FOIA Request on FLight 370 Refused

bama’s NSA refuses FOIA request on Malaysia flight 370 on grounds of classified info

It is now one month 18 days since Malaysia Airlines flight 370, with 227 passengers and 12 crew members on board, disappeared.

Repeated searches in the south Indian Ocean 2,000 miles southwest from Perth, Australia have found nothing. Speculations abound as to what really happened to MH 370, from the plausible to the bizarre, including:

  • The plane actually landed in Pakistan.
  • The plane actually landed on the U.S. military base on the island of Diego Garcia in the Indian Ocean.
  • Muslims or Iran hijacked the plane.
  • The Israelis hijacked the plane, which (or a plane identical to MH 370) is now in the Tel Aviv airport, to be used in another fake 9-11 attack. (H/t FOTM’s josephbc69)
  • The U.S. military shot down the plane.
  • The Chinese shot down the plane.

All along, I’ve maintained that, given U.S. satellites and the National Security Agency’s (NSA) massive surveillance capabilities, the Obama administration knows precisely what had happened to MH 370, but is not telling. Notice that at no time has the White House offered its radar and satellite tracking information to help in the search.

Now we have evidence that the NSA indeed knows but isn’t telling.

On March 24, 2014, the gutsy and indefatigable attorney Dr. Orly Taitz made a Freedom of Information Act (FOIA) request to the NSA for any and all documents relating to missing Malaysian Flight MH 370.

This is the letter Dr. Taitz received in response (click image to enlarge):

NSA FOIA1Here’s the most important paragraph in the NSA’s letter:

We have determined that the fact of the existence or non-existence of the materials you request is a currently and properly classified matter in accordance with the Executive Order 13526, as set forth in Sub-paragraph (c) of Section 1.4. Thus your request is denied pursuant to the first exemption of the FOIA which provides that the FOIA does not apply to matters that are specifically authorized under criteria established by an Executive Order to be kept order in the interest of national defense or foreign relations and are, in fact properly classified pursuant to such Executive Order.

Taitz points out that “Typically when the government does not have any records, it would respond to FOIA request attesting that there are no records in question, however this is not what happened in the case at hand. NSA did not deny existence of the documents, but stated that it is classified.

Executive Order 13526 – Classified National Security Information was issued by Barack Obama on December 29, 2009. Here’s EO 13536′s Section 1.4, Sub-paragraph c:

Sec. 1.4.  Classification Categories.  Information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security in accordance with section 1.2 of this order, and it pertains to one or more of the following:

(c)  intelligence activities (including covert action), intelligence sources or methods, or cryptology;

~Eowyn

from:    http://fellowshipoftheminds.com/2014/04/26/obamas-nsa-refuses-foia-request-on-malaysia-flight-370-on-grounds-of-classified-info/

SIgns of Change

 

10 Signs The Global Elite Are Losing Control

Last updated on April 3, 2014 at 12:00 am EDT by in5d Alternative News

by Eric Blair

Karma is coming for the elite in a big way. As the Powers That Be head toward a devastating defeat in their war plans for Syria, signs are emerging that their rule over humanity is rapidly diminishing.

Over the last decade the global elite have been on a mad dash to consolidate power over the world. It’s always been their plan like some evil villain in a comic book, but after 9/11 the plan went into overdrive and then turbo charged during the financial crisis of 2008.

Yet it’s doomed to fail because humans are meant to be guided by their own free will, not controlled like livestock. The more the elite try to control humanity, the more entropy occurs. Entropy, for those who don’t know, is the lack of order or predictability; a gradual decline into disorder.

Although the elite still enjoy a huge wealth advantage over the masses, they are now resigned to behaving like tyrants to maintain control. This, in turn, exposes their dark side which has been cleverly concealed for ages. Not anymore.

People are waking up in droves, at least as fast as the elite can build their full-spectrum prison matrix. Let them try. To paraphrase Victor Hugo, “No army can stop an idea whose time has come.

Here are ten signs that the elite are losing control over the people

1. Official lies no longer effective: The lies they tell simply don’t work anymore. There was a time when official lies, especially about war and peace, were believed. Because, after all, how evil would it be to lie about such things? Generally people want to believe they are being told the truth when life and death is at stake. The boy who cried wolf has cried one too many times. Even if they told the truth at this point, very few would believe them.

