Category Archives: Counter-Intelligence

An American Citizen Reports “Developed Dehumanization through Non-Consenting Implantation to the Human Body in Efforts to Maintain Terrorism”

The post herein publishes the content of an email sent this week to a group of civilian, military, former Intelligence, fusion center, scientist, and journalist recipients including this writer by American citizen Sherri M. Guarnieri, whose whistle-blowing and advocacy for Alzheimer’s patients, particularly her grandmother, in Massachusetts and Connecticut nursing-homes led to a currently continuing experience of horrific retaliation which included the involvement of the Obama White House, Secret Service, local police, as well as various public figures; this was explored in an interview with Ms. Guarnieri, and in a succeeding podcast with her.

Sherri M Guarnieri is reporting clandestine implantation, non-consensual military or Intelligence experimentation, and the participation of numerous civilians in literally subjecting her to extremities of physical torture, including gross sexual abuse, by way of remote manipulation of implants and bodily energy meridians. These are serious crimes, and they evoke the trauma-based mind control tactics of the CIA’s MK ULTRA, experiments in behavior modification seen by many analysts and ex-CIA officers to have merely gone underground in the ’70s and resurfaced now through various overt and covert surveillance, monitoring, experimental, criminal justice, and other programs. 

Of course, in the present time period with the Surveillance agencies running totalitarian operations on one and all supported by a slavish Congress, as noted recently in the blind renewal of Section 702 permitting warrantless spying, thousands of Americans are reporting surveillance crimes and abuse inclusive of covert implantation and electromagnetic weapon assault. Sherri M Guarnieri is an important national witness and reporting victim to this holocaust, whose reports carry additional weight because she reports open disclosure of participation in the gang-targeting she experiences, by the very people who are consenting to abuse her. (This disclosure will be reported more closely in a succeeding article and podcast.)

Especially striking about Ms. Guarnieri’s resolve in exposing this criminal trafficking of her body is her current email campaign to inform and educate all personnel on relevant military bases, fusion centers, as well as local, regional, and national governments, while also seeking help to stem these abusive assaults on her and the world’s humanity. In clear and powerful language describing the crux of the unjust assault on her body, she states that such assault comprises CIA-weaponized ground-level domestic terrorism. The question she poses is a very pertinent one: Is this the world–of targeting and abuse of womens’ bodies with remote radiation weapons–that we wish to leave to our daughters?

I thank Sherri for speaking out and bearing witness to these crimes.

We need powerful voices today to cut through the egregious arrogance of the Intelligence agencies and US Military in harming, defacing, mutilating, and torturing Americans, all in the name of “national security”–a profound and treasonous lie.

–Ramola D/Posted 1/26/2018

Developed Dehumanization through Non Consenting Implantation to the Human Body in Efforts to Maintain Terrorism

Sherri M. Guarnieri/January 23, 2018 2:32 AM

To Whom It May Concern:

Human Trafficking is now developed through the dehumanization of the human body through non-consensual implants placed in human ears.

No longer a hypothesis, this is an in-play development of our government, military, and CIA. 

Sherri1Currently the ear devices I hold are used in National Labs which implicate the development of microwave-frequency directed energy weapons/DARPA processed through the application of CIA MKULTRA.

The development of these devices is no longer classified research due to the civilian population being asked to participate in gross sexual imposition, assault, battery and body-altering damage through impact to the ear using Chinese medicine technology to pulse-wave, shock, burn, vibrate, and laser-cut the body with precision. This is a development of terrorism not just inside the United States but on a global scale.

These devices act as a microphone with its own microprocessor to utilize GPS, a designated FCC line, direct transmission of pulse-wave technology using a D Wave processor, and an Amazon server.

Sherri2The use of these devices I hold without consent in my body are being used for unethical human trafficking, gross sexual imposition, body-altering damage which is no longer non-consenting human experimentation but rather CIA-skilled-level terrorism with civilian participation, with civilians logging into a computer to offer direct impact to the human body 24/7 without consequences.

The level of participation under the CIA’s direction has assured these participants zero consequences under the Constitution.

If you assure a group of civilian, employers, and co-workers they are assured to have zero consequences under our Constitution to cause gross sexual imposition, shock, pulse-wave, vibration, damage of personal assets, assault and battery to a non-consenting body by the technology of these devices, then the CIA has just weaponized ground-level terrorism no longer controlled by our military and government elected to serve and protect their citizens under the Constitution of the United States and Human Rights and is now committing a Crime Against Humanity.

