Author Archives: Bone Fish

Vegas Smoking Gun: Footage shows 17 ambulances pulling bodies out of Hooters the night of the massacre (videos)

Video footage captured the night of the Oct. 1 massacre reveals the LVMPD and FBI are withholding key details about what actually transpired

LAS VEGAS (INTELLIHUB) — On the night of October 1, Youtuber Benjamin Franks and his friend had just grabbed some tacos and were heading back to their hotel room at the MGM when they noticed a separate disturbance at the corner of Las Vegas Blvd and Tropicana Ave.

Fifteen-minutes later, from the leisure of his hotel room, Franks managed to capture bombshell video footage which shows a total of 17 ambulances removing human bodies from Hooters, contradicting the official story told by Clark County Sheriff Joseph Lombardo.

“They are just pulling so many bodies out of that Hooters,” a man’s voice can be heard saying at the 24-second mark. “I don’t know if people are dead — I don’t know if people are just injured — they just keep pullin’ them out though […] something definitely happened at Hooters though.”

“It must have happened at Hooters dude because they are all showing up there,” he said. “It looks like most of them are at Hooters.”

Hooters Casino and Hotel is located at 115 E. Tropicana Ave. which is just northeast of the venue where the Route 91 Music Festival was being hosted.

hooters vegas

The police and FBI are lying

Franks’s footage is absolute proof that the Los Vegas Metropolitan Police Department and the FBI are lying to the general public and have not been forthcoming about all of the events that occurred that night.

The Youtuber wrote in his Oct. 21 post (Paragrah contains grammer issues): “Me and my buddy went to vegas for two days. This was our first day there and had been out on the strip earlier but drove to circus circus later on. We had just gotten tacos when we finally reached tropicana and las vegas blvd is when we saw everyone running and all the police. We were lucky to get to the mgm parking garage and into our room about 15 minutes later and thats when this video starts. WE HAD NO IDEA WHAT WAS GOING ON.”

“Bodies just everywhere”

The following video was captured inside Hooters after the shooting and shows what appears to be human bodies covered with towels and sheets. The man filming can be heard saying that Hooters is “locked-down” and that there are “bodies just everywhere.”

In the video, it even looks as if blood can be seen on at least one. However, the status of the people is unknown.

The lone ranger

An Oct. 14 Intellihub report documents how an eyewitness named Rick explained on a podcast that one of his girlfriend’s friends (who was in his group of five that night) had witnessed a ‘solo SWAT guy’ enter the back door of Hooters, the same building that Rick said he witnessed people fleeing from!

A few moments later (after the gunfire in the venue subsided), Rick met back up with all five members of his group near a sign that they used for a landmark which was located between Hooters and Motel 6 and that’s when Rick said that he saw a “frantic stampede” of people fleeing Hooters.

“[…] there was a bunch of people trying to get the hell away from Hooters so we did too,” he explained. “So we started running again.”

Rick also pointed out that at one point one of his group members had witnessed “SWAT” guy enter Hooters through the back which he thought was suspicious. The scene was fluid and rapidly changing. Nobody could be trusted.

At one point, the group was told that a shooter had stolen a police car which elevated concern.

Chaos outside Hooters captured on video

A video posted to the “Ronson ¡n s¡n California” YouTube channel shows the moment people fled from Hooters in a panic (this is not a fantasy, it’s real folks).

The publisher explains in the video’s description box that “the place [Route 91] was like a war zone” and mentions that he went back to Hooter’s after running around for “30-minutes” from “gunmen.”

“So we ran back to hooters,” the description explains. ‘Right when we got in the lobby someone yelled run! Everybody ran, hid, barricaded, and dived over bars.’

The blackjack dealer

This matches up with what Hooters Hotel and Casino blackjack dealer Schanda Bennett told NPR the day after the shooting. Bennett said she heard shots “outside” of Hooters and confirmed dead bodies were, in fact, laying on the ground in front of Hooters. However, Bennett theorizes that the people who dropped dead in front of Hooters did so after running from the venue even though eyewitness reports suggest gunfire came from within the proximity of Hooters, possibly out front. After all, why were people fleeing Hooters?

“There were people – there were bodies in the front of the casino that was just laying there.,” she said. “People that ran from the venue – they just died right there.”

Blood stains on the carpet

The next video shows blood stains on the carpet in Hooters lobby, just outside of the elevator shaft as people panic (a lot of blood at 0:23 seconds).

“I know I’m all fun and games but this shit ain’t fuckin’ games,” the man filming explained while he briskly searched for an emergency exit to evacuate Hooters. “When you hear fuckin’ shots from a high-output riffle coming from out of nowhere in the middle of a concert and people are taking cover […]”

The man was walking through Hooters after he had left the venue where he heard gunfire and ‘saw people go down.’

‘Shots were coming from Hooters, MGM area’

Another Intellihub report which I authored Oct. 16 explains how an eyewitness named Geo Rios said that he heard shots coming from Hooters just after he and his girlfriend had jumped the north fence at the Route 91 Harvest Music Festival. This confirms without a shadow of a doubt that shots were, in fact, fired at Hooters.

“We ran straight to the back of the venue and there was like a ten-foot fence,” Rios explained.

That’s when Rios and his girlfriend climbed up and over the fence using a piece of an “orange gate” as a makeshift ladder. Rios said that they couldn’t climb the fence without the makeshift ladder because the fence was covered with a “green material” that wouldn’t allow you to grab it.

‘There were two guys that were standing on the other side of the fence that were catching everybody,’ he said. “One of them caught my girlfriend.”

“Everyone who lived is a hero, from that event, and I want to make that clear. […] There was a lot of beautiful things going on. A lot of people taking care of each other,” he explained.

Once the couple was over the fence Rios said that he could hear ‘shots coming from Hooters, the MGM area’ in addition to the shots coming from Mandalay Bay. This is the very same area other eyewitnesses also heard shots being fired!

Duck and run

Additionally, another man was hiding under his car in the Hooters parking lot when the chaos erupted.

Wake up, people! We have been lied to. Demand answers! SHARE THIS ARTICLE EVERYWHERE!

Also, a big hat tip to the “HighImpactFlix” YouTube channel has condensed the footage in an excellent presentation of the facts.

 

By Shepard Ambellas | Intellihub

Advertisements

U.S. Put Nuclear Bombers On 24 Hour Alert For First Time In 26 Years

https://admin62b4b.davidicke.com/wp-content/uploads/2017/08/nuclear-war-north-korea.jpg

The unexpected decision by President Trump to amend an emergency Sept 11 order signed by George W Bush, allowing the Air Force to recall up to 1,000 retired air force pilots to address what the Pentagon has described as “an acute shortage of pilots” caught us by surprise. After all, this was the first time we have heard of this particular labor shortage – perhaps there was more to this executive order than meets the eye. Indeed, a just released report may help explain the reasoning behind this presidential decision.

According to Defense One, the US Air Force is preparing to put nuclear-armed bombers back on 24-hour ready alert, a status not seen since the Cold War ended in 1991.