2. No confidence in politics: US politicians have a paltry approval rating. The trust in government is at all-time lows here and around the world. Mainstream polls show only 10% of the public has confidence in Congress. In other words, 90% don’t believe in them to be competent to govern.

Watch this Town Hall exchange below where a man threatens US Senator John McCain with arrest for treason to his face. This would have never happened just a year or two ago:

3. No confidence in media: The most recent polls show that 77% of the population no longer trusts corporate TV news. Is it any wonder why the establishment media failed to sell the lies about the alleged Syria chemical event? With all their monopoly might over the airwaves, they can no longer claim that black is white simply because officialdom says so.

4. Bankers rejected: Hungary recently became the first country to follow Iceland’s lead by shedding international bankers (IMF) and is considering pursuing prosecution of past prime ministers who enslaved the people with debt.

Look for this trend to continue even if nations decide to default to break free.

5. Vatican abruptly cleaning up its act: Under the previous Pope, Pope Benedict, scandals erupted from the Vatican ranging from covering up pedophile priests to money laundering and fraud. Benedict, in an unprecedented move, abruptly retired to make way for a seemingly much more likable Pope Francis. Pope Francis by all measures is working furiously to reclaim the church’s peaceful and humble reputation. Whether this is genuine or a PR move, it’s telling that the church was forced into such a drastic turnaround to save itself from losing all credibility.

6. Mutiny among soldiers: Finally. Soldiers, who are outlawed from making political statements, are steadily speaking out against US military adventurism. As Einstein famously said “The pioneers of a warless world are the young men (and women) who refuse military service.”

7. Militarized police state: One of the darkest signs that the elite are losing their grip on power is the construction of the militarized police state specifically trained to combat domestic civil unrest. Local cops with tanks and other combat gear are working with Feds at Fusion centers, active Army units are on American soil for the first time in history, the NSA spy grid is being used by the IRS and DEA, and the elimination of due process for Americans under the NDAA are just some of the tyrannical moves made to secure the elite criminals from public backlash. They’re clearly scared, and they should be given what they’ve done to the American people and the Constitution.

8. Serious secession movements everywhere: A state seceding from a larger political entity used to be an ultra-fringe concept, until now. In America, secession movements are winning over the public in parts of Colorado and California. In Europe, serious secession movements are happening in Spain and Scotland, as well as several EU nations flirting with the idea of dropping out of the euro. Decentralization = Entropy!

9. GMO food being rejected everywhere: Control the food and you control the people. True in theory, but much more difficult in practice. GMO leaders like Monsanto are being exposed. All of their economic and political strength cannot defeat the spread of knowledge about the dangers of pesticide-soaked Frankenfoods. GMO fields are being burned in protest in America and around the world, informed nations continue to reject their products, and labeling laws are gaining traction.

10. Cannabis liberation: Many reading this will think marijuana legalization is a superficial development. However, it is a major signpost that the elite’s grip is fading. Enormous resources have been spent to keep cannabis illegal. Cannabis has been a powerful medicine for physical, mental, and spiritual health throughout the ages. This single plant represents a huge threat to the power structures and their industries, hence its seemingly senseless illegality. The approaching global reversal of the tyrannical policy of prohibition is the first of many concessions to come.

from:    http://in5d.com/10-signs-the-global-elite-are-losing-control.html

NSA Plans to Infect Computers described

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

By and 622
Featured photo - How the NSA Plans to Infect ‘Millions’ of Computers with Malware One presentation outlines how the NSA performs “industrial-scale exploitation” of computer networks across the world.

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”

“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”

The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”

 

“Owning the Net”

The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.

to read the rest of the article, go to:    https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/

 

Here is a link to a related video FYI:

https://firstlook.org/theintercept/document/2014/03/17/nsa-secretly-masqueraded-facebook-hack-computers-surveillance/

Snowden Docs REport UFO’s

Leaked document confirms report linking Edward Snowden to UFOs, Feb 2014, UFO Sighting News.

