Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The  NSA - ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Thursday, December 31, 2009

HoW CoMpAnIe$ MaKe MoNeY OfF PrI$OnEr$ - " ArBeIt MaChT FrEi " - Only In Amerika !!!

By Byron E. Price, associate professor, political science department, and interim director, Barbara Jordan Institute for Policy Research

Dr. Byron Price is a black scholar with a mission. His book, 'Merchandizing Prisoners' opens the door for a discussion on how the African American community is being financially pillaged by the prison industry. You may not know this, but private corporations earn money from inmate incarceration and have a direct financial incentive to house more. This is a problem, since unfocused profit maximization does not leave much room for prisoner rehabilitation. Dr. Price is one of the leading scholars in America, and he has taken it upon himself to help solve this problem.

According to National Union of Public and General Employees, "This book examines the steady growth of private, for-profit prison firms and the correctional-commercial complex that has developed tangentially with the private prison industry." It also details the strange bedfellows that have been brought together to expand this industry.

===snipped===>Texas Prison Bid'ness

Corporations such as Corrections Corporation of America (CCA), the Geo Group (formerly Wakenhut), Avalon Correctional Services, Cornell Companies and Industry Property Management. CCA has a $2 billion market cap, followed by the Geo Group with a $922 million market cap. The money is made by contracting out the inmates' labor to Fortune 500 companies and, in some cases, they compete for public works contracts. CCA and the others are making money, and their stock trades on the stock exchange. Telecommunications industries pay prisons to put pay phones in prisons. Pay phones in prisons make $15,000 a day. Transportation companies and all sorts of cottage industries develop around the prison industry. UNICOR, or Federal Prison Industries, created by Congress, was one of the first prison industries established to exploit inmate labor. States also pay a per diem per inmate to private prison corporations.

Human rights organizations, as well as political and social ones, are condemning what they are calling a new form of inhumane exploitation in the United States, where they say a prison population of up to 2 million - mostly Black and Hispanic - are working for various industries for a pittance. For the tycoons who have invested in the prison industry, it has been like finding a pot of gold. They don't have to worry about strikes or paying unemployment insurance, vacations or comp time. All of their workers are full-time, and never arrive late or are absent because of family problems; moreover, if they don't like the pay of 25 cents an hour and refuse to work, they are locked up in isolation cells.

There are approximately 2 million inmates in state, federal and private prisons throughout the country. According to California Prison Focus, "no other society in human history has imprisoned so many of its own citizens." The figures show that the United States has locked up more people than any other country: a half million more than China, which has a population five times greater than the U.S. Statistics reveal that the United States holds 25% of the world's prison population, but only 5% of the world's people. From less than 300,000 inmates in 1972, the jail population grew to 2 million by the year 2000. In 1990 it was one million. Ten years ago there were only five private prisons in the country, with a population of 2,000 inmates; now, there are 100, with 62,000 inmates. It is expected that by the coming decade, the number will hit 360,000, according to reports.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy


PIECP Program Violations Web Site Thanks Senator for this link :)

Tuesday, December 15, 2009

ThReE FeLoNiEs A dAy: HoW tHe FeDs TaRgEt ThE InNoCeNt - TIs...Heads Up! - OnLy In AmErIkA!!!

A lucid and powerful indictment of federal criminal law enforcement: [PeRpS]

By Malick Ghachem

This is a very thoughtful and vigorously argued book about the injustices that arise when prosecutors seek to expand the reach of federal criminal statutes beyond their proper field of application. The author has litigated many of the cases he discusses, and is able to translate the complexities of that experience intelligently and without condescension, but also without all of the unnecessary technical details that lawyers writing for a general audience sometimes get bogged down in.

Harvey Silverglate is an institution in his own right: a tireless advocate for civil liberties, prolific writer, and astute student of the law, there are few people who have a stronger commitment to illuminating the practical workings of the criminal justice system and their relationship to broader currents in the law. This is a must-read for those interested in criminal law, civil liberties, and the recent history of the Department of JUST_U.S. by a writer who has the courage of his convictions and voices them powerfully and well.

===snipped===> Thought provoking, brilliant and scary:By K. Unger

This book was recommended by a Federal Judge at a conference on ethics. It is a scary, insightful indictment of criminal prosecutions and the growing trend of prosecutors and judges encroaching on the legislative branch's power to enact laws through manipulation and overreaching interpretations of vague federal laws. It is not only a MUST read, but it is a MUST act upon as well. Kudos Silverglate!

===snipped===> If You Haven't Already Lost All Faith in the Federal Government, This Will Do the Trick: By Tammy McArdle

The premise is, because of increasingly vague and over-reaching federal statutes, any one of us is committing an average of three felonies a day without even realizing it. In other words, the Feds can pretty much choose their
targets FIRST (for whatever reason... vengeance, political gain, to pressure you to testify against a "bigger fish," monetary gain or simply to advance their own careers) and figure out what to indict you on later.
Even if you haven't committed a crime, by the time the DOJ is finished freezing your assets (so you can't afford adequate defense), harass your friends and family (to get them to turn on you... and even threaten them with their own indictments), feed false information to the media and ruin your reputation, career, social life, etc., you're going to want to FIGHT THE matter what the cost!!!

