File: 564267903465721589563685547.jpg (71.531kb, 640x426)
They can now spy on you in your own house through your TV and make you crash your #smartcar

Yes, the government can use your phone, your computer and even potentially your television to spy on what you are doing inside your own home.

The documents that were released by Wikileaks show that government spooks can remotely take control of Apple iPhones, Google Android phones, Microsoft Windows operating systems and Samsung smart televisions, and once in control of those devices they can use them to spy on their owners.


Anonymous2017-03-19 01:30:36
hahaha #GOOGLE is one big fake company
Anonymous2017-03-08 05:17:09
WikiLeaks has unveiled the global hacking program that claimed the CIA hacked iPhones and Microsoft Windows, the whistle-blowing organization also claimed that CIA worked with MI5 to turn Samsung TVs into microphones.

Julian Assange said that WikiLeaks will unveil confidential documents from the U.S. Central Intelligence Agency as part of its mysterious Year Zero series. WikiLeaks has issued the release and it claims that the CIA has been carrying out a global covert hacking program that exploits the US and European companies, adding that the CIA was using hacked mobile phones and vehicle control systems in modern cars to carry out assassinations.

WikiLeaks claims that these include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which it says are turned into covert microphones. Assange was scheduled to speak about Year Zero on Facebook today, but a live stream of the event was hacked. It is not yet clear when the event has been rescheduled to.

In a statement published on its website, WikiLeaks also claims that the attack against Samsung smart TVs was developed in cooperation with the UK’s domestic intelligence agency MI5, adding that Weeping Angel, which was developed by the CIA’s Embedded Devices Branch (EDB), infests smart TVs, thus transforming them into covert microphones. The organization says that after infestation, Weeping Angel places the target TV in a Fake-Off mode so that the owner can falsely believe the TV is off while it's not, meanwhile it records conversations in the room and sends them over the internet to a covert CIA server.

The CIA also planned to hack cars and trucks so that it could carry out undetectable assassinations. The organization claims that from October 2014, the CIA was seeking ways of infecting the vehicle control systems used by modern cars and trucks to enable them to engage in nearly undetectable assassinations, adding that the CIA’s Mobile Devices Branch developed numerous ways of hacking and controlling popular smartphones remotely.

WikiLeaks claimed that these include iPhones, which has a 14% market share and Google Android which is used to run most smartphones around 85%. The organization adds that infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications.

WikiLeaks has also indicated that the CIA could bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking smartphones that they run on and collecting the audio and message before the encryption is in place.
Anonymous2017-03-08 05:00:14 File: prism-cia.jpg (125.658kb, 600x452)
As an example, specific #CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the #Android phone and #iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like #Apple and #Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.
Anonymous2017-02-08 05:32:11

Dox- search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent.

"Remember, having the tools or even knowing the common techniques won’t make you a doxer. You must pay attention to the details and follow the leads specific to your target. Your own ability to do this will determine the outcome of your results and if you are new to this, it takes practice." - Anonymous

This guide is set up in a very simple fashion. We supply you with information, websites and tools that help you dox from all angles. It will start with how to find a basic piece of information, how to use it to find more information and what to do from there. As long as you know how to type, then this guide will help you get the dox.


Before you start your dox, you first have to ensure that you are not using any personal information. If you are social engineering, then you will have to make fake email accounts and fake social media to keep your identity safe. Even if you are just doing a simple dox, you must always take into consideration what bread crumbs you are leaving behind. This section will help keep you safe and off the radar.

-[10minutemail] This is exactly as it sounds. It is a free email you get for 10 minutes. You can also extended the time if you need to. My personal favorite is my10minutemail, however you are free to use whatever you like best.

-[YopMail] An alternative to 10minutemail. The only difference is that the messages is kept for 8 days instead of 10 minutes. Depends on the time interval needed to complete your mission.

-[Phones] You can call using multiple platforms. These include http://knctr.com/free-phone-calls/ and any other you want to find on the internet. For texting, I recommended http://www.textem.net/. Please note, you cannot receive texts back. You can easily google for many other ones as well. There are free receiving online texts, but the normally fail hard. These are all unreliable, so I would suggest using a disposable phone.

-[Fake Name] If you have to create a fake profile to get a dox, I would recommend using [http://www.fakenamegenerator.com]. It is very useful, giving you everything from a fake name, to a fake social security number, to a fake blood type. I would suggest checking it out even if you are not doxing anyone at the moment.

-[http://www.elfqrin.com/hacklab/pages/discard.php] This site allows you to see if a credit card number is legit. Some sites might require one, and a real one, so this lets you see if it actually exists.


I am dedicating an entire section to Google because it is by far your most useful tool. There are a million different uses for it, and I am here to list a few.

-[Quotations ("")] So when you type something into Google, you will be given a million different results. This complicates things because it is impossible it look through every single one. That is why quotations are so useful. To use them, simply do "(#)" and then put any unwanted words afterwards with a - before it. For example, if I am trying to look up a phone number and don't want any reverse phone number BS, I do "(#)" -reverse, -lookup, -results, -directory, -area. Then i might find a Facebook post of where they put up their phone number or a Craigslist add. Using this will narrow down results quickly and is a huge time saver.