Date of discovery: February 2014
Source: Edward Snowden documents
URL: http://www.examiner.com/article/leaked-document-confirms-2013-examiner-report-linking-edward-snowden-to-ufos
Examiner States:
In a stunning development published on February 24, 2014, the Intercept has released three UFO images as part of a 50-slide PowerPoint presentation from what it describes as the Edward Snowden archives of secret files allegedly stolen from the NSA. Publication of “The Art of Deception: Training for a New Generation of Online Covert Operations” now offers independent third-party evidence linking the self-styled surveillance program whistleblower to UFOs in support of claims that first appeared in an internationally syndicated news article released over seven months earlier. (Click Here to read more at source).

Posted by at

from:    http://www.ufosightingsdaily.com/2014/03/leaked-document-confirms-report-linking.html

Math, Power, & the Language of the Universe

Math: Your Secret Weapon Against Wall Street and the NSA

Edward Frenkel wants you to understand mathematics so economists, bankers, corporations, and intelligence agencies can’t manipulate you anymore.

—By and

| Fri Feb. 28, 2014
Edward Frenkel. Elizabeth Lippman

As Edward Frenkel sees it, the way we teach math in schools today is about as exciting as watching paint dry. So it’s not surprising that when he brings up the fact that he’s a mathematician at dinner parties, eyes quickly glaze over. “Most people, unfortunately, have a very bad experience with mathematics,” Frenkel says. And no wonder: The math we learn in school is as far from what Frenkel believes is the soul of mathematics as a painted fence is from “The Starry Night” by Van Gogh, Frenkel’s favorite painter.

The Russian born University of California-Berkeley mathematician, whose day job involves probing the connections between math and quantum physics, wants to change that. Rather than alienating drudgery, Frenkel views math as an “archipelago of knowledge” that’s universally available to all of us, and he’s been everywhere of late spreading the word. In particular, Frenkel is intent on warning us about how people are constantly using (or misusing) math to get our personal data, to hack our emails, to game our stock markets. “The powers that be sort of exploit our ignorance, and manipulate us more when we are less aware of mathematics,” said Frenkel on the latest episode of the Inquiring Minds podcast. If you hated math in high school, maybe that will catch your attention.

Frenkel’s paean to math begins with an emphasis on its unifying nature. To him, math—not religion—is the one shared body of firm, unchanging knowledge that we all possess and that nobody can ever take away from us. “You meet someone, you don’t know where they come from, what language they speak, what is their background,” he says. “But you already know that there is so much you have in common, because all the mathematical ideas that have ever been discovered, we all share them.” If you met an alien intelligence, the same would be true. Math never changes. It sometimes has discoverers, but never authors or owners. “It’s a great equalizer,” Frenkel says.

The implications of math’s universality, incidentally, are downright spooky. Take this New York Times essay by Frenkel, contemplating whether the fact that math works so perfectly and without fail suggests we might be living in a Matrix-like simulation. For a while, it was the most viewed article on the paper’s website. The question of why math works to describe the universe, even as we also just happen to have brains that can understand it, is a pretty momentous one. Or as Galileo put it:

Philosophy is written in this grand book, the universe, which stands continually open to our gaze. But the book cannot be understood unless one first learns to comprehend the language and read the letters in which it is composed. It is written in the language of mathematics, and its characters are triangles, circles, and other geometric figures without which it is humanly impossible to understand a single word of it; without these, one wanders about in a dark labyrinth.

Such contemplations have driven more than one scientist to God. But then, hey, it could just be Agent Smith.

Deep philosophical dives aren’t Frenkel’s only approach to math popularization: His leading approach is egalitarian. Liberal. He argues that today, and often to our peril, we leave the tough math to experts—whether they are working on quantum physics, stock market trajectories, or encryption systems that are supposed to protect our data.

But our mathematical illiteracy can have disastrous consequences. Case in point: Frenkel blames the global economic crisis of 2008-09 on inadequate mathematical models used by bankers and traders to predict the financial markets. “We should all have access to the mathematical knowledge and tools needed to protect us from arbitrary decisions made by the powerful few in an increasingly math-driven world,” writes Frenkel in his book, Love and Math: The Heart of Hidden Reality. “Where there is no mathematics, there is no freedom.”

