Almost EVERYTHING we have been told (and are still being told) are lies . . . the sooner that humanity admits that it has been duped, the sooner something gets done about it . . .
Showing posts with label totalitarianism. Show all posts
Showing posts with label totalitarianism. Show all posts
Toxic waste, including arsenic and lead, which seeped into a river in
southwest Colorado, has now crossed the state border into New Mexico.
More than 550 gallons per minute are entering the water flow system
according to the Environmental Protection Agency, which caused the
spill.
The agency says it should
have the results of samples undergoing lab testing soon, so they can
find out just how contaminated the river has become. Aside from lead and
arsenic, federal officials say the spill also contains, cadmium,
aluminum, copper and calcium.
High
levels of arsenic can cause blindness, paralysis and cancer, while lead
poisoning can create muscle and vision problems in adults and can be
fatal for children. "We're busting our tails to get that out," Environmental Protection Agency Regional Director Shaun McGrath said, as cited by AP. "We know the importance to people to have this information." READ MORE: EPA spills 1 mln gallons mine waste, turns river in Colorado orange
The
bright orange toxic sludge, which entered the Animas River in Colorado,
has now crossed the state border into New Mexico and reached the city
of Aztec on Friday night. Local communities in both states are not happy
and have blasted the Environmental Protection Agency (EPA) for being
slow in warning residents after the spill took place. "There's not a lot we can do. We can keep people away (from the river) and keep testing. We still don't know how bad it is," San Juan County Emergency Management Director Don Cooper said, according to AP.
Officials
in the cities of Aztec and Farmington say they have shut down the
river’s access to water treatment plants, adding that the communities
had a 90-day supply of water.
The Animas flows into the San Juan
River in New Mexico, and the San Juan flows into Utah, where it joins
the Colorado River in Lake Powell. There are also reports that the
contaminated water is heading towards Utah.
The EPA says they have
finished building two containment ponds, which are aimed at treating
the toxic sludge in the river. However, this is very much a short-term
plan, while the long-term issue of cleaning up the spill will take some
time according to McGrath. “The sediment, the metals that are in that sediment are going to settle out to the stream bottom," he said. "As
we have storm surges, as we have flooding events, that sediment can and
likely will get kicked back up into the water. We're going to have to
do ongoing monitoring," McGrath added.
It
is estimated that over one million gallons of toxic waste has already
found its way into the river. The spill was caused after the EPA was
investigating the abandoned Gold King Mine on Wednesday together with
the state Division of Reclamation, Mining and Safety. They accidentally
breached a debris dam that had formed inside the mine and this triggered
the release of the waste into Cement Creek, a tributary of the Animas
River in San Juan County.
Ironically, the initial goal was to find
a safe way to pump out the wastewater from the mine, which was
abandoned in 1923 and treat it, EPA spokeswoman Lisa McClain-Vanderpool
said.
from the shut-up-citizen-or-we'll-put-your-money-where-your-mouth-is dept
Well, Spain's officially a police state now. On July 1st, its much-protested "gag" law went into effect, instantly making criminals of those protesting the new law. Among the many new repressive stipulations
is a €30,000-€600,000 fine for "unauthorized protests," which can be
combined for maximum effect with a €600-€300,000 fine for "disrupting
public events."
This horrible set of statutes has arisen from Spain's position as a
flashpoint for anti-austerity protests, the European precursor to the Occupy Wall Street
movement. Fines, fines and more fines await anyone who refuses to treat
authority with the respect it's forcibly requiring citizens to show it.
The law also extends its anti-protest punishments to social media, where
users can face similar fines for doing nothing more than encouraging or
organizing a protest. Failing to present ID when commanded is another
fine. And then there's this:
Showing a "lack of respect" to those in uniform or failing to assist
security forces in the prevention of public disturbances could result in
an individual fine of between €600 and €30,000.
Spain's legislators thought of everything. To ensure these crackdowns on
protests go off with a minimum of public backlash, "respected" police
officers are being given a blank check to use as much force as they feel
necessary when breaking up "unauthorized protests." The law doesn't directly instruct police to behave badly, but it does provide a very helpful increase in opacity.
A clause in the wide-ranging legislation that critics have dubbed the
"gag law" provides for fines of up to 30,000 euros ($33,000) for
"unauthorized use" of images of working police that could identify them,
endanger their security or hinder them from doing their jobs.
Somehow, the Spanish government has managed to find an expectation of privacy within its public spaces and applied it to its public servants.
While the law does make some provision for the public's "right to
know," it also defers to law enforcement's judgment when it comes to
what is or isn't "authorized use" of photographs/video depicting police
performing their public duties.
Obviously, this small nod towards the public's rights is completely
insincere. The government wants to clamp down on protests and it
obviously can't be embarrassed by award-winning photographs/video of its
police officers beating civilians wholly uninvolved with the protests
that so angried up the cops' blood.
english CC if watched on YouTube
Those defending the law (sort of) think the built-in "protections" will at least protect some favored members of the media.
Victora Lerena, president of Spain's association representing visual
journalists, thinks the language about freedom of information will
protect journalists, but predicts anyone who tries to take images of
police at protests without media organization credentials could be at
risk.
This is likely true, considering the "credentialed" press already blurs
officers' faces when reporting. But the most damning images of police
misconduct usually come from unofficial sources, and even the
most aggressive of mainstream news outlets frequently defer to the
government's judgment when reporting on alleged police abuse.
Spain has outlawed dissent and given the police extra protections and
respect they haven't earned. That's as close to a police state as you
can get without actually declaring martial law.
“I sent a series of human rights activist
emails to public authorities and forums beginning in 2003 up to 2006,”
John Finch from Victoria says, describing what many TI activists do in
their struggle to gain recognition and advocacy. Finch believes he came
to the attention of an extremist U.S. security organization in 2004
after exercising his democratic right to free speech.
“Since then, I’ve had my human rights,
liberty and privacy completely violated and all aspects and degrees of
his human freedom, individuality and mental and physical integrity and
health savagely attacked.”
Finch says he has been tortured to the
point of being deformed. Furthermore, according to Finch’s account,
perpetrators in the program have capacity to and are employing the
following covert, mainly technological assaults:
Place human subject under ceaseless satellite surveillance, regardless of where he/she is.
Via satellite, ceaselessly monitor human brain, including thought,
reaction, motor command, auditory event and visual image reading,
through ‘Remote Neural Monitoring’ (RNM).
Ceaselessly attack the human brain via satellite with voices,
noises, other disturbances, images and ‘virtual-reality scenarios’; and
override, control, and alter consciousness through ‘Electronic Brain
Link (EBL)’.
Directly abuse, torture, assault, and interfere with bodies, including performing advanced medical procedures via satellite.
Directly interfere with personal electronics, alter, insert etc.
data, files, communications and legal evidence even during transmission
via satellite.
Make live TV, radio, and other screens/monitors two-way for surveillance, invasion of privacy, deception, traumatisation etc.
Control information flow and orchestrate media globally.
Finch says that through the above list of activities:
1. Surveillance
For over ten years, Finch has been under 24/7 Orwellian surveillance, – everywhere he goes.
“Since 2004, my brain, body, physical
space and privacy have been ceaselessly monitored, including thought,
reaction, motor command, auditory event and visual image reading,” Finch
explained Monday. “I have been under this extremely traumatizing,
Orwellian surveillance and interference – and then extremely brutally
and hard-core tortured and deformed since 2004.” Finch says that during
the past eleven years, his psychological, mental, intellectual and
physical states, actions, thinking, imaginations, and words have been
exploited and publicly exhibited via the internet as well as the TV and
radio.
2. Enhanced interrogation/torture
Finch says he’s been subjected to sleep
deprivation, sensory overload, and “mind-*uck” torture. Under subsequent
intensive neurological ‘mind-control’, his experiences included:
witnessing suicide of ‘King of Thailand’ and a cutting off of his friend’s brother’s legs
saving many women’s ‘souls’ from death, and many countries from nuclear attack
a ‘ritual abuse wedding’ in which ‘Queens of Norway and Sweden’ participated
a fictitious relationship with ‘Princesses of Norway and Thailand’ and “some other illusory women”
a ‘road trip’ escaping ‘USA army killers and blackmailers’, ‘Asian
mafia/dragon killers’ among others; and participating in fake
psychoanalysis and personality analysis sessions; and doing Q &
A-type interviews on diverse socio-political subjects.