Sherri3These devices can be seen through my skin, in an older MRI and a recent x-ray. These devices are being unethically denied removal at our University Hospitals, by plastic surgeons or trauma surgeons in fear of government retaliation.

So I am still left holding a non-consented human-trafficking device in both ears which can be accessed by any civilian developing terrorism along with National Labs under illegal medical malpractice and human experimentation.

I was woken again to burning skin and rectal vibration just so a Pedophile with gross Ritualistic Abuse can enjoy their evening.

Would you want these devices in your daughter?

Regards,

Sherri M Guarnieri

Related Links

Advocate for Alzheimer’s Patients Sherri M. Guarnieri Reports Whistleblower Retaliation for Advocacy, Criminal Assault with Military EMF/Bio/Neuroweapons, Obama White House & Secret Service Involvement

Notice of Crimes Against Humanity Using Energy & Neuro/Bio Weapons

 

Exploring The FBI’s “Consensual Monitoring” and the CIA’s “Concealed Monitoring”: One-Party Consent to Electronic Recordings and Non-Consensual Two-Way Radio Implant Communications?

Perhaps we can start by agreeing there is no such thing as Consensual Surveillance, for if there were, we would all be ticking boxes on Census-like forms offered to us by benevolent government entities keen to surveill us with our consent, saying Yes! You can surveill me, adding, defensively, as many of the unthinking among us do, After all, I have nothing to hide.

The FBI States It Engages in Consensual Monitoring

Still, the FBI is on record now as stating that it engages in Consensual Monitoring, in the case of the aerial surveillance of Baltimore in May during the protests succeeding Freddy Gray’s death in police custody, as documents obtained by ACLU reveal. This October 30, 2015 ACLU report has the story, and the FBI Evidence and Memo Logs referencing “Consensual Monitoring” in pdf form can be found linked at the end of that article.  These evidence logs, which are redacted in places, seem to be logging in Aerial Surveillance Videos, but in a few cases, log in “Other Electronic Surveillance” which is still item-described as “Aerial Surveillance,” and in one case, additionally, as “Consensual Monitoring–Non-Telephonic.”

What is Consensual Monitoring?

fbiBaltimore-1What can Consensual Monitoring possibly be? Is the FBI defining a form of monitoring and surveillance it engages in as Consensual, in hopes of “keeping it legal”? One clue they offer is that it’s “Other Electronic.” It’s not Aerial Video. It’s not Aerial Photography. Can it be Aerial Cyber Surveillance? (Why would they need to do that from the air, when it would be far more effective from the ground?) It’s Non-Telephonic. So it’s not Stingray, Dirtbox, cell-phone-tower-mimicking scooping-up of cellphone voice and text data. It’s Electronic, and it’s Consensual–so they say–and it’s not Video, Audio, Telephonic, Cyber-related.

From the ACLU article:

“FBI evidence logs reveal that at least half of the flights conducted video surveillance, and that the FBI retained copies of those videos in its files. Other flights conducted some type of “electronic surveillance,” but specific descriptions are redacted. This suggests that those flights were perhaps using more sensitive or powerful recording gear than just video cameras, though what kind we don’t know.

What we do know is that one of the aircraft, a Cessna propeller plane registered to an FBI front company, NG Research, had specialized surveillance camera equipment on board. FAA documentation shows that the FBI installed a Paravion Technology infrared camera mount and a FLIR Talon multi-sensor camera system on the exterior of the plane. The FLIR system includes a “thermal imager,” an optical camera, and a “laser illuminator” for recording at night. We did not receive documentation about the second plane observed circling over Baltimore, so we don’t know if it was carrying different gear.”

Regular FBI Surveillance Flights Over Cities and Rural Areas

A June 2015 article by the Associated Press revealed the fact of regular surveillance flights over cities by FBI planes, although again the nature of the surveillance was not clarified:

“Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies, The Associated Press has learned.

The AP traced at least 50 aircraft back to the FBI, and identified more than 100 flights in 11 states over a 30-day period since late April, orbiting both major cities and rural areas. At least 115 planes, including 90 Cessna aircraft, were mentioned in a federal budget document from 2009.

For decades, the planes have provided support to FBI surveillance operations on the ground. But now the aircraft are equipped with high-tech cameras, and in rare circumstances, technology capable of tracking thousands of cellphones, raising questions about how these surveillance flights affect Americans’ privacy.

