Feeds:
Posts
Comments

Posts Tagged ‘DHS’

Note: While I agree with the article below in general, I have not personally verified all of the particulars of the claimed details.

Also see Wake Up Citizens! and New World Order, and this video: 3/01/12 Michael Parenti: The Face of Imperialism, U.S. Empire – OneRadioNetwork.com

(The following article was taken from the educate-yourself.org website. Thanks!)

The New World Order (NWO) – An Overview

By Ken Adachi <Editor@educate-yourself.org>
http://educate-yourself.org/nwo/

Google Translator: Convert English into 51 Different Languages
http://translate.google.com/?prev=hp#sl|en|

Introduction

There is a worldwide conspiracy being orchestrated by an extremely powerful and influential group of genetically-related individuals (at least at the highest echelons) which include many of the world’s wealthiest people, top political leaders, and corporate elite, as well as members of the so-called Black Nobility of Europe (dominated by the British Crown) whose goal is to create a One World (fascist) Government, stripped of nationalistic and regional boundaries, that is obedient to their agenda. Their intention is to effect complete and total control over every human being on the planet and to dramatically reduce the world’s population by 5.5 Billion people. While the name New World Order is a term frequently used today when referring to this group, it’s more useful to identify the principal organizations, institutions, and individuals who make up this vast interlocking spiderweb of elite conspirators.

The Illuminati is the oldest term commonly used to refer to the 13 bloodline families (and their offshoots) that make up a major portion of this controlling elite. Most members of the Illuminati are also members in the highest ranks of numerous secretive and occult societies which in many cases extend straight back into the ancient world. The upper levels of the tightly compartmentalized (need-to-know-basis) Illuminati structural pyramid include planning committees and organizations that the public has little or no knowledge of. The upper levels of the Illuminati pyramid include secretive committees with names such as: the Council of 3, the Council of 5, the Council of 7, the Council of 9, the Council of 13, the Council of 33, the Grand Druid Council, the Committee of 300 (also called the “Olympians”) and the Committee of 500 among others.

In 1992, Dr John Coleman published  Conspirators’ Hierarchy: The Story of the Committee of 300. With laudable scholarship and meticulous research, Dr Coleman identifies the players and carefully details the Illuminati agenda of worldwide domination and control. On page 161 of the Conspirators Hierarchy, Dr Coleman accurately summarizes the intent and purpose of the Committee of 300 as follows:

“A One World Government and one-unit monetary system, under permanent non-elected hereditary oligarchists who self-select from among their numbers in the form of a feudal system as it was in the Middle Ages. In this One World entity, population will be limited by restrictions on the number of children per family, diseases, wars, famines, until 1 billion people who are useful to the ruling class, in areas which will be strictly and clearly defined, remain as the total world population.

     There will be no middle class, only rulers and the servants. All laws will be uniform under a legal system of world courts practicing the same unified code of  laws, backed up by a One World Government police force and a One World unified military to enforce laws in all former countries where no national boundaries shall exist. The system will be on the basis of a welfare state; those who are obedient and subservient to the One World Government will be rewarded with the means to live; those who are rebellious will simple be starved to death or be declared outlaws, thus a target for anyone who wishes to kill them. Privately owned firearms or weapons of any kind will be prohibited.”

The sheer magnitude and complex web of deceit surrounding the individuals and organizations involved in this conspiracy is mind boggling, even for the most astute among us. Most people react with disbelief and skepticism towards the topic, unaware that they have been conditioned (brainwashed) to react with skepticism by institutional and media influences that were created by the Mother of All mind control organizations: The Tavistock Institute of Human Relations in London. Author and de-programmer Fritz Springmeier (The Top 13 Illuminati Bloodlines ) says that most people have built in “slides” that short circuit the mind’s critical examination process when it comes to certain sensitive topics. “Slides”, Springmeier reports, is a CIA term for a conditioned type of response which dead ends a person’s thinking and terminates debate or examination of the topic at hand. For example, the mention of the word “conspiracy” often solicits a slide response with many people. (Springmeier has co-authored three books on trauma-based programming which detail how the Illuminati employs highly tuned and extremely sophisticated Mind Control (MC) training programs that begin the programming process while the intended victim is still within the womb. Mind Control is a much greater problem than most people realize. According to Cisco Wheeler, a former Illuminati mind control programmer, there are 10 million people who have been programmed as mind controlled slaves using trauma-based MC programs with names like Monarch and MK Ultra. The newer, non-trauma, electronic means of MC programming that grew out of the Montauk Project, may include millions more. Al Bielek, who played a principle role in the development of the Montauk Project, said that there likely 10 million victims of Montauk style mind control programming worldwide, the majority located in the USA. He also said that there are covert Montauk Programming ‘Centers’ in every major city in the U.S. )