3. “Voice to Skull” neurophonics
Perpetrators’ voices are forced directly
into Finch’s brain, he says. The perpetrators aggressively and
relentlessly psychologically attack, denigrate, interrogate, undermine,
mob and bait Finch, he says. “The mind control attacks as “voice attacks
forced directly into my butchered, mangled brain.” Finch says the voice
to skull-type mind control assaults “take the form of a running attack
with a personally codified system of comments and responses to my
thoughts, activities, social and psychological state, and biorhythms –
both straightforwardly and with many different disorienting, infuriating
and distorting effects. This sensory and mental torture and attack
directly into my brain has varied from extreme causing near-complete
mental breakdown and desperation, to loud, intensive and continuous, to
milder, and has included numerous mock-executions. According to Finch,
it is all completely and totally “unignorable and inescapable”.
“The ‘circuits’ are always open – my
brain, body and physical space are ceaselessly brutally violated,
monitored and interfered with – and forced into reaction and response –
24 hours a day. It’s a brutal, technological, inescapable
‘Iago-bullshit-hell-machine’. “I literally haven’t had a single minutes
mental rest, relaxation or privacy since 2005 – not a single minute.”
4. Continually subjected to neurological experimentation
Finch’s account gets worse, albeit little
different to what thousands of TIs globally are reporting. As many
others, he says he has ceaselessly been subjected to multiple nightly
neurological experiments and interventions.
“Whilst ‘sleeping’ artificial
‘virtual-reality scenarios’ (like little ‘You-Tube’ videos or cartoons
or slideshows) are forced into my brain and therein
processed/experienced,” he explains. “Night after night after night –
every single night since 2005 – 3,4,5,6,7 or more times per night. I
have been on this sleep and brain control regime and I haven’t had a
natural, uncontrolled nights sleep since 2005.
“Often my brain processing/experiencing
these “virtual-reality scenarios” is transmitted and exhibited by these
Mengele butchers pretending to do “science”. Their ability to do this
required extensive and very brutal neutralization and engineering of my
normal, healthy brain – in order to effect a kind of ‘tabula-rasa’ to
use as a ‘player’ – for them to be able to force in their ‘codes’ and
‘play’ their ‘virtual-reality scenarios’. This has resulted in mentally
and psycho-physiologically exhausting, degrading and deforming me.
5. Pain and experimentation
Finch says that relentlessly, he has been
subjected to “deep, hardcore and other neurological attacks on his
brain, creating a lasting lobotomized effect – often similar to being
sledge-hammered, repeatedly stabbed, roasted, fan-forced micro waved,
blow-torched, axed, bombed etc. in and across the brain, almost every
single night since 2005, mostly multiple times, and sometimes for hours
and hours at a time – all night, all afternoon.
“My whole creativity, ‘raw material’,
senses, sensibility, feelings, thought, speech, intelligence,
imagination, emotions and organic health, range, depth and potential
have been completely degraded, butchered, mangled, wasted and/or
destroyed. Repeatedly subjected to multiple other experiments and
interventions on other areas of my brain.“
6. Electrical abuse
Repeatedly and relentlessly – every single
day and night, Finch has been subjected to electrical abuse and torture
on his genitals, crotch, reproductive system, glands and lymph system.
Again, these covert, electronic sexual assaults might sound far-fetched
to the causal observer. They are, however, among the most common of all
assaults that TIs describe.
“Electric currents are applied to my
genitals, crotch and reproductive system at different intensities and
positions, often continuously for extended periods of time. This ranges
from mildly disturbing to extremely torturous,” Finch states. “The
cumulative affect is sickening and constant mental and physical tension
and aggravation. This electrical abuse and torture on the genitals,
crotch and reproductive system is applied at any time of the day or
night.
He says he’s awakened by the application
of electric currents to his genitals, crotch and reproductive system –
night after night after night. Often, he’s given erections in
coordination with the brain butchery, and occasionally voided of semen
(my sperm production has been stopped).
“I am being used, experimented upon and
butchered like a lab rat,” Finch says. “My genitals have been
liposuctioned, collagened, vasectomied, and my scrotum subjected to
repeated reductions and enlargements. I have also been anally raped and
interfered with numerous times.
7. Internally heated, electrocuted
“My stomach, glands, abdomen, intestines,
lymph system and other internal organs are also being continuously,
repeatedly and intensively heated and electrocuted,” he says, adding
they are being “cooked/burnt-out, similar to being stabbed, roasted,
micro waved, blow-torched… hour upon hour or all night and/or much of
the day.
“My heart, chest, neck, lower back, back,
diaphragm and all over my body. My torso, face and buttocks have been
liposuctioned 2 or 3 times. My nipples are often electrocuted. Also in
an extremely painful operation they put my spine out of alignment and
did extensive nerve reconfiguration work in my spine and lower back
throwing my whole body out of alignment – lower back, pelvis, hips,
muscles, limbs, balance etc.”
Since 2005, he says, “Huge – 10,000s of hours – amounts of
electricity have been pumped through my body and brain by these Nazi
butchers.”
Finch believes his treatment this is an
attempt to ‘re-engineer’ or ‘render’ his brain and body. He says it has
seriously degraded his senses, sensibility and mental, psychological and
physical strength, range, quality and depth.
“My brain has been reduced in power,
quality and function by at least 70%. All my ‘raw materials’,
psycho-physiological powers, energy, amorphous, undeveloped and latent
thoughts, memories, emotions, passions, and feelings degraded, burnt-out
and/or destroyed.
“My chest has been sunken, my lungs
collapsed, my heart and muscles atrophied, my circulation and metabolism
slowed, my stomach expanded and deformed, my genitals mutilated and
deformed, and my body-shape completely altered and deformed.”
8. Various other odd torturous applications and dirty tricks
Finch says he is subjected to various
other mental, physical and social tortures, degradations and dirty
tricks. This includes having his privacy invaded by, and being
extensively publicly exhibited via, internet, TV and Radio.
“Since 2004, whenever I turn on the TV or Radio, if it’s live, I am
linked to the broadcasting source. It happens any time I see or hear a
live broadcast, no matter where I am. It completely ruins live TV and
radio – as you are actually like being in a video-conference – so it’s
hard to remain impassive or unaffected – especially whilst being
tortured.”
This invasion of his privacy and his torture and abuse has been witnessed by many Australian and overseas newscasters, he says.
“Thoughts and images from my deformed, mutilated brain and and lab-rat life have been ‘brain-broadcasted’
to the journalists etc. on TV and Radio – and often presented to them
as if it was the workings of my normal brain/mind – also a lot of
disinformation and misrepresentation has been ‘fed’ to them. This has
often resulted in some of them – both advertently and inadvertently –
actually actively participating in the torture and aggravation.
“Some, I believe, have actually been
encouraged to elicit responses from my lab-rat brain and thereby to
assist in and facilitate the butchering of my brain and senses to fit
these Nazi technologies and horrendous violations.”
“The media has been flooded with dehumanizing, ridiculous
‘Psychological-Operations’, parodies and caricatures of Finch, his
family and life– as at the same time they are parasiting, torturing and
organically destroying me, they are constructing a fiction about ‘me’
and ceaselessly, idiotically, making what they pretend to be valid
psychological and social observations about ‘me’, my life and family.”
This has been done through what he and others call 2-WAY TV, abuse another Australian, Paul Baird details on his SurveillanceIssues.com website.
9. Family, friends and colleagues also attacked:
Between 2005 and 2008, Finch’s mother,
sisters and other family members have been neurologically
attacked/surgically mutilated, and both parents and other family members
have been anally raped using Directed Energy and Neurological Weapons,
causing them profound mental and physical ill-effects and degradation,
and profound organic impairment and disruption, he claims. He also says
that since 2005, many colleagues, acquaintances, friends or simply
anyone who came in contact with him daily were also neurologically
attacked/surgically mutilated, and/or anally raped using DEWs, causing
them profound mental and physical ill-effects and degradation, and
profound organic impairment and disruption. “Literally over 200 people
between 2005 through 2009,” he says.
10. Organized Stalking/Mobbed
“I have been relentlessly subjected to Organized Stalking/Mobbing.” This multi-stalking abuse typically deployed against TIs consists
of intense and highly organized persecution with such frequent
harassment, most targets eventually boycott professional and leisure
activities. That in turn, isolates the target so perpetrators can more
fully take control of the victim’s life, manipulate the victim’s mind
and ultimately, create him/her into a helpless situation. Finch concurs
with others in that this treatment is a “barbaric form of torture.”
People are purposely engaged
to aggravate, impede and violate physical and psychological spaces,
privacy and freedom, he says, adding that it is extremely
psychologically and physically oppressive and suffocating.
“This happens everywhere I go, anytime, no matter what I do.”
He his neighborhood has been infiltrated,
as other TIs concur. TIs able to flee their home and country find that
the same abuse picks up again shortly after they are in another
country.
“This is being done to me everywhere I go –
including in Russia and Turkey,” Finch said, explaining it finally more
or less halted in 2011.
“They do all this to me and yet these perverted psychopaths allow,
even encourage me to send emails all over the world publicizing their
sadistic crimes.”