“It’s important that federal law enforcement personnel have the tools they need to find and catch criminals,” said Charles Grassley, chairman of the Senate Judiciary Committee. “But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.

The FBI says the planes are not equipped or used for bulk collection activities or mass surveillance. The surveillance equipment is used for ongoing investigations, the FBI says, generally without a judge’s approval.”

Also:

“One of the planes, photographed in flight last week (May/June 2015) by the AP in northern Virginia, bristled with unusual antennas under its fuselage and a camera on its left side.”

fbiplane

The AP video report that accompanies a Blaze article on this same AP report identifies the spherical white protrusion with cable on the fuselage as a ball camera to provide sweeping panoramic views, but the other equipment is not identified.

“Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a “cell-site simulator” — or Stingray, to use one of the product’s brand names. These can trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime.

Officials say cellphone surveillance is rare, although the AP found in recent weeks FBI flights orbiting large, enclosed buildings for extended periods where aerial photography would be less effective than electronic signals collection. Those included above Ronald Reagan Washington National Airport and the Mall of America in Bloomington, Minnesota.”

Currently Available Aerial Surveillance Technologies

On the subject of technology currently being used in Aerial Surveillance by Law Enforcement, and by Military PISR operations (Persistent Intelligence, Surveillance, Reconnaissance), see this slide show presentation from the company Persistent Surveillance Systems, linked in pdf and posted Jan 2014 at PublicIntelligence.net, which includes suggested policy statements on Persistent Surveillance for Law Enforcement, among other things.

The image below of the Surveillance Systems market size  is from this pdf. Also posted at Public Intelligence is the US Joint Command Handbook for Persistent Surveillance.

PSS

The Washington Post ran an article on this subject in Feb 2014. Also see the video produced by the Center of Investigative Reporting and PBS demonstrating this system.

Essentially, what they say is that Wide Area Persistent Surveillance camera systems that are carried on planes offer panoramic views of large areas such as whole towns and cities, several miles (up to 25 miles in reports) in diameter, and the way they are used is to generate real-time video by having the planes circle interminably over defined areas, for about six hours at a time, combining the data obtained thereby with that from networked ground cameras, traffic cameras, gas station cameras, etc., to create a detailed picture in real-time of what anyone is doing, outside, on foot or in cars/vehicles. CIR and KQED’s video on surveillance below introduces this system and also touches on biometric intelligence, and other forms of surveillance.

State of Surveillance: Police, Privacy, and Technology

ACLU also discusses this issue, and elsewhere covers wide area surveillance (ARGUS-IS) from drones as it raises privacy concerns.

Persistent Surveillance Systems on Military Electronic Warfare Planes

Merely as reference, consider too the kind of wide-spectrum surveillance and data collection in process currently with Military Persistent Intelligence, Surveillance, and Reconnaissance programs, which use continuously-generated data from planes, ground stations, and satellites, as illustrated in this Raytheon UK overview image, from a Dec 2014 AIN Online article (Raytheon UK Develops New ISR Solutions). Note especially SATCOM–how satellites are being used to network data from the ground, from aircraft, from mobile forces, and from “tactical” ground stations.

raytheonUKoverview

Electronic Warfare aircraft, whose collection of ELINT, COMINT, SIGINT–Electronic Intelligence, Communications Intelligence, Signals Intelligence–is achieved through sophisticated radar systems, electronic jamming systems, and radio antennas, use various networked tools to engage in Persistent Aerial Surveillance.

The image below of an Electronic Warfare plane is from GlobalSecurity.org; while this aircraft looks obviously military and loaded with “pods” and antennae, Military news reports (and Defence company news and press releases) over the past couple years have pursued the creation of increasingly “intuitive” portable and streamlined EW collections/jamming packages that can be mounted more easily on smaller craft, including drones, as well be used in ground vehicles, fixed installations, and in backpacks for “foot soldiers” to carry. (See The Future of Army Electronic Warfare, Sep 2013.)