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Illinois Governor Charged in Scheme to Sell Obama’s Seat]

Harvy Silverglate on 'Three Felonies a Day'

Saturday, December 12, 2009

CoGnItIvE ScIeNcEs LaBoRaToRy - ReSeArCh FoR ThE FuTuRe - OnLy In AmErIkA!!!

Welcome to the CSL

For over 20 years, the Cognitive Sciences Laboratory has been the center for government-sponsored parapsychology research in support of its intelligence program most recently known as STAR GATE.

We invite you to volunteer to participate in an exciting experiment to explore how your nervous system can automatically predict the future. If you would like to learn more, please click here.

Mission Statement

The mission of the Cognitive Sciences Laboratory is three-fold. To use the tools of modern behavioral, physiological, and physical sciences to:

1.Determine which parapsychological phenomena can be validated under strict laboratory conditions.

2.Understand their mechanisms.

3.Examine the degree to which they might contribute to practical applications.

The laboratory is a center for interdisciplinary research devoted to understanding a wide range of human experience. In addition to exploring parapsychological phenomena, the Cognitive Sciences Laboratory's charter extends to allied fields such as consciousness research, cognitive neuroscience, perception, physiology, psychology and physics.


Philosophical Approach

The Cognitive Sciences Laboratory adopts a conservative approach to the research of anomalous mental phenomena. We make the assumption that all such phenomena will eventually be understood within the context of physical science. As a consequence we question dualistic, or mystical, approaches to these presently anomalous phenomena.

Toward that end, we have adopted an engineering communication metaphor as a guide for the design of our investigations. In the language of our experimental protocol, a target transmits information through space and time to a human receiver.


Primary Definitions

Over the years, the terminology for these parapsychological phenomena has evolved. The CSL uses these primary definitions:

Anomalous Cognition (AC)A form of information transfer in which all known sensorial stimuli are absent. In this process some individuals are able to gain access to information from events outside the range of their senses by a currently not understood mechanism. Several synonyms for this phenomenon are in use: Remote Viewing (RV), Clairvoyance, and ESP.

Anomalous Perturbation (AP) A form of interaction with matter in which all known physical mechanisms are absent. In other words, some individuals are alleged to be able to influence matter by an as yet unknown process. This phenomenon is also known Psychokinesis (PK).

Anomalous Mental Phenomena (AMP)
A general term that includes AC and AP. This is also known as PSI.

Basic Research
Research that is primarily oriented to understanding the mechanisms of AMP.

Applied Research
Research that is primarily oriented towards increasing the magnitude of the effects.

Capitalizing upon the research results, we find optimal protocols and appropriate problems for real-world solutions.

Theoretical Considerations

At this time, there is no comprehensive theory of anomalous cognition; yet, the Cognitive Sciences Laboratory has developed the first successful steps toward that goal.

Currently we have two, perhaps related, models. The first of these assumes that the phenomena are mediated through an additional sensorial system, and, therefore, will most likely share some of the properties of the other five--a source of energy, a transmission mechanism, and finally a specialized set of neurons that are capable of being receptors.

We have recently published a paper that outlines our progress toward identifying a potential source of anomalous cognition. It appears that the gradient of Shannon entropy is related to the "brightness" of an AC target. The experiment leading to this assertion is also suggestive of a sensorial system in that it was the gradient of, rather than the entropy itself that correlated with the quality of the AC perception. All other senses are known to be more sensitive to changing inputs than they are to static ones.

Our second model is called Decision Augmentation Theory. It holds that decisions (of any kind) may be statistically augmented toward a desired outcome by anomalous cognition. We have applied the model to the data from a class of random number generator experiments in which human operators are asked to initiate the collection of a sequence of binary bits from a suitably designed hardware random number generator. Known as RNG experiments, the competing explanations for the results are that the operator "forces" the data stream to be different than it otherwise would be, or the operator is a statistical opportunist by initiating the experimental run to capture a locally deviant subsequence of binary bits from an otherwise undisturbed truly random sequence. The Decision Augmentation Model overwhelmingly supports the latter.

Our two theoretical models may be related in that the gradient of Shannon entropy of a locally deviant subsequence of binary bits is independent of the length of the sequence--a fact that is observed in the experimental RNG data. Thus it appears that successful human operators in RNG experiments are "sensing" the gradient and statistically augmenting their decision when to initiate the run.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[CIA-AIR Report]

[Hypnosis Resources]

[The Mcmoneagle Blog]

[Remote Viewing Videos]

[Remote Viewing for Remote Viewers]

[Ten Thousand Roads Remote Viewing]

Friday, December 11, 2009

CoInTeLpRo: ThE FBI's SeCrEt CoUnTeR InTeLlIgEnCe PrOgRaM - NoT wOrKiNg :)))

Revisted: From Wikipedia COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert and often illegal projects conducted by the United States Federal Bureau of Investigation aimed at investigating and disrupting dissident political organizations within the United States.