He says the perpetrators continually taunt
him by telling him things such as, “We’re ass-wiping democracy,” and,
“You’re sweeping the floor for us.”
“The UK and Australian government and authorities, humanitarian
organizations and everybody else have completely ignored, and failed to
protect me. I’m aware that there will probably
be considerable resistance to anyone who attempts to help me – but I
ask you to not shy away from such an act of bravery and principle. “It is no exaggeration to say my case is as horrendous and urgent as
someone fleeing a Nazi or Pol Pot concentration camp – specifically Dr
Mengele-type butcher,” Finch asserts.
Jade Two Battlefield System
If the reader is acquainted with Jade Two
Battlefield System artificial intelligence reports, then Finch’s account
resonates more than those unaware of this year’s massive military
exercises, Jade Helm 15 and running in the background of it, Jade 2. The
video below, while obviously right-wing bent, according to the visuals,
explains in layman terms, albeit without precise documentation, what
Jade Two is and why. After viewing the video with an open mind, Finch’s
account, like the thousands of other TIs’ accounts, seemingly show that
these innocent targets are non-consensual human experimentees. They are
only among the first wave of humans to personally experience the
military’s New World Order Full Spectrum Dominance wrath.
The video is an interview with an unamed
“network / software engineer” claiming to present her analysis of what’s
behind “Jade Helm Exercise, (“Jade Helm 15″): the Joint Assistant For
Development and Execution (JADE). She says it is a system roll out of an
Artificial Intelligence Quantum Computing Technology with capacity for
evaluations and subsequent treatment that TIs allegedly already
experience 24/7. Jade 2 includes producing holographic battlefield
simulations with capacity to use vast amounts of data that has been
collected on the human population individuals, the human domain, to
generate “human terrain systems in geographic population centric
locations to identify and eliminate insurgents, rebels, or whatever
label that can be flagged as targets in a global information grid for
what the military calls Network Centric Warfare Environments – according
to the mystery interviewee..
The analyst explains:
The “JADE TWO” BATTLE FIELD SYSTEM is cognitive and intuitive. It
can examine prior executed battle plans and devise ‘new and better’
strategies to increase the ‘kill chain’. The second generation of JADE,
‘JADE TWO,’has the capability for two way communication with DRONES
through the O.C.C.O.M. technology which is one of the next generation
integrations to this system. In short, JADE HELM will not be battles
directed by Generals and Military Commanders, but by a computer. It is a
COGNITIVE SOFTWARE SYSTEM program based on a NETWORK CENTRIC WARFARE
SYSTEM,… basically “AT THE HELM”. Hence we have “JADE HELM”!
Remember: “Military hardware will
soon consist of ‘autonomous robots that know neither pity nor fear’ —
quite a step up from the current generation of UAVs and drones operated
by humans from the safety of military bases hundreds, if not thousands,
of miles away,” reports Chris Tilbury for The Kernel. [Read: Robot drones with no pity or fear to decide who to kill]
WikiLeaks releases today the “Investment Chapter” from the secret
negotiations of the TPP (Trans-Pacific Partnership) agreement. The
document adds to the previous WikiLeaks publications of the chapters for
Intellectual Property Rights (November 2013) and the Environment
(January 2014).
The TPP Investment Chapter, published today, is dated 20 January
2015. The document is classified and supposed to be kept secret for four
years after the entry into force of the TPP agreement or, if no
agreement is reached, for four years from the close of the negotiations.
Julian Assange, WikiLeaks editor said: “The TPP has developed in
secret an unaccountable supranational court for multinationals to sue
states. This system is a challenge to parliamentary and judicial
sovereignty. Similar tribunals have already been shown to chill the
adoption of sane environmental protection, public health and public
transport policies.”
Current TPP negotiation member states are the United States, Japan,
Mexico, Canada, Australia, Malaysia, Chile, Singapore, Peru, Vietnam,
New Zealand and Brunei. The TPP is the largest economic treaty in
history, including countries that represent more than 40 per cent of the
world´s GDP.
“Increase the power of global
corporations by creating a supra-national court … where foreign firms
can “sue” states and obtain taxpayer compensation for “expected future
profits””
The Investment Chapter highlights the intent of the TPP negotiating
parties, led by the United States, to increase the power of global
corporations by creating a supra-national court, or tribunal, where
foreign firms can “sue” states and obtain taxpayer compensation for
“expected future profits”. These investor-state dispute settlement
(ISDS) tribunals are designed to overrule the national court systems.
ISDS tribunals introduce a mechanism by which multinational corporations
can force governments to pay compensation if the tribunal states that a
country’s laws or policies affect the company’s claimed future profits.
In return, states hope that multinationals will invest more. Similar
mechanisms have already been used. For example, US tobacco company
Phillip Morris used one such tribunal to sue Australia (June 2011 –
ongoing) for mandating plain packaging of tobacco products on public
health grounds; and by the oil giant Chevron against Ecuador in an
attempt to evade a multi-billion-dollar compensation ruling for
polluting the environment. The threat of future lawsuits chilled
environmental and other legislation in Canada after it was sued by
pesticide companies in 2008/9. ISDS tribunals are often held in secret,
have no appeal mechanism, do not subordinate themselves to human rights
laws or the public interest, and have few means by which other affected
parties can make representations.
The TPP negotiations have been ongoing in secrecy for five years and
are now in their final stages. In the United States the Obama
administration plans to “fast-track” the treaty through Congress without
the ability of elected officials to discuss or vote on individual
measures. This has met growing opposition as a result of increased
public scrutiny following WikiLeaks’ earlier releases of documents from
the negotiations.
“Document is classified and supposed to be kept secret for four years after the entry into force of the TPP agreement”
The TPP is set to be the forerunner to an equally secret agreement
between the US and EU, the TTIP (Transatlantic Trade and Investment
Partnership).
Negotiations for the TTIP were initiated by the Obama administration
in January 2013. Combined, the TPP and TTIP will cover more than 60 per
cent of global GDP. The third treaty of the same kind, also negotiated
in secrecy is TISA, on trade in services, including the financial and
health sectors. It covers 50 countries, including the US and all EU
countries. WikiLeaks released the secret draft text of the TISA’s
financial annex in June 2014.
All these agreements on so-called “free trade” are negotiated outside
the World Trade Organization’s (WTO) framework. Conspicuously absent
from the countries involved in these agreements are the BRICs countries
of Brazil, Russia, India and China.
Editor’s Note: I am both pleased and grateful that The Sullen Bell
has spared me the task of outlining the content of the first three
parts of this series on JADE HELM 2015. Readers who have not already
read the previous installments may quickly refer to The Sullen Bell for
an outline synopsis. I will leave this window open for you, so you can
click back and forth as you wish.
Again I must reiterate that this series of
articles is not an official Oath Keepers statement of policy, but
instead is simply an open letter to Oath Keepers members and friends.
Also, please be advised that at the bottom of this article is the
mind-blowing video from John B. Wells’ Caravan To Midnight — episode
309: Jade Helm Decoded. If you do not read any of these four articles,
at least scoll down to that video link and treat yourself to the most
comprehensive knowledge available to date on JADE HELM 2015. Readers who
have actually followed this series of articles and absorbed all the
background materials I’ve included will have the best possible
perception with which to comprehend the message John B. Wells’ anonymous
guest has broadcast. Patience is not only a virtue, it is a necessity
in trying to understand our modern world and the inherent threats to our
lives and liberty. I want to thank each of you who have diligently
waded through this series. And I should say, I have deleted a lot of
material which actually should be included, for the sake of brevity. I
will probably edit-in more material in coming times.
1) The fact that JADE HELM 2015 is an Unconventional Warfare exercise; 2) The fact that UW includes PSYOP and Civil Affairs activity; 3) The fact that Civil Affairs involves cultural anthropology and social study; 4) The Army’s Unconventional Warfare listing of “INSTRUMENTS OF NATIONAL POWER”; 5) The Globalists’ view of the “Impact of Global Political Awakening” (by we the little people); 6) The economic effects of the military-industrial complex activity on the U.S. economy; 7) The fact of complicity between the UN’s NGO operations such
as Agenda-21 and government’s perceived need to control its population
while Agenda-21 initiation is in process; 8) Asymetric Warfare and its relation to Unconventional, Special, and Irregular Warfare; 9) The creation of perpetual war by creating new enemies one after another; 10) The military’s interface/merger with local police through DHS’ Fusion Centers; 11) Social planners’ concerns and confronting problems which would occur if permanent peace were to break out; 12) DHS profiling of American citizens, with help from SPLC; 13) Government-sponsored false flag events, such as were proposed in the Northwoods Document of 1962 at the Pentagon; 14) Mapping the Human Terrain and “Mastering The Human Domain”; 15) Training scenarios targeting the Tea Party and/or Constitutionalist citizens.
