Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Sunday, July 26, 2009

NSA CoNdUcTiNg ElEcTrOnIc WaRfArE On AmErIcAnS

Is the NSA Conducting Electronic Warfare On Americans? THE BIG DUHHHHHHHH!

Dated but revealing: May 19, 2006 [ITs COMING OUT]

By Jonas Holmes

Russ Tice, former NSA intelligence officer and current Whistleblower, was to testify before the Senate Armed Services Committee this week. Apparently the testimony, Mr. Tice wanted to give, makes General Hayden?s phone surveillance program look like very small potatoes. Mr. Tice?s testimony is expected to reveal further illegal activity overseen by General Michael Hayden which even loyal and patriotic NSA employees view as unlawful.

I think the people I talk to next week are going to be shocked when I tell them what I have to tell them. It?s pretty hard to believe,? Tice said. ?I hope that they?ll clean up the abuses and have some oversight into these programs, which doesn?t exist right now.? According to Mr. Tice, what has been disclosed so far is only the tip of the iceberg.

What in the world could Russ Tice be talking about?! To figure it out let us take a look at Russ Tice?s work at the NSA.


According to the Washington Times and numerous other sources, Mr. Tice worked on special access programs related to electronic intelligence gathering while working for the NSA and DIA, where he took part in space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems.

Special Access Programs or SAPs refer to Black Budgets or Black Operations. Black means that they are covert and hidden from everyone except the participants. Feasibly there would be no arena with a greater potential for abuse and misuse than Special Access Programs. Even now Congress and the Justice Department are being denied the ability to investigate these programs because they don?t have ?clearance?. To put it in CNN?s Jack Cafferty?s words a top secret government agency, the NSA, the largest of its kind in the world, is denying oversight or investigation by the American people because investigators lack clearance. To add a layer of irony to the Black Ops cake this travesty is occurring in America, the supposed bastion of Freedom and Democracy, which we are currently trying to export to Iraq.

It just gets scarier. The Black Ops that Mr. Tice was involved in related to electronic intelligence gathering via space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. For greater insight as to the impact of these programs readers should review decades old FOIA authenticated programs such as MKULTRA, BLUEBIRD, COINTELPRO and ARTICHOKE. Radar based Telemetry involves the ability to see through walls without thermal imaging. Electronic Warfare is even scarier if we take a look at the science.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950's, which included neurological research into "radiation" (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation Intelligence," defined as "information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation."

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. RNM can send encoded signals to the brain's auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject's brain while they are in R.E.M. sleep for brain-programming purposes.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen.

NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person's bioelectric fields.

The NSA's Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain.

===snipped===>http://www.radartutorial.eu/16.eccm/ja04.en.html

Electronic Interference

Many complex electronic systems are installed on airports, into aircrafts or aboard ships. The ability of these systems to perform their individual functions without interference is known as electromagnetic compatibility (EMC). The sources of extraneous electromagnetic radiations reduce receiver performance and are known as electromagnetic interference (EMI). Sources of EMI can be divided into the following broad categories:

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:



Much of the defensive intervention strategy originated with the contractor Booz Allen and was part of a larger “strategic psychological operations” program initiated by the Pentagon. Under the umbrella of “influence operations,” the program also targeted, according to one Pentagon consultant, “activists, anarchists, as well as opportunists” as the new terrorists.
Specifically, animal rights and environmental activists were cited in the “activist” category. Infuence operations were green-lighted by both Cheney and President George W. Bush. Bush justified the program to Pentagon officials by saying “we’re bringing justice to the terrorists.”_LETS NOT FORGET WHISTLE BLOWERS WHO KNOW THE TRUTH CONCERNING 9/11!

U.S. Needs Hit Squads.....Duhhhhhhhhhhhhh


[Related: The Stressed Hippo Campus Synaptic Plasticity and Lost Memories]

http://www.scribd.com/doc/20257766/The-Stressed-Hippo-Campus-Synaptic-Plasticity-and-Lost-Memories

[Related: Induced Stress Effects Prefrontal Cortical Impairment]

http://learnmem.cshlp.org/content/15/8/551.full

[CIA/SERE Experiments Evidence of Attempt to Mislead on OLC Torture Memos]

http://pubrecord.org/torture/5504/ciasere-experiments-evidence-attempt/

[CIA Experiments on U.S. Soldiers Linked to Torture Program]

http://pubrecord.org/torture/4607/research-torture-charges-human/

[Related: We Have met The Nazis, And They Are U.S.]

http://www.informationclearinghouse.info/article23424.htm

[CIA doctors, psychologists participated in torture of prisoners]

http://www.inteldaily.com/news/173/ARTICLE/11725/2009-09-04.html

[What is the CIA Still Hiding about Interrogations?]

http://www.informationclearinghouse.info/article23427.htm

[Related: Dick Cheney's "Executive Assassination Ring"]

http://www.globalresearch.ca/index.php?context=va&aid=14423

The IG's report failed to disclose what these programs actually did, and probably still do today under the Obama administration. Shrouded beneath impenetrable layers of secrecy and deceit, these undisclosed programs lie at the dark heart of the state's war against the American people and perhaps, other regime opponents.