The FBI used covert operations from its inception; however the formal COINTELPRO operations took place between 1956 and 1971.[2] The FBI motivation at the time was "protecting national security, preventing violence, and maintaining the existing social and political order."

included groups suspected of being subversive, such as communist and socialist organizations, the women's rights movement; people suspected of building a "coalition of militant black nationalist groups" ranging from the Black Panther Party and Republic of New Afrika, to "those in the non-violent civil rights movement," such as Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People (NAACP), the Congress on Racial Equality (CORE), and other civil rights groups; "White Hate Groups" including the Ku Klux Klan and National States' Rights Party; a broad range of organizations lumped together under the title "New Left" groups, including Students for a Democratic Society, the National Lawyers Guild, the Weathermen, almost all groups protesting the Vietnam War, and even individual student demonstrators with no group affiliation;and nationalist groups such as those "Seeking Independence for Puerto Rico."[3]

The directives governing COINTELPRO were issued by FBI Director J. Edgar Hoover, who ordered FBI agents to "expose, disrupt, misdirect, discredit, or otherwise neutralize" the activities of these movements and their leaders.


The program was secret until 1971, when an FBI field office in Media, PA was burglarized by a group of left-wing radicals calling themselves the Citizens' Commission to Investigate the FBI. Several dossiers of files were taken and the information passed to news agencies, many of which initially refused to publish the information. Within the year, Director Hoover declared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.


In the Final Report of the Select Committee COINTELPRO was castigated in no uncertain terms: As of 1976
"Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that...the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence."[6]

The Church Committee documented a history of FBI directors' using the agency for purposes of political repression as far back as World War I, through the 1920s, when they were charged with rounding up "anarchists and revolutionaries" for deportation, and then building from 1936 through 1976.


In an interview with the BBC's Andrew Marr, MIT professor of linguistics and political activist Noam Chomsky talks about the purpose and the targets of COINTELPRO saying, "COINTELPRO was a program of subversion carried out not by a couple of petty crooks but by the national political police, the FBI, under four the time it got through, I won't run through the whole story, it was aimed at the entire new left, at the women's movement, at the whole black movement, it was extremely broad. Its actions went as far as political assassination." [9]


Recently, 'another' attempt to 'silence' me was taken and F.A.I.L.E.D. to intimate. Personally, I take great pride in not only exposing such active measures, but, walking through them!
Again, the offices at SAIC a major defence contractor for the U.S. government were 'EMPTY' on the morning of 11th September 2001.


===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy




CoNtRoLlInG ThE MiNdS oF ThE mAsSeS - OnE wAy ItS dOnE - OnLy In AmErIkA!!!

Friday, December 9, 2009 - By Pakalert

“Mind Control” is a loaded term, often associated with science fiction and the fantastical by people who are not aware of its very real history. Images of Orwell’s “1984” or Aldous Huxley’s “Brave New World” are conjured; dystopic nightmare landscapes assumed only possible in pulp literature. What many people do not know or realize is that these books were based on actual ideas and theories that had been put forward by social and scientific elites for decades, and in some cases, centuries.

The desire of the “ruling class” to understand the mechanics of the human mind has left a trail of misery dating back to earliest recorded history. It was not enough for them to subjugate the masses through force; the Elites wanted the people to accept their slavery, to integrate it into their psyches. They wanted us to be “thankful” for our servitude, for only then, would they truly be in control of the world.

To understand where this obsession with mind control comes from and how it works, we must first start at the beginning…


Pageantry One of the favored methods used by elites to effect people on a mass scale is Pageantry; the ability to create an entire environment that overloads the five senses and the unconscious mind with subliminal and archetypal messaging. The most successful example of expert pageantry is probably the formation of Nazi Germany, financed by elites from around the globe, including the Rockefeller Family through their company Standard Oil, as proven by the “Von Knieriem Documents” discovered during the Nuremberg Trials:

The entire Nazi ideology was founded on principles supported by the Rockefellers and other elites, along with the archetypal mythologies touted by the Theosophical Society. Numerous symbolic images like the Swastika (black sun) or the lightning bolt-like symbol for the SS (a rune symbol) were taken directly from occult history and used masterfully to build an environment rich in archetypes. Jung, who witnessed the transformation of Germany, despaired at the use of archetypes in the destruction of Europe:

If thirty years ago anyone had dared to predict that our psychological development was tending towards a revival of the medieval persecutions of the Jews, that Europe would again tremble before the Roman fasces and the tramp of legions, that people would once more give the Roman salute, as two thousand years ago, and that instead of the Christian Cross an archaic swastika would lure onward millions of warriors ready for death — why, that man would have been hooted at as a mystical fool.”
–Carl Gustav Jung


Defense Against Mind Control Methods

The first step in defending against manipulation is of course to first understand the methods used by manipulators to get what they want. After careful study, you should be able to easily pick out key phrases, archetypal symbols, subliminal messages, and other devices when you are confronted by them. It is interesting to examine these methods in depth and then go back out into the world of media and propaganda. You may be startled by what you see on the T.V. and in the streets that you did not notice before.

[Special Note: One can discern & discover disinfo agents by using this methodology]

The other defense against mind control was actually realized by Carl Jung. Jung found that those people who used Archetypal Psychology for good, those who used it to understand themselves and their inborn qualities, were actually incredibly resistant to manipulation and subversion. They could not be caught in the fervor of an archetypal event, because they knew their own unconscious so well. These men and women were psychological mountains, immovable spires of mental strength that could not be changed and controlled by others.