Part < three > added this bouquet of dots to be connected:
16) The 1980 US Army document named “From PSYOP To MindWar”. 17) The 2013 published book entitled “MindWar”. 18) We remembered the Army’s use of the term “NATIONAL POWER” in
their 2008 manual on Unconventional Warfare (which is the type of
exercise JADE HELM 2015 is conducting, according to ARSOF’s
announcement.) 19) Self ownership, including ownership of one’s own mind, the importance of that. 20) Unconventional Warfare (UW), Irregular Warfare (IR), and MindWar (MW). 21) The two types of “mind”: The individual mind and the group mind. 22) The Quantum properties of conscious awareness (this we only linked subtly to as an url under a photograph, which leads to diplopi). >>>embedded link: https://diplopi.wordpress.com/2013/09/17/does-consciousness-arise-from-quantum-processes-in-the-brain/ 23) The reality that our ability to think as individuals is now under attack by our government. 24) The book “Propaganda” by Edward Bernays with a couple of quoted passages therefrom. 25) The framers’ concept of “Nature or Nature’s God”. 26) President Obama’s support of indefinite detention. 27) John Whitehead on the militarization of America. 28) The government’s use of propaganda as exemplified by the classic old film “Reefer Madness”. 29) Psychotronic research for military purposes in PSYOP. 30) DARPA’s brain-machine interface studies and DARPA military helmet prototypes. 31) The NIJ’s 1997 report on the Partnership between law enforcement and the military. 32) OOTW (Operations Other Than War). 33) The merger of U.S. military with Canadian military. 34) Iran-Contra-Mena scandal as a black-op by the Intelligence community. 35) A video revealing that the author of MindWar (both the paper and the book) is Michael Aquino. 36) We exposed the obvious fallacy of logic in Aquino’s paper
regarding PSYOP during the Viet Nam War by revealing the hidden history
about U.S. military relations with Ho Chi Minh in World War II when he
was our ally. 37) ELF waves and their appeal to PSYOP/MindWar operatives (PsyWarriors).
All of those sub-topics needed to be put in place before we could
look from an over-view perspective at the marvelous conceit of our
General government’s nefarious plan — Yea, indeed, “conspiracy“!
— to enslave every American and even every human being on the planet.
JADE HELM 2015 is a very small aspect of the much larger goal of
conquest being even now executed within the collective consciousness of
mankind. As we’ll see, the MAIN CORE list is merely for we who are
awake, that we may be dealt with before the general population
wakes up to what is happening to our world. That said, let’s recall
something I published on April 02, 2015 — the Caravan To Midnight show
in which John B. Wells hosted Patrick Wood of the August Forecast &
Review. http://oathkeepers.org/oktester/technocracy-rising-patrick-wood-on-caravan-to-midnight/
Let’s quickly recall some facts from that unforgettable show as presented by Patrick Wood:
Patrick’s new book is “Technocracy Rising“.
>>>embedded link: http://www.technocracyrising.com/
On John B. Wells’ Caravan To Midnight show and in the book Patrick
Wood lays out the obscure underbelly of the Trilateral Commission and
their revival, in secrecy, of something Patrick Wood alone discovered —
TECHNOCRACY. Wood shows us that the Trilateral Commission has absorbed
our government from within, and that our government is now being used to
destroy American sovereignty, our value system, our moral codes, our
culture, our social institutions, and indeed our very lives as free
Americans. This is being done to establish their pet project — the
transformation and trans-positioning of America into a “New Economic
International Order”.
Wood lists seven of their primary targets as being:
1. Economics 2. Government 3. Religion 4. Law 5. Energy 6. Humanity 7. Christianity
“Who” is to do all this “transforming”? 1) the Trilateral
Commission; 2) Technocracy; 3) the United Nations; and 4) Non-Government
Organizations (NGOs).
We note that neither the American People nor the Congress of the
United States of America are party to the transformation. Technocracy
and Trilateralism and the United Nations and Non-governmental
organizations are the four horses on which the New International
Economic Order is riding into our lives. Keep that in mind as we go.
Mr. Wood gives us things to notice, things being used by Technocracy to “transform” us:
1. Agenda 21 2. sustainable development 3. smart meters 4. climate change 5. cap and trade 6. the Green Economy 7. Human enhancement (Trans-Humanism: the merger of man and machine, literally)
Please do, if you’ve not already done so, click this link
and take time to view the Caravan To Midnight interview and read my
report on that interview. We are almost to the end of my initial series
on JADE HELM 2015, and this fourth installment will be the longest thus
far, so I must Salute! all diligent readers who give themselves
permission to read what has been presented, for you in doing so reveal
that you want to know the full truth behind the symptom called JADE HELM 2015. Thank you for investing your hours to absorb all of this information. As Sir Francis Bacon once said, “Knowledge is power.” Feel the power as you enjoy the truth, for the truth shall set us free.
“…the doctrine of ‘emergency
powers’ runs afoul of America’s Constitution… Anyone who bothers to read
the Constitution will see that it:
Delegates to the General
Government as a whole – or to Congress, the President, or the Supreme
Court separately – no ‘emergency powers’ under that rubric;
Delegates neither powers
that only an ‘emergency’ can call into existence, nor powers that may
be exercised only in an ‘emergency’;
Delegates no power even to declare that an ‘emergency’ exists; and, perhaps most decisively of all,
Does not even employ the
word ‘emergency’, let alone define it as a legal principle relevant to
any part of ‘the supreme Law of the Land’.”
That one passage from Dr. Vieira’s book goes to our most central hope
for undoing the tremendous damages to America which have been done in
the name of the so-called “War on Terror”. Wisdom shall bear in mind
the uncomfortable fact that power-mad politicians on both sides of the
aisle have always sought to increase illegitimate government power by
crying “Emergency!”
Yes, there can be “emergencies”. But No, the General government in
Washington D.C. (WDC) does not gain some magical new power to attack our
Bill of Rights just because an emergency occurs. If – for
example – in a hypothetical situation in which unscrupulous politicians
and government officials wished to involve America in an otherwise
neutral war somewhere, or if they wished to exercise more control over
the behavior of society, or if they wished to install a military-police
state under martial law in America, or if they wished to take America
fully into a one-world government via the United Nations and control or
limit popular dissent against that, their first step would be to employ
black-ops Intelligence community operatives to create a pretext and then they would cry “national emergency”. Peak events of Twentieth Century America show this clearly.
The notion that an emergency of some kind should somehow suddenly
suspend the Constitutional way of setting and administering policy in a
branch, department, or agency of the General government in Washington
D.C. is used to justify a violation of Constitutional law by those
verily foresworn to uphold the Constitution. The Constitution makes no
provision for its own suspension.
So the ruse called “Emergency”, and especially the usurpation called
“Emergency Powers”, holds no gravity, has no lawful basis, has no
authorization, and is not granted in and by the Constitution for
federal-level governance. Yet the General government in WDC is operating
under the guise of “emergency powers” now, for its own protection and
perpetuation, and trampling its own founding legal charter in a tryst of
tyranny based on imagined authority which does not lawfully exist. I
shall give an example from the Legislative Branch and one from the
Executive Branch, to reveal just how Gov employees think:
(Note please – the bill below was only introduced to
Congress, and did not get passed into law so far as I know at present. I
am including it merely to demonstrate the abnormal perceptions of our
policy makers. This bill shows how Govlish-minded politicians think.) https://www.govtrack.us/congress/bills/111/hr645/text
111th CONGRESS
1st Session
H. R. 645
IN THE HOUSE OF REPRESENTATIVES
January 22, 2009
A BILL
To direct the Secretary of Homeland Security to establish national emergency centers on military installations.
1. Short title
This Act may be cited as the “National Emergency Centers Establishment Act”.
2. Establishment of national emergency centers
(a) In general
In accordance with the requirements of this Act, the Secretary of
Homeland Security shall establish not fewer than 6 national emergency
centers on military installations…
(b) Purpose of national emergency centers
The purpose of a national emergency center shall be to use existing infrastructure—
(1) to provide temporary housing, medical, and humanitarian assistance
to individuals and families dislocated due to an emergency or major
disaster;
(2) to provide centralized locations for the purposes of training and
ensuring the coordination of Federal, State, and local first responders;
(3) to provide centralized locations to improve the coordination of
preparedness, response, and recovery efforts of government, private, and
not-for-profit entities and faith-based organizations; and
(4) to meet other appropriate needs, as determined by the Secretary of Homeland Security.
3. Designation of military installations as national emergency centers
(a) In general
Not later than 60 days after the date of the enactment of this Act, the
Secretary of Homeland Security, in consultation with the Secretary of
Defense, shall designate not fewer than 6 military installations as
sites for the establishment of national emergency centers….