-[http://www.googleguide.com/] If you think the quotations were useful, then this will blow your mind. Everything that will help you narrow down your results are in here. I found quotations the most useful, so I wrote up about them. However, there are an unbelievable amount of tools here that can make your search results that much better.

-[Picture Lookup] If you have a picture of the person you are looking for, then you can upload and use the following google search code to lookup other places where the picture might be located.
https://www.google.com/searchbyimage?hl=en&safe=off&biw=1920&bih=1080&site=search&image_url=(image location)

-[Email] Obtain the targets e-mail address. Google the user and put @ at the end. Example: 'username' @. This will pull up any POSTS ONLINE by this person if there are any. Sometimes you can social engineer someones e-mail address just by asking for it, or getting it from a friend.

-[Google Search] By entering your targets name, you can easily search for them through google rather than each site individual.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/Social Media-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

-ANY form of Social Media (Facebook, Twitter, Google+ etc). Read through all of their posts. There can be address posts, phone numbers etc. Look at their personal information. If they are a minor, then you will need their parents name to look anything up. Be sure to look at their friends who post on their wall or retweet them a lot. This will help because if the person is cautious, their friends walls/pages might be of more value.

-[Facebook] You can look up their email in Facebook search and find the person's Facebook Page. May contain information such as Phone Numbers, Family Members, and if you are lucky, License plate Numbers (If you find a picture of their car)

-[Twitter] There is a lot of personal information that can be found on Twitter. You can find other sites they are linked to. You can find stuff they like and record it down for future notice.

-[Google+] Yes it can be useful. Many people do not realize it, but they are posting on Google+ often. Every YouTube account is linked to Google+, and unless the user changes the setting, every YouTube comment is posted on their Google+ page.

-[Instagram] Not as useful. However, if you have their pictures, and are having difficulty finding out their Facebook, you can run their pictures through a facial recognizer and might be able to find their Facebook.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/Address Lookup-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/

-[whitepages.com] Yellow pages of the internet. Requires their first and last name. Having a location helps narrow down the options. Some of the information may be out of date, but is a good starting tool to look up peoples information. However, it is free.

-[http://www.zabasearch.com] A backup if White Pages fails. Normally doesn't work as well as White Pages, but is worth a shot if White Pages doesn't return the results

-[http://www.411.com] Another good address lookup. Has other functions as well, such as reverse phone number lookup and Find a Business.

-[PayPal]{RISKY} When you have the e-mail of your target, login to PayPal. Transfer .01 USD to the e-mail of your slave. When sent, you will have all of the information on the PayPal account. (Name, address, phone, etc.) But this also looks
rather suspicious and gives them all you account info.

-[https://www.advancedbackgroundchecks.com] Another address search tool. Can tell you who they might know. You can pay for telephone and email information as well.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/Email Address-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/

Having an email address is very helpful. It can easily help you find countless information such as IP address, social media,

-[http://www.lullar.com/] An extremely useful site. If you have their email, then you can use this to find what else the persons email is attached to (i.e. Facebook, Twitter, etc). You can also search using their usernames for whatever game or device they are using. Also works for names, but not very well.

-[Facebook] You can search peoples emails in the Facebook bar, and if they put in their email, it will give you their Facebook page.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/Ip Address Searching-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

Having someones IP address is one of the most useful information out there. With all of these 1337 hackers, their Ip address is their life. If you obtain their Ip address, then they will pretty much be your bitch. You are going to need information on them, an email address is the most helpful, to pull the rest. If you can take their IP address, then you are going to be sailing for the rest of the dox.

..::How To Get Their IP::..

-[http://whatstheirip.com] "Step 1: Enter your email address below and click "Get Link" Step 2: Send your friend the innocent looking link we provide you Step 3: When your friend, or anyone for that matter, clicks the link, a hidden script will email you their IP address and geo targeting location!" Very useful site. BE AWARE. It will tell them the email it sends the IP too.

-[https://www.robtex.com/] Gives information about IP addresses and DNS. Very useful, a good secondary for who.is.

-[http://ipaddress.com] Once you get their Ip using http://whatstheirip.com, you can use this to find their Zip, Location and Operating System.

-[http://ns.myip.ms/] Another good tool to look up Ips with. Can also give you phone numbers, OS, Browser and a few other interesting information

-[who.is] IP lookup. There is more information about it below.

-[http://www.ip-adress.com/ip_tracer/] Gives the longitude and latitude of and IP address. Is fairly accurate from my findings.

-Please realize that if they are using a VPN or proxy when they open the email, it will give you an incorrect place. Also, crosscheck the IP using multiple sources to ensure the location is right.

-This is not super accurate. It will most likely get you within a 100 mile radius. This is more of a starting place to find the State they live in, rather than the exact city.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/General Searches-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

-[pipl.com] Name, Email, Username, Phone look up. VERY USEFUL. Can look up Key Words and link them to twitter posts. Relatively Free

-[spokeo.com] An extremely good lookup for email, Name, Address and Phone Number. It works well but costs money.

-[http://intelius.com] A very nice free search engine. Gives education, previous job details, people who are related to him. If you are willing to pay you get much more.

-[Who.is] Domain name and Ip search. Only works if they are stupid enough to put all of their information into a domain name.