[The Military Application of Augmented Cognition]

http://www.mindhacks.com/blog/2007/03/the_military_applica.html

[Advance Brain Monitoring, Inc.]

http://www.b-alert.com/augcog/index.html

[Augmented Cognition International Society]

http://www.augmentedcognition.org/about.htm

[Brain-Machine Interfaces]

http://www.gyre.org/news/explore/brain-machine-interfaces

[NSAs Covert Operations]

http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm

[Cheney assassination team involved Pentagon chain of command]

http://onlinejournal.com/artman/publish/article_4987.shtml

[Related: Interim Report on the Automated Targeting System] as of 3 Aug 2009

http://www.eff.org/issues/foia/automated-targeting-system-report

[Related Research:Mind Control and EM Wave Polarization Transductions - Part I, II & III]

http://www.cheniere.org/explore%20articles/mind%20control1/index.html

[Related Research: PEAR Publications]

http://www.princeton.edu/~pear/publications.html

[Technical Security Countermeasures (TSCM)]

http://www.scribd.com/doc/17695505/Electronic-Warfare-Countermeasures

[SPACE & ELECTRONIC WARFARE LEXICON]

http://www.sew-lexicon.com/

GVPT/SOCY333: Information Technology and Society

http://www.bsos.umd.edu/gvpt/phillips/gvptsocy333/syllabus333wp1230.htm

Defence Electronics

http://www.ssm.gov.tr/EN/savunmasanayiimiz/ssurunleri/urunelektronik/Pages/default.aspx

Decision-Centered Human-Computer Interfaces

http://www.pacific-science.com/KnowledgeManagement/DecisionCentered.html

Emblems from the Pentagon's Black World

http://www.kk.org/cooltools/archives/002068.php

Electronic warfare

http://en.wikipedia.org/wiki/Electronic_warfare

Wednesday, July 22, 2009

US GoVt SpY PrOgrAm - HiTtInG MaIn CoRe On ThE HeAd!!!

PROMIS and the Shadow Government: Part I

by Ed Encho: http://www.opednews.com/author/author5421.html

Hitting the nail on the head: Main Core and PROMIS

Suppose that the United States Government, or more likely an unaccountable privatized intelligence colossus empowered by the reaction to the 9/11 attacks and fueled by the rampant cronyism of a system long ago gone rotten had a surveillance tool capable of peering into the most private aspects of American lives on a whim. Now suppose that the new growth industry of a previously unthinkable futuristic police state was already in place, fully operational and has been online and has actively been being utilized for domestic spying for years before those two airplanes slammed into the World Trade Center.

The 'terrorist' attacks were used as the justification for every unconstitutional reigning in of civil liberties ever since that heinous September morning seven years ago when the reset button was hit on two and a quarter centuries of American history and we all stepped forth into the brave new world of perpetual war, fear, suspicion and vengeance into a parallel reality in a place that would come to be known as The Homeland. What if this surveillance industrial complex was in possession of a database that was so large and so powerful that not only could it instantly process and retrieve the most minute or intimate aspects of a citizen’s lives but was also able to utilize extremely sophisticated artificial intelligence capabilities to actually predict likely patterns of future behavior.

Such a huge database would be able to use cutting edge technology funded with taxpayer dollars and awarded to unaccountable private corporations largely through ‘business as usual’ no bid contracts to create the most invasive tool of oppression this country has ever seen. This database would rely on software that was capable of performing social network analysis based on block modeling technology to monitor all forms of electronic communications, all internet searches, all debit and credit card transactions, all travel arrangements, all library records, all bank activity and all telephone records. It would then be able to use the data to not only find links between persons who already know and interact with each other but to categorize each individual into a particular group that possess similar behavioral and purchasing habits. These groups could then be further divided into subgroups and further analyzed in order to determine under some loosely defined and largely unknown guidelines whether they could potentially represent a threat. While all of this may sound like some sort of futuristic dystopian nightmare straight out of Philip K. Dick’s Minority Report and "Precrime" it is very real and it goes by the name of Main Core.

===snipped===>http://www.scribd.com/doc/13743356/CoVeR-lEtTeR-the-OmInOuS-Parallels

This technology is being used today absent any form of legitimate oversight, with a Constitution that has been eviscerated by the Bush-Cheney-Rove Axis of Evil, a vast gulag network of top secret prisons and 'detention facilities' and the decidedly anti-American new phenomenon of state sanctioned torture. Throw in an overworked, systematically dumbed-down populace that has been propagandized by the corrupt institution that is the corporate media machine with it's clever use of fear and loathing and scientific development of advanced mind control techniques who despite the infinite wisdom of our forefathers would gladly sacrifice their liberty for the any sort of temporary safety (no matter that it is fleeting) and there exists today in 'The Homeland' a perfect Petri-dish for an authoritarian fascist society.