What most Americans believe to be “Public Opinion” is in reality carefully crafted and scripted propaganda designed to elicit a desired behavioral response from the public. Public opinion polls are really taken with the intent of gauging the public’s acceptance of the Illuminati’s planned programs. A strong showing in the polls tells the Illuminati that the programing is “taking”, while a poor showing tells the NWO manipulators that they have to recast or “tweak” the programming until the desired response is achieved. While the thrust and content of the propaganda is decided at Tavistock, implementation of the propaganda is executed in the United States by well over 200 ‘think tanks’ such as the Rand Corporation and the Brookings Institute which are overseen and directed by the top NWO mind control organization in the United States, the Stanford Research Institute (SRI) in Menlo Park, California.

The NWO global conspirators manifest their agenda through the skillful manipulation of human emotions, especially fear. In the past centuries, they have repeatedly utilized a contrivance that NWO researcher and author David Icke has characterized in his latest book, The Biggest Secret, as Problem, Reaction, and Solution.

The technique is as follows: Illuminati strategists create the Problem- by funding , assembling, and training an “opposition” group to stimulate turmoil in an established political power (sovereign country, region, continent, etc.) that they wish to impinge upon and thus create opposing factions in a conflict that the Illuminati themselves maneuvered into existence. In recent decades, so called “opposition” groups are usually identified in the media as ‘freedom fighters’ or ‘liberators’ (recently the KLA-Kosovo Liberation Army).

At the same time, the leader of the established political power where the conflict is being orchestrated is demonized and, on cue, referred to as ‘another Hitler’ (take your pick: Saddam Hussein, Milosevic, Kadaffi, etc.). The ‘freedom fighters’ are not infrequently assembled from a local criminal element (i.e. KLA, drug traffickers). In the spirit of true Machiavellian deceit, the same NWO strategists are equally involved in covertly arming and advising the leader of the established power as well (the Illuminati always profits from any armed conflict by loaning money, arming, and supplying all parties involved in a war).

The conflict is drawn to the world stage by the controlled  media outlets with a barrage of photos and video tape reports of horrific and bloody atrocities suffered by innocent civilians. The cry goes up “Something has to be done!” And That is the desired Reaction (note: the  same technique is presently being used to bring about gun control in the United States).

The NWO puppeteers then provide the Solution by sending in UN ‘Peace Keepers’ (Bosnia) or a UN ‘Coalition Force’ (Gulf War) or NATO Bombers and then ground troops (Kosovo). Once installed, the ‘peace keepers’ never leave (Bosnia, Kosovo).  The idea is to have NWO controlled ground troops in all major countries or strategic areas where significant resistance to the New World Order takeover is likely to be encountered.

East Timor, Indosnesia. (9/14/99) Virtually , the same strategy used to occupy Kosovo with UN/NATO troops was applied by the NWO manipulators to take military control of  East Timor. Once again, the same morality play is trotted out for public consumption: the local evil and demonic Indonesian Army trained militias responsible for the slaughter of innocent civilians following the August 30 vote for Independence (from Indonesian control), must be stopped at all costs. This time, Australia (to keep up the appearance of an ‘international’ humanitarian effort) will lead the charge with ‘peacekeeping’ troops. Of course, it didn’t take long for Madeline Albright to announce that US ‘support assets’ will be part of the “UN Peacekeeping Team”. In a  front page story in the LA Times (9/13/99), Mike Jendrzejczyk  of Human Rights Watch (an Illuminati front group)in Washington DC  said that it’s “crucial” that “peacekeepers have the authority to disarm militia forces and any Indonesian soldiers actively working with them”. ]