-[http://checkusernames.com] Can search across many platforms to lookup usernames. Looks up usernames on 160 different Social Networks. Does not include PSN or Xbox Live

-[http://knowem.com] Username and Domain Name search. If you want a extent of information you are going to have to sign up for an account, which is extremely expensive. Little complicated to get the hang of it.

-[http://www.zoominfo.com/-professional] Here you can lookup any persons past career and employment records. Not as useful in the over scheme of things, but never hurts to have more information on someone

-[http://www.jailbase.com] Jail Records. It can be useful for blackmail, but as for finding information such as address and phone number is useless. Also costs $$

-[http://skipease.com/] Sort of a cheat site. Uses several search engine and links you directly to them.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/--/-/-/-Picture Lookup-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/

-[www.tineye.com] Picture recognition website. It can see if the picture you found was posted elsewhere (Like another social media website). It can also tell you if the picture is false.

-[Codes] If the person you are looking up has an Instagram, then a easy search method (using webstagram) is

-[Google] If you are using Google Chrome you can simply right click on this avatar and chose the option “Search Google for this image.”, you will then be taken to a Google search result page where you will find links to other websites where the exact or a very similar image has been used, most of the time people have a single “profile picture” that they use everywhere.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/Phone Number Lookup-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/

-[http://www.fonefinder.net] Exactly as it sounds. Works Internationally. Will not give you the name of the person, but can narrow it down to a city using the area code. Will also tell you the if it is a land line or mobile phone.

-[http://www.isearch.com] Not very reliable, doesn't always come back with results. But it is worth a shot.

-[www.spydialer.com] Interesting little tool that you give you a good hand when needed. Can supply the name from a phone number or give you their voicemail.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-Skype Resolvers/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

Enter their Skype username and it feeds back their last used IP:

-[http://skypegrab.net/resolver.php] The best one of the bunch. The rest are back ups in case this one fails for a reason.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/EXIF Data-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

Metadata from images, can be useful for location and camera/cellphone type and much more:

-[http://regex.info/exif.cgi] Tells you a variety of information, though not also useful.

Enter where they live and you will get the latitude and longitude.

-[http://www.latlong.net/] Normally prints it out pretty well, not as vital for a dox

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/MAC Address Search-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

If you managed to get their MAC, then this will just tell you the brand of NIC or laptop.



Good Articles to Read up on:

Tor only articles:

Special Thanks To:
Anonymous2017-02-02 05:04:46

Hi, This is David, I do the political art here at Rense.com. Earlier this week, I received the following distressing letter from Laurie, who, along with her family and pets, have been stricken for the last 14 years with an emerging and mysterious affliction called Morgellons.

She wrote to ask if I would create a Morgellons art image that could wake people up to the fact that, not only are thousands or millions now suffering, but we might ALL one day be in grave danger from its nightmarish effects. So, I read the letter again realizing how difficult it could be to illustrate Morgellons - that is, until I came to the very last line. I could then clearly visualize the concept that became the splash art you see now.

The truth is, this is an extremely difficult subject to confront, so I dare everyone to read Laurie's entire letter; to really consider her and her family's situation, and try to imagine how you might begin to handle it yourself. It is my hope that all of us will read the abundance of Morgellons data, including videos and photographs, on rense.com, and then listen to some of the special Jeff Rense Morgellons programs. Look on the left side of Jeff's homepage for the Morgellons link image. You can also Google Morgellons and study even more photographs. Hopefully, you will then email some of this data to your doctor, local hospitals, medical community and public health agencies. We all need to become far more aggressive in researching and implementing proper treatment for this terrible, devastating science fiction-like disease, or syndrome, or whatever it is.

And now here is Laurie's story...


Dear David Dees...

I see your work every day on Rense.com. Thank YOU for your talent and gifts to the world.

I want to ask you to please do something for all of us FAMILIES suffering from Morgellons (there are 11,046 families KNOWN to be infected). My husband and I, and our pets, have been sickened with this disease for 14 years now. The CDC has been warned for at least 10 years that something HORRIFIC was happening to people, and yet they choose to do essentially NOTHING (except appoint a 'study group') to help the infected - even though entire families are being stricken and ruined by this disease.

'BIO-remediation' may be killing the planet. My husband was infected at a chemical plant in Freeport, Texas - one of the hot spots of Morgellons disease. We have poured our hearts out on the New Morgellons Order Web site - we were the Morgies of the Month for April 2007 - and I have sent hundreds and hundreds of emails to news media, medical universities, medical hospitals, the White House, you name it. I've written to the NIH, WHO (every office worldwide), you name it and NOT ONE PERSON contacted me. The TRUTH, you see, is too frightening.

Back in 1993, my husband was forced to work around MANipulated NANO-engineered microbes. It cost $10,000 for one 35 gallon barrel of these microbes back then and they used about 2 barrels a month at this wastewater treatment plant inside the chemical plant. He was given NO SAFETY PROCEDURES, NO PROTECTIVE CLOTHING, nothing... and there was NO PROPER TESTING to ensure the safety of the maintenance workers forced to work around these open pits and blowers harbouring these microbes. In fact, they would be working and oiling the blowers while they were still running and pouring a mist into the air all around the wastewater treatment plant - a heavy fog, really. These microbes could have been be airborne in that mist NO PROBLEM. In fact, the parking lot for the chemical plant workers was right beside the wastewater treatment part of the plant. The fog hung thick in the air around the parking lot. No wonder this area is considered a hot spot for this disease. The truth will prevail as more and more families are sickened with Morgellons...or whatever it is.