That means the long-dormant concrete pads at the ends of Barksdale Air Force Base’s 11,000-foot runway — dubbed the “Christmas tree” for their angular markings — could once again find several B-52s parked on them, laden with nuclear weapons and set to take off at a moment’s notice.

“This is yet one more step in ensuring that we’re prepared,” Gen. David Goldfein, Air Force chief of staff, told the publication in an interview during his six-day tour of Barksdale and other U.S. Air Force bases that support the nuclear mission. “I look at it more as not planning for any specific event, but more for the reality of the global situation we find ourselves in and how we ensure we’re prepared going forward.”

Quoted by Defense One, Goldfein and other senior defense officials stressed that the alert order had not been given, but that preparations were under way in anticipation that it might come. That decision would be made by Gen. John Hyten, the commander of U.S. Strategic Command, or Gen. Lori Robinson, the head of U.S. Northern Command. STRATCOM is in charge of the military’s nuclear forces and NORTHCOM is in charge of defending North America.

Putting the B-52s back on alert is just one of many decisions facing the Air Force as the U.S. military responds to a changing geopolitical environment that includes North Korea’s rapidly advancing nuclear arsenal, President Trump’s confrontational approach to Pyongyang, and Russia’s increasingly potent and active armed forces.

Goldfein, who is the Air Force’s top officer and a member of the Joint Chiefs of Staff, is asking his force to think about new ways that nuclear weapons could be used for deterrence, or even combat.

Quoted by Def One, he said that “the world is a dangerous place and we’ve got folks that are talking openly about use of nuclear weapons. It’s no longer a bipolar world where it’s just us and the Soviet Union. We’ve got other players out there who have nuclear capability. It’s never been more important to make sure that we get this mission right.” During his trip across the country last week, Goldfein encouraged airmen to think beyond Cold War uses for ICBMs, bombers and nuclear cruise missiles.

“I’ve challenged…Air Force Global Strike Command to help lead the dialog, help with this discussion about ‘What does conventional conflict look like with a nuclear element?’ and ‘Do we respond as a global force if that were to occur?’ and ‘What are the options?’” he said. “How do we think about it — how do we think about deterrence in that environment?”

Asked if placing B-52s back on alert — as they were for decades — would help with deterrence, Goldfein said it’s hard to say.

“Really it depends on who, what kind of behavior are we talking about, and whether they’re paying attention to our readiness status,” he said.

Meanwhile, various improvements have already been made to prepare Barksdale — home to the 2d Bomb Wing and Air Force Global Strike Command, which oversees the service’s nuclear forces — to return B-52s to an alert posture. Near the alert pads, an old concrete building — where B-52 crews during the Cold War would sleep, ready to run to their aircraft and take off at a moment’s notice — is being renovated.

Inside, beds are being installed for more than 100 crew members, more than enough room for the crews that would man bombers positioned on the nine alert pads outside. There’s a recreation room, with a pool table, TVs and a shuffleboard table. Large paintings of the patches for each squadron at Barksdale adorn the walls of a large stairway.

One painting — a symbol of the Cold War — depicts a silhouette of a B-52 with the words “Peace The Old Fashioned Way,” written underneath. At the bottom of the stairwell, there is a Strategic Air Command logo, yet another reminder of the Cold War days when American B-52s sat at the ready on the runway outside.

Those long-empty B-52 parking spaces will soon get visits by two nuclear command planes, the E-4B Nightwatch and E-6B Mercury, both which will occasionally sit alert there. During a nuclear war, the planes would become the flying command posts of the defense secretary and STRATCOM commander, respectively. If a strike order is given by the president, the planes would be used to transmit launch codes to bombers, ICBMs and submarines. At least one of the four nuclear-hardened E-4Bs — formally called the National Airborne Operations Center, but commonly known as the Doomsday Plane — is always on 24-hour alert.

Barksdale and other bases with nuclear bombers are preparing to build storage facilities for a new nuclear cruise missile that is under development. During his trip, Goldfein received updates on the preliminary work for a proposed replacement for the 400-plus Minuteman III intercontinental ballistic missiles, and the new long-range cruise missile.

“Our job is options,” Goldfein told Defense One’s Marcus Weisgerber. “We provide best military advice and options for the commander and chief and the secretary of defense. Should the STRATCOM commander require or the NORTHCOM commander require us to [be on] a higher state of readiness to defend the homeland, then we have to have a place to put those forces.”

And now that the US is preparing for immediate nuclear war readiness, all it needs is a provocation, one which a world which has never been more on edge over a stray tweet, may have little difficulty in finding…

Source: ZeroHedge

Dickinson Texas Tells People No Hurricane Harvey Aid Unless They Promise Not to Boycott Israel

The city of Dickinson, Texas, is requiring applicants for Hurricane Harvey rebuilding funds to certify in writing that they will not take part in a boycott of Israel. The American Civil Liberties Union criticized the city’s condition as a violation of free speech rights.

“The First Amendment protects Americans’ right to boycott, and the government cannot condition hurricane relief or any other public benefit on a commitment to refrain from protected political expression,” said ACLU of Texas Legal Director Andre Segura. “Dickinson’s requirement is an egregious violation of the First Amendment, reminiscent of McCarthy-era loyalty oaths requiring Americans to disavow membership in the Communist party and other forms of ‘subversive’ activity.”

The city’s website says that it is accepting applications from individuals and businesses for grants from money donated for hurricane relief. The application says that by signing it, “the Applicant verifies that the Applicant:

(1) does not boycott Israel; and

(2) will not boycott Israel during the term of this Agreement.”

The city appears to be enforcing a recently passed Texas law that requires all state contractors to certify that they are not participating in boycotts of Israel. While the ACLU does not take a position on boycotts of foreign countries, the organization has long supported the right to participate in political boycotts and has voiced opposition to laws and bills that infringe on the right to boycott.

The Supreme Court ruled decades ago that political boycotts are protected by the First Amendment, and other decisions have established that the government may not require individuals to sign a certification regarding their political expression in order to obtain employment, contracts, or other benefits.

On October 11, the ACLU filed a federal lawsuit challenging a Kansas law on behalf of a high school math teacher who is being required by the state to sign to certify that she won’t boycott Israel if she wants to take part in a teacher training program.

In July, the ACLU sent a letter to members of Congress opposing a bill that would make it a felony to support certain boycotts of companies doing business in Israel and its settlements in the occupied Palestinian territories. As a result, Senate sponsors of the bill are considering changes.

By Paul Craig Roberts

 

Department Of Defense Abruptly Defunds EMP Commission

https://i1.wp.com/victorygirlsblog.com/wp-content/uploads/2014/01/Electric-Power-Grid-768x576.jpg

Gotta love The Swamp. Now that North Korea (probably) has the capability to fire a missile into our airspace, the powers that shouldn’t be have shut down the one governmental organization with the ability to do anything testicular to deter the Fat Boy driving the looming disaster.