So, looking again at the FBI surveillance plane imaged above, one might just wonder if it’s possible this high-tech FBI surveillance aircraft is merely a smaller, streamlined version of the plane below, carrying compact Electronic Warfare collection/jamming systems for Persistent Intelligence, Surveillance, Reconnaissance.

electronicwarfareaircraft

Electronic Warfare Includes “Signals Intelligence” Collection

Not to be forgotten is the fact that Electronic Warfare, which has been covered previously in this post here, includes electronic surveillance and remote electronic signals collection–by which is meant a variety of electronic signals, as this Army Concept Capability on Electronic Warfare for the Future Modular Force 2015-2024 document details, including remotely-culled information from computers and electronic communications. Electronic Attack, one of the three Army-Doctrine aspects of Electronic Warfare, seeks to use electromagnetic energy to attack personnel, as well as equipment, and Electronic Warfare Support  seeks out sources of intentionally and unintentionally radiated electromagnetic energy for threat recognition and targeting, as this overview image from the Army Concept Capability document illustrates.

ewow

Widely-posted –although less-well-known–information from the ’90s on NSA Signals Intelligence reveals that SIGINT also includes information on human bioelectric fields and EMF thoughtwave forms (unintentionally radiated energy), as noted by John St.Clair Akwei in his lawsuit against the NSA (See especially the Section, NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL)).

Returning to Consensual Monitoring

It turns out the FBI has Department of Justice-specified Procedures for Consensual Monitoring.

See this Sep 2005 report: Chapter Six: Procedures for Lawful, Warrantless Monitoring of Verbal Communications (Consensual Monitoring)/FBI’s Compliance with the Attorney General’s Investigative Guidelines (Redacted) Special Report.

Opening information from this report:

“Consensual monitoring is the interception by an electronic device of any wire, oral, or electronic communication where one of the parties to the communication has given prior consent to the monitoring or recording. A warrant is not required to conduct consensual monitoring, and the party providing consent may be a government agent. See 18 U.S.C. § 2511, (2) (c) – (e) (2002).

The Attorney General Guidelines governing consensual monitoring cover only non-telephonic consensual monitoring.319 The types of monitorings addressed by these Guidelines include the use of body recorders and transmitting devices. To supplement the Guidelines, the FBI imposes detailed administrative and management controls on the use of both non-telephonic and telephonic consensual monitoring. MIOG II § 10-10.”

Further, the report goes on to specify that DOJ permission to monitor is required only in the case of “sensitive individuals” such as members of Congress, Governors, and other public officials, and duration of monitoring be permitted in those cases for only up to 90 days at a time. For all other parties–such as you and me–no permission is required other than a sign off from a Special Agent at the local FBI office, and duration of monitoring may be marked by said Special Agent as “for the duration of the investigation,” may be conducted by anyone, including possibly Government agents, and doesn’t need a warrant or DOJ approval.

Records are required to be maintained in all cases of consensual monitoring; the record to FOIA-request is: Form FD-759, captioned “Notification of SAC/ASAC Authority Granted for Use of Telephonic and/or Nontelephonic Consensual Monitoring Equipment in Criminal Matters Only.”

Is Consensual Monitoring Accomplished via 1), Recordings Unilaterally Consented-to by Hundreds of Thousands of Recipients of National Security Letters, & 2), Covertly Implanted RFID transponders?

Given this information, while it appears as if this kind of monitoring is being legitimately engaged in by the FBI purely in matters of criminal investigations, because there is much information online about abusive surveillance–fraudulent and wasteful investigations on non-terrorists and non-spies mis-characterized post-Patriot-Act as terrorists and spies–being conducted by DHS/FBI, including from ex-FBI insiders and whistleblowers (such as Mike Germain), and because thousands of individuals today in the US report covert assaults with Remote Neural Monitoring technologies involving Directed-Energy Weapons and Covert RFID implants, two other possibilities come to mind:

Consensual Monitoring One: The consensual monitoring being spoken of here is via recorders, such as apps on cell phones, or videorecorders/audiorecorders on cell phones, which belong to people who are “co-operating in an investigation” by the FBI, and who are being gagged from speaking about this to the individual under investigation by way of National Security Letters, hundreds of thousands of which, possibly now more than a million, have been handed out every year (See the Electronic Frontier Foundation‘s Module on NSLs);

and Consensual Monitoring Two; The “body recorders and transmitting devices” spoken of are biomems, RFID chips, MicroElectroMechanical devices, neurostimulators, and the like, covertly implanted in individuals, which do indeed function as “body recorders” and radio transmitter/receivers. Of course, this is scarcely Consensual communications, even if it is a two-way radio communication, since the implants themselves are non-consensual, but is an attempt being made here to pass off RFID transmissions as “Consensual Monitoring”?