I especially note this line: “…to meet other appropriate needs, as determined by the Secretary of Homeland Security”.
That would, of course, be the same Homeland Security which advises “law
enforcement” to keep an eye on returning war Veterans and anyone who
dares to support Ron Paul or Chuck Baldwin, or who believes in the
Constitution as written, as we saw in part one of this series. Here is
another approach, this time from the President of the United States of
America.
NATIONAL SECURITY PRESIDENTIAL DIRECTIVE/NSPD 51 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE/HSPD-20
Subject: National Continuity Policy
Purpose
(1) This directive establishes a comprehensive national policy on the
continuity of Federal Government structures and operations and a single
National Continuity Coordinator responsible for coordinating the
development and implementation of Federal continuity policies. This
policy establishes “National Essential Functions,” prescribes continuity
requirements for all executive departments and agencies, and provides
guidance for State, local, territorial, and tribal governments, and
private sector organizations in order to ensure a comprehensive and
integrated national continuity program that will enhance the credibility
of our national security posture and enable a more rapid and effective
response to and recovery from a national emergency.
.
Did we notice how they slipped in that little bit about “private sector organizations“?
We’ll get to that below, but first, here is that same President being
cheered by the mindless masses while promising to convert, er, make that
read “change”, America into a veritable military-police state in the
event of an “emergency“.
When one removes the Govlish spin on the silliness of such official
proclamations one can see a grotesque portrait of what JADE HELM 2015 is
really all about. And the more closely one looks into it, the more one
realizes that JADE HELM 2015 is but a symptom, a sign of something much
larger, much more potent, much more sinister. The military will be
infiltrating American communities and properties while also working with
“law enforcement” at Local, State, and regional levels. Unconventional
Warfare psy-warriors will be collecting data of the sort which our
Intelligence community has long called “HUMINT” (HUMan INTelligence).
That data will be “mapped” as features of the “Human Terrain” for the
States where the exercise will occur. That HUMINT will be pooled up
somewhere in impersonal indifferent soul-less computing machines which
have absolutely no regard for any citizen’s individuality or unalienable
rights.
Courtesy D-WAVE
Speaking of machines, on February 14, 2007 the Daily Tech dot com published this headline:
World’s First Commercial Quantum Computer Demonstrated
The story starts off with —
Canadian firm D-Wave Systems unveiled
and demonstrated today what it calls “the world’s first commercially
viable quantum computer.” Company officials announced the technology at
the Computer History Museum in Mountain View, California in a
demonstration intended to show how the machine can run commercial
applications and is better suited to the types of problems that have
stymied conventional (digital) computers… Quantum computers rely on quantum mechanics, the rules that underlie
the behavior of all matter and energy, to accelerate computation. It
has been known for some time that once some simple features of quantum
mechanics are harnessed, machines will be built capable of outperforming
any conceivable conventional supercomputer.
And on May 20, 2013, Denise Chow published for Live Science an article titled:
Is Google’s Quantum Computer Worth the Hype?
Excerpt:
Google’s announcement last week that
it plans to launch a new quantum computing laboratory with NASA may
have boosted a highly specialized and slightly obscure field of study
into a more mainstream light. The search-engine giant says quantum
technology will help the company build better, more accurate search
engines, and will help advance the field of artificial intelligence.
If it strikes one odd that a private corporation and our government
would join forces on a technology which will expand the surveillance
state’s appetite, one would not be alone. A term I published in 1999
comes to mind as a good descriptive: “The Corporate Dynasty”.
On May 05, 2009, WorldNet Daily published the headline:
Census GPS-tagging your home’s front door
On June 06, 2013, the Washington Post published some revealing slides which stunned the nation. The headline was clear:
NSA slides explain the PRISM data-collection program
In June, 2013, almost every American (and most other people of the
world) took pause in daily routines to register the shock of learning
that one’s every communication has been being collected by massive
super-computers. As anyone might have let the implicating gravity of
that register more deeply into one’s awareness, one likely found oneself
reflecting about to whom one may have sent an email or made a phone
call. Imagine one’s instant fear – “Oh my! What if *they* listened to that call, or read that email!”
And who would “they” be? PRISM, of course.
NSA PRISM _ Slide Courtesy Washington Post and Edward Snowden
The government “does not unilaterally
obtain information from the servers of U.S. electronic communication
service providers,” Clapper added. “The notion that Section 702
activities are not subject to internal and external oversight is
similarly incorrect. Collection of intelligence information under
Section 702 is subject to an extensive oversight regime, incorporating
reviews by the Executive, Legislative and Judicial branches.”
And of course we are to be reassured by the fact that a
Congress which enjoys a ten percent approval rating is certainly keeping
our best interests in mind, right?
JADE HELM 2015 is an Unconventional Warfare exercise, and we saw in
parts one and two that UW psy-warriors use “surrogates” of the criminal
type for black operations. Surrogates are criminals who can be “handled”
or “directed” by psy-warriors doing Unconventional Warfare/Irregular
Warfare/Special Operations deployments anywhere in the world, including
the USofA. The Army’s 2008 manual on UW actually identifies “terrorists”
as a likely sort of “surrogate”. Here is that bit from the Army’s 2008
manual on Unconventional Warfare, from part two of this series:
(“Irregulars” who are to be used as surrogates) “…are usually nonstate-sponsored and unconstrained by sovereign nation legalities and boundaries. These forces may include, but are not limited to, specific paramilitary forces, contractors, individuals, businesses, foreign political organizations, resistance or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.'”
My point is, what on earth makes anyone believe that the government
can “oversee” what the government does in secrecy? Clapper was hiding
behind his statement that all three branches of government exercise oversight
of the NSA’s illegal and unlawful spying on American citizens. The
problem is that damn near everyone we send to WDC gets corrupted in
their first breath of air there, and we really cannot trust anything any
of them say, most certainly now that we know that those doing the oversight prior to the Snowden leaks never bothered to mention to We The People what our damned government was doing to us until well after Snowden exposed their sins.
Here is James Clapper lying to Congress about just what the NSA was collecting from the American people:
And here is Rand Paul uniting the Left and the Right to clearly define the crime of lying to Congress:
The insanity which was spawned by the creation of the National
Security State has deluded two generations of American legislators into
fabulous stretches of imagination which causes our Congress to continue
to lie to the American people about everything from the Federal Reserve
System, Inc., to the creation of the so-called “War on Terrorism”, and
just about everything in between. That insanity was created in part by
Allen Dulles, working with Clark Clifford to produce the National
Security Act of 1947 which created the National Security Council at the
White House (where Oliver North worked). It also created a cute little
diddy referred to as the “Black Budget” for covert, illegal, and immoral
activities to be conducted by the NSA-1947’s chief creation – the CIA.
But we must keep in mind that there is more than one “black budget”.
There is the secret black budget which Congress appropriates to be used
for black operations, but there is also the cash flow — in terms of
outright “cash” — which is accumulated tangentially as the CIA shares
services with terrorists, drug smugglers, insurgents, human traffickers,
money launderers, etc.
Those who believe that “US Code” is somehow superior to the Constitution itself actually believe that the National Security Act of 1947 literally gave the American government the “legal right” to lie to We The People. It’s been all downhill ever since. The lying needs to stop.
JADE HELM 2015 is yet another lie, but a pregnant one which will give
birth to yet more lies. We The People are yet expected to believe
anything our dear government tells us about JADE HELM 2015. But consider
— the ARSOF public info officer filmed speaking to Texas audiences
about JADE HELM 2015 coming to their areas this summer had no problem
telling Texans that some JADE HELM 2015 warriors would be in civilian
clothing, remember? Those “warriors” will include many people who are
not in the military at all, but are employees of corporations which do
contract work with the Federal government. What those in plain clothes
will be doing is what this part of this series is about.
Let me repeat the point which I (hopefully) made in part one of this
series — We cannot believe there is a War on Terrorism when our own
government proves to be the source which has literally created and armed
“the terrorists”. We cannot believe there is a War on Drugs when our
own government coordinates production and transportation internationally
of the bulk of all illegal drugs. We cannot believe that the U.S.
military has somehow found Constitutional authorization to practice Unconventional Warfare tactics on U.S. soil outside the military bases
the tax paying public has provided for such things. The standing army
could not even exist without some concocted “enemy”, and has no
Constitutional grounds to be conducting exercises which admittedly
include Psychological Operations and exercises which are designed to
facilitate “mapping the human terrain” for purposes of “Mastering The
Human Domain”. No Sir! This is insanity, this is immoral, this is
criminal, this is evil, this is unacceptable, and this must be stopped
now. Why we must stop it will become apparent as one continues to read
below.