It is though a very sophisticated form of fascism unlike more outwardly obvious regimes that we have known in the past. Author Bertram Gross published a book back in 1980 that was entitled Friendly Fascism, Jim Garrison once said that "fascism would come to America in the name of national security", and author Kevin Phillips in his 1983 book Post-Conservative America warned of the potential of an "apple pie authoritarianism" and a coming society in which: "the Star Spangled Benner would wave with greater frequency and over many more parades; increased surveillance would crack down on urban outbreaks and extreme political dissidents". This very accurately describes post 9/11 America where any semblance of reason has been abandoned for cheap flag-waving pimped off as patriotism, criticism of authority has made into potential treason by the highly paid shills for neoconservative doctrine, sloganeering and demagoguery have replaced discourse, critical thinking is becoming extinct and just as George Orwell so accurately predicted Big Brother is now watching over us, protecting us and ensuring that we understand that war is peace, freedom is slavery and ignorance is strength.

===snipped===>http://www.scribd.com/doc/13743550/The-OmInOuS-Parallels

Main Core has received attention in two 2008 articles, one a piece by investigative journalist Christopher Ketcham entitled The Last Roundup (which also looks at Continuity of Government programs but more on that in a little while) and Tim Shorrock entitled Exposing Bush’s Historic Abuse of Power. Both articles tie Main Core to the now legendary PROMIS software, an extremely advanced program designed to aid federal prosecutors in case management tracking. PROMIS could pull and put together a wide range of data from disparate sources into a single record. The PROMIS software was created by INSLAW Inc., a company owned by a former NSA intelligence officer named William Hamilton. PROMIS was to have been licensed to the U.S. government in the early 1980’s before the technology boom became widespread but was then stolen by the seamy officials in Ronald Reagan’s Justice Department. The software was modified for espionage purposes to include a ‘back door’ that could be used for spying on those that it was sold to and in a detail that should be especially relevant with the economic crisis that threatens to crash the global financial system, the software could also be used to track in real time (in order to manipulate?) stock market transactions, once can certainly speculate as to how such a tool could have contributed to an economic catastrophe as we are now facing if it were used for such a thing. It is important to keep in mind the period when PROMIS was stolen in the early 1980's and the fact that the technology boom was still years in the future which should give one an idea to just how far advanced and therefore how important that it was to those who would use it in order to promote a sinister agenda.

"Nothing was your own except the few cubic centimetres inside your skull" (George Orwell: 1984)

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:





[Probe Targets Archives’ Handling of Data on 70 Million Vets]

http://www.wired.com/threatlevel/2009/10/probe-targets-archives-handling-of-data-on-70-million-vets/
[Swiss bank in historic disclosure of accounts] Lets hope 'THEY' don't look over the Bill Clinton & George Bush accounts!

http://www.presstv.ir/detail.aspx?id=103966&sectionid=351020606

[FACEBOOK.COM: Intelligence Agencies Espionage Site]


[Related: EFF Plans LawsuiteTo Unveil the CIA’s ‘Pentagon Papers’]

http://www.wired.com/threatlevel/2009/07/cia-sued/

http://www.scribd.com/doc/17595234/EffiobFoiacompalint

Part II: http://www.opednews.com/articles/US-Govt-Spy-Program--Main-by-Ed-Encho-090201-885.html

Part III: http://www.opednews.com/articles/US-Spying--Main-Core-PRO-by-Ed-Encho-090202-224.html

Part IV: http://www.opednews.com/populum/diarypage.php?did=13835

Sunday, July 19, 2009

9/11 PeNtAgOn "Jetliner Attack" ExPoSeD

The Proof that 9/11 Was an Inside Job that Several Leading 9/11 Truth Sites Don't Want You to See!

In his first 9/11 book The New Pearl Harbor (2004), David Ray Griffin wrote that if the government's version of the "757 attack" on the Pentagon was not THE most obviously false part of the official story, it was at the very least tied for first place. (Presumably with Building 7.)

Unfortunately, a tiny fringe element of truth-seekers (real and/or counterfeit) has been working overtime to smear anyone who brings up this issue. Worse, they have been smearing the very people who who have been doing the hard work necessary to settle the issue. And even now, after the issue has been definitively settled, they continue to fight a rear-guard action in favor of the proven-false proposition that Flight 77 hit the Pentagon.

Rob Balsamo of Pilots for 9/11 Truth, and Craig Ranke and Aldo Marquis of Citizen Investigation Team, have worked their tails off doing primary research. Using the government's own alleged black box data (Balsamo) and in-depth recorded interviews with every Pentagon witness they could track down (Ranke and Marquis) these three guys have proven beyond anybody's reasonable doubt that the government's story is false.