For those not yet self aware, the mind remains a subtle and mutable form, a delicate instrument that expresses the contents of the spirit, but hard to predict and defend. Knowing one’s self is the key to breaking from the poisonous circle of psychological manipulation, and to expel the habit of apathy that settles human beings into tyranny. To win liberty back from the clutches of elites, we must first WANT to be free, and the path to freedom begins in the minds and the hearts of men.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy


Thanks goes to 'Dr. Evil' for this link ;-)


Of Interest: [CIA-AIR Report]

[April 13, 1953: CIA OKs MK-ULTRA Mind-Control Tests]

Thursday, December 3, 2009

Af-PaK WaR RaCkEt: ThE ObAmAc.H.a.N.g.E iILuSiOn CoMeS CrAsHiNg DoWn

By David DeGraw - The Public Record

*Troop Deployments
*The Militarized Economy
*Masters of War
*Psyops: Wag the Dog and Shake the Mohammed
*U.S. Insurgency: Violent, Strategic Dislocation Within U.S.

The economic elite have escalated their attack on the U.S. public by surging military operations in Afghanistan and Pakistan.

As ObamaC.H.A.N.G.E. announced plans for escalating the war effort, it has become clear that the ObamaC.H.A.N.G.E Illusion has taken yet another horrifying turn. Before explaining how the Af-Pak surge is a direct attack on the US public, let’s peer through the illusion and look at the reality of the situation.

Now that the much despised George W. BushFRAUD is out of the way and a more popular figurehead is doing PR for Dick Cheney’s right-hand military leader Gen. Stanley McChrystal, who is leading his second AF-Pak surge now, and with long time BushFRAUD family confidant Robert Gates still running the Defense Department, the masters of war have never had it so good.

Barack ObamaC.H.A.N.G.E, the anti-war candidate, has proven to be a perfect decoy for the military industrial complex. Consider all the opposition and bad press BushFRAUD received when he announced the surge in Iraq. Then consider this:


The BushFRAUD surge in Iraq deployed an extra 28,000 US troops. Under ObamaC.H.A.N.G.E, back in March, a surge in Afghanistan, that also further escalated operations inside Pakistan, deployed an extra 21,000 troops. However, in an unannounced and underreported move, ObamaC.H.A.N.G.E. added 13,000 more troops to that surge to bring the total to 34,000 troops. ObamaC.H.A.N.G.E. actually outdid BushFRAUD’s surge by 6000 troops and brought the overall number of US troops in Afghanistan to 68,000, double the number there when BushFRAUD left office.

Where opposition was fierce to BushFRAUD’s surge, barely any opposition was expressed during ObamaC.H.A.N.G.E’s surge. Part of the reason for so little political and public backlash was the cleverly orchestrated psychological operation to announce the beginning of US troop withdrawal from Iraq. While the drawdown in Iraq has been greatly exaggerated in the US mainstream media, as of October, ObamaC.H.A.N.G.E still had 124,000 troops deployed in Iraq (not counting private military contractors).

When ObamaC.H.A.N.G.E casts the illusion of a 2011 withdrawal from Afghanistan, one just needs look at the reality of the situation with the over-hyped withdrawal in Iraq.

Now, with Obama’sC.H.A.N.G.E latest surge announcement he will again be adding a minimum of another 30,000 US soldiers. This means that ObamaC.H.A.N.G.E has now led a bigger surge than BushFRAUD… on two separate occasions within the past nine months of his new administration. ObamaC.H.A.N.G.E has now escalated deployments in the Af-Pak region to 98,000 US troops. So in Af-Pak and Iraq, he will now have a total of 222,000 US troops deployed, 36,000 more than BushFRAUD ever had – 186,000 was BushFRAUD’s highest total.


The amount of private military contractors deployed in Iraq and Afghanistan is rarely reported on in the US mainstream press, but a Congressional Research Service investigation into this revealed that a record high 69% active duty soldiers are in fact private mercenaries.

Although the administration is yet to disclose how many private mercenaries will be deployed in the latest surge, it is believed that the 69% ratio will remain in tact.

The Pentagon released a report showing that Obama already had a total of 242,657 private contractors in action, as of June 30th. 119,706 of them in Iraq, 73,968 in Afghanistan, with 50,061 active in “other US CENTCOM locations.”

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Trans-Afghanistan Pipeline (TAP/TAPI)]

[700 Military Bases Spread Across Afghanistan]

[Ambassador Eikenberry's Cables on U.S. Strategy in Afghanistan]

[Afghanistan's Development Debacle]

[Has Obama Made a Devil's Bargain With Israel?]

[A time to break silence] By Dr. Martin Luther King, Jr.

[Iraq invasion in 2003 was illegitimate: Dutch probe]

[President Obama, the CIA and the Master of Cover-Up]

[Overspent and Overextended]

[Two Blackwater Guards Arrested For Murder: Company Settles Lawsuits]

[As of October 2009 2,038 Afghan civilians have died as a direct result of the U.S.led operations]

[Pentagon's Military "Mentoring" Program & Defence Contracting Firm(s)]

[The 5 Myths of Keeping America Safe from Terrorism]

[Up to 56,000 more contractors for Afghanistan]

[Are Presidents Afraid of the CIA?]