Did you think NoKo is going to do something fissionable with its missiles and is going to simply try to “bomb” us? Well, it would seem that’s the intention, but the real problem is the payload on their missiles. All they need is one EMP detonated in our skies (over the East Coast, where lies most of our outdated electrical infrastructure) to send the continent back to say, 1850…and that will mean ninety percent of our population gone within six months or less. One can envision the follow-up: a leisurely walk-through by China. It would be easy-peasy to sort through the pieces of what remained of Canada and the United States.

From The Center for Security Policy [with my emphases — D]:

Inexplicably, just when we need the country’s most knowledgeable and influential minds advising about how to protect against a potentially imminent, nation-ending peril, the Congressional Electromagnetic Pulse Threat Commission is being shut down.

For seventeen years under the leadership of President Reagan’s Science Advisor, Dr. William Graham, this blue-ribbon panel has warned that we had to protect our electric grid from just the sorts of EMP attacks North Korea is now threatening to unleash upon us. Successive administrations and the electric utilities have shamefully failed to heed those warnings and take corrective action.

Consequently, we could experience on a national scale the sort of devastating, protracted blackouts now afflicting Puerto Rico. President Trump should give Dr. Graham and his team a new mandate as a presidential commission to oversee the immediate implementation of their recommendations.

This disaster happened at the end of September, while the MSM dithered away on their fiddles about the eeevil Trump. Meanwhile, two men who served on the panel appeared in front of this subcommittee to get the views of the panel into the permanent record, i.e. the Congressional Record. If/when it all goes down, their warnings will still exist, if anyone can access them after an EMP explosion:

Read the rest by Dymphna | Gates Of Vienna here

FBI Uncovered Russian Bribery Plot Before Obama Approved Uranium One Deal, Netting Clintons Millions

https://i0.wp.com/www.zerohedge.com/sites/default/files/images/user230519/imageroot/2017/10/17/2017.10.17%20-%20Clinton%20Cash_0.JPG

As the mainstream media continues to obsess over $100,000 worth Facebook ads allegedly purchased by Russian spies in 2016 seeking to throw the presidential election, we’re almost certain they’ll ignore the much larger Russian bombshell dropped today in the form of newly released FBI documents that reveal for the very first time that the Obama administration was well aware of illegal bribery, extortion and money laundering schemes being conducted by the Russians to get a foothold in the atomic energy business in the U.S. before approving a deal that handed them 20% of America’s uranium reserves…and resulted in a windfall of donations to the Clinton Foundation.

As we pointed out last summer when Peter Schweizer first released his feature documentary Clinton Cash, the Uranium One deal, as approved by the Obama Administration, netted the Clintons and their Clinton Foundation millions of dollars in donations and ‘speaking fees’ from Uranium One shareholders and other Russian entities.

Russian Purchase of US Uranium Assets in Return for $145mm in Contributions to the Clinton Foundation – Bill and Hillary Clinton assisted a Canadian financier, Frank Giustra, and his company, Uranium One, in the acquisition of uranium mining concessions in Kazakhstan and the United States.  Subsequently, the Russian government sought to purchase Uranium One but required approval from the Obama administration given the strategic importance of the uranium assets.  In the run-up to the approval of the deal by the State Department, nine shareholders of Uranium One just happened to make $145mm in donations to the Clinton Foundation.  Moreover, the New Yorker confirmed that Bill Clinton received $500,000 in speaking fees from a Russian investment bank, with ties to the Kremlin, around the same time.  Needless to say, the State Department approved the deal giving Russia ownership of 20% of U.S. uranium assets 

Now, thanks to newly released affidavits from a case that landed one of the Russian co-conspirators, Vadim Mikerin, in jail, we learn that not only was the Obama administration aware the Russians’ illegal acts in the U.S. but it may have also been fully aware that “Russian nuclear officials had routed millions of dollars to the U.S. designed to benefit former President Bill Clinton’s charitable foundation during the time Secretary of State Hillary Clinton served on a government body that provided a favorable decision to Moscow.”  Per The Hill:

Before the Obama administration approved a controversial deal in 2010 giving Moscow control of a large swath of American uranium, the FBI had gathered substantial evidence that Russian nuclear industry officials were engaged in bribery, kickbacks, extortion and money laundering designed to grow Vladimir Putin’s atomic energy business inside the United States, according to government documents and interviews.

Federal agents used a confidential U.S. witness working inside the Russian nuclear industry to gather extensive financial records, make secret recordings and intercept emails as early as 2009 that showed Moscow had compromised an American uranium trucking firm with bribes and kickbacks in violation of the Foreign Corrupt Practices Act, FBI and court documents show.

They also obtained an eyewitness account — backed by documents — indicating Russian nuclear officials had routed millions of dollars to the U.S. designed to benefit former President Bill Clinton’s charitable foundation during the time Secretary of State Hillary Clinton served on a government body that provided a favorable decision to Moscow, sources told The Hill.

Of course, when Schweizer’s book first made Uranium One a political hot topic in 2015, both the Obama administration and the Clintons defended their actions and insisted there was no evidence that any Russians or donors engaged in wrongdoing and there was no national security reason for anyone to oppose the deal.  That said, we now know that the FBI was aware of wrongdoing going back to at least April 2009 even though the deal wasn’t approved until October 2010.

But FBI, Energy Department and court documents reviewed by The Hill show the FBI in fact had gathered substantial evidence well before the committee’s decision that Vadim Mikerin — the main Russian overseeing Putin’s nuclear expansion inside the United States — was engaged in wrongdoing starting in 2009.

The first decision occurred in October 2010, when the State Department and government agencies on the Committee on Foreign Investment in the United States unanimously approved the partial sale of Canadian mining company Uranium One to the Russian nuclear giant Rosatom, giving Moscow control of more than 20 percent of America’s uranium supply.

In 2011, the administration gave approval for Rosatom’s Tenex subsidiary to sell commercial uranium to U.S. nuclear power plants in a partnership with the United States Enrichment Corp. Before then, Tenex had been limited to selling U.S. nuclear power plants reprocessed uranium recovered from dismantled Soviet nuclear weapons under the 1990s Megatons to Megawatts peace program.

And guess who ran the FBI’s investigation into this particular Russian plot?  As The Hill notes, the Mikerin probe began in 2009 under Robert Mueller, now the special counsel in charge of the Trump case, and ended in late 2015 under the controversial, former FBI Director James Comey who was relieved of his duties by President Trump.

Ironically, when the DOJ finally arrested Mikerin in 2014, following 5 years of investigations in a massive international bribery and money-laundering scheme, rather than publicly celebrate, they seemingly swept it under the rug.  In fact, there was no public release concerning the case at all until a full year later when the DOJ announced a plea deal with Mikerin right before labor day.

Bringing down a major Russian nuclear corruption scheme that had both compromised a sensitive uranium transportation asset inside the U.S. and facilitated international money laundering would seem a major feather in any law enforcement agency’s cap.

But the Justice Department and FBI took little credit in 2014 when Mikerin, the Russian financier and the trucking firm executives were arrested and charged.

The only public statement occurred an entire year later when the Justice Department put out a little-noticed press release in August 2015, just days before Labor Day. The release noted that the various defendants had reached plea deals.