What's more, Ranke and Marquis have offered a plausible alternative hypothesis--a jetliner flyover timed to coincide with the detonation of a bomb--and found convincing eyewitness testimony to back it up. This alternative hypothesis lines up well with the evidence Barbara Honegger uncovered in her interviews with Pentagon personnel.

_Kevin Barrett

===snipped===>http://pilotsfor911truth.org/index.html

Pilots For 9/11 Truth Sign Affidavit In Lawsuit Brought By Pentagon Survivor :

07/15/2009 - (Pilotsfor911truth.org) April Gallop, a survivor of the Pentagon Attack on September 11, 2001, is now suing Cheney, Rumsfeld, Myers and other officials for their possible role in the attack and failure to evacuate the Pentagon. The lawsuit cites Flight Data Recorder Analysis. Pilots For 9/11 Truth have been called upon to sign our names and professional reputations to the analysis which will be presented before a judge in a court of law.

Several individuals who make excuse for the govt story such as Glenn Beck, some who refuse to put their names and faces to their claims such as those who spend their days and nights obsessed with us, and those who endlessly attempt to smear anyone who questions 9/11 (albeit poorly), constantly complain we will never take our concerns to court. They have once again been proven wrong.

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[911 Lies (.)org]

http://911lies.org/full_size_911_pentagon_attack_damage5.html

[9/11 Summary]

http://www.911summary.com/

[Related: Remote In-Flight Course Changes Facilitated By 9/11 Model Aircraft Circa 2001]

http://911truth.org/article.php?story=20090827134112250

[Researchers Release 9/11 Pentagon Attack Report]

http://rockcreekfreepress.com/

Court Brief Filed:


The Pentagon Attack Papers:


Evidence >> NATIONAL SECURITY ALERT

Friday, July 17, 2009

9/11 - CyBeRtErRoRi$m or DaMaGe CoNtRoL

By James Corbett - The Corbett Report
Government sources immediately began blaming North Korea for the recent cyberterror attacks on South Korea and the U.S., despite having no evidence to back up those claims. Now, an examination of the evidence by independent computer experts show that the attack seems to have been coordinated from the UK. The hysterical media coverage in the attack's wake, however, echoing the government line that it was likely the work of North Korea, served to cement in the minds of many that this was an act of cyberwarfare.

The idea that this surprisingly unsophisticated attack could have come from a well-organized, hostile state or terrorist group comes as a blessing in disguise to those groups, agencies and advisors who have been calling for greater and greater federal snooping powers in the name of stopping a "cyber 9/11" from happening.

The "cyber 9/11" meme stretches back almost to 9/11 itself. Back in 2003, Mike McConnell, the ex-director of the National Security Agency (NSA), was fearmongering over the possibility of a cyber attack "equivalent to the attack on the World Trade Center" if a new institution were not created to oversee cyber security. Since then, report after report has continued to use the horror of 9/11 as a way of raising public hysteria over "cyber terrorism," a subject more often associated with juvenile hackers and lone misfits than radical terrorist organizations.

===snipped===>http://www.memecentral.com/index.htm

What the cyber security establishment does not want you to know is that the most incredible cyber terrorist story of all time began 15 years ago. And it centers on 9/11. The establishment is interested in suppressing this story because it demonstrates that the very investigative bodies that are clamoring for more power on the pretext of the "cyber terror" hysteria are the exact same bodies that failed to investigate the documentable links between government-designated terrorists and a software company with direct access to some of the most sensitive computer systems in the United States. FBI agents whose investigation into this story were suppressed have even said that these investigations could have prevented 9/11.

It is a story of international terror and terrorist financiers. It stretches from New England to Saudi Arabia and involves businessmen, politicians and terror networks. And it begins in the most unlikely of places: the offices of an enterprise architecture software firm in Quincy, Massachusetts.

===snipped===READ=>http://www.fromthewilderness.com/free/ww3/012705_ptech_pt2.shtml

===The Family======>http://en.wikipedia.org/wiki/The_Family_(Christian_political_organization)

Lets not forget that the 'offices' at SAIC located in Dullas, Va on the 11th of September 2001 WHERE EMPTY!

The utility of such software for organizations of all stripes should be obvious enough. It is unsurprising, then, that numerous government agencies and powerful corporations were hungry for this software in the 1990s. A surprising number of them, including DARPA, the FBI, the Secret Service, the White House, the Navy, the Air Force, the FAA, NATO, IBM, Booz Allen Hamilton and Price Waterhouse Coopers (amongst many others) turned to a small New England-based software firm called Ptech.

===snipped===>http://www.tmcnet.com/usubmit/2009/07/16/4275631.htm

Ptech on 9/11: The Basement of the FAA

For two years prior to 9/11, Ptech was working to identify potential problems or weaknesses in the FAA's response plans to events like a terrorist hijacking of a plane over U.S. airspace. According to their own business plan for their contract with the FAA, Ptech was given access to every process and system in the FAA dealing with their crisis response protocols. This included examining key systems and infrastructure to analyze the FAA's "network management, network security, configuration management, fault management, performance management, application administration, network management and user desk help operations." In short, Ptech had free reign to examine every FAA system and process for dealing with the exact type of event that was to occur on 9/11. Even more incredible, researcher Indira Singh points out that Ptech was specifically analyzing the potential interoperability problems between the FAA, NORAD and the Pentagon in the event of an emergency over U.S. airspace.

