Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The  NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Wednesday, November 25, 2009

PeRsOnAlItY PrOfIlInG and SiMuLaTiOn - BrAiNWaShInG AmErIcA

By Norman D. Livergood

In an earlier article, I reviewed the varied aspects of personality profiling and simulation. While serving as Head of the Artificial Intelligence Department at the U.S. Army War College, 1993-1995, I conducted studies on profiling, psychological programming, and brainwashing. I explored and developed personality simulation systems, an advanced technology used in military war games, FBI profiling, political campaigning, and advertising. Part of my discovery was that:

Unenlightened human minds are combinations of infantile beliefs and emotional patterns


These patterns can be simulated in profiling systems

These profiling systems can be used to program and control people

Personality simulation systems are being used to create political campaigns that apply voter profiles to control their voting behavior. TV commercials and programs use personality simulation to profile viewers to control their purchasing and viewing behaviors. And sophisticated propaganda and brainwashing techniques are being used by the cabal to keep American citizens under control.

The Technology of Thought and Behavior Control


The long evolution of developing procedures to control human behavior all came to a head in the modern world with Pavlov, a Russian scientist. In the early years of the twentieth century, Pavlov made the discovery that you can condition a dog to salivate on command simply by associating food with the ringing of a bell. Once that association is fixed in the dog's mind, the food can be removed and the dog will salivate merely when it hears the bell.

Pavlov carried out the identical experiments on human beings with the same results. Those principles have been adapted to television and motion pictures and can now make Americans salivate in response to a wide array of bells and whistles. We can call it phase one in the evolution of human behavior control.


Phase two was accomplished by the same Russian scientist, Pavlov. Very few people know of this part of his research. During a particularly severe storm in Russia, heavy rains continued for days and Pavlov's laboratories were flooded. Pavlov and his research assistants were able to return to the laboratory only after the flood waters had receded days later. Upon returning, Pavlov discovered something truly remarkable. Before the flood, many of the dogs had been conditioned to respond to various stimuli. Lo and behold, all traces of the conditioning in the dogs had disappeared! Bells, food, nothing could induce the former salivation response that had been so carefully implanted in the dogs' nervous systems.

What mysterious influence could account for this remarkable turn of events, Pavlov wondered. So, being a good scientist, he studied carefully what had transpired while he was away from the dogs. They had been left without food or warmth. They had been isolated for days; some of them had drowned. They had been subjected to extreme stress, never knowing if they would live or die. These were the factors that had produced the washing away of the previous conditioning from the dogs' brains - brain-washing.

Pavlov and other Russians followed up this line of research, but it was the Chinese communists in the 1950s who first saw its real potential for use with human beings. They employed these very principles in brainwashing American and other Allied prisoners of war during the Korean conflict. Isolation, periodic denial of food or water, cold and exposure, extreme stress associated with uncertainty of life or death--these conditions, together with a continual barrage of indoctrination produced the erasing of previous beliefs and behavior patterns in American soldiers in particular. Thus brainwashing became phase two in the evolution of human behavior control.

But brainwashing is not very reliable, as the remarkable film "The Manchurian Candidate" shows. The trigger mechanisms can be tampered with, sometimes even erased, before the desired behavior can be carried out.

These procedures are only used now by the CIA and other intelligence services for programming special assassins (see the movie "Parallax View"). Neither classic Pavlovian conditioning nor brainwashing can produce the general results that black-budget project directors in intelligence services desire: absolute control of a human personality.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[Related: The Torture Matrix Operational Collection Database]

Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace etc.

[Using Virtual Reality to Document Human Existence, Gregory Peter Panos, PersonaForm, Beverly Hills:]

www.wtec.org/ConvergingTechnologies/Report/NBIC_report.pdf [Cut and Paste URL to Download]

www.wtec.org/ConvergingTechnologies/1/NBIC_frontmatter.pdf [Cut and Paste URL to Download]

Titan Rain

Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionage, corporate espionage, or random hacker attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown. The designation 'Titan Rain' has been changed, but the new name for the attacks is itself classified if connected with this set of attacks.

In early December 2005 the director of the SANS Institute, a security institute in the U.S., said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems." Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.