The local, sovereign military force is either defeated (i.e. Yugoslavia) or, as in the case of the United States itself, replaced by foreign UN “Partnership For Peace” (PFP) troops who take over the jobs of  US soldiers who have been sent overseas on  ‘peacekeeping’ missions. In addition to being killed in ground conflicts on foreign soil, US military forces will likely be reduced in the next few years through disease induced attrition (i.e. from mandatory Anthrax Vaccinations required of all US military personnel). These vaccinations will, in all probability, eventually produce the symptoms of the so-called Gulf War Illness, which was acquired by a certain percentage of Gulf War soldiers who were given a “special” anthrax vaccine (intended by the Illuminati/CIA as a test run to ascertain how quickly (and fatally) the disease would progress with a substantial population of healthy young men and women).

The corporate portion of the NWO pyramid seems to be dominated by international bankers and the big pharmaceutical cartels, as well as other major multinational corporations. The Royal Family of England, namely Queen Elizabeth II and the House of Windsor, (who are, in fact, descendants of the German arm of European Royalty -the Saxe-Coburg-Gotha family-changed the name to Windsor in 1914 ), are high level players, along with the British oligarchy which controls the upper strata of the Illuminati. The decision making Illuminati nerve centers of  this effort are in the London (especially the City of London), Basel Switzerland, and Brussels (NATO headquarters).

The United Nations, along with all the agencies working under the UN umbrella, such as the World Health Organization (WHO), are full time players in this scheme. Similarly, NATO is a military tool of the NWO.

The leaders of all major industrial countries like the United States, England, Germany, Italy, Australia, New Zealand, etc. (E.g. members of the “G7/G8” ) are active and fully cooperative participants in this conspiracy. In this century, the degree of control exerted by the Illuminati has advanced to the point that only certain hand-picked individuals, who are groomed and selected by the Illuminati are even eligible to become the prime minister or president of countries like England, Germany, or The United States. It didn’t matter whether Bill Clinton or Bob Dole won the Presidency  in 1996, the  results would have been the same (except maybe for Zipper Gate ). Both men are playing on the same team for the same ball club. Anyone who isn’t a team player is taken out: i.e.President Kennedy, Ali Bhutto (Pakistan) and Aldo Moro (Italy). More recently, Admiral Borda and William Colby were also killed because they were either unwilling to go along with the conspiracy to destroy America, weren’t cooperating in some capacity, or were attempting to expose/ thwart the Takeover agenda.

Most of the major  wars, political upheavals,  and economic depression/recessions of the past 100 years (and earlier)  were carefully planned and instigated by the machinations of these elites. They include The Spanish-American War (1898), World War I and World War II; TheGreat Depression; the Bolshevik Revolution of 1917; the Rise of Nazi Germany; the Korean War; the Vietnam War; the 1989-91″fall” of Soviet Communism, the 1991 Gulf War;  and the recent War in Kosovo. Even the French Revolution was an orchestrated into existence by the Barvaian Illuminati and the House of Rothchild.

FEMA

In America, the Federal Emergency Management Administration (FEMA) was created in 1979 under Presidential Memorandum 32 authored for President Carter by Prof. Samuel P. Huntington, a Harvard professor and former FEMA Advisory Board chairman. Huntington wrote the Seminal Peace for the Trilateral Commission in the mid 70’s, in which he criticized democracy and economic development as outdated ideas. As co-author of another report prepared for the Trilateral Commissiosn, The Crisis of Democracy, Huntington wrote:

We have come to recognize that there are potential desirable limits to economic growth. There are also potentially desirable limits to the indefinite extension of political democracy. A government which lacks authority will have little ability short of cataclysmic crisis to impose on its people the sacrifices which may be necessary.”