Ptech also presumably had operational information about the systems that the FAA, NORAD and others employed during crisis response exercises like Vigilant Guardian, the NORAD exercise that was taking place on 9/11 and included simulations of hijacked jets being flown into New York and hijacked jets being flown into government buildings. This is significant because there is every indication that just such drills were confusing NORAD's response to the real hijackings that were taking place that day.

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[9/11 Summary]

http://www.911summary.com/

World Wide Wiretap

Of course, it should be obvious by now that those in charge of multi-billion dollar agencies are in positions to directly materially benefit from just such large, stunning cyber attacks, opening the door to the false-flag mentality by which attacks are to be welcomed for their transformative nature. Certainly the NSA is not building a $1.6 billion-dollar data center to sit on their hands waiting for an attack, nor are the governments of the UK, Canada, Ireland and many other countries suddenly considering draconian new e-spying legislation for the fun of it.

For those who are interested in how a cyber false-flag terrorist attack could be generated, the PTech story remains a crucial piece of the puzzle. The technology exists for those in the know to commit sophisticated, convincing and devestating attacks through the government's own cyber infrastructure. The only question is who has the means, motive and opportunity to use it.

http://www.pbs.org/wnet/expose/expose_2007/episode204/watch.html

http://www.corbettreport.com/articles/20090710_world_wide_wiretap.htm

Prodcast: http://www.corbettreport.com/mp3/episode045_ptech_and_the_911_software.mp3

[Related: Racist Web Post Traced to Homeland Security] The Big DUHHH!!!

http://www.nytimes.com/2009/07/25/nyregion/25immig.html?_r=2


Barnett-Air Force Research Lab-OODA Loop-SAIC, Pentagon VPN Red Team

http://forum.prisonplanet.com/index.php?topic=102061.new

Feds Look For Data On Saudi In Ptech Raid

http://www.forbes.com/2002/12/06/cx_ah_1206raid.html

http://groups.yahoo.com/group/WarOnFreedom/message/1245

The Ptech Incident

http://lwn.net/Articles/17874/

http://groups.yahoo.com/group/ctrl/message/33659

http://www.angelfire.com/mi/smilinks/FallsChurch.html

'Intels' VPro Technology

Wednesday, July 15, 2009

WhIsTlEbLoWer: CoLeEn RoWlEy, 'Ex'-FBI AgEnT

In the absence of my being there in New York City to stand with the 9/11 families, first responders and survivors, I offer the following statement in support of your goal of a new investigation into the attacks of September 11th and the NYC CAN campaign to place it on the ballot for November.

At the time of 9-11, I had been an FBI agent for over 20 years. My main responsibilities by then were teaching criminal procedure to FBI agents and other law enforcement officers, mostly about 4th Amendment search and seizure, 5th and 6th Amendment law of interrogation, right to attorney and constitutional protection of rights to “free speech”, due process, habeas corpus, and against cruel and unusual punishment. A week before 9-11, I and the rest of the FBI’s ethics instructors were mandated (as a result of an earlier public FBI scandal) to give a one hour PowerPoint presentation, a form of remedial training on “law enforcement ethics” [serve and protect; not harass and create] which I accomplished in a fairly perfunctory way, just reading the slides.

After 9-11, with the knowledge I had of the bitter internal dispute inside the FBI that was being hushed up but had kept some of our better agents from possibly uncovering more of the 9-11 plot before it happened, I couldn’t forget two of the slides in that Law Enforcement ethics curriculum: “DO NOT: Puff, Shade, Tailor, Firm up, Stretch, Massage, or Tidy up statements of fact.” And “Misplaced Loyalties: As employees of the FBI, we must be aware that our highest loyalty is to the United States Constitution. We should never sacrifice the truth in order to obtain a desired result (e.g. conviction of a defendant) or to avoid personal or institutional embarrassment.”

===snipped===>http://norcaltruth.org/2009/07/14/whistleblower-coleen-rowley-ex-fbi-agent/

Let me therefore simply repeat the request I made to the Senate Judiciary Committee in June 2002: “Foremost, we owe it to the public, especially the victims of terrorism, to be completely honest. I can only imagine what these crime and terrorism victims continue to go through. They deserve nothing but the complete, unfettered truth.”

Therefore, I fully support the 9/11 families, first responders, survivors and over 60,000 other New Yorkers who have endorsed a new 9/11 investigation in New York City as advanced by ballot referendum this coming November election.