By that time, the criminal cases against Mikerin had been narrowed to a single charge of money laundering for a scheme that officials admitted stretched from 2004 to 2014. And though agents had evidence of criminal wrongdoing they collected since at least 2009, federal prosecutors only cited in the plea agreement a handful of transactions that occurred in 2011 and 2012, well after the Committee on Foreign Investment in the United States’s approval.

The final court case also made no mention of any connection to the influence peddling conversations the FBI undercover informant witnessed about the Russian nuclear officials trying to ingratiate themselves with the Clintons even though agents had gathered documents showing the transmission of millions of dollars from Russia’s nuclear industry to an American entity that had provided assistance to Bill Clinton’s foundation, sources confirmed to The Hill.

Perhaps this is what the “most transparent” President in history meant when he told Medvedev that he would have “more flexibility” after his 2012 election.

Below are the affidavits released today:

https://www.scribd.com/document/361782806/Indictment-Affidavit#from_embed

https://www.scribd.com/document/361783782/Mikerin-Plea-Deal#from_embed

https://www.scribd.com/document/361783782/Mikerin-Plea-Deal#from_embed

https://gunnyg.files.wordpress.com/2017/10/obamaputinlaughgangsterpix.jpg?w=585&zoom=2

https://gunnyg.files.wordpress.com/2017/10/650-101717-obama-and-the-clintons.jpg?w=640&zoom=2


BREAKING NEWS: Senate Judiciary OPENS PROBE into Clinton-Obama era Russian nuclear bribery case …


The Obama Administration’s Uranium One Scandal

https://i1.wp.com/c5.nrostatic.com/sites/default/files/styles/original_image_with_cropping/public/uploaded/uranium-one-deal-obama-administration-complicit-not-just.jpg

Source: ZeroHedge

Evidence Of Directed Energy Weapons Responsible For California Fires

Is there any there, there here?

Mastery Of The Human Domain Almost Complete

https://i2.wp.com/themillenniumreport.com/wp-content/uploads/2017/10/face-with-device.jpg

How the US Military Control of Social Media Has Already Imprisoned You and Thrown Away the Key 

Long before we could imagine the evil of the elite pedophile globalists of the world, they had already started locking down planet earth. They knew that humanity’s wakening consciousness would jeopardize their planetary reign so they had to find a way to imprison our minds, direct our thinking, and limit our expanding consciousness.

They did it right under our noses.

They did it with our own hard-earned money.

While we were busy rearing our children and tending our families, they were quietly implementing Alinsky’s rules and Soros’ regimes. They are evil people who prey on our children, profit from our blood, rape our women and countries, and control us with their money illusions. They don’t care about our national borders, cultural uniqueness, spiritual paths, or personal liberty. YOU are THEIRS to be “farmed” any way that brings them greater wealth, longer life, and wicked pleasures.

You have now awakened and realized that the nightmare was actually on the other side of your dreamy sleep. What do you do? First and foremost is to educate yourself on what has occurred since you stopped paying attention. The American Intelligence Media has been writing Citizens Intelligence Reports for several years now so that you can become highly informed patriots. Patriots need to know precisely who the enemy is, how they have weaponized the world, and what we can do to throw off our digital shackles.

The global elites know that education is the key to enlightenment. For this reason, you will find more and more outlets for self-education becoming censored and shut down by the planetary rulers. They simply can’t have us know what is going on as there are far too many of us and too few of them.

In this Citizens Intelligence Report we want to alert you to the grave dangers of the weaponization of the internet and social media. A new technological revolution is taking place that will affect all of us. They make it sound so cool and fun – the Internet of Things—but it is nothing more than a self-imposed prison that will eventually control you 24/7 once you connect into the network.

The more you participate in the automatic information fed directly to your devices that are personalizing your news, entertainment, business, and “life-patterns”, the more you will think you are free and fully informed. Actually, you will become more and more limited by what your pattern-of-life generates as your individualized algorithms. A mechanical virtual world will be created around you that becomes your personalized digital prison that, at first, may seem like digital heaven, but later rear its ugly head of control and enslavement. By then, it will be too late for any of us to break free.

Your new digital prison is being created every time you do an internet search, click a ‘like’ button on Facebook, type a phrase into your computer, choose something to watch on television, or speak a word into your phone. Every speck of “information” that you participate in is used to make your personalized digital life-pattern profile.

Even your bank account and everything you spend is being gathered in an NSA program called Marina [1] that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone automatically pings the route and distance to your destination.

Your phone can also activate all your devices that are connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker starts and your TV comes on with your usual show as the heating pad in your easy chair turns on to your favorite setting.

There is no end to the “machine intelligence” support you can get from mechanically augmented reality. And now Facebook and its fake, phoney, stooge inventor Mark Zuckerberg wants you to put on a 3-D visor and enter a self-created virtual reality world where it feels you are free to do as you please.

How Did We Get Into Digital Prison?

We have created this world by being lazy and not asking the hard questions—who owns and controls this technology, what is the ultimate goal of the Internet of Things, does this technology serve or enslave humanity? Eric Schmidt, the CEO of Alphabet has bragged about this new system that claims it is ‘ready to go’.

Google, somehow, morphed into a “mother company” that is named Alphabet which owns all 26 subsidiaries of Google, including the only AI on the planet called Google Deep Mind. Alphabet seems to have unlimited money and unlimited technology patents that are supported wholesale by Wall Street and the U.S. military-industrial complex.

Essentially, Google has always been owned and operated by the dark side of our military-industrial complex. Like Cisco Systems, Inc. before them, Google (Alphabet) was incubated through the U.S. Defense Advance Research Project Agency (DARPA) and the CIA’s private corporate venture capital company called In-Q-Tel. (Ask yourself how it is that a government entity can hold private companies and enjoy private profits outside of Congressional oversight, but we digress.)

Google, Cisco, Facebook, Twitter, and most other search engines and social networks all run on allegedly “open source” code given out by DARPA/In-Q-Tel to universities and corporations to develop. Open source means free to the user without the need to pay royalties or fees to the inventor or creator. Basically, whoever is able to take this weaponized open source code (with encryption back door keys already built in) and develop it for the consumer wins the military contracts.

Then Wall Street (Goldman Sachs and JPMorgan Chase usually) sweep in with venture capital, and within a few years values the new tech company in the tens and hundreds of billions. After that, the banks then loan whatever money these companies  need to buy out all their competition. These newly acquired “Silicon Valley corporate stooges” then become front-men for even more weaponized military systems. This now includes Facebook, LinkedIn, Instagram, Pinterest, YouTube, Tumblr and Amazon.

Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that he is simply having fun. Since most American and global businesses have some component on the internet, the militarization of the internet can be as powerful as the threat of global nuclear annihilation. Just imagine if the internet was turned off tomorrow – permanently, never to return.

Most of what we think of as modern life would end, and many people would never recover. Economies would collapse, wars would rage, and many of us wouldn’t know what to do or what to think. Modern life would collapse because the weapon of the internet already controls modern life. The life of the pygmy in Indonesia would go on uninterrupted, but American life would screech to a halt. We might not be able to “reboot” for years. This thought begs the question, “How did we let this happen?”