University of Maryland
Intelligence Incorporated
JADE HELM 2015 is a remarkable gambit in public relations as well as a
public confession that our government in Washington D.C. (WDC) has
completely divested itself from any accountability to the American
people and our Constitution. The military has boldly announced that
JADE HELM 2015 is an “Unconventional Warfare” exercise, which means that
it will be operating on multiple levels including PSYOP tactics which
will assist computerized think tanks in WDC in “Mastering” the “Human
Domain”. I’m not making that up, for as we saw in part one of this
series ARSOF itself announces it boldly.
To master the human domain one must first map the human terrain, and
that is another aspect of JADE HELM 2015 which will be exercised during
operations across America this summer. The Army concedes that it has
interest now in “Civil Affairs”, as we noted in previous installments of
this series. We also noted that the Army / Pentagon has several
actualized Fusion Center relationships with our local police, with
interfaces between FEMA, the Department of Justice (DOJ), and the
Department of Homeland Security (DHS). Additionally we have noted that
various “new” concepts have pervaded Pentagon doctrine in the past
two-to-three decades, and such concepts include “drug interdiction”,
“peace keeping”, and “counter-terrorism” activities right here on U.S.
soil under an umbrella announced in the early 1990s and called
reverently “Operations Other Than War” (OOTW). See: http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA310578
With that much established in the first three parts of this series, I
am going to now suggest that the U.S. military has aligned itself in a
relationship with an odd and grotesque mental appendage to the body
politic, that being the insane notion now embraced by our
General government in WDC which compels government to protect itself
from the will of We The People, at all costs. This wild and unfounded,
even indefensible notion crept into the mechanized mindset of our
government after the world entered the post-Atomic age in which planners
were confronted by challenges posed by the threat of “decapitation” of
our government in WDC by a nuclear attack. The Great Cold War of the
latter half of the Twentieth Century began with, as Professor Carroll
Quigley stated, “…the quest for the thermo-nuclear bomb.” [My
paraphrase] The post-Cold War quest for global power by the
military-industrial complex brought with it the newly-born Intelligence
community mentality which holds like a religion the premise that “The End Justifies The Means“. In the eyes of those who work in government, Gov is tantamount to God. The mindset is what I’ve always alluded to as “Govlish“.
Outsourcing government business to private sector corporations who sell
products in service to Wall Street and WDC as well as to the Pentagon
made by people who are not in government offices is a very huge
business. To verify that we’ll look briefly at a wonderful resource
compiled by The Washington Post several years ago.
If we go to that page and click on “View Connections”, we’ll bring up this page: http://projects.washingtonpost.com/top-secret-america/network/#/overall/most-activity/
where we see an active fan-style chart showing the 45 government
agencies working in Top Secret America. If we click on the “NGA”
section near bottom right on that chart, we get this link — http://projects.washingtonpost.com/top-secret-america/network/#/single/gov-orgs/nga/
There we see that the National Geospatial-Intelligence Agency has a
working relationship with 121 of the 1,931 top secret companies in the
private sector. One hundred twenty-one corporate businesses are working
on top secret Intelligence projects for NGA, the Federal agency which
produces “… relevant and accurate geospatial intelligence (GEOINT) in support of national security.” >>>embedded link: http://geoint2015.com/
While on that page we see a link for “Unconventional Warfare”
(UW). Clicking that brings up a page which notes that 37 private
companies are working with 18 government organizations on Psychological
Operations (PSYOP). We can read a brief description —
Traditional psychological
operations, including the creation and delivery of messages via leaflet,
loudspeaker, radio or television; the newer “influence operations”
associated with the creation of Web sites and the use of social media to
extend U.S. influence, both overtly and covertly; and the separate
clandestine and covert activities associated with influence, deception
and perception management.
Whilst clicking around we can come up with an endless array of related web pages, such as Trajectory Magazine’s piece on GEOINT 2015,
which has links to the highlight videos. This rabbit hole, like
everything else related to modern Federal-level government activity, is a
labyrinth. The opening paragraph introduces to newbies such as myself
strange new concepts —
During the Cold War, the
Intelligence Community collected information about Soviet activity: The
enemy is loading ammunition; it’s moving artillery closer to maneuver
forces. The observations were logistical, and the data yielded warnings,
explained Collin Agee, U.S. Army senior adviser for Intelligence
Community engagement. “Predictive analytics” might be the buzzphrase du
jour, Agee said, but the concept is nothing new. In the commercial
realm, predictive analytics is picking up steam, while the Intelligence
Community is adapting the concept to modern computing technology and Big
Data, and simultaneously shifting the nomenclature toward “anticipatory
intelligence.”
Ah, yes! Anticipatory Intelligence! That’s the thing, eh? That page also proclaims the quest for the missing pieces:
“The advent of Big Data and supercomputing is driving a new era of anticipatory intelligence”
In another Trajectory Magazine piece we read that the Defense Intelligence Agency is in on the act —
Today’s Federal government, when judged by its actions and results,
seems to suffer from a conceit which it believes whole-heartedly. I
fully-well understand that no man-made government can be a “mind” or a
“soul”, because being created by the mind of man its entity-ship is
limited to the indifferent status of merely being a “legal fiction”, no
matter how universally it might spread its powers. Therefore, when I
speak of the government as if it has a mind capable of willing its own
direction or pursuing its own conceits, I am simply speaking through personification,
a poetic tool of figurative language. The General government in WDC is
not “conceited”, but its style of administering itself unto and upon We
The People causes we flesh-and-blood real humans to question whether its
madness is intended or merely coincidental. It is in that light that I
note that the government seems to be suffering from a conceit, and that
it seems to believe its own conceit whole-heartedly. That conceited
belief, were it real and of any substance, would be the mistaken belief
that our government is itself “America”.
Our government is not America, period. Not only is it not
America — our government lately does not appear to even represent the
will of We The People who are America.
America is this great land and the people who live and work upon it,
period. We and our good neighbors who live and work out our lives on
the soil delineated by State lines and National borders, we and our
lands, are America. The government we installed to service the mutual
needs of the citizens of the several States was created to be a tool
guided by the hand of We The People. It was never intended to usurp our
individual sovereignty, tromp upon our autonomy, or assault our
“unalienable rights”. As Thoreau put it,
I heartily accept the motto, “That
government is best which governs least”; and I should like to see it
acted up to more rapidly and systematically. Carried out, it finally
amounts to this, which also I believe — “That government is best which
governs not at all”; and when men are prepared for it, that will be the
kind of government which they will have. Government is at best but an
expedient; but most governments are usually, and all governments are
sometimes, inexpedient. The objections which have been brought against a
standing army, and they are many and weighty, and deserve to prevail,
may also at last be brought against a standing government. The standing
army is only an arm of the standing government. The government itself,
which is only the mode which the people have chosen to execute their
will, is equally liable to be abused and perverted before the people can
act through it… This American government — what is it but a tradition,
though a recent one, endeavoring to transmit itself unimpaired to
posterity, but each instant losing some of its integrity? It has not the
vitality and force of a single living man; for a single man can bend it
to his will… Yet this government never of itself furthered any
enterprise, but by the alacrity with which it got out of its way. It
does not keep the country free. It does not settle the West. It does not
educate. The character inherent in the American people has done all
that has been accomplished; and it would have done somewhat more, if the
government had not sometimes got in its way.
My point is that the government is not “America”, but is a system
created by Americans to serve certain limited and enumerated purposes
as laid out in plain English in Article 1, Section 8 of the Constitution
which created it. Yet today’s General government in WDC appears through
its fanfare of actions as an out-of-control behemoth which has matched
its arrogance with an unlimited vanity, purporting to now own the States
which created it, and asserting its will to control the several States
and their respective citizens via departments and offices not granted in
its Constitution. Examples include, but are not limited to, the BLM,
the Department of Education, the DOJ’s sub-groups such as the ATF and
DEA, the IRS, FEMA and the Department of Homeland Security. None of
those are authorized by the Constitution which created the Federal
government, which is why a couple of Presidents of late have noted that
the Constitution is just a “(expletive) piece of paper”. It actually gets in the government’s way, as we’ll see in an excerpt from Christopher Ketchum’s article about Main Core, below.
It is extremely important that all Americans remember two primary facts of reality: First, we must never forget that the government
is *not* “America”. It is a creation by Americans for Americans. “We
The People” are America, and we have every right to manage how our
popularly-created government administers itself upon us. Secondly, all
Americans need to take a look at the original Constitution, including
the signatories at bottom of that document, where we notice that there
is no signature by anyone representing the Federal government. No one
signed the Constitution on behalf of the Federal government, because it
did not exist until after the several States ratified the
document. This is a clear message — the States, in compact, created the
Federal government. The fact that the Federal government now administers
itself upon our backs as if it created the States and has some right to
control We The People is a government-sponsored delusion, an illusion, a
great lie to which almost all politicians in WDC have succumbed.