Coleen Rowley is a former FBI staff attorney who turned whistle-blower after witnessing repeated failures within the bureau to properly investigate alleged 9/11 co-conspirator Zacarias Moussaoui. She was one of 'three' Time Magazine Persons of the Year in 2002.

Yo PeRpS....listen up...from one of your own!!! Thanks goes out to Coleen Rowley for her courage, sacrifice and ethics :)

For emphasis, as more and more of our government services are contracted out 'WE' can expect the 'status quo' to move toward more $$$ 'unconstitutional based' oversight and ethics. This is the cancer that is destroying our country and world!!!

See: Posting 'UnDeR CoNtRaCt - ArMy Of DoLlAr$$$'

http://theominousparallels.blogspot.com/2009/06/under-contract-army-of-dollar.html

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!


Love "Light" and Energy

_Don

References:

[Related: Justice officials won’t take oath before briefing] Liers are U.S. 

http://rawstory.com/2009/10/justice-officials-wont-take-oath-before-briefing/

[9/11 Summary]

http://www.911summary.com/

[Related: Remote In-Flight Course Changes Facilitated By 9/11 Model Aircraft Circa 2001]

http://911truth.org/article.php?story=20090827134112250

[Private military connections to Al Qaeda revealed]

http://rolandsanjuan.blogspot.com/2009/08/private-military-connections-to-al.html

[Demolition access to the World Trade Center towers: Part one - Tenants]

http://www.911truth.org/article.php?story=20090713033854249

[Demolition Access To The WTC Towers: Part Two - Security]

http://www.911truth.org/article.php?story=20090813150853871

[The Real Grand Chessboard and the Profiteers of War]

http://www.911truth.org/article.php?story=20090814135929557

[Former FBI Translator: Bin Laden Worked for U.S. Right Up Until 9/11]

http://norcaltruth.org/2009/08/01/former-fbi-translator-bin-laden-worked-for-u-s-right-up-until-911/

[Cindy Sheehan Supports a New Investigation into the 9/11 attacks]

http://cindysheehanssoapbox.blogspot.com/2009/07/cindy-sheehan-supports-new.html

In Memory Of Joey Doyle

http://www.joeydoyle.com/home.html

[Related: A Vulgar Betrayal]

http://www.laweekly.com/2004-08-26/news/a-vulgar-betrayal

http://patriotsquestion911.com/

http://nyccan.org/petition.php





Dedication to 9/11


Power Downs, Evacuations, Weeks Before 911

NYC CAN Update 911 Family Member Speaks Out


Saturday, July 11, 2009

CoUrT To DeFeNdAnT - StOp BlAsTiNg ThAt MaN’s MiNd

By David Hambling

Late last year, James Walbert went to court, to stop his former business associate from blasting him with mind-altering electromagnetic radiation. Walbert told the Sedgwick County, Kansas panel that Jeremiah Redford threatened him with “jolts of radiation” after a disagreement over a business deal.

Later, Walbert, said, he began feeling electric shock sensations, hearing electronically generated tones, and getting popping and ringing sounds in his ears. On December 30th, the court decided in Walbert’s favor, and issued a first-of-its-kind order of protection, banning Redford from using “electronic means” to further harass Walbert. No, seriously.

I recently took part in a BBC Radio 4 program, which took a light-hearted look into the “the real Manchurian Candidate” — and examined whether there is any truth in stories of mind control. It gave me a chance to talk about exotic non-lethal weapon concepts like the so-called telepathic raygun, the system which beams sound directly into your skull, and the “voice of god” talking fireball. Most of these projects are just lab experiments, or examples of Powerpoint engineering. But in some legal, policy, and business circles, electromagnetic brain assaults are being taken seriously.

Walbert’s cause is supported by Jim Guest, a Republican member of the Missouri House of Representatives. He’s working on proposed legislation to addresses electronic harassment, including a bill against the forced implantation of RFID chips.

The U.N. is also now taking the possibility of electromagnetic terrorism against people seriously. And for the first time this year’s European Symposium on Non-lethal Weapons included a session on the social implications of non-lethal weapons, with specific reference to “privacy-invasive remote interrogation and behavioral influence applications.” Those who believe they are being targeted are getting a bit of official recognition.

All TIs take note how this article make light of and still pushes the modality of 'myth' concerning the abhorrent torture resulting from our governments use of Direct Energy Weapons and Psychological Operations that's destroying lives here in the U.S. and abroad hidden from the public view.

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don=============================================>>>TIs Connect The D.O.T.S.

Release the classified version....I DARE YOU!!!