“We”, the users of the Internet and all things digital, were happy to use the new technology without asking basic questions like: Who actually owns the cables the Internet travels through? Can “they” turn it off? Why was so much power given over to the internet? At this point, is there an alternative or way out of this digital?

The answers to the questions above can be given, and there is a solution to this looming problem. But first we must see the internet and all of its “wonders” for exactly what they are – weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools that they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by nonsensical entertainment, religion is replaced by consumerism, and the real world by virtual reality. 

Patent Theft and Weaponization of the Internet

Not counting the social networking technology that was stolen, taxpayers of the United States, through the CIA’s private venture capital company In-Q-tel, largely funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized these devices and systems against the citizens of the world.

‘We the People’ demand that these companies, and any other like them that have been financially seeded and funded by U.S. taxpayers, BE GIVEN TO THE PEOPLE AS A PUBLIC UTILITY and that the fictitious owners of these companies be prosecuted for patent infringement and/or theft.

In numerous articles from Americans for Innovation, the Anonymous Patriots have found unequivocal evidence that IBM’s Eclipse Foundation stole the original ideas and source code for Google and Facebook from Columbus, OH innovator Leader Technologies, Inc. through their patent attorney James P. Chandler III. Chandler was mentor of Barack Obama,  Eric Holder, Robert Mueller, James Comey and John Podesta, to name but a few.

https://aim4truthblog.files.wordpress.com/2017/10/james-p-chandler.jpg?w=110&h=150

James P. Chandler III

Chandler represented Leader Technologies, Inc. from the moment Leader realized their innovations were patentable in early 2000. But rather than file the patents immediately, Chandler suspiciously advised Leader to “reduce to practice” the invention before he would file them.

Hindsight shows that Chandler gave that advice in order to steal the actual source code when it was ready. Chandler bamboozled Leader into taking custody of a copy of the source code in 2002 which he immediately gave to the IBM Eclipse Foundation which then disseminated it to Zuckerberg/Facebook and other companies.

https://aim4truthblog.files.wordpress.com/2017/10/david_kappos.jpg?w=86&h=86

David J. Kappos

David J. Kappos, IBM’s attorney (who also served later as Obama’s Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office from 2009 to 2013) was also a student of Chandler at the time of the theft. This theft is one of if not the largest theft of intellectual property and trade secrets in history. It was clearly part of the the weaponization of these digital platforms.

 

How Does Patent Theft Work?

Digital Prison Mechanisms 

Once the Silicon Valley high-tech “dummy” companies are established by stooges who are pre-selected for their willingness to incorporate military “back doors” into all of their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every devise that broadcasts a signal – phone, computer, or any devise on the Internet of Things. Any intelligence agency can simply type in a query and access the metadata collected from every digital devise on the internet or that uses Wi-Fi or cell phone towers.

Among these spying tools is the RIOT (Rapid Information Overlay Technology]) program by Raytheon which leaked to the public on Nov. 16, 2010.[2]

This information is used to target individuals for consumer behaviors as well as DoD intelligence collection. If an internet user is targeted, there are hundreds of ways to “attack” the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.

The object of the intelligence is simple: Control the user. Social networks on the internet are military experiments in social manipulation. This is what is called PSYOPS – or psychological operations.  

Another program used to gather the Internet metadata is XKeyscore, a secret computer system first used by the NSA for searching and analyzing global Internet data, which it collects on a daily basis. It enables almost unlimited surveillance of anyone anywhere in the world.

The NSA’s data bank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored. It can also access your browsing histories or Google search terms that you’ve entered, and can alert them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects ALL data, on EVERYBODY, ALL THE TIME.[3]

Another component of NSA data collection is a program called Marina, a database and analysis tool set for intercepted internet metadata. The database stores metadata up to a year. The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of the target. It also has the capability to look back on the last 365 days’ worth of metadata seen by the collection system, whether or not the target was tasked for collection. The stored metadata is mainly used for pattern-of-life analysis.

Americans are not exempt because metadata is not considered data by U.S. law. (See Section 702 of the FISA Amendments Act).

Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation (SWS). This program is developing a parallel to Planet Earth, with billions of individual nodes (prisons) to reflect every man, woman, and child.

SWS will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. It provides an environment for testing psychological operations so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners, including U.S. citizens. SWS also mimics financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.

These four programs – XKeyscore, Marina, RIOT, and Sentient World Simulation – create some of the environments which intend to imprison and control those who willingly enter into the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even “neutrals” are the target of these systems.

No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet. Just look how President Donald Trump uses Twitter as a weapon against the corporate media. There is a battle for information and every person is in the middle of the battle whether they like it or not.

https://aim4truthblog.files.wordpress.com/2017/10/jade-helm-master-the-human-domain.jpg?w=540&h=440

The largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Master the Human Domain.” Just the very name of the exercise should show you where the U.S. military is focusing its time and energy– on U.S. citizens. It also clearly tells us the intent of the U.S. military is – to Master the Human Domain. So much for America freedom and liberty.

Some History About DARPA/In-Q-Tel “Front Men”

The Defense Advanced Research Projects Agency (DARPA) has controlled technological innovation since 1958 when it was created by the military-driven Department of Defense. DARPA is the father of war-fighting, both conventional and digital. DARPA was controlled by a man they called “Yoda”, who leads a group called the Highlands Forum that directs all military research and development – the weaponization of every U.S. patent, over 4,000 of which have been stolen. 

DARPA’s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum, have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing.

The U. S. military wants our enemies to have the technology so that it can spy upon them and keep up with them in weaponry. If both sides have the same technology and weapons, then more money needs to be spent on bigger and better weapons continually and the military industrial complex thrives and gets richer.

Their business plan is simple: Make sure the customer has a need for military products and services by supplying their enemies with competing products and services, a business cycle that never stops and guarantees that the military industrial complex will always be selling something to someone.

History of In-Q-Tel – a CIA Venture Capital Investment Firm

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. The inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the ‘Highlands Forum,’ this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the unregulated and unconstitutional private military-industry network around the Highlands Forum has become increasingly successful in dominating U.S. defense policy.

Basically, the CIA needed to launder all of its stolen gold and set up many companies to wash its illegal money. Why do you think they call the CIA ‘The Company’?

In-Q-Tel also uses a company called SAIC, the U.S. defense firm Science Applications International Corporation, which changed its name to Leidos in 2013, now operating SAIC as a subsidiary. SAIC/Leidos is among the top 100 largest defense contractors in the U..S, and works closely with the U.S. intelligence community, especially the NSA. The agency is the company’s largest single customer and SAIC is the NSA’s largest contractor.

The Highlands Forum (Group)

Since 1973, Andrew Marshall has headed up one of the Pentagon’s most powerful Andrew Marshallagencies, the Office of Net Assessment (ONA), the U.S. defense secretary’s internal ‘think tank’ which conducts highly classified research on future planning for defense policy across the U.S. military and intelligence community. Out of Marshall’s work in the ONA came an independent group called the Highlands Forum.