We tried to bring the turth out legally through one of the top environmental attorneys in the country but were told we had exceeded our "Statue of Limitations" - meaning we took too long, even though the CDC and the medical community hasn't got a clue what's going on. We were supposed to figure this all out much sooner by ourselves.

It has been recently shown through the work of private researchers with Clifford Carnicom leading the way, that something is very wrong with the blood of the Morgellons-infected. We have been infected for 14 years now and there is no doubt the public blood supply is compromised and in danger. I would also propose that this disease can transfer from an infected mother to her unborn child. This is a SILENT EPIDEMIC and it has been spreading for years now. The medical community - especially DERMATOLOGISTS - have their heads up their asses on this one. Even when a Morgellons patient has been certified NOT CRAZY by Phyciatrists, these same dermatologists have taken it upon themselves to prescribe 'anti-phycotic' drugs to Morgellons patients. The dermatologists deemed us 'delusional' and 'crazy' with no serious testing on their part or ANY clinical research to back them up.

Morgellons-infected live with open lesions on their body. The left side of my scalp right now is horrendous...lesions creeping and hair loss spreading. My forearms and face and neck at any time can be littered with lesions, and that is just the beginning of what we go through continually. Among many other thinngs, we must also try to deal with:

Eye floaters and constant grit in our eyes.

Almost instant overheating and sweating of our bodies

Chronic fatigue as these 'micromachines' feed off of our energy, zapping nearly every ounce of stamina from us...even small tasks become overwhelming.

Insomnia...chronic and dreadful.

Deteriorating condition of our teeth and tooth loss - my husband has lost 4 teeth and my teeth are deteriorating even though for 38 years I was told what beautiful teeth I had.

Chronic physical wasting - my husband has lost 40 pounds in 4 years I lost 30 pounds in 3 years but for many years I was constantly bloated in my stomach and abdominal area.

Constipation and/or diarrhea...either one or the other, and IBS-type symptoms.

Ringing and thumping in the ears...like tinnitus, but not.

David, there are 93 reported symptoms by the researchers investigating Morgellons. I believe my husband, pets and I live with about 30 of them every day.

I have to mention how this disease effects you mentally. One of the first neurological symptoms we faced was the loss of words. We found ourselves stuttering over the most simple known words that just don't come easily anymore, or at all. So you stutter and stammer or often just insert almost ANY word in a sentence while your mind searches for that word you have known all your life. The brain fog and inability to stay centered on things is simply horrible. My husband has developed a left sided limp and his left foot feels numb or dead to him and even trips him occasionally.

Upon standing, he gets dizzy spells like vertigo but milder in nature. We both have had severe lower back pain that required pain management specialists and cortisone injections by catheter within months of each other.....we both have had liver counts shoot off the charts...and then drop back to normal.

I have found that my desire, or willpower, is gone...even to do the things I Love...which now all sit idle. Morgellons strips you of your creativity and at times I find it very difficult to stay focused. And then there are times you act compulsively or are obsessive in your actions. I never had any of these issues before Morgellons.

You can spend hours and hours tending to painful lesions every day. It feels like plastic or glass coming out of your skin. In fact, I have been SHOCKED at what has come from some of my deep lesions - and all I have is a magnifying glass. There are all the usual fibers and gristle-like things, and then there are red jello-looking globs which almost look like blood clots but are obviously not.

Going out in public has turned into a nightmare. Even in the heat of the summer, I have to wear long sleeve shirts and bundle up so as not to scare people. Morgellons can send your body heat zooming in moments...but we still have to cover ourselves in public. The whole disease is mentally overwhelming...it is anything but just a 'skin condition'.

Perhaps the most devastating of all is the HELPLESSNESS...the complete failure the medical establishment has put upon us. I believe this is the first disease in history where the patients have had to resort to buying their own lab equipment to prove that the DOCTOR is the crazy one and not the patient. We pray every day the medical community will awaken to the fact that this is REAL and spreading and that they could be next. This affliction does not discriminate...everyone is at risk.

Morgellons is infectious or transferrable at close contact. Over the years (14), we have infected other family members including my husband's daughter. Her first-born was premature and almost died and we expect any time now the child's health is going to turn for the worse.

This disease takes time to replicate in your body, but over time you soon become too sick to work and soon after that, it becomes difficult to even do the things just to keep going. Morgellons could come to cripple the entire nation and I see it being far worse than AIDS in 20 years. This is a FAMILY disease. Not only are you infected, but in time the whole family becomes sick - including the pets. We have infected 4 dogs and 1 African Grey parrot. Two of the dogs and the parrot are dead.

Tunes, our Great Dane, came from dedicated breeders...all "show dog" in the blood line and a completely healthy background. At age 5, he became very sick and our vet said it was heart worms - and he underwent that serious heart worm treatment that can kill dogs. Tunes made it through...even though he hacked and coughed and was sick for some time. A year later, a woman approached us at the beach (we lived 10 minutes from the Gulf of Mexico) and asked if we were interested in breeding him - he was a big boy at 220 and big-boned. The mother was also a healthy Great Dane and carried the subequent litter which yielded 6 puppies. But then the mother became sick, and several puppies died, including one we had gifted to friends that died within weeks of coming home. The Vet, again, said it was heartworms. We believe it was Morgellons that caused the whole mess.