The CIA’s Concealed Monitoring

This brings us to the CIA, and a June ACLU article by Staff Attorney Ashley Gorski, New Docs Raise Questions About CIA Spying Here At Home which revealed the recent FOIA-requested (by ACLU & Yale Law School’s Media Freedom and Information Access Clinic) release of several documents–eg., the CIA’s own internal regulations on spying in both foreign and domestic areas, titled AR 2-2, a CIA/FBI Memo of Understanding regarding foreign and domestic intelligence collection, and others, related to the CIA’s collection programs under Executive Order 12333.

It must be noted, these documents are continuously redacted, with blanks in place of particular Intelligence collection information marked “National Security Act.”

These documented regulations apparently govern the domestic activities of the CIA, in its human subject research programs, its domestic intelligence collection programs, its foreign intelligence collected-domestically programs, its domestic monitoring programs, and its co-ordination with the FBI in domestic electronic surveillance and monitoring.

This ACLU article, and all the documents it points to, in particular the document AR 2-2, which clearly notes that the CIA engages in human subject research and experimentation programs–an issue of profound concern at this site, deserve close reading and analysis, and will be examined further here, in a succeeding post (when redactions will be filled in, speculatively).  

What’s of particular note here to this analysis, from this ACLU article/finding is: The CIA works closely with the FBI on domestic intelligence collection and can ask the FBI to collect intelligence anytime on anyone it likes. Any recording consented to by one party is not considered electronic surveillance, it is possibly considered Concealed Monitoring, a term that Army Intelligence and the CIA are familiar with(this seems to be the same kind of surveillance the FBI discusses as Consensual Monitoring, where one party unilaterally consents to a recording involving two parties or more). The CIA gives itself permission to install “monitoring devices” whenever no warrant is required for law enforcement–a loophole created by other loopholes–but does not specify what these devices are. (RFID Implants/Bio-MEMs maybe?)

The ACLU article notes:

“In addition, Annex B explains that the CIA may “use a monitoring device within the United States under circumstances in which a warrant would not be required for law enforcement purposes if the CIA General Counsel concurs.”

But what qualifies as a “monitoring device”? And how exactly does monitoring differ from “electronic surveillance,” which the CIA is prohibited from doing domestically? We don’t know. In the newly released documents, the definition of “monitoring” (as distinct from “electronic surveillance”) is redacted.​”

Redacted Signals Intelligence Collection Information, Persistent Intelligence, Surveillance, Reconnaissance, One-Party Consent Labelled Consensual Monitoring, Warrantless FBI Monitoring with Transmitting Devices, Warrantless CIA Monitoring Devices Used Domestically, Redacted Definitions of Monitoring

Security and Intelligence analysts need to start connecting the dots here and planning strategies to force this information out into the open in order to seek accountability and exposure. All Americans deserve to know that our Intelligence agencies–in particular the FBI and CIA–are 1) actively collecting particular electronic signals information the nature of which is being kept redacted and classified–but which thousands of Americans experiencing covert-assault and covert-access with radar and Remote Neural Monitoring technologies, as well as researchers studying Mind-Hacking patents and technologies can identify as Human Bio-Resonance EMFs and Brain EMFs; 2) getting away with close monitoring and surveillance of Americans, domestically, and secretively, using National Security Letters as leverage to obtain one-party consent that is then labelled “consensual monitoring”; 3) self-permitting and installing covert non-consensual implants of radio transmitting/receiving devices in the bodies of Americans so as to engage in Remote Monitoring which is then rolled into “concealed monitoring.”

Further posts here will specifically examine CIA involvement in ongoing classified human subject research and experimentation programs, and the nature of the transmitting devices/monitoring devices–radio frequency implants– being self-authorized for CIA/FBI use in undisclosed Remote Monitoring programs.

For an inside look at one extraordinary instance of the documented CIA use of biomedical implants in Intelligence collection as a surveillance method, see David Larson’s 2009 testimony, lawsuit against the CIA, and report with photographs.

 

 

 

CIA, Mossad, MI6, DGSE: Seemingly Pushing for a “Global Systems Approach” to “Homeland” Security

Shortly after the Paris attacks, it was learned more widely that the heads of various Intelligence agencies–the CIA, the DGSE, and former heads of the Mossad and MI6–had met a couple weeks earlier in Washington, DC.