Marshall, now 93 years old, is the DoD’s most elusive but one of its most influential officials. He created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation-only, not open to the public, and no written records are kept, except for the snippets that participants reveal in their braggadocio and biographies, which are considerable.

Marshall created this type of secret platform so that no one could prove the Highland Forum exists or that it has the greatest power over high-tech warfare on the planet. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz, who are  widely considered the hawks of the neoconservative movement in American politics, were among Marshall’s star protégés.

The Highlands Forum’s influence on US defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense; its direct link to Marshall’s ONA; and its direct link to DARPA/In-Q-Tel and the Highlands Forum.

https://aim4truthblog.files.wordpress.com/2017/10/highlands-forum.png?w=625

The Highlands Forum has served as a two-way ‘influence bridge’: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector.

There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale. 

oNeill

Richard O’Neill

Around 1994, the Highlands Group was chaired by Richard O’Neill as an official Pentagon project at the appointment of Bill Clinton’s then defense secretary William Perry. In O’Neill’s own words, the group would function as the Pentagon’s ‘ideas lab.’

Total participants in the DoD’s Highlands Forum number over a thousand; although meetings and sessions largely consist of small closed workshop style gatherings of maximum 25–30 people, bringing together experts and officials depending on the subject.

The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA to the ONA, and is deeply plugged into the Pentagon’s policy research task forces. In 2001, under the Total Information Awareness Program, President Bush secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants.

From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA’s secret eavesdropping systems.

This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Donald Rumsfeld’s IO roadmap had advocated that Pentagon strategy “should be based on the premise that the Department of Defense will ‘fight the net’ as it would an enemy weapons system.” The U.S. should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.

As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.

O’Neill said his job as Forum chairman was to scope case studies from real companies across the private sector, such as eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiority — how to dominate the information market — and leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the Department of Defense.

Highland Group Exposed

Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoor keys so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.

The Highland Forum directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA.

For more information on this topic, see our Citizens Intelligence Report entitled Who Really Owns the Military Industrial Complex: The Highlands Forum Exposed.

DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel microprocessors, Cisco routers, Google search engines, Facebook social networks, the IBM Internet of Things, cellphones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.

The Highlands Forum has been the headquarters of weaponizing military patents, intellectual property and trade secrets for five decades. Andrew Marshall has the blood of millions on his hands, yet he is considered an America hero instead of a warlord criminal.

Intel (In-Q-Tel) Inside 

Intel 1Inside every Intel microprocessor is a smaller processor that lets Intel – who works for the Department of Defense – control every aspect of your computer remotely no matter what encryption codes or firewalls you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.

It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. According to WikiLeaks, there is even secret diskless memory embedded on each chip that spies can use to store and retrieve data and instructions on each chip that is inaccessible to the user and supposedly only used for internal operations and maintenance. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.

Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel “Inside” your computer. Intel collects “intelligence” but it also provides a “back door” to control, or “turn off” your computer at will just like it has been demonstrated that Cisco routers have a “back door” open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.

Samsung calls the on/off feature “Fake Off” meaning the TV looks like it is off, but is merely pretending to be off.

“I don’t have anything to hide”

But why shouldn’t DARPA, through Intel, have open access to all your files and your computer? DARPA funded all the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare.

Just as the Internet was originally named after its founding group, DARPA, ARPARNET, microprocessors also were military creations that were permitted into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed back doors to control these powerful digital platforms of cyber war fighting.

Most semiconductor chips are made in Singapore, Taiwan, China, or Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.

Internet Warzone

In-Q-Tel is Warfare Technology – Weaponized Venture Capital & Banking

Since Bill Clinton in 1999, In-Q-Tel funds promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum. The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.

The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tank for inventing and controlling innovations that can be turned into weapons. In-Q-Tel is a bottomless source of funding for the CIA provided without any Congressional oversight.

Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.

Since 1999, there efforts have been supplemented by other quasi-secret organizations including The IBM Eclipse Foundation and the National Infrastructure Advisory Council.

For more information on this topic, see our Citizens Intelligence Report entitled DARPA Vader and the Evil Intel Empire Inside Uncovering the DoD Sith Lords that Control Your Laptop

Cisco Systems Monopoly

Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allowed a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.

The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor put millions of customers and their private information at risk and jeopardized the security of electrical power facilities, public utilities, and transportation systems.

Publicly, Cisco blamed the government for not telling them about this vulnerability, but that was simply the pot calling the kettle black – the government was blaming itself for the vulnerability, thus manipulating public opinion with a boldfaced deception.

Cisco has been accused of remotely monitoring users’ connections through Cisco’s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.

Cisco has also been accused of building a firewall backdoor developed by NSA into its routers. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they’re delivered. These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

In fact, hiding in plain sight, Cisco registers the Dual_EC_DRBG NSA encryption back door key with NIST (National Institute of Standards and Technology on all products for export.) This key relies on an inbuilt flaw in the encryption standard which only the NSA knows and can exploit at will to break in to any hardware, software or firmware.

DARPA’s Google

The U.S. intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.

In 1994  two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA wanted to control and monitor digital information, particularly the data flowing over the internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It has users’ e-mail addresses and knows where they are physically located, and what they are searching for on the web. Google has a “profile” on every user.

The government can “command” that any company, including Google, to turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Google’s terms of service, the company advises its users that it may share its “personal information” with outside organizations, including government agencies, in order to “detect, prevent, or otherwise address fraud, security or technical issues” and to “protect against harm to the rights, property or safety of Google.”

Google’s terms of service go further, they actually assume control of all user information with clever sleight of legal hand: “When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.”

The NSA partnered with Google, just one of hundreds of companies who have been brought into the NSA’s circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install back doors or other forms of privileged access.

The NSA helps the companies find weaknesses in their products. But it also pays the companies not to fix some of them. Those weaknesses  give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure.

Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain ‘information superiority.’

The origins of this strategy trace back to Bill Clinton and the Highlands Forum which has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the U.S. and around the world. The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war.

The U.S. intelligence community is implicated in nurturing today’s web platforms for the precise purpose of utilizing the technology as a mechanism to fight the global ‘information war’ -  a war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the U.S. military-industrial complex.

NSA’s Microsoft

Microsoft shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order.

What We Have Learned So Far

  • Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA/In-Q-Tel projects that flourished with new technologies created and funded by the military for cyberwarfare.
  • Most high-tech moguls are simply “front men” selling DARPA and In-Q-Tel (the CIA’s DARPA) products that control our lives and spy on us continually.
  • Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.
  • Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on “virtually every exchange on the Internet.”
  • IBM hired many of Germany’s mind control scientists from WWII and carried on those experiments through the CIA that formed in 1947; those experiments took on many different names including MKUltra. Those German scientists had used IBM computers during the war to catalogue “undesirables” like Jews, gypsies, homosexuals, Poles and Russians and it organized the trains to the death camps for individuals marked for extermination and hideous experimentation.
  • IBM/Cisco System’s “Internet of Things” plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.
  • The internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyber warfare.
  • The U. S. government has helped build, monitor, regulate, and control all physical aspects of Internet transmissions and broadcasts through the U. S. Board of Broadcasting Governors, which is a part of the Department of Defense. Every transmission through the internet or through cellphone towers is completely controlled by the U. S. government.
  • The U. S. government can “turn off”, filter, manipulate, and control the Internet through the federally controlled transmission cables that span the world. If the U. S. wanted to turn off North Korea’s internet access, it is as simple as a keystroke. Thus, the U. S. government has been boldly lying about the Internet since its inception.