[American Principle Is Power]

[ACLU Blasts Obama on Bush's Crimes]

[Mr. President, War Is Not Peace]

[Change And The Chosen Path]

[Obama attorneys step up defense of torture memo author]

[US Official Threatens Possible Military Action Against Taliban by October if Pipeline Is Not Pursued']

[U.S. State Department Misleading About Reason For U.S. War With Afghanistan?]

[Kucinich: Prolonging Afghan war a ‘threat to our national security’]

[Instead of disengaging from Afghanistan, Obama escalates war]

[Epicenter of Mendacity: The Illegal War Against Afghanistan]

[Turkmenistan-Afghanistan-Pakistan-India (T-A-P-I)]

[UnDeR CoNtRaCt - ArMy Of DoLlAr$$$]

[US 'planned attack on Taleban']

[The Mistake Department]

Wednesday, November 25, 2009

PeRsOnAlItY PrOfIlInG and SiMuLaTiOn - BrAiNWaShInG AmErIcA

By Norman D. Livergood

In an earlier article, I reviewed the varied aspects of personality profiling and simulation. While serving as Head of the Artificial Intelligence Department at the U.S. Army War College, 1993-1995, I conducted studies on profiling, psychological programming, and brainwashing. I explored and developed personality simulation systems, an advanced technology used in military war games, FBI profiling, political campaigning, and advertising. Part of my discovery was that:

Unenlightened human minds are combinations of infantile beliefs and emotional patterns

These patterns can be simulated in profiling systems

These profiling systems can be used to program and control people

Personality simulation systems are being used to create political campaigns that apply voter profiles to control their voting behavior. TV commercials and programs use personality simulation to profile viewers to control their purchasing and viewing behaviors. And sophisticated propaganda and brainwashing techniques are being used by the cabal to keep American citizens under control.

The Technology of Thought and Behavior Control

The long evolution of developing procedures to control human behavior all came to a head in the modern world with Pavlov, a Russian scientist. In the early years of the twentieth century, Pavlov made the discovery that you can condition a dog to salivate on command simply by associating food with the ringing of a bell. Once that association is fixed in the dog's mind, the food can be removed and the dog will salivate merely when it hears the bell.

Pavlov carried out the identical experiments on human beings with the same results. Those principles have been adapted to television and motion pictures and can now make Americans salivate in response to a wide array of bells and whistles. We can call it phase one in the evolution of human behavior control.

Phase two was accomplished by the same Russian scientist, Pavlov. Very few people know of this part of his research. During a particularly severe storm in Russia, heavy rains continued for days and Pavlov's laboratories were flooded. Pavlov and his research assistants were able to return to the laboratory only after the flood waters had receded days later. Upon returning, Pavlov discovered something truly remarkable. Before the flood, many of the dogs had been conditioned to respond to various stimuli. Lo and behold, all traces of the conditioning in the dogs had disappeared! Bells, food, nothing could induce the former salivation response that had been so carefully implanted in the dogs' nervous systems.

What mysterious influence could account for this remarkable turn of events, Pavlov wondered. So, being a good scientist, he studied carefully what had transpired while he was away from the dogs. They had been left without food or warmth. They had been isolated for days; some of them had drowned. They had been subjected to extreme stress, never knowing if they would live or die. These were the factors that had produced the washing away of the previous conditioning from the dogs' brains - brain-washing.

Pavlov and other Russians followed up this line of research, but it was the Chinese communists in the 1950s who first saw its real potential for use with human beings. They employed these very principles in brainwashing American and other Allied prisoners of war during the Korean conflict. Isolation, periodic denial of food or water, cold and exposure, extreme stress associated with uncertainty of life or death--these conditions, together with a continual barrage of indoctrination produced the erasing of previous beliefs and behavior patterns in American soldiers in particular. Thus brainwashing became phase two in the evolution of human behavior control.

But brainwashing is not very reliable, as the remarkable film "The Manchurian Candidate" shows. The trigger mechanisms can be tampered with, sometimes even erased, before the desired behavior can be carried out.

These procedures are only used now by the CIA and other intelligence services for programming special assassins (see the movie "Parallax View"). Neither classic Pavlovian conditioning nor brainwashing can produce the general results that black-budget project directors in intelligence services desire: absolute control of a human personality.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Related: The Torture Matrix Operational Collection Database]

Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace etc.

[Using Virtual Reality to Document Human Existence, Gregory Peter Panos, PersonaForm, Beverly Hills:] [Cut and Paste URL to Download] [Cut and Paste URL to Download]

Titan Rain

Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionage, corporate espionage, or random hacker attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown. The designation 'Titan Rain' has been changed, but the new name for the attacks is itself classified if connected with this set of attacks.

In early December 2005 the director of the SANS Institute, a security institute in the U.S., said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems." Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.