Henderson, our Blood Hound, was only 1 and 1/2 when he became sick. Coughing mostly, the vet diagnosed him with with 'Dilated Cardiomyopathy'. His condition went down hill and before he reached 2, we had to put him down. It was VERY SAD. This disease took him fast...he might have been weak to begin with, we're not sure, but it took him down in no time at all. He was still a puppy if you ask me.

Within six months of bringing the African Grey parrot into our home...she had plucked out every feather she could reach. She looked ready for the stew pot, and then died. We asked countless BIRD PEOPLE what was going wrong and even attended a bird show in Galveston looking for help. Some said it was her diet, others that she was lonely. Nothing ever made sense to us. She was gifted to us from Steve's dad who had owned her for many years. Sammie had been pretty much alone...and had the same diet we were feeding her - fresh fruit, seeds and bird treats/goodies. In fact, she had more activity in our home than any time at his dad's, so it wasn't the lonely theory, either. Now, however, it all makes sense to me. Poor Samantha we just didn't know then.

Beardsley, the second of our three bloodhounds, will be 10 in January. He has been sick for years now...rashes and sores, coughing, grit and discharge come out of his eyes, his ears need cleaning daily, and his head overheats at times just like ours do. He was also diagnosed with 'Dilated Cardiomyopathy' and placed on heart medication. Note that all these pets are from different breeders and all came from respectable people dedicated to their litters and healthy puppies. Beardsly even shows signs of obsessive-compulsive disorder sometimes - like just baying over and over at his ball until you nearly lose your mind...and either play with him or hide the ball somewhere.

AnnaBelle, our last bloodhound is 5, and started showing signs of Morgellons a couple of years ago...licking and picking at her privates more than she should and viciously biting at her forearms and forelegs and paws. There are times she is so obsessed with her biting you can't distract her. She also gets the gritty, sticky discharge coming from her eyes, and her ears need attention every other day. And, again, like Steve and I, and Beardsley, she also becomes overheated very quickly and exhibits an extremely hot head.

The only good thing (counting our blessings) is that not one of our little friends ever lost their appetite, they always ate well. However, as much as I love animals these will be our last pets...considering what we know about Morgellons. I was beginning to wonder why everything that came into our loving home has become sick or has died. Now we believe we know.

David, I hope you can draw an illustration that would bring proper worldwide attention to this ever-spreading disease that the CDC is covering up for the EPA. Someone, somewhere in some government lab has created the DISASTER OF THE CENTURY. Everything is sick and dying. THEY created something with these MANipulated microbes that NO living thng on this planet is immune to. Hence, we may be facing the third largest extinction in the history of this planet. It is our belief that this microbe - be it nano-spawned and based, or bacterial or viral (which we doubt) is spreading around this planet. Although it may have been designed to eat and 'process' things like sewage sludge and oil and chemical spills, it is now eating US. Just look around the planet:

* Our bees are disappearing
* Toxic algae is overtaking waterways everywhere
* Dead Zones are ever-expanding in our oceans
* Fish populations are dying (and not just from overfishing like the idiots want us to believe)
* Coral reefs are dying
* Elk, Moose and Deer are dying from some sort of wasting disease (which appears to be a form of BSE)
* 189 species of birds are going extinct and populations everywhere are way down
* Frogs and snakes are dying from some sort of fungus
* Red TIDES and the 'flesh-eating' strep bacteria are invading our lakes and waterways

We believe Morgellons could somehow be involved with some or all of these conditions The Morgellons microbe - likely a nano-created, self-assembling, self-replicating monster - may have been designed to eat 'nasties' in the environment ...but could now be infesting and killing life on the entire planet.

I lived life to the fullest before Morgellons. When I was heathly, nothing could stop me. I was the first female in the painters union in Vancouver, BC in 1978, and then one of the first females to ride with the Houston Fire Department for Emergency Medical Training. It was so wonderful and I learned so much. I even watched 5 different operations standing right next to the anesthesiologist, and worked many, many hours in some of Houston's best trauma hospitals. It was facinating to watch these trauma teams do their stuff. I had one job in Houston at an old bank they converted into a blues club and had entertainment like Ray Charles, BB King, The Fabulous Thunderbirds, etc. I was a go-getter - nothing held me down. I never knew a 'stranger' and could talk to anyone. Now? I sit living life as a hermit, a chronically-ill hermit. Thank God Steve and I love each other so much. I would hate to be sick alone. We make the most of what has been dealt to us - we need each other as much as we love each other. I haven't seen my family or friends for almost three years now as I'm in fear of infecting them.

I hope millions of people see your work and my story...and that their jaws drop to the floor. This is what needs to happen to wake the masses up. They need some shock treatment. Just posting the 'wake-up' isn't doing it. EVERYONE needs to read the Morgellons data and view the images at Rense.com. Your work has a way of opening up eyes big and wide. Mine have been open for some time now...they can't get much bigger. We are in deep, deep trouble on this planet of ours...

David, I do enjoy your work very much and I look forward to each new piece when I read my news every morning on Rense.com.