Please bear those two facts in mind as we look into COG and Main Core and their relationship to JADE HELM 2015.
MAIN CORE
Let us now borrow from Christopher Ketcham, whose article I’ve mirrored < here > (Recommend reading the whole article.)
In the spring of 2007, a retired
senior official in the U.S. Justice Department sat before Congress and
told a story so odd and ominous, it could have sprung from the pages of a
pulp political thriller. It was about a principled bureaucrat
struggling to protect his country from a highly classified program with
sinister implications. Rife with high drama, it included a car chase
through the streets of Washington, D.C., and a tense meeting at the
White House, where the president’s henchmen made the bureaucrat so
nervous that he demanded a neutral witness be present.
The bureaucrat was James Comey, John
Ashcroft’s second-in-command at the Department of Justice during Bush’s
first term. Comey had been a loyal political foot soldier of the
Republican Party for many years. Yet in his testimony before the Senate
Judiciary Committee, he described how he had grown increasingly uneasy
reviewing the Bush administration’s various domestic surveillance and
spying programs. Much of his testimony centered on an operation so
clandestine he wasn’t allowed to name it or even describe what it did.
He did say, however, that he and Ashcroft had discussed the program in
March 2004, trying to decide whether it was legal under federal
statutes. Shortly before the certification deadline, Ashcroft fell ill
with pancreatitis, making Comey acting attorney general, and Comey opted
not to certify the program. When he communicated his decision to the
White House, Bush’s men told him, in so many words, to take his concerns
and stuff them in an undisclosed location.
Comey refused to knuckle under, and
the dispute came to a head on the cold night of March 10, 2004, hours
before the program’s authorization was to expire. At the time, Ashcroft
was in intensive care at George Washington Hospital following emergency
surgery. Apparently, at the behest of President Bush himself, the White
House tried, in Comey’s words, “to take advantage of a very sick man,”
sending Chief of Staff Andrew Card and then-White House counsel Alberto
Gonzales on a mission to Ashcroft’s sickroom to persuade the heavily
doped attorney general to override his deputy. Apprised of their
mission, Comey, accompanied by a full security detail, jumped in his
car, raced through the streets of the capital, lights blazing, and
“literally ran” up the hospital stairs to beat them there.
Minutes later, Gonzales and Card
arrived with an envelope filled with the requisite forms. Ashcroft, even
in his stupor, did not fall for their heavy-handed ploy. “I’m not the
attorney general,” Ashcroft told Bush’s men. “There”—he pointed weakly
to Comey—”is the attorney general.” Gonzales and Card were furious,
departing without even acknowledging Comey’s presence in the room. The
following day, the classified domestic spying program that Comey found
so disturbing went forward at the demand of the White House—”without a
signature from the Department of Justice attesting as to its legality,”
he testified….
Addressing the nation from the Oval
Office in 2005 after the first disclosures of the NSA’s warrantless
electronic surveillance became public, Bush insisted that the spying
program in question was reviewed “every 45 days” as part of planning to
assess threats to “the continuity of our government.”
How awesome, eh? Fedgov may violate our First Amendment and Fourth
Amendment rights so long as it reviews its violations periodically, yes?
And if the Department of Justice refuses to condone it, Fedgov will
just do it anyway, because the American people are too busy with their
comfortable lives to rise up in rebellion. Fedgov sees our apathy as
license to carry on with its nefarious assault.
Continuity of Government (COG) has been a priority for the General
government since the nuclear arms race began back in the 1940s and
1950s, but was ramped up strongly under the Reagan administration in the
early 1980s. It’s existence as a governmental priority came to light
dramatically when Texas Representative Jack Brooks questioned Oliver
North during the Iran-Contra-Mena scandal hearings in Congress. Though
it is now common knowledge, I note the irony in which a government which
steadfastly seeks to keep its most sensitive operations secret from the
American people also simultaneously seeks to know everything to the
smallest detail about every citizen’s life and activities.The government
has learned that we humans are “sentient beings” and wants to get to
know us better, yes? After all, our feelings and emotions and intuitions
and inspirations and all the moods and related states of mind are
elements of the “Human Terrain”.
What is “sentience”? A friend once noted to me that cats and dogs are
“sentient” beings, meaning that they have emotions. Cats and dogs can
show their love for their owners, can express joy and fear, have likes
and dislikes, can dream during sleep, can learn, and they have many
other attributes matching those of we humans. Simply put, “sentience” is
the registration in the brain of emotions in response to specific
subjective life-experience environments. So, given the Govlish madness
which now engulfs our government, it is not surprising that government
wants to turn its quantum computing powers onto the soul of man.
This important video from the Corbett Report was posted originally three years ago on August 05, 2012.
In June, 2013, almost every American (and most other
people of the world) took pause in daily routines to register the shock
of learning that one’s every communication has been being collected by
impersonal and indifferent machines called computers. As anyone might
have let that register more deeply into one’s awareness, one likely
found oneself reflecting about to whom one may have sent an email or
made a phone call. Imagine one’s instant fear – “Oh my! What if *they*
listened to that call, or read that email!”
Some say – “When spying is done without warrants, concern is
warranted.” The only thing warranted in all this warrantless spying on
the American people is concern. “Concern” is your and my “warrant”. The
fact that the NSA is doing this to the American people is remarkable.
Regarding such activity being conducted outside the U.S. A., I’m not
sure of course, but I imagine that the average Brit or Spaniard or
Italian or German or anyone in any other country, especially
political/governmental officials, might also resent this kind of global
snooping. Let us remember, this spying by NSA is a world-wide human info
trap.
The NSA has been doing this for a long time, for the most part in
secrecy. We may recall the national outrage when ECHELON surfaced years
ago, and we lamented that the Bush 43 administration enabled the NSA to
monitor our communications and that the companies which worked with the
Bush administration to spy on Americans’ communications received
government pardons. Here is a bit of the chronology surrounding the
ECHELON scandal – remember Russ Tice? Quoting him:
“As a Signals Intelligence (SIGINT)
officer it is continually drilled into us that the very first law
chiseled in the SIGINT equivalent of the Ten Commandments (USSID-18) is
that Thou shall not spy on American persons without a court order from
FISA. This law is continually drilled into each NSA intelligence officer
throughout his or her career. The very people that lead the National
Security Agency have violated this holy edict of SIGINT.”
From Wikipedia we read:
On December 23, 2005, the
Austin American-Statesman reported Tice’s allegations that spying on
Americans may involve a massive computer system known as ECHELON, which
is able to search and filter hundreds of thousands of phone calls and
e-mails in a matter of seconds.
Please note that the NSA’s ECHELON program was scanning emails and
phone calls for key words which would red-flag each message for further
analysis. A further statement from Russ Tice in June 2013:
On June 19, 2013, Tice
claimed while being interviewed that the NSA had spied on Barack Obama
himself while he was still a senator, along with monitoring federal
judges, ranking military officials, and other members of congress,
saying he himself had seen and held papers ordering such actions. He
went on to say, “This thing is incredible what NSA has done. They’ve
basically turned themselves – in my opinion – into a rogue agency that
has J. Edgar Hoover capabilities on a monstrous scale on steroids.”
Still, in 2005 and 2006, the public in general – the group mind of
the nation – was not cognizant of anything other than a few fleeting,
bland and breezy news articles which were quickly buried under a sports
story or Hollywood star news flash. Rush Limbaugh and Bill O’Reilly
even condemned Russ Tice for exposing NSA criminality, as if to expose
wrong-doing was wrong. I suppose they had bought the Govlish line about
some emergency and some “War on Terror”, yes?
But now, suddenly, because Mr. Snowden allegedly provided two
newspapers with the actual paperwork which proves our deepest fears,
everyone knows the NSA has been dragging in all of our communications
and storing them for future reference. The NSA is screaming that they
were not “reading” our mails or “listening” to our conversations on the
phone – oh no; they are just “collecting” them for future reference. The
NSA sees nothing wrong, immoral, or illegal about collecting your and
my communications without asking permission or without getting a warrant
based on probable cause. The NSA has no problem with keeping that kind
of criminality ‘secret’ from “we, the targets”. My question on that
count is if the NSA will knowingly violate my Fourth Amendment right to
be secure in my individual life as an American citizen, why should I
believe them about anything else they may proclaim? The NSA is publicly
denying that they are reading our communications, yet we’ve got the
proof that they were doing that as far back in time as 2005, eight years
ago.
Not long ago a General was running things at NSA. His name is Michael
Hayden. From NSA he went on to become head of CIA, preceding General
Petreus, who resigned in disgrace the day after President Obama’s second
election. Hayden was caught on film at the Press Club trying to tell a
group of journalists that the phrase “probable cause” was not in the
Fourth Amendment. See for yourself –
This man had the gall to literally deny, at the Press Club no less,
that “probable cause” is in the Fourth Amendment. What should we think
of that? And he was head of NSA, and then became head of CIA? My God!