What Evil is the Highlands Forum Up to Now?

By 2008, the NSA effectively resurrected the Total Information Awareness project with a focus on Internet data-mining via comprehensive monitoring of e-mails, text messages, and Web browsing. We also now know that the NSA’s XKeyscore ‘Digital Network Intelligence’ exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications — essentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA’s XKeyscore.

Goldman Sachs is CIA

Goldman Sachs (with JPMorgan in tow) is the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the U.S. military intelligence community.

The convergence of these powerful financial and military interests around the Highlands Forum–through George Lee’s sponsorship of the Forum’s new partner, the MIIS Cybersec initiative–is revealing in itself. MIIS Cybersec’s director, Dr, Itamara Lochard, has long been embedded in Highlands.

Itamara-Lochard

Dr. Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.

Dr. Lochard maintains a comprehensive database of 1,700 non-state groups including insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors, to analyze their organizational patterns, areas of cooperation, strategies and tactics.

Her views disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the U.S. Air Force’s Institute for National Security Studies on US strategy toward ‘non-state armed groups.’ The study on the one hand argued that non-state armed groups should be urgently recognized as a ‘tier one security priority,’ and on the other that the proliferation of armed groups provide strategic opportunities that can be exploited to help achieve policy goals.

There have and will be instances where the United States may find collaborating with armed group is in its strategic interests. But sophisticated tools must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests.

In 2009, it also emerged from a Google patent application that the company had deliberately been collecting ‘payload’ data from private wi-fi networks that would enable the identification of “geo-locations.” In the same year, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security.

It is not just Google that is a key contributor and foundation of the US military-industrial complex. It is the entire Internet, and the wide range of private sector companies — many nurtured and funded under the mantle of the U.S. intelligence community (or powerful financiers embedded in that community) — which sustain the internet and the telecoms infrastructure. It is also the myriad of start-ups selling cutting edge technologies to the CIA’s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community.

Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.

Brainwashing 3.0

In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, damasiowho are principal investigators in the ‘Neurobiology of Narrative Framing’ project at the University of Southern California. Evoking Zalman’s emphasis on the need for Pentagon psychological operations to deploy “empathetic influence,” the new DARPA-backed project aims to investigate how narratives often appeal “to strong, sacred values in order to evoke an emotional response,” but in different ways across different cultures.

The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon’s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.

The research is based on extracting narratives from millions of American, Iranian, and Chinese weblogs, and subjecting them to automated discourse analysis to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers/listeners from different cultures to gauge their reaction different narratives “where each story makes an appeal to a sacred value to explain or justify a morally-questionable behavior of the author.” Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.

DARPA’s goal is to mine millions of American weblogs as part of its ‘neurobiology of narrative framing’ research. As the Pentagon’s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy.

U.S. Patent Office Works For DARPA/In-Q-Tel

Just as Leader Technologies was ripped off by NSA/FBI/CIA ATTORNEY James Chandler and the IBM Eclipse Foundation for their patents that are essential to Facebook for scalability, so too many inventors have had their patents stolen by the U.S. Patent Office.

This rip-off and theft is rationalized as legal once the patent committee determines that a patent may have some impact upon U.S. “national security.”  Over five thousand patents have been legally confiscated (stolen) by the U. S. Patent Office, including many free energy patents that directly compete with oil and gas, and given to DARPA/In-Q-Tel for further development and weaponization. Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place.

This national security rationalization for the theft of intellectual property fundamentally violates the Fifth Amendment Takings Clause which states that “private property [shall not] be taken for public use, without just compensation.”

If an inventor of a patent that is confiscated by the U. S. Patent Office tries to continue work on the patent, that inventor may end up in jail. The rules of this patent confiscation are located in 35 U.S. Code § 181 – Secrecy of certain inventions and withholding of patent, which provides that the government can take any patent and make it secret and use it at their discretion, or just make sure that it never gets developed.

There are strict penalties if the inventor even speaks of the patent after it has been “confiscated.”

Members of DARPA and In-Q-Tel provide the Defense Department and the CIA with these “secret” patents so that they might first be weaponized for military purposes. Often, patents are then given to fake companies, supported with U.S. tax dollars, who bring the patent to market.

This is what happened with the patent theft of Leader Technologies that was then used by the front companies Goggle and Facebook, which are actually directed by the Department of Defense and the CIA. Clearly the law the dark state chooses to ignore is Leader’s overarching property rights in the Fifth Amendment Takings Clause, which takes precedent.

The Patent Office did not withhold Leader’s patents, and therefore cannot rely on its confiscation six years earlier when Leader’s intellectual property was a trade secret disclose only to its duplicitous attorney James P. Chandler.

Patent theft is only the tip of the iceberg. Industrial espionage is common in all industries. Alphabet/Google and Facebook have seemingly endless money to “absorb” any competition through buying them and keeping competition at abeyance. There are many other ways to “suppress” technologies that threaten the “big” companies, whether oil, tech, pharmaceuticals, agriculture/food, energy production. Big corporations use governments, especially multi-national organizations, to do their bidding. Big corporations spend huge amounts of money on lobbying governments to “pay to play.”

And when money can’t accomplish the goals, they resort to stealing patents and killing inventors.

Suppression and sabotage of technologies has been the norm since the dawn of the twentieth century when fossil fuels and the petrodollar came to rule world economics. Over 5000 new patents have been “deemed” secret and have been suppressed by existing patent laws. There are U. S. patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens “national security.”

Under Vice President Nixon, in the early 1950s, illegal, secret patent legislation was written, permitting the U.S. government to steal technology from inventors and/or suppress it should a case be made the technology might threaten the status quo.

The shocked inventors also were informed that they could be jailed up to 20 years if they made the theft of their technology known to the public.

35 U.S. Code § 186 – Penalty

Whoever, during the period or periods of time an invention has been ordered to be kept secret and the grant of a patent thereon withheld pursuant to section 181, shall, with knowledge of such order and without due authorization, willfully publish or disclose or authorize or cause to be published or disclosed the invention, or material information with respect thereto, or whoever willfully, in violation of the provisions of section 184, shall file or cause or authorize to be filed in any foreign country an application for patent or for the registration of a utility model, industrial design, or model in respect of any invention made in the United States, shall, upon conviction, be fined not more than $10,000 or imprisoned for not more than two years, or both.

(July 19, 1952, ch. 950, 66 Stat. 807Pub. L. 100–418, title IX, § 9101(b)(3), Aug. 23, 1988, 102 Stat. 1568Pub. L. 112–29, § 20(j), Sept. 16, 2011, 125 Stat. 335.)