Take Care...and our Best Wishes to you during the holidays... from a very sick and frustrated Morgellons FAMILY,

Laurie Smith
Anonymous2017-01-09 12:43:09

Home » News » Turkey To Ban Google Search Engine
Turkey To Ban Google Search Engine

Posted on January 8, 2017 by Sean Adl-Tabatabai in News, World // 1 Comment
Turkey to ban Google from the country

Turkey has announced plans to ban Google search and other related services in the country, citing “privacy concerns”.

According to human rights organisation Turkey Blocks, Turkish Communication Minister Ahmet Arslan announced plans to replace Google with a State-run search engine and email service that would be more compatible with Turkish culture and values.

Turkishminute.com reports:

Turkey’s Communication Minister Ahmet Arslan on Friday said a local search engine and email service that compatible with national culture and values would soon replace Google and Gmail.

Speaking in an interview before the weekend, Arslan said Turkey needs to store user data within the country and ensure that communications can be fully analyzed domestically.

Arslan’s remarks came after recent debates over the reliability of the US-based email service provider Gmail on securing the private information of users, following the leaked personal emails of President Recep Tayyip Erdoğan’s son-in-law and Energy Minister Berat Albayrak.

Details such as the service’s name, logo and organizational structure have yet to be announced.

Countries such as China, Russia and Iran have been using domestic search engines and email service providers, competing with foreign providers like Google and Gmail, which are mostly blocked by the authorities.
Anonymous2016-12-22 18:56:17
Recently a struggling writer/actor in significant legal trouble, went to investigate
an Italian restaurant said to be trafficking children. You would think that someone
that has an interest such media could see that the buildup of this “fake news story”
adheres more to a somewhat typical string of conspiratorial speculation everyone has
experienced in this country for a long time. Examples being, the vast right wing
one, “facts” about WMDs told to the UN, NSA, Google, and facebook spying on
everyone, inside job of 9/11, Area 51, GMOs, Roswell, DB Cooper, War on Drugs,
fluoride, Y2K, chem trails, Trump cannot win, on and on.

More than anything else when reviewing the labels used to deride Trump supporters, I
view these presumed inferences regarding these emails to be about catharsis from the
battering they received for a few years coming from corporate media. Apparently the
slanderous remarks the public received daily from “legitimate” news isn’t real news,
turnabout isn’t fair play. Corporate media will push on, touting levels of
evidential vindication as they taunt and disparage these voters. Yeah, I disagree,
and now their world is about to implode.

Glancing at a BBC article related to the fake news case where the Italian restaurant
owner was interviewed. He mentioned a photo of little girl standing in a basket,
apparently to the conspirators they figured it signified she was for sale. Upon
looking up the photo and seeing a blonde haired blue eyed little girl made me
rethink Clintons phrasing, “… a basket of deplorables.” Many Americans have had
Hillary in their lives a long time, considering she publicly unveiled this seemingly
commonplace phrase of hers three times that week, it was more than unique. It was
delivered with awkward measures of flippant nonchalance, attached to a message of
authorship. Her coined glib phrase apparently also came with an error, only on
delivery, she meant to say “some” not “half.” How did she get her own idiom wrong?
All of it is uncharacteristic compared to everything prior in her career, this
phrase came from someone else. That expression was likely used inside her camp, or
her inner circle, to describe Trump voters vs Hillary voters, half of Americans are
deplorable and half support Hillary. Her correction still remains true, some, since
she had more than half the votes.

More than revenge for continued smearing of Trump voters, the situation points to
the fact that citizens are so untrusting of the entrenched political machine,
corporate media, and the federal government that they are desperate to uncover
anything, something is amiss. Recounts, rigged elections even insiders don’t trust
the apparatus. Whoever won, things need to change.

If I could point out one thing that really disturbed me about your candidacy
President-elect Trump, it would be the disapproval you showed for someone unable to
recall something about 9/11. Since it seems that you care about people remembering
9/11 you will enjoy this letter as it contains several uncharacteristically good
things to recognize about 9/11. Including something you can do to help family
victims of 9/11 and a coincidental unusual, unexpected, and beautiful thing that
relates to Muslim celebration. Those that did not celebrate after 9/11, do you
remember that? If you can’t, consider apologizing to the man you disparaged. That is
a bit of a trick question because it wasn’t very publicized.

One would think politicians and media would take the opportunity to promote that
glimmer of non-celebrating Muslim consideration, care, and morning because they
repeatedly caution the public to not lump all of Islam into a basket of deplorables
due to extremism, but no, they don’t. Our government and media prefer to endlessly
underscore the difference for us so we can know again and again that good Muslims
exist. Who did we go to war for again? Wasn’t it for protecting Muslims and other
cultures from these abusive leaders?

Once you are in the Whitehouse perhaps you can let us know if these State Department
government advisers really think that people in this country do not know how to
differentiate between “radical Islamic extremism” and those that are not. Maybe tell
the outgoing important advisers that rudimentary notions of good and bad are grasped
early on, I think by most everyone. There are extreme religious believers and there
are believers that are not. There are overly represented religious beliefs and there
are Muslims and Evangelicals. There are people that are proud of their race and
there are those that are not allowed to be.

People from Fairbanks to Edmonton to Miami and those from Moscow to London to San
Diego all can articulate such distinction. Many could spot such allegiances or lack
thereof by watching just about any corporate media production or by looking right
out their own window.