Dahboo7 reported briefly on this:

The meeting took place on the campus of the George Washington University (where I taught Creative Writing for many years, and prior to that, various Composition and Writing courses in the English Department’s Writing Program) under the aegis of the George Washington Center for Cyber and Homeland Security (no doubt creative in its own way;), which describes itself on Youtube thus:

The Center for Cyber and Homeland Security (CCHS) at the George Washington University is a nonpartisan “think and do” tank whose mission is to carry out policy-relevant research and analysis on homeland security, counterterrorism, and cybersecurity issues. By convening domestic and international policymakers and practitioners at all levels of government, the private and non-profit sectors, and academia, CCHS develops innovative strategies to address and confront current and future threats.

The occasion for the meeting was ostensibly a panel conducted as part of a conference titled the (2nd Annual) Ethos and Profession of Intelligence Conference, which was co-hosted by the Central Intelligence Agency and the George Washington University, and was held on October 27, 2015.

The panel was titled, interestingly, “The Shared 21st Century International Mission,” and featured CIA Director John Brennan, former UK MI6 Chief John Sawers, Director of the French Directorate for External Security Bernard Bajolet, and former Israeli National Security Advisor Yaacov Amidror. The panel was moderated by David Ignatius, Columnist at the Washington Post.

The whole panel may be watched on Youtube (video below), and, given the power that Intel agencies currently have appropriated for themselves, and the level of self-congratulation aired here, is just a little disturbing to watch and listen to, but is posted here for a couple reasons. While it’s no secret that Intelligence agencies in the West–and Israel–probably work together anyway on all sorts of issues related to security and intelligence, counter-intelligence, and counter-terrorism, it’s interesting to note that there now appears to be an obvious, emerging bent now among Intelligence agencies to openly merge and combine their efforts and missions, much in keeping with other global initiatives, such as evinced in Global Policing and the current push toward One World/Global Governance.

To this end, I found two moments of note in this panel, one by former Israeli Advisor Yaacov Amidror sounding just un peu frantic about the crucial need for increased collection and sharing of information among Intel agencies in order to “win in the arena of digital/cyber warfare,” and the second featuring current CIA Head John Brennan holding forth on the changed terrain post 9/11, acknowledging the sophistication of current systems but noting the current-day complexity of pulling together vast collections of data and information from all sorts of sources, including, “something from Youtube, something collected clandestinely,” and the need for “pulling it all together and pulsing it, at the speed of light”–a need for a “System of Systems approach” to be established and evolved and improved, as data improves (a subject immediately picked up by the rest of the panel as an opportunity to praise the gargantuan collection of data by the NSA).

Actually, that led to something else that’s disturbing though–John Sawers talking about “threats to the homeland” (Does the UK also have a “Homeland”? How language creeps along!) and David Ignatius pointedly asking Mr. Amidror about Palestinian “lone wolf” terrorists. (Who praised Israeli Intel for their efforts in intercepting “95% of planned terrorism” and confining attacks to ones by the “lonely wolves.”) This excerpt is prefaced by the French DGSE Head Bernard Bajolet talking about international co-operation among Intel and his own efforts in tracking suspects who tended to travel between Europe and the Middle-East and can be viewed from 41 minutes in to about ten minutes down.

What’s notable is that there seemed to be a distinct attempt by all at this panel including the moderator to highlight this Global Systems approach, as well as to deliberately spotlight Domestic Intelligence, Domestic Terrorism or Extremism, and Lone Wolves–all focuses that we have seen before, and are still seeing today, resulting in increased and repressive, secretive, surveillance and counter-terrorism measures being unleashed on domestic populations, both in the US, the UK, and in other countries in Europe.

Panel at GW, 21st-Century Intelligence Sharing

In relation to the above, it is interesting to note the following excerpt on supercomputers crunching massive amounts of intelligence in an Artificial Intelligence scenario from an article on Remote Neural Monitoring–a secretive, probably-classified neurotechnology which directs electromagnetic/scalar energy remotely onto human brains, bodies, and nervous systems, which is nevertheless widely described today, reported worldwide by non-consensual experimentees, and discussed online, and which will be covered here more extensively shortly–posted at Deepthought.newsvine.com:

“‘Mr Computer’ is a general artificial intelligence with greater-than-human level reasoning capability.  Whilst not what many envision as being the technological singularity, it is certainly the leading practical implementation of this notion.  For the less romantic, ‘Mr Computer’ is a HCI solution to a vast decentralized data warehousing solution jointly operated by the CIA and NSA.  Its role in RNM is a CIA black op with stated objectives of controlling all aspects of human behavior, thus it is possible for individuals to know of this AI in a different capacity and not have access to RNM directly.