Or take another example: Last year in Slate, Frenkel explained how the NSA manipulated math in order to install secret “backdoors” in the encryption systems that are supposed to protect our data. That’s what allows the agency to hack into our emails and personal information. The math is very high level, involving a field called “elliptic curve cryptography,” but in this highly watched YouTube video Frenkel explains it pretty simply:

Or take yet another example of people using math to take advantage of us. Frenkel has also explored how attempted changes to the formula for calculating the consumer price index, or CPI—a measure of inflation that is crucial to any number of economic policies and decisions—in effect represent a stealth way to raise our taxes and cut Social Security benefits. But we just shrug because it’s math, says Frenkel. “I’m not even going to try to understand what this formula is,” he says, summing up the typical thought process. “If they’re telling me it should be replaced, it should be replaced.”

In other words, you might call it the politically progressive, look-out-for-the-little-guy case for math literacy. “Mathematics equals rigor plus intellectual integrity times reliance on facts,” adds Frenkel in his book.

Certainly, Frenkel makes a strong case that going through the world in a math-illiterate state is equivalent to having your defenses down. You won’t understand the algorithms that Facebook, Amazon, and Google are using to populate your screen with stuff they want you to buy. You won’t know how safe you are on the internet. And you won’t see the next big economic shenanigan coming until it’s too late.

But the question is, is such understanding really possible or plausible for most people? Most of us think that in order to truly appreciate the mysterious beauty of mathematics, we need to study it intensely for a long period of time. Not so, insists Frenkel. While most of us learn the basics of biology in school and have at least a rudimentary understanding of fundamental concepts like genetics and evolution, we generally don’t even know what the fundamental concepts of high-level mathematics are. But Frenkel insists that we need not suffer through years of math study to grasp the key mathematical ideas. Rather, we can learn “a few chords,” he says, just as we can on the guitar.

So here comes one of those chords: Frenkel thinks that rather than learning something ancient and dry like Euclidean geometry, we should all understand the principle of symmetry. It’s a very simple idea, but also a concept that is “incredibly powerful,” says Frenkel, and one that is relevant across geometry, algebra, and other aspects of math. An object is symmetrical insofar as it is the same no matter what you do to it; it is invariant despite transformations. Like a round glass: “If I turn away, and you rotate it, and I look back, I will not know the difference,” says Frenkel.

Symmetry may seem like a simple idea. But the mathematics of symmetry quickly grow elaborate, and thinking about symmetry actually played an important role in the discovery of quarks, the elementary particles that comprise protons and neutrons.

Certainly, symmetry is not the kind of thing that you learned in your boring high school math classes; and for Frenkel, that’s the problem. “What most people talk about when they say the word ‘math’ is not really math—it is painting fences,” says Frenkel. Not only is that a tragedy, it’s a disadvantage.

And that’s why you should care about math. Forget the idea that it’s alienating and hard. According to Frenkel, life is hard without it.

To listen to the full podcast interview with Edward Frenkel, you can stream below:

(Check out link for podcast)

This episode of Inquiring Minds, a podcast hosted by neuroscientist and musician Indre Viskontas and best-selling author Chris Mooney, also features a discussion about whether offshore wind farms can protect our coasts from hurricanes, and new insights on the possible physical location of memory within the brain.

from:    http://www.motherjones.com/environment/2014/02/inquiring-minds-edward-frenkel-math-doesnt-suck

Feb 11 – Take A Stand Against Surveillance

Feb. 11 Is ‘The Day We Fight Back’ Against NSA Surveillance

The Huffington Post  | by  Alexis Kleinman

More than 5,300 web-based companies and other organizations, including Reddit, Imgur, Tumblr, Mozilla the Electronic Frontier Foundation and the American Civil Liberties Union, have joined forces to protest National Security Agency surveillance on Feb. 11.

“In January 2012 we defeated the SOPA and PIPA censorship legislation with the largest Internet protest in history,” the site’s letter to Internet users reads. “In celebration of the win against SOPA and PIPA two years ago, and in memory of one of its leaders, Aaron Swartz, we are planning a day of protest against mass surveillance, to take place this February 11th.”