Because media and government officials frequently make this as a distinction vs
implication of ignorant Americans make no mistake the singular intent is that of
association. We are all somewhat used to this & it relates to a larger point I will
elaborate on later.

Back to fragmented messages of yours in “legitimate” corporate media -

Statements of yours endlessly repeated in news had me wondering in the past as well.
One statement that everyone should know, was your call for "total and complete
shutdown" of the entry of Muslims to the United States "until our country's
representatives can figure out what is going on." Corporate “legitimate” media ran
with the aspect of Muslim exclusion without ever once considering the question as to
why our government cannot figure out what is going on in the Middle East. I have
discussed this with several people who didn’t even know you had a larger message.

That last part of your statement is the interesting and critical part, not just to
me but it matters to every person and leader effected by the terrorism. It matters
most to people from the Middle East. Later in your statement you ask why do they
hate us? As I will point out later, this too is an interesting question because they
actually do appear not allowed to speak in our media, unless it suits someone’s
agenda. Ultimately why are we doing so many things that we are told will help them,
that don’t. Such State Department guidance keeps on making matters worse. Your
question is exceedingly valid, what is going on in the Middle East?

Misleading guidance supposedly toward improvement to full on mislead war in the
Middle East, again toward improvement. There is a stark difference between joking
about the fact that no WMDs were found in Iraq and how the top levels of our Federal
Government appear to have used fabricated intel and fabricated evidence from our
country and/or they un/knowingly used fabricated intel and fabricated evidence made
by other countries. (This brings to mind Rumsfeld and his unknown knowns drivel.)
All of which led to bunch of death and destruction in the Middle East. Due most
accurately to piling up bullshit and conjecture in front of the UN, essentially the
world. Just like we shouldn’t suspect that Colin Powell knew he was carrying a vile
of our anthrax, a photo of books, a photo of tubes and an array of overstated
(non)facts, reasons our government used ultimately to send the US and our allies,
(who we have suffered enough with, for, and due to by the way) to kill and die. Nor
should we blame Rafid Ahmed Alwan al-Janabi either. At that time there was no area
on this planet better scrutinized by professional inspectors ever. “Verified facts”
were absolute lies our federal government said to the world.

Ask your VP how he feels about, (I assume) being not just deceived by that
administration but used as a step toward the ensuing treachery that was leveled
against not just US citizens but the entire world. Even if it was not treachery,
everything was above board, fine & legitimate. We invaded with the claimed intent to
protect people from Saddam & they were slaughtered by Isis. Our involvement,
consists of mounting tragedy, this White House offer of State Department
“professional help,” needs it.

Interestingly, the world is to believe this war came with zero reasoning. Aside from
showing total disregard for the lives of our allies and our military, why would we
fake war interests? For who? For what? When Bush spoke from an aircraft carrier with
a banner that read “mission accomplished” media gave its loudest unified criticism.
His message was not of victory, his message was that the regime had been overthrown,
that mission was accomplished. Since they were so supportive of going in, supposedly
to get rid of Saddam Hussein, why did media object so strongly to this message?
Based on their coverage, it appeared that people in Iraq were reasonably happy about
it. How possibly could they have known guerrilla warfare was around the corner?
Whatever the case, why object so forcefully and unified to that message, they wanted
more war, did we cause more war for corporate media? Odd, reflected against the
anti-war stance corporate media swiftly took with regard to Vietnam, very odd.
Middle East at any expense seems to be the unified corporate media, state
department, federal govt message.
Anonymous2016-11-27 04:06:58
What exactly is rigged?
• The entire mainstream media
• Google search engine and Google News
• Facebook and Twitter
• The DNC and the RNC (both 100% rigged by globalists)
• Every federal agency (EPA, FDA, etc.)
• The entire justice system (makes a total farce of real justice)
• Interest rates and the value of the money supply (central banksters)
• Academia (all public universities)
• EPA's "safe" limits on pesticides (all rigged by Big Biotech)
• Food and food labeling (all run by corrupt food companies)
• Public education (rigged into Common Core anti-knowledge idiocy)
• Banking and finance (all controlled by globalists)
• Government economics figures and statistics
• Medicine and pharmaceuticals (rigged to maximize profits)
• Big Science (totally rigged by government agenda pushers)
• The music industry (most top singers can't sing at all)
• Weapons manufacturers and war corporations
• The illegal drug trade (it's run by the government)
• Political elections (all 100% rigged at the federal level)
• Political polls (now rigged by Reuters, too)
• The health insurance industry (rigged by Obamacare)
• College admissions (legally discriminates against Whites and Asians)
• 9/11 and domestic terrorism (all rigged "official stories")
• Oil and energy industries
• The rule of law (rigged in favor of the rich and powerful)
• Infectious disease and the CDC (a constant stream of lies)
• Hollywood (all run by globalists)
• Climate change science (all a grand science hoax)
• Press release services (they only allow official narratives)
• History (what you are taught is mostly a lie)
• Government grants (only given out to those who further the agenda)
• Government bids (only awarded to those who kick back funds to corrupt officials)
• Consciousness and free will (we are all taught consciousness doesn't exist)
• Ethnobotany (medicinal and spiritual use of healing plants)
• Life on other plants (the obvious truth is kept from us all)
• The origin of the universe (the official narrative is a laughable fairy tale)
Anonymous2016-11-25 07:30:21
German Chancellor Angela Merkel has declared war on alternative media outlets that she says are responsible for subverting the government’s control over the public.