[Means of Information War, Threaten Democracy and Mankind, by Mojmir Babacek]

[Strategic Personality Simulation: A New Strategic Concept by Dr. Norman D. Livergood]

[Behavioral Influences Analysis Center]

[Strategic Personality Simulation - A New Strategic Concept, Norman D. Livergood, Center for Strategic Leadership, Army War College, Carlisle Barracks, Pennsylvania, 1996:]

[Cognitive engineering and behavior/decision making odeling/prediction:]

[A "V"R oriented approach:]

[Converging Technologies for Improving Human Performance:]

[British Telecom sponsored Soul Catcher project:]

[A serious proposal for personality transfer/modeling using neural nets:]

[Artificial Metempsychosis. A Search Of Methodology For Personality Simulation; Mikhail Solovyov, Department of Biophysics, St. Petersburg University, Russia, 1992]:

[The curious Patent Application #20020088467 at, Mind personality transfer method, Izumi Arai, Tokyo, Japan, 2002-Mind personality transfer method: Patent Application#20020088467]

[Government Collecting DNA Secretly [WHY]

Monday, November 23, 2009

NeW ExEcUtiVe OrDer AiMs to AvOid DeClaSsIfIcAtIoN

Secrecy News from the FAS Project on Government Secrecy

by Steven Aftergood

Development of a new executive order on classification of national security information is now proceeding at an accelerated pace in order to preempt a deadline that would require the declassification of millions of pages of historical records next month.

A revised draft executive order was circulated to executive branch agencies by the Office of Management and Budget on November 16, with agency comments due back today, November 23. A final order is likely to be issued by the end of this year.

There is an incentive to complete the development of the executive order before December 31, 2009 because of a deadline for declassification of historical records that falls on that date. Under the current Bush executive order, classified records that are at least 25 years old and that have been referred from one agency to another because they involve multiple agency interests are supposed to be automatically declassified at the end of this year. (See E.O. 13292, section 3.3(e)(3)).

But in order to meet this December deadline, several agencies would have to forgo a review of the affected historical records, which they are unwilling to do. And so it seems they will simply be excused from compliance. But in order to modify the deadline in the Bush order, it will be necessary to issue another executive order. If the comprehensive new ObamaC.H.A.N.G.E order on classification policy (which would assign processing of such records to a National Declassification Center that does not yet exist) is not ready for release by December 31, then another stand-alone order would have to be issued, canceling or extending the looming deadline. And officials are reluctant to issue such an order since they say it would be awkward for the avowedly pro-openness ObamaC.H.A.N.G.E. Administration to relax or annul a declassification requirement that was imposed by the ultra-secret BushFRAUD Administration.

In fact, the whole process has become an awkward mix of exaggerated and deflated expectations. The failure of the BushFRAUD Administration’s declassification deadline to take hold this year does not augur well for new, more ambitious efforts to advance classification reform. If the “automatic declassification” procedures that were prescribed in prior executive orders are not “automatic” after all, and if binding deadlines can be extended more or less at will, then any new declassification requirements in the ObamaC.H.A.N.G.E order will be similarly subject to doubt or defiance.


Thus, Defense Secretary Robert M. Gates told reporters on November 12, “I have been appalled by the amount of leaking that has been going on” about classified Administration deliberations on Afghanistan policy and other matters.

But from a different point of view, others may be appalled that Secretary Gates’ own Department still retains classification restrictions on historical records dating back to the Korean War, and even from World War II, and that it otherwise resists modernization and correction of the cold war classification system.

Some general background on the national security classification system from the Congressional Research Service can be found in “Security Classification Policy and Procedure: E.O. 12958, as Amended” (pdf), November 3, 2009.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Distorting & Undermining Institutional Accountability & The U.S. legal system]

[Obama Commits to Declassification] Lets hope it's not all 'Smoke" & "Mirrors"

[Secret reports, Secret budgets, Secret operations, Secret courts]

[EPIC Files Appeal for NSA Policy on Network Surveillance]

[State Secrets Privilege: The Puppets & Puppet Masters]

[Draft Order Would Set New Limits on Classification]

[CRYPTOME DMCA Notice of Infringing Material]

[Defense Secretary Gates on Leaks]

[Litigation Documents: EFF v. CIA]

[Our President Obama C.H.A.N.G.E]

Saturday, November 21, 2009

ThE Ma$teR MaGiCiAn$-FuNdInG CoVeRt GoVeRnMeNt PrOjEct$

The use of third party advocates or front groups for the dissemination of US government propaganda is well documented: JSOU: Covert Blogs & Military Information Strategy


Most people assume covert government projects are paid for with separate budget appropriations, passed by a vote of congress. They also assume that while congress may not know what the money is being used for, at least congress knows how much is being spent. Sadly, nothing could be farther from the truth. In the last 50 years, at least $40 trillion (in 2004 dollars) has been siphoned away from legitimate uses and spent on secret projects.

The diversion of public monies on a scale this vast can not be accomplished through conventional parliamentary mechanisms. It requires a coordinated effort at the very highest levels of government. It also requires a continuous flow of maladapted policies and legislation to supply the raw material. This raw material is human victims. In other words, you...

With less than 5% of the world population, America now consumes over 50% of the world's natural resources and manufactured goods. If you're a Japanese factory worker, or a Brazilian farmer, a Canadian cattle rancher, or a European banker. Chances are directly or indirectly, you're working for America. The American people do not receive the fruits of your labors. Contrary to government generated statistics, the economic standard of living in America has been declining for decades.

What follows is a detailed description of the biggest theft in human history. A theft spanning half a century, and involving the diversion of wealth from an entire planet.

The master magicians:

The art of magic involves the skillful capture of attention. A magician says "watch closely while I make this rabbit disappear". He must capture your full attention because without it, you will notice the slight-of-hand performed by his assistant, that creates the illusion of his magic. The diversion of federal government revenue into clandestine projects makes use of this same technique.