Reference: 

[Related: We Have met The Nazis, And They Are U.S.]

http://www.informationclearinghouse.info/article23424.htm

[CIA doctors, psychologists participated in torture of prisoners]

http://www.inteldaily.com/news/173/ARTICLE/11725/2009-09-04.html

[What is the CIA Still Hiding about Interrogations?]

http://www.informationclearinghouse.info/article23427.htm

[Joint Non-Lethal Weapons Program]

http://www.au.af.mil/au/aul/bibs/nonlethal08.htm

[US Govt Spy Program: Main Core, PROMIS and the Shadow Government:]

http://www.opednews.com/articles/Main-Core-PROMIS-and-the-by-Ed-Encho-090131-275.html
http://www.opednews.com/articles/US-Govt-Spy-Program--Main-by-Ed-Encho-090201-885.html
http://www.opednews.com/articles/US-Spying--Main-Core-PRO-by-Ed-Encho-090202-224.html
http://www.opednews.com/populum/diarypage.php?did=13835

[CIA Claims of Cancelled Campaign are Hogwash]

http://www.mathaba.net/news/?x=621136

[EFF: Inspectors General Report on Warrantless Wiretapping]

http://www.eff.org/deeplinks/2009/07/inspectors-general-r

http://www.eff.org/files/unclassified_psp_report.pdf'

[CIA Assassin Program Could Operate Anywhere -- Even Inside U.S...THE BIG DUH!].

http://www.globalresearch.ca/index.php?context=va&aid=14431

http://tpmmuckraker.talkingpointsmemo.com/2009/07/report_cia_assassin_program_could_operate_anywhere.php

[Related: Cheney Is Linked to Concealment of C.I.A. Project]

http://www.nytimes.com/2009/07/12/us/politics/12intel.html?_r=2&hp

http://groups.google.com/group/ffchs-daily-harassment-log/web/court-recognizes-electronic-harassment-in-stalking-protection-order-for-james-walbert?pli=1

[Online Journal Special Report]

http://onlinejournal.com/artman/publish/article_4878.shtml

Special "Q Group" security wing inside US National Security Agency

Monday, July 6, 2009

NSA SeCuRiTtY RuNnInG AmOk to Plug LeAkS AbOuT 9/11

by Wayne Madsen

WMR has learned that the National Security "Q" Group, responsible for security, has grown to an immense security and counter-intelligence force, with an estimated one thousand government employees, contractors, and paid informants. [Wayne, it's much larger than just a thoursand!!!]

NSA's Security force is reportedly primarily tasked with plugging any leaks of classified or other information that points to U.S. government involvement with the terrorist attacks on September 11, 2001.


NSA Security has doggedly pursued a number of NSA employees, some in "sting" operations, others in frequent polygraphs and repeated security interviews where threats are made by thuggish NSA security agents with and without the presence of FBI agents, and others in constant surveillance operations at their homes, churches, and other locations away from the Fort Meade, Maryland headquarters of the agency.

NSA's Security chief is Kemp Ensor III. Ensor has built up what amounts to a massive law enforcement and intelligence agency in Maryland that operates as a virtual independent operation that answers to no one. Maryland's congressional delegation has shown little interest in oversight over the security operation.

In fact, WMR has learned that many NSA employees, aware of the political and other misuse of their agency by the Bush-Cheney administration, avidly backed Barack Obama for President hoping that the past era when NSA complied with te Foreign Intelligence Surveillance Act (FISA) and the Fourth Amendment of the Constitution would be restored.

However, many NSA employees are bitterly disappointed that Obama has done nothing to curtail not only the widespread surveillance of the communications of law-abiding Americans but the constant "Stasi-like" harassment and surveillance conducted by Ensor's team of agents and confidential informants.

Even former NSA employees and contractors are being subjected to continual NSA Security surveillance and harassment at their work places and other locations, according to WMR's sources. Some have lost their jobs as a result of pressure from NSA Security.

NSA Security is also able to utilize the agency's most sophisticated electronic surveillance systems to monitor the activities of journalists. The cell phones of journalists are routinely used as listening devices, even when turned off. And what was considered a sure-fire method of avoiding having a cell phone used as a transmitter, removing the batteries in what has become known as "batteries out" conversations, is no longer safe.

Even when the batteries are removed, the global positioning system (GPS) chip in cell phones continues to have enough residual power that two to three pings from satellites can give away a person's location and what other uniquely-identifiable cell phone are at the same location.

The bottom line is that a number of NSA personnel who were on duty in the months leading up to 9/11, the day of the attacks, and subsequent weeks and months are aware of undeniable facts that point to a massive cover-up by the Bush-Cheney administration of the circumstances surrounding 9/11, including what actually befell United Airlines flight 93 and who was issuing direct military orders from the White House.

Let us not forget the offices @ SAIC, located beside Dullas International Airport were empty on the morning of 11th of September 2001.

The Obama administration, rather than lessen the pressure on the NSA personnel, has turned up the heat and is resorting to even more draconian methods to ensure silence. The word from inside NSA is that a state of fear exists and the mission of the agency, to conduct surveillance of foreign communications to provide threat indications and warnings to U.S. troops and policy makers and protect sensitive U.S. government communications from unauthorized eavesdropping is suffering as a result.