Merkel joined the chorus of other world leaders and huge multi-national media outlets who wish to rid the internet of alternative media websites, under the guise of “fighting fake news“.

Speaking in parliament, Merkel claimed that public opinion was being swayed away from establishment politics, claiming that independent news outlets posed a danger to national security.

Home » News » Merkel Promises To Rid Internet Of Alternative Media
Merkel Promises To Rid Internet Of Alternative Media

Posted on November 25, 2016 by Sean Adl-Tabatabai in News, World // 0 Comments
Angela Merkel declares war against alternative media outlets

German Chancellor Angela Merkel has declared war on alternative media outlets that she says are responsible for subverting the government’s control over the public.

Merkel joined the chorus of other world leaders and huge multi-national media outlets who wish to rid the internet of alternative media websites, under the guise of “fighting fake news“.

Speaking in parliament, Merkel claimed that public opinion was being swayed away from establishment politics, claiming that independent news outlets posed a danger to national security.
Obama declares war on conspiracy theorists, vowing to eliminate the first amendment
Obama Declares War On Alternative Media And The First Amendment
Donald Trump thanks the alternative media for his historic election wijn
Donald Trump Thanks Alternative Media For Historic Win

Yahoo News reports:

“Something has changed — as globalisation has marched on, (political) debate is taking place in a completely new media environment. Opinions aren’t formed the way they were 25 years ago,” she said.

“Today we have fake sites, bots, trolls — things that regenerate themselves, reinforcing opinions with certain algorithms and we have to learn to deal with them.”

Merkel, 62, said the challenge for democrats was to “reach and inspire people — we must confront this phenomenon and if necessary, regulate it.”

She said she supported initiatives by her right-left coalition government to crack down on “hate speech” on social media in the face of what she said were “concerns about the stability of our familiar order”.

“Populism and political extremes are growing in Western democracies,” she warned.

Last week, Google and Facebook moved to cut off ad revenue to bogus news sites after a US election campaign in which the global misinformation industry may have influenced the outcome of the vote.

But media watchers say more is needed to stamp out a powerful phenomenon seen by some experts as a threat to democracy itself.

Merkel’s conservative Christian Democrats are the odds-on favourites to win the German national election, expected in September or October 2017.

But she is facing a strong challenge from a resurgent rightwing populist party, Alternative for Germany (AfD), which has her liberal refugee and migration policy in its crosshairs.

It is currently polling at around 12-13 percent which could complicate the complex maths of coalition building after the poll.

All of Germany’s mainstream parties have for now ruled out forming an alliance with the AfD.
Anonymous2016-10-26 04:13:24
Google planned to help Syrian rebels bring down Assad regime, leaked Hillary Clinton emails claim

Anonymous2016-10-26 04:09:16
hahaha is anyone really surprised by this, when the fuck will people wake up ???????

>Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

Anonymous2016-10-23 23:17:39
Addressing an international media forum, Assange said: “Google is directly engaged with Hillary Clinton’s campaign,” adding that the company used the State Department as part of “a quid pro quo.”

The whistleblower also called Hillary Clinton a problem for freedom of speech in the US.

RT reports:

The journalist behind the world’s most well-known whistleblower website appeared via videoconference at a session of ‘End of the Monopoly: The Open Information Age’, part of the ‘New Era of Journalism: Farewell to Mainstream international media’ forum organized at the Rossiya Segodnya International Multimedia Press Center in Moscow.

The whistleblower believes that unlike Donald Trump, Democratic presidential candidate Hillary Clinton is predictable and will constitute a problem for freedom of speech in the US if elected.

“Of course she when she is in power… She is a problem for freedom of speech,” Assange said. “We know what she is going to do. And she made the chart for the destruction of Libya, she was involved in the process of taking the Libyan armory and sending it to Syria.”

“Google is heavily integrated with Washington power, at personal level and at business level… Google, which has increasing control over the distribution channels,… is intensely allying itself with the US exceptionalism,” Assange said, speaking in a video link from the Ecuadorian embassy in London, where he has been holed up since August 2012.

“It [Google] shows the will to use that at different levels. It will inevitably influence its audience,” Assange said, recalling the occasion when Google leased its front page to “promote [US State Secretary] John Kerry’s call for bombing on Syria in 2013,” along with conspiring with “Al Jazeera to encourage Syrian defectors.”

“Google is an intensely Washington, DC-aligned company,” the famous whistleblower said.

Washington and Google likewise feel threatened by China and view the country as a rival, with former Google CEO Eric Schmidt viewing China as “his enemy,” the WikiLeaks founder said.

“I see a Google exit from China… It seems much more to do with Google’s feeling that it is part of ‘family America’ and that it is opposed to the Chinese,” said Assange, who faces extradition to the US on charges of espionage, conspiracy, theft of government property and computer fraud, which could result in up a minimum of 45 years behind bars.

Another shocking claim from Assange is that 80 percent of the US National Security Agency’s (NSA) budget has been privatized as part of the merger between power and big business.

  Pages  All Replies  Top   back