Every day on TV news programs, you see the political leaders of America engaged in a grand debate over how to make the world in general, and America in particular, a better place to live. And every few weeks another foreign dignitary makes a pilgrimage to the White House, in order to confer on momentous matters of world peace and security. These men and women are not America's leaders, they are magicians. And you are not their constituency, you are their audience. Their proclamations are as meaningless as a magician's pronouncement of abracadabra. They capture your attention, while their assistants pilfer your wallet, and plunder your children's future.

Most people assume that congress and the president jointly determine how tax revenue is being spent. However, the money is actually spent by semi-autonomous bureaucratic empires, with names like Department of Defense, Department of Energy, Department of Homeland Security, Department of Housing and Urban Development (the list goes on and on)...

Each Department is managed by a secretary, nominated by the president, and approved by congress. These managers (secretaries) are the "magician's assistants". And they are responsible for stealing the rabbit, while your watching the magic show. As a general rule, the less public visibility a department secretary has, the more money that bureaucratic empire is diverting (stealing).

Each bureaucratic empire, guided by a magician's assistant (the secretary), creates an annual budget that is submitted to congress and the president for review and approval. 90% of the time, approval is automatic. In other words, most of the time congress and the president don't tell the bureaucratic empires how to spend money, just how much money to spend.

A typical department budget consists of hundreds (sometimes thousands) of individual items or programs with obscure names, and vague definitions. The diversion of American tax revenue into covert projects is accomplished piecemeal, through these budgetary items. A little bit from one item, a little more from another. No one really knows the exact amount of diversion taking place. Estimates run as high as 60% of the entire federal budget as being diverted into clandestine projects through this mechanism.

The trick behind the magic:

A short review of some department budget items will prove useful in understanding the mechanics of how the diversion is accomplished. I shall use the DOE (department of energy) proposed budget for fiscal year 2006. This document is publicly available at the DOE website.

According to the document, proposed DOE budget for 2006 is $23.4 billion dollars, and represents a decline of $475 million dollars from the 2005 budget which, and I quote: "shows DOE's commitment to results-driven performance." This is utter non-sense, as I shall demonstrate.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Afghanistan's Development Debacle] UNDP Investagation

[Prostitution in the US Government]

[The NED, NGOs and the Imperial Uses]

[Spies for Hire - Covert Government @ it's Best]

[Secret reports, Secret budgets, Secret operations, Secret courts]

[PentaCON tried to intimate U.S.Journalist]


At what point shall we expect the approach of danger? By what means shall we fortify against it? Shall we expect some transatlantic military giant, to step the Ocean, and crush us at a blow? Never! All the armies of Europe, Asia and Africa combined, with all the treasure of the earth in their military chest; with a Bonaparte for a commander, could not by force, take a drink from the Ohio, or make a track on the Blue Ridge, in a trial of a thousand years. At what point then is the approach of danger to be expected? I answer, if it ever reach us, it must spring up amongst us. It cannot come from abroad. If destruction be our lot, we must ourselves be its author and finisher. As a nation of freemen, we must live through all time, or die by suicide.

Abraham Lincoln, January 27, 1838

Saturday, November 14, 2009

HoW ThE StAtE JuStIfIeS ThE DeStRuCtIoN Of [TI] LiVeS - BiLl of AtTaInDeR (.)

Bill of Attainder:

Definition: A legislative act that singles out an individual or group for punishment without a trial.

The Constitution of the United States, Article I, Section 9, paragraph 3 provides that: "No Bill of Attainder or ex post facto Law will be passed."

"The Bill of Attainder Clause was intended not as a narrow, technical (and therefore soon to be outmoded) prohibition, but rather as an implementation of the separation of powers, a general safeguard against legislative exercise of the judicial function or more simply - trial by legislature."

"These clauses of the Constitution are not of the broad, general nature of the Due Process Clause, but refer to rather precise legal terms which had a meaning under English law at the time the Constitution was adopted. A bill of attainder was a legislative act that singled out one or more persons and imposed punishment on them, without benefit of trial. Such actions were regarded as odious by the framers of the Constitution because it was the traditional role of a court, judging an individual case, to impose punishment." William H. Rehnquist, The Supreme Court, page 166.

"Bills of attainder, ex post facto laws, and laws impairing the obligations of contracts, are contrary to the first principles of the social compact, and to every principle of sound legislation. ... The sober people of America are weary of the fluctuating policy which has directed the public councils. They have seen with regret and indignation that sudden changes and legislative interferences, in cases affecting personal rights, become jobs in the hands of enterprising and influential speculators, and snares to the more-industrious and less-informed part of the community." James Madison, Federalist Number 44, 1788.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Judge grants injunction against Congressional defunding of ACORN]

[Update: High Court To Take Up Case Involving Part of Patriot Act]

[Related: Something very rotten is going on at the heart of American behavioral science, and I’m not talking about decades-old scandals — I’m talking about right now. Along with collaboration with the CIA and military on possible new abusive interrogation methods, the APA is fighting to keep its links with the military, and to keep psychologists as essential components of their interrogation practice]

Supreme Court cases construing the Bill of Attainder clause include:

Ex Parte Garland, 4 Wallace 333 (1866)

Cummings v. Missouri, 4 Wallace 277 (1866)

U.S. v. Brown, 381 U.S. 437 (1965)

Nixon v. Administrator of General Services, 433 U.S.425 (1977)

Selective Service Administration v. Minnesota PIRG, 468 U.S. 841 (1984)


Rep. Grayson Schools Republican Congressman in Debate

Sunday, November 8, 2009

HoloDeCk LaW — LiTiGaTiOn VoRtEx - WhErE NoThInG I$ a$ It ApPeAr$ - OnLy In AmErIkA!!!