The “The Day We Fight Back” website urges webpage owners to add a banner to their websites directing people to contact legislators by phone and email. The organization is also trying to manufacture memes to be shared on Facebook and Twitter for the event.

the day we fight back

the day we fight back

the day we fight back

the day we fight back

Such Internet-based protests have one major precedent in the U.S. On Jan. 18, 2012, over 8,000 websites went dark for 12 hours in protest of a pair of bills being debated in U.S. Congress that would have allowed copyright holders to shut websites down without a trial. Both the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) died in committee in the wake of protests.

Organizers of this week’s event plan to commemorate Internet freedom activist Aaron Swartz, who was instrumental in the SOPA and PIPA protests. He was indicted on charges of giving non-subscribers free access to articles on JSTOR in 2011 and took his own life two years later.

from:    http://www.huffingtonpost.com/2014/02/10/the-day-we-fight-back_n_4759693.html

NSA Quantum Computer

NSA Reportedly Building Quantum Computer

Jan 3, 2014 12:25 PM ET // by FoxNews.com

View Related Gallery »
Such a machine would open the door to cracking the strongest encryption tools in use today.Brooks Kraft/Corbis

The National Security Agency is reportedly racing to build a computer that will be able to break almost every kind of encryption used to protect medical, banking, business and government records around the world.

According to documents provided by NSA whistle blower Edward Snowden, a $79.7 million research program titled “Penetrating Hard Targets” includes a project to build a “cryptologically useful quantum computer” — a machine considerably faster than classic computers, the Washington Post reported Thursday.

The implications of the NSA building a quantum computer are far reaching. Such a machine would open the door to cracking the strongest encryption tools in use today, including a standard known as RSA that scrambles communications and make them impossible to read for anyone except the intended recipient. RSA is commonly used in Web browsers for encrypted emails and secure financial transactions.

The development of such a machine has long been a goal of many in the scientific community, and would have revolutionary implications for fields like medicine as well as for the NSA’s code-breaking mission.

The NSA reportedly sees itself as in a race with European Union and Swiss sponsored quantum computing labs.

Quantum Encryption Goes Mainstream

“The geographic scope has narrowed from a global effort to a discrete focus on the European Union and Switzerland,” one NSA document says, according to the Washington Post.

The Snowden documents also indicate that the NSA has been carrying out a part of its research in large shielded rooms designed to prevent electromagnetic energy from leaking. The rooms are required in order to keep quantum computing experiments running.

from:    http://news.discovery.com/tech/gear-and-gadgets/nsa-reportedly-building-quantum-computer-140103.htm

US Border Guards Checking/Copying Laptop Files

U.S. border guards may check, copy laptop files

Jan. 1, 2014 at 12:30 AM   |   1 comments
NEW YORK,    Jan. 1 (UPI) — U.S. border guards have a right to inspect and copy files from travelers’ laptops and other devices without reasonable suspicion of wrongdoing, a judge ruled.

Such searches are rare, with “about a 10 in a million chance” of happening, so “there is not a substantial risk” someone’s laptop, cellphone or other device will be searched and seized at the nation’s borders, including at airports and on trains, U.S. District Judge Edward R. Korman wrote.

But for people whose devices do get searched, the government doesn’t need reasonable suspicion to examine or confiscate them, he wrote, citing case law that holds “searches at our borders without probable cause and without a warrant are nonetheless ‘reasonable.'”

In making his ruling, Korman, of the U.S. District Court for the Eastern District of New York in Brooklyn, dismissed a lawsuit by graduate student Pascal Abidor, an Islamic studies scholar and a dual French-U.S. citizen, who had his laptop inspected and taken by U.S. Customs and Border Protection officers in May 2010 while he was on an Amtrak train from Montreal to New York.

The officers also handcuffed him, placed him in a cell and questioned him for several hours, the New York Times said.

The law enforcement agency, part of the U.S. Department of Homeland Security, returned the laptop 11 days later.

Abidor could prove no legal injury from the laptop’s confiscation, the Washington Post said.