Outside of its role in RNM, ‘Mr Computer’ is a force multiplier that enables the US intelligence community to connect-the-dots in gathered intelligence from every available source.  This system is the ultimate destination of any data the US Federal government collects. Forget notions of hacking or attacking this system, not only can it literally vaporize you, but its also a better programmer, physicist and engineer than all humans combined.  It’s as secure as they come and its bugs are not of the conventional exploitable type.   I’m sure it finds modern notions of cyber-warfare and IT security ‘cute’ and ‘charming’, but ultimately not in the same league as it and certainly not a threat.” More can be found at Deep Thought.

In which vein, also see this informative 2013 article on Skynet and AI taking over NSA surveillance data: Skynet Rising: Google Acquires 512-Qubit Quantum Computer: NSA Surveillance to be Turned Over to AI Machines

 

Clandestine MKULTRA Continues Today, Hand in Hand with Clandestine Electronic Warfare Radiation Neuroweapons Testing & Training on Americans

How and why is it that thousands of people in the US who are reporting being assaulted by pulsed radiation weapons are ignored by pretty much everyone they approach for help/exposure/justice: members of Congress they write to, doctors and psychiatrists they look to for help–who don’t bother acting like the scientists they are supposed to be by actually testing or physically measuring this radiation which can indeed be picked up by radio frequency meters, human rights advocates at the big Human Rights organizations like Amnesty International or the American Civil Liberties Union, even their local Law Enforcement officers–who ignore the thugs in cars speeding into neighborhoods and pointing military Non Lethal Weapons at certain, select “Targeted Individuals” and demand that counseling or a psychological evaluation is in order instead?

How and why is it that small aircraft and helicopters incessantly buzz –everyday, constantly during the day, and constantly during the night too–into certain neighborhoods, often hovering or circling for hours, often seemingly summoned by said speeding cars on the ground–their intent and mission deliberately not shared with the public, even when questioned–as FOIA requests to the FAA indicate? (See Muckrock for my FOIA request to the FAA, stalled and delayed over all of last year, and ultimately non-responsive, currently under appeal.)

Could it be that Top-Secret/Special Access Electronic Warfare EMR Neuroweapons are being tested and trained on them? Could it be that pilots–and ground crew–are training together in Electronic Warfare on these “Targeted Individuals”? (The people on the ground who are being assaulted, the so-called “Targeted Individuals,” including this writer, know this rings true–the hits on their bodies speak to the aircraft connection.)

Perhaps the extreme and questionable silence surrounding this situation is because these assaults have been fully permitted and authorized as Classified “Top Secret” Research and Experimentation Projects, to be conducted in a Clandestine way–meaning no-one can legally speak about them. Just go on “legally” assaulting, criminally and covertly, forever, the assaulters well-hidden by Secrecy laws, Defense directives actually permitting weapons-testing on civilians, and the Common Rule with its flagrant loopholes permitting the Institutionalized Hijacking of Informed Consent–which isn’t required in Classified Research on Human Subjects today.  All of this extreme criminality and flagrancy of human rights violations can exist in silence and refusal-to-acknowledge, thanks to our society’s current miasmic cowering in the face of Secrecy.  Secrecy permits abuse, and Clandestine Projects which promote Secrecy are currently promoting Extreme Abuse. Innocent individuals are being openly tortured, in the USA–and this practice is occurring worldwide.

These speculations and analyses, supported by commentaries and interviews and videocasts with various other analysts, doctors, researchers, weapons experts, weapons creators, and neuroscientists, are examined on this new page under Human Rights: 2015: “Targeted Individuals” are Non-Consensual Subjects in Criminal Clandestine, Classified “Top Secret” MKULTRA-Extended Mind & Behavior Control/Torture Experimentation by Joint Military/Intel/Justice/Academic Institutions, as well as Targets of COINTELPRO  and Electronic Warfare

The “Deep State” Hides in Plain Sight: Organized Covert Harassment Points to Overreach and Abuse of Powers by Out-of-Control Intel Agencies

We are living in a time of unprecedented surveillance and social control in the US and in many countries worldwide.

Secrecy in law has brought us to a point where people either live in fear of the surveillance state and are afraid to speak their minds, or are naively co-opted into actively harassing activists/whistleblowers/writers in their midst, by Intel agencies working locally through Fusion Centers (via narratives of fabricated “investigations” of these civically-engaged citizens falsely termed “security risks” now needing to be “monitored electronically” 24/7 by the oh-so-concerned State and enrolled covertly in “neuroscience/behavior modification programs” which warrant friendly but un-turndownable “official” requests for community co-operation).