[Means of Information War, Threaten Democracy and Mankind, by Mojmir Babacek]

[Strategic Personality Simulation: A New Strategic Concept by Dr. Norman D. Livergood]

[Behavioral Influences Analysis Center]

[Strategic Personality Simulation - A New Strategic Concept, Norman D. Livergood, Center for Strategic Leadership, Army War College, Carlisle Barracks, Pennsylvania, 1996:]

[Cognitive engineering and behavior/decision making odeling/prediction:]

[A "V"R oriented approach:]

[Converging Technologies for Improving Human Performance:]

[British Telecom sponsored Soul Catcher project:]

http://news.cnet.com/A-new-memory-chip--for-the-brain/2100-1001_3-218102.html

[A serious proposal for personality transfer/modeling using neural nets:]

[Artificial Metempsychosis. A Search Of Methodology For Personality Simulation; Mikhail Solovyov, Department of Biophysics, St. Petersburg University, Russia, 1992]: www.cryonet.org/cgi-bin/dsp.cgi?msg=2879.2

[The curious Patent Application #20020088467 at www.uspto.gov/patft, Mind personality transfer method, Izumi Arai, Tokyo, Japan, 2002-Mind personality transfer method: Patent Application#20020088467]

[Government Collecting DNA Secretly [WHY]



Monday, November 23, 2009

NeW ExEcUtiVe OrDer AiMs to AvOid DeClaSsIfIcAtIoN

Secrecy News from the FAS Project on Government Secrecy

by Steven Aftergood

Development of a new executive order on classification of national security information is now proceeding at an accelerated pace in order to preempt a deadline that would require the declassification of millions of pages of historical records next month.

A revised draft executive order was circulated to executive branch agencies by the Office of Management and Budget on November 16, with agency comments due back today, November 23. A final order is likely to be issued by the end of this year.

There is an incentive to complete the development of the executive order before December 31, 2009 because of a deadline for declassification of historical records that falls on that date. Under the current Bush executive order, classified records that are at least 25 years old and that have been referred from one agency to another because they involve multiple agency interests are supposed to be automatically declassified at the end of this year. (See E.O. 13292, section 3.3(e)(3)).

But in order to meet this December deadline, several agencies would have to forgo a review of the affected historical records, which they are unwilling to do. And so it seems they will simply be excused from compliance. But in order to modify the deadline in the Bush order, it will be necessary to issue another executive order. If the comprehensive new ObamaC.H.A.N.G.E order on classification policy (which would assign processing of such records to a National Declassification Center that does not yet exist) is not ready for release by December 31, then another stand-alone order would have to be issued, canceling or extending the looming deadline. And officials are reluctant to issue such an order since they say it would be awkward for the avowedly pro-openness ObamaC.H.A.N.G.E. Administration to relax or annul a declassification requirement that was imposed by the ultra-secret BushFRAUD Administration.

In fact, the whole process has become an awkward mix of exaggerated and deflated expectations. The failure of the BushFRAUD Administration’s declassification deadline to take hold this year does not augur well for new, more ambitious efforts to advance classification reform. If the “automatic declassification” procedures that were prescribed in prior executive orders are not “automatic” after all, and if binding deadlines can be extended more or less at will, then any new declassification requirements in the ObamaC.H.A.N.G.E order will be similarly subject to doubt or defiance.

===snipped===>

Thus, Defense Secretary Robert M. Gates told reporters on November 12, “I have been appalled by the amount of leaking that has been going on” about classified Administration deliberations on Afghanistan policy and other matters.

But from a different point of view, others may be appalled that Secretary Gates’ own Department still retains classification restrictions on historical records dating back to the Korean War, and even from World War II, and that it otherwise resists modernization and correction of the cold war classification system.

Some general background on the national security classification system from the Congressional Research Service can be found in “Security Classification Policy and Procedure: E.O. 12958, as Amended” (pdf), November 3, 2009.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!


Love "Light" and Energy

_Don

References:

[Distorting & Undermining Institutional Accountability & The U.S. legal system]

[Obama Commits to Declassification] Lets hope it's not all 'Smoke" & "Mirrors"

[Secret reports, Secret budgets, Secret operations, Secret courts]

[EPIC Files Appeal for NSA Policy on Network Surveillance]

[State Secrets Privilege: The Puppets & Puppet Masters]

[Draft Order Would Set New Limits on Classification]

[CRYPTOME DMCA Notice of Infringing Material]

[Defense Secretary Gates on Leaks]

[Litigation Documents: EFF v. CIA]

[Our President Obama C.H.A.N.G.E]


Saturday, November 21, 2009

ThE Ma$teR MaGiCiAn$-FuNdInG CoVeRt GoVeRnMeNt PrOjEct$

The use of third party advocates or front groups for the dissemination of US government propaganda is well documented: JSOU: Covert Blogs & Military Information Strategy

Introduction:

Most people assume covert government projects are paid for with separate budget appropriations, passed by a vote of congress. They also assume that while congress may not know what the money is being used for, at least congress knows how much is being spent. Sadly, nothing could be farther from the truth. In the last 50 years, at least $40 trillion (in 2004 dollars) has been siphoned away from legitimate uses and spent on secret projects.