The DOD is developing a parallel to
Planet Earth, with billions of individual “nodes” to reflect every man,
woman, and child this side of the dividing line between reality and AR.
Called the Sentient World Simulation
(SWS), it will be a “synthetic mirror of the real world with automated
continuous calibration with respect to current real-world information”,
according to a concept paper for the project.
“SWS provides an environment for
testing Psychological Operations (PSYOP),” the paper reads, so that
military leaders can “develop and test multiple courses of action to
anticipate and shape behaviors of adversaries, neutrals, and partners”.
This is getting to be quite interesting. They will want my drivers
license, military service records, shopping/consumer habits, criminal
record or lack thereof, medical records, reading habits, entertainment
preferences, driving habits and locations driven to, acquaintances and
family members, social security records, tax compliance records,
political party affiliations, clubs and organizations such as VFW or VVA
etc., visits to the Dentist, whether or not I have a television, cell
phone, computer, etc etc etc. Everything. And all of that info will be
assembled into the nature of my “node” in a quantum computer that is
“mapping the human terrain”. I will be reduced to HUMINT particles in a
machine which couldn’t care less about my “rights”, other than to map
into my node what I think those rights are .
Thanks to the way Snowden and other whistle-blowers did their
handiwork, it’s all over the news and can’t be stuffed back into the
bag. So in honor of Snowden’s heroics let’s plug James Bamford with a
friendly Salute!
James Bamford is the author who brought to light the now-infamous
“Northwoods Document”. He is also a favorite author, having written the
definitive tome on the NSA – Body Of Secrets – and the more-recent “The Shadow Factory”. Bamford is also the guy who fingered the NSA’s massive Data Center in Utah,
which is another centerpiece in this collage. Now James Bamford has a
new article published over at WIRED. It will not offend if you take
pause here and go to WIRED’s site and read Mr. Bamford’s masterpiece.
I’ll get you started with these few lines from the beginning of the piece:
Quoting - Inside Fort Meade,
Maryland, a top-secret city bustles. Tens of thousands of people move
through more than 50 buildings—the city has its own post office, fire
department, and police force. But as if designed by Kafka, it sits among
a forest of trees, surrounded by electrified fences and heavily armed
guards, protected by antitank barriers, monitored by sensitive motion
detectors, and watched by rotating cameras. To block any telltale
electromagnetic signals from escaping, the inner walls of the buildings
are wrapped in protective copper shielding and the one-way windows are
embedded with a fine copper mesh.
This is the undisputed domain
of General Keith Alexander, a man few even in Washington would likely
recognize. Never before has anyone in America’s intelligence sphere come
close to his degree of power, the number of people under his command,
the expanse of his rule, the length of his reign, or the depth of his
secrecy. A four-star Army general, his authority extends across three
domains: He is director of the world’s largest intelligence service, the
National Security Agency; chief of the Central Security Service; and
commander of the US Cyber Command. As such, he has his own secret
military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and
the Second Army.
Alexander runs the nation’s
cyberwar efforts, an empire he has built over the past eight years by
insisting that the US’s inherent vulnerability to digital attacks
requires him to amass more and more authority over the data zipping
around the globe. In his telling, the threat is so mind-bogglingly huge
that the nation has little option but to eventually put the entire
civilian Internet under his protection, requiring tweets and emails to
pass through his filters, and putting the kill switch under the
government’s forefinger. “What we see is an increasing level of activity
on the networks,” he said at a recent security conference in Canada. “I
am concerned that this is going to break a threshold where the private
sector can no longer handle it and the government is going to have to
step in.”
End Quoting.
The NSA wants to be able to “data-mine” every American’s phone calls
and emails and lots of other personal stuff such as medical records,
military service records, consumer records, credit ratings, book
purchases, ATM withdrawals and banking records, criminal records,
financial portfolios, groups or organizations to which one makes
donations or contributions, vacation destinations, education records,
employment records, air, ship, or train transportation records – in a
word, everything about us. The NSA wants to data-mine all that for up to
five years back into the past. In other words, what you said on the
phone five years ago could be mined by NSA today. Like, as in, everything
you have said online or on the phone for the past five years.
Especially, ” the program utilizes software that makes predictive
judgments of targets’ behavior and tracks their circle of associations
with “social network analysis” and artificial intelligence modeling
tools. “The more data you have on a particular target, the better [the
software] can predict what the target will do, where the target will go,
who it will turn to for help…”
They are doing this on each and every one of us. All the time. And
not only did they not ask our permission, they tried to keep it secret
from us. It’s done in the name of “National Security“, and all that jazz. Now they’re trying to sell the American people on the sham story that it’s somehow “legal”.
It is unlawful for the General government to surveil American
citizens without a warrant issued upon probable cause. The “legal”
framework, including whichever Executive Orders or National Emergency
Orders or Presidential Decision Directives or whichever other concoction
“legal teams” working for the General government come up with, is null
and void on its face as soon as it tampers with the Constitution. The
reason? It contradicts and violates the highest uncontested law of the
land (the Common Law), and the great law from which all subsequent laws must
derive their legitimacy – the U.S. Constitution. And of course, that is
why we Constitutionalists are in the government’s cross-hairs.
This impersonal spying has got a lot of folks upset, with good
reason. It is rude, offensive, and very un-American. Worse, it is
un-necessary and is part of a concocted fraud, a man-made “myth”. The
fraudulent myth is the alleged “War on Terror”. To perpetuate that lie,
government has shifted the original intent for Cold War “Continuity of
Government” (COG) operations into a mindset which sees dissenting
Americans as the newest “enemy”.
Section 101. National Security Emergency Preparedness Policy. (a) The policy of the United States is to have sufficient
capabilities at all levels of government to meet essential defense and
civilian needs during any national security emergency. A national
security emergency is any occurrence, including natural disaster,
military attack, technological emergency, or other emergency, that
seriously degrades or seriously threatens the national security of the
United States. Policy for national security emergency preparedness shall
be established by the President. Pursuant to the President’s direction,
the National Security Council shall be responsible for developing and
administering such policy. All national security emergency preparedness
activities shall be consistent with the Constitution and laws of the
United States and with preservation of the constitutional government of
the United States.
COG is “Continuity of Government”. The first time, to my knowledge,
that COG surfaced to the attention of the American public was during the
U.S. Senate hearings on the Iran-Contra-Mena scandal in the 1980s. In
those hearings Texas Representative Jack Brooks queried Colonel Oliver
North as to his relationship with Continuity of Government. The shadowy
secret powers shut that question down quite smartly, then and there.
Watch:
Brooks was on to something big. Let’s ask this sensitive question —
If Congress has a ten percent approval rating and if the government is
hell-bent on disarming Americans; if our economy and financial system is
shaky at best; if DHS thinks too many Americans are “radicalized” or
“extreme” in their beliefs; if government is over-hauling our social and
cultural matrix the way Patrick Wood reveals it is doing in his book,
Technocracy Rising; if special interests in the military-industrial
complex are seeking ever-tightening controls over public perception; if
Americans everywhere are figuting out that this government is creating
“enemies” to keep this country and our lifestyles viable; if Americans
in mass were to rise up to correct the problems in WDC — would this
government seek to protect itself from the wrath of the People
themselves at all costs? I think we all know the answer, but in case
there are any who still doubt the obvious, let’s now accelerate this
article by introducing three links which are “musts” for every Oath
Keeper, every human being, every patriot, every American, indeed, every
human on earth.
The first is as important as John B. Wells’ interview with Patrick
Wood on the Caravan To Midnight show. Mr. Wells’ guest is anonymous, but
this is one show everyone interested in JADE HELM 2015 positively and
absolutely must view, several times again and again. Do take notes on
your second time through this show. Given all I have packed into this
series of articles, we should now be ready to see clearly what the
special guest on this show is giving to America —
The lady’s voice is now traveling around the nation. Oath Keepers
salutes her! I will be writing more about her material in coming times.
Now let’s check this one out as well —
Please note: I will be transcribing the presented info from the above
two videos as quickly as I can and will post that material here as a
sort of follow-up to this series. In the meantime, all readers who have
viewed the two videos above but want still more will enjoy going over
to the Hagmann and Hagmann radio show and hearing the mystery lady’s
voice on their excellent show.
Finally, here is the Hagmann and Hagmann show with the Mystery Lady from the Caravan To Midnight show:
Thank you for reading, viewing, and listening!
Salute!
The Black Sheep tries to warn its friends with the truth it has seen, unfortunately herd mentality kicks in for the Sheeple, and they run in fear from the black sheep and keep to the safety of their flock.
Having tried to no avail to awaken his peers, the Black Sheep have no other choice but to unite with each other and escape the impending doom.