Businesses and communities are openly repressed by Intel agencies using the overreaching powers of state secrecy laws–like Section 215 of the Patriot Act, and the whole Patriot Act, and the facile issue of National Security Letters via secret machinations of the Foreign Intelligence Surveillance Court, and secret sharing of private information, all tools to oppress civilians and groups, and to force a community’s silence through gag orders and threats of incarceration and fines.

Secrecy, Silencing, Surveillance, Censorship: are we Secure yet?

Where does Covert Harassment come from? Has American society always been secretly run by Intel groups?

Acccording to Mike Lofgren (former GOP congressional staff member with Senate and House Budget Committees) in this Bill Moyers episode, the “Deep State” has been hiding in plain sight for years and includes Intel agencies, Wall Street, and Silicon Valley: he collects his thoughts also here in this essay, Anatomy of the Deep State.

Do Secret Services and Spy Agencies have any right whatsoever to covertly harass citizens–and to co-opt others through lies and deceit into also persecuting these citizens?

Or do these actions indicate a tremendous overreach and abuse of their powers?

Harassment today is malicious in the extreme, and involves the covert use of deadly directed-energy neuroweapons (See Human Rights/Covert Criminal Targeting of Activists; more to come); “electronic monitoring” or “electronic surveillance,” which community members consent to engage in, themselves (because they all have cell phones?!), is nothing less than the GPS tracking, targeting, and discharge of deadly directed-energy neuroweapons on citizens (See Human Rights/Classified Weapons Testing; more to come).

The nature of spying in itself is a deterrent to democracy; to understand why. watch the documentary Counter-Intelligence posted online in five parts. See this Popular Resistance interview with filmmaker Scott Noble: Counter-Intelligence: Spying Deters Democracy.  Excerpt: “In making the film I set out to explore how these agencies function in the real world. How do they keep secrets? What are some common m.o.’s? What is their ultimate purpose? In a broader sense I wanted to ask whether democracy is even possible when organizations like the CIA exist. We are currently living under a hybrid of plutocracy (from plouto, “wealth”) and cryptocracy (from krypton, “hidden”) that benefits about 1 percent of the human population. It’s no secret we’re ruled by the rich, but there is a relative lack of understanding about just how much information is kept hidden from the public. A 2004 study by Peter Galison at Harvard concluded that “the classified universe is certainly not smaller, and very probably much larger than this unclassified one.”

Watch Counter-Intelligence online.

What was COINTELPRO all about? Who did it target, and doesn’t it seem like it’s quite aggressively active today?

This brief video which excerpts part of the Church Committee findings, shows Walter Mondale and other Senators discussing the unprecedented nature of Covert Harassment they were uncovering: Covert Actions Against Citizens Living in America

Who do Americans listen to today? Are American communities and citizens all too easily swayed by the voice of “Authority”?

How easily can an American be persuaded to act against a fellow citizen, merely by the flashing of a badge? Is this how Intel agencies are running entire communities now, and ensuring their “community involvement/participation” in the harassment of activists/whistleblowers/writers–their own neighbors? Watch this ABC News John Quinone: What Would You Do? video for some absolutely riveting footage that answers just this question.

Other videos on this highly educational site explore COINTELPRO further, and reveal the modern face of Covert Harassment.

Speaking Out Against Secrecy & the Stripping of our Basic Rights

People everywhere today are beginning to speak out about the excessive surveillance, repression, and secrecy we face post 9/11 and the Patriot Act: it’s Time for the Pariot Act to expire, and time for us to speak out against secrecy laws which suppress and do not protect, which oppress and do not secure “national security” much as the latter is used glibly as a mantra to justify pretty much any invasion of privacy, personal sovereignty, and right to free speech.

The Electronic Frontier Fund has set up a site with information and action items–learn more about the undemocratic nature of Section 215 of the Patriot Act, take a small moment to sign a petition, post a link, tweet a note to Congress, or write a letter to Congress–we will never be free of surveillance and repression and the stripping of our basic rights, we will never end the horrors of Covert Harassment by overreaching Intel groups, never end the machinations and depredations of the Deep State if we don’t speak out, now, today, while we have an ounce of freedom left.

Also, do scroll down the previous post here for other links to petitions and letters. Please: act today. Sign them all!