Huntington’s ideas were rewritten into National Security Decision Directive #47 (NSDD47), which was enacted in July 1982 by President Reagan. Treated as a passing footnote by the media, this law identified legitimate areas to be upgraded to maintain national defense, but it also laid the groundwork for Emergency Mobilization Preparedness, a plan under which existing socioeconomic regulations or other legal constraints would be waived in the event of a national emergency. This plan was further strengthened in Public Law 101-647, signed by President Bush in November 1990.What it boils down to is this: in the event that the President declares a national emergency, for any reason (from major earthquakes to increased international tensions or economic /financial crisis of any stripe), FEMA can then, at their discretion, implement Executive Orders 10995 through 11005. These Executive Orders permit a takeover by FEMA of local, state, and national governments and the suspension of constitutional guarantees. FEMA will have the authority to exert any sort of control that it deems necessary upon the American public. Atrained National Police Force, formally referred to by the name of Multi Jurisdictional Task Force (MJTF), wearing black uniforms and composed of:

1. specially selected US military personnel
2. foreign military units carrying United Nations ID cards, and
3. specially trained existing police groups from larger metropolitan American cities.

These members of the MJTF will implement and enforce martial law under the direction and control of FEMA. The President and Congress are out of the loop.

FEMA is the Trojan Horse by which the New World Order will implement overt, police-state control over the American populace.

War on Drugs

The “War on Drugs” is a cruel joke. The US government, specifically the CIA, is the biggest ‘drug lord’ on the planet. Drug money is used to pay for innumerable ‘black projects’, including the construction of huge underground cities housing both humans and aliens working with the secret US government.

The instigation of a trumped-up war as a cover for amassing  fortunes can be dated back to at least the 12th Century when only a core group of nine members of an Illuminati group called the Knights Templar, the military arm of an Illuminati secret society known as the Priory of Sion, kicked off the The Crusades that lasted for over a century and a half. A rift later developed between the Templars and the Priory of Sion when Jerusalem was lost to Saracen Turks in 1187. In 1307, the king of France, Philippe the Fair (a Merovingian Illuminati), coveted the wealth and was jealous of the Templars’ power. The French king, being a puppet of the Priory of Sion, set out to arrest all the Templars in France on October 13. While many Templars were seized and tortured, including their Grand Master, Jacques de Molay, many other Templars (who had been tipped off) escaped. They eventually resurfaced in Portugal, in Malta (as the Knights of Malta) and later in Scotland as The Scottish Rites of Free Masonry.

The acquisition and consolidation of ever greater wealth, natural resources, total political power, and control over others are the motivating forces which drives the decisions of the Illuminati. The toll in human suffering and the loss of innocent lives are non issues for these individuals, who are aligned with very dark and malevolent 4th dimensional aliens. The dominant group of 4th dimentional malevolent aliens controlling and manipulating the human Iluminati are known as Draconians or Drakos Reptilians. Not all alien reptilians are of a negative spiritual orientation.

Mind Control

Recent revelations from deprogrammed Illuminati (government) mind controlled individuals such as Arizona Wilder (The Biggest Secret), Cisco Wheeler( The Illuminati Formula to Create an Undetectable Total Mind Control Slave),Cathy O’Brien (Trance Formation of America), and Brice Taylor (Thanks for the Memories) leave NO DOUBT that the upper levels of the  Illuminati engage in Satanic rituals which usually include the killing of young children, the drinking of  human blood and the consuming of flesh and human organs.

The details of the Illuminati conspiracy are brilliantly laid out in the books of David Icke (Tales from the Time Loop, Children of the Matrix, Alice in Wonderland and the World Trace Center Disaster, The Biggest Secret, The Truth Shall Set You Free, and I am Me, I am Free; and in three books by Dr. John Coleman (Conspirators’ Hierarchy: The Story of The Committee of 300; One World Order: Socialist Dictatorship; and  Diplomacy by Deception

To be Continued & Expanded…

Read Full Post »

(This article was taken from the occupycorporatism.com website. Thanks!)

CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

Nov 29th, 2012 0 Comment

Susanne Posel
Occupy Corporatism
November 29, 2012

In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks
• Developing a digital strategic advantage
• Collaboration with the US government on cyber issues
• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

When professional trolls want to attack for copyright infringement, they may combine defamatory comments across the internet with a fraudulent DMCA notice of takedown, to discredit a source of information that they feel threatened by.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Professional trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

Read Full Post »

JONATHAN TURLEY

Res ipsa loquitur ("The thing itself speaks")

Amber Lyon

"Well-behaved women seldom make history..."

Writings of J. Todd Ring

Independent Research and Analysis, Essays in Politics and Philosophy.

________________Child Health Safety_________________

The facts about vaccine safety your government won't give you