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[9/11 Summary]

http://www.911summary.com/

[Related: Remote In-Flight Course Changes Facilitated By 9/11 Model Aircraft Circa 2001]

http://911truth.org/article.php?story=20090827134112250

[Video: Special “Q Group” security wing inside US National Security Agency]

http://dprogram.net/2009/07/11/video-special-q-group-security-wing-inside-us-national-security-agency/

[Related: Bush’s Secret NSA Spying May Have Tainted Prosecutions, Report Warns]

http://www.wired.com/threatlevel/2009/07/psp/

[EFF: Inspectors General Report on Warrantless Wiretapping]

http://www.eff.org/deeplinks/2009/07/inspectors-general-r

http://www.eff.org/files/unclassified_psp_report.pdf

SPECIAL REPORT. The 9/11 "dogfight" over rural Pennsylvania

http://milfuegos.blogspot.com/2009/07/special-report-911-dogfight-over-rural.html

Online Journal Special Report:

http://onlinejournal.com/artman/publish/article_4878.shtml

NSA Security running amok to plug leaks about 9/11

http://www.waynemadsenreport.com/articles/20090703_2

4th of July Madsen Report: High Treason at NSA

http://truthjihad.blogspot.com/2009/07/4th-of-july-madsen-report-high-treason.html

911 - The Ultimate Truth

WACLA delivers proof of TREASON to members of Congress

Sunday, July 5, 2009

BiOiNiTiAtIvE RePoRt

A Rationale for a Biologically-based Public Exposure Standard
for Electromagnetic Fields (ELF and RF)


A little dated, but, excellent info concerning the dangers of ELF/RF frequency etc.

Public health concerns and scientific evidence for risks from cell phones and other wireless devices is published today in the journal Pathophysiology. International researchers have urged quick precautionary action (see Section 17 of the BioInitiative Report) to address a possible epidemic of brain tumors and many other health risks. Over four billion people around the world now use cell phones. They are rapidly eliminating the use of traditional land-line phones throughout the world. Health researchers from six countries give findings in fifteen (15) chapters covering health risks to humans and wildlife from electromagnetic fields and radiofrequency radiation.

The global rollout of wireless technologies and devices like cell phones, cordless phones, cell towers (masts) and many other sources greatly increases our EMF exposure in daily life. The enormous popularity of new communication devices that allow email, texting, and access to the Internet from any city street has placed the issue squarely before government agencies like the FDA and the FCC, and also parents and school administrators. Parents must decide whether possible health risks to their children outweigh the convenience of keeping track of them. School officials and teachers care because of disruption and distraction in the classroom from cell phone use. National safety officials in the US face public criticism about highway collisions and road deaths from cell phone use while driving. Federal railway officials are still coping with the problem of illicit texting by US railroad personnel that lead to the catastrophic collision of two trains in Chatsworth, California in 2008 killing 24 and injuring 135 more.

Research professor and Editor Martin Blank PhD (Associate Professor, Columbia University College of Physicians and Surgeons) says, “This special issue of Pathophysiology is about the human body’s sensitivity to EMF signals in the environment, e.g., EMF effects on DNA, effects on the brain from cell phone radiation, and how EMFs in the environment may lead to Alzheimer’s disease, dementia and breast cancer. The scientific evidence tells us that our safety standards are inadequate, and that we must protect ourselves from exposure to EMF due to power lines, cell phones and the like.”

Reba Goodman, PhD (Columbia University) reports that, “Cells in the body react to EMFs as potentially harmful, just like to other environmental toxins including heavy metals and toxic chemicals. The DNA in living cells recognizes electromagnetic fields at very low levels of exposure, and produces a biochemical stress response.”

David O. Carpenter, MD and Director of the University of Albany, Institute of Health and the Environment concludes, “The existing FCC and international limits do not do enough to protect people, especially children, from daily exposures to electromagnetic fields and radiofrequency radiation. The existing safety limits did not anticipate these new kinds of technologies affecting the health of people living with and using wireless devices on a daily basis. These effects are now widely reported to occur at exposure levels significantly below most current national and international limits.”

===snipped===>"And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

Full Report: http://www.scribd.com/doc/17113598/Bio-Initiative-Report

Protect Yourself from Electromagnetic Radiation (EMR) Petiton:

http://petition.next-up.org/sign-petition-uk.html

April 9, 2009 - BioInitiative Working Group Letter to Dr. Andrzej Rys, Director of Public Health, European Commission, Directorate-General's Office:

http://www.bioinitiative.org/press_release/docs/dr_andrjez_rys_1.pdf

March 12, 2009 - Orebro University Hospital; Orebro, Sweden; Columbia University, New York: University of Albany, New York; Karolinska Institute, Sweden. International Scientists Find Harmful Effects from Wireless Technologies and Urge New Safety Rules for Cell Phones (This link opens a WORD document containing the press release below. The link to the Pathophysiology Web site is at the end of this document.):

http://www.bioinitiative.org/press_release/docs/pathophysioloigy_12_mar_09.doc

TOPs Blogger Role