Patent Corruption

Very clearly, the patent system is merely a lure for unsuspecting innovators to share their ideas so that the military-industrial complex can steal them at will.

Want to know about the free energy devices that this corrupt patent system is suppressing from the people? See our Citizens Intelligence Report entitled

THE FREE ENERGY REVOLUTION HAS BEGUN 

..

Other DARPA/In-Q-Tel Programs

We have discussed the companies that you may already know have control over your life, but there are many, many more that we don’t know about. Many of us are reliant, even addicted, to these the internet, cellphones, and Facebook pages and groups. It has been shown that the internet creates different illnesses and some researchers say the internet is more addictive than drugs.

But what is worse is that DARPA/In-Q-Tel already has many programs that are not publicly known about and are being used right now to control U. S. citizens with cyberwarfare technologies. Let’s take a look at some of those other programs described by whistleblowers, like the Vault 7 Wiki-leaks, and see what those programs are intending to do for the U. S. military. 

Total Information Awareness – Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA’s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA’s PRISM. PRISM culled citizens’ personal data from companies like Microsoft, Google, and Facebook.

PRISM – A clandestine national security electronic surveillance program operated by the United States National Security Agency which can target customers of participating corporations outside or inside the United States.

Sounds of Silence – The Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude – or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent #5,159,703.

ThinThread – A U.S. National Security Agency program involved wiretapping and sophisticated analysis of the resulting data. 

Trailblazer Project – U.S. National Security Agency program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.

Turbulence – Turbulence is a National Security Agency information-technology project started circa 2005. It was developed in small, inexpensive “test” pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers.

Tailored Access Operations – Intelligence-gathering unit of the NSA that is capable of harvesting approximately two petabytes of data per hour.  

Boundless Informant – A system deployed by the NSA to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States. 

Bullrun – A highly classified NSA program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).

Stuxnet – Is the first discovered malware that spies on industrial systems, and it was used to attack Iran’s nuclear facilities. It is believed to have originated from the United States under the Bush administration. 

Carnivore – A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. 

DCSNet – The Federal Bureau of Investigation’s point-and-click surveillance system that can perform instant wiretaps on any telecommunications device located in the United States. 

Fairview – A mass surveillance program directed at foreign mobile phone users. 

ICREACH – Surveillance front-end GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records. 

Magic Lantern – A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications. 

Main Core – A personal and financial database storing information of millions of U. S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources. 

MAINWAY – A NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States. 

MUSCULAR – Overseas wiretapping of Google’s and Yahoo’s internal networks by the NSA. 

MYSTIC – Is a voice interception program used by the National Security Agency. 

Room 641A – A telecommunication interception facility operated by AT&T for the U.S. National Security Agency. 

Sentry Eagle – It monitors and attacks an adversary’s cyberspace through capabilities include SIGINT, Computer Network Exploitation, Information Assurance, Computer Network Defense, Network Warfare, and Computer Network Attack. The efforts included weakening U. S. commercial encryption systems. 

Special Collection Service – A black budget program that is responsible for “close surveillance, burglary, wiretapping, breaking and entering.” It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations. 

Terrorist Finance Tracking Program – A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration’s “Global War on Terrorism.” 

Multi-state Anti-Terrorism Information Exchange (MATRIX) – A data mining system originally developed for the Florida Department of Law Enforcement.
Insight Program – It detects threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. Develops integrated human/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors. 

EM Fields and Hidden Symbols – Uses techniques to incept thoughts and ideas into the mind. Once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device.  

Nervous System Manipulation by Electromagnetic Fields from Monitors – US Patent and Trade Office, Patent #6,506,148 on subliminal behavior modification, 1/14/2003, United States Patent 6,506,148, Loos, January 14, 2003. Abstract: It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be embedded in the program material, or it may be overlaid by modulating a video stream. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. The image pulsing may be embedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528 Filed: June 1, 2001

Narrative Networks Program – Developed classified techniques used to manipulate trust in humans. For its Narrative Networks program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind.

Mind Control Project – Remotely disrupts political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research is being conducted by The Center for Strategic Communication at ASU and is entitled “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects.” Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation. MIT neuroscientists have shown that they can plant false memories. Most of the research in this area currently revolves around how to induce and eliminate fear.

Controlling Americans Through the Internet 

It is important to remember that since Barrack Obama added new language in the National Defense Authorization Act of 2012, Americans are now seen as possible terrorists and are military targets and enemies of the state, unless proven otherwise.  In essence, all of the above cyberwarfare programs are being used on Americans indiscriminately and with ill intent.

The Patriot Act, later called the U. S. Freedom Act is the exact opposite of its name – it takes away freedom from patriots and lets multi-national corporations and the “run-away military” use the American people as a cyberwarfare testing grounds.

This fact is little known: the U. S. military is now allowed to act within the borders of America and target Americans as hostile war-actors (as the military calls us). We are in an information war and the stacks are high – American freedom or military/corporate control. This battle wages while many people are complacent and perfectly happy with their digital experiences.

The internet is a weapon and it is our job to find out what the battle is all about and make sure that we retain our U. S. Civil Rights and American freedom and liberty. We must call out DARPA, In-Q-Tel, Highland Forum, and the U.S. Patent Office for their patent thefts, continuous lies, and cyberwarfare manipulations and demand that U. S. taxpayer dollars that funded these evil weaponized tools be acknowledged and that all cyber-tools be turned over to Americans without the spy systems and information control systems attached.

Human beings must now fight to restore freedom and privacy before it is lost forever.

To evolve as human beings into the next century, we need a free and private internet and social networks that are not manipulated as a tools to lock us inside the prison of our minds and our geography. Remember that the intent is to “master the human domain” via the mechanical domain controlled by ahrimanic warlords who wish to take our freedoms away.


[1] Katherine Losse, Mark Zuckerberg’s anathemized former speechwriter, revealed in her book The Boy Kings (2012) that the term at Facebook for Marina was “dark profiles.”

http://www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html#katherine-losse

http://www.fbcoverup.com/docs/congress/2012-11-27-Briefing-for-Representative-Jim-Jordan-FACEBOOK-NOUVEAU-TOTALITARIANISM-AND-USE-OF-TARP-FUNDS-Nov-27-2012.pdf

Losse, Katherine. The Boy Kings. New York: Simon & Schuster, 2012, p. 201- 202. Print, eBook.

[2] Urch, Brian. (Nov. 16, 2010). Raytheon’s Riot [Rapid Information Overlay Technology] Program Mines Social Network Data Like a Google for Spies. Raytheon. https://www.fbcoverup.com/docs/library/2010-11-16-Raytheon-s-Riot-Rapid-Information-Overlay-Technology-Program-Mines-Social-Network-Data-Like-a-Google-for-Spies-Whistleblower-The-Guardian-Raytheon-Nov-16-2010.mp4

http://www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html#raytheon-riot

[3] http://www.fbcoverup.com/docs/cyberhijack/cyber-hijack-findings.html#nsa-sniff-it-all

By Anonymous Patriot | aim4truth.org