The Litigation Vortex - Sunday, November 8, 2009

by Linda Kennedy

Whether you enter the "Litigation Vortex" willingly (suckered in naively — don't feel bad, attorneys have done it too), or whether you get sucked into the maelstrom like some alleged "criminals" and some attorneys on alleged "disciplinary" charges have, you enter into the "legal holodeck" where nothing is as it appears.

You are a hard working man, hardly ever missed a day of work in your life. Unsuspectingly, you have found yourself in the legal system where your grade school teacher taught you justice would be served. You learn to research your case, try to make everyone understand your facts, and how justice would be served by finding in your favor. Initially, everyone seems to understand. The judge, and sometimes even the opposing attorney appear to want to understand and get to justice...and the clerk was so pleasant. You know she saw that you were an honest man. And the "Holodeck Court" stage image is set.

Having no reason not to believe that what you heard in grade school was absolutely true, you spend your money on filings, legal advice (even if an attorney will not take the case), or legal fees if an attorney will take it. Sometimes you even "count yourself blessed" that you have found an attorney who is willing to help you — so you think (see Triangle and Two Defense for more on this). You know your case is a slam-dunk win. And thus the curtain of the court-holodeck pageant opens and the bait-and-switch begins.

You think certainly the first couple of rulings must have been a misunderstanding. You may tell yourself have to do more legal research and write more clearly. They will certainly see that you have been wronged. So you continue to spend your money and your time. You even miss increasing amounts of work because you are in this to right a wrong, just like your grade school teacher taught you. You certainly can't turn around now — you've come too far and you are just getting the hang of the legal research. You may still cry when the National Anthem is sung — and you certainly put your hand over your heart like any good American would. Perhaps you even fought to defend our freedom like so many honorable men (and women) like you have.

By now, they have you in the clutches of the "Double B."

What is the "Double B" you ask? "Busy and Broke!"

Due to the bait and switch maneuver, you are now on the defense even though you are listed as the plaintiff. Next comes the final preparations for the dog-and-pony show — the final preparation for your day in court on the holodeck stage — and the implementation of the "Triple C" is ripe and ready.

As you get thoroughly busy, and more broke trying to answer the defense's frivolous motions, you continuously have to show that it is they who have obfuscated and lied, not you as they have accused you. You spend day and night trying to explain yourself to the court. You answer their accusations by repeatedly explaining that you did not claim your wife on your taxes because she did not work, you injured your back ten years ago in a legitimate workers' compensation injury, and that you and your wife went to a marriage counselor fifteen years ago after your youngest son died.

Yes, the "Triple C" is being implemented against you in just its proper sequence.

What is the "Triple C" you ask again? This is when good citizens, who's only crime is that they naively asked the courts to rule justly, are labeled as either a:

1. Criminal (who will believe him, he is a criminal tax-evader),
2. Con-man (who will believe him, he lied on his tax return, and was a malingerer from work), or
3. Crazy (who would believe him, he went to a shrink and is paranoid delusional — ("get an I.M.E . — [Independent Medical Exam] quick and get this psycho diagnosed! Call some doctor who needs our repeat business" yells opposing counsel back stage).

The "Double B, Triple C" is in full effect now. You are not only exhausted, but you now have to worry about your reputation, the IRS audit that is bound to happen due to the allegations made, or an insurance company claiming you were fraudulent in that workers' compensation injury so long ago. As the morass of the "Litigation Vortex" sucks you down further and further into its clutches, you can no longer see the path along which to exit. "What have I gotten myself into and how did I get here?", you think as your friends start expressing the opinion that maybe you are a little too obsessed about this case. As soon as the dust settles, albeit for only a moment, you finally begin to realize that maybe your grade school teacher missed something.

"And Ye Shall Know The Truth And The Truth Shall Set You Free"

The following section is designed to help you learn who your real enemy(s) is (are). It describes who really has you turned upside-down in the centrifuge of "Courtroom, Inc." while you spin violently until every last dime is centrifugally spun from your pockets.

"And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



[Richard Fine - Political Prisoner]

[Know Your courts]

[WBF Legal Reform]

[Personal Stories of American Injustice]

[Political Chicanery In The Old Dominion]

[Judges Plead Guilty in Scheme to Jail Youths for Profit]

[Whistleblower Puts Virginia Supreme Court on Trial]

[Distorting & Undermining Institutional Accountability & The U.S. legal system]

[Terrorist Within Our Gates]

[Judge John Walker, George Walker Bush’s Cousin, Judges April Gallop’s Suit]

[List of federal judges appointed by George W. Bush]

[Money trails lead to Bush judges]

[George W. Bush–Still With Us (In Black Robes)]

TOPs Blogger Role