The National Association of Criminal Defense Lawyers and the National Press Photographers Association joined Abidor in the case, arguing their members travel with confidential information that should be protected from government scrutiny.

Represented by the American Civil Liberties Union, they all alleged the policy violated their rights to privacy and free speech.

“While it is true that laptops may make overseas work more convenient, the precautions plaintiffs may choose to take to ‘mitigate’ the alleged harm associated with the remote possibility of a border search are simply among the many inconveniences associated with international travel,” wrote Korman, who is also a visiting judge on the 9th U.S. Circuit Court of Appeals in California.

That court ruled in March extensive “forensic” searches required reasonable suspicion of criminal activity, but simple checks of photos and other files did not. Korman was not one of the judges in that case.

The ACLU said it was considering an appeal.

Catherine Crump, the ACLU attorney who argued the case in July 2011, said in a statement the searches Korman’s ruling addressed were “part of a broader pattern of aggressive government surveillance that collects information on too many innocent people, under lax standards and without adequate oversight.”

Homeland Security spokesman Peter Boogaard said, “These checks are essential to enforcing the law, and protecting national security and public safety, always with the shared goals of protecting the American people while respecting civil rights and civil liberties.”

Read more: http://www.upi.com/Top_News/US/2014/01/01/US-border-guards-may-check-copy-laptop-files/UPI-57721388554200/#ixzz2pBIvIANL

Raune Kilde on Microchipping, Mind Control, etc.

Microchip Implants, Mind Control, and Cybernetics

Microchip Implants, Mind Control, and Cybernetics

Story by: Rauni Kilde

In 1948 Norbert Weiner published a book, Cybernetics, defined as a neurological communication and control theory already in use in small circles at that time. Yoneji Masuda, “Father of the Information Society,” stated his concern in 1980 that our liberty is threatened Orwellian-style by cybernetic technology totally unknown to most people. This technology links the brains of people via implanted microchips to satellites controlled by ground-based supercomputers.

The first brain implants were surgically inserted in 1974 in the state of Ohio, USA and also in Stockholm, Sweden. Brain electrodes were inserted into the skulls of babies in 1946 without the knowledge of their parents. In the 1950s and 60s, electrical implants were inserted into the brains of animals and humans, especially in the U.S., during research into behavior modification, and brain and body functioning. Mind Control (MC) methods were used in attempts to change human behaviour and attitudes. Influencing brain functions became an important goal of military and intelligence services.

Thirty years ago brain implants showed up in X-rays the size of one centimetre. Subsequent implants shrunk to the size of a grain of rice. They were made of silicon, later still of gallium arsenide. Today they are small enough to be inserted into the neck or back, and also intravenously in different parts of the body during surgical operations, with or without the consent of the subject. It is now almost impossible to detect or remove them.

It is technically possible for every newborn to be injected with a microchip, which could then function to identify the person for the rest of his or her life. Such plans are secretly being discussed in the U.S. without any public airing of the privacy issues involved. In Sweden, Prime Minister Olof Palme gave permission in 1973 to implant prisoners, and Data Inspection’s ex-Director General Jan Freese revealed that nursing-home patients were implanted in the mid-1980s. The technology is revealed in the 1972:47 Swedish state report, Statens Officiella Utradninger (SOU).

Implanted human beings can be followed anywhere. Their brain functions can be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea pigs in secret experiments have included prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children, and any group of people considered “marginal” by the elite experimenters. The published experiences of prisoners in Utah State Prison, for example, are shocking to the conscience.

Today’s microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. Such a technique was among a number tested in the Iraq war, according to Dr. Carl Sanders, who invented the intelligence-manned interface (IMI) biotic, which is injected into people. (Earlier during the Vietnam War, soldiers were injected with the Rambo chip, designed to increase adrenaline flow into the bloodstream.) The 20-billion-bit/second supercomputers at the U.S. National Security Agency (NSA) could now “see and hear” what soldiers experience in the battlefield with a Remote Monitoring System (RMS).

When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillimeters) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights, and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be reexperienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads.

Every thought, reaction, hearing, and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures, and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.

The NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just as we have unique fingerprints. With electromagnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24 hours a day.