The diversion of public monies on a scale this vast can not be accomplished through conventional parliamentary mechanisms. It requires a coordinated effort at the very highest levels of government. It also requires a continuous flow of maladapted policies and legislation to supply the raw material. This raw material is human victims. In other words, you...

With less than 5% of the world population, America now consumes over 50% of the world's natural resources and manufactured goods. If you're a Japanese factory worker, or a Brazilian farmer, a Canadian cattle rancher, or a European banker. Chances are directly or indirectly, you're working for America. The American people do not receive the fruits of your labors. Contrary to government generated statistics, the economic standard of living in America has been declining for decades.

What follows is a detailed description of the biggest theft in human history. A theft spanning half a century, and involving the diversion of wealth from an entire planet.

The master magicians:

The art of magic involves the skillful capture of attention. A magician says "watch closely while I make this rabbit disappear". He must capture your full attention because without it, you will notice the slight-of-hand performed by his assistant, that creates the illusion of his magic. The diversion of federal government revenue into clandestine projects makes use of this same technique.

Every day on TV news programs, you see the political leaders of America engaged in a grand debate over how to make the world in general, and America in particular, a better place to live. And every few weeks another foreign dignitary makes a pilgrimage to the White House, in order to confer on momentous matters of world peace and security. These men and women are not America's leaders, they are magicians. And you are not their constituency, you are their audience. Their proclamations are as meaningless as a magician's pronouncement of abracadabra. They capture your attention, while their assistants pilfer your wallet, and plunder your children's future.

Most people assume that congress and the president jointly determine how tax revenue is being spent. However, the money is actually spent by semi-autonomous bureaucratic empires, with names like Department of Defense, Department of Energy, Department of Homeland Security, Department of Housing and Urban Development (the list goes on and on)...

Each Department is managed by a secretary, nominated by the president, and approved by congress. These managers (secretaries) are the "magician's assistants". And they are responsible for stealing the rabbit, while your watching the magic show. As a general rule, the less public visibility a department secretary has, the more money that bureaucratic empire is diverting (stealing).

Each bureaucratic empire, guided by a magician's assistant (the secretary), creates an annual budget that is submitted to congress and the president for review and approval. 90% of the time, approval is automatic. In other words, most of the time congress and the president don't tell the bureaucratic empires how to spend money, just how much money to spend.

A typical department budget consists of hundreds (sometimes thousands) of individual items or programs with obscure names, and vague definitions. The diversion of American tax revenue into covert projects is accomplished piecemeal, through these budgetary items. A little bit from one item, a little more from another. No one really knows the exact amount of diversion taking place. Estimates run as high as 60% of the entire federal budget as being diverted into clandestine projects through this mechanism.

The trick behind the magic:


A short review of some department budget items will prove useful in understanding the mechanics of how the diversion is accomplished. I shall use the DOE (department of energy) proposed budget for fiscal year 2006. This document is publicly available at the DOE website.

According to the document, proposed DOE budget for 2006 is $23.4 billion dollars, and represents a decline of $475 million dollars from the 2005 budget which, and I quote: "shows DOE's commitment to results-driven performance." This is utter non-sense, as I shall demonstrate.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[Afghanistan's Development Debacle] UNDP Investagation

[Prostitution in the US Government]

[The NED, NGOs and the Imperial Uses]

[Spies for Hire - Covert Government @ it's Best]

[Secret reports, Secret budgets, Secret operations, Secret courts]

[PentaCON tried to intimate U.S.Journalist]

Quote:

At what point shall we expect the approach of danger? By what means shall we fortify against it? Shall we expect some transatlantic military giant, to step the Ocean, and crush us at a blow? Never! All the armies of Europe, Asia and Africa combined, with all the treasure of the earth in their military chest; with a Bonaparte for a commander, could not by force, take a drink from the Ohio, or make a track on the Blue Ridge, in a trial of a thousand years. At what point then is the approach of danger to be expected? I answer, if it ever reach us, it must spring up amongst us. It cannot come from abroad. If destruction be our lot, we must ourselves be its author and finisher. As a nation of freemen, we must live through all time, or die by suicide.

Abraham Lincoln, January 27, 1838

TOPs Blogger Role