The Washington Post reported in May 1995 that Prince William of Great Britain was implanted at the age of 12. Thus, if he were ever kidnapped, a radio wave with a specific frequency could be targeted to his microchip. The chip’s signal would be routed through a satellite to the computer screen of police headquarters, where the Prince’s movements could be followed. He could actually be located anywhere on the globe.

The mass media has not reported that an implanted person’s privacy vanishes for the rest of his or her life. She can be manipulated in many ways. Using different frequencies, the secret controller of this equipment can even change a person’s emotional life. She can be made aggressive or lethargic. Sexuality can be artificially influenced. Thought signals and subconscious thinking can be read, dreams affected and even induced, all without the knowledge or consent of the implanted person.

A perfect cyber-soldier can thus be created. This secret technology has been used by military forces in certain NATO countries since the 1980s without civilian and academic populations having heard anything about it. Thus, little information about such invasive mind-control systems is available in professional and academic journals.

The NSA’s Signals Intelligence group can remotely monitor information from human brains by decoding the evoked potentials (3.50 HZ, 5 milliwatt) emitted by the brain. Prisoner experimentees in both Gothenburg,Sweden and Vienna, Austria have been found to have evident brain lesions. Diminished blood circulation and lack of oxygen in the right temporal frontal lobes result where brain implants are usually operative. A Finnish experimentee experienced brain atrophy and intermittent attacks of unconsciousness due to lack of oxygen.

Mind control techniques can be used for political purposes. The goal of mind controllers today is to induce the targeted persons or groups to act against his or her own convictions and best interests. Zombified individuals can even be programmed to murder and remember nothing of their crime afterward. Alarming examples of this phenomenon can be found in the U.S.

This “silent war” is being conducted against unknowing civilians and soldiers by military and intelligence agencies. Since 1980, electronic stimulation of the brain (ESB) has been secretly used to control people targeted without their knowledge or consent. All international human rights agreements forbid non consensual manipulation of human beings — even in prisons, not to speak of civilian populations.
Under an initiative of U.S. Senator John Glenn, discussions commenced in January 1997 about the dangers of radiating civilian populations. Targeting people’s brain functions with electromagnetic fields and beams (from helicopters and airplanes, satellites, from parked vans, neighboring houses, telephone poles, electrical appliances, mobile phones, TV, radio, etc.) is part of the radiation problem that should be addressed in democratically elected government bodies.

In addition to electronic MC, chemical methods have also been developed. Mind-altering drugs and different smelling gasses affecting brain function negatively can be injected into air ducts or water pipes. Bacteria and viruses have also been tested this way in several countries.

Today’s super technology, connecting our brain functions via microchips (or even without them, according to the latest technology) to computers via satellites in the U.S. or Israel, poses the gravest threat to humanity. The latest supercomputers are powerful enough to monitor the whole world’s population. What will happen when people are tempted by false premises to allow microchips into their bodies? One lure will be a microchip identity card. Compulsory legislation has even been secretly proposed in the U.S. to criminalize removal of an ID implant.

Are we ready for the robotization of mankind and the total elimination of privacy, including freedom of thought? How many of us would want to cede our entire life, including our most secret thoughts, to Big Brother? Yet the technology exists to create a totalitarian New World Order. Covert neurological communication systems are in place to counteract independent thinking and to control social and political activity on behalf of self-serving private and military interests.

When our brain functions are already connected to supercomputers by means of radio implants and microchips, it will be too late for protest. This threat can be defeated only by educating the public, using available literature on biotelemetry and information exchanged at international congresses.
One reason this technology has remained a state secret is the widespread prestige of the psychiatric Diagnostic Statistical Manual IV produced by the U.S. American Psychiatric Association (APA) and printed in 18 languages. Psychiatrists working for U.S. intelligence agencies no doubt participated in writing and revising this manual. This psychiatric “bible” covers up the secret development of MC technologies by labeling some of their effects as symptoms of paranoid schizophrenia.

Victims of mind control experimentation are thus routinely diagnosed, knee-jerk fashion, as mentally ill by doctors who learned the DSM “symptom” list in medical school. Physicians have not been schooled that patients may be telling the truth when they report being targeted against their will or being used as guinea pigs for electronic, chemical and bacteriological forms of psychological warfare.
Time is running out for changing the direction of military medicine, and ensuring the future of human freedom.

“We shall no longer hang on to the tails of public opinion or to a non- existent authority on matters utterly unknown and strange. We shall gradually become experts ourselves in the mastery of the knowledge of the Future.” ~Wilhelm Reich

Rauni KildeRauni Kilde
Rauni Kilde, Finnish doctor, and former Surgeon General of Finland, is not only well versed in the medical and veterinary fields, she bears equal acclaim as an author and expert in the fields of UFO-ology, the Paranormal, and mind control. Dr. Kilde is a lecturer and featured speaker at UFO Conferences; she has authored numerous book on all of the above. Currently residing in Norway, to this day Rauni Kilde maintains that there is a secret exchange program between humans and aliens that is being deliberately suppressed by powerful Western governments.

from:    http://spiritofmaat.com/magazine/november-2013-the-heart-of-darkness-edition/microchip-implants-mind-control-and-cybernetics/

NSA Monitoring, yep, Just about Everything

Confirmed: NSA has broken into Google, Yahoo data centers and now monitors all web searches, Gmail

Friday, November 01, 2013 by: J. D. Heyes

NaturalNews) If the reports earlier this summer detailing how the National Security Agency monitors all data passing through the nation’s internet service providers and tech companies was a little too much to digest or accept, that’s understandable.

After all, this is America, right? And the NSA isn’t supposed to be spying on Americans.

Only, it does, as a new report proves beyond any doubt.

According to The Washington Post, the NSA has managed to secretly hack into the main communication links that connect Yahoo! and Google data centers to the rest of the world, as per documents obtained from former NSA contractor-turned-fugitive Edward Snowden, as well as interviews with insider officials.

The paper said:

By tapping those links, the agency has positioned itself to collect at will from among hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.

MUSCULAR, PRISM data collection programs

A top-secret accounting dated Jan. 9, 2013, provided details about how the NSA’s acquisitions directorate sends millions of records daily from Yahoo and Google internal networks to databases located at the agency’s headquarters at Fort Meade, Md.

In the 30 days prior, the report noted, field collectors processed and returned 181,280,466 new records, ranging from “metadata,” which can provide information about who actually sent and received emails and when and content like text, video and audio.

The Post reported:

The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, GCHQ. From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants.

The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.

But apparently, even that access – authorized by the USA Patriot Act – isn’t good enough. Obviously, the NSA wants no oversight of its activities at all.

The Post said the MUSCULAR project looked to be “an unusually aggressive use” of NSA capabilities against American tech companies. To be sure, the NSA is built to conduct high-tech spying, and has a wide range of digital tools at its disposal, but has no previous reputation of using them at will against U.S. firms.

Despite the revelations, no one in government wanted to talk about them on the record. “White House officials and the Office of the Director of National Intelligence, which oversees the NSA, declined to confirm, deny or explain why the agency infiltrates Google and Yahoo networks overseas,” the Post reported.

Privacy? What privacy?

Google released a statement saying the company was certainly “troubled by allegations of the government intercepting traffic between our data centers, and we are not aware of this activity.”

“We have long been concerned about the possibility of this kind of snooping, which is why we continue to extend encryption across more and more Google services and links,” the company said.

A spokeswoman from Yahoo added: “We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency.”

According to earlier releases of top secret information by Snowden, the PRISM program is used by the NSA to gather incredible amounts of online communications records through legal means; tech companies, via warrants issued by the secret FISA court, are compelled to turn over data matching the court’s approved search terms.

That program is authorized under Section 702 of the Foreign Intelligence Surveillance Act.

“Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to ‘full take,’ ‘bulk access’ and ‘high volume’ operations on Yahoo and Google networks,” the Post reported. “Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner.”

In today’s online, interconnected world, America, you have no more privacy. That should be crystal clear by now.

Oh, and the NSA’s spying and data storage capability is only going to increase. The agency is building a massive new facility in Utah for just those purposes, among others: http://nsa.gov1.info.